Data Unit Blog

Aubrey Beelen

Aubrey Beelen

Aubrey is a Security Technical expert at Data Unit since 2013. He brings a unique and diverse background, having viewed enterprise security and server environments in a variety of perspectives.

Recent Posts by Aubrey Beelen:

Zap Zcryptor: Ways to Fight Back

Viruses. Adware. Spyware. Trojan horses. Botnets. Browser hijacking software. Known as malware, all hit today's computers and other devices with a vengeance to cause the maximum damage possible.

Call them what you will, but they all serve a malicious purpose:

  1. They install themselves on computers without approval.
  2. They damage computers in other to steal data, personal or confidential information, passwords, files and Internet traffic. They even go so far as to cause a computer to stop working.
  3. They require IT staff to spend valuable time — time they can't afford to give up — to remove the villain and then fix the damage it's caused.

Plus, they bring in significant profits to their creators. For example, a 2015 Angler exploit kit made an average of $5 million every month they struck.

However, another type of malware is rapidly evolving — and fast. Analysts and researchers are now pinpointing ransomware as the next major threat, and it's going to hit with even more power and efficiency of its cousins.

Topics: Security ransomware

The relationship between TOR and ransomware

During your travels around the World Wide Web (or if you’re a House of Cards fan), you may have heard the TOR (The Onion Router) network of servers mentioned. This network was initially developed by the U.S. Navy as a way to anonymously browse the Internet. When used in that manner, the TOR network is a great concept and a lifeline for some users. However, for others, TOR is an enigmatic network with suspected links to hackers and other illegal activities.

Topics: Security ransomware

What is Ransomware?

Ransomware is one of the most serious security threats of 2016, and it shows no sign of going away soon. Ransomware is a type of malware that applies powerful encryption to files on a target network, then demands a payment to restore access to the files.

Topics: Security ransomware

10 Questions Answered About Ransomware

In Q4 of 2015, Hewlett-Packard released research showing cybercrime costs U.S. firms an average of $15 million each year – double the global average. That figure is an increase of 19%, and digital criminal activity is only expected to grow. With the “Internet of Things” on the horizon, millions of new IP-enabled devices will soon be online, each one representing a potential target.

One of the most insidious developments in cybercrime over the last 18 months is the global emergence of a potent new kind of malware: Ransomware. These powerful Trojans leave both consumers and businesses at their mercy, locking access to critical files and then extorting large cash payments to restore them.

Whether you have a team of five or a global enterprise of 50,000, it’s crucial to be aware of this emerging threat. Let’s look at some of the most common questions and their answers:

Topics: Security ransomware