A new fake update for the Windows 10 operating system is instead hijacking computers with ransomware. The alert was raised at the beginning of this month and hundreds of people have already fallen victim to the scam, with millions more at risk. The name of the ransomware is Magniber, and once a computer has been infected, users are served a warning saying that all their files have been encrypted. For now, the victims are students and non-professional users, but what about the future? It can be a threat even for companies, like other attacks that happened before. Be protected, discover how our vendors can help you to keep your data safe. Contact us now!
Ethos Blog
Updates about the latest Tech News
Pure Storage has solutions for your Datacentre that make it more 'green' (sustainable), secure and modern. Today, we'll cover all the types of Flash Array that Pure Storage offers and decide which one is right for you. First off all, what is an all-flash array? An all-flash array (AFA) is a storage infrastructure that contains only flash memory drives instead of spinning disk drives. All-flash storage is also known as Solid-State Array (SSA). AFAs and SSAs deliver speed, performance, and agility for your business applications. For a long time, Hard Disk dominated Datacentres, but with the SSD boom, many companies started to opt for Flash memories, much faster and more efficient but expensive. Thanks to Moore's law, flash storage has become more cost-effective making all-flash versions of devices viable. Pure Storage deals exclusively with this type of all-flash Array, called the Flash Arrays or All-Flash Arrays. Pure Storage Flash Array Types...
A new malware has been identified as circulating and being sold to hackers, which is more dangerous than it appears. The 'virus' can become a tool for ransomware, DDoS attacks, and spying on computers and systems by recording audio and videos. Know more. A security company has identified this new remote access Trojan called Borat, like the Kazakh character played by comedian Sacha Baron Cohen, as malware that "provides a dashboard for Threat Actors (TAs) to perform RAT activities and also has the option to compile the malware binary to perform DDoS and ransomware attacks on the victim's machine". How does it work? Borat works as a kind of malware toolbox, with several different functions that allow different cybercrimes to be carried out. In this way, the person responsible for the attack can modify, using simple commands, the damage caused by the malware on the victim's computer, as needed. From a...
What could be worse than a hacker breaking into the entire data system of your company and taking everything from you? Certainly a hacker breaking into your data system and asking for a ransom to bring your data back. And in case you don't pay the ransom, you could lose everything. The name of this type of cyber attack is ransomware, and it can be a big problem for you and your business if you don't have adequate protection. How a ransomware attack happens What makes ransomware so difficult to detect is because it is always very ‘masked’. This malware can be installed on your computer via malicious websites, suspicious links via email, or installation of vulnerable apps. Ransomware can also appear in links sent by social networks, wildly used to spread viruses today. Once downloaded and opened, a malicious program installs itself and takes control of your data storage. One...
Nowadays having data protection together with backup, helps to easily recover them in case something happens, and is indispensable for companies that do not want to suffer attacks on their Infrastructure, which we believe is the case of your company. To prevent attacks, create backups, and keep it safe you need a reliable solution like the one Cohesity offers. What is backup? Backup is the process of duplicating data and storing it in a secure place in case of loss or damage. Ideally, this backup copy (often called a snapshot) is immutable, meaning it cannot be altered after it is created to protect against mutations such as ransomware. We have 3 types of backups: Full backups – The most basic and complete type of backup. As the name implies, this type of backup makes a copy of all data to a storage device, such as a disk or tape. The primary...