The Halloween Hackers

A ransomware gang has targeted Ferrara Candy, the confectionary responsible for producing 85 percent of the nation’s supply of candy corn (approximately seven billion pieces per year). Continue Reading →
Today is a great day to have a chat with your team and go over your business resiliency and business continuity plan. If you get hit with a ransomware attack this afternoon, what happens? Who gets notified and in what order? Who initiates the restore protocols? How many hours, days, weeks of backups are available? Which servers go back online first and in what order? Continue Reading →
A ransomware attack forced the Colonial Pipeline, the largest fuel pipeline in the U.S., to shut itself down on Friday. In response, the U.S. government has declared a state of emergency to keep fuel supply lines open while the Colonial Pipeline Company does its best to get the pipeline back online. It is unclear what impact this shutdown will have on gas supply or gas prices. Experts say it depends on how quickly operations resume. Continue Reading →

Super Nasty Viruses

ddos
I got a note yesterday about a new virus targeting QNAP storage devices. QNAP is not a popular consumer brand, they make storage devices for businesses (and aggressive amateurs). The virus is called QSNATCH. Do not be confused by the cute name. It tunnels into your network attached storage device and destroys your data. It's not ransomware, it's not targeted at anyone in particular -- this virus is like a biological virus -- it's just out in the wild. If it infects your drives, they die. Continue Reading →
Cloud Storage
The velocity of data is increasing and will always increase. This is a fact of modern life. According to IBM, we create approximately 1.86EB of data every hour of every day. So it is no wonder that annual cloud storage revenue exceeds $60 billion and is trending up and to the right. There are dozens of companies offering free or close-to-free storage solutions for consumers. Here's an overview of seven excellent cloud storage choices – at least one of them will certainly fit your needs. Continue Reading →
Crypto Ransomware
Security researchers have documented another first in the annals of Android malware: a trojan that encrypts photos, videos, and documents stored on a device and demands a ransom for them to be restored. The crudeness of Android/Simplocker, as the malicious app has been dubbed, suggests it’s still in the proof-of-concept phase, Robert Lipovsky, a malware Continue Reading →
Hackers
In the PC world, hacking, viruses and cybercrime started out fairly slowly, with pranks and viruses meant to causes a nuisance. Along the way, hackers learned how to use technology to steal real money and never be caught. Organized crime and hacker syndicates are now commonplace, and are training tomorrow’s cyber thieves. Cybercrime has surpassed Continue Reading →