How to protect Windows 10 PCs from ransomware

Credit to Author: Preston Gralla| Date: Fri, 14 Dec 2018 13:53:00 -0800

CryptoLocker. WannaCry. Petya. Bad Rabbit. The ransomware threat isn’t going away anytime soon; the news brings constant reports of new waves of this pernicious type of malware washing across the world. It’s popular in large part because of the immediate financial payoff for attackers: It works by encrypting the files on your hard disk, then demands that you pay a ransom, frequently in Bitcoins, to decrypt them.

But you needn’t be a victim. There’s plenty that Windows 10 users can do to protect themselves against it. In this article, I’ll show you how to keep yourself safe, including how to use an anti-ransomware tool built into Windows 10.

To read this article in full, please click here

(Insider Story)

Read more

How to create and open compressed files on iPhone, iPad

Credit to Author: Jonny Evans| Date: Thu, 10 Jan 2019 07:27:00 -0800

Many enterprises rely on zip files to exchange data, particularly confidential data. And compression helps keep information safe, even against inquisitive ads trackers lurking inside “free” email or online storage services. How do you handle these things on iPad or iPhone?

How to handle zip files on iPhone

While it isn’t especially obvious, iOS provides some limited features that let you archive and decompress zip files. You can even create a nice little Shortcut to do this for you:

  • Open Shortcuts, Tap Create Shortcut.
  • In the search bar, type Extract Archive: That shortcut should appear in the list below; tap it to add it to your workflow.
  • Returning to the search bar, type Save File. When it appears, tap it to add it to the workflow you are building.
  • Tap the switch button at top right of the shortcut name.
  • In the next pane, you can name the shortcut and give it an icon. The most important change you should make is to enable Show in Share Sheet (flick to green).
  • You can create a second Shortcut to make archives. Just type Make Archive to find the relevant flow and then add Save File and Show in Share Sheet as decribed above. Remember to give it a name, such as Make Archive.
  • Shortcuts can work with multiple compression formats, including .tar, .zip and .iso.

How to use the zip files shortcut:

To read this article in full, please click here

Read more

Where Will Ransomware Go In The Second Half Of 2019?

Credit to Author: Jon Clay (Global Threat Communications)| Date: Tue, 09 Jul 2019 14:37:14 +0000

Ransomware has been an evolutionary malware family that continues to shift and change over the years. From the first fakeAV, to police ransomware, to the now oft-used crypto-ransomware, this threat just will not go away. Based on the latest trends, we predict this threat will grow in the second half of this year. At Trend…

The post Where Will Ransomware Go In The Second Half Of 2019? appeared first on .

Read more

Migrating Network Protection to the Cloud with Confidence

Credit to Author: Trend Micro| Date: Thu, 11 Jul 2019 12:11:50 +0000

For modern organizations, speed and agility is the key to success – built on enhanced IT efficiency and performance driven by the cloud. Anything less could see your business outpaced by the competition. As always, security must be a priority when migrating to the cloud, but network teams are being let down by existing tools….

The post Migrating Network Protection to the Cloud with Confidence appeared first on .

Read more

This Week in Security News: Banking Malware and Phishing Campaigns

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 12 Jul 2019 15:17:02 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about the banking malware Anubis that has been retooled for use in fresh attack waves. Also, read about a new phishing campaign that uses OneNote audio…

The post This Week in Security News: Banking Malware and Phishing Campaigns appeared first on .

Read more

New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service

Credit to Author: Trend Micro| Date: Wed, 17 Jul 2019 14:36:29 +0000

Cloud adoption continues to rise as organizations reduce their data center footprint, look to cloud native technologies to improve their application design and output, and strive to improve scalability and management of resources and systems. In a recent survey conducted by analyst firm ESG, 87% of respondents indicated that they currently run production applications and…

The post New Azure Marketplace Pay-As-You-Go Billing for Trend Micro Deep Security as a Service appeared first on .

Read more

How Will Companies Deploy Industrial IoT Security Solutions?

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 18 Jul 2019 14:05:42 +0000

Industrial IoT (IIoT) devices will comprise the majority of the billions of IoT devices deployed over the next decade. How will the information security market meet this onslaught of technology? The consumer market is not a useful guide for this analysis. Consumers buy in small quantities and choose to deploy information security tools piecemeal. Few…

The post How Will Companies Deploy Industrial IoT Security Solutions? appeared first on .

Read more

This Week in Security News: Spam Campaigns and Mobile Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 19 Jul 2019 16:35:00 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a mobile malware that infects Android devices by exploiting the vulnerabilities found within the operating system. Also, read about a recent spam campaign that targets…

The post This Week in Security News: Spam Campaigns and Mobile Malware appeared first on .

Read more

Three Network Security Questions with CEITEC’s CIO

Credit to Author: TJ Alldridge| Date: Wed, 26 Jun 2019 18:16:22 +0000

Ireneo Demanarig is the Chief Information Officer at CEITEC S.A. located in Porto Alegre, Rio Grande do Sul, Brazil. CEITEC is a microelectronics manufacturer that specializes in solutions such as automatic identification (RFID and smartcards), application-specific integrated circuits (ASICs) aimed at identifying animals, and much more. Recently, I jumped on the phone with Ireneo and…

The post Three Network Security Questions with CEITEC’s CIO appeared first on .

Read more

This Week in Security News: Malvertising and Internet of Things Malware

Credit to Author: Jon Clay (Global Threat Communications)| Date: Fri, 28 Jun 2019 14:24:11 +0000

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. This week, learn about a new Internet of Things malware that’s bricked thousands of devices. Also, read about a ransomware family that’s using malvertising to direct victims to a…

The post This Week in Security News: Malvertising and Internet of Things Malware appeared first on .

Read more