Home Tags Threat

Tag: threat

Computer system threats come in many different forms. Some of the most common threats today are software attacks, theft of intellectual property, identity theft, theft of equipment or information, sabotage, and information extortion. Most people have experienced software attacks of some sort. Viruses, worms, phishing attacks, and Trojan horses are a few common examples of software attacks. The theft of intellectual property has also been an extensive issue for many businesses in the IT field. Intellectual property is the ownership of property usually consisting of some form of protection. Theft of software is probably the most common in IT businesses today. Identity theft is the attempt to act as someone else usually to obtain that person’s personal information or to take advantage of their access to vital information. Theft of equipment or information is becoming more prevalent today due to the fact that most devices today are mobile. Cell phones are prone to theft and have also become far more desirable as the amount of data capacity increases. Sabotage usually consists of the destruction of an organization′s website in an attempt to cause loss of confidence to its customers. Information extortion consists of theft of a company′s property or information as an attempt to receive a payment in exchange for returning the information or property back to its owner. There are many ways to help protect yourself from some of these attacks but one of the most functional precautions is user carefulness.

In our previous blog , we detailed our findings about the attack against the Pyeongchang 2018 WinterOlympics.

For this investigation, our analysts were provided with administrative access to one of the affected servers located in a hotel based in Pyeongchang county, South Korea.
In addition, we collected all available evidence from various private and public sources and worked with several companies on investigating the CC infrastructure associated with the attackers.
Threat intelligence data can give a clear picture of an acquisition target that could make or break a deal.
It doesn't matter if the threat comes from a disgruntled ex-employee or an insider anticipating financial gain, privilege abuse patterns are pretty much the same, and they're easy to avoid.
Two separate reports suggest insiders - of the malicious and careless variety - pose more of a problem in healthcare than any other sector.
Trolls love patents from examiners who are “lenientrdquo; about patent vetting.

Mining is the new black

Last year we published a story revealing the rise of miners across the globe.

At the time we had discovered botnets earning millions of USD. We knew this was just the beginning of the story, which turned out to develop rapidly.
"You can play all the Mario Kart you want," judge says
San Diego County teen wrote Tuesday evening: "Donrsquo;t come to school tomorrow."
RedDrop can steal data, record audio, and rack up SMS charges for victims, says Wandera.
Cyber-security startups continue to attract the interest of venture capitalists, with industrial control system and threat hunting vendors among those that secured new funding in February.

Financial Cyberthreats in 2017

This report summarizes a series of Kaspersky Lab reports that between them provide an overview of how the financial threat landscape has evolved over the years.
It covers the common phishing threats, along with Windows-based and Android-based financial malware.
DAILY VIDEO: Cyber-security reports reveal growing concerns about data breach risks; Google says new cloud updates simplify VM management; DataTorrent fortifies its streaming-data management toolset; and there's more.