What is Ransomware?

Ransomware is a computer program or application that holds its users to ransom in order to access their data or applications, most ransomware encrypts user data through public-key cryptography to prevent the users from being able to circumvent the ransomware ransom. Ransomware often has a screen or ransom note displaying the required steps the user must undertake to decrypt or access their files, sometimes the ransomware may include a decrypting tool that requires a password or key for the user to decrypt their files. How did I get Ransomware? Ransomware is often installed by a user inadvertently or for large… Continue reading What is Ransomware?

What is a Software Supply Chain Attack?

There are essentially two types of software supply chain attack, Software Compromise to third party components of software, Watering Hole Attacks Watering Hole Attacks Software products have many facets and features that require real human capital and investment to implement. As a compromise in software development, software vendors may use code from third party libraries, plugins or even adapt existing software to reduce investment and enhance their product offering. In cases where software vendors do not produce all parts of their applications they rely on the trust and value the third party software they have incorporated in to their product… Continue reading What is a Software Supply Chain Attack?