search external-link twitter facebook feed google-plus linkedin angle-left angle-right angle-up angle-down youtube-play
header-temp_01
Ransomware

Sign up and stay up-to-date.

Incident Response /

This Week in Cyber Security News – 10.7.16

Cybersecurity Trends and Opinion Incident Response A Challenge For 98% Of InfoSec Pros by Sara Peters Ninety-eight percent of IT security pros find incident response to be a challenge and 71% say it’s grown more difficult over the past two years, according to a new survey by Enterprise Strategy Group, sponsored by Hexadite. “It’s a […]

Ransomware /

Video: Stopping Ransomware in Minutes

Saying that ransomware can be devastating is the understatement of 2016. A few sobering statistics about ransomware: Nearly 50 percent of organizations have been hit with ransomware 42% of attacks impacted more than one endpoint $209 million was paid to ransomware criminals in Q1 2016, FBI estimates predict that to rise to over $1 billion […]

Blog /

Don’t Wave the White Flag: Practical Steps to Avoid and Stop Ransomware Before It’s Too Late – via InformationSecurityBuzz

Hexadite CTO and Co-Founder Idan Levin's article "Don’t Wave the White Flag: Practical Steps to Avoid and Stop Ransomware Before It’s Too Late" was just published on InformationSecurityBuzz.com.

Blog /

10 Tips for Companies to Avoid and Stop Ransomware – via eWeek

Hexadite CTO Idan Levin’s article “10 Tips for Companies to Avoid and Stop Ransomware” is now available on eWeek. From the article: Practically every day, there is a new report of companies, hospitals and schools being targeted and compromised by ransomware. Once infected–often after an employee downloads and installs a malicious application–files are encrypted and […]

Incident Response /

This Week in Cyber Security News – 3.28.16

  Malware and Ransomware Petya ransomware overwrites MBRs, locking users out of their computers By Lucian Constantin It’s hard enough for non-technical users to deal with ransomware infections: understanding public-key cryptography, connecting to the Tor anonymity network and paying with Bitcoin cryptocurrency. A new malicious program now makes it even more difficult by completely locking […]