Ransomware infections impact individual users and businesses, regardless of size or industry, by causing service disruptions, financial loss and, in some cases, permanent loss of valuable data. In 2016, the number of ransomware attacks increased 300 percent from 2015, with over 4,000 attacks detected per day, according to US government statistics. WannaCryptor (WannaCry), the most recent version of ransomware, has targeted businesses in more than 70 countries around the world, with more than 250,000 infected terminals so far.
All about Virtualization and Cloud Security | Recent Articles:
Update 5/13/3017: Yesterday evening the WannaCryptor (WannaCry) ransomware family infected thousands of computers across the world. In just 24 hours, the number of infections has spiked to 185,000 machines in more than 100 countries. Analysis of the Bitcoin wallets hardcoded into the samples show that the group behind WannaCryptor managed to extort roughly $US 25,000 worth of Bitcoin.
A new family of ransomware called WannaCryptor has started targeting businesses in more than 70 countries around the world. Hospitals, telelcom companies or gas and utilities plants are just some of the verticals that suffered massive disruptions caused by data being held at ransom.
For any businesses that handle data for customers in Europe, taking the General Data Protection Regulation (GDPR) lightly would be a big mistake.
Bitdefender will be attending Citrix Synergy 2017 in Orlando, Florida, at the Orange County Convention Center between May 23–25 where we’ll be showcasing a new and revolutionary data center security solution designed to help businesses prevent advanced attacks.
Intel is expected to soon issue patches that purport to fix an escalation of privilege vulnerability in the Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), as well as the Intel Small Business Technology firmware versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 that can allow a remote attacker to gain control of the admin manageability features in these chips.
Total loss caused by email ‘impersonation’ scams (business email compromise and email account compromise), a sophisticated scam targeting small and medium businesses working with foreign suppliers and businesses that regularly pay by wire transfer or individuals that perform wire transfer payments, have reached the $5 billion threshold between from October 2013 to December 2016, according to recent statistics provided by FBI.
The term “traditional security” has gone through much transformation within the past couple of years, with next-gen security solutions arguing that security vendors with decades of experience have been doing security wrong. With machine learning heralded as the future of security, many businesses are left perplexed by a marketing conflict that solves none of their problems.
While the rate of growth of ransomware may have cooled a bit, such attacks are still growing at a hot pace. According to the annual Verizon Data Breach Investigations Report (DBIR), released late last week, ransomware was involved in 71 percent of all malware related cases tracked.
We’ve been writing a lot about the software-defined data center and hyperconverged infrastructure and how the benefits of increased agility, greater system utilization, and lower total cost of ownership are well known.
Advanced persistent threats (APTs) have once again made it into the spotlight with the latest cyberattacks associated with APT28, also known as Fancy Bear or Sofacy. The Kremlin-sponsored hacking group behind the Democratic Party breach scandal, the attacks against NATO or those on French TV network TV5 is now shifting attention towards Europe. Earlier this week the campaign of Emmanuel Macron, favorite to become France's next president, was allegedly targeted by the same cyber espionage group.
Few industries impact as many people and businesses around the world as the power and utilities sector. Virtually everyone relies on electricity on a daily basis, and to go without power can be a major hardship. Just ask anyone who has experienced an outage. From a business standpoint, a loss of power even for a few hours can deal a significant blow to operations.
Cryptographic keys and digital certificates used to uniquely identify machines or applications are vital to businesses that want to guarantee the integrity of in-transit data. However, even businesses with mature DevOps practices sometimes fail to follow practices designed to secure the use and storage of cryptographic keys and digital certificates.