2017 has seen alot happen in the cyber world many examples including Equifax breach, state-sponsored attacks, Russian manipulation of social media, Wannacry, and more phishing scams than we can count, clearly “The more things change, the more they stay the same.” Jean-Baptiste Alphonse Karr’s famous line resonated back in the 19th century Parisian literary circles, and …
Software developers usually reuse code wherever possible, and hackers are no exception. While we often think of different malware strains as separate entities, the reality is that most new malware recycles large chunks of source code from existing malware with some changes and additions (possibly taken from other publically released vulnerabilities and tools). Examples of …
In 2017, attackers developed new ransomware delivery techniques, leading to global outbreaks such as WannaCry, NotPetya and, most recently, Bad Rabbit. It’s a trend that’s expected to continue in the next year, according to the 2018 Malware Forecast released by Sophos on Thursday. The report reviews malicious activity analyzed by SophosLabs in 2017 to predict what might happen in 2018. Here’s …
UK businesses are most likely to pay up following a ransomware attack, new figures have claimed. Research by security firm Malwarebytes found that almost half (49 per cent) of UK businesses would pay ransom following a ransomware attack. Globally, the figure sits somewhat lower, at 42 per cent, according to Malwarebytes’ “Second Annual State of …
Following the outbreak of the Petya-based malware in Ukraine, the author of the original version, Janus, decided to release his master key, probably closing the project. You can read the full story here. Based on the released key, Malwarebytes has prepared a decryptor that is capable of unlocking all the legitimate versions of Petya (read …
According to Gartner, there are currently over 6 billion IoT devices on the planet. Such a huge number of potentially vulnerable gadgets could not possibly go unnoticed by cybercriminals. As of May 2017, Kaspersky Lab’s collections included several thousand different malware samples for IoT devices, about half of which were detected in 2017. The number …
A new report by Corero Network Security suggests that offering DDoS protection as a service is a viable business idea. Out of its respondents, 82 percent see a “clear business opportunity” in providing DDoS protection as a service to its customers. Also, 93 percent see providing DDoS mitigation in relation to other types of security …
A global cyber attack using hacking tools widely believed to have been developed by the US National Security Agency and leaked online by a group called the Shadow Brokers has caused chaos around the world. British hospitals, the Russian government, German railways and big companies like FedEx were among those affected when they were crippled by …
According to a company blog post out today, by brand protection company CSC, citing Amy Mushahwar, counsel and Chief Information Security Officer at Washington, D.C. law firm ZwillGen PLLC, says: “New domains (new gTLD’s) are being registered as phishing sites and for drive-by downloads of malware.”….“Nefarious uses have been very widespread. It’s incumbent upon ICANN …
We’re at a crisis point now with regard to the security of embedded systems, where computing is embedded into the hardware itself — as with the Internet of Things. These embedded computers are riddled with vulnerabilities, and there’s no good way to patch them. It’s not unlike what happened in the mid-1990s, when the insecurity …