19.8 C
Sunday, September 24, 2017
Home Tags Encrypt

Tag: encrypt

Several types of malware sold on the dark Web advertise the ability to spy on Android smartphones, encrypt files, and demand payment.
Let's Encrypt is easy to use and free -- no wonder it's the most popular Certificate Authority for securing websites. Here's how you can use it.
Most CISOs say encryption is the most effective security tool for data in the public cloud, but only one in six encrypt all data stored there.
Virtual machines and hardware features will provide secrecy.
Stay ahead of the latest ploys Promo  Ransomware has become one of the most damaging threats on the internet.
In recent years viruses have proliferated, spreading through spam emails and off-the-shelf malware kits that even criminals with minimal IT expertise can use to hijack and encrypt data, then demand a ransom to unlock it.…

Introducing WhiteBear

As a part of our Kaspersky APT Intelligence Reporting subscription, customers received an update in mid-February 2017 on some interesting APT activity that we called WhiteBear.
It is a parallel project or second stage of the Skipper Turla cluster of activity documented in another private report. Like previous Turla activity, WhiteBear leverages compromised websites and hijacked satellite connections for command and control (C2) infrastructure.
At the end of 2016, there was a major attack against San Francisco's Municipal Transportation Agency.

The attack was done using Mamba ransomware.

This month, we noted that the group behind this ransomware has resumed their attacks against corporations.
For less high-stakes uses, Send offers reasonable security and privacy assurances.
Company expels 20 advanced surveillance apps installed on ~100 devices.
Leading certificate authority Letrsquo;s Encrypt is facing criticism that its rapid growth and eagerness to encrypt internet communications is happening at a cost.

No Free Pass for ExPetr

Recently, there have been discussions around the topic that if our product is installed, ExPetr malware wonrsquo;t write the special malicious code which encrypts the MFT to MBR.
Some have even speculated that some kind of conspiracy might be ongoing.… Read Full Article
Contentious feature is added, without mandate to protect security researchers.