Posted by Kevin on November 19, 2016
Healthcare has become a major target for extortionists for two primary reasons: firstly, patients rather than profits are the priority with less being spent on IT and security than by outright commercial firms; and secondly, there is huge pressure to get systems back up and running when health and potentially lives are at stake. These […]
Posted by David Harley on October 21, 2016
Ransomware is the buzzword of the moment, but other scams haven’t gone away. Some are even converging with ransomware.
Posted by David Harley on September 3, 2016
I recently happened across an article by ‘next-gen’ provider SentinelOne about ransomware attacks experienced by universities in the UK: Freedom of Information requests reveal 6 out of 10 universities have been ransomware victims and almost 2/3 of targets were hit multiple times. SentinelOne drew its conclusions from responses to Freedom of Information requests for information […]
Posted by David Harley on May 19, 2016
Are the TeslaCrypt operators genuinely apologizing? Probably not, since it seems that they may well have moved on to CryptXXX rather than retiring to a monastery to flagellate themselves with birch twigs. However, after an ESET analyst, noticing that the TeslaCrypt project seemed to be shutting down, contacted them via the Tesla support/payment site and asked them […]
Posted by David Harley on April 21, 2016
Patrick Wardle’s Ransomwhere? for OS X flags processes as dangerous if they seem to encrypt files.
Posted by David Harley on December 22, 2015
It’s traditional at this time of year for security researchers to risk their credibility by offering their predictions as to what will happen in information security in the next 12 months. Usually in multiples of ten. Or at least the unhidden one-tenth of the researcher iceberg spending enough time in the public eye to attract the attention of […]
Posted by David Harley on December 15, 2015
Is there less new malware, or are we being encouraged by marketing to mistake counting malware regardless of classification as a way of choosing a product?
Posted by David Harley on December 4, 2015
Hoaxes about terrorist attacks in the UK: just hoaxes, or delivering malware?
Posted by Kevin on August 29, 2014
The ITsecurity daily security briefing: Friday, August 29, 2014. If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com. News Papers/Reports WebThings Events M&A Alerts News Someone is telling porkies Bloomberg followed up its first story on […]
Posted by Kevin on August 20, 2014
The ITsecurity daily security briefing: Wednesday, August 20, 2014. If you find this security briefing useful, please spread the word via social media. If you have any comments or recommendations, please email kevtownsend at gmail dot com. News Papers/Reports WebThings Events M&A Alerts News CHS Hacked via Heartbleed Vulnerability “The initial attack vector was through […]