Ransomware is on the rise – there are now more than 50 families of this malware in circulation — and it’s evolving quickly. With each new variant comes better encryption and new features. This is not something you can ignore!
One of the reasons why it is so difficult to find a single solution is because […]
Cybercriminals use a variety of attack methods to deliver ransomware to their victims’ machines. Some of the most frequent include drive-by downloads, malicious URLs embedded in email messages that download ransomware, or attachments to email messages that infect the victims’ systems with ransomware. Often, these infections are the results of phishing attacks.
Intel Security believes that […]
Back-up! Back-up! Back-up! Have a recovery system in place so a ransomware infection can’t destroy your personal data forever. It’s best to create two back-up copies: one to be stored in the cloud (remember to use a service that makes an automatic backup of your files) and one to store physically (portable hard drive, thumb […]
Whenever a bank issues a security threat to its customers, other banks seem to suffer a drop in Internet traffic and account usage, too. This is not because people don’t trust the other banks; it’s because customers are reminded of susceptible they are to fraud. It’s our money after all; and if we don’t want […]