Tag: malware

How to Protect Yourself Against the Root Access MacOS High Sierra Bug

How to Protect Yourself Against the Root Access MacOS High Sierra Bug

Recently discovered MacOS High Sierra bug puts Apple laptops running the latest OS, version 10.13.1, at risk of being infiltrated without the need for a password. Apple has once again taken the spotlight. No, not...
locky ransomware

20 Million Confirmed Attacks in 24 Hours: Locky and Other Ransomware

A new variant of the aggressive “Locky” ransomware hits 20 million confirmed attacks in a single day, warns a cybersecurity firm. Ransomware actors are sometimes incredibly sophisticated, demonstrating careful planning and methodical execution. Some hacker...
Kaspersky Lab Banned in the U.S.

Russian Antivirus Software Kaspersky Lab Banned in the U.S.

Allegedly in cahoots with Russian intelligence, security firm Kaspersky Lab has been removed from approved vendors list in the U.S. The company denies accusations and says they’re politically motivated. Common security software is meant to...
cyber security threats

Latest Cyber Security Threats: Hacking Attacks on Nuclear Facilities and the CopyCat Malware

The U.S. Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) issued an urgent joint report, detailing several attempts at hacking computer networks of companies that run nuclear power stations and energy...
notpetya

Petya Ransomware Attack Linked to WannaCry and NSA Security

Edgy Labs covers the Petya ransomware attack as well as its connections to the WannaCry attack and leaked NSA malware. In light of the most recent cyber attack, if your company isn't taking cybersecurity seriously it should. And,...
network traffic

How Network Traffic can Alert you to Malware and Cyber Attacks

The findings of a five-year study suggest that analysis of network traffic enables the detection of malware several weeks or even months earlier than what is possible now. Most cyber attacks are carried out via...
ransomware

New Ransomware ‘Ransoc’ Extorts Using Social Media

 An episode of the show Black Mirror gives us a glimpse of what a con-artist can achieve with the right information, but how much of that is a true reflection of reality? The answer may...
web anonymity

Why Using a VPN may Become Reasonable Suspicion Thursday

Beginning on Thursday, December 1st, the power granted to U.S. law enforcement agencies to access the computers and phones of its citizens will be expanded. The new powers allow authorities to more easily gain...