Threats 101

The Psychology of Ransomware: 5 Mind Games Criminals Play

Ransomware reached a new high in 2016 and continues to grow. But it’s not just a surge in attack volume that organizations are struggling with,...

Read More
Feb 2017
Threats 101

Are Your Employees’ Holiday Plans Putting Your Business at Risk for Phishing Scams?

Today, ransomware is delivered by 97% of phishing emails. Combine that with our recent survey findings that 1 in 5 organizations have suffered a...

Read More
Dec 2016
Threats 101

Help Desk Horror Stories: Choose Your Own IT Security Adventure

Hello Boys and Ghouls, With Halloween just around the corner we thought it would be just SPOOKtacular to share some tastefully terrifying tales of...

Read More
Oct 2016
Threats 101

Tales from the Encrypted: Ransomware Horror Stories (and the Mistakes that Spawned Them)

You're not alone. We recently asked IT pros with first-hand experience grappling with ransomware to share their stories. The tales they told were...

Read More
Oct 2016
Threats 101

A True Ransomware Horror Story (and the Crucial Lessons Learned)

Editor's note: This is the first in a series of posts we'll be sharing over the coming weeks providing tips and lessons learned from frightening...

Read More
Oct 2016
Threats 101

Multi-stage Ransomware Attacks: A Barkly Malware Research Chat

In this week’s chat, the malware research team looks at the emergence of multi-stage ransomware attacks that seek to steal information in addition...

Read More
Sep 2016
Threats 101

What is a Business Email Compromise (BEC) Attack? And How Can I Stop It?

In June, the FBI released stats that showed “business email compromise” (BEC) scams cost businesses $3.1 billion dollars. Even more troubling, the...

Read More
Sep 2016
Threats 101

Ransomware FAQ: How Ransomware Infects Your Computer

There's no question ransomware has become a prolific threat. But how does it get onto a victim's computer in the first place? According to a June...

Read More
Sep 2016
Threats 101

Understanding Exploit Kits: How They Work and How to Stop Them

What are exploit kits? An exploit kit is a tool criminals use to infect computers with malware by exploiting vulnerabilities in browsers,...

Read More
Aug 2016
Threats 101

How Malware Gets Past Antivirus

Obfuscation and process injection and encryption, oh my!  Note: Keep reading from here for a quick take on why the best way to detect malware is...

Read More
Aug 2016