Tag: cybercriminals

How Ransomware Can Be Used to Commit Cyberattacks

Robert Custer, the executive director of Symantec, talked about how cyberattacks can be used as a tool for ransom payments. The article was prepared for SecurityWeek. com by John Gattig and Tim Follis. Ransomware is a malicious software that has the ability to permanently overwrite files on a user’s computer using encryption or, sometimes, a…

Read More

The Antisocial Network Review: Let Them Eat Shorts

The Antisocial Network Review: Let Them Eat Shorts The Antisocial Network Review is a weekly column from the editors of Network Security. A great many articles have been written about the “anti-social network” (or anti-social person) effect, and the importance of filtering out such users. However, one of the most important ways for organizations to…

Read More

The Security Industry Is Under Attack

The post Bizarre turn in PG cyberattack appeared first on The Security Post. The post Bizarre turn in PG cyberattack appeared first on The Security Post. The security industry is under attack. From an attack that is often called ‘cybercrime’ to an attack that is often called ‘phishing’, the industry is being targeted by hackers…

Read More

The New Surveillance Act (Specification and Confusing)

News You may have missed: the new surveillance law applies to Facebook, Twitter, Google+ and other websites. And while it might sound easy to install this software, it is not. In fact, it is not something that you can easily obtain, even from your favorite privacy advocates, and it is only available to a few…

Read More

How to Detect Child Abuse Photos With a Computer System?

How to detect child abuse photos with a computer system? This is not the first time when many new and good tools are created. Unfortunately, nowadays people are not able to find the software or the computer system for processing the data. One of many software which is made with the purpose is to detect…

Read More

Business Resilience and Business Continuity Planning – A Case Study

Business Sustainability (BS) software is one of the best tools for measuring, analyzing, and managing sustainable (sustainable growth) business performance. In general, it can be deployed on a range of platforms and is widely used to manage and improve organizational performance and growth. However, it has been a challenge to define, build, maintain, and use…

Read More

Security Information Provided by Block Security

Security Information is provided by Blocksecurity. com on behalf of its member companies. A recent ransomware attack on several websites in Poland illustrates this point. The attack targeted computers of two independent companies, the biggest of them is IT-Krakow. The other is a security firm, Wojciech Nowotny. Wojciech Nowotny has previously told us that some…

Read More

Two Examples of Attack Vectors Used by Cybercriminals to Infect Your Home Computer

If you are a threat analyst who is looking for malware samples to further develop your own cybercrime arsenal, this is an excellent opportunity. With new methods such as zero-day exploit kits, and new malware targeting major organizations like Yahoo and Netflix, cybercriminals are targeting millions of computers globally. In addition, cybercriminals have found that…

Read More

Cyber Security Alerts on Labor Day Weekends and Other upcoming Holidays

When the bad guys pay you to do their dirty work, that’s called cybercrime. And you get nailed. We do it all the time. But this isn’t your typical ransomware attack. Instead, a threat is coming from the dark side that is spreading fast and with little warning. The bad guys are calling it “ransomware”—a…

Read More

Cybersecurity Threats – How to Prevent Phishing Attacks

This is another article in the series exploring threats to corporate networks. The first part of the article looks at the risks of network intrusion and points out that phishing is the most common threat to organizations. This article focuses on the specific types of phishing attacks that organizations face (Windows, e-mail, social media, and…

Read More