The deadline for Windows 7 end of life is approaching quickly. With only a few weeks to go, organizations around the world are scrambling for ways to protect themselves, facing the inability to carry out security updates.
Thousands of computers that belong to customers of managed services providers (MSPs) have suffered from ransomware attacks over the last year. Often times, this begins with a phishing email that leads to a compromising installation of malware, or the bad guys find an open avenue to exploit on a server or system controlled by MSPs.
Our application whitelisting and ringfencing technology has been growing by leaps and bounds lately, and we have been seeing adoption of this approach to security in Australia as well. We thought it was worth the effort to do a quick breakdown on how ThreatLocker can enable this critical strategy for Australian Businesses.
The latest “oops” moment for Microsoft is the discovery that an attacker can infect a connecting machine with malware from a Remote Desktop Session. Every few months a new vulnerability is discovered in Windows. Generally, by the time the vulnerability is public knowledge, Microsoft has released a security patch in Windows Update.
I read almost everything the CDC publishes and I am a fanatic for the NIH publications on disease and medical innovations. I personally just think it’s amazing the things that such brilliant people can dedicate research and ultimately find either a cure or a way to treat the condition.
Most people think ransomware is some new attack that has only recently come to the forefront of the cyber defense space. Not so. In truth, ransomware dates back to an original piece of malicious code, known as AIDS, written in 1989 by Joseph Popp. That’s right, 1989. 30 years ago.
Quite often we hear about how bad USB storage devices are, and how we should block access to them. More often than not, corporations have the policy to block USB drives for a significant part of their organization. While USB drives can be bad, and access to them should be limited, quite often these policies […]
Today I walked the exhibit hall at the RSA conference and spoke to numerous endpoint security vendors to ask them how they were dealing with new or unknown malware. While the specific answer varied depending on the vendor, all of the answers revolved around a similar strategy.
After nearly 20 years working in cybersecurity, I am still asked the age-old question by business owners: “How can I make myself unhackable?” Seldom do they understand when I try to explain that there is no such thing as unhackable. The purpose of this guide is to help business owners better understand cyber risks and […]
ThreatLocker, C.E.O talks about how socially engineered text message encourages users to download software that could pose a risk. https://www.clickorlando.com/news/text-compliments-part-of-app-marketing-plan-not-sex-trafficking
As computer games evolve, gaming businesses are no longer just focusing on better graphics. Game manufacturers are turning to the internet for better collaboration, game rooms, multi-person battles, and even a marketplace to buy and sell items in a virtual world.
In the last 12 months, we have seen a growing number of people citing that Apple computers are more secure than Windows computers. We have also seen an increasing number of Macintosh computers with viruses. We often hear that Macintosh computers are secure and cannot be hacked.