Malware

What is Malware Video by SANS

SANS created a video “What is Malware” that explains the various terms that are part of Malware and provides some basic tips on how to protect against malware. With the recent outbreak of the WannaCry worm and all of the breaches that seem to happen daily, it is a good idea to have an ...

New Malware That Does Not Require Clicking On A Link

Researchers are warning of several recent spam campaigns delivering PowerPoint files that when opened contain a mouseover link that installs a variant of the Zusy malware. What this means to you: Any PowerPoint files you may get are suspect. Simply hovering your mouse over the link within the document will infect your computer. ...

Ransomware Decrypt and Information

One of the most searched terms for ransomware is ransomware decrypt. There are several sites offering information on decrypting ransomware, but the one that seems to be the most supported is No More Ransom!. This site posts the latest decryption information, however, even with that, a majority of ransomware is unable to be decrypted. Paying ...

Malware and Social Engineering – An Introduction

Malware and Social Engineering are the two key tools used to compromise computers, phones, tablets and other devices. Understanding what they are and how they work will help to keep your systems safe and secure. Sans has provided an excellent article explaining, in common terms, what social engineering is and how it can be used ...

What is Malvertising and Why should I Care?

What point is there of putting four locks and a firewall on the front door and leaving the back door open? Malware is not injected into a system through the front door. Oftentimes, users are not even aware that an invasion took place, these are not like home invasions where the alarm is triggered and ...

Is Your Computer Malware Infected?

5 Signs That Your Computer Is Malware Infected It seems that every other day some major company has been hacked, leaking massive amounts of supposedly secure, sensitive data. Hackers do not only target large companies. Some hackers prefer smaller targets to gain access to your personal information. Additionally, hackers can use personal computers to reach those ...

Ready to get started?