U.S. prosecutors have accused a 34-year-old North Korean man of involvement in some of the most destructive and profitable cyberattacks ever seen, including the WannaCry ransomware outbreak, the Sony Pictures Entertainment breach and the theft of $81 million from Bangladesh Bank.
Cybercrime is a global and systemic problem that's growing exponentially. High-profile attacks can be committed with less sophistication because of services for hire readily available on criminal forums. This has resulted in making the methodology and attack vectors mainstream. The impact of new types of crime, as...
Cybercriminals have a seemingly unlimited arsenal of attack types at their disposal, ranging from identity theft and CEO fraud to botnet attacks and even clairvoyant scams. However, criminals' goals, by and large, remain unchanged: to profit as quickly and easily as possible. In this session, a senior detective from...
Will the Equifax breach upend the rules of the data breach notification game? Will it even be discussed in another year? Already, the breach is leading to tough questions about how personal data gets stored, sold and secured - or not - in the United States. Equifax also should consider itself lucky that it didn't lose...
The financial risks to organizations from data breaches come from a variety of angles, from share price hits to class-action lawsuits to fines from regulators to reputational damage. As a result, the insurance industry has jumped full steam ahead into cyber. Larger insurers are already helping companies spot and...
Detective Constable Raymond Black of the Met Police's FALCON Cyber Crime Unit has been an investigating officer for numerous high-profile hacking cases in Britain. Black offers several high-profile takeaways from cases investigated by FALCON and describes how law enforcement pursues cybercrime perpetrators and...
After a breach, businesses need to know their incident response from their digital forensics. Hint: Forensics enables organizations to know what happened, when and how, to guide incident responders as they defuse the problem, block further exploits and quickly restore all systems and data. Incident response expert...
We all know how fragile our digital identities are, and any business offering digital accounts knows about the risks of account takeover attacks. As more and more businesses undertake digital transformation strategies, account takeover becomes an increasingly lucrative attack option for fraudsters. With strategies...
In an increasingly digital world, where players from virtually all sectors are racing to innovate, the risk of data theft is very real. The payment card industry has defined standards for protecting cardholder account data. But what about other data types? And what can be learned from payment card industry standards?...
Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But that's only half the battle. Securing the access pathways is just as critical to protecting critical systems and data from cyber threats. This session outlines the six steps...
Fraud losses have reached staggering amounts - an estimated $20 billion last year. Moreover, this very lucrative crime is here to stay. How can businesses bounce back after being victimized? Sadly, many cannot. This makes prevention, identification and isolation imperative to business operations. This session focuses...
According to Javelin, in 2015 there were more than 1.5 million new account fraud victims who accounted for losses of $2.8 billion. This number increased by 40 percent in 2016. And with all the continued data breaches, there are no indications that this trend has slowed in 2017. The Equifax breach, which affected more...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Status check: With just several months to go until any organization that handles Europeans' personal data must comply with the EU's General Data Protection Regulation, or GPDR, how prepared are organizations? While the May 25, 2018, enforcement date is fast approaching, EU privacy watchdogs are continuing to issue...
In the last year, we've seen a significant increase in cyber activity, from propaganda through "information warfare" to mass-scale cybercrime. Increasing political tensions complicate an already complex international response. Differing approaches to cyber and privacy risk in Europe and the United States have caused...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.