Emerging Threats

Employee 'Phishing' Expeditions Part of States' Cybersecurity Awareness Tools

Employee 'Phishing' Expeditions Part of States' Cybersecurity Awareness Tools

Officials in Missouri and Washington state acknowledged the sustained threat that phishing and spear phishing attacks present to the tens of thousands of state employees who may be vulnerable. But both CISOs said their agencies continue to warn staffers of the dangers of fast thinking with education, humor and assessments modeled after classic phishing expeditions to test staff members’...

Google Will Stop Scanning Gmail for Ad Targeting

Google Will Stop Scanning Gmail for Ad Targeting

Users may now opt out of receiving personalized ads in Gmail, but they may not opt out of email scanning. Google plans to abandon its longstanding practice of scanning user email in its Gmail service to serve targeted advertising. Google said it does not scan the email of paying corporate customers of its G Suite of services, but it made the policy change — announced in a company blog post on...

Financial Services Need to Distinguish Good Bots from Bad Bots

Financial Services Need to Distinguish Good Bots from Bad Bots

There is a new wave of automation underway, driven by software robots (or bots), that is changing not just how financial organizations interact with customers but how they deal with each other. However, robbing a bank is much more likely to be perpetrated by a cybercriminal with an army of bots than a mobster with a sawn-off shotgun. So-called bad-bots are hard at work cracking access...

 A Cyberattack, ‘The World Isn’t Prepared for’

A Cyberattack, ‘The World Isn’t Prepared for’

Two weeks after IDT Corporation was hit, the cyberattack known as WannaCry ravaged computers. No doubt it was destructive. But what Golan Ben-Oni, of the IDT Corporation, had witnessed was much worse. The strike on IDT was similar to WannaCry in one way: Hackers locked up IDT data and demanded a ransom to unlock it. But the ransom demand was just a smoke screen for a far more invasive attack that...

Cost of Data Breaches Lightens But More Irish Firms Held to Ransom

Cost of Data Breaches Lightens But More Irish Firms Held to Ransom

A global survey from IBM and the Ponemon Institute reveals that while the average cost of a data breach fell by 10% last year, breaches are still extremely expensive. On average, data breaches cost individual organizations $3.62 million per incident. The average cost of a breach rose 29% from 2013 to 2016. While costs declined 26% in Europe, in the United States the cost of a breach rose 5% to...

Exclusive: Fake Online Stores Reveal Shadow Banking System of Gamblers

Exclusive: Fake Online Stores Reveal Shadow Banking System of Gamblers

A network of dummy online stores offering household goods has been used as a front for Internet gambling payments, Reuters has found. The findings raise questions about how e-commerce is policed worldwide. They also underline the need to tackle "transaction laundering". Experts said that transaction laundering helps online merchants trade in areas that credit card issuers and banks may otherwise...

Now Is the Time to Think Differently about Cyber Security

Now Is the Time to Think Differently about Cyber Security

Whilst the Fourth Industrial Revolution is opening up new opportunities for organizations to embrace emerging technologies, rethink business models and improve the lives of employees and customers, it also has a darker side – increased security risks. Digital risk and opportunity are two sides of the same coin. Forward-looking companies are thinking not only about how criminals can gain access...

  • More at WEF
  • |
  • |
Hackers Moving from Email Phishing Campaigns to Malicious Video, Image Attacks

Hackers Moving from Email Phishing Campaigns to Malicious Video, Image Attacks

Many people across the globe have learned about the dangers of digital communications containing malicious code. Such malware often disguises its true intentions by posing as an email from a trusted source. Companies have taken measures to teach their employees to be on high alert for these types of attacks, known as phishing schemes, but there may be another threat lurking with similar effects....

Experts Hash Out Next-Gen Cyber Defenses

Experts Hash Out Next-Gen Cyber Defenses

Some Institute for Critical Infrastructure Technology fellows and industry security experts wrote a collection of essays which voice a common theme: Cyber threats continue to pervade government systems and no one solution is a cure-all. Organizations should modernize their systems and protect data at rest or in use through encryption, tokens, data masking and enterprise key management, James...

  • More at GCN
  • |
  • |
Malvertising: It's Cheaper to Infect 1,000 Computers Than to Buy a Six-Pack Beer

Malvertising: It's Cheaper to Infect 1,000 Computers Than to Buy a Six-Pack Beer

Trustwave Global Security Report reveals worrying gaps in global cyber protection. The company's 2017 Trustwave Global Security Report says intrusion detection is faster, as well as containment times. However, malvertisement is cheaper, and spam has picked up the pace. The median number of days from intrusion to detection is down from 80 to 49 days (from 2015 to today). Once they detect an issue,...

Central Bank Moves to Tackle Rising Cybercrime in Kenya

Central Bank Moves to Tackle Rising Cybercrime in Kenya

The Central Bank of Kenya (CBK) has come up with new rules to guide commercial banks on fighting cybercrime as the vice increases in the East African nation. According to the document, all board of directors and senior management of banks will be expected to formulate and implement Cyber Risk strategies, policy, procedures, and guidelines and set minimum standards for the institution. Besides...

“Cyber Sabotage” Could Be the Next Major Crime Wave

“Cyber Sabotage” Could Be the Next Major Crime Wave

While investigating a power outage in Ukraine from last December, security researchers found a new type of malware that appears to have been custom-made for infecting electric utilities. The malware, called CrashOverride, is fairly significant in the world of criminal hacking because its sole purpose is to sabotage a utility’s operations and trigger a power outage. For the past few years,...

Are the Hazards of Cyberattacks Targeting School Districts Being Overlooked?

Are the Hazards of Cyberattacks Targeting School Districts Being Overlooked?

Two months before the U.S. presidential election, international hackers slipped into the computer systems of at least four Florida school district networks. Luckily, the hackers from Morocco never found one or managed to get their hands on personal data; also includes that of parents. But the attempted hacking exposed the vulnerabilities of Florida’s school district networks. Experts say the...

How Secure are Today’s ATMs? Here's how to Protect Yourself

How Secure are Today’s ATMs? Here's how to Protect Yourself

ATM-related fraud and theft can’t be completely prevented. Banks are working to develop additional security measures, such as the three-digit CVV on the back of cards. Individuals can also take preventive measures to protect themselves when using ATMs: 1) If your bank issues them, use a chip-enabled card. They provide improved security by verifying the physical card is genuine, and not a fake...

Data Breaches Get Headlines, but Other Online Threats Loom Large

Data Breaches Get Headlines, but Other Online Threats Loom Large

Eric Olson, VP of Intelligence Operations for LookingGlass Cyber Solutions, said most infosec firms tasked with protecting businesses and their customers bias toward the thwarting attacks against a company’s computer network and databases — which would be fine if they were better at preventing those breaches. He said his research team comes across as many as 800 new packages of stolen data...

Quantum Computing: Threat to Public-key Cryptosystems

Quantum Computing: Threat to Public-key Cryptosystems

Last year, scientists from Google and NASA suggested that D-Wave quantum technology could provide computing 100 million times faster than current conventional technology. This sort of power will 'break' current public-key cryptosystems. As long ago as 1994, Peter Shor developed a quantum algorithm to factor large prime numbers. It was not considered an urgent problem at the time, given the lack...

Keep yourself updated with latest internet and cyber security threats

This category provides the expertly curated news covering the entire paradigm of the anticipated and upcoming cyber threats. The information disseminated to our users under this category covers different dimensions of emerging cyber threats that includes but is not restricted to computer security threats, internet security threats, network security threats, information security threats, and latest virus threats. It is essential to note that information on threats to information security, threats to data security and threats to a computer network are indispensable to the any security strategy adopted by cyber security team for their organization. What does an individual security professional or an entire security team need most? The answer is information on emerging threats that helps them to channelize their efforts and mould their security paradigm in a way to be prepared for the emerging challenges and contain them optimally as and when they happen to strike their networks.