- October 26th, 2016
- No Comments
Online Privacy, Online Safety
This past Friday, October 21, there was a cyber-attack carried out that interrupted website access and crashed the internet. It was caused by a massive Distributed Denial of Service (DDoS) attack on a major Domain Name System (DNS) provider, Dyn. Read more…
Imagine the damage someone could do if they knew your Facebook password. Now imagine how much more harmful it could be if they had your banking information. Of course, you would never give over this information to a stranger, but what if they sent you an email pretending they were your bank. How would you know not to trust them then?
The QuadRooter set of vulnerabilities reached the headlines mainly due to its wide extent and severity. Since Check Point announced its discovery, we have received numerous questions from users around the globe asking – How can they protect themselves from malware trying to take advantage of the Quadrooter vulnerabilities?
Unless you have been living under a rock for the past few weeks or just got back from a trip to
the moon, you have certainly heard of, and perhaps even played the latest app craze, Pokemon
Go! You might know all about Pokestops and Lures and training your Pokemon. But did you know that all the fun you’re having comes at a price? Read more…
“Bzzz bzzz bzzz…”
“Gotta smack it to stop it”, the not-yet-awake thought floods Tim’s mind.
“Presentation at 10:00 today” Now this new, more urgent thought hits him like a runaway train
and he jumps out of bed.
Hastily, he throws on his clothes and grabs his coffee. He has to run through his notes and slides one last time before the big meeting in just a few hours.
Skirting to his laptop, he turns it on, and after a moment, he is greeted by the following message with the force of a ton of bricks:
“Hi! Your files have just been taken ransom with a really strong form of encryption. If you ever want to see your data again, please create a Bitcoin wallet and pay your unlock fee
of 1 BTC within 48 hrs. After you have paid, we will unlock the files with the correlating
key. Don’t attempt to unlock the files yourself, It’s impossible.” Read more…