Archive for the
‘Uncategorized’ Category

What is Ransomware? Ransomware has been in the news a lot lately. Ransomware is malicious software that encrypts the data on a victim’s computer making them inaccessible until a ransom is paid to the attacker. The success of these attacks means we are likely going to be seeing a lot more of it.  One of […]

Meltdown and Spectre Processing chips are a fundamental part of functioning computer.  Rarely do we see flaws in such integral hardware.  Now two separate flaws have been found that appear to impact nearly all processing chips.  Nicknamed “Meltdown” and “Spectre” these are flaws that go all the way down to the architecture of the chip; […]

Second Hand, Could it be Tampered With? Beware of the deal too good to be true when it comes to internet connected devices.  For many things buying second hand is a great way to get a deal.  When it comes to your internet devices you should be a little more careful.  A compromised device will […]

A Infrastructure Attack A new Trojan virus was found. This virus targets critical infrastructure.  Exact details of the attack have not been given due to the nature of the event.  There is some information that we do know.  First the virus did cause an outage, but not in a way it was likely intended.  Second, […]

The Focus on Prevention Cyber criminals and cyber threats are always evolving.  For many businesses cyber defenses focus purely on prevention, stopping an attack from happening.  While this is good, often it is just not enough.  The reality is that in a more and more complex cyber world it can be nearly impossible to prevent […]

Malware too tough to die It’s been around for a long time, since early 2012, and it’s attacking in force once again.  Called Necurs, it is now possibly the largest active botnet.  Botnets expand to secretly takeover target devices allowing a master device to take control.  With over five million zombies (the term for infected […]

New Phishing Attempts Several new Trojan phishing attempts are making the rounds using some old and some new ideas.  Phishing attempts typically attempt to trick a victim into entering their credentials into a fictitious website that mirrors a real one in an attempt to gain personal data or access to accounts.  The new phishing attempts […]

Targeting Phone Wallets With the ever climbing value of cryptocurrency, phone wallets are gaining popularity. They offer an easy way to monitor, buy, and sell these digital currency.  Recently, the most popular, Bitcoin reached a value of over ten thousand dollars.  As a result, this makes for an enticing target.  The rise in appeal has […]

At the Junction of Poor Security and No Security Hacking and unethical cyber behavior is a rapidly expanding activity. Not only is it relatively inexpensive to conduct, but hacking can reap large financial dividends for criminals. While larger targets generate attention after attacks, smaller targets are increasingly becoming primary objectives for attackers. Some facts and […]

2
10
image
https://protocol46.com/wp-content/themes/blake/
https://protocol46.com//
#0070bc
style2
scroll
Loading posts...
/home/p46webadmin/public_html/
#
on
none
loading
#
Sort Gallery
https://protocol46.com/wp-content/themes/blake
on
yes
yes
off
Enter your email here
on
off