CyberSafety is a blog about IT security and how to keep safe online. Produced by the communication office at Panda Security (South Africa), the blog looks at internet threats -- from viruses and worms to spam and botnets -- and the technology and strategies being developed to protect PC users from these threats.
Developments in Cyber-crime, Cyberwarfare and AI mark the first quarter of 2017, as indicated by PandaLabs Q1 Report. The Report by Panda Security’s malware resource facility identifies prominent tactics, attack methods and shifts in the industry.
Installing malware through Remote Desktop Protocol is a popular attack method used by many cyber-criminals. over the past few months Panda Security’s research facility PandaLabs, has analysed several attacks of this nature.
Once credentials are obtained through brute a force attack on the RDP, the cyber-criminals gain access to the company. Attackers simply execute the corresponding malware automatically to start the encryption. (more…)
In the on-going game of cat and mouse between cyber attackers and defensive internet security providers, the appearance of a new tactic from the Locky family of Ransomware comes as no surprise.
As we discussed in February this year, Locky targets victims through seemingly legitimate email attachments. Once the victim clicks on the attachment the malicious macro begins encrypting the users’ files. (more…)
Most of us have some understanding of the threats and risks we face living our lives constantly connected to the internet. We know that we should avoid emails and attachments from unknown senders, and not to click on internet ads. We know that we should update our passwords often and back up our personal devices.
In reality, however, we don’t always get it right. So how can you ensure your family is safe from cyber threats? (more…)