Forty-nine years after the first ATM was installed in London, we ask how secure our cash machines are today?
The post Cash machines turn 49 today: Are ATMs really that secure? appeared first on We Live Security.
Forty-nine years after the first ATM was installed in London, we ask how secure our cash machines are today?
The post Cash machines turn 49 today: Are ATMs really that secure? appeared first on We Live Security.
Cases of malware and crimeware incidents are reported daily around the world. Indeed, the number of reports, detections and threats grows constantly.
The post Crimeware: Malware and massive campaigns around the world appeared first on We Live Security.
Don’t panic. Facebook and Netflix have not suffered a data breach. But it’s quite possible that they are asking you to change your password.
The post Mandatory password reset for some Facebook and Netflix users in wake of mega-breaches appeared first on We Live Security.
With ransomware running rampant we asked Americans if they thought the US federal government was doing enough to catch and prosecute computer criminals.
The post Is the federal government doing enough to catch and prosecute computer criminals? appeared first on We Live Security.
An ELOFANT is an “Employee Left Or Fired, Access Not Terminated” and these ghost account insiders can undermine your organization’s information security, as recent DBIR stats suggest.
The post Network ELOFANTS and other insider threat insights from the DBIR and beyond appeared first on We Live Security.
65 million Tumblr users have had their details compromised as a result of a recently-discovered breach dating back to 2013. But it’s not just their passwords that they should be concerned about.
The post 65 million Tumblr users should probably be careful… appeared first on We Live Security.
An 18-year-old man has been charged by British police in connection with an internet attack that saw Mumsnet hacked, users’ accounts breached, passwords stolen, and the site blasted offline.
The post Teenager charged over Mumsnet hack and DDoS attack appeared first on We Live Security.
You have already read some of our tips to help prevent the most feared and common cyber-threat of the moment, ransomware; it can hijack your computer and all the computers in your company. Its main strength is that it is able to block computers and encrypt files, and the only one who is able to decrypt it is the cyber-criminal that created it, which is why so many victims are paying the ransom demanded by these attackers.
When an attack is this sophisticated, the only way to combat it is by taking precautions. Any recommendations you may have can help you, but there is a key measure that is worth mentioning: the backup copies are your best allies to resist the escalation of a cyber-abduction.
In the second part of this guide, we will explain what is essential and how you can handle a ransomware attack.
First of all, ransomware does not block everything. If your devices have been infected, the first thing you should check is that the information is really encrypted. There are mediocre cyber-criminals that are taking advantage of the success of better-prepared, cyber-crime mafias. They do these second-rate jobs in order to simulate attacks that in reality don’t actually hijack your files, and then they reap the benefits. If you do not know how to distinguish a real threat from an imposter, make sure to consult an expert before forking the cash over to the bad guys.
Another important thing to consider: Do you have a backup? After you have verified that the attack is in fact a legitimate ransomware, the first thing you need to ask any security professional is if your company has backup copies of everything that is important. It is the only effective defense. If you have backups, you can eliminate the infected system completely, load your backups, and then everything will be back to normal.
Uses reliable tools. Not all programs are equally effective in creating backups. Unfortunately, many organizations have found that the software used to create a backup is not able replace the detailed information exactly the same as it was before the ransomware attack. Choose your work team carefully and protect your files. Good security solutions offer reliable tools.
For security reasons, it is better to keep your backups offline. In addition to this, if you want to keep ransomware from dragging you down, do not store backups on a shared disk. The more isolated your backups are from the network that is possibly infected, the more likely you are to survive and retrieve your sensitive information from them.
Make several different copies. Even if you are the most careful while carrying out these procedures, there is always a fragile moment. Those few minutes when the disk guarding your backup is copying the data, and is connected to the rest of the network. In that precise moment you are vulnerable to a cyber-criminal. In order to prevent infection, it is advisable to backups in several periods: in real time (if resources permit it), daily, weekly and monthly. They must be separate backups, and at least one of them should be disconnected from the rest of the network.
The post A Kidnapping Survival Guide: How to Combat Digital Ransomware (Part 2) appeared first on Panda Security Mediacenter.
If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or left unchanged, then ESET has good news for you.
The post ESET releases new decryptor for TeslaCrypt ransomware appeared first on We Live Security.
After BlackEnergy and Operation Potao Express, ESET researchers have uncovered another cyberespionage operation in Ukraine: Operation Groundbait.
The post Operation Groundbait: Espionage in Ukrainian war zones appeared first on We Live Security.