The influence of President Obama's cybersecurity legacy on the next administration is among the topics to be discussed at ISMG's Fraud and Data Breach Summit in Washington May 17-18. Featured speakers include NIST's Ron Ross, DHS's Phyllis Schneck and Virginia Technology Secretary Karen Jackson.
Clinics, laboratories, durable medical equipment suppliers and other smaller healthcare entities need to bolster their breach preparedness as cyberattacks against smaller entities in all sectors continue to multiply, says David Finn of Symantec, who discusses findings from a new report.
Ransomware has become one of the most widespread and damaging threats that internet
users face. Since the infamous CryptoLocker first appeared in 2013, we've seen a new era
of file-encrypting ransomware variants delivered through spam messages and Exploit Kits,
extorting money from home users and businesses alike....
How can information security professionals set priorities for addressing emerging risks? Verizon's Ashish Thapar shares insights for Asian practitioners from the 2016 Verizon Data Breach Investigation Report.
The Verizon 2016 Data Breach Investigations report finds malware, ransomware and phishing attacks are more common than ever and creating even more damage. Organizations are continuing to get exploited via vulnerabilities that are months or even years old, forensics expert Laurance Dine explains in this interview.
Despite the arrest and conviction of scores of cyber criminals - including members of the Blackhole exploit kit, SpyEye and GameOver Zeus crews - malware and ransomware threats continue to grow.
Attackers have been exploiting JBoss application servers to install remote-control web shells as part of a campaign that targets enterprises with network-hopping SamSam (a.k.a. Samas) ransomware, researchers at Cisco Talos warn.
A cybercrime gang has been using new malware to target business customers of banks in the United States and Canada and steal millions of dollars, primarily from business accounts, researchers at the IBM X-Force security group warn.
Even with the exponential increase in what technology can achieve in fighting security threats and fraud, a recent discussion with practitioners suggests that insider risk remains the biggest issue giving practitioners sleepless nights.
A federal court's recent rejection of a motion filed by health insurer Anthem Inc. in its attempt to fight a class-action lawsuit in the wake of its massive data breach is important because it upholds the privacy rights of breach victims, says attorney Steven Teppler.
Is it ever acceptable for ransomware victims to pay a ransom to obtain the decryption key required to restore access to their data? Due to poor preparation, many organizations continue to face that question.
Ransomware is on the rise. As businesses brace for attack, we can't help but wonder: what would you do if your company were hit with ransomware? Unfortunately, if you haven't backed up your files, there's nothing much you can do-unless you pay the ransom. Of course, that puts a target on your back for future malware...
Security experts are once again warning all Flash users to either update or uninstall the browser plug-in software to protect themselves against active exploit kit attacks that are targeting a zero-day Flash flaw to install ransomware.
As the threat of malware infections, especially those involving ransomware, grows, organizations need to balance their perimeter-based security practices with an "intrusion tolerance" strategy that helps ensure a quick recovery, says medical device cybersecurity expert Kevin Fu.
A recent study reveals that India ranks third globally in financial Trojan infections, with more than 60,000 computers getting compromised in 2015 alone. Experts analyze why and recommend best practices to tackle them.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ransomware.databreachtoday.com, you agree to our use of cookies.