Stats & Trends
Jonathan Crowe
Nov 2015

Barks & Bytes 11.06.15: Ransomware is Booming

Photo by Source

Your weekly roundup of the latest cybersecurity news and resources.

ransomware_is_booming_2.jpg

Latest News

CryptoWall 4.0 and Chimera Latest Evolutions in Booming Ransomware Industry

Attackers are employing increasingly high-pressure tactics to extort more people into paying to recover their data. — Ars Technica 

Click to tweet this headline.

FCC Fines Cox Communications $595K Over Lack of Security that Enabled Hack

As a condition of the settlement with the FCC, the commission said Cox has agreed to adopt a comprehensive compliance plan, which establishes an information security program. — Krebs on Security 

Click to tweet this headline.

Teenage Hackers Say They've Doxed More than 2,000 Government Employees

The teenage hacktivist group who claim to have broken into the AOL email account of the CIA director are at it again. — Motherboard 

Click to tweet this headline.

Hacking Tool Swipes Encrypted Credentials from Password Manager

"KeeFarce" targets KeePass, but virtually all password managers are vulnerable. — Lookout 

Click to tweet this headline.

New Auto-Rooting Adware is Plaguing Android Ecosystem

Nearly impossible to remove, over 20,000 samples of this new trojanized adware have been found masquerading as top apps. — Lookout 

Click to tweet this headline.


Opinions & Trends

4 Common Mistakes Companies Make When Hiring for Cybersecurity

Hiring security professionals is becoming a more and more difficult and expensive investment to make. Here are four common mistakes to avoid to make sure you actually see a return. — Barkly 

Click to tweet this headline.

MacBooks Are So Hot Right Now and So is Mac OS X Malware

The number of Mac OS X malware seen this year is 5x that seen in the previous five years combined. — The Register

Click to tweet this headline.

 

Spotlight On: Classes of Malware

In case you missed it, learn all about the six types of malicious programs attackers are using to compromise their victims.

In this guide you’ll be introduced to six classes of malware, each with its own nefarious purpose and fiendish characteristics. The more you know about how these malicious pieces of software operate, the better. So read on — if you dare: 

Click here to see the Malware Monster Manual

 

To stay on top of the latest cybersecurity news and resources sign up for updates below.

Photo by: Zack McCarthy

 

Jonathan Crowe

Jonathan Crowe

Jonathan covers the latest threats and cybersecurity trends from a practical perspective.

lock-white.png

Close the gaps in your security

Stop paying for AV, get the strongest protection instead. See how Barkly blocks attacks that are getting past AV.

See a demo

Comments

Stay informed!

Get the latest security news, tips, and trends straight to your inbox.

Stay informed!

Get the latest security news, tips, and trends straight to your inbox.