Operations | Monitoring | ITSM | DevOps | Cloud

Malware

Feature Spotlight: Malware / Virus Checks

Malware / Virus checks from Uptime.com checks your site against two major malware databases. Malware is any type of unwanted or malicious code. Malware includes viruses, which are malware designed to replicate and spread, as well as spyware, adware, trojans and more. A Malware / Virus check uses the Google Safe Browsing List and the Yandex Safe Browsing List to determine if your site has malware.

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

Organizations today are increasingly the targets of sophisticated threats developed by a shadowy and well-financed cybercrime industry that has demonstrated it can often outsmart even the most robust security defenses. Worse yet, cybercriminals are aided by the fact that security teams often lack the human and financial resources necessary to keep pace with evolving threats, so they often cannot defend against every attack coming their way.

Ransomware attacks continue to rise in 2018

It’s official. Ransomware isn’t just one of the most common types of malware, it is the most prevalent malware used in cyberattacks according to the 2018 Verizon Data Breach Investigations Report (DBIR). This report found that of the data breaches involving malware in 2017, 39 percent made use of ransomware, which was twice the amount used the previous year.

Not All Hacks Are the Same, Plan Your Network Defenses Accordingly

The news is filled with stories about horrible attacks against corporate and government networks. It’s almost enough to make administrators for small and mid-sized networks give up. But it’s important to note not all of these attacks are the same. There’s a vast difference, for example, between the incredibly sophisticated long-term attacks against high-profile companies and government agencies, and the mere smash-and-grab attacks.

Ransomware attackers and victims fall victim to ransom theft

Recently, there has been a string of attacks affecting some ransomware victims who pay their ransom in an attempt to regain access to their encrypted data. These ransom payments are being intercepted by a third party, ironcally turning the ransomware attackers into the second victim. As a result, the original ransomware victims are victimized a second time, as they won’t get their data back since the ransomware attackers never receive the ransom money.

Data Snapshot: How Meltdown & Spectre flaws are affecting businesses

In recent years, revelations of security holes in widely used IT hardware and software have put IT pros on edge. A few times a year, a huge cybersecurity announcement introduces chaos into the IT world, forcing network and systems administrators to scramble to secure their environments and deal with the fallout.