Category Archives: Cybercrime and Cyber Attacks

From GDPR to Game of Thrones: ‘winter is coming’ for security officers?

Astonishing results in our GDPR survey among top managers in Europe and the United States: most managers excel at foolhardiness and ignorance. Equally astonishing news last summer for Game of Thrones fans: the plot of the season 7 finale was leaked online weeks before the tv broadcast. If you think these two facts are unrelated, think again! Continue reading

When Phishing Starts from the Inside

A growing concern of security professionals is internal phishing attacks – phishing emails sent from one trusted user to another of the same organization. Internal phishing emails are used in multi-stage attacks in which an email account is owned either by controlling the users device with previously installed malware or by compromising the account credentials of the user. Internal phishing emails are used in both targeted attacks, where the aim is to steal information or commit extortion, and common with Business Email Compromise (BEC) schemes designed to steal money. Because the sender is an internal and trusted user, the recipient is more likely to take action on the email. Continue reading

What can the Dark Web teach us about security?

Ever since the law enforcement takedown of the Silk Road underground marketplace in 2013, there has been increasing interest in the depth and breadth of the Dark Web. This portion of the internet has been largely shrouded from the public eye. But it represents an environment in which hackers can converse or share malicious code and strategies. And make a profit from the information stolen during the ever-increasing cyber attacks taking place.

Continue reading

Digital Voice Assistants: New Front in War on IoT Hackers

As the Internet of Things (IoT) permeates further into our lives, the potential for hackers to line their pockets or disrupt  critical infrastructure moves increasingly from theory to practice. For those IT and business leaders looking for more guidance, check out our CLOUDSEC conference next week, 5 September. Continue reading

Hardware configurations could be the downfall of the IoT

The Internet of Things is opening up new opportunities for businesses as well as introducing a new era of convenience for consumers. And it’s happening sooner rather than later: More than 24 billion IoT devices will connect to each other and the internet by 2020, according to Business Insider, and that’s a conservative estimate. The Motley Fool noted that other tech giants are predicting anywhere from 50 billion to 200 billion IoT devices within the next three years.

Continue reading

Machine learning and the fight against ransomware

Ransomware is everywhere. The number of emails containing ransomware rose 6,000 percent since 2015. In 2016, 40 percent of all spam emails had one of these malicious programs hidden within, according to IBM. Other reports highlight the sophistication of ransomware nowadays and it’s financial impact on organizations that that become victims. In short, it’s all bad news. Or not?

Continue reading

Don’t think of keeping them out, they’re probably already in

According to American media unidentified hackers recently breached at least one US critical infrastructure. “Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities.” (The New York Times, July 6th)

“Today we see more attacks on ICS, industrial control systems, and scada systems”, says Robert McArdle, EMEA Threat Research Lead at Trend Micro.

Continue reading

Industrial Robots are hackable: how do we fix them?

Discuss cyber attacks involving robots and many people might think you’re talking about the latest Hollywood blockbuster to hit the screens. The reality, however, is that industrial robotic systems now form a vital cog in the manufacturing process of everything from silicon chips to cars and even glassware.

Continue reading