logo
episode-header-image
Dec 2022
7m 46s

Ransomware (noun)

N2K Networks
About this episode

Malware that disables a system in exchange for a ransom, usually by encrypting the system's data until the user pays for the decryption key.

CyberWire Glossary link: https://thecyberwire.com/glossary/ransomware

Audio reference link: https://watch.amazon.com/detail?gti=amzn1.dv.gti.d6a9f744-47b0-ac70-aa56-b31fd0f58482&territory=US&ref_=share_ios_season&r=web

Learn more about your ad choices. Visit megaphone.fm/adchoices

Up next
Jul 8
adversary group naming (noun)
Please enjoy this encore of Word Notes. A cyber threat intelligence best practice of assigning arbitrary labels to collections of hacker activity across the intrusion kill chain. Learn more about your ad choices. Visit megaphone.fm/adchoices 
10m 17s
Jul 1
BSIMM (noun)
Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/bsimm⁠ Audio refere ... Show More
6m 9s
Jun 24
OWASP vulnerable and outdated components (noun)
Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer vers ... Show More
8m 4s
Recommended Episodes
May 2016
Daily: Ransomware & DDoS combining. Malicious USB chargers. Cyber ops aren't 'bombs?
In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but ... Show More
12m 45s
Feb 2024
A Global Police Operation Just Took Down the Notorious LockBit Ransomware Gang
LockBit’s website, infrastructure, and data have been seized by law enforcement—striking a huge blow against one of the world's most prolific ransomware groups.Read this story here. 
9m 18s
Mar 2023
Device trust (noun) [Word Notes]
The process of verifying that a device is known, secure, and uncompromised before allowing it to connect to a network or access resources. CyberWire Glossary link: https://thecyberwire.com/glossary/device-trust Audio reference link: “Favorite Scene of Alan Rickman from Die Hard.” ... Show More
6m 44s
Jul 2023
135: The D.R. Incident
Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks us through what happened and the incident response procedures that he went through. Breakmaster Cylinder’s new album: https://breakmastercylinder.bandcamp.com/album/ ... Show More
42m 38s
Jan 2020
Spying Antivirus Software — Most Interesting Thing in Tech
It turns out your antivirus software might be spying on you too. The more we learn about privacy, the less it seems we have. Here's the story about Avast and its subsidiary, Jumpshot: https://www.vice.com/en_us/article/qjdkq7/avast-antivirus-sells-user-browsing-data-investigation ... Show More
3m 53s
Aug 2021
Norton, futur mastodonte des antivirus ?
La cybersécurité est une composante plus qu’essentielle quand on parle d’internet de nos jours. Et le premier bouclier de base n’est autre que l’antivirus, à partir du moment où l'on télécharge quoique ce soit et que l'on fouille un peu trop profondément sur internet. Au final, p ... Show More
2m 37s
Jul 2016
Daily & Week in Review: Classified info--goose sauce, gander sauce. Security industry buoyed by Avast, AVG.
In today’s podcast, we talk through the ramifications of Android encryption issues. Experts consider the implications of D-Link vulnerabilities for IoT security. The Wendy’s paycard breach has gotten much bigger. Familiar exploits circulate in the wild, and Mac backdoors make a c ... Show More
21m 34s