Often in the ransomware world, the oldest, most common methods of hacking an organization remain the most effective. That includes social engineering, which, although some feel is less effective now that there’s much more widespread knowledge about it, remains a key way to infiltrate a target. Social engineering involves convincing people into giving up valuable […]
There is no doubt that the reset option for computing devices has changed has proved a game changer. It’s the chance to start over once again with a clean slate. For enterprises that manage their Windows devices using Microsoft Endpoint Manager (MEM), you can simply reset the device and let MEM reinstall the applications automatically […]
It’s no secret that the sums demanded by ransomware extortionists have become more outrageous over the last three years. Ransomware started out as a crime against home users, with ransoms in the tens to hundreds of dollars at most. Then criminals discovered small- and medium-sized businesses, and ransoms shot up into the hundreds of thousands. […]
There’s a perceived notion that Linux is more secure than Windows when it comes to ransomware and other types of malware. But “safer by default” doesn’t mean safe out of the box. You still must harden the Linux surface and take the proper security measures, much like you do Windows. In fact, whether it’s a […]
Though Windows has by far been the most popular target, ransomware is steadily on the rise while spreading to additional platforms. Likelihood of Attack by OS A recent Statista study shows that while 91% of attacks still target Windows, 7% now target Apple’s MacOS X. Mobile devices are no longer safe either, with 7% targeting […]
For several years, defenders and law enforcement have gone to great pains to warn people that ransomware is a global problem. While the organizers of many of the largest cybercriminal ransomware groups are located in Russia, the affiliates of these ransomware groups—the ones who carry out most of the attacks—live in countries around the world. […]