Saturday , 23 September 2017
Home » NEWS » VIDEOS

VIDEOS

The Necurs Botnet

Necurs, thought to be one of the world’s largest botnets, returned online in June this year, and once again began to terrorize victims who got in its path. Necurs is responsible for millions in dollar losses linked to Locky ransomware and Dridex banking Trojan infections. In this short video, AppRiver’s experts discuss how they noticed and questioned the significant decrease in the virus ... Read More »

Locky & Zepto Ransomware

The growing threat of ransomware attacks in 2016 raises concerns among businesses and consumers alike (“Locky” and “Zepto” being just two examples). In this short video, Appriver’s experts talk about the data cyber attackers are going after and which can kindly be decrypted and returned to the victim in exchange of a particular sum of money. To get the latest ... Read More »

Social Engineering’s Role in Malicious Macros and OLE

What makes macros malware so dangerous is the fact that their authors use the macro power for creating bits of code that can download and execute malicious files when the documents are run on a victims machine. Moreover, recently even the Office object linking and embedding (OLE) capabilities have been misused to trick users into enabling and downloading harmful content. In this ... Read More »

AppRiver’s Predictions for Q3

So far, 2016 has been a pretty hectic year for cybersecurity professionals – and a lucrative one for hackers. We’ve had some big breaches, massive downtimes and a plethora of e-mail scams. So what can we expect as we head into the second half of what has already been a tumultuous year for the cyber landscape? We’ve got this video ... Read More »

How to Protect Yourself or Organization from Malware

Ransomware is one of the most infuriating kinds of cyber attack that’s cropped up over recent years, with hackers raking it in from hapless comouter users who just want their files back. Whilst we all hope for a perfect online community where such things wouldn’t happen, it’s evident that future is a long way away. So the team at AppRiver have ... Read More »

ITSG Goes to HackFu 2016 with MWR InfoSecurity

Not long ago, the Guru received news from MWR InfoSecurity that they were hosting an elite cybersecurity event in the South of England. We sent Dulcie down to see what was happening, as challenges kicked off and 100 experts were tasked with defusing 5 nuclear bombs within 48 hours. To learn more about MWR InfoSecurity, visit: https://www.mwrinfosecurity.com Follow them on ... Read More »

AppRiver: How much money have companies been paying?

Join AppRiver’s experts Troy Gill, Fred Touchette and Jon French for another close-up on the findings of their Global Security Report. This week, we’re analysing what companies have actually been paying in light of cyber attacks. It turns out the answer is a LOT. Rsearch shows potentially billions of dollars has been lost through wire transfer fraud, ransom payments and ... Read More »

Is there any way to fix being ransomed or is it hopeless?

Join AppRiver’s experts Troy Gill, Fred Touchette and Jon French for another close-up on the findings of their Global Security Report. This week, we’re analysing ransomware and what the reality is when you get hit by it. Ransomware has become very sophisticated through the use of different forms of communication, payment and browsing tools that allow criminals to remain off-grid ... Read More »

Has there been an increase in traffic this year?

The IT Security Guru has been lucky enough to be able to share a series of videos from the security specialists at AppRiver, award winning e-mail and web security solutions providers. The videos will break down the findings from AppRiver’s Global Security Report, a quarterly study published by the company that explains the latest trends and threat actors they’ve seen ... Read More »

AppRiver: What is the Distributed Spam Distraction (DSD) technique?

Join AppRiver’s experts for another close-up on the findings of their Global Security Report. This week, we’re analysing what the Distributed Spam Distraction Technique actually is and how it’s developed over recent years. A cyber criminal basically uses stolen details to incur fraudulent charges – however the e-mail confirmation can’t be hidden from the person being scammed. SO they will ... Read More »