PowerShell is being used as an attack avenue for malware. Here’s what you should do to insulate yourself against this latest threat.
Researchers have successfully proven that viruses can be weaponized to infect computers and take them over. And if that’s not the premise of a dystopian sci-fi novel, I don’t know what is. The University of Washington recently baked malware into a genetic molecule and then infected a system analyzing it. If it sounds like DNA data
I’m going to say something controversial, so brace yourself—the WCry ransomware was a good thing. Now make no mistake about it. Ransomware is evil. It’s used to literally hold people’s lives hostage. Just like a tornado, it destroys businesses and lives. But it’s far worse, because people make ransomware…and knowing what it does, deliberately inflict it upon
Over the last two months, millions of visitors to mainstream websites have been exposed to a new form of malware embedded in banner pixels. And if you didn’t see it, don’t be surprised. The new malware, “Stegano”, is nearly invisible to the naked eye. Its code has been embedded in parameters controlling the transparency of
This spam e-mail is so well crafted, it’s both incredible and horrifying. Would your users know this was spam, or would they think it was real?
You know the feeling. A user has done something incredibly dumb. Like opening a strange attachment despite all the counter-phishing training you did last month. And your brain cells all scream at once, just one single word. “Whhhyyyyyyyy?” It’s said that common sense isn’t common. When it comes to IT, it’s even more true. A
It’s like the tale of Pandora’s box. Infected USB sticks are finding their way into people’s mailboxes—and curiosity is making them look inside. The Australian Police Force is being flooded with phone calls from residents of the Melbourne suburb of Pakenham. Upon connecting the infected USB sticks to thier computers, they’ve been assailed with extremely
As an IT professional in 2016, security is a big concern. That’s why infosec is becoming a larger and larger part of IT budgets around the world as each year passes. But what you may not be aware of is the vital role that backups can play in protecting against or recovering from some of
Spear Phishing has been on the rise lately, according to a number of recent posts by IT Professionals on Spiceworks. These kinds of targeted attacks can be extremely harmful to businesses if staff aren’t properly prepared, so in this article, we’re going to look at what Spear Phishing is, how your business can defend against it,