Ransomware

Ransomware | News, how-tos, features, reviews, and videos

ransomware wannacry
binary code, magnifying lens, skull and crossbones

ransomware

11 ransomware trends for 2018

Ransomware creators are getting more sophisticated in how they infect systems, avoid detection, and foil decryption efforts.

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one computer or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

salted hash thumbnail final
video

Ransomware: Do you pay the ransom? | Salted Hash Ep 19

Robert Gibbons, CTO at Datto, joins host Steve Ragan to talk about why companies pay out ransoms, the role of incident response plans and continuity strategies, and how companies weigh the risks.

Salted Hash, Steve and Michael
video

What keeps IT administrators up at night? Ransomware, for one | Salted Hash Ep 8

A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.

salted hash title card 0 00 12 20
video

Ransomware marketplaces and the future of malware | Salted Hash Ep 6

Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.

ransomware

What is ransomware? How it works and how to remove it

Ransomware is a form of malicious software (or malware) that, once it's taken over your computer, threatens you with harm, usually by denying you access to your data. The attacker demands a ransom from the victim, promising — not...

Locky Ransomware infects a Windows 10 computer

Inside the thriving ransomware market

Researchers at Carbon Black examined the Ransomware market and discovered some interesting facts about the booming criminal economy. Mirroring some of the legal technology markets, such as those for software development, the market...

petya ransomware logo

Petya ransomware and NotPetya malware: What you need to know now

NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.

pt 4 image 2
video

Ransomware: What you need to know now | Salted Hash Ep 1, Pt 4

Reporters Fahmida Rashid and Steve Ragan talk about the latest ransomware threats, the holes in IT security and the burdens on enterprises.

sequence 01.00 00 56 43.still001
video

Kaspersky Lab, U.S. Cyber Command, Hollywood hacking and ransomware | Salted Hash Ep 1

Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.

pt 3 image
video

Hollywood's hacking woes | Salted Hash Ep 1, Pt 3

Reporters Fahmida Rashid and Steve Ragan talk about hacks of Sony and more recently, HBO, and what lessons enterprises can learn from the entertainment industry's mistakes.

pt 1 image 3
video

Kaspersky Lab and the Russia connection | Salted Hash Ep 1, Pt 1

Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?

threat ransomware response

The 5 biggest ransomware attacks of the last 5 years

Ransomware isn't new, but the last few years have seen a remarkable uptick in this particularly nasty genre of attack software. The attacks highlighted here show how it has grown from a curiosity and an annoyance to a major crisis.

ransomware at your service 4

How does ransomware work? Understanding the economics

Operating a piece of ransomware is really just a business. An illegal business, but a business none the less. And criminals employ standard business practices to maximize profits. Here's how they ply their tricks of the trade.

00 title awareness training

4 tips to make use of Wannacry in awareness programs

When security events make news, you can take advantage of the wake-up call — if you know what to do.

threat ransomware response

The fault for ransomware attacks lies with the challenges security teams face

The realities of managing and protecting IT infrastructures puts IT and security personnel in a no-win situation when attacks like WannaCry or ExPetr occur, so stop blaming them.

phishing threat

Be wary of fake WannaCry fixes

When the WannaCry malware hit, many users were scrambling for fixes -- but some of the proffered solutions were actually just more malware, in disguise

Load More