11.5 C
London
Saturday, October 21, 2017
Home Tags Threat

Tag: threat

Computer system threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and Trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the IT field. Intellectual property is the ownership of property usually consisting of some form of protection. Theft of software is probably the most common in IT businesses today. Identity theft is the attempt to act as someone else usually to obtain that person’s personal information or to take advantage of their access to vital information. Theft of equipment or information is becoming more prevalent today due to the fact that most devices today are mobile. Cell phones are prone to theft and have also become far more desirable as the amount of data capacity increases. Sabotage usually consists of the destruction of an organization′s website in an attempt to cause loss of confidence to its customers. Information extortion consists of theft of a company′s property or information as an attempt to receive a payment in exchange for returning the information or property back to its owner. There are many ways to help protect yourself from some of these attacks but one of the most functional precautions is user carefulness.

Lawmakers want Pai to “publicly disavow President Trumprsquo;s repeated threats.”
With social media, gathering information has never been easier, making Business Email Compromise the land of milk and honey for cybercriminals.
September spear phishing attack appeared to be more reconnaissance activity than sign of impending attack, FireEye says.
Why security teams needs to take a cognitive approach to the increasing volumes of data flowing from sources they don't control.
While some criminals blow up ATMs to steal cash, others use less destructive methods, such as infecting the ATM with malware and then stealing the money. We have written about this phenomenon extensively in the past and today we can add another family of malware to the list – Backdoor.Win32.ATMii.
The minister releases a significant cyber report, with news that a defence contractor was breached.

That raises many questions, but the media failed to follow up.

Australia, you've got a problem.
Long before Facebook and Twitter, there were Away Messages and AIM profiles.
ThreatMatch is a cyber threat intelligence platform that provides users with relevant, actionable and timely threat intelligence that can be tailored to their unique environments. Using a diverse and extensive range of sources, ThreatMatch provides continuous alerts on how an organisationrsquo;s attack surface correlates with the threat posed by the malicious actors targeting it.John Beale, founder of Security Alliance comments: “We were delighted to be invited to launch ThreatMatch at the official opening of the... Source: RealWire
And it's making threat intel much, much harder, say researchers VB2017  Intel agencies and top-tier hackers are actively hacking other hackers in order to steal victim data, borrow tools and techniques, and reuse each other's infrastructure, attendees at Virus Bulletin Con, Madrid, were told yesterday.…
Two members of Avast's threat intelligence team shared new information about the CCleaner backdoor attack.
San Francisco activist led campaign to raise money for jailed journalist.
The 2017 VirusBulletin conference is upon us and, as in previous years, wersquo;re taking the opportunity to dive into an exciting subject, guided by our experience from doing hands-on APT research.

This year we decided to put our heads together to understand the implications that the esoteric SIGINT practice of fourth-party collection could have on threat intelligence research.