Malware Articles

Stay up to date with the latest articles in Network Security
August 17, 2014

POS Malware: Review of the retail attacker

POS Malware

POS malware is attacking thousands of retailers across the U.S. Here we provide a quick overview of this massive threat.

See the three major types of POS malware, the most popular variants today, and what a typical POS attack looks like.

Continue reading

July 24, 2014

Ransomware: Hello Critroni and Goodbye Cryptolocker

Cryptolocker

Is Cryptolocker really dead? Some researchers have doubts -- even as new types of ransomware continue to attack computers across the globe.

In this post, you'll get an update on Cryptolocker and say "hi" to a new, potentially stronger brand of ransomware: Critroni.

Continue reading

July 17, 2014

Top 10 Malicious Site Hosts, Countries, and File Types

Malware

The war against malware and malicious websites never ends. But with a little intel and some firepower, your team can keep your office and your clients safe.

See the top 10 ISPs that host the most malware. Also find out which countries are rising in the malware market and which file types to watch out for.

Continue reading

January 28, 2014

Top Threats: How to prevent Cryptolocker

Cryptolocker is the notorious, ransom-charging malware that continues to stop clients in their tracks. In this profile, we cover the basic info and give you a kit that can easily help you protect clients. Continue reading
January 27, 2014

Top Malware Sites and Unsafe Servers

Hornets-nest-thumbnail[1]

Malware sites increasingly use services like Google and GoDaddy for hosting. The Washington Post even called Amazon a “hornet’s nest of malware."

These trends and others are described in the SERT Quarterly Threat Intelligence Report Q4 2013. We dig through the report to give you the top malware sites, hosting providers, and more to watch out for.

Continue reading

1 2

About Us

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology. Our customers do not waste time with security products designed for large enterprises. Instead, we make it easy for SMBs to protect and manage networks of up to 350 users.
GET STARTED
MSPRESELLER
home
contact
call us
call
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram