February 8th, 2016
Last week saw the launch of the latest Microsoft Vulnerabilities Report, Avecto’s leading research project into the security bulletins issued by the software giant over the past 12 months. Now in its third year, the report has consistently provided intriguing insight into today’s threat landscape, the common attack vectors and the products within the Microsoft portfolio that cause IT departments the most sleepless nights.
- May 4th, 2016
To be clear, a ransomware developer’s goal is not to destroy your data. The main driver is money, and they care about lining their own wallets (usually bitcoin wallets but this does not make a big difference to you,) which means that destroying your data isn’t really the goal they are trying to achieve.
- April 21st, 2016
I’ve mentioned previously in a blog that Avecto are currently supporting local mental health charities and trying to promote positive mental health around our offices. I wanted to explore the concept of the mindapple (mīnd-ăp-´əl) and how everyone can use them to improve your own mental health whether it’s to cope with a stressful day at work, bereavement, or even clinical depression – there’s a mindapple to help everyone.
- April 12th, 2016
In the tech world recently there have been discussions regarding a new type of ransomware, which has been dubbed “PowerWare”. It has been named this way due to the fact that instead of using an exploit to download malicious software to run on the users’ machine and encrypt their files, exploits are instead used to invoke PowerShell to do the damage.
- March 18th, 2016
If you were listening to popular music in the mid-90s, you doubtless remember “Stay” by Lisa Loeb. I don’t know if the person who told her that she “only hears what she wants to” was a cognitive psychologist, but there was certainly truth in that remark – not just for Lisa, but for all of us.
- March 14th, 2016
Last week marked an exciting new first – ransomware on a Mac disclosed by Palo Alto who had seen it with a client. What’s simultaneously encouraging and disappointing is that it could have been prevented without detection using highly recommended best practices – application whitelisting (yes, it is possible to do whitelisting today – we do it with lots of our clients as do other providers).