After channeling horror films and holding control of smart TVs for ransom, the ransomware innovation du jour involves attackers crypto-locking files using JavaScript. But security experts say IT administrators can deploy some relatively easy defense measures.
The attacker's landscape has changed yet again. What was once an era of advanced attackers seeking to gain access into an environment has been transformed by attackers who quickly smash and grab global hotel chains, for example, to pilfer millions of credit card numbers.
Download this whitepaper to explore the...
Adobe Flash security alert redux: All enterprises should immediately update - or delete - all instances of Flash Player, following reports that a zero-day flaw in the Web browser plug-in is being targeted by the new "ScarCruft" APT group.
The annual Infosec Europe conference in London included a number of information security highs and lows, from hackers in hoodies and Guy Fawkes masks to free ice cream and Mikko Hypponen revealing that he too has been pwned.
Russia's arrest of 50 suspected hackers earlier this month seems to have spooked the developers of the Angler exploit kit, an attack tool responsible for spreading ransomware and malware. But is Angler gone for good, or simply retrenching?
My initial reaction to Microsoft's announcement that it plans to buy LinkedIn for $26.2 billion in cash: I guess its massive 2012 data breach - and the loss of virtually every user's credentials - didn't hobble the company's long-term prospects.
First the hackers came for our credit cards. Now they're taking control of our TVs. Witness the latest version of FLocker - for "frantic locker" - which is designed to lock Android devices, including smart TVs.
Has your organization been the victim of a cybercrime? If so, promptly contact police to learn all options that are available to you, law enforcement officials and security experts advised during a panel at the Infosec Europe conference.
Yet another organization has acknowledged it opted to pay cyberattackers after its systems were infected with ransomware, the file-encrypting malware that has become one of the most dreaded menaces across the internet.
In the latest ISMG Security Report, our editors examine the top concerns of security practitioners gathered at Infosecurity Europe, NIST's planned revision of its cybersecurity framework and U.S. government efforts to make sure patients can securely access their electronic health records.
While awaiting new guidance from the HHS Office for Civil Rights, healthcare organizations can take several steps to help determine whether a ransomware attack is a reportable breach under HIPAA, says compliance attorney Betsy Hodge.
A federal watchdog agency will investigate whether government monitoring of medical device security controls is adequate, it announced in an update of its priorities for the rest of this year. In a separate report, it raised serious concerns about the security of the Washington state Obamacare insurance exchange.
Researchers at RiskAnalytics have watched a botnet of compromised computers in the Ukraine and Russia become a growing hive of criminal activity, playing a role in everything from ransomware and click fraud to spam bots and stolen payment card marketplaces.
Cybercrime continues to be incredibly lucrative. Yet many of the techniques being wielded by connected criminals aren't new, said security expert Mikko Hypponen of F-Secure in a keynote speech at this week's Infosec Europe conference in London.
Akamai warns of a rash of less sophisticated attempts to extort companies by threatening to strike with distributed denial-of-service attacks, which can be expensive for organizations to defend against.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.