RansomwareSponsored by Webroot

70

Solutions

192

Contributors

Ransomware is malicious software, designed to block data access in order to extort money. As a form of malware, ransomware is most often used to infiltrate devices through infected emails or links that, in turn, recognize and take advantage of vulnerabilities in the operating system and installed third-party software.

Share tech news, updates, or what's on your mind.

Sign up to Post

Topic Sponsored by Webroot
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard yourself from future ransomware attacks.
2
Free Tool: IP Lookup
LVL 9
Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Part One of the two-part Q&A series with MalwareTech.
6
Let's recap what we learned from yesterday's Skyport Systems webinar.
1
Curious about the latest ransomware attack? Check out our timeline of events surrounding the spread of this new virus along with tips on how to mitigate the damage.
6
 
LVL 7

Expert Comment

by:Nicholas
Comment Utility
1
In this blog we highlight approaches to managed security as a service. We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
0
Patch Pic
This article provides a convenient collection of links to Microsoft provided Security Patches for operating systems that have reached their End of Life support cycle. Included operating systems covered by this article are Windows XP, Windows Server 2003 and 2008 - Both 32 and 64 Bit installs.
0
Internet of Ransomware Things ...
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others. This conference is aimed mainly at government agencies. So it addresses the various compliance issues with which they have to deal.
2
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to thoroughly revise their security concepts.
9
 
LVL 55

Author Comment

by:McKnife
Comment Utility
Andrew, thanks for the feedback. I am aware that this article is mainly raising question while not answering many.
Maybe it's rather a starting point for discussions than sharing solutions.

You ask "So what's the solution? Shutting it all down..." which is the same that I ask in the article and I answer with "no" immediately afterwards.
You write "it's not quite fair to point blame on IT administrator's shoulders ...These guys more often than not work with tied hands" - that's exactly what I am saying. If the admin is not comfortable making his concerns heard, then he is not employed at the right place and should not fear to be replaced but leave on his own.

Before you start discussing - let's wait for other comments.
0
 
LVL 55

Author Comment

by:McKnife
Comment Utility
Some news that might be of interest for Americans: https://www.upguard.com/breaches/the-rnc-files
In short: US politicians payed for analysing voter opinions on US election-critical topics. Voter data (1,1 TB!) of 198 million Americans was uploaded to an amazon server but the access rights were incorrectly set - it was open to the public and the data was not encrypted. It leaked.
See what I am talking about?
0
Here's a look at newsworthy articles and community happenings during the last month.
3
Email attacks are the most common methods for initiating ransomware and phishing scams. Attackers want you to open an infected attachment or click a malicious link, and unwittingly download malware to your machine. Here are 7 ways you can stay safe.
1
Get MongoDB database support online, now!
LVL 2
Get MongoDB database support online, now!

At Percona’s web store you can order your MongoDB database support needs in minutes. No hassles, no fuss, just pick and click. Pay online with a credit card. Handle your MongoDB database support now!

Ready for our next Course of the Month? Here's what's on tap for June.
3
Your data is at risk. Probably more today that at any other time in history. There are simply more people with more access to the Web with bad intentions.
1
 
LVL 1

Expert Comment

by:Mihai Corbuleac
Comment Utility
Absolutely true! Backup is mandatory these days. I would recommend multiple backups (different hosts). The most common threat these days is indeed Ransomware and that's because it is very different from other types of viruses. Learn more about it and what you need to do to keep your data safe. Remember to always keep everything patched and updated!
0
When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and protection.
1
Update Pic
I was prompted to write this article after the recent World-Wide Ransomware outbreak. For years now, System Administrators around the world have used the excuse of "Waiting a Bit" before applying Security Patch Updates. This type of reasoning to me is flawed and borders on irresponsible behavior!
9
 
LVL 2

Expert Comment

by:SpiderlinK
Comment Utility
Sometimes we will get "The update is not applicable to your computer" when updating the patches as well; so Wait a bit :)
0
 
LVL 11

Author Comment

by:Andrew Leniart
Comment Utility
Hi SpiderlinK, thank you for your comment.  I've found that failure to often be a result of being behind in issued Service Packs. A patch will often fail on a Service Pack 1 or 2 installation if a SP3 has been released.

Best..
0
No single Antivirus application (despite claims by manufacturers) will catch or protect you from all Virus / Malware or Spyware threats. That doesn't stop you from further protecting yourself however - and this article is to show you how.
1
 
LVL 29

Expert Comment

by:Thomas Zucker-Scharff
Comment Utility
Andy,

I'm impressed with this article.  I like the way you tested it out. Extremely well thought out.  Some things you may woah to address:

1. Don't repeat the summary.  Summary was good, but repeating it (or copying the first paragraph) is not a great practice.
2. Remove the word "not" from the summary.
1
 
LVL 11

Author Comment

by:Andrew Leniart
Comment Utility
Thanks for your comment and suggestions Thomas. Have taken them on board and removed the word "not" from the Summary as suggested.

Best...
0
Ransomware is a malware that is again in the list of security concerns. Not only for companies, but also for Government security and even at personal use. IT departments should be aware and have the right knowledge to how to fight it.
1
How to Avoid Ransomware Like the Plague it is
Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
2
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
5
 
LVL 29

Author Comment

by:Thomas Zucker-Scharff
Comment Utility
@McKnife - Thanks I'll include it.  Is it okay if I give attribution to you?
0
Acronis ransomware attack
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
1
 
LVL 64

Expert Comment

by:btan
Comment Utility
1
Do you have a plan for Continuity?
LVL 2
Do you have a plan for Continuity?

It's inevitable. People leave organizations creating a gap in your service. That's where Percona comes in.

See how Pepper.com relies on Percona to:
-Manage their database
-Guarantee data safety and protection
-Provide database expertise that is available for any situation

Acronis laptop
Employees depend heavily on their PCs, and new threats like ransomware make it even more critical to protect their important data.
2
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
0
Acronis ransomware
A new Acronis survey shows people often have conflicting thoughts about data protection.
1
Life Of Pix
The new Gmail Phishing Scam going around is surprising even the savviest of users with its sophisticated techniques. This attack comes as a nightmare trifecta for email filtering services; sent from a familiar contact, using authentic tone and verbiage, and appearing to open to a valid Google URL. I
0
Acronis Ransomware Trends
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
2
CC0 License
Choosing an appropriate provider for your company’s email security can be difficult as email security is a key element in the overall security of a business. A company’s email is an open door for malicious hackers who can potentially drive your business into the ground with one rogue email. There are a few options with regards to a solution but it all depends on picking the right fit for your business. This blog post is dedicated to the options businesses face when choosing their email security.


Appliance or Software Solutions - On Premise


Generally, the most popular choice for a company are appliance or software solutions. These appliances are great for focusing on certain aspects of email security such as data privacy and spam and virus protection. This option is also easy to install and not very expensive. However, these software solutions require a lot of  "hands on" updates which do not come with the benefits of realtime threat intelligence or the big data analysis that can be performed across the entire network of a cloud provider and can be quite slow to update. These appliances operate by themselves and require occasional attention from the beholder of the software.


Hosted Email Security - the OEM way


Another option businesses have are hosted email security services where the provider is simply hosting an appliance or application to take some management out of the customer’s hands. This option would be considered appealing as the customer …
0

RansomwareSponsored by Webroot

70

Solutions

192

Contributors

Ransomware is malicious software, designed to block data access in order to extort money. As a form of malware, ransomware is most often used to infiltrate devices through infected emails or links that, in turn, recognize and take advantage of vulnerabilities in the operating system and installed third-party software.