Book Review: Crime Dot Com, From Viruses to Vote Rigging, How Hacking Went Global

Book Review: Crime Dot Com, From Viruses to Vote Rigging, How Hacking Went Global

I had the great delight of reading Geoff White’s new book, “Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global”, I thoroughly recommend it. The book is superbly researched ...
Passwords are and have always been an Achilles Heel in CyberSecurity

Passwords are and have always been an Achilles Heel in CyberSecurity

LogMeOnce, a password identity management suite provider, has published a detailed interview with myself titled 'Passwords are and have always been an Achilles Heel in CyberSecurity'. In the Q&A I talk about ...
U.S. Government offers $5 million bounty for information on North Korean cyber criminals

U.S. Government offers $5 million bounty for information on North Korean cyber criminals

Yesterday, the U.S. Departments of State, Treasury, Homeland Security, and FBI released a joint report offering guidance on the emerging North Korean (previously known as DPRK) cyber threat, and highlighting the malicious ...
12 days of Christmas Security Predictions:  What lies ahead in 2020

12 days of Christmas Security Predictions: What lies ahead in 2020

Marked by a shortage of cyber security talent and attackers willing to exploit any vulnerability to achieve their aims, this year emphasised the need for organisations to invest in security and understand ...
Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

Study: Ransomware, Data Breaches at Hospitals tied to Uptick in Fatal Heart Attacks

Hospitals that have been hit by a data breach or ransomware attack can expect to see an increase in the death rate among heart patients in the following months or years because ...
Semperis DEMO: Recovering Active Directory cleanly: without re-introducing malware

Cyber Scenarios Expose Shortcomings of BMR

Ransomware and wiper attacks are causing organizations to re-evaluate their backup and recovery capabilities. An obvious concern is whether backups are safe – for example, are they offline where they can’t be ...
Over 12,000 WannaCry Variants Detected in the Wild

Over 12,000 WannaCry Variants Detected in the Wild

Security researchers have determined that over 12,000 variants of the WannaCry ransomware family are preying upon users in the wild. Sophos attributed this rise of variants to threat actors taking the original ...

10 of the Most Significant Ransomware Attacks of All Time

For years, ransomware actors have developed new families and attack campaigns in increasing frequency and numbers. Such activity peaked in 2017 but then fell in tandem with cryptocurrency miners’ rise. This development ...
hacking

Side-Channel Attacks: Cyber Warfare’s New Battleground

The current state of cybersecurity is complex, fast-moving and a critical risk to all organizations. Understanding where U.S. businesses stack up in terms of their security knowledge and defense strategy is of ...
Security Boulevard

Biometric Security Data Breach, Critical Windows Vulnerabilities, FBI Data Harvesting

You’re listening to the Shared Security Podcast, exploring the trust you put in people, apps, and technology…with your host, Tom Eston. In episode 82 for August 19th 2019: The BioStar2 biometric security ...