gfoulks | Falcon Technologies

New Ransomware Encrypts Victim Data

An unusual new strain of ransomware makes good on its threat, doing what the majority of other varieties only claim to do. The Trojan actually encrypts data on infected machines, effectively rendering certain files inaccessible to users on compromised computers in...

Android malware that jumps from your phone to your PC

A new and frightening form of Android malware travels from the phone to a PC, where it can then open files on a computer, as well as collect information from contacts and gather photos among other invasive actions. “We have come across PC malware that infects...

Java SE 6 End of Public Updates Notice

After February 2013, Oracle will no longer post updates of Java SE 6 to its public download sites. Existing Java SE 6 downloads already posted as of February 2013 will remain accessible in theJava Archive on Oracle Technology Network. Developers and end-users are...

What’s important on your network?

Often when you ask someone what is important on their network, they will say Everything. But that cannot be the case. You have to determine your High Value Targets first. A High Value Target is a device, system, database or resource that you cannot live without and...