According to the Australian government, hackers infiltrated certain defense contractor’s PC in 2016. Before launching the yearly threat report of the Australian Cyber Security Center scheduled for October 10, Dan Tehan Assistant Minister for Cyber Security couldn’t confirm the individual’s name behind the hack.
Managing to reach the Information Technology network, the intruders remained there for long as they stole vast volumes of data belonging to the defense supplier. When in November 2016, the Australian Cyber Security Center of the federal government became aware of the incident it assisted in halting the attack.
Tehan explained that the hacker could be a state-sponsored online thief or a normal cyber-criminal, either way the individual’s behavior prompted serious action. The minister said nothing could be fully confirmed, a usual hazard in this field of cyber-crime. He couldn’t also state the length of time the intruders stayed on the computer. However, according to him, the IT
Like bandits lurking in the shadows of the internet, cyber criminals are holding us to ransom. Are we equipped to pay the price, or take a gamble on the forfeit for non-compliance? Taking the latest Cerber Ransomware threat as an example, Charl van der Walt, Chief Security Strategy Officer at SecureData, explores how cybercriminals are turning their hands to new techniques to get their mitts on our data – and now money –
An iGov survey of 38 local government departments has revealed that 76% have experienced a cyber attack and 50% have been hit by a ransomware attack in the past year.
Download this free guide
Cyber security in the Middle East
It is not just western countries such as the US and the UK that are being targeted by hackers, as the rapidly developed and wealthy nations of the Middle East become targets of both politically and financially driven attacks. Discover how cyber security expertise can help businesses in the Middle East navigate digital transformations and keep cyber criminals at bay.
By submitting your personal information, you agree that TechTarget and its partners may contact
With its elegant decor and soft lighting, the ambience in The Club lounge, at Las Vegas International Airport, is usually serene. On August 2, however, passengers waiting to board Virgin Atlantic’s afternoon flight to London Gatwick were disturbed by an extraordinary scene.
Emerging stealthily into the room, plainclothes FBI officers approached a young, scruffily dressed British man, who had been sampling the complimentary refreshments and amusing himself by posting sardonic messages on Twitter.
They were from the agency’s Cyber Crime Unit, and told him he was suspected of various serious offences, arrested him, snapped his wrists in handcuffs, and marched him off to be interrogated.
Marcus Hutchins had been hailed a hero after thwarting a devastating
Cyber security strategy is now a key issue for any enterprise. Ransomware attacks continue to evolve more sophisticated ways to get onto corporate networks. Crypto currencies have enabled cyber crime to become a profitable way to make money directly from malware.
Attackers no longer need any technical knowledge – ransomware attacks