Tag Archives: Cybersecurity

Petya variants behind the global ransomware outbreak: here’s what we know so far

Source: Sophos Naked Security Editor’s note: Sophos customers can follow the technical updates in this Knowledge Base Article, which includes a list of the variants we’re detecting and blocking. This article will also be updated as new details emerge. SophosLabs has determined that new variants of Petya ransomware (also known as GoldenEye) are behind the massive online outbreak that spread across Europe, Russia,… Read More »

Deep Root: what can we learn from the GOP’s data leak?

Source: Sophos Naked Security The headlines scream of how the Republicans’ data analytic contractor, Deep Root Analytics, had stored 25 terabytes (TB) of data stored in the cloud, of which 1.1TB were available for harvesting by anyone who found the links. The exposed data put the personal identifying information (and more) of approximately 200m registered voters in the… Read More »

Chrome bug that lets sites secretly record you ‘not a flaw’, insists Google

Source: Sophos-Naked Security Remember last year’s Google Chrome bug that gave pirates a way to steal streaming movies? Well, we’re ready for our closeup, Mr DeMille! This time, we’re potentially the stars of hackers’ movies: there’s a Google Chrome “bug” (depending on who you ask) that allows sites to surreptitiously record audio and visual, all without an indicator… Read More »

Avoid Star Hop and Candy Link in Google Play

Why you should avoid Star Hop and Candy Link in Google Play Source: Sophos When you see them in Google Play, Star Hop and Candy Link look like a couple of harmless games. But they hide malware that can switch on the wifi on your Android device’s and pummel you with spam. SophosLabs researchers uncovered the apps – which have… Read More »

Wanna Ransomware

How To Stay Protected Against Ransomware   Businesses large and small are under threat from increasingly aggressive and brutal ransomware attacks. Loss of access to critical files, followed by a demand for payment can cause massive disruption to an organization’s productivity. But what does a typical attack look like? And what security solutions should be in place to… Read More »