New Spider ransomware threatens to delete your files if you don’t pay within 96 hours

A new form of ransomware has emerged and is being distributed through malicious Office documents, infecting victims with file-encrypting malware. Uncovered by researchers at Netskope, the ‘Spider Virus’ ransomware campaign was first detected on December 10 and is ongoing. Like many ransomware schemes, the attack begins with malicious emails to potential victims. The email subjects and […]

IoT data exchange: Building trust and value

The results of Cisco’s IoT Value/Trust Paradox report show that, while most consumers believe IoT services deliver significant value for them, very few understand or trust how their IoT data is being managed and used. This conclusion has revealed an interesting paradox: despite their lack of trust in IoT data security, consumers on the whole say that […]

11 top tools to assess, implement, and maintain GDPR compliance

The European Union’s General Data Protection Regulation (GDPR) goes into effect in May 2018, which means that any organization doing business in or with the EU has six months from this writing to comply with the strict new privacy law. The GDPR applies to any organization holding or processing personal data of E.U. citizens, and the penalties […]

How Not To Uber Your Data Breach: A Guide For Handling A Cyber-Attack

You know something’s gone wrong when you make Equifax’s handling of their data breach look good. In what has arguably topped the list of the worst cyber-attacks of 2017, Uber is now facing global scrutiny for a data-breach it’s concealed for the past year. The attack saw hackers steal the personal information of 57 million drivers and […]

8 cybersecurity trends to watch for 2018

As we stand on the threshold of another year, the war for our cybersecurity rages on. There have been many data breaches in 2017, most notably for Equifax, Verizon, and Kmart. But if you seek a silver lining in the cloud, perhaps you’ll be glad of the news that the global average cost of a […]

Russian-Speaking ‘MoneyTaker’ Group Helps Itself to Millions from US Banks

A Russian-speaking cybercrime group has stolen millions of dollars from more than 20 banks in the US and Russia since at least May 2016 and appears poised to strike financial institutions across Latin America next, Moscow-based Group-IB warned Monday. According to the security vendor, the so-called MoneyTaker group’s modus operandi has been to break into […]

Android vulnerability allows attackers to modify apps without affecting their signatures

Among the many Android vulnerabilities patched by Google this December is one that allows attackers to modify apps without affecting their signatures. The vulnerability (CVE-2017-13156) can be exploited to replace any kind of app, even a system app, without the user noticing anything or Android preventing the installation. Read more about the Android vulnerability on Help Net […]

These five programming languages have flaws that expose apps to attack

Even software that has been built with secure development procedures may still be vulnerable to attack, due to flaws in the interpreted programming languages they depend on. IOActive researcher Fernando Arnaboldi revealed at last week’s Black Hat Europe conference that serious flaws in interpreters for five popular programming languages put applications parsed by them at […]

5 Reasons the Cybersecurity Labor Shortfall Won’t End Soon

Cybersecurity Ventures predicts there will be 3.5 million unfilled jobs by 2021, up from 1 million at the end of 2013. With a growing awareness of the cybersecurity workforce shortage, why is the problem getting worse each year? Read about the 5 main reasons why the cybersecurity labor shortfall won’t end soon according to Steve Morgan, the founder and […]

Return of Necurs botnet brings new ransomware threat

The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check Point. “The re-emergence of the Necurs botnet highlights how malware that may seem to be fading away doesn’t always disappear or become any less of a threat. Despite […]