Ransomware
Over 2.3 million Windows systems were infected with ransomware in Q2 2017
Quick Heal Technologies which offers security solutions to computing products conducted a survey in which it was discovered that over 2.3 million Windows systems were infected with ransomware in Q2 of 2017. The study found that cyber criminals are now interested in working on attacks which require fewer resources to launch but give higher returns. […]
These are the biggest ransomware attacks in last 5 years
Ransomware has become a nightmare to companies to whom data means lifeblood. And over the years, the said malware variant has grown from a mere curiosity filled with annoyance to a major crisis deeply entwined with top secret spy agencies and international intrigue. So, to enlighten our readers on the story of ransomware as it’s […]
agentless casb accelerates ransomware disaster recovery
This post was originally published here by Anurag Kahol. The recent ransomware attacks that ravaged organizations around the globe last week have brought sudden attention to a longstanding problem. Few enterprises today are prepared for a ransomware attack and while most discussions focus on detection capabilities, disaster recovery is often overlooked. Disaster recovery strategies have always focused […]
Android Ransomware hackers demand $50 for not leaking your images onto the Web
Cybersecurity Insiders has learned that a new ransomware variant called ‘LeakerLocker’ is being circulated by hackers on Google Play store from past few weeks. And security researchers from McAfee discovered that the said malware has the potential to leak the images of the victim’s phone onto the web if a ransom of $50 isn’t paid. […]
Next Wannacry and Petya Ransomware Cyber attack could cost insurers $2.5 Billion
Ransomware attack dubbed as ‘Wannacry’ which hit more than 250,000 computers across 150 countries in May this year did not cost much to cyber crime insurers when the claims ratio is taken into account. But CFC Underwriting estimates that another attack of Wanna cry or Petya or a combination of both can cost cyber insurers […]
The Key to Ransomware Disaster Recovery? Secure Unmanaged Devices
This post was originally published here by Anurag Kahol . The recent ransomware attacks that ravaged organizations around the globe last week have brought sudden attention to a longstanding problem. Few enterprises today are prepared for a ransomware attack and while most discussions focus on detection capabilities, disaster recovery is often overlooked. Disaster recovery strategies have always focused […]
How businesses can protect their computers from Ransomware like Petya
Worried about Ransomware like Petya crippling your business…? Then just follow these steps to protect your computers from the said malware. 1.) Train your staff to be suspicious- Being suspicious in some cases do works and here’s the best reason to prove it. According to a study carried out by Kaspersky Labs 60% of ransomware […]
Ukraine accuses Russia of launching Not Petya Ransomware attack
Ukraine has accused Russia of launching cyber attacks on public and private entities on last Tuesday. The attack which took place on June 27th, 2017 disrupted the work of public and private institutions by locking down their databases. The initial analysis made by some security experts said that the attack was a Petya malware attack. […]
Windows 10 new update to hide folders & files from Ransomware
Microsoft is all set to release a new security update to its Windows 10 users in September this year. And as per the claims made by Windows 10 testers, the software will soon have the potential to hide folders from malicious software which has crept into the PC through the network and this includes the […]
Antidote to GoldenEye Cyber Attack has been found
Security Researchers have found an antidote to the recent Petya Ransomware cyber attack which took place in the late hours of Monday this week. The researchers claim that the solution will act as a kill switch that would prevent GoldenEye ransomware from spreading future into vulnerable systems. Researchers have found that a creation of read-only […]