ITsecurity
twitter facebook rss

NHS Trusts and the threat from ransomware

Posted by Kevin on November 19, 2016

Healthcare has become a major target for extortionists for two primary reasons: firstly, patients rather than profits are the priority with less being spent on IT and security than by outright commercial firms; and secondly, there is huge pressure to get systems back up and running when health and potentially lives are at stake. These […]

Ransomware, Support Scams, and Old-School 419s

Posted by David Harley on October 21, 2016

David Harley photo

Ransomware is the buzzword of the moment, but other scams haven’t gone away. Some are even converging with ransomware.

Ransomware at the University of Hard Knocks

Posted by David Harley on September 3, 2016

David Harley photo

I recently happened across an article by ‘next-gen’ provider SentinelOne about ransomware attacks experienced by universities in the UK: Freedom of Information requests reveal 6 out of 10 universities have been ransomware victims and almost 2/3 of targets were hit multiple times. SentinelOne drew its conclusions from responses to Freedom of Information requests for information […]

TeslaCrypt: We’re Sorry, Here’s the Decryption Key

Posted by David Harley on May 19, 2016

David Harley photo

Are the TeslaCrypt operators genuinely apologizing? Probably not, since it seems that they may well have moved on to CryptXXX rather than retiring to a monastery to flagellate themselves with birch twigs. However, after an ESET analyst, noticing that the TeslaCrypt project seemed to be shutting down, contacted them via the Tesla support/payment site and asked them […]

Ransomwhere? – detecting new ransomware

Posted by David Harley on April 21, 2016

David Harley photo

Patrick Wardle’s Ransomwhere? for OS X flags processes as dangerous if they seem to encrypt files.

Icebergs and Security Predictions

Posted by David Harley on December 22, 2015

David Harley photo

It’s traditional at this time of year for security researchers to risk their credibility by offering their predictions as to what will happen in information security in the next 12 months. Usually in multiples of ten. Or at least the unhidden one-tenth of the researcher iceberg spending enough time in the public eye to attract the attention of […]

Counting Malware & Running Out of Fingers

Posted by David Harley on December 15, 2015

David Harley photo

Is there less new malware, or are we being encouraged by marketing to mistake counting malware regardless of classification as a way of choosing a product?

Terrorist Attacks, Hoaxes and Malware

Posted by David Harley on December 4, 2015

David Harley photo

Hoaxes about terrorist attacks in the UK: just hoaxes, or delivering malware?

ITsecurity Daily News: 08/29/2014

Posted by Kevin on August 29, 2014

The ITsecurity daily security briefing: Friday, August 29, 2014. If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com. News Papers/Reports WebThings Events M&A Alerts News Someone is telling porkies Bloomberg followed up its first story on […]

ITsecurity Daily News: 08/20/2014

Posted by Kevin on August 20, 2014

The ITsecurity daily security briefing: Wednesday, August 20, 2014. If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com. News Papers/Reports WebThings Events M&A Alerts News CHS Hacked via Heartbleed Vulnerability “The initial attack vector was through […]