After the breach : Garmin and WastedLocker
This week, we saw a very public example of a ransomware attack on Garmin, with their production services and products going offline from July 23rd – 27th. Garmin, with a market cap of $19 Billion saw the attack impact everything from their manufacturing activities to their consumer and commercial services. Garmin’s public-facing impacts were far-reaching, […]
Phishing Examples
Phishing, a type of social engineering, occurs when a third party attempts to obtain sensitive information via fraudulent electronic communication. Historically, this transpires through email or a text, but other communication apps can be used, such as WhatsApp, Instagram direct messages, and Facebook Messenger. Sensitive information can include usernames, passwords, credit card information, social security […]
The Definitive Guide to Malware
Neary 10 million malware attacks occurred in 2019, with nearly 450,000 new variants detected. Attacks range from phishing emails to CEO fraud, but the goal is one in the same: disruption. But first, this article is part of our Definitive Guide to Malware series: Definitive Guide to Malware How to Detect Malware How to Get Rid of Malware In […]
How to Detect Malware
Over 7 billion malware attacks were reported in 2019. Every minute, four companies fall victim to ransomware attacks, a form of malware. Learning how to detect malware and get rid of malware is becoming increasingly important for anyone who accesses the Internet and works online. In this article, we’ll cover how to detect malware on your computer, including […]
How to Get Rid of Malware
Malware, short for “malicious software,” is commonly found as a computer virus, spyware, ransomware, worm, adware, or a Trojan horse. Malware typically disguises itself as something else in order to get into your system and execute its program. If you’ve been infected, read on to learn how you can get rid of the malware on […]