Security Awareness

­

WannaCry (WCRY) Ransomware Protection for end users and Organizations

WannaCry (WCRY) Ransomware is serious threat to business, it is a special kind of virus used by hackers to lock access to important files on user’s computers; and they ask for money to unlock the files again. Cyber extortionists trick victims into opening malicious malware attachments to spam emails that appeared to contain invoices, job

May 24th, 2017|Security Awareness|

Global Outbreak of WannaCry Ransomware (ETR-2017-C020)

E Com Security Solutions has been closely monitoring the latest ransomware outbreak that has affected several organizations around the world – which is being commonly referred to as WCRY or WannaCry. Based on our initial analysis of this ransomware – it appears to be taking advantage of a recently disclosed Microsoft vulnerability (MS17-010 – “Eternalblue”)

More than a Million Google Accounts on Android got compromised with Gooligan Malware

Is your google account hacked? Over 1 million google accounts have been compromised till now! Gooligan is an Android Malware that infects and compromised Google accounts. The malware steals authentication details and can access Google apps including Gmail, Google Photos, Google Docs, Google Play, Google Drive etc. How does

Ransomware 101 : What It Is and How You Can Protect Yourself

Ransomware is a type of malware that prevents or limits users from accessing their system. This type of malware forces its victims to pay the ransom through certain online payment methods in order to grant access to their systems, or to get their data back. Some ransomware encrypts files (called Cryptolocker). Other ransomware use TOR

German Nuclear Power Plant Infected With Malware

A German nuclear power plant near Munich reportedly was found infected with malware. RWE, the German utility that runs the facility, has confirmed that since the plant is cut off from Internet, the malware infection did not affect or harm operations, according to Reuters. Conficker and W32.Ramnit malware were discovered in unit B of the

It looks like Spotify was hacked – change your password ASAP, if you still can

If you’re one of the millions of people around the world who count themselves as Spotify users, we have some troubling news: it looks like Spotify recently suffered a security breach. A list containing hundreds of sets of account credentials was published late last week to popular anonymous text file sharing site Pastebin, and several of

FBI Cyber Warning: Ignore Your CEO’s E-Mail And Phone Her Back — Or Your Company May Pay For It

The FBI is warning people about a business email scheme which has resulted in huge losses to companies in Phoenix and other U.S. cities. Here’s how the scam works: A CEO seemingly emails an employee — typically in a finance or administrative role — instructing them to perform a wire transfer. The employee follows directions

Six Best Practices for Security Testing in the SDLC

Even if an application has been built following security and defensive coding best practices, it will still require significant testing before it's ready for release. Whether this is routine testing for common vulnerabilities or security-focused penetration testing to pick up on the types of problems that often slip through the cracks, following security best practices

Spot a Phishing Attack

  Smart companies know the best offense against security threats is a strong defense. And what type of defense is the most successful, you ask? Educating Employees! A stunning 91% of data breaches start with employees, making it essential for organizations to educate all employees on the threats associated with today's online world.