Myths In Cybersecurity That People Needs To Forget
Cyber attacks come in various presentation and packages, the damage range from “all systems feel normal” to “the sky is falling” scenarios. But one thing is for sure, users of all access levels, from system admins to end-users and consumers have a large role to play for the success or failure of cyber attacks perpetuated.
[ Read More ]The Forgotten IT Security Aspects Of Healthcare Firms
The Healthcare sector’s continued problem with cybersecurity vulnerabilities will continue for many years to come. As long as their equipment follows the principle of “use it until it physically breaks down.” In the world of IT, such a process does not work from the standpoint of security and privacy, especially in the aspect of the
[ Read More ]Safely Dealing With Network Security In The Age of BYOD
The introduction of telework that allows people to work from outside the office using PCs and smartphones is also in progress. If telecommuting spreads, employees will be able to spend time commuting to work. In addition, you can flexibly work according to personal circumstances, such as being able to work while raising children and taking
[ Read More ]Ransomware: Less With Consumers, More In The Enterprise
The system admins’ favorite antivirus program Malwarebytes has released the State of Malware Report covering the first quarter of 2019, highlighting the state of malware globally. The highlight of the report is the visible decreasing frequency of global ransomware infections, from 12 million incidents recorded in the first quarter of 2018 to just 4 million
[ Read More ]Fundamental Things You Need To Know About Ransomware
This article is written for the purpose of empowering our readers with much deeper knowledge of ransomware, with the goal of lessening the chance that your Windows computer will be the next victim. Ransomware is a type of malware that ranks high on the Internet as cybercriminal’s favorite milking-cow. A computer infected with this virus
[ Read More ]Facebook’s “View As” Fiasco Now Under Trial
Facebook seems like receiving the short end of the stick once more, as a U.S. District Judge William Alsup ruled that the trial of the case against Facebook’s “View As” fiasco of September 2018 will proceed as scheduled. The judge ruled last June 21, denying Facebook’s appeal to junk the case due to lack of
[ Read More ]What Are The Motivations For Botnet Development?
Any device in the Internet may function as a zombie, a member of a botnet that follows the commands of the botnet malware. Both traditional PCs, servers, smartphone, and IoTs (Internet-of-Things). Botnets are a collection of Internet-connected devices infected with malware. These infected devices are called bots (or zombies). The type of malware that takes
[ Read More ]Common Pitfalls That Increase Likelihood Of Data Breach
Mitigating the effects of IT issues can be a great article for someone who underwent the heartbreak of losing data, whether due to an internal incident or an external threat. However, providing tips for that may be a “late” display of concern, as there is already a victim, the incident (or accident) already happened. The
[ Read More ]ViceLeaker, An Android Large-Scale Espionage Malware
It took 3-years of cat and mouse play, Kaspersky was successful with its background checks against the nature of an Android malware named ViceLeaker. Unlike a general malware type that infects random vulnerable Android device, ViceLeaker is apparently designed to infect users from Middle East countries, for the purpose of large-scale espionage operations. The malware
[ Read More ]A Closer Look at TA505’s FlawedAmmyy RAT
Last November 24, 2018, while they were busy with their tRAT malware. The team once again surfaces with a new campaign, this time with a new remote access trojan known to Microsoft as FlawedAmmyy RAT. The technology used by the RAT is the all-time vulnerable language called the Visual Basic for Applications, also known as
[ Read More ]