Category: Malware

Understanding Malware

Understanding Malware

What is malware? Malware is unwanted files or programs that can cause harm to a computer or compromise data stored on a computer. Various classifications of malware exist; including, but not limited to: Viruses have the ability to damage or destroy files on a computer system and are spread by sharing an already infected removable media,

Read More
Ransomware

Ransomware

What is ransomware? Ransomware is a type of malware threat actors use to infect computers and encrypt computer files until a ransom is paid. (See Understanding Malware for more information on malware.) After the initial infection, ransomware will attempt to spread to connected systems, including shared storage drives and other accessible computers. If the threat

Read More
Spyware

Spyware

What is spyware? Despite its name, the term “spyware” doesn’t refer to something used by undercover operatives, but rather by the advertising industry. In fact, spyware is also known as “adware.” It refers to a category of software that, when installed on your computer, may send you pop-up ads, redirect your browser to certain web

Read More
Recovering From Malware

Recovering From Malware

How do you know your computer is infected? Unfortunately, there is no particular way to identify that your computer has been infected with malware. Some infections may completely destroy files and shut down your computer, while others may only subtly affect your computer’s normal operations. Be aware of any unusual or unexpected behaviours. If you

Read More
Phishing

Phishing

What is Phishing? Phishing is a way for criminals to attempt to steal sensitive information, such as credit card details, online banking credentials, business passphrases or passwords. This is done by sending fraudulent messages, usually via electronic mail, which are sometimes referred to as ‘lures’. Phishing emails are designed to appear that they come from

Read More
Avoiding Social Engineering Attacks

Avoiding Social Engineering Attacks

What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that

Read More
Defending Against Illicit Cryptocurrency Mining

Defending Against Illicit Cryptocurrency Mining

What is cryptocurrency? Cryptocurrency is a digital currency used as a medium of exchange, similar to other currencies. Bitcoin, Litecoin, Monero, Ethereum, and Ripple are just a few types of the cryptocurrencies available. Unlike other currencies, cryptocurrency operates independently of a central bank and uses encryption techniques and blockchain technology to secure and verify transactions.

Read More
Exercising Caution With Email Attachments

Exercising Caution With Email Attachments

Why can email attachments be dangerous? Some characteristics that make email attachments convenient and popular also make them a common tool for attackers: Email is easily circulated – Forwarding email is so simple that viruses can quickly infect many machines. Most viruses do not even require users to forward the email—they scan a users’ mailbox

Read More