Misconceptions: PC Matic’s Whitelist

Recently, an article was posted on CIO.com and other IDG outlets, titled “Yes, you still need endpoint malware protection”, questioning the need for end point security. Several publications pointed out that end point security is not needed, due to the operating systems and other components being more secure. However, as we’ve seen in the most […]

967 total views, 3 views today

Continue reading

WannaCrypt Ransomware: Protecting your computers against the latest ransomware

Over the past few days, many businesses have reported infections from the latest round of ransomware called WannaCrypt. This massive cyberattack is likely to have stemmed from stolen tools used by the National Security Agency (NSA). Due to the rate of infection, and the number of machines being infected by WannaCrypt, Microsoft has released an […]

866 total views, no views today

Continue reading

The Latest Ransomware Craze – Holding MongoDB Databases Hostage

As if our jobs as IT admins isn’t difficult enough, hackers have taken to finding misconfigured MongoDB databases, and are holding them hostage, until a ransom has been paid. Similar to traditional ransomware, where files on a computer are encrypted until a fee has been paid, databases, are being held hostage, instead. The modus operandi […]

602 total views, 2 views today

Continue reading

Blocking Ransomware Scripts with Exchange Transport Rules

One of the current tactics ransomware authors are using to infect your network, is to send email attachments containing malicious scripts. These scripts are often VBScript (.vbs), Windows Script Files (wsf), or JavaScript (.js) files, and when executed, will download a DLL or EXE to spawn the infection. An example JavaScript which downloads and executes […]

6,730 total views, 5 views today

Continue reading

ALERT: Latest Round of Phishing Campaigns Targeting Businesses

Hackers are currently targeting business of all sizes in the latest round of phishing campaigns. The way the social engineering attack works is emails are sent to employees with PDF attachments, claiming to have “secure or protected documentations”. Unlike many cases in the past, these PDFs do not have malware embedded in them. Instead, they […]

595 total views, 1 views today

Continue reading

Got Apple Quicktime installed on your computer? Uninstall it immediately, says Department of Homeland Security

A recent report from TrendMicro/ZDI stated that Apple has ceased development of Apple Quicktime, and has also revealed two critical vulnerabilities under their Zero Day Initiative. These two vulnerabilities are considered “remote code execution” vulnerabilities, which means a miscreant could get the victim to click on a link or visit a website, and can remotely […]

485 total views, 2 views today

Continue reading

Actors behind Dridex launch another spam campaign, delivering Locky Ransomware

Recent reports have indicated that the actors behind Dridex, originally a banking Trojan distributor, have switched tactics, and are now heavily pushing out a new ransomware called Locky. The current method of distribution is via a spam email, which contains a Word document. Additional reports have stated that it is being distributed via the Neutrino […]

683 total views, 3 views today

Continue reading