Our thoughts, industry views and technology trends

Featured

Contributor:
Andrew Avanessian
February 8th, 2016

Are admin rights the biggest threat to enterprise security?

Last week saw the launch of the latest Microsoft Vulnerabilities Report, Avecto’s leading research project into the security bulletins issued by the software giant over the past 12 months. Now in its third year, the report has consistently provided intriguing insight into today’s threat landscape, the common attack vectors and the products within the Microsoft portfolio that cause IT departments the most sleepless nights.

 

Continue Reading

A hacker’s guide to Ransomware: How to successfully lose your data

To be clear, a ransomware developer’s goal is not to destroy your data. The main driver is money, and they care about lining their own wallets (usually bitcoin wallets but this does not make a big difference to you,) which means that destroying your data isn’t really the goal they are trying to achieve.

Continue Reading


How do you like zen apples? A guide to using mindapples to boost your mood

I’ve mentioned previously in a blog that Avecto are currently supporting local mental health charities and trying to promote positive mental health around our offices. I wanted to explore the concept of the mindapple (mīnd-ăp-´əl) and how everyone can use them to improve your own mental health whether it’s to cope with a stressful day at work, bereavement, or even clinical depression – there’s a mindapple to help everyone.

Continue Reading


Go Go PowerWare Rangers

In the tech world recently there have been discussions regarding a new type of ransomware, which has been dubbed “PowerWare”. It has been named this way due to the fact that instead of using an exploit to download malicious software to run on the users’ machine and encrypt their files, exploits are instead used to invoke PowerShell to do the damage.

Continue Reading


You only hear what you want to

If you were listening to popular music in the mid-90s, you doubtless remember “Stay” by Lisa Loeb. I don’t know if the person who told her that she “only hears what she wants to” was a cognitive psychologist, but there was certainly truth in that remark – not just for Lisa, but for all of us.

Continue Reading


Application authentication needs a reboot

Last week marked an exciting new first – ransomware on a Mac disclosed by Palo Alto who had seen it with a client. What’s simultaneously encouraging and disappointing is that it could have been prevented without detection using highly recommended best practices – application whitelisting  (yes, it is possible to do whitelisting today – we do it with lots of our clients as do other providers).

Continue Reading