Karmen ransomware makes it easy to launch attacks

A new ransomware do-it-yourself kit called Karmen is making it easy for wannabe cybercriminals to launch ransomware attacks. Security researchers […]

Full Details

Resume Ransomware: GoldenEye targets hiring managers, recruiters and HR

People charged with filling career positions at their companies need to be on the lookout for ransomware, especially GoldenEye ransomware. […]

Full Details

PopcornTime offers victims a choice: Pay the ransom or infect your friends

PopcornTime is a newly-discovered form or ransomware that is still in the development stages but operates off a disturbing principle: […]

Full Details

New version of Cerber ransomware hits businesses where it hurts

The latest version of Cerber ransomware is targeting database applications and putting business’s most valuable data at risk, according to […]

Full Details

Ransomware Incident Response: 7 steps to success

Ransomware infections are becoming increasingly commonplace, and companies that put a plan together before an incident are much more effective […]

Full Details

Mamba ransomware takes a bigger bite out of your data

As if encrypting your individual files was not enough, a recently discovered ransomware called Mamba encrypts your entire hard drive. […]

Full Details

The Economics of Extortion: Understanding the ransomware market

We all know money is the motivating force behind cybercrimes like the creation and distribution of ransomware. The interesting twist […]

Full Details

Pokemon Go ransomware virus is out to catch’em all

A Pokemon Go themed ransomware virus has appeared on Windows computers, tablets, and phones. The ransomware is the latest in […]

Full Details

Cybercriminals turn to DIY kits and Ransomware as a Service (RaaS)

Ransomware creators are monetizing their software in creative new ways. Not only are they using ransomware to encrypt files and […]

Full Details

Will Hacktivists Turn to Ransomware?

The US presidential election is upon us and some political activists are out in the streets, and in convention halls. […]

Full Details

Newest Ransomware has Polished, Professional Look

Criminals are raising the bar in the fight for your money.  It’s natural to expect that competition would follow success—and […]

Full Details

Geolocation technology helps ransomware deliver targeted message

It might surprise you to know that ransomware uses geolocation technology to customize payloads and target individuals. You probably already […]

Full Details

Adding Ransomware to Security Radars

Ransomware is the quickest way to turn your valuable data into garbage.  Ransomware is a form of malicious software that […]

Full Details

Ransomware 101

Ransomware is an evolving malware threat.  Where once malware was predominantly an inconvenience, ransomware takes aim at data, the lifeblood of […]

Full Details

Cybersecurity’s common cold

New and creative security threats may grab headlines, but smart security practitioners know that many attackers still rely on the […]

Full Details

Malware behind university data breach

Salem State University in Massachusetts issued a data breach warning to faculty and students on March 11.  The warning informed […]

Full Details

Dexter malware threatens data breaches on point of sale equipment

Security researchers have identified a new malware called Dexter that specifically targets Point of Sale (POS) systems such as cash […]

Full Details

Immunize your Business

At the upcoming Information Security Summit, I will be presenting on the topic, “Eradicate the Bots in the Belfry.”  Bots […]

Full Details

RAT Hacking Evidence fresh from the source

Previously, we have discussed the dangers of hacking and measures to take against an attack in the LulzSec blogs.  Now […]

Full Details

Security Awareness Training Tips for Detecting Malicious Software

We have worked hard to educate users of the need for computer hygiene, using anti-spyware, multiple browsers, data backups, and […]

Full Details

Antirootkit Rootkit

Rootkits, if you are not familiar with them, are programs that, when on a machine, place themselves in between the […]

Full Details

Mac Viruses

Apple’s recent ads talk about how there are no viruses written for Mac. That statement is not entirely true. Viruses […]

Full Details