Cyber-criminals are always looking for new opportunities to make money and steal data. Globally trending events are a tried-and-tested way of doing just this, and they don’t come much bigger than the current Covid-19 pandemic. It’s sparking a wave of phishing, BEC, extortion, ransomware and data breach attempts. And as increasing numbers of global workers are sent home, new opportunities are opening up to compromise video conferencing apps.Continue reading
Summer travel should be a respite from work, when you relax and don’t have to worry about business. And your mobile devices can help make it easier, whether it’s booking a flight or a hotel room, ordering a cab or an Uber driver, browsing websites for your next destination, connecting to family via voice or messaging, even purchasing items in a checkout line or withdrawing cash from an ATM. Continue reading
Ransomware is everywhere. The number of emails containing ransomware rose 6,000 percent since 2015. In 2016, 40 percent of all spam emails had one of these malicious programs hidden within, according to IBM. Other reports highlight the sophistication of ransomware nowadays and it’s financial impact on organizations that that become victims. In short, it’s all bad news. Or not?
A large-scale ransomware attack reported to be caused by a variant of the Petya ransomware is currently hitting various users, particularly in Europe. This variant, which Trend Micro already detects as RANSOM_PETYA.SMA, is known to use both the EternalBlue exploit and the PsExec tool as infection vectors.
For years hackers have been stealing documents from your machines. No matter what… hackers will always find a way to get in. But once they get in, their problems start: how to monetize the hacked device? Of course passwords, credit card and banking details are relatively easy to monetize.
As EMEA manager within the Forward-looking Threat Research (FTR) team, he is involved in analysing the latest malware threats, specialising in researching the future threat landscape, criminal underground and coordinating investigations with international law enforcement. Continue reading
As we bid farewell to the final days of 2016, it’s time to start looking ahead to the New Year and what we hope to accomplish within the next 365 days. Year after year, some Chief Information Security Officers (CISOs) set lofty goals of securing all data to fullest extent wherever it resides in their company’s network. However, as many New Year resolutions go, these aspirations often fall because they’re not founded on sound enterprise risk management principles. Continue reading
Last year was a big year for cyber security – and not necessarily in a good way. A few high-profile data breaches made the news, according to Network World, including several that involved health insurance companies (e.g., Anthem and Premera) and one huge breach on an important federal government office (the Office of Personnel Management). The latter especially was cause for concern, as the confidential information of almost 22 million current and former federal employees was stolen, along with the biometric data of 5 million people. Continue reading