Google has just released a report that in 2015 an estimated 800,000 sites were infected with drive-by download malware and other malicious content. The study specifies that 16,500 websites were newly attacked each and every week which adds up to this whopping total of 800,000 compromised sites.
The latest count from the Identity Theft Resource Center (ITRC) reports that there have been 227 data breaches recorded through April 5, 2016, and that more than 6.2 million records have been exposed since the beginning of the year. The total number of reported breaches has increased by 50 in the past two weeks.
Cyber attackers have gone back to the basics with the release of a new strain of ransomware malware that locks up compromised devices without encrypting files. Now they just lock up your business’ devices and hope you pay. Securolytics partner Cyphort Labs discovered the threat- here is what you need to know.
Hollywood Presbyterian Hospital is an old and respected medical center deep in the heart of Hollywood. Its stucco buildings and the nurses and doctors within its walls have been healing and caring for Hollywood residents since 1924. On February 5th, they experienced what all Health Care facilities fear. Their technology infrastructure came to a grinding halt.
Data Loss Prevention (DLP) technologies identify, monitor and protect data in use or in motion on the network, as well as data at rest in storage or on desktops, laptops, and mobile devices. While organisations are more successful at filtering incoming malicious content and deflecting unauthorised entry attempts, they are lagging behind with implementing technical
Business owners are becoming more and more aware that their companies are losing productivity when employees shop and social network on company time. To counter this- Web Filtering is becoming a necessity no longer a luxury. It allows for increased productivity with advanced, real-time content filtering and the ability to block access to the websites
Many organizations use content filtering software to block inappropriate web sites. However, the threats on today’s Internet have changed. The Internet remains the primary vector used to deliver viruses and malware and it remains the primary vector used for downloading pirated content. According to the American Bar Association, employers may be liable “for allowing or
Our latest newsletter illustrates just how powerful the Cloud has become in the global business community. It is no longer a question whether a business should utilize the Cloud, those days are over… Now we are calculating how much money an organization will save. Teknas is in the forefront of building new Cloud solutions and
Securolytics offers multiple integrated security services. Recently we extended our portfolio with a new advanced add-on to our Web Security called- Advanced Threat Defense. This service allows us to detect and stop zero-day exploits and Advanced Persistent Threats (APTs) while users are surfing the Internet through our cloud infrastructure.
The Internet Content Adaptation Protocol was first proposed in 1999, however it’s perhaps one of the lesser known protocols on the Internet. ICAP is defined in RFC 3507 whose basic premise is to provide sideband content filtering/modification of HTTP requests. It would normally be used in conjunction with a web proxy/cache. Its most common use would perhaps be to
The Advanced Threat Defense engine in Securolytics Web Security recently detected and blocked downloads of an executable file that we found very interesting. The blocked file was the installer for a program called ReimagePlus. We thought it would be useful to provide some analysis of this program to illustrate how Securolytics Web Filtering is able to
On October 07, 2015 our platform monitoring systems detected a new wave of spam emails with malicious doc files. The decoy, which purported to be an Amazon invoice, was directly attached to an email targeting small businesses. The originator field was email@example.com and each email had an attachment with name like amazon_invoice.doc.