dcsimg

Threats - Article Archives - Page 15

Sophos Intercept X Brings an End to Ransomware

March 27, 2017 |

Intercept X from Sophos brings a bandolier of silver bullets to the ransomware fight, leaving cybercriminals scattering for cover.

READ MORE

Massive Data Breach Exposes 4.8 Million Job Seekers' Personal Info

March 27, 2017 |

Names, Social Security numbers and birthdates were accessed.

READ MORE

Apple Attributes Alleged iCloud Hack to Password Reuse

March 24, 2017 |

The allegedly compromised account information may have come from the LinkedIn breach.

READ MORE

Incident Response: How to Prepare for Attacks and Breaches

March 23, 2017 |

Make sure your organization is prepared for attacks and breaches by putting together an incident response plan and incident response team.

READ MORE

Threat Intelligence and Analytics: Staying Ahead of Cyber Criminals

March 21, 2017 |

Threat intelligence is the best way to stay one step ahead of cyber criminals and prevent information or financial losses. We offer a thorough overview of cyber threat intelligence and how to implement it in your business.

READ MORE

Beware of Sleeper Fraud Accounts

March 21, 2017 |

Datavisor Online Fraud report finds that a non-trivial percentage of fraud activity occurs from accounts that are inactive for a week before an attack.

READ MORE

MajikPOS Malware Currently Infecting U.S. Point-of-Sale Systems

March 21, 2017 |

The malware began infecting businesses across North America in late January.

READ MORE

Understanding Ransomware Vectors Key to Preventing Attack

March 20, 2017 |

Understanding how ransomware infects computers and mobile devices is critical for preventing ransomware attacks.

READ MORE

Russian FSB Officers Charged with Involvement in Yahoo Breach

March 16, 2017 |

'The indictment unequivocally shows the attacks on Yahoo were state-sponsored,' Yahoo's assistant general counsel said.

READ MORE

Anti-Virus Solutions Fail to Protect Against Ransomware

March 15, 2017 |

33 percent of respondents to a recent survey experienced a ransomware attack in the past year.

READ MORE

TopSpin Makes Intelligent Deception a Hacker's Worst Nightmare

March 14, 2017 |

Setting a trap using deceptive techniques may just snare many a hacker.

READ MORE

One-Third of Ransomware Victims End Up Paying the Ransom

March 13, 2017 |

Another 54 percent refuse to pay but are able to recover their data anyway, a recent survey found.

READ MORE

Russian Hackers Hit U.S. Progressive Organizations

March 07, 2017 |

The organizations have been targeted with ransom demands ranging from $30,000 to $150,000.

READ MORE

How Much Is a Google Remote Code Execution Vulnerability Worth?

March 06, 2017 |

Google is increasing the amount it pays for RCE vulnerabilities by 57 percent, and payouts for other security flaws are rising as well.

READ MORE

Over 153,000 Users Were Hit by Mobile Ransomware in 2016

March 03, 2017 |

Last year saw a volume of mobile malware equivalent to half of all the malware detected over the previous 11 years, according to a recent report.

READ MORE

Common Types of Ransomware

March 02, 2017 |

Ransomware is getting more sophisticated all the time, so prevention is key to avoid paying the ransom or losing data.

READ MORE

Fully 84 Percent of Hackers Leverage Social Engineering in Cyber Attacks

February 28, 2017 |

And 50 percent change their attack methodologies with every target, a recent survey found.

READ MORE

950,000 Coachella User Accounts Being Sold Online

February 23, 2017 |

Email addresses, user names and hashed passwords are being offered for sale for $300.

READ MORE

Ransomware Dips but Remains 'Evolving Menace'

February 21, 2017 |

Microsoft detects a drop in ransomware encounters toward the end of 2016 but warns against growing complacent.

READ MORE

Verizon Presents Technical Breach Information in a New Way with Breach Digest

February 21, 2017 |

VIDEO: Bryan Sartin, Managing Director of the Verizon RISK Team detailS some of the highlights of the report and the broader VERIS methodology for detailing data breaches.

READ MORE