How Ransomware uses TMP files and the Temp folder

In my previous blog, Why Malware Installers Use TMP files and the Temp folder, I discussed the advantages malware can have by using atomic writes instead of simply copying the malware to the intended location. In this blog, I discuss how ransomware uses the same technique for its purpose and how it is different from…

The post How Ransomware uses TMP files and the Temp folder appeared first on Speaking of Security – The RSA Blog.

Continue reading How Ransomware uses TMP files and the Temp folder

Is the cyberworld doomed to be unsafe forever?

Before seeking an answer, let’s question the question. I recently returned to the cybersecurity industry and (re)joined the good fight to secure the cyberworld. As the digital era unfolds, it feels good to be part of this mission-driven industry to help create a safe digital future. While a lot has changed, and there have been great…

The post Is the cyberworld doomed to be unsafe forever? appeared first on Speaking of Security – The RSA Blog.

Continue reading Is the cyberworld doomed to be unsafe forever?