Fraud Management & Cybercrime , Next-Generation Technologies & Secure Development , Ransomware
How the NotPetya Malware SpreadAlso, Why Information Technology Users Can't Secure Their Systems
The latest edition of ISMG Security Report leads with a conversation with DataBreachToday Executive Editor Mathew J. Schwartz on how the NotPetya malware spread from its Ukraine origins.
Also in the Security Report, you'll hear (click on player to listen):
- Former FBI cyber leader Steven Chabinsky explain why information technology users can't secure their systems;
- ISMG Security and Technology Editor Jeremy Kirk report on how Australia Medicare battles a fraudster; and
- President Donald Trump hedge on whether Russia hacked last fall's presidential election.
The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our June 27 and June 30 reports that respectively analyzed the growing industry of mobile spyware designed for the exclusive use of governments and how artificial intelligence can be used by hackers to threaten IT systems and by organizations to defend critical digital assets.
The next ISMG Security Report will be posted on Tuesday, July 11.
Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.