Filecode: Holding your data to ransom

Trojans that encrypt user files and try to extort a ransom from the victim in exchange for a decryptor utility are nothing new: in fact, they have been around for several years. These “Filecoders”, as we call them, are a prevalent category of ransomware, the other common type of ransomware being lockscreen scareware ransomware that locks your desktop, displays a massage designed to look as it comes from local law-enforcement and, again demands a payment in order to regain access to your computer. Download this white paper to learn how to protect yourself from Trojans and other malicious attacks.

Spotlight

Blackstone Technology Group

Blackstone Technology Group (www.bstonetech.com) is a privately-held, global IT services and solutions firm founded in 1998. We are headquartered in San Francisco with additional offices in Denver, Houston, Colorado Springs and Washington, DC. Blackstone’s mission is to implement innovative IT and business process solutions that help clients address industry challenges, achieve cost containment, and transform client’s business models within the commercial and public service marketplaces. Blackstone has garnered an impressive track record of delivering successful results, with a noteworthy client list that includes many Fortune 1000 businesses and the US Federal Government.

OTHER WHITEPAPERS
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

Adobe Primetime Advertising Security Overview

whitePaper | December 30, 2022

At Adobe®, we take the security of your digital experience and assets seriously. Security practices are integrated into our internal software development processes, operations, and tools. Our cross-functional incident response teams are proactive and nimble in preventing, detecting, and responding to incidents. Furthermore, our collaborative work with partners, leading researchers, and other industry organizations helps us stay updated with the latest threats, vulnerabilities, and security best practices; thereby enabling us to continually build security into the products and services we offer and regularly incorporate advanced security techniques into our product and service offerings.

Read More
news image

ScienceLogic Global Security

whitePaper | September 30, 2022

As organizations become more digital in nature, securing the data becomes a top-of-mind priority given the cybersecurity challenges. ScienceLogic is committed to making the necessary investments in security and providing the transparency to gain the trust of our customer and partners.

Read More

Spotlight

Blackstone Technology Group

Blackstone Technology Group (www.bstonetech.com) is a privately-held, global IT services and solutions firm founded in 1998. We are headquartered in San Francisco with additional offices in Denver, Houston, Colorado Springs and Washington, DC. Blackstone’s mission is to implement innovative IT and business process solutions that help clients address industry challenges, achieve cost containment, and transform client’s business models within the commercial and public service marketplaces. Blackstone has garnered an impressive track record of delivering successful results, with a noteworthy client list that includes many Fortune 1000 businesses and the US Federal Government.

Events