Home Tags Attack

Tag: Attack

10 Cybercrime Myths that Could Cost You Millions

Don't let a cybersecurity fantasy stop you from building the effective countermeasures you need to protect your organization from attack.

FTC Offers ID Theft Victims Online Crime Reporting Tool

ID theft victims can report their cybercrime attack to the Federal Trade Commission, without having to file a police report in most cases.

Verizon DBIR Shows Attack Patterns Vary Widely By Industry

It's not always the newest or the most sophisticated threat you need to worry about, Verizon's breach and security incident data for 2016 shows.

Attack Method Highlights Weaknesses in Microsoft CFG

As Microsoft hardens its defenses with tools such as Control Flow Guard, researchers at Endgame are preparing for the reality of Counterfeit Object-Oriented Programming attacks to move from theoretical to real.

Seven in ten UK unis admit being duped by phishing attacks

Not so smart now, eh? Seven in ten UK universities have admitted falling victim to a phishing attack in which an individual has been tricked into disclosing personal details via an email purporting to be from a trusted source.…

Foiled! 15 tricks to hold off the hackers

Malicious hackers have outsize reputations.

They are über-geniuses who can guess any password in seconds, hack any system, and cause widespread havoc across multiple, unrelated networks with a single keystroke—or so Hollywood says.

Those of us who fight hackers every day know the good guys are usually far smarter. Hackers simply have to be persistent.Each year, a few hackers do something truly new.

But for the most part, hackers repeat the tried and true.
It doesn’t take a supergenius to check for missing patches or craft a social engineering attack. Hacking by and large is tradework: Once you learn a few tricks and tools, the rest becomes routine.

The truly inspired work is that of security defenders, those who successfully hack the hackers.To read this article in full or to leave a comment, please click here

APT Threat Evolution in Q1 2017

Kaspersky Lab is currently tracking more than a hundred threat actors and sophisticated malicious operations in over 80 countries.

During the first quarter of 2017, there were 33 private reports released to subscribers of our Intelligence Services, with IOC data and YARA rules to assist in forensics and malware-hunting.

Unplug the Bitcoin miner and do us all a favour: Antminer...

‘Antbleed’ attack could crock 70 per cent of all mining.

Time to try another flavour? A new branded bug (sigh) has landed, specific to an ASIC-based Bitcoin miner: dubbed “Antbleed”, it allows remote shutdown of hardware sold by a company called "Bitmain".…

Homebrew crypto SNAFU on electrical grid sees GE rush patches

Boffins turned up hard-coded password in ancient controllers General Electric is pushing patches for protection relay bugs that, if exploited, could open up transmission systems to a grid-scale attack.…

RiskIQ Discovers NoTrove Cyber-Attack Network Delivering Scam Ads

The NoTrove online scam advertising network makes use of thousands of different domains to deliver payloads and potentially unwanted programs.

Ransomware Recovery 101: You’ve Been Hit, Now What Do You Do?

Even though the majority of companies will at some point experience a ransomware attack, most do not know how to appropriately recover from one. Here's what you should do.

Security-as-a-service model gains traction

With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed.

Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here