Ransomware, the cybercrime that involves encrypting the victim’s files for ransom, is on the rise in 2017. This article reviews notable ransomware statistics for 2017 as well as effective ransomware defenses.
Email is one of the most essential and widely used communication tools in business.
In mid-April hacker group, The Shadow Brokers released a package of confidential NSA documents including computer codes for exploits, implants, and other hacking tools. Through reverse engineering and tutorials available on the dark web, cybercriminals have infiltrated hundreds of thousands of computers running Windows with this NSA malware. The use of this cyber weapon proves [...]
Locky ransomware was one of the most popular malware programs throughout 2016. 7 out of 10 malicious emails delivered Locky in Q2 of 2016, and by the end of Q4 97% of all phishing emails were distributing Locky. Strangely, however, the spread of Locky took a dramatic downturn in early 2017 and there hadn’t been [...]
Cyber-attacks are a constant threat. They are continuously evolving, increasing in number, and becoming more dangerous. Ransomware is no exception to this trend. In 2016, ransomware became the most common form of malware in the US, with a shocking 600% growth in new ransomware families in just 12 months. As ransomware continues to evolve, its [...]
We seem to write about a new phishing or spear phishing scam every day. This latest LinkedIn scam has all of the classic signs of phishing. It comes from a suspicious sender, has bad grammar, and even uses an urgent call to action to scare victims into clicking the link. A link that appears to [...]
Email protection is more important than ever as new scams seem to pop up every day. Between the business email compromise (BEC), fake Dropbox login pages, and QR code scams, phishing attacks are occurring all the time. And they are becoming increasingly damaging. Although these scams all seem to be fundamentally different, they all have [...]
An anti-spam solution is a filtering engine which detects all unsolicited e-mails. The entity hosting the anti-spam solution then decides to perform operations with such e-mails.