AWS is Intimidating—but not in the way you think it is

AWS is Intimidating—but not in the way you think it is

No, not its size and growth, but its offerings and pricing. Thankfully, there is an alternative. AWS has hundreds of services with thousands of new functions and features added in just the last year alone. Pricing that is fiendishly complex and difficult to predict. Finally,
Trying to Embrace the Digital? Remember You Can’t Drive the Train from the Tender

Trying to Embrace the Digital? Remember You Can’t Drive the Train from the Tender

Embracing new digital technologies, or just moving to the cloud in your work is almost mandatory. Just remember, if you don’t have real buy-in from the top, your odds of success are low. Here are some steps to consider. Digital transformation is hard. Just trying

CONTRIBUTORS

Minna Wang

Using Cloud Technology In The Education Industry

Student Collaboration Arguably one of society's most important functions, teaching can still seem antiquated at times. Many schools still function ...
Determining the Economic Value of Data

Determining the Economic Value of Data

[Note: I have been trying to write this blog for several years.  But instead of trying to perfect the concept, perhaps ...
Why Your Cloud Project Needs A Strong PMO

Why Your Cloud Project Needs A Strong PMO

Cloud Project Needs A Strong PMO Cloud projects are highly complex. Without a strong project management office, they have a ...

RECENT NEWS

Amazon picks New York City, Virginia for $5 billion new headquarters

Amazon picks New York City, Virginia for $5 billion new headquarters

SAN FRANCISCO (Reuters) - Amazon.com Inc (AMZN.O) said on Tuesday it will build offices for up to 25,000 people in ...
The New Industrial Revolution – According to the WSJ

The New Industrial Revolution – According to the WSJ

The insert in today’s US print edition of the Wall Street Journal is called The New Industrial Revolution. The paper updates ...
Capgemini in Gartner Magic Quadrant

Capgemini in Gartner Magic Quadrant

Paris, November 9, 2018 – Capgemini, today announced that Capgemini (Prosodie) has been positioned as a Leader by Gartner in its ...
Pressure grows on Zuckerberg to attend Facebook committee hearing

Pressure grows on Zuckerberg to attend Facebook committee hearing

Australia, Argentina and Ireland join UK and Canada in urging Facebook CEO to give evidence to parliaments Parliamentary committees from ...
Batteryless smart devices closer to reality

Batteryless smart devices closer to reality

Researchers at the University of Waterloo have taken a huge step towards making smart devices that do not use batteries ...
dark-shadowing

Over 100 New Ransomware Families Discovered Last Year

100 New Ransomware Families

The world in 2016 sees a rapid rise of ransomware attacks that are increasingly targeting specific businesses and entire industries. A report by David Balaban for privacy-pc.com shows that ransomware attacks have occurred virtually on a daily basis in the past year. Moreover, ransomware groups develop attack techniques that use advanced methods applied in cyberespionage attacks. These attacks target specific industries or large organizations that use outdated cyber defense or are open for attacks.

Ransomware Attacks More Industries

According to a Symantec report, called Ransomware and Business, the services industry is most exposed to ransomware with 38 percent of organizational infections. Other industries that experience heavy ransomware attacks are manufacturing with 17 percent of infections followed by finance, insurance and real Estate and public administration that both account for 10 percent of ransomware infections. Nearly one third of all ransomware infections, 28 percent, occurred in the US. Other most attacked countries include Canada, Australia, India, Japan, Italy, the UK, Germany, the Netherlands, and Malaysia.

Another alarming trend is that the average ransom request now stands at $679 more than two-fold the $294 ransom demand at the end of 2015, according to the report. In 2016, some 100 new ransomware families are discovered while some ransomware groups provide ransomware-as-a-service, which greatly increases the availability of advanced attack techniques for virtually every cybercriminal.

Crypto-ransomware Is Most Common

A new trend shows that the shift towards crypto-ransomware continues and in 2016 only one variant of ransomware was not crypto-ransomware. According, to Symantec 80 percent of all ransomware was crypto-ransomware. A decade ago, the most widespread variants of ransomware were misleading applications such as fake antivirus programs that were used by the attackers to cheat the users to pay a fee for fixing non-existing infections or malware.

At a later stage, the locker type of malware replaces fake antivirus apps but is now itself being replaced by crypto-ransomware. Crypto-ransomware uses encryption techniques that are unbreakable in practice and that is why it is considered the most effective type of ransomware.

A report by Gartner also finds that crypto-ransomware is the most used method to demand ransom from organizations worldwide. Since the crypto-ransomware encrypts is attacking files and data storage devices using unbreakable encryption methods, the best passive defense is to back up data on a regular basis and apply all available security patches on time.

Protection Is Mandatory

Endpoint protection platforms can provide acceptable level of security and protection and Gartner states that no single vendor leads in all functional areas. Therefore, selecting a platform that provides journaling and file backup capabilities is a good option for any business that wants to protect itself from encrypting malware. Another advanced method for protection includes malware sandboxing where any suspicious code is first executed in virtual environment to determine whether this is a malicious programming code. Any business should also take into account a vendor’s strategy for protecting workloads in public cloud Infrastructure-as-a-Service as well as what public cloud IaaS providers are supported by the vendor of the endpoint protection platform.

Furthermore, protection should include methods to detect attacks by malware where programming languages like JavaScript, PHP, Powershell, or Python are used. Attackers used these languages to create several new ransomware families in 2016 and each protection should envisage methods to detect such malicious code.

Ransomware is becoming more sophisticated rapidly and no business should take lightly the danger of ransomware attacks. With crypto-ransomware becoming so widespread, each organization should apply all required security measures and select a feasible endpoint protection platform to defend its data.

By Kiril V Kirilov

Kiril Kirilov

Kiril V. Kirilov is a content strategist and writer who is analyzing the intersection of business and IT for nearly two decades. Some of the topics he covers include SaaS, cloud computing, artificial intelligence, machine learning, IT startup funding, autonomous vehicles and all things technology. He is also an author of a book about the future of AI and BIg Data in marketing.

Cloud Community Supporters

(ISC)²
Cisco
SAP
CA Technologies
Dropbox

Cloud community support comes from (paid) sponsorship or (no cost) collaborative network partnership initiatives.