Category Archives: Antivirus Vendors

Antivirus Vendors

A backup plan can save you from ransomware [infographic]

Names like Locky and CryptoLocker are familiar due to numerous news reports, but if you haven’t heard of the growing threat of ransomware, here’s a quick summary: Ransomware is a type of malware that locks you out of your devices by encrypting your files. In return for access with the decryption key, it demands a payment, typically in bitcoin. In many cases, victims of ransomware cannot recover their files, so a backup is essential.

US Congress sends a (no) privacy note to the entire connected world

US Congress sends a (no) privacy note to the entire connected world

US consumers are set to lose control over their online privacy as a consequence of the US Congress throwing out incoming rules for Internet Service Providers that would have given consumers a direct say in how ISPs can use their private data. The overturned rules – passed last October but not yet implemented – would […]

The post US Congress sends a (no) privacy note to the entire connected world appeared first on Avira Blog.

Meet the Transformers: Meet Pop.Up, a conceptional car

Pop.Up

It’s like a wet dream for any driver. While all the others enjoy the stop and go rush hour traffic you’re changing into air-mode, pull ahead and cock a snook at the earthbound drivers. Let’s talk about the new and very conceptional car “Pop.Up”. Airbus and the Italian service provider ItalDesign introduced Pop.Up at the Geneva […]

The post Meet the Transformers: Meet Pop.Up, a conceptional car appeared first on Avira Blog.

WYSIWYE: A User-Friendly Interface for Cybercrooks

What You See Is What You Encrypt.

The trend of installing malware on corporate networks through the Remote Desktop Protocol is booming among cybercriminals. In the last few months we have analyzed several cases of ransomware attacks directed at companies from different European countries that share this methodology and are being perpetrated by the same attackers.

Once credentials are obtained through a brute force attack on the RDP, the cybercriminals gain access to the computer.

At this point, when the goal is to deploy ransomware, attackers simply execute the corresponding malware automatically to start encryption and ultimately display the ransom message. However, here we can see a more personalized type of attack

In the intrusion analyzed, we see that the ransomware has an interface through which it can be configured according to the attacker’s preferences, starting with the email address that will appear in the ransom note that will be sent to the victim.

 

With this customized attack, it’s possible to hand-pick the network computers whose information the attacker would like to encrypt, choose files, self-delete upon completing the encryption, enter stealth mode, etc.

 

How to protect your business from customized attacks

The survival of any company in a digital environment calls for establishing a solid corporate network security strategy. Prevention in the face of unknown cybersecurity threats with the goal of neutralizing it as soon as possible, or blocking an attacker should he succeed in gaining entry to the system, plays a role of top priority today.

In the present case study, from PandaLabs we blocked attack attempts that used this form of ransomware against companies protected by Adaptive Defense in Germany, Belgium, Sweden, and Spain.

Here are the MD5s of the ransomware:

4C163E182FFBA6C87EA816B7D7A7D32B
D9489263DA3A5CA7E938315EFD32522D

A timely investment in prevention, detection, and response technologies, instead of adopting perimeter-based solutions, guarantees better preparation in the defense against cyberattacks.

The post WYSIWYE: A User-Friendly Interface for Cybercrooks appeared first on Panda Security Mediacenter.

U.S. Financial Firms Suffer Million Dollar Losses from Cybersecurity Incidents

According new data from the Kaspersky Lab Financial Institutions Security Risks 2016 , the costs associated with cyberattacks affecting the financial sector are rising as organizations face increasingly sophisticated threats. In the U.S., the cost of a cybersecurity incident to a financial institution can be as much as $1,165,000.

‘Can you hear me?’ robocalls put consumers on alert [infographic]

I fell for it the first time I answered a call. A friendly female voice hesitated, then giggled the line, “Can you hear me?” After I answered, “Yes”, it took me a few seconds to realize I had been fooled. It wasn’t a silly girl with a bad connection calling me on behalf of Disney Vacations – I had just been targeted by a robocaller. By then it was too late.

University @Avira: Predicting error-related user behavior in Avira Antivirus

University @Avira: Predicting error-related user behavior in Avira Antivirus

The best way to learn Data Science is to do data science. Following this motto, Avira collaborated with the University of Liechtenstein and participated at the winter semester 2016/2017 seminar “Data Science” with a real-world data science problem. Liene Blija, Christian Holder, Jan Plojhar, and Martin Lukšík — four brave students — accepted the challenge to […]

The post University @Avira: Predicting error-related user behavior in Avira Antivirus appeared first on Avira Blog.