Director of National Intelligence, Dan Coats revealed in a recent threat update issued by the American Intelligence Community (IC) that the U.S. government has launched several investigations looking into the cyber-warfare tactics deployed by foreign states. In a speech addressed to the Hudson Institute, Coats spoke about Russian involvement in recent attacks and labeled the country
Turn out, 2017 was a crazy year for data breaches. No one can forget the massive Equifax disaster, which exposed the sensitive information of millions of customers to cybercriminals around the world. And of course, there was the attack on the Republican National Committee which leaked personal data of over 200 million American voters. Oh,
A new study by cybersecurity firm Rapid 7, recently revealed that their penetration testers have successfully exploited at least one software vulnerability used by about 84% of all the companies included in the study. The test was done in early September 2017 through mid-June 2018 and involved a total number 268 companies. A software vulnerability is any
Stolen bank details, credit card info, and plenty of other damaging information are now for open sale on the dark web—it’s no secret. For a few years now, it has been the place to trade illegal merchandise of all kinds, including the personal information of those scammed by phishing attacks and similar exploits. While this realization
In a recent intelligence report, the U.S. Department of Homeland Security has revealed serious weaknesses in Gmail’s new interface, many of which appear to be highly exploitable. As a top email service released in April 2004, Gmail has become the de-facto mode of digital communication for many people, especially those using an Android mobile device.
Of all the digital threats organizations are facing today, nothing beats the worst of the worst, otherwise known as human error. Data theft, information leaks, virus infections, spear phishing, spam, identity theft, corporate espionage, and the latest, cryptojacking infections are now all working together to compromise the systems and steal the data of online businesses.
The cryptocurrency trading scene now defines the old adage, “every man for himself.” Without any form of government or state-backed regulation, a blockchain-based currency such as Bitcoin and its derivatives must rely solely on speculation to assess the flow of trading. With all the recent interest in this form of trading and the nature of their
When it comes to keeping business running smoothly, corporate board-of-directors need to be proactive, especially nowadays. This includes supporting the infrastructure that handles the organization’s digital data, storage, and utilization. Not long ago, a company’s Chief Technology Officer (CTO) or Chief Information Officer (CIO) was the central authority in IT decisions; however, that role has
The time of ransomware at the top of the malware food chain is over, statistics from Kaspersky shows that there was a massive increase in incidents of ransomware infection in 2016. As per their findings: “The total number of users who encountered ransomware fell by almost 30%, from 2,581,026 in 2016-2017 to 1,811,937 in 2017-2018.
May 12, 2017, will always be remembered by the corporate world, especially the healthcare industry as a date when a new cyber-extortion racket, the WannaCry malware was unleashed and no cybersecurity software was able to anticipate it. It took advantage of a flaw in Server Message Blocks (SMB) version 1.0 to penetrate an otherwise security-hardened