Cybersecurity
Canada Charges Its “Most Prolific Cybercriminal”
A 31-year-old Canadian man has been arrested and charged with fraud in connection with numerous ransomware attacks against businesses, government agencies and private citizens throughout Canada and the United States. Canadian authorities describe him as “the most prolific cybercriminal we’ve identified in Canada,” but so far they’ve released few other…
Read More »Four Reasons Why Java Is Important In Cybersecurity
Java is one of the most important pieces in any effective cybersecurity plan today. Java was developed in 1995 as a general-purpose programming language. Despite its age, Java continues to be a popular choice among programmers, especially those who work in mobile app development and systems programming. Of course, as…
Read More »Russian-speaking cybercrime evolution: What changed from 2016 to 2021
Experts at Kaspersky have been investigating various computer incidents on a daily basis for over a decade. Having been in the field for so long, we have witnessed some major changes in the cybercrime world’s modus operandi. This report shares our insights into the Russian-speaking cybercrime world and the changes…
Read More »Five common misperceptions about business cyberattacks
Most decision makers in IT management are having to spin so many plates, all at the same time, that there’s always a danger one of them will eventually fall to the floor and smash. The problem is, just because you’ve attended to a cyber security issue, or decided that it’s…
Read More »The Life Cycle of a Breached Database
Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the time the victim organization discloses an incident publicly the information has already been harvested many times over by profit-seeking cybercriminals. Here’s a…
Read More »Companies Face Growing Legal Risks Over Ransomware Data Leaks
A cancer patient in Ireland is suing a hospital in Cork after his data was exposed online following a ransomware attack on the country’s healthcare system. The suit reflects the legal and financial risks for organizations hit in such cyberattacks. Legal fallout from ransomware attacks heightens the pain that victim…
Read More »Human layer security: Your last line of defense against phishing
Phishing is more sophisticated than ever. Cybercriminals have moved on from bombarding mass email lists with poorly spelt, obvious scams. They’ve been replaced by carefully planned spear-phishing attacks, impersonation attempts, and business email compromise. Consider a new joiner to Company X – they’re excited to start and have recently updated…
Read More »The ransomware pandemic
“We are on the cusp of a global pandemic,” said Christopher Krebs, the first director of the Cybersecurity and Infrastructure Security Agency, told Congress last week. The virus causing the pandemic isn’t biological, however. It’s software. Why it matters: Crippling a major U.S. oil pipeline this weekend initially looked like an act of war…
Read More »Hackers are exploiting a server vulnerability with a severity of 9.8 out of 10
In a development security pros feared, attackers are actively targeting yet another set of critical server vulnerabilities that leave corporations and governments open to serious network intrusions. The vulnerability this time is in BIG-IP, a line of server appliances sold by Seattle-based F5 Networks. Customers use BIG-IP servers to manage…
Read More »2021: What’s Ahead from NIST in Cybersecurity and Privacy?
In 2020, NIST prioritized helping individuals and organizations shift to a more online environment to keep people safe and our economy productive. Despite the many challenges brought by the pandemic, we were fortunate to be able to continue our work on an array of new resources to help manage cybersecurity and privacy…
Read More »