Xylos brands

Security 4 blogposts

Being attacked by supervillain Peyta? Xylos to the rescue!

Johan Celis
28/06/2017
Enter Peyta (aka Petya or Petrwrap), the new ransomware variant that is spreading. She has many similarities to Wannacry. They both use an NSA exploit known as EternalBlue that targets a SMB vulnerability (CVE-2017-0144), for which Microsoft released a patch in March. Unfortunately, Petya has a few more tricks up her sleeve. What makes Peyta more malicious? Cyber-criminals have learned from the …

What impact will the GDPR have on your cloud endeavours?

Karim Vaes
22/06/2017
Introduction The General Data Protection Regulations or GDPR came into force in April 2016. Some people think they are a thorn in the side of cloud providers, but I beg to differ. I regard these regulations as an aid rather than a threat to investment in the cloud. What are the "GDPR" about? In essence, the GDPR define the rules that apply to using and processing personal data of EU residents. …

WannaCry? We’ll get you smiling again

Johan Celis
13/06/2017
On Friday 12 May, a new version of ransomware WannaCry hit many countries worldwide. And the attack is still not over. As long as we continue to unthinkingly open and left-click email files, this sort of problem will never go away. Anti-malware companies will grab the chance to promote their products. But, what lessons can we learn from this attack? What is ransomware? Ransomware is a form of …

Security context on mobile devices

Tim Jacobs
09/12/2011
This post examines the security context for mobile devices. Often, the assumption is made that a mobile device can be secured through a complete lock down. We will argue that from and end-user perspective, more interesting starting points for security exist.