Matrix Ransomware: Spreading to PCs through Malicious Shortcuts

Matrix Ransomware

The latest addition to the growing threat of ransomware is the Matrix Ransomware. Though the ransomware has been active for quite some time now but it has recently seen a surge in attacks. Like all other ransomware, Matrix Ransomware holds computer data encrypted for ransom. The encryption is usually strong and no formal way is […]

Continue reading


Dangers of Crypto-Ransomware and ways companies can avoid it!

crypto-ransomware

Money makes ransomware the lucrative cyber theft option. Crypto-Ransomware is a type of ransomware that encrypts files on a user’s machine making it unreadable for machine or the user. A decryption key is needed to unscramble the files thus making them legible again. Dangers of Crypto-Ransomware Crypto ransomwares are truly nasty. Once you are infected, […]

Continue reading


How are Locky and Cerber Ransomware Skilled at hiding themselves?

locky and cerber ransomware

2 of the 3 major ransomware families responsible for 90% of ransomware attacks are Locky and Cerber Ransomware families. They are acutely notorious in hiding in plain sight. The camouflage helps the ransomware to hide inside the system and attack when unexpected. Once they encrypt the files there is no other way except to pay […]

Continue reading


Staying ahead of the Cyber Security curve

Staying ahead of the Cyber Security curve

IoT devices are set to revolutionize our lives. Companies are using IoT devices more than ever with automation and more AI to improve work efficiencies. How can a company ascertain if they are an easy target for cyber criminals? Are they adequately protected from cyber-attacks? is a moot question C-level executives deal with every day. […]

Continue reading


PetrWrap: Cybercriminals stealing code from one another

petrwrap

The latest version of Petya based ransomware is PetrWrap. Petya ransomware has been distributed as ransomware-as-a-service wherein the creator of the ransomware shares the malware code as a product and shares the profits (ransom) after any attacker uses the Petya malware and succeeds.  Cyber criminals have found a way to use the code without sharing […]

Continue reading


Finding the appropriate Content Management System(CMS) for your Organization

CMS Content Management System

In today’s market, you can find a Content Management System(CMS) at arm’s length. How do you pick the right content management system for your organization? Selecting the right CMS is a daunting task with a wide variety of open source as well as commercial offerings. A CMS is very important for coordination of marketing and […]

Continue reading


Kirk Ransomware: Star trek themed malware!

Kirk Ransomware

A new piece of ransomware has surfaced featuring star trek theme, named Kirk Ransomware, the first of its kind ransomware demanding Monero cryptocurrency instead of Bitcoin. It was discovered by Avast malware researcher Jakub Kroustek. Cyber criminals are turning highly sophisticated with better, more secure ways to ask for ransom and hence a first for […]

Continue reading