Tag Archives: ransomware

2017 predictions: Looking forward to a new year in cyber security

As another busy year in cyber security draws to an end, our team shares their thoughts on the trends and issues we should keep an eye out for in 2017.  How can we stay protected against the latest threats? I asked our experts for their views and we’d be interested to hear your predictions too…

Continue Reading


A hacker’s guide to Ransomware: How to successfully lose your data

To be clear, a ransomware developer’s goal is not to destroy your data. The main driver is money, and they care about lining their own wallets (usually bitcoin wallets but this does not make a big difference to you,) which means that destroying your data isn’t really the goal they are trying to achieve.

Continue Reading


Go Go PowerWare Rangers

In the tech world recently there have been discussions regarding a new type of ransomware, which has been dubbed “PowerWare”. It has been named this way due to the fact that instead of using an exploit to download malicious software to run on the users’ machine and encrypt their files, exploits are instead used to invoke PowerShell to do the damage.

Continue Reading


Lockdown Locky

Locky is the latest in an ever increasing range of ransomware threats used by cyber criminals in an expanding and increasingly  lucrative market. . What makes Locky special is that it appears to have come from the same group behind several large Dridex campaigns showing that they are possibly diversifying their range of attacks.

Continue Reading


Malware: An evolutionary story

Earlier this year, a study from IDC and the National University of Singapore (NUS) predicted that enterprises will spend around $500 billion in 2014 on making fixes and recovering from data breaches and malware. In the past few months alone, we’ve seen Target reveal the cost of its recent breach could reach as much as $148 million. The figures are stark, but for the uninitiated the world of malware and its history is something of a mystery. So, where did they originate? How have they changed? And what does the future of malware look like?

Continue Reading