Sophos Malware Predictions for 2018

Sophos has released their prognosis for malware in 2018. You’re probably thinking that there’s no way they could predict what malware authors and hackers are going to do next year. Sophos has a methodology. The report states “It’s impossible to predict the future with 100-percent accuracy, as the threat landscape keeps changing. What you’re about to read represents our best estimates after reviewing snapshots in time, analyzing data collected 24 hours a day, seven days a week using lookups from customer computers. Much of the data was collected from those lookups in the third quarter of 2017. Data in the ransomware section covers April to October. What we saw in those date ranges is consistent with trend lines observed throughout the year. “ (more…)

net neutrality

Why You Should Care About Net Neutrality

Net Neutrality

Net Neutrality is the internet’s top principle: It protects our right to communicate freely online.

Net Neutrality is a fundamental principle in that it prohibits internet service providers like AT&T, Comcast, and Verizon from speeding up, slowing down or blocking any content, applications or websites you want to use. Net Neutrality is the way that the internet has always worked. (more…)

malware terminology

The Terminology of Malware – What You Need to Know

Computer Virus

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions. In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros (software code inside of a Word document) to execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software by corrupting or destroying data. (more…)

pulse wave

Pulse Wave is a New Technique Using an Old Attack


Before we get into the nitty-gritty of how the pulse wave attack behaves, we must first define what a distributed-denial-of-service (DDoS) and denial-of-service (DoS) is, so we are all on the same page. Instead of regurgitating text from resources on the internet I have included a nice quote from Wired.

Simple DoS attacks, performed from a single machine, are uncommon these days. Instead, they’ve been supplanted by DDoS attacks, distributed denial-of-service attacks that come from many computers distributed across the internet, sometimes hundreds or thousands of systems at once. The attacking machines are generally not initiating the assault on their own but are compromised machines that are part of a botnet controlled by hackers who use the machines as an army to target a website or system.


we heart data breach

We Heart It 2013 Data Breach Potentially Affects 8 Million Users

We Heart It is an image sharing website used by approximately 40 million people. We Heart It suffered a ‘possible data breach’ years ago. The data breach has affected more than 8 million user accounts created between 2008 and November 2013.The data contained usernames, email addresses, and password hashes, 80% of which were salted SHA-256 with the remainder being MD5 with no salt. (more…)