Cyberattack Tag

As in recent years, 2017 has been marked by an increasing number of cyberattacks, and indications point to another tumultuous year as we head into 2018. With companies storing more data in the cloud and the number of Internet-connected devices rapidly increasing, the appeal and opportunity...

Malicious links are not new, but they continue to plague us. Research shows that a significant number of people will click on a link in an email, web page, or document without taking a second thought, and all too often, end up infecting their device...

As always, malware continues to grow in sophistication and power. Here’s another case in point. We’ve been closely following ransomware as it expands its primary focus from individuals to include businesses. Now we’re seeing the next evolution of this ugly form of crimeware. A recent wave...

Advanced malware solutions ("sandboxes") traditionally use virtual machines (VM) to analyze suspicious objects to find out if they are malicious. However, advanced malware is capable of detecting the presence of the virtual machine technology used by conventional sandboxes and leveraging this weakness to...