Ransomware migrates to Apple Mac computers

March 8, 2016 | NSFOCUS

ComputerWeekly Security researchers have uncovered what is believed to be the first active malware to encrypt Apple Mac computers and demand ransom to unlock them. Our chief technology officer Vann Abernethy said, “as Apple computers and devices become more popular with corporate IT departments, there’s recognition by attackers that valuable data and resources are available […]

DDoS – Best option to get the job done!

February 26, 2016 | Adeline Zhang

Track:  Technical Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS In the world of getting from one place to another, people face a common dilemma.  What transportation will get them to their destination quickly, safely, and affordable? While nearly everyone would enjoy cruising around in a luxury car, most people are just looking for the best […]

When Malware Becomes a Service, Anyone Can Be a Hacker

February 25, 2016 | NSFOCUS

Gadgets 360 A DDoS attack, one of the most popular available attacks has been offered as a service commercially to anyone interested by hacking group. Our senior technical expert Vann Abernethy said “Distributed Denial of Service attacks have been around for a while now, and each year they grow in size, number, and sophistication. We […]

DDoS attacks: how to mitigate these persistent threats

February 25, 2016 | NSFOCUS

CSO Enterprises and end users remain at risk of a DDoS attack, which have been named the #1 Internet threat. The DDoS attack itself may be a bit more sinister, according to NSFOCUS IB. A DDoS attack is an attempt to exhaust resources so that you deny access to resources for legitimate users. In a […]

Downstream networks detect Wendy’s breach

February 25, 2016 | NSFOCUS

The Green Sheet Numerous consumers who used credit cards at Midwest and Northeast locations of The Wendy’s Co. in the latter part of 2015 were notified by their card issuing banks of a potential data security breach. Company spokesman Bob Bertini advised news media that fraudulent charges began to appear elsewhere after the cards were […]

Was Hollywood Presbyterian ransom attack preventable?

February 23, 2016 | NSFOCUS

MedCity News The hackers who brought down the computer network and connected medical devices at Hollywood Presbyterian Medical Center in Los Angeles have taken healthcare cyberattacks to the next level, according to a maker of network security technology. The hackers are demanding a ransom of 9,000 Bitcoin, equivalent to about $3.6 million, to unlock the […]

Phony CloudFlare DDoS page redirects victims to Nuclear EK

February 18, 2016 | NSFOCUS

SC Magazine CloudFlare DDoS check page as a Nuclear exploit kit (EK) gate to load a malicious redirection that ultimately triggers the EK, Malwarebytes Security Researcher Jerome Segura said in a blog post, “Upon further check, the server’s IP address is clearly visible and does not belong to CloudFlare at all. Our Principal Sales Engineer […]

Building a better defense – tech, people, process

February 17, 2016 | NSFOCUS

Track:  Technical Author: Vann Abernethy, Field CTO, NSFOCUS When thinking about how to best to protect an environment, most non-security people tend to focus on the latest whiz-bang tools and threats that get mainstream media attention.  Truly effective security, however, starts with understanding the environment that you are protecting, and wrapping policy, process, tech and finally […]

Massive Brute-Force Attack on Alibaba Affects Millions

February 10, 2016 | NSFOCUS

InfoSecurity  Up to 21 million accounts on Alibaba e-commerce site TaoBao may have been compromised thanks to a massive brute-force attack. Dave Martin, our security expert and director said that some of the accounts were compromised because of overlapping passwords but there were likely many accounts stolen due to weak passwords that were defeated using […]

Utilities Lack Visibility to Prevent All Attacks, Research Shows

February 10, 2016 | NSFOCUS

eWeek As reports of attacks against energy utilities emerge, there is some evidence that they aren’t properly secured, two separate studies show. NSFOCUS report analyzed that the malware which has been implicated in the Ukraine outage shows that the attack didn’t necessarily use an exotic zero-day vulnerability. The report concludes that a Trojan called BlackEnergy […]


Subscribe to the NSFOCUS Blog