Ransomware is increasingly effective because of changes in the way it operates. Because cyber-extortion is a numbers game – the more devices you infect the more you earn – the objective of the attackers is to infect as many devices as quickly as possible, said Paul Edmunds, head of technology at the National Crime Agency (NCA). Therefore they need to get around defences such as restricted admin rights.
Describing ransomware as a “growing and present threat”, he told the audience at last week’s Computing Security and Risk Management Summit that whereas early examples tended to be delivered as email attachments which had to be downloaded and executed by the victim, subsequent strains such as WannaCry and NotPetya were much more proactive in seeking out and infecting vulnerable machines.
“We’re starting to see other attack vectors that are growing in importance, scanning and finding unpatched vulnerabilities on a machine,” Edmunds said.
Read more at: https://www.computing.co.uk/ctg/news/3021979/evolution-of-ransomware-makes-it-hard-to-defend-against-warns-national-crime-agency
“Why would someone target me?” Austin Kleineschay, president of the Cyber Security and Forensic Student Organization (CSFSO), said that’s a common question about cyberattacks. The message of CSFSO’s annual internet security workshop: we are all potential targets for hackers and cyber criminals.
The “Think Safe, Be Safe,” workshop focused on security problems and possible solutions. It was held Saturday, Oct. 28, at the Jason R. Carter Science Education Center. Community members, students and faculty attended.
Kleineschay opened the event with a discussion of current internet security threats. He challenged everyone to imagine what could happen if a cyber criminal accessed their photos, emails, passwords, bank accounts and credit card numbers. Offenders might not even be human, as “bots” can find a computer’s security weaknesses, Kleineschay said.
“Security bugs will always exist, humans are fallible,” said Kleineschay. The threat of viruses, worms, Trojans, ransomware and malware
Read more at: http://themetropolitan.metrostate.edu/issue/2017/11/007/