Trends, Reports, Analysis

$12 Billion in Fraud Loss Came from Data Breach Victims in 2016

$12 Billion in Fraud Loss Came from Data Breach Victims in 2016

Data breach victims are likely to someday become victims of fraud. Of the $16B in total fraud loss for 2016, $8.3B came from victims who had experienced a breach in the past 12 months and $12B arose from victims who had breached in the previous six years. These findings come from a Javelin Advisory Services report. Increasingly smaller financial institutions are becoming aware of the Internet's...

Thailand among Top Ten for Malware in Asia

Thailand among Top Ten for Malware in Asia

Thailand ranks among the top 10 countries in Asia-Pacific for the number of malware attacks. "Thailand is still one of the countries across the region most at risk of malware threats, behind Bangladesh, Indonesia and Vietnam," said Keshav Dhakad, from Microsoft Asia. The threat risk here is comparable to conditions in the Philippines and Bangladesh, he said, while Hong Kong, Japan, and Singapore...

The Amount of Malware for Macs is Increasing

The Amount of Malware for Macs is Increasing

The number of cases of malware targeting Macs is continuing to surge, growing by 53% over just the first quarter of 2017, according to an analysis from security firm McAfee. And throughout 2016, it grew by a massive 744%. In Q1 2017, the security firm detected more than 700,000 occasions where malware infected Macs. The reason for this huge and continued growth is adware bundling, McAfee says. In...

Median Dwell Time for Intruders Drops to 49 Days

Median Dwell Time for Intruders Drops to 49 Days

2017 Trustwave Global Security Report claimed that threat detection is getting better: the median number of days from an initial intrusion to detection of a compromise fell from 80.5 days in 2015 to 49 days last year. The figure was higher (65 days) for externally detected threats than internal (16). However, values ranged from zero days to a whopping 2000, which is more than five years. The...

Security Pros 'Prefer' Root Canal Surgery Over Notifying Board of Breaches

Security Pros 'Prefer' Root Canal Surgery Over Notifying Board of Breaches

Almost half (44%) of security professionals would rather have root canal surgery than make the dreaded walk of shame to the boardroom to explain that they’ve suffered a data breach, according to results from a survey carried out by malware protection firm Lastline at Infosecurity Europe 2017. It just shows how seriously these attacks affect organizations today. Speaking to Infosecurity Steve...

25% of Companies Hit by Fireball or WannaCry in May, Index Reveals

25% of Companies Hit by Fireball or WannaCry in May, Index Reveals

In its latest Global Threat Impact Index, researchers at Check Point Software Technologies found that Firewall affected one in five organizations globally in May 2017. Built-in malicious potential combined with an infection of over 250 million machines earned this malware the top spot. WannaCry infected 8% of companies worldwide in May 2017. Its victims suffered infections after WannaCry abused a...

Many Companies Inherit Cybersecurity Problems after Acquiring a Software Company

Many Companies Inherit Cybersecurity Problems after Acquiring a Software Company

In a recent M&A survey focused on the software industry, 52 out of 100 senior global executives confirmed that their companies inherited cybersecurity problems from a software business that they either merged with or acquired. Moreover, 35 percent said that cybersecurity issues have previously caused them to nix a potential M&A deal with a software company. The survey, conducted in Q1 2017 by...

Bitcoin Price Stabilizes after the Crumble of Crypto Markets

Bitcoin Price Stabilizes after the Crumble of Crypto Markets

A frenzied few weeks of rapid Bitcoin speculation, which saw the price rocket to $US3000 a coin, looks to be easing. On June 18 afternoon the combined total of Bitcoin, ether and a host of new tokens was around $US99.3 billion, up from a low of $US91.3 bn, data from CoinMarketCap shows. Eighty of the top 100 cryptocurrencies suffered double-digit declines in the past week. Bitcoin has experienced...

  • More at SMH
  • |
  • |
Top 10 Most Hacked Nations: A Map Tracking Global Cyberattacks in Real -Time

Top 10 Most Hacked Nations: A Map Tracking Global Cyberattacks in Real -Time

The map is the brainchild of Russia-based Kaspersky Labs. It can detect malware and other cyberattacks and provides users with a sort of live coverage of intrusions occurring across the world. Kaspersky's map also allows users to track local ongoing attacks in specific countries, Wired reported. Here are the top 10 most attacked nations, according to Kaspersky's map: 1) Vietnam. 2) Russia. 3)...

Corporate Email Addresses Get 4 Times More Malware Than Personal Ones

Corporate Email Addresses Get 4 Times More Malware Than Personal Ones

Google’s Research Team conducted a study in which Researchers examined over 1 billion email exchanges via Gmail to analyze the diversity and prevalence of the attacks perpetrated via email in corporate environments. The report concludes that while spam campaigns continue to be the most common type of attack on both personal and corporate accounts, malware and phishing campaigns are primarily...

7 Out of 10 Smartphone Apps Share User Data with Third-party Services

7 Out of 10 Smartphone Apps Share User Data with Third-party Services

Researchers have explored a significant threat that most people miss: More than 70% of smartphone apps are reporting personal data to third-party tracking companies like Google Analytics, the Facebook Graph API or Crashlytics. When people install a new Android or iOS app, it asks the user’s permission before accessing personal information. An app doesn’t just collect data to use on the phone...

Synopsys Research: Pervasive Use of Outdated and Insecure Third-Party

Synopsys Research: Pervasive Use of Outdated and Insecure Third-Party

Synopsys, Inc. have on June 9 released ‘The State of Software Composition 2017’ report, following their recent investigation into the security of the software supply chain- arguably one of the most significant challenges the software industry is currently facing. As Andreas Kuehlmann, senior vice president and general manager for the Synopsys Software Integrity Group explains “By analysing...

Don’t Like Mondays? Neither Do the Attackers

Don’t Like Mondays? Neither Do the Attackers

Monday may be our least favorite day of the week, but Thursday is when security professionals should watch out for cybercriminals, researchers say. Timing is everything. Attackers pay as close attention to when they send out their booby-trapped emails as they do in crafting how these emails look. Malicious email attachment message volumes spike more than 38 percent on Thursdays over the average...

  • More at CSO
  • |
  • |
Why Top US Retailers Experience Phishing Attacks All Year

Why Top US Retailers Experience Phishing Attacks All Year

Cybersquatters purchase Internet domains to set up look-alike sites that draw unsuspecting victims with promises of such things as great prices on luxury goods. What actually gets delivered ranges from counterfeit goods to malware, and into the bargain, credit card numbers and other sensitive information are also often stolen. Many phishing sites, after harvesting the user’s credentials,...

15% Rise in Number of CISOs This Year

15% Rise in Number of CISOs This Year

CISOs enjoyed a significant bump up in their ranks this year: 65% of organizations have CISOs, versus 50% last year, according to the second installment of ISACA's 2017 State of Cyber Security Study. But despite the increase in the number of CISOs, it may not necessarily translate into a number of high-level cybersecurity officials. "I am pleased there are more CISOs, but I'm not overly excited,"...

Patch-Me-If-You-Can: Security Teams Grapple to Apply Updates in Time

Patch-Me-If-You-Can: Security Teams Grapple to Apply Updates in Time

Security company Bromium has released research which claims companies are struggling to maintain emergency patch cycles, “despite the fact enterprise reliance on legacy systems often mean emergency patches are an everyday fact of life.”. According to the press release, “53% of CISOs say crisis patch management is a major disruption to their IT and security teams, which happens ‘on average...

Check out the latest cyber security industry and future trends, and analysis

This category provides expertly curated news cards on the latest cyber security industry trends, reports from credible organizations and analysis by security experts. The results from the interesting surveys and polls conducted by the leading cyber security organizations are served to our users under this category. The survey and poll results come out with certain interesting facts and figures that are normally oblivious to eyes. The cards do not talk about only the present trends but also the cyber security future trends as anticipated by the leading names in security industry. In addition to these, meticulous analysis of the events, attacks, changing landscape, and the security environment by leading experts are also shared with our users. The feeds provided under this category compliment and enrich the understanding of our users and give them an altogether new insight into the happenings of cyberspace that puts them at the topmost level of the cyber security knowledge domain.