|How do you perform on a test that explores whether you're vulnerable to common viruses? |
How are we testing?:
We use the older Zbot virus, an infamous strain that once targeted many commercial and retail banks, stealing millions of dollars. Our test only downloads enough data to trigger your network security system; it stops the virus download before it can infect your system. All anti-virus engines should detect and block this common virus at the network level or at the endpoint, even when delivered from a trusted or unknown CDN.
Why is this test important?:
Most websites, good and bad, are hosted on content delivery networks. Inline anti-virus engines using ICAP are typically setup to look only at selected content - and rarely inspect any content that is coming from a known content delivery network. Criminals take advantage of this setup by compromising legitimate websites as a way around security solutions. Without inline protection inspecting all traffic, including that from 'trusted' content delivery networks, your users are vulnerable to even old, common internet threats.
Viruses Now Demand 'Ransom'
Viruses are software malicious programs performing unauthorized functions on your devices. In 2014, a virus called Cryptolocker, one of the early Ransomware variants, extorted more than 400,000 people by encrypting their files until they paid $300 to get them back. Even with a small percentage of ransoms paid, the criminals still earned more than $4 million.Source
|In the News:|
05 Jul 2017
KIEV (Reuters) - The Ukrainian software firm used to launch last week's global cyber attack warned on Wednesday that all computers sharing a network with its infected accounting software had been compromised by hackers. The attack used a virus, dubbed ...
29 Jun 2017
The affected hospitals are said to be routinely functioning now following the cyber attack; news comes as new virus wreak havoc on the globe.
28 Jun 2017
Reports that the computer virus was a variant of Petya suggest the attackers will be hard to trace. Petya was for sale on the so-called dark web, where its creators made the ransomware available as “ransomware as a service” — a play on Silicon Valley ...