Remove 2021 Remove Analysis Remove Computer and Electronics Remove Encryption
article thumbnail

REvil ransomware gang hacked Acer and is demanding a $50 million ransom

Security Affairs

Taiwanese multinational hardware and electronics corporation Acer was victim of a REvil ransomware attack, the gang demanded a $50,000,000 ransom. Taiwanese computer giant Acer was victim of the REvil ransomware attack, the gang is demanding the payment of a $50,000,000 ransom, the largest one to date. billion in revenue.

article thumbnail

Free Ransomware Decryption Site Celebrates Milestone as New Threats Emerge

eSecurity Planet

” Users who click “Yes” are directed to Crypto Sheriff, a tool that matches available decryptors to the user’s encrypted files. “Ransomware enables criminals to steal all this in an instant. “The threat group has been very active since the release of Grief in the middle of May 2021,” they write.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Best Digital Forensics Tools & Software for 2021

eSecurity Planet

While several open-source tools exist for disk and data capture, network analysis, and specific device forensics, a growing number of vendors are building off what’s publicly available. This article looks at the top digital forensic software tools of 2021 and what customers should consider when buying or acquiring a DSF tool.

article thumbnail

Top Database Security Solutions for 2021

eSecurity Planet

Starting our list of the top database security vendors is the multinational cloud computing company, Alibaba Cloud. Security services and tools include anti-DDoS , SOCaaS , web application firewalls (WAF), data encryption , and more. Also Read: Best Encryption Software & Tools for 2021. Alibaba Cloud. EnterpriseDB.

Security 117
article thumbnail

The Burden of Privacy In Discovery

Data Matters

*This article first appeared on Judicature in Summer 2021. Should privacy be considered a “burden” under the proportionality analysis required by Federal Rule of Civil Procedure Rule 26(b)? With the proliferation of social media platforms and other new technologies has come a renewed legal focus on privacy. In this essay, Robert D.

Privacy 97
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Dave Kennedy started as forensic analysis and cyber warfare specialist in the US Marine Corps before entering the enterprise space. In-depth technical analysis of a new method of extracting user cardholder data from compromised websites using legit Google Analytics protocol ? — Eva (@evacide) October 4, 2021.

article thumbnail

The Hacker Mind Podcast: Reverse Engineering Smart Meters

ForAllSecure

In February 2021. And now it was like how can I contribute back to Tibet and put material out and help other people maybe join in the same way I did by not traditional means like, it wasn't really college or anything that got me into electronics. Well, that's probably when we think about it most. Here's ABCs Good morning.