Scammers these days know that the traditional clickbait and “Nigerian prince” scams don’t work as well as they used to. As people get wiser to scams, it’s become harder for hackers to sneak their attacks through their sense of security. As such, attacks have become more covert. Instead of directly asking the user to download a file or click a link, they attempt to hide the infection as much as possible for a higher success rate. One way to do this is to make a direct copy of a popular website and have everything run “as normal,” albeit with some hidden malware lurking within. Related:… Read more
How to Scan a Linux Server for Malware and Rootkit
Worms, viruses, malware and the dreaded rootkit are the very bane of every server administrator’s existence. Depending on architecture, there can be numerous options for code ne’er-do-wells to explore in infected systems, gathering sensitive information and/or costing organizations quite a lot of money in the process. Thankfully, you don’t need to fly a flag of defeat in the face of such cyber-enemies – detecting them on your server is possible, and there are plenty of tools to help you scan your Linux server for malware and rootkit. Best of all, many of these tools are free to use. Related: The Best Antivirus Programs for Ubuntu… Read more
How to Scan a Linux Server for Malware and Rootkit
Worms, viruses, malware and the dreaded rootkit are the very bane of every server administrator’s existence. Depending on architecture, there can be numerous options for code ne’er-do-wells to explore in infected systems, gathering sensitive information and/or costing organizations quite a lot of money in the process. Thankfully, you don’t need to fly a flag of defeat in the face of such cyber-enemies – detecting them on your server is possible, and there are plenty of tools to help you scan your Linux server for malware and rootkit. Best of all, many of these tools are free to use. Related: The Best Antivirus Programs for Ubuntu… Read more
Destructive Malware Cases Increased By 200% in 2019
When we cover viruses and malware, we usually discuss how the trend of malicious programs has moved away from being simply destructive tools and moved towards spying and harvesting information for profit. However, destructive malware is still very much out there. It’s just not targeting you or your home PCs anymore! Where Destructive Malware Thrives Destructive malware is a choice tool of hackers for two reasons. First, it can be used as espionage to shut down large information servers owned by businesses. Second, it can be used as a threat against someone to pay up, usually via ransomware…. Read more
Microsoft Warns of Hard-to-Spot Fileless Malware, “Astaroth”
Recently, Microsoft went into red alert after Windows came under attack from malware. The antagonist this time was a strain of fileless malware called Astaroth. We’ve covered fileless malware in the past, so be sure to study up if you’re not sure what that means. In essence, it’s when malware lives within the RAM of a computer rather than its filesystem, making it harder to detect. Let’s explore why Microsoft is up in arms about Astaroth, as well as what you should do to protect yourself. How Does Astaroth Spread? Astaroth manages to get around by using an .LNK file. This file is uploaded… Read more