Ransomware Prevention Tips

  • Published in Research
  • Read: 2429 times

We have compiled a list of security measures to implement to either prevent ransomware or limit the damage. Organizations need not implement all of these in order to prevent ransomware. However, these are various strategies that can be implemented depending on the company. Security measures such as "application whitelisting" will prevent most malicious software on its own.  Overall, most of these strategies are best practice and should be implemented as part of a larger security framework such as SANS Critical Controls.

Read more...

Locky Ransomware Demonstration

  • Published in Research
  • Read: 2124 times

Stern Security Labs analyzed a Locky ransomware sample.  The following video shows an actual Locky ransomware attack on a Windows 7 machine.  Watch how fast the ransomware encrypts the files on the computer.  The computer is encrypted within one minute of clicking on the malicious "invoice.pdf" file!

Read more...

Locky Ransomware Analysis

We have recently received two samples of Locky maldoc (malicious document) ransomware from a healthcare institution.  Ransomware is a devastating piece of malware that encrypts important files on an infected computer and demands ransom to decrypt the files.  We will examine two samples.

Read more...

Top 10 Highlights of FDA’s Draft Guidance on Cybersecurity in Medical Devices

Background
On January 22nd, 2016, the Food and Drug Administration released a draft guidance document titled “Postmarket Management of Cybersecurity in Medical Devices”.  (Food and Drug Administration).  This important document addresses the need for security throughout the lifecycle of several medical devices.  Improving medical device security is a subset of President Obama’s February 19th, 2013 Executive Order 13636 – “Improving Critical Infrastructure Cybersecurity”.  

Read more...
Subscribe to this RSS feed