On the whole, whilst spreading ransomware, the usual malware suspects use old-fashioned strategies that 'hit and hope' with as many victims as possible, such as in mass-pool spam campaigns, sent to thousands, potentially hundreds of thousands of possible targets.
We constantly refer to different battles in the fight against cybercrime, from multi-factor authentication to cyber security training, best practices are being employed everywhere, by force.
Nothing characterizes contemporary employment better than liquidity. The flexibility that cell phones and lap tops have given us to work on- the-go, is tremendous, yet from a security perspective – fraught with challenges.
It is extremely difficult to provide speedy internet and data without compromising security, as end-to-end encryption is loaded with vulnerabilities and this is nowhere more evident than at the airport.
The internet has many faces. Whilst the majority of us use search engines to learn, research and interact, there is a less than innocent side to the online world, a space where you can gain a higher level of anonymity and access to all manner of things, be they legal or otherwise.
A huge setback in our web application use is the vulnerability of our data. Traditionally this has been addressed through encryption, more recently 'end-to-end' encryption which by wording alone suggests that we are 'covered' for securing our data.
Well, the wording is misleading because end-to-end encryption has until now, been unable to completely secure data in all conditions.
Recent attacks on: Bycycklen, (Copenhagen's public city bikes system); the discovered vulnerabilities in Cardiac devices and plenty of other frightening DDoS attacks expose the precarious and costly state of affairs in IoT security.
With the conversion of 90% of in-store terminals from swipe card tools to EMV chip technology, the gateway to ever increasing mobile payments has swung wide open. So, has the entrance to more virtual security problems at the point of sale.
As we draw closer to the halfway point of 2018, a clear and alarming picture of cybercrime and its' true annual cost is emerging. With spending exponentially rising on both prevention and damage, the wake-up call that came from the IBM Chairman, Rometty back in 2015, that 'cyber-crime was the greatest threat to every company in the world' is simply becoming more of a reality, year by year.
Marketeers, Public Relation Experts and Advertisers will be nervously shuffling their feet for a bit, whilst the Cyber Security professionals get to work on a new and potentially huge threat, Vega Stealer.
Recently uncovered by Proofpoint, Vega Stealer is the new sparkly malware found to be targeting the Retail, Manufacturing, Public relations and Advertising sectors.
When we discuss the way that cyber criminals access your computer, the following spring to mind: DDos attacks; phishing; Firewall vulnerabilities; SQL injections. One form of attack that doesn't get so much hype but is just as dangerous as any other, is Clickjacking.