A new ransomware outbreak today has hit some major infrastructure in Ukraine including Kiev metro. Here are some details about this new variant of Petya.
Public sources have confirmed that computer systems in the Kiev Metro, Odessa naval port, Odessa airport, Ukrainian ministries of infrastructure and finance, and also a number of organizations in Russia are among the affected organizations.
Other cosmetic surgeries who wish to avoid hackers damage their public image would be wise to invest properly in security now, or face the consequences later.
In the first two parts of our series we have looked at the role an everyday internet user has in making the internet a safer place, and ID theft. This time around we focus on the role everyone has when it comes to cybersecurity best practices in the workplace.
With all the hype around cryptocurrencies, cybercriminals are trying to grab whatever new opportunity they can – be it hijacking users’ computing power to mine cryptocurrencies via browsers or by compromising unpatched machines, or various scam schemes utilizing phishing websites and fake apps.
The US Department of Homeland Security and FBI have warned that hackers are actively targeting government departments, and firms working in the energy, nuclear, water, aviation, and critical manufacturing sectors.
Better security of your internet router is one of the simplest ways in which you can cyber-safeguard your home, and the technology you keep there.
Our researchers noticed that the makers of the Elmedia Player software have been distributing a version of their app trojanized with the OSX/Proton malware.
When thinking about security we generally take risk into account. It is well known that risk is a composition of likelihood and potential impact.
You always build from the ground up, and every small-medium business (SMB) must build a strong foundation with their management team.
In the first part of our series we addressed issues such as the role an everyday internet user has in making the internet a safer place, and ID theft. The second part of the Twitter chat continues with the theme of Simple Steps to Online Safety.
Just as there are ways to audit, manage and protect electronic documents, there are ways to manage printed documents, too.
We've gathered our own thoughts on the topics chosen each week for this short series of blogs that will be published twice a week.
The infection mechanism works well – which is crucial for determining how big of a deal a piece of malware is.
‘KRACK’ or Key Reinstallation AttaCK, as it has been labeled, means third parties could eavesdrop on a network meaning private conversations would no longer be private.
Malware simulators are not an appropriate basis for testing product detection capabilities.
DoubleLocker can change the device’s PIN, preventing victims from accessing their devices, and also encrypts the data it finds in them - a combination that has not been seen previously in the Android ecosystem.
National Cyber Security Awareness Month and its events have become top of mind for people and businesses in recent years, given the staggering number of recent data breaches and global ransomware attacks.
The countdown is on. In just over eight months’ time, the General Data Protection Regulation (GDPR) will come into force and this will have huge implications for businesses.
A recent Ipsos survey, found that only 26 per cent of Canadian SMBs feel very confident that their business and its information is safe from cyberattacks