According to American media unidentified hackers recently breached at least one US critical infrastructure. “Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities.” (The New York Times, July 6th)
“Today we see more attacks on ICS, industrial control systems, and scada systems”, says Robert McArdle, EMEA Threat Research Lead at Trend Micro.
For years hackers have been stealing documents from your machines. No matter what… hackers will always find a way to get in. But once they get in, their problems start: how to monetize the hacked device? Of course passwords, credit card and banking details are relatively easy to monetize.
Hell Yeah! Robert McArdle is visiting Belgium again. After his presentation at infosecurity.be (March), he now is a keynote speaker at the second Cyber Security conference organised by Heliview.
As EMEA manager within the Forward-looking Threat Research (FTR) team, he is involved in analysing the latest malware threats, specialising in researching the future threat landscape, criminal underground and coordinating investigations with international law enforcement. Continue reading
Latest research from Trend Micro, global leader in cybersecurity solutions, reveals that 20 percent of global organizations rank cyber espionage as the most serious threat to their business, with a quarter (26 percent) struggling to keep up with the rapidly evolving threat landscape. In addition, one in five (20 percent) U.S. organizations have suffered a cyber espionage-related attack in the last year. Continue reading
Apart from Infosecurity coming up, March will be all about webinars. There’s several hot topics on which we would like to share our knowledge and expertise. In these interactive webinars you will learn all about the following topics: Continue reading
Industrial Control Systems (ICS) are a hot topic in the security industry today, thanks to the prevalence of software that is often riddled with security flaws and legacy protocols that were designed without any type of security. Many of these systems were designed in a different time, when the world was quite different. ICS systems used to be isolated, Internet access was rare and expensive, and hacking knowledge was not as widespread as it is today. It would be very difficult for a programmer to have foreseen some of the security issues that have now come about. As a result, however, this often translates to cases where solutions are developed to get the most out of the system while maintaining a cost-conscious mindset. As a result, there are cases where software and protocols that were never meant to be part of an ICS system end up as part of such a system. Continue reading
In today’s connected world the targets of cyberattacks are always changing. For years, infected endpoints and huge botnets were the place to be to make profits – because this is where the data was. In the modern world most users no longer know where their data resides – it’s simply there when they need it. But the more technically skilled understand that our modern cloud-backed world is not without danger. Cybercriminals also know where to find our data, and the door is sometimes wide open for them to come and get it. Continue reading
Infosecurity, the annual highlight of IT security in Belgium, is approaching rapidly, so we thought it would be good to send you a timely reminder. And while we’re at it, let us remind you why you don’t want to miss this high mass of Belgian IT on March 22nd and 23rd. Continue reading
Infosecurity is the annual highlight of IT security in Belgium. Due to the tragic events on March 22th, it was postponed to June 15th and 16th. Hence, next week!
It’s not too late to sign up for the fair and we’ll give you three good reasons why you should! Continue reading
Infosecurity is the annual highlight of IT security in Belgium. On March 23rd and 24th, all IT professionals get together at the Infosecurity fair to meet up, exchanges ideas and expertise, discuss upcoming trends and present the latest security technologies. Continue reading