Digital Forensics

Posted on Posted in Cyber Security, Ransomware

Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.The term digital forensics was originally used as a synonym for computer forensics but has expanded to cover investigation of all devices capable of storing […]

Network Forensics

Posted on Posted in Ransomware

Network Forensics Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. Network Forensics Query [inbound_forms id=”785″ name=”Network Forensics”]

Cloud Forensics

Posted on Posted in Ransomware

Cloud Forensics & Security Cloud forensics is the application of digital forensics in cloud computing as a subset of network forensics. Basically, it is a cross-discipline between cloud computing and digital forensics. As per the official definition of NIST: “Digital Forensics is the application of science to the identification, examination, collection, and analysis of data […]

Cryptowall 3.0 Threat Rising

Posted on Posted in Malware, Ransomware

The stakes are now higher as an old malware nemesis has reared its ugly head once again. Cryptowall 3.0 has been launched using yet another devious method through ‘help file’ attachments sent via email and e-fax. Appearing as a harmless ‘.chm’ file, the hidden malware was opened and at once invaded individual computers, making their […]

All About Ransomware

Posted on Posted in Ransomware

All About Ransomware In the last few years a rather nasty form of malware has been showing up in both private and business systems. Known as ‘ransomware’, these cybercriminals do not try to hide the fact that they have stolen your information and data, in fact they display a screen informing the victim of the […]

Ransomware Software Evolves

Posted on Posted in Ransomware

May 25, 2015 was the beginning of increased reports from companies all over the world, indicating a system compromise. As the panic calls came in, it appeared that there was a new ransomware problem that was very similar to the “CryptoLocker” virus, but since that had already been diffused, the fear was that this was […]

IT Legislative Compliance Review

Posted on Posted in Ransomware

Our clients have found that by having an independent, objective and internal compliance review is beneficial and improves the organisations operations. What we do to assist The advisory service  ensures that all regulatory requirements are being complied with. Common areas reviewed include: corporate governance, policy & procedures, client procedures and training. Following the review, a detailed […]

Website Audits

Posted on Posted in Ransomware

When your site is vulnerable you open your business up to all sorts of malicious attacks. If you arrived at work tomorrow and your website was down, your data gone and there was no way to do business, what would your financial loss be? Your website is infected with malware and any visitor to your […]

Ransomware Alert for Linux: Linux.Encoder 1

Posted on Posted in Ransomware

Unlike other ransomware viruses, the Linux.Encoder 1 is very specific: It attacks the administrators and webmasters of the Linux system and it is deadly accurate. The focus of this ransomware is designed to accomplish a two-fold objective: breach those administrators that have the most privileges while attacking on a psychological level in reducing the administrators […]