A look at the return of the Crypt0L0cker ransomware leads the latest edition of the ISMG Security Report. Also, assuring the security of medical devices; and U.S. federal prosecutors drop charges against a child porn suspect rather than reveal the hacking technique used to ensnare him.
When it comes to massive DDoS attacks powered by the likes of a Mirai botnet, "the sky is not falling," says ESET security researcher Cameron Camp. But organizations do need to prepare - and here's where to start.
Crypt0L0cker ransomware - originally tied to the Gameover Zeus gang - has returned, researchers warn, and in some cases is digitally signed to make it appear legitimate. Other attack campaigns are spreading Cerber and Sage Locker via spam emails sent via short-lived domain names.
The state of cybersecurity is reaching an inflection point. The number of risks and events is growing exponentially, and security operation teams are struggling to keep up with the volume. The threat landscape is changing rapidly, with the sophistication and numbers of threat variants becoming too great to stay...
Resilient, an IBM Company, and Ponemon Institute are pleased to release the findings of the study on the importance of cyber resilience for a strong security posture. In a survey of 359 IT and IT security professionals in Germany, only 44 percent of respondents say their organization has a high level of cyber...
Ransomware is commonly received by the victim through unsolicited email from an unknown sender as an attachment and/or injected into a user's browser session through a web browser vulnerability, such as many of the recent Adobe Flash vulnerabilities that have been published in 2015. Early in 2016, a new approach was...
IBM announced on May 10 that it is launching a project to use its cognitive computing technology, Watson, in cybersecurity. Working with eight universities, IBM intends to train Watson on the language of cybersecurity, giving security teams an intelligent resource to assist with investigations. This is a leap forward,...
First, many retailers operate in siloed, legacy IT environments without a uniform security policy. This outdated IT infrastructure opens up risks and vulnerabilities for advanced cyber threats. Second, highly distributed and hybrid retail environments, combined with new endpoints-like kiosks, BYOD, IoT, mPOS and...
With Verizon's data breach investigations team finding that 90 percent of breaches trace to a phishing or other social engineering attack, lead investigator Chris Novak says that using multifactor authentication should be a no-brainer for all organizations.
When trying to detect which security events are malicious, analysts have long battled signal-to-noise problems. LogRhythm's James Carder describes how behavioral analytics, case management, security automation and threat intelligence can help.
The European Union's General Data Protection Regulation, which will be enforced beginning in May 2018, will affect organizations throughout the world because it applies to any company that handles Europeans' personal data, says Fred Kost of HyTrust.
To meet the increasing customer demands for effective solutions, security vendors must ensure their products work together well, says Dr. Mike Lloyd of RedSeal. This is particularly essential to achieving "digital resilience," the ability to promptly detect and respond to network intrusions, he says.
Vice President Mike Pence used a personal AOL email account while governor of Indiana to conduct official business, and his account was hacked. Live by the private email account, die by the private email account?
Yahoo CEO Marissa Mayer will lose her cash bonus after an independent investigation into security breaches at the search giant found that the company's senior executives and legal team failed to properly comprehend or investigate the severity of the attacks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.