Data Unit Blog

What Makes Ransomware So Special?


Malware has come a long way since the days of floppy disks and command prompt. What was once largely designed for purposes of sabotage has evolved into the centerpiece of a very real black market operation.

Ransomware isn’t exactly new (its origins date back as early as 1989), but it has become increasingly popular as hackers seek to monetize their hobbies. Businesses are particularly hard hit; their data is much more difficult to write off compared to the end user.

Yet is ransomware so different than any other type of virus or malware? What is it that makes ransomware so special and how will we react to its growth? These are all questions we need to ask as we edge closer to the third decade of the 21st century.

Topics: Security ransomware

Welcome to the Ultimate Guide to Ransomware Protection

Regardless of their size, every enterprise is looking for effective means of ransomware protection. Ransomware has cost its victims hundreds of millions of euros and can strike at virtually any time. While some progress has been made, no single solution can ensure complete ransomware protection.

Only true “defense in depth” can defend a network from ransomware and other threats. Unfortunately, budget and time constraints often force enterprises to focus on just one or two security tools. To truly safeguard sensitive data, a robust strategy is essential – as many companies have learned too late.

Topics: Security ransomware

How IoT is turning into every Security Executive Officer's worst nightmare

The last few years Internet of Things is gaining more and more momentum. True, there are definitely benefits in getting everything connected, but in the haste of getting products to market, security is something that is almost always neglected.

Topics: Security IoT

Misconceptions about Agile Data Centers

Agility & the #AgileDataCenter is something that is much talked about but where there are also a lot of misconceptions about what Agility really means.

Topics: Data Center Agile

7 Reasons Why Barracuda NextGen Firewall Is Right for Your Cloud Security


If you're an IT professional for a company that's starting to migrate to the cloud, or you already have significant resources dedicated to platforms like Amazon Web services or Microsoft Azure, you're aware how important security and reliability is to your organization. Unfortunately, traditional firewall tools on your local network can't protect applications or data your company has on the cloud, so finding a security solution that's adapted to the new way you're doing business is essential. That's why the Barracuda NextGen Firewall version 7.0 might be the right product to meet those needs.

Topics: Security Product news and updates Cloud

Why Eric never uses free WiFi on vacation

Thinking about a vacation? Planning to use WiFi on vacation?

Before you pack, learn a lesson from Eric. Eric never uses WiFi on vacation.

But why?

Vacation is your time for relaxation, but your mobile devices will probably end up doing double duty. People love using their mobile devices to take pictures, shoot videos, and organize their itinerary – and Eric is no exception. After many years charging an arm and a leg for high-speed wireless Internet, more and more hotels are offering their guests free WiFi on vacation.

Hyatt Hotels have been doing it since 2015.

It’s an exciting time to be on holiday, right? Well, not so fast ...

Topics: Connectivity Security Mobility

The 7 ways how Ransomware is delivered to you

Ransomware has quickly become one of the most serious IT security concerns of 2016. After netting hundreds of millions in untraceable ransom payments in 2015, this form of malware has grown at an unprecedented rate in 2016. Trend Micro, one of the leading names in IT security, recently issued a press release claiming it blocked over 100 million ransomware threats in the course of six months. A ransomware attack could soon be the most common form of “hack.”

A press release indicates that 99% of all blocked ransomware came from web or email traffic. However, it’s important to realize that a ransomware attack can come in many different forms. “Uncommon” threat vectors can be the most dangerous of all, especially during sophisticated “Day Zero” attacks that prey on uninformed and unsuspecting end users of the targeted network.

Topics: Security ransomware

"Zero Days" Is "War Games" Come To Life, And It's Scary


The documentary Zero Days mines the emergence and significance of the Stuxnet virus and dawn of modern cyber warfare.

 

Topics: Security

Unprecedented Office 365 Ransomware Attack Strikes Millions


Microsoft Office productivity tools have long been established as the gold standard for business around the world. They hold a significant presence in the market, with an estimated 80 million users using Office 365, the cloud subscription service providing Office applications.

The sudden emergence of Office 365 ransomware puts those users – and their enterprises – at risk. On June 22 at 6:44 a.m., IT security blogger Steven Toole reported the first attack, which was detected by cloud security firm Avanan.

The attack continued for a week, with Microsoft moving to block the malicious attachment on June 23. At least 57% of all Office 365 customers were hit with at least one phishing attempt.

Topics: Security ransomware

Zap Zcryptor: Ways to Fight Back


Viruses. Adware. Spyware. Trojan horses. Botnets. Browser hijacking software. Known as malware, all hit today's computers and other devices with a vengeance to cause the maximum damage possible.

Call them what you will, but they all serve a malicious purpose:

  1. They install themselves on computers without approval.
  2. They damage computers in other to steal data, personal or confidential information, passwords, files and Internet traffic. They even go so far as to cause a computer to stop working.
  3. They require IT staff to spend valuable time — time they can't afford to give up — to remove the villain and then fix the damage it's caused.

Plus, they bring in significant profits to their creators. For example, a 2015 Angler exploit kit made an average of $5 million every month they struck.

However, another type of malware is rapidly evolving — and fast. Analysts and researchers are now pinpointing ransomware as the next major threat, and it's going to hit with even more power and efficiency of its cousins.

Topics: Security ransomware