ShieldFS – Ransomware resilient filesystem

Italian researchers have developed a Windows drop-in driver and custom filesystem that are capable of detecting the telltale signs of a ransomware infection, stop any malicious actions and even revert any encrypted files to their previous state. Called ShieldFS, this new project is the work of seven researchers from the Politecnico di Milano University and was… Continue reading ShieldFS – Ransomware resilient filesystem

Petya Ransomware : Initial Analysis

Petya is a family of encrypting ransomware that was first discovered in 2016. The malware targets Microsoft Windows-based systems, infecting the master boot record to execute a payload that encrypts the NTFS file table, demanding a payment in bitcoin in order to regain access to the system. Here’s a summary of the NotPetya outbreak: The malware uses a bunch of tools to move through a network, infecting… Continue reading Petya Ransomware : Initial Analysis

How malware gets into mobile applications 

Malicious software on popular mobile platforms such as iOS and Android is at best a nuisance and at worst a security threat to individuals and businesses. Known as malware, some perpetrators use it to infect apps and get inside your smartphone. Why do they do it? Money, mostly. The recent Judy malware, for example, was reportedly… Continue reading How malware gets into mobile applications 

Ways to secure yourself against hackers

Deleting traces from old devices When you’re getting rid of your old computer, simply deleting your data from it is not enough. Even if you use the format command to wipe the hard disk clean, the data can be recovered using simple, free software. The only way to make sure your data remains inaccessible is… Continue reading Ways to secure yourself against hackers

How does an antivirus work?

When acomputer virusinfects a computer, it must make changes tofileson your computer, critical areas like theRegistry, or sections ofmemoryto spread or damage the computer. An antivirus program protects a computer by monitoring all file changes and the memory for specific virus activity patterns. When these known or suspicious patterns are detected, the antivirus warns the… Continue reading How does an antivirus work?

This Free Tool Helps Recover Windows XP PC Hit by WannaCry Ransomware

A developer has released a tool to fight the WannaCry ransomware, which started affecting PCs worldwide last Friday and has helped hackers gain control over 300,000 systems. The tool released can potentially reverse the effects of the ransomware and free files on a system. The WannaKey software will allow users hit by the WannaCry ransomware and running Windows XP… Continue reading This Free Tool Helps Recover Windows XP PC Hit by WannaCry Ransomware

Wannacry: Detailed analysis (part 3 of 3)

​Ransomware itself typical The actual ransomware component itself is not all that remarkable, it does what ransomware does, encrypts a widerange of files and demands ransom, to be paid in bitcoins in a most insistent way. Here is a list of some of the files it encrypts. Expect more of the same to come What… Continue reading Wannacry: Detailed analysis (part 3 of 3)