Strengthen protection measures for law enforcement systems with efficient security strategies tailored to address emerging threats and vulnerabilities.
https://www.faronics.com/news/blog/efficient-ways-protect-law-enforcement-systemsBlog
Enterprises in North America Lose $700 Billion in IT Related Downtime
Understand the significant financial repercussions of downtime for enterprises in North America, highlighting the need for robust IT infrastructure, disaster recovery plans, and proactive maintenance strategies to minimize losses and maintain productivity.
https://www.faronics.com/news/blog/enterprises-north-america-lose-700-billion-related-downtimeHow Utility Providers Can Ensure Consistent IT Operations
Understand the importance of choosing reliable computer management utility providers to ensure the efficiency and reliability of IT operations.
https://www.faronics.com/news/blog/importance-reliable-computer-management-utility-providersProtect Your Organization from Surveillance Malware
Anyone who’s stayed up to date on the biggest cyber attacks of 2016 thus far has undoubtedly come across the term “surveillance malware.” Depending on the context, this type of malware, like any computer resource, can be wielded for good or for evil. Law enforcement, for instance, might use it in an attempt to track the activities of cyber criminals or known terrorist threats. On the other end of the spectrum, crooks will use this tool as a means to steal information from users or infiltrate networks with the purpose of orchestrating a data breach or other variant of cyber attack.
Types of Surveillance Malware
Much as the name suggests, surveillance malware, also referred to as spyware, is intended to spy on users. There are various forms of malware that can fall under the umbrella. One of the most prolific is called key-logger malware.
A key-logger tracks every keystroke made on the infected computer. This includes any personally identifiable information such as names, addresses, Social Security numbers, contact information, bank account numbers and more. When used against an enterprise, it could result in the theft of account login and passwords, which can lead to the compromising of entire data bases of sensitive information.
Other forms of surveillance malware aren’t really malware at all, but rather Trojans that create a backdoor into the network, allowing hackers to sneak in and monitor activity on the network. Hackers may want to do this for any number of reasons. For instance, they might do it prior to attacking
https://www.faronics.com/news/blog/protect-organization-surveillance-malwareHow Cerber Ransomware is Tricking Office 365 Email Users
Earlier this year, a nasty form of malware, widely known as Cerber ransomware – most likely named after the three-headed mythical beast, Cerberus – was discovered. In March, MalwareBytes referred to the strain as “new, but mature.” Its peculiarities include the ability to continue encrypting files in offline mode, the fact that it will terminate itself if the infected computer is found to be from certain countries, the Latin quote “Quod me non necat me fortiorem facit” (That which does not kill me makes me stronger) at the bottom of the ransom note, and most jarring of all, an audio message telling victims that their files have been encrypted.
Office 365 Email Users Targeted : How Cerber Works
Millions of users use the Office 365 suite. In Late June, it was reported that Cerber had infected over 10 million Office 365 email users. According to Dark Reading’s Ericka Chickowski, Cerber has repeatedly adjusted its infection methods to maintain its viability as a ransomware strain to be wary of. The malware hides as a macro inside of a Word document that, once executed, begins to do its work. Upon trying to open an encrypted file, a victim will hear the following recording:
“Attention! Attention! Attention! Your documents, photos, databases and other important files have been encrypted!”
The hackers request a ransom of 1.4 bitcoin, which is approximately worth $500, according to SC Magazine online editor Doug Olenick. While an exact number of victims has not been identified, researchers’ estimates have been in the tens of millions. One
https://www.faronics.com/news/blog/how-cerber-ransomware-is-tricking-office-365-email-users