Social media scams encompass fraudulent activities and deceptive schemes that occur across various social media platforms. These scams target users on platforms like Facebook, X (formerly Twitter), LinkedIn, and numerous others, irrespective of their age or background. They exploit individuals' trust, curiosity, or lack of awareness. Social media scams manifest in various forms, and the following are some common examples.
Directive Blogs
Social media scams are fraudulent schemes or deceptive activities that take place on various social media platforms. Users of Facebook, X (formerly Twitter), LinkedIn, and dozens of others have been victims of these attacks. These scams can target users of all ages and backgrounds, and they aim to exploit people's trust, curiosity, or lack of awareness. Social media scams come in various forms, and here are some common ones.
Maintaining network security has proven to be more difficult for organizations as time has gone on. Like the people trying to keep them out of networks they don’t have access to, hackers are increasingly using artificial intelligence (AI) to enhance their cyberattacks and achieve various malicious objectives. Here are some ways in which hackers are using AI.
Back in November of last year, we shared the news that Sidney Federal Credit Union members were being targeted by a phishing attack, and we have evidence that such phishing attacks have continued. As such, let’s review how phishing like this works and (more importantly) how to prevent it from working.
When it comes to valuable data, hackers will go out of their way to try and steal it, placing businesses in dangerous situations. In particular, healthcare data is attractive to hackers, and considering how lucrative the prospect of healthcare data is, companies need to take extra precautions to protect it. But what is it about healthcare data that makes it so attractive, anyway? Let’s dig into the consequences of potential attacks on healthcare data.
Even the solutions designed to keep businesses and organizations safe are vulnerable to the threat of a cyberattack, as when it all boils down, these tools are still software solutions, no matter how secure they might be. The company in question today—Barracuda—is a huge name in the cybersecurity industry, and it has become the victim of a zero-day exploit. Let’s go over how you can prevent your business from experiencing the same thing.
Your business’ computing infrastructure is a pretty resilient system. It has all types of tools added on to keep malicious code, bad actors, and even sabotage from ruining the good thing you have. This reliability has led to hackers changing the way that they go about their business. Nowadays, most of the attacks that affect businesses are phishing attacks. In today’s blog we will go through the elements of a phishing attack and how you can protect your business from them.
Did you know that tomorrow is World Password Day, 2023? As the result of a campaign to spread awareness of the importance of sufficiently secure passwords, it has become an annual reminder of how critical sufficient passwords are to proper cybersecurity…despite passwords not being sufficient protection on their own. In light of tomorrow’s observance, let’s take some time to review why passwords are important to get right, and what else you need to have in place.
Phishing attacks have consistently been prominent in cybercrime throughout the past few years, not only due to their efficacy but also because there are so many avenues wherein phishing can be attempted. The first that comes to mind is email, of course, but you and your team need to keep these others in mind.
Take, for instance, a phishing voicemail…dubbed, naturally, a “phoicemail.”
This past January, the Federal Bureau of Investigation issued an announcement that they had targeted and taken down the servers for a Dark Web organization responsible for the Hive ransomware group. While there is certainly cause for celebration here, one major statistic is enough reason to continue being concerned.
It hasn’t been very long since T-Mobile experienced its latest major hack, but unfortunately, here we are again. Hackers have again accessed customer data, with 37 million customers being affected amongst both their prepaid and subscription-based accounts.
Let’s dive into the situation, and what can be learned from it.
Has your business been targeted by hackers? Do you even know? Let’s face it, small businesses don’t typically worry all that much about cybersecurity. To many small business owners, they might see it as a luxury for their perceived risk. Unfortunately, the reality of the situation is that hackers and scammers are targeting small businesses more regularly than they have in the past and without some kind of dedicated cybersecurity strategy, there could be a good chance that your business could run into some problems because of it.
While security researchers do their best to find security vulnerabilities in software and systems before they are actively exploited by attackers, they can’t be successful all the time. There are too many threats and too many variables to consider, and zero-day exploits are often discovered well after they are actively being exploited by threats. How can you keep zero-day exploits from impacting your business?
With so many threats out in the world, it’s no surprise that some of them target undiscovered vulnerabilities. These types of threats use what are called zero-day exploits to make attempts at your sensitive data and technology infrastructure. What is it about zero-day exploits that you must keep in mind during your day-to-day operations and in planning for the future?
It’s the holiday season, and you know what that means: lots of gift-giving and online shopping. Regardless of what you and your family celebrate this holiday season, you should be prepared to handle the influx of phishing attacks which always surface around this time every year, including both the usual methods and the more sophisticated ones.
For millions of people, the rubber ducky is a benign reminder of childhood. Depending on when you were a child, the rendition of Sesame Street’s Ernie singing “Rubber Duckie, you’re the one,” is ingrained in your mind every time you hear the term. Unfortunately, the Rubber Ducky we are going to tell you about today has only fond recollection for people who are looking to breach networks they aren’t authorized to access or deliver malware payloads that are designed to cause havoc.
It probably isn’t a question you’ve put much thought to, but tell me: who do you think feels the greatest impact from card skimming schemes, where a payment card’s data is captured so a cybercriminal can make use of the card’s associated account? While it isn’t a good situation for anyone, some are impacted more than others.
WhatsApp is one of the world’s most popular messaging applications. With over 2 billion users, WhatsApp is known for its relative security, as it is one of the few messaging applications that offers end-to-end encryption. A modified version of WhatsApp, called YoWhatsApp, has been reportedly deploying malware.
Sometimes the worst scams out there are the simplest ones. Hackers don’t need a fancy or complicated malware or algorithm to create chaos for your organization; all they have to do is convince you that the email you’ve received in your inbox is from someone of authority within your business. Let’s go over how a business email compromise is pulled off and why you need to be wary of threats like these.
Due to the almost faceless nature of many cybercrime acts, it can be easy to see them as nothing more than the acts themselves, which is of course not true in the slightest. Behind these attacks are people, and where people performing illegal acts are concerned, there will always be concerns about other criminal acts which perpetuate the ones at the surface.
How often do you get emails from individuals claiming to be working with a business who wants to do business with yours or sell you a product, completely unsolicited and even perhaps a bit suspicious? These types of messages can often land small businesses in hot water, as it only takes one phishing email landing in the wrong inbox at the wrong time to put your business in jeopardy.
There is always the possibility that you have been involved with a data breach and you simply have not been contacted by the affected party. Plus, if a hacker has managed to crack a website or service without being detected, you wouldn’t be notified in any case, either. Ask yourself this question: if I were to be involved with a data breach, how would I know it, and what can I do about it? And what is my data being used for anyway?
How quickly do you think it takes for a hacker to react to the disclosure of bugs and vulnerabilities? According to industry experts, the time for security professionals to react to zero-day threats and vulnerabilities might be decreasing. Is your organization prepared to act when important vulnerabilities like these are disclosed?
Let me ask you a few questions—first, how confident are you that you could spot an online ruse, and second, did you know there’s a stain on your shirt right now?
Did you look?
If so, you’ve just fallen for the school playground version of social engineering, a serious threat. Let’s discuss the kind that you’re more likely to see in terms of your business’ cybersecurity.
Anyone who has a mailbox or an email knows all about junk mail. We all receive Publisher’s Clearing House entries, calls about your car’s extended warranty, promotions for items and events that you swore that you discontinued by typing “STOP”, and just needless spam that you waste your time going through and deleting. We receive unsolicited messages every single day.
We understand that cybersecurity can be difficult to think about at times because of the terminology thrown around by industry professionals, but we want to do our part to help clear up some of the confusion. Today, we’re going to discuss the difference between vulnerabilities and exploits, as well as how your organization can do everything it can to ensure that both are minimized on your company network.
If you are a frequent reader of our blog, you know all about phishing scams. They are emails and messages sent that are designed to extort money and gain access to computers and networks for nefarious purposes. The popular IT support company Geek Squad, a subsidiary of Best Buy, is the latest company caught up in such a scam. Let’s take a look at how the scam works and how you can avoid becoming its next victim.
Data breaches—any event where a business’ confidential data is viewed, copied, or stolen by an unauthorized person or party—are a serious problem. Unfortunately, they are also a serious problem that can be caused by no shortage of situations. Let’s review some of the causes of business data breaches so you’ll know what to keep an eye out for.
Cybersecurity is an important subject for a business’ entire team to appreciate, particularly when it comes to the minute differences between different terms. For instance, a layperson might hear “breach” and automatically think “security incident.” While this technically isn’t incorrect, per se, the two terms aren’t really synonymous.
Let’s take a few moments to dive into the minutiae and define these two terms more clearly.
We’ve all heard the horror stories of phishing messages—those messages where someone is trying to steal information from you, be it sensitive information or financial credentials. There are various telltale signs of phishing attacks that can be identified, if you know where to look. Let’s take a look at what the FTC claims are the best ways to identify a phishing message.
The world is full of people who would try to take advantage of your organization and its employees—or, in less gratifying words, scammers. They will do everything they can to try to fool your company and make a quick buck doing so. How can you make sure that the countless messages and phone calls you receive on a daily basis aren’t crooks trying to scam you out of house and home? It all starts with a little awareness.
The cyberattack on SolarWinds was devastating for many reasons, and Microsoft has officially uncovered yet another type of malware used in the attack on the software provider. This time, it is a backdoor threat they have named FoggyWeb. What does this threat do and why is it so important to look at this incident even now?
There are countless cybersecurity threats out there, many of which wait until very unfortunate times to strike. One such time is over extended weekends or holiday breaks, when many companies shut down operations longer than the usual two-day weekend. In fact, this is such an issue that the Federal Bureau of Investigation and CISA have issued warnings in response to them.
Data breaches are an unfortunate reality in this day and age, even during the holiday season. While it is important to do everything you can to prevent these kinds of disasters, you need to be prepared to deal with it—both in terms of your operations, and in terms of communicating with your clientele.
The holiday season is a time for merriment and good cheer, but hackers have historically used it to take advantage of peoples’ online shopping tendencies. Phishing scams are always on the rise during the holiday season, so you need to take steps now to ensure that you don’t accidentally put yourself at risk—especially with voice spoofing emerging as a threat for Amazon orders.
Twitch, Amazon’s popular streaming service where gamers and content creators broadcast to wide audiences, recently suffered a data breach. Thanks to this data breach, folks on the Internet now know just how much these content creators make, and it has exposed a whole new issue that Amazon must resolve.
Many threats immediately make themselves known on your device the second they install themselves, like ransomware and other types of malware. Others, like this newly discovered threat called MosaicLoader, discreetly install themselves in the background of your device and cause problems behind the scenes.
Have you ever wondered what it takes to hire a hacker to perform a specific task? Thanks to the findings of Comparitech, we can get a look into the average pricings of various hacking services that can be found on the Dark Web. While we would never condone ever taking advantage of such services, it’s a fascinating look into the business of cybercrime, and one that can give you an idea of just how easy and accessible it is for hackers to make your life difficult.
Ransomware is such a massive threat that all businesses should be aware of the latest news and findings regarding how it spreads and how it can be prevented. According to a recent report, the latest modes of transporting ransomware have been revealed. What can your organization do to keep ransomware off of its network? Let’s find out.
There are always going to be those who want to use your hard-earned data and assets to turn a profit. One of the emergent methods for hackers to do so is through twisting the “as a service” business model into network security’s worst nightmare. This type of security issue is so serious that Microsoft has declared that Phishing-as-a-Service is a major problem.
What would you say if we told you that someone could buy access to your organization’s network for a measly $1,000? Well, this is the unfortunate reality that we live in, where hackers have commoditized the hard work you have invested in your organization. A study from KELA shows that the average cost to buy access to a compromised network infrastructure is insignificant at best, which is why it’s more important than ever to protect your business as best you can.
Have you ever wondered how hackers manage to pull off incredible feats like bombarding networks and servers with so much traffic that they simply cannot function? None of this would be possible if not for botnets. But what is a botnet, and why is it important for your organization to understand? Let’s dive into the details.
Data breaches have become all too common for small businesses over the past several years and when it seems like there is a solution to one problem, something even worse pops up. Part of a comprehensive risk management strategy is identifying problems and doing what you can to keep them from affecting your business. Let’s take a look at the major cybersecurity threats small businesses are facing in 2021 and what you can do to keep them from hurting your business.
“Hackers are a serious threat to modern businesses” isn’t exactly a novel statement, is it? However, if a hacker was to be lurking on your network, would you know the signs to help you catch them? Just in case, we wanted to share a few strategies that can help highlight these warnings so you can more effectively catch any threats present on your network—particularly when your workforce is accessing it remotely.
Nothing is more frustrating than going to log into your device and finding out that you either cannot access it or that files you thought were there have been wiped. Unfortunately, this is the situation that many users of a specific device have recently gone through. Thanks to an unpatched vulnerability, users of Western Digital’s My Book network-attached storage device are suffering from lost files and lost account access stemming from remote access.
It doesn’t matter if you are a small locally-owned business or a larger-scale enterprise. Network security is equally important, as all businesses by default collect valuable information for hackers. It makes sense to protect your valuable assets, and your data is one of them. A recent threat called Agent Tesla is just another example of phishing malware designed to steal data from businesses just like yours.
We know, we know; you’re probably sick of seeing ransomware in headlines, and so are we, but we cannot stress enough how important having an awareness of it is for any business owner. A new study has found that businesses infected by ransomware who choose to pay up experience a different type of fallout--one that is a major cause for concern and a stark reminder that there are no guarantees with ransomware. Ever.
It seems that the last few months have been filled with major cyberattacks, particularly those taking advantage of major businesses that might not initially be considered targets for these kinds of acts. For instance, McDonald’s Restaurants was recently breached. Let’s examine the situation, and how it plays into the recent trends we’ve witnessed.
Ransomware has rapidly progressed from an irritating annoyance to a legitimate global threat, with the U.S. Justice Department officially going on the record and establishing that future ransomware investigations will be handled the same way that terrorism cases are now. Let’s review the reasons behind this policy change and how your business should respond.
The first half of this year has seen its fair share of ups and downs, especially on a global scale. With a global pandemic still taking the world by storm, it’s despicable that hackers would take advantage of the opportunity to make a quick buck using phishing tactics. Yet, here we are. Let’s take a look at how hackers have turned the world’s great misfortune into a boon, as well as how you can keep a lookout for these threats.
While it really would be a nice thing to have, there is no magic bullet for your business’ cybersecurity—no single tool that allows you to avoid any and all issues. However, there is one way to help make most threats far less likely to be successful: building up your company’s internal security awareness amongst your employees and team members. Let’s go over eleven ways that you can help ensure your company is properly protected, simply by encouraging your employees to take a more active role in guarding it.
Last weekend saw a significant cyberattack waged against the world’s largest meat processor and distributor, JBS S.A., that completely suspended the company’s operations in both North America and Australia… and as a result, has impacted the supply chains associated with the company. Let’s examine the situation to see what lessons we can take away from all this.
You’ve probably heard by now, a Russia-based hacking collective by the name of DarkSide targeted Colonial Pipeline, a company that supplies nearly 45 percent of the fuel used along the Eastern Seaboard of the United States, with a ransomware attack. Not only does this hack have an effect on fuel prices and availability, it highlights just how vulnerable much of the nation’s energy infrastructure is. Let’s discuss the details of the hack and the raging discussion about cybersecurity that’s happening as a result.
What if I told you that 92 percent of all organizations that are hit by a ransomware attack and agree to settle with the scammers, don’t ever see their data again? You’d probably say that you would never, ever pay and those that do, don’t make sense. Most people keep that stance until their choices are to pay for the data in the hopes of getting it back, or lose it completely. Let’s unpack ransomware and the strategy that hackers most utilize to deploy it: Phishing.
Few things are scarier for a modern business to consider than the idea that they will be hacked, regardless of that business’ size or industry. After all, hacking can, will, and does cause significant damage across basically all aspects of your organization. This is precisely why it is so important that—should a business be hacked—the proper steps are taken in response.
There is an entire litany of stereotypes that are commonly linked to the term “hacker”… too many for us to dig into here, especially since they do little but form a caricature of just one form that today’s cybercriminal can take. Let’s go into the different varieties that are covered nowadays under the blanket term of “hacker,” and the threat that each pose to businesses today.
We always picture hackers as these foreboding, black-clad criminals, smirking through the shadows cast in their dark room by their computer monitor. Hardened, uncaring individuals who don’t go outside very often, staring at code as if they were able to decipher the Matrix.
It’s time we give up this persona and stop mystifying cybercriminals. Why?
It only takes a few bucks and some spare time to truly hold an individual’s data hostage.
By now, everyone knows that businesses can be defined on how they approach cybersecurity. Unfortunately, even if your business makes a comprehensive effort to protect your network and data from data breaches, all it takes is one seemingly minor vulnerability to be exploited to make things really hard on your business. Let’s take a look at the major data breaches that have happened since the calendar turned to 2021.
It’s been reported that a hacker virtually broke into a Floridian water treatment facility and briefly increased the levels of sodium hydroxide in the Pinellas County water supply. Fortunately, onsite operators noticed the spike and reduced it right away, keeping the public from risk of increased levels of poison in their water. This is just the latest story in a seemingly never-ending supply of them that have to do with public utilities being at risk from cyberattacks. Today, we will take a look at this issue.
Since the beginning of the COVID 19 pandemic, it has been clear that many companies were not prepared to continue their operations remotely. This was largely due to their leadership being convinced in recent years that allowing people to work remotely would lead to a considerable reduction in production, leading them to be unprepared to shift to remote functionality. Cybercriminals have taken advantage of many organizations as a result, so today we’ll discuss what needs to be done to secure endpoints from afar.
Having success in business often relies on developing trustworthy relationships. You have to trust your vendors and suppliers to get you the resources you need, you need to trust your staff to complete their tasks without putting your business in harm's way, and you need to trust your customers to buy the products and services that you offer. Running counter to these necessary bonds of trust are people actively soliciting people’s time, energy, money, and attention for their own selfish purposes.
If you’ve been reading this blog for any length of time, you’ve seen us reference a phishing attack. Whether you are being asked by some supposed Nigerian prince to fork over money or you are getting an email by what seems to be your bank that directs you to download an attachment, you are probably a potential victim of a phishing scam. The difference between being a potential victim and a victim is knowing how to identify it. Today, we’ll give you five ways to identify a phishing message so that you—or your company—won’t be scammed.
This may be an uncomfortable truth when it comes to data security: the weakest link to keeping your data secure will be your employees. As social media giant Twitter recently discovered, despite the best technical security measures you have in place, all it takes is a break in protocol to place your client’s data and your business’ reputation at risk.
When we think of cybercrime, most people’s minds go to one of two places. On the one hand, some think about the annoying, misspelled emails that are so obviously scams, while on the other, we can’t help but think about the hacks that we see in movies, where a criminal manages to overcome the best the government can incorporate into their defenses.
With the given pandemic, a lot of people have had a bit more time on their hands, so it makes sense that many are turning to streaming services and the like for their entertainment. Unfortunately, this has not gone unnoticed by cybercriminals.
Let’s take a few moments and examine the practice of credential stuffing.
Starting in 2008, Verizon has produced a report outlining the cybersecurity incident trends that the previous year demonstrated. In doing so, they have provided a resource that gives businesses greater insights into where their cybersecurity efforts need to be focused. Let’s go over some of 2019’s trends and insights that were highlighted in the Verizon Business 2020 Data Breach Investigations Report (DBIR).
Two-factor Authentication, also referred to as Multi-Factor Authentication, or 2FA, is typically where you log in to something and have to type in a small code from your mobile device in order to finish the sign-in process. It’s really the only thing protecting your accounts anymore, so it’s critical to use it.
Windows 7 might not be supported by Microsoft any longer, but millions of people are still using PCs that run the antiquated operating system. Since Microsoft has put an end to extended support for Windows 7 OS, a couple bugs have been found. Let’s take a look at what exactly is behind these issues and discuss your options.
Cybersecurity should always be a priority for a business, and cyber criminals are always evolving their tactics. As a result, it pays to keep an eye on the horizon for the next looming threats. Here, we’re reviewing a few threats that cybersecurity professionals say that businesses should be concerned about in the near future.
Cybersecurity is becoming a massive issue for every organization due to the immense amount of data breaches that take place regularly. Businesses of all types are looking at strategies to protect their sensitive customer and employee data from hackers, malware, and any other potential danger. The problem is it’s not always as simple as just implementing cybersecurity software.
Most people have acquired much of their familiarity with what a hacker is through the mixed representation seen in pop culture today… but does this impression match up to a hacker in real life? Popular entertainment unfortunately doesn’t differentiate between different hacker types and their motivations very well, so that’s what we’ll handle here.
If you’ve spent any time using a computer, you probably know what a URL is. It is the address of a website. It typically starts with “http//:” or “https://” and directs the Internet browser on where the user would like to surf. Nowadays a threat could be created by manipulating the URL. Today, we’ll take you through this threat.
How concerned are you with your business' cybersecurity? When you envision your business in the future, do you see yourself constantly fighting cyberattacks, or paying ransom? Hopefully not, but what if cybersecurity turns into one of the most difficult parts to maintaining a steady business? Today, we will look into the future and hypothesize what your business may need to do to defend against cybercriminals.
There’s a reason that cybercrime is so popular: it is no longer reserved for those with extensive programming knowledge to profit from. Now, according to a report by Deloitte entitled Black Market Ecosystem: Estimating the Cost of “Pwnership”, there is a complete economy built around easily accessible hacking tools that don’t require specialized knowledge to leverage.
Mobile devices accompany us more or less everywhere, leading us to use them more and more frequently in all aspects of lie, including for business purposes. As a result, cybercriminals have even more motivation to target them. To help you avoid a mobile device being the downfall of your company’s security, we’ve assembled a few practices you and your staff should adopt.
One of the most masterful arts of deception that hackers use is the phishing attack, which attempts steal sensitive credentials from unwary victims. The anonymity afforded to criminals on the Internet is what makes this possible. Using phishing attacks, hackers attempt to steal credentials or personal records by forging their identities. What’s the best way to protect your business from these attacks?
Let’s say you get an email from a close friend. It looks like it’s legitimate, until you check the contents of the message. It’s an advertisement, or it’s trying to get you to click on a link to see something “important.” Regardless of what the content of the message is, you should probably slap that bad boy in the Spam section of your email inbox. You’ve just been the target of email spoofing, and it’s more common than you might think.
Any business that deals with online technology needs to be aware of the dangers that come with the territory. Hackers are more common nowadays than ever before, and organizations that don’t take a proactive approach to keeping threats out of their systems will have to suffer the consequences. Unfortunately, some organizations won’t be aware that they’ve been hacked until it’s far too late.
This holiday season might leave technology and entertainment supergiant Sony with nothing but a big lump of coal in its stocking. In a high-profile hack, hackers continue to leak Sony’s employees’ sensitive information like Social Security numbers, passports, and even personal emails. This is obviously an issue for the company, but so is its lack of IT security, as shown by their passwords being stored in a folder named “Passwords.”
Small businesses often fall into the trap of thinking that they are too small to be attacked. This misconception could ultimately cost your business too much. The fact of the matter is that all businesses have data that is worth something to hackers, and we’re here to prove it to you and offer a solution to this dilemma.
There was a time when people didn’t have to worry about getting computer viruses on their cell phones. Nowadays, with the exponential growth of mobile technologies, including application development options, mobile malware has become a problem, and it can be a big problem for your business. Today, we’ll take a look at the growing mobile malware market, from the threats to what you can do to keep it from being a problem for you.
Hopefully, you’ve heard of phishing at this point: the method cybercriminals use to scam their targets by impersonating someone that their targets would trust, requesting access credentials or other sensitive information. Did you know that there are specific kinds of phishing? Here, we’ll review one of the biggest risks to your business... spear phishing.
Network security is a priority for modern organizations of all kinds… after all, threats don’t often discriminate between the computer networks that they try to access. One kind of organization that should be especially diligent is the modern college or university. There are many different kinds of sensitive data stored there, including the personal, medical, and financial trifecta, along with intellectual property.
Today, we’ve compiled some statistics that give these threats context, as well as a list of some of the most devastating hacks from the first half of 2018. Hopefully, these lists will put into perspective just how important building a network security strategy is for your company. Here are some statistics to help reinforce just how important cybersecurity is:
Phishing attacks have been in the social consciousness now for a while, and for good reason: it is the predominant way that hackers gain access to secured networks and data. Unfortunately, awareness to an issue doesn’t always result in positive outcomes. In this case, hackers get more aggressive, and by blanketing everyone under a seemingly limitless phishing net, 57 billion phishing emails go out every year. If a fraction of those emails accomplish their intended goal, the hackers on the other end of them really make out.
Visa customers have reason to worry as a new research paper in the academic journal IEEE Security & Privacy revealed a weak spot in online credit card security that allows hackers virtually unlimited hacking attempts at Visa accounts. What's worse, the vulnerability lies in the way merchants accept online payments, meaning that there's little the average Visa card customer can do to protect themselves.
There has been a lot made in the media about the effect that movies and television has had on society. More often than not, the media that is produced is a result of the ebbs and flows that happen in society, which ironically makes the whole notion that television and movies affect society an interesting paradox. The ludicrous portrayal of criminality in media is one issue that is resoundingly debated by lawmakers and sociologists, alike.
The funny thing about ransomware is that they give them very strange names: Bad Rabbit sounds like the name of a villainous bunny who gets his comeuppance in some type of modern nursery rhyme, not malware that would ravage hundreds of European businesses. Locky seems like the son of Candado de seguridad, a character Medeco would come up with to educate kids on proper physical security. The latest in a long line of funny-named ransomware, SamSam, isn’t a pet name for your pet ferret you perplexingly named Sam, it is one of the worst ransomware strains ever, and it has caught the attention of U.S. Federal law enforcement.