Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

How to Understand If Your VPN Service Is Secure?

The fundamental logic of the VPN technology comes down to covering one’s tracks online. Great VPN comparison websites like VPNRanks offer deep insights into popular VPN services to choose from. Essentially, VPN is a secure tunnel used to transmit encrypted data. It prevents your ISP from snooping on your...

Ransomware Chronicle

This is a comprehensive report on ransomware-related events covering a timeframe of January 2017 through June 2018. The incidents herein are visually broken down into categories, including new ransomware, updates of existing strains, decryptors released, and other noteworthy news. Security researchers and...

Evaluating the security IQ of a smart home

As the smart home technologies are booming to make people’s lives easier, it is more relevant than ever to question the security aspects of the IoT based model. The Internet of Things has been the talk of the town this decade. Networks of connected devices are driving progress that people can literally...

Top 10 Reasons Why Security Software Fails

Present-day malware is groundbreaking enough to slip under the radar of traditional defenses. Cybercriminals have plenty of time and resources to test their perpetrating code extensively. The malicious code can then potentially circumvent regular detection mechanisms and raise no red flags for days on...

Ransomware Chronicle 2016

This timeline fully reflects the state of the ransomware ecosystem over the period of May – December 2016. For your convenience, the entries are intuitively split up by the following categories: new ransomware released; existing ransomware updated; free decryptors created; and other important news on...

The New Scourge of Ransomware 6: CryptoLocker Takedown

Finally, John Bambenek and Lance James touch upon Operation Tovar that ended CryptoLocker campaign, and dwell on the lessons learned from this whole incident. John Bambenek: Operation Tovar, going on to takedown (see right-hand image). Law enforcement agencies of 13 countries and lots of individuals and...

The New Scourge of Ransomware 5: Human Intelligence Findings on CryptoLocker

The security experts keep on providing CryptoLocker facts that they were able to discover, including HUMINT details, victim communication and HDD forensics. Lance James: We’re also sending a message quickly, and we need to keep that message going. You even saw the FBI has been doing it lately, they’re...

The New Scourge of Ransomware 4: CryptoLocker Study in Contradictions

As part of their story on CryptoLocker analysis, John Bambenek and Lance James dwell on the methodology of tracking the ransomware via payments and DGA. John Bambenek: So, taking a look at CryptoLocker. A lot of this was a study in contradictions, because there were indicators that did not seem, at least on...

The New Scourge of Ransomware 3: Recovery and Defenses

The experts shift their focus over to CryptoLocker attack mitigation and touch upon the cooperation of law enforcement and security industry on this case. John Bambenek: So, a little bit of recovery and defenses (see right-hand image). A lot of this is best practice stuff. If you get your files encrypted,...

The New Scourge of Ransomware 2: The Business Model Behind CryptoLocker

As the presentation continues, the researchers share their findings on the uniqueness of CryptoLocker ransomware and the reasons it was such a viable threat. John Bambenek: In August 2013, CryptoLocker appears. I get a call from one of my clients – that’s how I first found it – from a local government...