Category Archives: Cybersecurity

Wanna Ransomware

How To Stay Protected Against Ransomware   Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack look like? And what security solutions should be in place to… Read More »

QualTech Critical Infrastructure Services

QualTech360Care Endpoint Security with Sophos When it comes to cloud managed services QualTech goes beyond just making available virtual infrastructure such as single tenant isolated virtual networks and vms running Linux or Windows 2012 OS. Our multiple data center redundant cloud infrastructure hosted in ISO 27000 certified data centers gives you scalable and compliant infrastructure you can trust but… Read More »

Indicators Associated With WannaCry Ransomware

Indicators Associated With WannaCry Ransomware Source: Homeland Security Original release date: May 12, 2017 | Last revised: May 13, 2017 Systems Affected Microsoft Windows operating systems Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in as many as 74 countries, including the United States,… Read More »

An HTTPS hijacking click-fraud botnet infects almost 1 million computers

The malware replaces search results with ones from an affiliate program Source: Bitdefender LABS Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco Trojan have taken abuse to a whole new level, burning through companies’ advertising budget at an unprecedented pace. The malware’s objective is… Read More »

Microsoft EMET – Time For an Upgrade

Source: NeworkWorld Hackers can easily disable the Microsoft Enhanced Mitigation Experience Toolkit (EMET), a free tool used by companies to strengthen their Windows computers and applications against publicly known and unknown software exploits. Researchers from security vendor FireEye have found a method through which exploits can unload EMET-enforced protections by leveraging a legitimate function in the tool itself.… Read More »