In the world of security oldies-but-goodies, nothing beats phishing. It's a problem that goes back to the early days of the mass-online world.The term "phishing" dates back to 1995 in the malware "AOHell," which included "a fisher [sic] that allows a user to pose as an AOL official and ask new members for passwords or […]
“What if everyone just stopped paying ransomware?” asked almost everyone, after more than a decade of governments and information security experts began begging them to ask that question. It turns out that things go badly for ransomware gangs when this happens. The article goes into some detail about economic trends in the ransomware space, and […]
Hundreds of thousands of technologists have been laid off in the United States alone over the past year—something that’s been noticed, of course, in other countries. In most cases, the companies laying tech workers off are simultaneously posting significant or even record profits, and this has led some frustrated individuals to weaponize ransomware against their […]
When the first edition of “Ransomware: Understand. Prevent. Recover.” was released, it was groundbreaking. It quickly gained popularity, and became a go-to resource for admins, architects, C-suite executives—basically, anyone having responsibility for ransomware protection in an organization—to guide them in defeating the Bad Guys.Written by ransomware uber-expert Allan Liska and produced by ActualTech Media, the […]
If either you personally, or the organization you work for, have VMware servers, stop reading this right now and go find out if they are fully patched. If they aren’t, do whatever is required to get them fully patched right now, and do not stop to do literally anything else until they are patched. Yes, […]
Not all ransomware directly attacks corporate networks. There is still plenty of it around that goes after home users, and the effects can be just as devastating, if not more so, than ransomware that hits organizations—it’s quite possible that the ordinary family doesn’t have the financial resources to survive such an attack.One example of home-user […]