As 2018 comes to a close and we look ahead toward the new year, now is the time for reflection and planning. And for businesses of all sizes and industries, cyber security should be a major topic of discussion through this process. When it comes to information security, there isn’t a company out there that can afford not to ask the tough questions. When was the last time you … [Read more...]
Brexit Email Tricks Users Into Downloading Malware
Recently, some individuals received emails that used Brexit to trick them into opening malicious office document attachments. The document’s authors must have been watching the news carefully because the file’s name was Brexit 15.11.2018.docx and the emails came around the same time as the release of the Brexit plan. Looking at the Document, we see the author of the document is … [Read more...]
How to Defeat Malicious Everything as-a-Service
In the sharing & collaborative economy we live in, we are witnessing two major trends at play. First, an increasing number of people are getting online. Recent statistics suggest that 4 billion people around the world are now using the internet (this is half of the world’s population): https://wearesocial.com/blog/2018/01/global-digital-report-2018 Second, the … [Read more...]
Exobot Leaked – Daily Security Byte
When malware source code leaks, you can expect increases in attacks. This week, Bleeping Computer warned that the source code for a pretty capable Android banking trojan, Exobot, has leaked. At least two respected security teams have verified the malicious code. Watch today's video to learn more about this leak, and what you can do to avoid this sort of Android … [Read more...]
GandCrab is not a Ransomworm – Daily Security Byte
In May, a new ransomware variant called GandCrab started spreading. It has continued to evolve over the last few months, with attackers changing the way they deliver it and refining its encryption techniques. The latest variant, version 4.1, uses a new encryption method, changes its extension, and was rumored to use an automated SMB spreader similar to Wannacry. However, one of … [Read more...]