5 Protective Ps to help you prevent network takeovers [VIDEO]

  • 17 March 2018
  • 0 replies
  • 6 views

Userlevel 7
Badge +54
March 17th, 2018 By Paul Ducklin
 
Recently, we’ve seen crooks using the sort of techniques typically attributed to nation-state, spy-service, secret-squirrel attackers.
 
However, instead of sniffing around carefully for days, weeks, months or years to see what secrets, passwords, intellectual property or whatever else they can get…
…these crooks go straight at money-making schemes.
 
Examples include the WannaMine worm, which uses WannaCry’s exploit-based spreading techniques to steal your CPU power and electricity to go cryptomining, and the SamSam ransomware, where crooks simultaneously encrypt as many of your computers as they can in the hope of squeezing you for a bigger payout.
 
We went on Facebook Live to explain how this new wave of cybercrime usually unfolds, and to give you Five Ps to protect yourself:
 
Full Article and video.

0 replies

Be the first to reply!

Reply