Ransomware

After Atlanta SamSam Ransomware Attack, Learn How to Better Protect your Agency premium
Another day, another government ransomware victim. On March 22nd, 2018, the city of Atlanta found itself locked out of computers across government offices and facing a ransom demand of $51,000 or $6,800 per computer, GCN reported. The attack affected internal systems and citizen-facing apps that residents use to pay bills and access court-related information. The […]
premium
DLT Solutions
Breakthrough in Ransomware Prevention is Good News for Government Agencies premium
Ransomware is quickly becoming the favored means for criminals to extract a profit from unsuspecting villains – most notably in the public sector. Throughout 2017 ransomware grabbed the headlines – WannaCry, Petya, etc. – both of which targeted government agencies. When they succeed the implications can be serious. Licking County in Ohio fell victim to […]
premium
DLT Solutions
July 3, 2017
Don’t Pay the Ransom: How to Protect your Networks Against Petya premium
Another nameless, faceless adversary (or as the U.S Army calls them “the enemy with no face”) struck again in the last week of June. Hot on the heels of WannaCry attack in May, the Petya ransomware campaign brought widespread disruption to organizations, government agencies, and infrastructure worldwide. Like WannaCry, the ransomware targets Windows systems, encrypts […]
premium
Jeremy Young
Vice President of Cybersecurity
June 7, 2017
[Report] The New Cyber Threat Landscape: Tactics are Getting Simpler, Outcomes are Becoming Unprecedented premium
It will come as no surprise to anyone that 2016 saw an alarming increase in targeted attacks aimed at politically motivated sabotage and subversion. This new level of ambition by cyber criminals is corroborated by the annual Internet Security Threat Report from DLT partner, Symantec. The perceived success of several campaigns – particularly the U.S. […]
premium
Government Tech Writer
May 18, 2017
How to Protect Your Agency Against WannaCry-Style Ransomware Attacks premium
As the worldwide fallout of the WannaCry ransomware virus continues and the blame game starts, the worldwide attack underscores the need for basic security hygiene, updating of operating systems, and regular patching writes DLT Chief Cybersecurity Technologist, Don Maclean. Unpatched software is one of the most significant vulnerabilities in the enterprise. Even though Microsoft released […]
premium
Government Tech Writer
May 15, 2017
What You Need To Know About The WannaCry Ransomware Virus premium
On May 12 a ransomware virus, WannaCry, was released on the Internet and rapidly spread to hundreds of thousands of Microsoft Windows based computers in over 150 countries.  The malware encrypts critical files on a computer, such as Excel, Word, and other important files, and seeks out backup copies for encryption as well.  Once it […]
premium
Don Maclean
Chief Cyber Security Technologist
October 28, 2013
Technically News – 10/28 premium
This week in Technically News: What To Do When Your Computer Gets Kidnapped By Ransomware; Why the US Government Needs a “Digital Core”; Google or Microsoft? Army Users Get Choice; 8 Areas for Improvement in Securing Critical Infrastructure; Stabilizing DHS Cybersecurity Leadership
premium
NewsJosh@dlt.com'
January 31, 2013
Mobile Malware is the New PC Malware premium
In 2004, Cabir became the first mobile-based worm, infecting Symbian-based devices including old Samsung and Nokia models. Although it was developed as a proof-of-concept, within a year Cabir helped spawn mobile malware including the first mobile Trojan (Qdial) and mobile application hack (Skulls). Today, explosion of smartphones and tablets has spawned an entirely new hacking industry – one that has the potential to bypass your current cybersecurity strategies if you have not included mobile protection.
premium
josh.davis@dlt.com'
December 12, 2012
GovDefenders Wednesdays: What is Ransomware & Why Is It a Threat? premium
The Ransomware Threat Neal Stephenson’s most recent novel REAMDE is a 1,000-page technology thriller that I recommend to those of you who enjoy complex novels. Stephenson develops the plot from the consequences of a hacker in Asia who uses ransomware to encrypt a hard drive containing a list of thousands of stolen credit card records. The hacker promises a decryption key to unlock the hard drive upon payment of a ransom fee. What the poor hacker does not realize is that the Russian mafia had previously purchased the stolen credit card data for a large sum of money and now cannot use it. As you may surmise, mayhem ensues across several continents.
premium
blogs@dlt.com'