Extortion-based cyber attacks: The next evolution in profit-motivated attack strategies

Read Brad Taylor’s article about what is extortion-based cyber attack and how it is evolving on Help Net Security : Today, data breaches have impacted just about every industry possible. From entertainment to the restaurant industry, no sector or organization appears to be safe, and it has been predicted that cyberattacks are going to get even […]

DDoS Extortion

Read Abhi Raj’s article about DDoS extortion on Security Zap Blog : DDoS extortion is certainly not a new trick by the cyber criminal or the hacker community, but there have been several new developments to phenomenon recently. Notable among them is the use of Bitcoin as a method of payment. Read his full article […]

Data Breach Digest: A practical guide to corporate ransomware and cyber extortion

Imagine if you woke up one day and found yourself the CEO of a large international shipping company. You get a call from the head of risk management alerting you that one of your tankers was overtaken by pirates who are demanding a large sum of money in return for your vessel. Read the practical […]

Status update: The rise of the social-media extortionist

Read Violet Blue’s article about social media extortionist on Engadget : If you’ve read recent headlines about high-profile tech CEOs getting hacked, you probably felt a stab of dark amusement at the thought of internet fat cats finally getting a taste of what the rest of us have had to drink. Read her full article here.

Cyberextortion definition

Cyberextortion can take many forms. Originally, denial of service (DoS) attacks against corporate websites were the most common method of cyberextortion; the attacker might initiate a ping storm and telephone the president of the company, demanding that money be wired to a bank account in a foreign country in exchange for stopping the attack. In […]