Articles by Paul Kane
Paul is an avid copywriter and editor with a keen interest in cyber security and high tech.
Updated February 12, 2019
Israeli hackers and activists Noam Rotem and Ran L from Safety Detective research lab have uncovered a major security breach in temperature control systems manufactured by Resource Data Management, a Scotland-based remote monitoring solutions company.
These control systems are used by hospitals and supermarket chains all over the world, including Marks & Spencer, Ocado, Way-on, and many others.
If you’re a systems administrator, you may think of security as the task of installing security tools, configuring them to protect the latest threats, patching servers and endpoints, and re-imaging systems when they get a virus. It’s not a simple job, but its parameters are at least straightforward.
If you’re doing all that, however, you’re still doing only half your job. Some of the most effective cyberattacks you’ll ever encounter aren’t targeted at hardware or software – they’re targeted at people. Social engineering attacks often involve no more than a telephone or an email account.
If you’ve recently logged on to your computer, only to find all of your personal files encrypted and being held quite literally for ransom, you may have been victimized by the CryptoLocker ransomware virus or a similar piece of malware.
Unfortunately, dealing with ransomware isn’t an easy task.
The best course of action is to prevent your computer from becoming infected in the first place.
However, if it’s already too late then this guide will help you learn how to prevent ransomware attacks like CryptoLocker from compromising your files, while providing a few tips on how you can try to recover your files after an attack without paying the hackers.
Sometimes the software designed to protect our computers from cyber attacks winds up being vulnerable itself.
That’s exactly what happened when hackers compromised CCleaner; one of the most popular and heavily downloaded PC clean-up programs in the world.
Here’s our guide explaining the CCleaner malware attack in 2019, who’s at risk, and what you can do to protect your computer against malicious attacks posing as harmless clean-up software.
In the never-ending cat and mouse game of virus vs antivirus, understanding how AV software identifies specific targets and prevents them from infecting your operating system can help better protect your computer from infiltration.
With hackers and other bad actors working ‘round the clock at spreading newer, deadlier viruses, essential to their malicious strategy is keeping them undetected for as long as possible.
Before we can deep-delve into the inner-workings of an antivirus, let’s first look at how a computer virus spreads quickly across networks, undetected.
Hacker and Activist Noam Rotem, working with Safety Detective research lab, was shocked when he recently discovered a major vulnerability affecting nearly half of all airlines worldwide. While booking a flight with Israeli national carrier ELAL, he came across a significant security breach that allows anyone to access and change private information on flight bookings. The same breach was then discovered to include 44% of the international carriers market, potentially affecting tens of millions of travelers.