Reactions to the KeRanger ransomware for Macs

março 8, 2016 | NSFOCUS

Help Net Security  Security researchers have discovered the first fully functional aimed at Mac users. The malware, dubbed KeRanger has been found bundled into the Mac version of the open source Transmission BitTorrent client, and made available for download on the Transmission developers’ official website. Vann Abernethy, our CTO pointed out that these types of […]

Ransomware migrates to Apple Mac computers

março 8, 2016 | NSFOCUS

ComputerWeekly Security researchers have uncovered what is believed to be the first active malware to encrypt Apple Mac computers and demand ransom to unlock them. Our chief technology officer Vann Abernethy said, “as Apple computers and devices become more popular with corporate IT departments, there’s recognition by attackers that valuable data and resources are available […]

DDoS – Best option to get the job done!

fevereiro 26, 2016 | NSFOCUS

Track:  Technical Author: Stephen Gates, Chief Research Intelligence Analyst, NSFOCUS In the world of getting from one place to another, people face a common dilemma.  What transportation will get them to their destination quickly, safely, and affordable? While nearly everyone would enjoy cruising around in a luxury car, most people are just looking for the best […]

When Malware Becomes a Service, Anyone Can Be a Hacker

fevereiro 25, 2016 | NSFOCUS

Gadgets 360 A DDoS attack, one of the most popular available attacks has been offered as a service commercially to anyone interested by hacking group. Our senior technical expert Vann Abernethy said “Distributed Denial of Service attacks have been around for a while now, and each year they grow in size, number, and sophistication. We […]

DDoS attacks: how to mitigate these persistent threats

fevereiro 25, 2016 | NSFOCUS

CSO Enterprises and end users remain at risk of a DDoS attack, which have been named the #1 Internet threat. The DDoS attack itself may be a bit more sinister, according to NSFOCUS IB. A DDoS attack is an attempt to exhaust resources so that you deny access to resources for legitimate users. In a […]

Downstream networks detect Wendy’s breach

fevereiro 25, 2016 | NSFOCUS

The Green Sheet Numerous consumers who used credit cards at Midwest and Northeast locations of The Wendy’s Co. in the latter part of 2015 were notified by their card issuing banks of a potential data security breach. Company spokesman Bob Bertini advised news media that fraudulent charges began to appear elsewhere after the cards were […]

Was Hollywood Presbyterian ransom attack preventable?

fevereiro 23, 2016 | NSFOCUS

MedCity News The hackers who brought down the computer network and connected medical devices at Hollywood Presbyterian Medical Center in Los Angeles have taken healthcare cyberattacks to the next level, according to a maker of network security technology. The hackers are demanding a ransom of 9,000 Bitcoin, equivalent to about $3.6 million, to unlock the […]

Phony CloudFlare DDoS page redirects victims to Nuclear EK

fevereiro 18, 2016 | NSFOCUS

SC Magazine CloudFlare DDoS check page as a Nuclear exploit kit (EK) gate to load a malicious redirection that ultimately triggers the EK, Malwarebytes Security Researcher Jerome Segura said in a blog post, “Upon further check, the server’s IP address is clearly visible and does not belong to CloudFlare at all. Our Principal Sales Engineer […]

Building a better defense – tech, people, process

fevereiro 17, 2016 | NSFOCUS

Track:  Technical Author: Vann Abernethy, Field CTO, NSFOCUS When thinking about how to best to protect an environment, most non-security people tend to focus on the latest whiz-bang tools and threats that get mainstream media attention.  Truly effective security, however, starts with understanding the environment that you are protecting, and wrapping policy, process, tech and finally […]

Massive Brute-Force Attack on Alibaba Affects Millions

fevereiro 10, 2016 | NSFOCUS

InfoSecurity  Up to 21 million accounts on Alibaba e-commerce site TaoBao may have been compromised thanks to a massive brute-force attack. Dave Martin, our security expert and director said that some of the accounts were compromised because of overlapping passwords but there were likely many accounts stolen due to weak passwords that were defeated using […]

Procurar