TG Soft Cyber Security Specialist - Vir.IT eXplorer: AntiVirus, AntiSpyware, AntiMalware, AntiRansomware and Crypto-Malware protection
Detects viruses and malwareIdentifies polymorphic viruses thanks to DEEP SCANMacro Virus AnalyzerINTRUSION DETECTION TechnologyVirus/malware removal toolsInstallation on Active Directory16/32/64 bit Real-Time ProtectionVir.IT Scan MailVir.IT Console Client/ServerVir.IT WebFilter ProtectionAutomatic Live-UpdateVir.IT Personal FirewallItalian Tech SupportAntiMalware Reserch Center

Submit suspicious file
fb rss linkedin twitter


Vir.IT eXplorer PRO pass the test VB100 2019-02



EICAR Membro SERIT - SEcurity Research in ITaly

03/10/2017 10:27:37 - "Ransomware... WannaCry and Petya/NotPetya but not only... how they attacks and how defend myself!"... The CRAM of TG Soft seminary for CNA partners but not only.

The C.R.A.M. (Centro Ricerche Anti-Malware di TG Soft), was invited to CNA of Padua with a seminary on Cyber Security, that will take place in:

CNA Padua  - Via Croce Rossa 56 - on Thursday 19 October

The main topics of informative Seminary will be Ransomware / Crypto-Malware:
"Ransomware... WannaCry and Petya/NotPetya but not only... how they attacks and how defend myself!"

Anti-Ransomware technologies to defend our most precious data from Crypto-Malware attacks also by the new generation variants.

The Seminary promoted by CNA of Padua, will take place on Thursday 19 October from 6:30 till 8:00 p.m. and will be included between DIGITALmeet events from 19 to 22 October 2017.
Besides it will be included among ECSM  (European Cyber Security Month) that CLUSIT coordinates italian events.
Click here to go to registration page for the Seminary of TG Soft



Clicca per ingrandire l'immagine
the cooperation of:

Clicca per ingrandire l'immagine..

Promoted by

Seminario Sicurezza Informatica del CRAM di TG Soft presso CNA Padova

Under the auspices

Clicca per ingrandire l'immagine..

Included among ECSM (European Cyber Security Month) initiatives and it will be part of the events of DIGITALmeet from 19 to 22 October 2017 

Clicca per ingrandire l'immagine.. Clicca per consultare gli eventi in programma al DIGITALmeet...                Clicca per ingrandire l'immagine..


The conference technical and popular nature and aims to present to the public the state of the Crypto-Malware / Ransomware encrypting the SERVER PC and data files to request a ransom generally in BitCoin.

It will be made an overview of the main groups / types of Crypto-Malware that between 2012, the time of their appearance, and the third quarter of 2017 have spread most in Italy, included the most known WannaCry and Petya/ analyzing the method of dissemination and the damage they have caused.

the overview of the main infection methods used, with real examples and, for each of these methods we will be presented behaviors suitable to avoid infection and / or to combat it effectively.

It will then proceed to show a real attack by Crypto-Malware and what happens if:

  • the PC / SERVER does not have a protection system capable of signaling the attack
  • the PC / SERVER was present a heuristic behavioral protection system that is able, then, to report and mitigate the effects of the attack also by new generation variants not yet identifiable by the method of identification signatures.

back to top


The main topics in the informative seminary

The main points of the presentation will be:

  1. What are the Crypto-Malware:
    • What goals they pursue.
    • How they spread.
  2. Overview of the main types / families of Crypto-Malware spread in Italy:
    • WannaCry, CryptoLocker; CTB-Locker; TeslaCrypt; CrySis; Petya; Locky (Zepto, Odin, Osiris etc. etc.); Cerber
    • Etc. etc
  3. Statistics dissemination of Crypto-Malware in Italy.
  4. How to defend our most precious data from Crypto-Malware attacks also and above all by the new generation variants:
    • Why my antivirus is not able to advance intercept these attacks?
    • Why the traditional BackUp systems on many cases are not enough?
  5. Simulation of a Crypto Malware attack in the absence of adequate protection systems
  6. Simulation of new generation Crypto Malware attack on PC / SERVER where there is a heuristic behavioral protection system.
  7. What to do in case of data they were encrypted and does not possess backups for recovery. NOT pay or pay ... that is the question!
  8. Questions and answers.

WannaCry nuovo attacco ransomware che sfrutta una vulnerabilità dei S.O. Windows per la sua diffusione
Clicca per ingrandire l'immagine

CryptoLocker alias Crypt0L0cker...
Clicca per ingrandire l'immagine

Nuova variante di CryptoLocky che cifra i file in .ODIN...
Clicca per ingrandire l'immagine

Clicca per ingrandire l'immagine dell'Alert su CryptoCerber 3...Clicca per ingrandire l'immagine

Back to top

The seminary "Ransomware... WannaCry and Petya/NotPetya but not they attacks and how to defend myself!" will have as speakers

Eng. Enrico Tonello
=> co-author of software Vir.IT eXplorer PRO. He Graduated in engineering in Padua, antivirus researcher for 20 years.

=> He published several articles on cyber virus and malware and technologies to prevent it in a technical magazine, as Security Evangelist  and many other.

Federico Girotto
=> responsible for technical support of TG Soft.

Clicca per ingrandire l'immagine...Clicca per ingrandire l'immagine

To whom is addressed the Seminary

After considering the issues addressed which are widespread and dangerous it turns to:
  1. Technicians of computer companies and systems analysts.
  2. End users and SMEs in particular.

How to take part to Seminary "Ransomware... WannaCry and Petya/NotPetya but not only... how they attacks and how to defend myself!"

Clicca sull'immagine per accedere alla pagina di iscrizione al Seminario...

Partecipation to Seminary is free, you'll need just to register accessing the page CNA Padova

Studies of C.R.A.M. Research Centre Anti-Malware of TG Soft

During seminary "Ransomware... WannaCry and Petya/NotPetya but not only... how they attacks and how to defend myself!" it will be presented in a popular form some of the studies carried out by C.R.A.M. Research Centre Anti-Malware:

CRAM App Analyser
Research Centre Anti-Malware of TG Soft S.a.s.
Any information published on our website can be used and posted on other websites, blogs, forums, facebook and/or in any other form both on paper and electronically so long as you always cited source explicitly "Fonte: C.R.A.M. by TG Soft"
fb rss linkedin twitter

Legal & Eula | Privacy | Uninstall

TG Soft S.r.l. - via Pitagora 11/B, 35030 Rubàno (PD), ITALY - C.F. e P.IVA 03296130283