WikiLeaks will be sharing alleged CIA hacking techniques with major technology companies such as Apple and Google to allow them to develop fixes for vulnerabilities in their phones and other electronic devices, according to Julian Assange.
A massive memory leak from web services and security company Cloudflare may have exposed user data for thousands of sites. In other words: it’s time to change your passwords.
“If an attacker has a foothold in your air-gapped system, the malware still can send the data out to the attacker,” says Ben-Gurion researcher Mordechai Guri, who has spent years focusing on finding techniques for ferreting data out of isolated computer systems.
As devious as this method may seem, there is a simple way that you can protect yourself from this attack: enabling Google’s “two-factor authentication system”.
Usually, it is not the ransom itself, but business downtime and other consequences that will really disturb your business. Paying the possible ransom will of course hurt. But what will probably hurt more are the other repercussions to your business from a successful ransomware attack.