Menu

Blogs

Showing Blog Posts: 1–10 of 48 tagged Malware

  • Getting Users Committed to Security: Simple tips to increase user interest and commitment around common threats to their system

    by Jack Danahy on January 26, 2017

    Users are vulnerable to clever malware campaigns and social engineering, making them a common first link in the attack chain. Even in major breaches and ransomware attacks affecting multiple systems or sizable organizations, the entry point is usually created by a single mistake made by some unwitting user. These mistakes are also a meaningful distraction for IT teams, as more than 50% of the…

  • Ransomware: Defending Against Digital Extortion

    by Ben Rothke on January 11, 2017

    As an early piece of malware, the 1989 Yankee Doodle virus was limited to playing the patriotic song of the same name. Much has changed over the years, and the rise of ransomware is playing out a very, and much less melodious tone. Countless individuals and businesses of all sizes are being locked out of their own data and their systems made unavailable, until a ransom is paid to the ransomware…

  • Ransomware Unbound: Critical Knowledge for a Growing Threat

    by Nathan Eddy on December 12, 2016

    Ransomware is the most pervasive form of malware out there, as attackers have shifted their focus away from more traditional attacks, and the number of new strains of ransomware continues to grow exponentially. Using ransomware, the criminal takes control of a user’s laptop and data and requires payment to get the control back, and tries to price the crime at a high enough value that it is worth…

  • Camouflaging State-Sponsored Malware Attacks

    by RSAC Contributor on November 21, 2016

    By Gunter Ollmann, CSO, Vectra Networks Most organizations continue to struggle with malware-based intrusions. Despite the deployment of policies, user education, enforcement chokepoints, data inspection, and regular assessment of defenses, malware remains the primary method of breaching the corporate network. While anti-virus vendors persist in publishing exposés on the latest and most advanced…

  • Hack-Proof Your Life Now! The New Cybersecurity Rules

    by Ben Rothke on November 2, 2016

    Far Side creator Gary Larson wrote that a high-school biology teacher once told him she showed her class a number of Far Side comics at the beginning of the school year and most of the students didn't get the humor. She said a goal of the class was that by the end of the year, they should have learned enough science to see the humor in the comics. Similarly, by the time a novice reader finishes …

  • Dark Web Globetrotters: A Look at Underground Markets Around the World

    by Jennifer Lawinski on July 25, 2016

    How do cybercriminals operate in the world’s underground markets? Each country has its own distinct markets and own flavor, according to Ryan R. Flores, senior threat research manager at Trend Micro. In his session at RSA Conference APJ 2016 in Singapore, Flores discussed the ways the world’s largest underground markets function, revealing the ways hackers make money off of the data they steal. …

  • Avoid Ransomware Attacks by Removing Attack Vectors

    by Rook Security on April 29, 2016

    To date, there are around about 54 different versions of ransomware, and each one has multiple variants. Every day there is a new ransomware victim, and unlike other malware that has come before, ransomware isn’t looking to steal your information or gain unauthorized access. It just wants your money. Should I pay? Can my files be decrypted? How did this happen? These questions get asked a lot…

  • Hacking for Dummies: Fifth Edition

    by Ben Rothke on April 26, 2016

    I’ve enjoyed Kevin Beaver’s Hacking for Dummies series for over a decade. The first edition came out in 2004 and I reviewed the four th edition here. Now in its fif th edition, the books 22 chapters progress from the basics of security to the hardening of an operating system, to the hacking of Web applications and more. The new edition covers Windows 10 and Linux, and includes a number of more…

  • Ransomware Goes Corporate in 2016

    by RSAC Contributor on March 15, 2016

    This post comes from Liviu Arsene, security analyst at Bitdefender. The ransomware threat is growing. More than 13.1 million U.S. users—4.1 percent of the total population—have encountered ransomware, and half of them paid the ransom to recover their personal data. Another 40 percent would actually consider paying, according to a recent study we commissioned. In our security predictions for 2016, …

  • Vulnerabilities for OS X and iOS Take the Spotlight in 2015

    by RSAC Contributor on December 29, 2015

    This post comes from Liviu Arsene, security analyst at Bitdefender. The common belief that Apple’s OS X and iOS are not as prone to vulnerabilities and attacks as other popular operating systems has been put to the test in 2015. As OS X and iOS adoption increases in the enterprise segment—partly due to a new generation of “millennial” managers—attackers will likely target the two platforms more. …

View All

Are you interested in contributing to the RSA Conference blog?  Download our 2017 Editorial Calendar for more info. 

This document was retrieved from http://www.rsaconference.com/blogs on Thu, 25 May 2017 23:42:59 -0400.
© 2017 EMC Corporation. All rights reserved.