The next two days, March 14th and 15th, the Belgian IT world is joining up in Brussels for Infosecurity. One on the seminars will be hosted by our Senior Threat Researcher David Sancho on the topic of digital extortion, on which he has written an elaborate research paper. Continue reading
According to American media unidentified hackers recently breached at least one US critical infrastructure. “Since May, hackers have been penetrating the computer networks of companies that operate nuclear power stations and other energy facilities.” (The New York Times, July 6th)
“Today we see more attacks on ICS, industrial control systems, and scada systems”, says Robert McArdle, EMEA Threat Research Lead at Trend Micro.
For years hackers have been stealing documents from your machines. No matter what… hackers will always find a way to get in. But once they get in, their problems start: how to monetize the hacked device? Of course passwords, credit card and banking details are relatively easy to monetize.
As EMEA manager within the Forward-looking Threat Research (FTR) team, he is involved in analysing the latest malware threats, specialising in researching the future threat landscape, criminal underground and coordinating investigations with international law enforcement. Continue reading
Latest research from Trend Micro, global leader in cybersecurity solutions, reveals that 20 percent of global organizations rank cyber espionage as the most serious threat to their business, with a quarter (26 percent) struggling to keep up with the rapidly evolving threat landscape. In addition, one in five (20 percent) U.S. organizations have suffered a cyber espionage-related attack in the last year. Continue reading
Apart from Infosecurity coming up, March will be all about webinars. There’s several hot topics on which we would like to share our knowledge and expertise. In these interactive webinars you will learn all about the following topics: Continue reading
Industrial Control Systems (ICS) are a hot topic in the security industry today, thanks to the prevalence of software that is often riddled with security flaws and legacy protocols that were designed without any type of security. Many of these systems were designed in a different time, when the world was quite different. ICS systems used to be isolated, Internet access was rare and expensive, and hacking knowledge was not as widespread as it is today. It would be very difficult for a programmer to have foreseen some of the security issues that have now come about. As a result, however, this often translates to cases where solutions are developed to get the most out of the system while maintaining a cost-conscious mindset. As a result, there are cases where software and protocols that were never meant to be part of an ICS system end up as part of such a system. Continue reading
In today’s connected world the targets of cyberattacks are always changing. For years, infected endpoints and huge botnets were the place to be to make profits – because this is where the data was. In the modern world most users no longer know where their data resides – it’s simply there when they need it. But the more technically skilled understand that our modern cloud-backed world is not without danger. Cybercriminals also know where to find our data, and the door is sometimes wide open for them to come and get it. Continue reading