What are the main types of backup operations and how can you avoid the sinking feeling that comes with the realization that you may not get your data back?
Search results for: "wannacry"
An analysis finds that '123456' is by far the most-commonly re-occurring password on breached accounts
Did malware disrupt newspaper deliveries in major US cities? Here’s what’s known about the incident so far and the leading suspect: Ryuk ransomware. Plus, advice on defending your organization against such attacks.
A recent survey carried out by ESET has revealed that Americans are worried most about cyberattacks on the financial sector, listing it above attacks against hospitals, voting systems, or energy supply companies
Celebrated annually on November 3, Antimalware Day is an opportunity to recognize the work of cybersecurity professionals
ESET experts have created a new decryption tool that can be used by Syrian victims of the GandCrab ransomware. It is based on a set of keys recently released by the malware operators
Our lineup may seem heavy on the defensive side, but such is the nature of game plans for warding off a range of threats lurking in cyberspace
ESET's Senior Security Researcher Stephen Cobb reflects on RSA 2018 and the state of the cybersecurity industry
ESET's Global Security Evangelist Tony Anscombe expands on his theory
Simply throwing more staff at the patching problem won’t cut it, a study suggests.
An unusual ransomware request has been uncovered by researchers.
WeLiveSecurity sat down with Tony Anscombe, Global Security Evangelist and Industry Ambassador for ESET, to talk about RSA 2018, his talk at the conference, and what to expect.
The Lazarus Group gained notoriety especially after cyber-sabotage against Sony Pictures Entertainment in 2014. Fast forward to late 2017 and the group continues to deploy its malicious tools, including disk-wiping malware known as KillDisk, to attack a number of targets.
WeLiveSecurity sat down with David Harley to get a better understanding of Critical Infrastructure and the role he has played in the area throughout his career.
Tracing the evolution and subsequent revolution of ransomware
This document, which is described by its authors as a “real white paper on cyber-defense”, is divided into three parts, followed by approximately 20 priority recommendations summarizing the central elements of the document.
Ransomware in 2017 saw users and businesses across the globe trying to cope with campaigns such as Petya and WannaCryptor. Not to be outdone, Android ransomware had a year full of innovative infiltration and rougher extortion as highlighted by the latest ESET research whitepaper.
These developments show that security technology is now keeping up, or outpacing other technological and regulatory developments. Thus, while users’ wants often continue to trump their appreciation of risk, the industry has responded and in many cases gotten ahead of popular demand.
The latest survey marks a shift from optimism regarding technological risks in the previous years. The heightened levels of worry come on the back of an escalation in cybersecurity threats, which, as noted by the WEF, are growing in prevalence and in disruptive potential alike.
The first few days of 2018 have been filled with anxious discussions concerning a widespread and wide-ranging vulnerability in the architecture of processors based on Intel's Core architecture used in PCs for many years, and also affecting ARM processors commonly used in tablets and smartphones.