If it hasn’t already been dubbed “The Year of Ransomware,” 2016 is well on its way to earning that title. Even though ransomware has been around since 1989 (starting with the AIDS Trojan), we’ve seen a spike in the number of incidents over the past couple years that has left us wondering: Why ransomware? Why now?
The Backoff Trojan has some high-profile victims under its belt. Protect your customers and your business.
Every day we see links into spam emails; the email per se may be clean; it may just be spam and not necessarily malware infected but it contains a link (with the name of the link masked).
PC Today, February 2012 (page 32) The apparent purpose of the campaign was to steal proprietary information primarily from companies in the chemical and defense industries. The first casualties in the multi-wave attack were unwitting employees and associates of large companies; the weapons were primarily trickery and Trojan horses (malware that masquerades as beneficial but delivers a destructive payload). (Read more)
Malware threats and risks are an ongoing problem for both public and private entities and you need to understand what it is and how to deal with it.
PRESS RELEASE HOUSTON, TX– Network Box USA (www.networkboxusa.com), the American arm of worldwide managed security service provider Network Box Corp., announced today that the company’s M-285 unified threat management (UTM) appliance detected 100% of malware in a test conducted by Tolly Enterprises, a leading global provider of third-party validation services for vendors of IT products, components and services. Network Box had commissioned Tolly to evaluate the effectiveness of the M-285, which is aimed primarily at medium-sized organizations. Tolly used malware samples from WildList Organization International, augmented by additional samples from AV-Test, a global IT security testing and consultancy services provider; the extended WildList contained malicious files such as viruses, worms, rootkits and trojans in WIN32 program executable files. Engineers evaluated the detection rates across the HTTP, POP3 and SMTP protocols, and the M-285 was able to detect all the malware in the extended WildList across each of the protocols, which were run sequentially and tested separately.”Although there are always new viruses and worms cropping up, the successful results of the Tolly test, using the extended …
IT security trends to watch and protect yourself against