The RLT Blog - Page 12 of 16 - Root Level Technology

The RLT Blog - Page 12 of 16 - Root Level Technology

Wannacry Ransomware

In this day and age where we’ve never been more attached to our gadgets and computers, imagine if your laptop was literally held ransom? That’s the reality thousands of individuals and corporations woke up to on the May 12th, 2017 when a global malware campaign, called WannaCry (also called WCry or Wannacryptor), began.   This malware is a ransomware variant, and some of its most notable victims are the United Kingdom’s National Health Service (NHS), Telefonica in Spain, Renault in France and some Chinese universities. This article aims to reveal key details about this rapidly growing malware threat and how to protect your computers from it.   How does WannaCry Operate? Most malware attacks are focused on security vulnerabilities on […]

Continue reading

Three Critical Steps To Protecting Your Business From Mobile Malware

  Mobile malware is on the rise. According to a recent Kaspersky survey, malicious software targeted at mobile devices increased by nearly 1.7 times between Q1 and Q2 2016. It’s an upward trend that shows no signs of slowing – and if you haven’t adjusted to it yet, it’s long past time that you do. Smartphones have, after all, become ubiquitous in enterprise. Everybody uses them, even if you think they don’t. If you get complacent and fail to secure them, you will eventually suffer a breach. It’s not a question of if – it’s a question of when. MDM, MAM, and MCM Standing for Mobile Device Management, Mobile Application Management, and Mobile Content Management respectively, these three abbreviations are […]

Continue reading

Protecting Yourself Against Five Lesser-Known Security Threats

It’d be nice if every single security threat that faced your organization was glaringly obvious – a massive botnet here, poorly-disguised malware there. Unfortunately, in the real world, things are often a bit subtler. And the threats you need to guard your enterprise data against aren’t all that clear. If you’re reading this, you’ve probably taken measures to protect things like mobile devices and desktop PCs. You’re aware of the importance of regularly-updated security software, and the need for a firewall and access controls. But you’re probably overlooking quite a few things too – and doing so could cause a breach. Here are just a few security risks you might have forgotten about – have you addressed them all? Local […]

Continue reading

Do You Have A Game Plan For IoT-Backed DDoS Attacks?

Last year, I wrote a piece about how the Internet of Things could pave the way for some of the biggest botnets in history. I take no pleasure in the fact that recent events have proven me right. From the recent attack targeting Krebs On Security (which caused him to be dropped by Akamai) to the 1 terabyte per second flood hurled at hosting provider OVH in September, things are getting worse – much worse. I’m talking entire swathes of the Internet brought to its knees. And yet efforts to hold manufacturers accountable, to demand that IoT companies start injecting more security into their products, still lag behind. To make matters worse, one of the recent attacks – the one […]

Continue reading

Criminals Are Using The Cloud – Here’s How You Can Fight Back

Not everything is peachy-keen in the cloud. Did you know that as many as 10% of cloud repositories may be infected by malware? That includes those hosted by Amazon and Google, by the way. Not even the behemoths of cloud service are immune. Or how about the fact that there exists a burgeoning malware-as-a-service industry, with virus writers offering access to malware kits that include regular updates and technical support? There now exists an entire black market for MaaS, with developers offering money-back guarantees and online reviews. It might be amusing, if it weren’t so disconcerting. These two stories together serve as a stark reminder that the cloud, while a valuable tool for business enablement, can also be wielded by […]

Continue reading