Kangaroo Ransomware Backup Your Systems

The Kangaroo Ransomware software shows traces of having been developed by the same group of hackers responsible for other malware titles such as “Apocalypse Ransomware,” “Esmeralda,” and “Fabiansomware,” but it uses a different attack vector. Kangaroo is manually installed via a Remote Desktop session. Once installed, it encrypts all the files it finds, but for [...]

Android Ad campaign HummingBad infects millions of devices ( July 8, 2016 )

Security ALERT: Android Ad campaign HummingBad infects millions of devices ( July 8, 2016 ) Security Research Teams received reports about an Android advertisement campaign that has been prevalent for the past few months and has reportedly spread to millions of devices. The main objective of this campaign is generating revenue when a victim clicks on [...]

By | July 9th, 2016|Android, Antivirus, Security, Uncategorized|0 Comments

2015 IT Security Status Report Released

In 2015, more than 430 million new unique pieces of malware were discovered. Remarkably, these numbers no longer surprise us. Attacks against businesses and nations hit the headlines with such regularity that we’ve become numb to the sheer volume and acceleration of cyber threats. Most threat reports only scratch the surface of the threat landscape, whereas [...]

By | June 24th, 2016|Antivirus, Security|0 Comments

Information Security Top 10 Technologies 2016

Intelligence-Driven Security Operations Center Orchestration Solutions Perimeter defense is no longer an adequate security strategy. “An intelligence-driven security operations center (SOC) has to be built for intelligence, and used to inform every aspect of security operations,” Gartner explains. “An intelligence-driven SOC also needs … “an adaptive architecture and context-aware components. To support these required changes [...]

By | June 21st, 2016|Security|0 Comments

DMA Locker 4.0 Ransomware Virus

DMA Locker 4.0 Ransomware Virus  (June 2nd, 2016) Yet another ransomware in the wild called DMA Locker. Ransomware remains a very lucrative business for its operators. The only way of recovering files is to pay the ransom assuming no backup is available. With this ransomware ransomware we can measure some level of success by observing [...]

By | June 4th, 2016|Uncategorized|0 Comments

Dell computers dangerous root certificate

At least some Dell laptops are shipping with a trusted root certificate authority pre-installed, something that those who discovered the CA are comparing to the Superfish adware installed on Lenovo machines that left them open to man-in the-middle attacks.Dell computers shipping with potentially dangerous root certificate authority - Called eDellRoot, the trusted root CA comes [...]

By | November 28th, 2015|Uncategorized|0 Comments

CryptoWall Virus

CryptoWall is a file-encrypting ransomware program that was released around the end of April 2014 that targets all versions of Windows including Windows XP, Windows Vista, Windows 7, and Windows 8. The media is commonly confusing CryptoWall with the CryptoLocker infection, when it is much more similar to the CryptoDefense ransomware. The most apparent similarity [...]

By | August 19th, 2014|Uncategorized|0 Comments

Toolbars are bad

Is your web browser packed with toolbars? Two or three of them? sometimes even more... Maybe it's a Yahoo toolbar -- for someone who's not a Yahoo user. Maybe it's a security toolbar from the likes of McAfee -- even though the user runs Norton anti-virus. Very often it's some weird shopping or promotional toolbar [...]

By | July 10th, 2014|Uncategorized|0 Comments

How to NEVER get a VIRUS

Computer viruses have become an annoying fact of life for computer users. A few tips you can follow to protect yourself include: Never open an e-mail attachment from someone you don't know without verifying it first. Also, if the computer of someone you know is infected, the virus can automatically attach itself to an e-mail [...]

By | July 1st, 2014|Uncategorized|0 Comments

Blocking the cryptolocker virus in Office 365

The easiest and most effective way to block the cryptolocker virus in Office 365 is to block all attachments that contain EXE files. Here is a step by step guide on how to block all .exe files in Office 365 (including inside .zip files). Block EXE email Attachments in Office 365 This will reject emails [...]

By | November 8th, 2013|Uncategorized|0 Comments