Readers like you help support my blog. When you make a purchase using links on our site, we may earn an affiliate commission! Thank you!

Saturday, April 25, 2015

Ransomware: Should you pay the cybercriminals?

Ransomware: Should you pay the cybercriminals? 



Ransomware is a type of malware, or malicious software, which has exploded in notoriety in recent years.
The malware is often installed on your machine
via a phishing email or a drive-by-download on a compromised website,
and a short time later a pop-up message will appear on screen telling
the user to pay a ransom (in some cases as much as $300) in order to ‘unlock’ their stolen documents.

EasySync Solutions

EasySync Solutions 

Only EasySync Solutions Directly Combats Ransomware Criminals are taking notice at the amount of money to be made by Ransomware, so whether you have been infected before or have never been infected, now is the time to get proper protection. The simple fact is, most of the time a Anti-Virus, Firewall, or even group policies is not enough to stop Ransomware like CryptoWall, TorrentLocker, and CryptoLocker. Without the proper software you may come home to find that all of your personal files have been encrypted and are being held hostage until a payment is made. Sometimes Ransomware can even delete your files if you do not pay, or may corrupt them making payment useless. With EasySync Solutions you will find software that will help you stay protected from every type of Ransomware. You will always have a plan A, B, and C if you do get infected. From prevention measures to recovery measures, you can be sure that if you are running our software and you find yourself being attacked by Ransomware, you will always have options.

Middle East Malware: Cyber Attack 8 (SEA)

Middle East Malware: Cyber Attack 8 (SEA): This is an interesting attack of the infamous Syrian Electronic Army ( SEA ). What is special about it is that it comes as a Windows link ...

Wednesday, April 15, 2015

MiddleEastMalware: CyberAttack 1

MiddleEastMalware: CyberAttack 1: Attack vector: Victims receive it as malicious links in emails. The email above translates as " A new leak for the Egyptian pres...

MiddleEastMalware: Cyber Attack 4

MiddleEastMalware: Cyber Attack 4: The attack of this post is from the same attack group as in Cyber Attack 1 and Cyber Attack 2 . The attack vector is a malicious emai...

Monday, April 13, 2015

Blaze's Security Blog: Remediate VBS malware

Blaze's Security Blog: Remediate VBS malware: I have developed a small tool that will aid you to remove VBS malware from a machine or in a network. I made this some months ago when I sa...

Tuesday, April 7, 2015

Windows Incident Response: Windows Event Logs

Windows Incident Response: Windows Event Logs: Dan recently tweeted: Most complete forensics-focused Event Log write-ups? # DFIR I have no idea what that means.  I'm going to assu...

Monday, April 6, 2015

Thursday, April 2, 2015

A Few Thoughts on Cryptographic Engineering: Truecrypt report

A Few Thoughts on Cryptographic Engineering: Truecrypt report: A few weeks back I wrote an update on the Truecrypt audit  promising that we'd have some concrete results to show you soon. Thanks to so...

Wednesday, April 1, 2015

Dynamoo's Blog: Malware spam: "Australian Taxation Office - Refund...

Dynamoo's Blog: Malware spam: "Australian Taxation Office - Refund...: This fake tax notification spam leads to malware hosted on Cubby. From :    Australian Taxation Office [noreply@ato.gov.au] Date :    ...

Monday, March 30, 2015

Dynamoo's Blog: Malware spam: "Invoice ID:12ab34" / "123"

Dynamoo's Blog: Malware spam: "Invoice ID:12ab34" / "123": This terse spam has a malicious attachment: From:    Gerry Carpenter Date:    25 March 2015 at 12:58 Subject:    Invoice ID:34bf33 1...

Saturday, March 21, 2015

Scrutiny from an Inquisitive mind: Defeating EMET 5.2

Scrutiny from an Inquisitive mind: Defeating EMET 5.2: Since my last post, i thought if Malware Bytes Anti Exploit can be bypassed in a targetted attack why not work on bypassing EMET using rop ...

Friday, March 20, 2015