Facebook iconTwitter icon
B2B-Network:
Study
SonicWall Rings the Alarm with Nerve-Wracking Cyber Threat Statistics
Thumb mehr ransomware

SonicWall recently announced record statistics for ransomware attacks, malware volume, chip-based attacks, and encrypted threats in their 2018 SonicWall Cyber Threat Report. According to the CEO at The Chertoff Group, Chad Sweet, real-time cyber threat intelligence has become more dangerous than ever with cybercriminals unearthing new attack vectors such as chip-based and encrypted attacks. For organisations to stay safe in the cyberspace, they must utilise all tools in their security war chest. 

 

Malware Volume Continue to Rise From 2017’s Record Highs 

The...

» Read more
Analysis
Hidden and Unhidden Costs of Ransomware Attacks
Thumb ransomwarekosten

Ransom is only a small part of the cost that you are likely to incur when hackers attack your enterprise’s computer systems through ransomware. Although some of these costs go unnoticed, customer service interruptions lower businesses’ profitability heavily. But that is not all – read which costs a ransomware attack can mean for your company.

 

Direct Costs 

Most attackers target the enterprise’s data, therefore, leading to data destruction. Consequently, victims may choose to pay the ransom to relieve their captured data. You might even be...

» Read more
Analysis
The Biggest Cyber Security Threats United: Botnets and Ransomware
Thumb botnet ransomware

When it comes to the cyber threats, botnets and ransomware are currently dominating according to a Microsoft security study. The researchers collected the report by analysing data from Bing, Windows, Azure and Office 365. It seems to be essential for enterprises to be aware of such threats and come up with safety mechanisms to protect their date from attackers. 

 

How Hackers Are Evading Detection Lately 

Security experts are having a hard time detecting and fighting Locky ransomware that goes hand in hand with the Necurs botnet that has been spreading through...

» Read more
Study
How Hackers are Using Modified Malware for Cryptomining
Thumb malware bedrohung

Over the years, hackers have used Ransomware to blackmail computer users. Ransomware is a malicious malware that encrypts computer files. They then ask for ransom from the PC owners to remove the malware. However, these hackers have turned to a new tactic of infecting computers with a malware that enables them to mine cryptocurrencies with your computer, without your knowledge of course.

 

How hackers are using coinhive to mine cryptocurrencies on your computer 

Coinhive is a JavaScript code that is attached to certain web pages and is used to mine cryptocurrencies each time you...

» Read more
Practical Advice
4 Measurements to protect your business from ransomware attacks
Thumb ransomware3

Ransomware has been a dangerous threat to many small and large businesses for over six years now. Unfortunately, this type of cybercrime isn’t going away, but it can be prevented. Here are some tips on how you can protect your business from ransomware attacks. 

 

1. Update your computer system regularly

Cyber criminals usually find it easier to attack older versions of operating systems and browsers. However, if you keep all your business computers constantly updated, hackers will be less prepared to attack them as they won’t be able to figure out how to compromise the...

» Read more
Comment
Cybersecurity Stress Tests: Proactive Solutions for Modern Times
Thumb test

Although the majority of small- to medium-sized enterprises have contingency plans in place to deal with security issues, it is estimated that a mere 14 per cent have actually carried out tests to gauge the efficacy of these systems – according to a research by Policy Bee. This is a critical concern, as it is otherwise very difficult to uncover any weak points within existing IT infrastructure. What is a stress test and how can one be conducted in order to tackle potential threats or vulnerabilities?

 

Cybersecurity Stress Tests at a Glance

Any stress test primarily involves...

» Read more
Analysis
Another big ransom hack: WannaCry
Thumb wannacry

WannaCry Hack has caused a lot of headaches to numerous companies from health sector, security sector and numerous enterprises. It is a type of malware that locks systems, and when one tries to open up different files, a pop-up informs that those files are encrypted. The catch is that it warns people that they either lose their data or be ready to pay $300 in Bitcoin or lose their data permanently.

 

Older versions of Windows concerned

The most vulnerable systems are the old ones like Windows 8, Windows XP and Windows Server 2003. WannaCry Hack uses a convert...

» Read more
Trend
Cybercrime Challenges Set to Increase in 2017
Thumb binary woman header

The need to beef up cyber security is a very important agenda for the year 2017. The most crucial areas that need to be tackled include the Internet of Things threats, cybercrime transformation and the emergence of new EU data regulations. Experts have predicted the IoT threats to be a big threat due to the use of default passwords, outdated operating systems, out of sight and incorrectly configured devices.

Other predictions suggest that cybercriminals will have the advantage of having sophisticated tools to enhance their hacking strategies. In addition, the cybercrime gangs will easily...

» Read more
Inside Story
The Effective way to Counter Malware
Thumb digitalisierung header

The most prolific kit today is the RIG; it has helped to bridge the gap left after the Neutrino, Angler, and Nuclear departed. The Cisco Talos scientists have decided to make things clear in regard to the development of the potent EK with some hopes to counter the RIG EK threat. Similar to uncovering the various EK threats, the way to stop infection rates will largely depend on how they can identify the routes of infection and how they are able to bypass the security device and software.

Just like other exploit kits, RIG is redirecting the various victims to the exploit kit by using gates....

» Read more
Trend
Cerber Ransomware - Holding Your Personal Files To Ransom
Thumb gfx028

Stories about Cerber Ransomware have been cropping up all over the internet, and for good reason. This is a piece of ransomware developed to hold personal files at ransom and even has the capability to create fake system alerts and speak in a robotic voice to its victims. The Cerber Ransomware is capable of encrypting personal files, such as photos, documents and other private information. Once files have been encrypted, the ransomware will speak to those that fall victim to it, stating that their files have been encrypted. 

The Ransom
Those who fall victim to this scam will then be...

» Read more
Loader