Reeling From Cyberattacks, EU Revamps Their Future Plans

Two massive cyber attacks in May and April 2017, the Wannacry virus and the NoPetya attack on Ukraine, tested Europe’s cyber defenses and showed the EU sorely needs to upgrade its threat response. Both viruses exposed various loopholes in security protocols and the lack of countermeasures against the malicious applications. The WannaCry ransomware virus infected

[ Read More ]

Battling a Ransomware on Your System the Right Way

Ransomware don’t discriminate between good guys and bad guys. Two Ontario-based non profit organization are the latest victims of a ransomware. In order to fight these kind of threats,we must first know the details regarding this ransomware. For the record, there were more than 7600 ransomware attacks reported to the Internet Crime Complaint Center (IC3)

[ Read More ]

Hackers Love The EternalBlue Exploit Because You Hate It

There is one thing small-time hackers and heavy-hitting black hats have in common—they both love the exploit known as EternalBlue. Evolved from the famous computer worms Conficker and Welchia, EternalBlue employs diverse exploits with new, brilliant-devised, and easy to deploy applications. As a hacker favorite, it leaves digital devastation in its wake while taking advantage of any unpatched

[ Read More ]

Experts Warn: Destructive Ransomware Is Headed This Way

Ransomware nowadays might seem to be silent, but it is still around, and more attacks using the file-encrypting malware are just waiting for the right timing. Famous malware like WannaCry,NotPetya and Bad Rabbit made ransomware out of limelight. WannaCry and NotPetya are both associated to be the work of nation states -former North Korea and

[ Read More ]

Pawned: People Who Got Hacked Tell Their Stories

We hear about various hacks through the news, and most of the time, we only tend to remember the statistics about how many accounts were affected, what details were leaked, and how much loss the company faced in the form of dollar bills. But honestly, these stories don’t hold much of a human appeal—and they

[ Read More ]

Here’s Why System Patch Updates And User Management Are Key

Every operating systems are not created perfectly. Every distributions are continuously updating for better and secured performance. As part of enforcing security management, it is also recommended to manage properly the file permissions for users. Hackers are always there searching for security holes that they can exploit. System updates help plug these holes,leaving the hackers

[ Read More ]

Bet You Don’t Know How Autorun Can Save You From Ransomware

Horror fanatics know the consequences of an encounter with the evil doll Annabelle. People should similarly beware of the same-named ransomware, which possesses a bunch of evil tricks to wreak havoc on the computer. The developers of this ransomware want to showcase their programming skills. Though it is easily decryptable, this ransomware can prove it’s

[ Read More ]

Hackers Launch New Attacks Using Old Adobe Vulnerability

A known critical vulnerability in the Adobe Flash Player can serve as a gateway for cybercriminals to hijack your computer. Researchers from cyber security research group Morphisec spotted the vulnerability in use in a phishing campaign using Word documents. This is the second time this vulnerability code named CVE-2018-4878 appears as a tool for an

[ Read More ]

5 Shocking Truths About Cybersecurity You Should Know

If you aren’t keen on updating your anti-virus solutions or your company isn’t keen on investing in cybersecurity, you might suddenly find yourself losing thousands of dollars or your company going bankrupt. Cybersecurity is not a joke. Here are five things you should know about cybersecurity and why you need to take it seriously. 5

[ Read More ]

Check Out These Emerging Trends In Security And Network Technology

There was a time, not so long ago when networks and security were considered two separate entities, each possessing their own specific set of tools, approaches, and necessary skills. However, the scope and sophistication of today’s computer exploits have now fused them together into one protective platform known as network security, effectively integrating threat management into the

[ Read More ]