by Ophtek, LLC | Oct 6, 2020 | botnets, fileless malware, malvertising, malware, Ophtek, Ransomware, spyware
The world of malware is a complex one due to the sheer variety of forms it can take. And it’s these differences which make it difficult to deal with. The term malware is generally used as an all-encompassing term to describe a piece of malicious software. But, over...
by Ophtek, LLC | Jan 14, 2020 | malware, Network, Ophtek, Ransomware, Security, Security Threats
We’ve all had to boot into safe mode on our PCs at some point and you would assume it’s a safe environment. But the Snatch malware is proving otherwise. Safe mode is a configuration mode that you can request your PC to boot into at startup. In safe mode, your PC will...
by Ophtek, LLC | May 7, 2019 | Ophtek, Phishing, Ransomware, Secure Database, Secure Flashdrive, Secure Website, Security, Updates
Ransomware has been causing trouble for businesses for many years, so it’s clearly a form of hacking which needs greater understanding to avoid its wrath. The name ransomware sounds a little threatening and, as with all hacks, it’s hardly the friendliest of exchanges....
by Ophtek, LLC | Mar 26, 2019 | Cyber Attack, Cyber Security, email security, Hackers, Hacking, malicious code, Ophtek, Ransomware, Security, Security Threats
The terminology used to describe various hacks and security threats usually includes the terms malware, ransomware and virus, but what exactly are these? It can get a little confusing when discussing the various security concerns that are floating around and this...
by Ophtek, LLC | Dec 25, 2018 | Ransomware, Security, Security Threats, Training
Hospitals deliver a crucial service where productivity is key and any downtime can be disastrous. So, what happens when they’re struck by ransomware? Healthcare providers are no strangers to ransomware as last year’s WannaCry attack demonstrated, so it would be safe...
by Ophtek, LLC | Dec 18, 2018 | malware, Phishing Email, Ransomware, Security
We’re all aware of the dangers of opening suspicious files, but what happens when hackers develop the skills to unleash malware without infected files? Due to the popularity of file-based attacks, most security software concentrates on combating this particular avenue...