News
Quick Hits
Quick Hits
News
News
Quick Hits
News
News
Quick Hits
News
News
Quick Hits
Quick Hits
Commentary
Commentary
Commentary
Quick Hits
Commentary
Quick Hits
Talos, the intelligence wing of Cisco, has had a decryption tool for this for a couple of months now. Please see the link to their blog. (url got blocked) just search teslacrypt and talos. damn I hate this site. I'm...
In reply to: WTF
As for me, I used Windows 7 system for two years, I found it works fins and steadily, but I made one mistake about the admin password, I changed the admin password to a little complex, later, I can't remember what it is,...
In reply to: Re: How to fully protect XP even when it expires in 2014
That's the whole problem: How do you find the criminals? Almost every time a politician weighs in on how we need to adopt a "tougher stance" on cyber criminals, they make it sound like a decision. It's not as if cyber criminals...
In reply to: Re: Not quite as extreme, but...
While I don't think you can really put people who encrypt files in the same category as murderers, ransomware is a troubling growth industry for hackers. Perhaps sanctions should be considered against countries that house...
In reply to: Not quite as extreme, but...
I enjoyed reading the article you've written about "Surviving Infosec." It did remind me of some of my past life as a CISO. Overall, I agree with your advice but I'd also like to offer a caveat. Essentially...
In reply to: Useful Advice...But with a caveat
Apart from all the other Ransomware Protection best practice 101 guides..... First of all just because you are encrypting your backups doesn't mean a ransomware cannot re-encrypt it. We've had a few cases where...
In reply to: New Strain are Smarter than just targeted common file extensions! Your backup needs to be secured!
Yeah, a big attack, exspecially if it manages to catch the notce of the mainstream press, would be a terrible thing, both for players as well as publishers. Thanks for calling out the additional vectors you've noticed; we've...
In reply to: Re: Beyond gold farming
Spoofing OWA isn't even needed. SSL Injection with SSL Strip/Dump work just fine.
In reply to: Re: pwn storm
they certainly like spoofing those outlook web access servers, huh?
In reply to: pwn storm
If no remote access whilst in motion, this would require a physical solution. Some sort of inertial switch that has no electronic intercept. Otherwise it can be bypassed when the car is not in motion (which is...
In reply to: Re: No remote access while in motion?
8 Key Building Blocks for Enterprise Network DefenseNetworks are changing rapidly -- and so are strategies for protecting them. This Tech Digest looks at the fundamentals for the next-gen environment.