Despite the warnings, corporate cyber defenses remain inadequate

Following WannaCry, how should businesses protect themselves from cyberattacks? If anything, 2017 will be remembered as the year of the cyber-attack. No business is safe. No industry is exempt. The ease with which cyber-attacks can be launched and virally propagated [...]

2024-03-14T00:10:24-07:00December 1st, 2017|

Ransomware Training for End-Users – Be Ransomware Aware

Educate your users - Don’t let them be tricked into downloading ransomware/malware

 Everyone should follow this advice:

  1. Be very cautious when opening an attachment or clicking a link in an email, instant message, or post on social networks (like Facebook)—even if you know the sender. If you are suspicious, call to ask the sender if they sent it.  If not, delete it.
  2. The attack can look like it is from an official sources like banks, UPS, FedEx, USPS, eFax, etc. This has been the most common attack method to date.
  3. If an e-mail gets blocked and quarantined by your spam filter, be very certain about the message and any attachments before you release it from quarantine.  One user recently got burned this way.
  4. Avoid clicking Agree, OK, or I accept in banner ads in unexpected pop-up windows with warnings or offers to remove spyware or viruses, or on websites that may not seem legitimate. These are usually bogus. Call your IT specialist if you are concerned.
2021-01-28T20:16:40-08:00May 15th, 2017|

A three bullet summary of your current e-mail threats

Proofpoint Threat Operations and Research recently published their quarterly threat report for July - September 2016, which includes key findings such as: 

  • Volume of malicious emails rose to their highest levels ever
    New campaigns bearing varied attachment types broke volume records set in Q2, peaking at hundreds of millions of messages per day. JavaScript attachments continued to lead these very large email campaigns, growing 69% this quarter.
  • Ransomware variants grew tenfold
    In particular, 97% of messages with malicious document attachments featured the popular ransomware strain Locky, while CryptXXX was the dominant ransomware delivered by exploit kit (EK).

Download the full report. Please let us know if you have any questions related to this report or how Alvaka Networks can protect your people and data from attacks.

2016-10-24T13:44:00-07:00October 24th, 2016|

Don’t go on a phishing trip!

Kevin McDonald guest writes a blog for Dave Berkus' Berkonomics TUESDAY, June 21st, 2016 By Kevin McDonald Phishing, a play on the word “fishing,” is a dangerous form of executive or CEO email fraud, and is negatively impacting individuals and [...]

2024-10-09T05:03:31-07:00June 21st, 2016|

Ransomware and Phishing Awareness Training for your end-users

If you don’t treat network security as important, don’t expect your users to treat security as important. Irvine, CA - Ransomware and phishing threats are the most prevalent cyber-risk problem facing your organization today. Securing your system is a layered [...]

2019-09-08T21:59:01-07:00May 23rd, 2016|

CryptXXX is ransomware that also steals your passwords and your Bitcoins

Most of my recent blogs are about ransomware. That is because ransomware is the most prevalent cyber threat today facing individuals, small and large businesses, governments and not-for-profits. No one is safe from this scourge.

Today I must tell you about a new one. Like Jigsaw, this new one called CryptXXX, is a game changer. Jigsaw was different from prior strains in that it immediately starts to delete your files just to show you that it means business. CryptXXX is different in that it introduces two new problems other than encrypting all your files and then demanding payment. Up until now ransomware has not actually breached your system and exfiltrated data. Sure you had a security incident, but it was not identified as a breach in the classic sense. Now with CryptXXX not only is your data held hostage, but now the culprits steal two new things from you. CryptXXX steals login names and passwords which puts all your systems, local and in the cloud, and any websites you frequent at risk. CryptXXX also steals your Bitcoins if you have any. The stealing of the Bitcoins is a particular insult because....

2024-04-21T19:40:11-07:00May 18th, 2016|