40% Of Businesses Targeted By Ransomware Alone

Ransomware is currently on track to become the most prevalent form of malware affecting business, with almost 40 percent of businesses experiencing a ransomware attack last year alone.

ransomware

According to a report by security firm, Malwarebytes, which surveyed 500 companies in four countries, their research found that one-third of targeted victims lost revenue as a result of an attack, and in the case of healthcare facilities, 3.5% claimed that a ransomware attack had put peoples lives at risk.

Nathan Scott, the technical project manager at Malwarebytes said that “Over the last four years, ransomware has evolved into one of the biggest cyber security threats in the wild, with instances of ransomware in exploit kits increasing 259 percent in the last five months alone. The impact on businesses around the world has been significant.”

Malwarebytes’ research also found that respondents were candid about the financial implications of ransomware attacks, claiming that more than one-third of the ransomware victims lost revenue as a result of the attack. Worryingly. 20 percent also said they had to stop operations completely in the aftermath of a successful data breach.

The report,” State of Ransomware,” published on Wednesday, attempts to explore and explain how ransomware is spreading across the globe.

Not of course that ransomware is anything new, but it has seen a near exponential rise in popularity over the last 18 months or so as a method of attacking businesses and other large organisations.

In simple terms, ransomware is the act of planting malicious software on a server or computer that then takes control of the machine or network, and encrypts all the data on it, rendering them inaccessible. The ransomware attackers then demand payment, typically in a digital currency such as bitcoin, in exchange for the decryption key that will return the network or affected computers to their previous state.

But as Malwarebytes points out, there’s no guarantee that they keys will work, or if the attackers will demand another payment to unlock the affected hardware.

“Cybercriminals are increasing their use of ransomware in their attack strategies globally, causing business disruption, loss of files and wasted IT man-hours. In order to stay safe, businesses must invest heavily in both employee education and technology…[to] protect them against known and unknown ransomware threats.”

 

The post 40% Of Businesses Targeted By Ransomware Alone appeared first on FileHippo News.



via FileHippo News http://ift.tt/2awiNMN

A Warning Label For Your Software

Thanks to initiatives aimed at consumer protection, we have warning labels on everything. From the Surgeon General’s warning on cigarettes and alcohol to the printed mandate not to let your child put a plastic bag on his head, we’re now more informed than ever when it comes to our own protection. But there’s one area where advocates feel we don’t have all the details: software security.

internet-security_converted

That’s why Peiter Zatko aka Mudge has developed software labeling intended to let consumers know about the vulnerability vs trustworthiness of the tech they use, ideally before they grant permissions or turn over their sensitive data. His system is less like a warning label and more like the nutritional guideline labels that appear on our packaged foods now, intent on letting consumers make a sound choice. Zatko, a former hacker himself, is no stranger to raising awareness of security flaws, and has been associated with other cybersecurity projects, even ones for the US Department of Defense.

A Reuter’s article on Zatko’s efforts highlighted some of his preliminary findings when it comes to software and tech security and the trust consumers can place in specific brands. For example,  “on Apple’s Macintosh computers, Google’s Chrome web browser is significantly harder to attack than Apple’s Safari, which in turn is much more secure than Firefox. Many Microsoft products have scored quite well so far, but its Office suite for Mac did terribly.”

This type of information is critical for arming the public against the threat of a security breach. Why? Because lawsuits against software companies who sell a faulty product are actually harder to win than you might imagine, given that software is a licensed product and not a tangible product, in legal definitions. That’s why a lot of the support for this kind of project is coming from an unlikely industry: the insurance sector. They’re the ones hard hit when a security breach results in consumers’ information being stolen, and they have little financial recourse against the software company or the client who used the flawed software.

 

The post A Warning Label For Your Software appeared first on FileHippo News.



via FileHippo News http://ift.tt/2aUnqpH

Icecream Screen Recorder 3.70

http://ift.tt/1Fn0nMd Icecream Screen Recorder is an application for screen capture and taking screenshots. Icecream Screen Recorder can both take screenshots and capture video and you can even switch between these 2 modes very easily; Just press the button in the top left corner of the application. Key Features Include: Video can be taken with or without system sound...


via FileHippo.com http://ift.tt/1BLa5Cb [[ We are also giving web service. Email:wasim.akh2@gmail.com]]

.NET Framework Version 4.6.2

http://ift.tt/QIHlk3 The .NET Framework is Microsoft's comprehensive and consistent programming model for building applications that have visually stunning user experiences, seamless and secure communication, and the ability to model a range of business processes. The Microsoft .NET Framework 4 redistributable package installs the .NET Framework runtime and associated...


via FileHippo.com http://ift.tt/1atwEMq [[ We are also giving web service. Email:wasim.akh2@gmail.com]]

Google Chrome 52.0.2743.116

http://ift.tt/20FGO94 Google’s game changing browser Chrome combines sophisticated technology with a simple UI, to create a faster, safer and easier browsing experience. Launched in 2008, Google Chrome quickly dominated the browser market to become the most used browser globally within 4 years of its public release. Google’s rapid and continuous development cycle ensure...


via FileHippo.com http://ift.tt/140CALb [[ We are also giving web service. Email:wasim.akh2@gmail.com]]

SMPlayer 16.8.0

http://ift.tt/R4Ml6E SMPlayer is a front-end for the mighty open source MPlayer. It comprises basic features like playing videos, DVDs, and VCDs to more advanced features like support for MPlayer filters and more. One of the most interesting features of SMPlayer: it remembers the settings of all files you play. So you start to watch a movie but you have to leave... ...


via FileHippo.com http://ift.tt/1fl8uXt [[ We are also giving web service. Email:wasim.akh2@gmail.com]]

FileZilla 3.20.1

http://ift.tt/QBoqe6 FileZilla Client is a fast and reliable cross-platform FTP, FTPS and SFTP client with lots of useful features and an intuitive graphical user interface. Among others, the features of FileZilla include the following: Easy to use Supports FTP, FTP over SSL/TLS (FTPS) and SSH File Transfer Protocol (SFTP) IPv6 support Available in many language...


via FileHippo.com http://ift.tt/13y6iuN [[ We are also giving web service. Email:wasim.akh2@gmail.com]]

[Changelog] What’s New in Google Chrome 140 and Later Versions

UPDATE: Addition of Google Chrome 147.0 version. In this exclusive changelog article, we are providing information about all versions of Goo...