Tag Archives: ransomware

Probably Makes You WannaCry

The WannaCry name belongs to the ransomware program that was launched this past Friday that has already infected close to 1/4 million Microsoft Windows systems across 150 countries, with an asking price of $300 in bitcoin to decrypt your files… … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Probably Makes You WannaCry

Today Show: Hacker Hijack

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Today Show: Hacker Hijack

Brilliant Video Showing The Anatomy of An Attack

Cisco made a great video (4 minutes) that I honestly think everyone must see. It breaks down a complex ransomware attack. Picture this happening to your organization. Are you ready for it?

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Brilliant Video Showing The Anatomy of An Attack

Ransomware Decryption Key: Your Time Exchanged for Security Awareness

In an odd twist, the Koolova ransomware will decrypt for the low price of reading two articles on ransomware… The articles that Koolova wants you to read are an article from Google Security Blog called Stay safe while browsing and BleepingComputer’s Jigsaw Ransomware … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Ransomware Decryption Key: Your Time Exchanged for Security Awareness

Smart Farming Vulnerabilities

Smart farming is a real thing, it enables farmers to monitor their crops and gather visual analytics on big data. This allows for farmers to anticipate crop availability and forecast pricing. This data is very valuable to the farmers and costly … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Smart Farming Vulnerabilities

MedStar Health

It’s assumed that MedStar Health is a victim of crypto-ransomware as MedStar forced a shutdown of their email and records database yesterday in order to stop the spread of the malware from encrypting more systems. Most operations went back to … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on MedStar Health

Hackers Hold Hospital Healthcare Data Hostage

Hollywood Presbyterian Medical Center’s data systems have been infected with encrypted ransomware. The hospital says patient care has not been compromised, though the cyber-attack has forced them to revert to paper registrations and medical records and send patients seeking emergency … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hackers Hold Hospital Healthcare Data Hostage

Unbreakable Encryption!!!

Cryptowall is a new strain of Cryptolocker. So strong in fact that the FBI’s Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program, Joseph Bonavolonta, normally advises those who have fallen for phishing attacks that release and … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Unbreakable Encryption!!!

New Android Ransomware from the NSA?

There is new ransomware floating around that encrypts the contents of Android phones called Simlocker. It pretends to be from the NSA, uses XMPP (Extensible Messaging and Presence Protocol) and is hard to detect with anti-malware tools. Check Point’s malware … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on New Android Ransomware from the NSA?

CryptoWall and Dickson County Sheriff’s Office

Sheriff’s department of The Dickson County, Tennessee was attacked by a Ransomware trojan ware that encrypts all of the files on the system and can be decrypted only (HA, yeah right!) if the ransom has been paid for them to … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on CryptoWall and Dickson County Sheriff’s Office