Ransomware, without a doubt, is dominating the cyber-threat landscape by holding critical systems and data hostage in industries ranging from health care and finance to government and energy. Ransomware is a class of malware that, when distributed to a system, renders victims' systems unusable by encrypting computers and data or by locking applications. The attacker's goal is to blackmail the victim into paying a ransom in exchange for decryption keys, allowing them to regain control of their systems and data.
Most information and reports about ransomware, however, have focused on phishing as a conduit for ransomware delivery and often overlook other distribution methods in use. Attackers are becoming craftier with their methods to spread malware that encrypts files and locks data, blindsiding victims before they even realize they have been attacked.
So while organizations and individuals are performing everyday tasks – like running their businesses in the cloud and using social media – alternative ways to receive ransomware, which don't require victims to open a phishing email, also pose a serious threat. In this slideshow, Aditya Sood, PhD., director of security and Elastica Cloud Threat Labs at Blue Coat, discusses five alternative ways that organizations can fall victim to ransomware and offers advice on how they can protect themselves.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>