Equifax announced a massive breach that could impact at least 143 million US consumers.That’s 44 percent of the US population. This breach will have a significant impact on a lot of people. Continue reading
“Starting October, Chrome will show a “NOT SECURE” warning when users enter text in a form on HTTP pages.” That was an e-mail recently sent out by Google. If you’ve ever bought anything online, checked your bank accounts through the app, or logged on to your favorite social media network, you’ve used a technology called SSL/TLS. Meet the S in HTTPS.
Ransomware is everywhere. The number of emails containing ransomware rose 6,000 percent since 2015. In 2016, 40 percent of all spam emails had one of these malicious programs hidden within, according to IBM. Other reports highlight the sophistication of ransomware nowadays and it’s financial impact on organizations that that become victims. In short, it’s all bad news. Or not?
Security researchers from TrendLabs discovered ANDROIDOS_GHOSTCTRL.OPS / ANDROIDOS_GHOSTCTRL.OPSA and named this Android backdoor GhostCtrl as it can stealthily control many of the infected device’s functionalities. Continue reading
Discuss cyber attacks involving robots and many people might think you’re talking about the latest Hollywood blockbuster to hit the screens. The reality, however, is that industrial robotic systems now form a vital cog in the manufacturing process of everything from silicon chips to cars and even glassware.
A large-scale ransomware attack reported to be caused by a variant of the Petya ransomware is currently hitting various users, particularly in Europe. This variant, which Trend Micro already detects as RANSOM_PETYA.SMA, is known to use both the EternalBlue exploit and the PsExec tool as infection vectors.
A ground-breaking new study from Trend Micro has revealed for the first time the size and maturity of the online fake news business, where a 12-month campaign to influence the result of an election could cost as little as €357.700.
The comprehensive 77-page report breaks down the key steps used to influence public opinion: from reconnaissance of the target audience and weaponisation – preparation of the fake story – to delivery and exploitation via social media, and sustainment with additional propaganda. Continue reading
The Wannacry ransomware has been keeping us busy for several days now. This software has infected systems worldwide by exploiting an older (already patched) Windows vulnerability. Though many may wonder how a vulnerability that has been patched can still infect so many systems worldwide, it appears that the attack hasn’t brought in much money yet. Considering the attack and the errors made by the criminals, I wonder if this attack hasn’t been a first test or a general rehearsal for a much bigger attack. Continue reading
Have you ever thought of the internet as an iceberg? There are some good reasons to do so. What we can see is only a minor part of the total internet. Underneath is an invisible part, which forms the majority of the internet sites worldwide. We call this invisible part the ‘deep web’, with part of it being the ’dark web’. Deep and dark, like… the underwater part of an iceberg, indeed. Continue reading