Tag Archives: looking

Executive Insights: 2017 Threat Trends – Looking at Our Threat Reports

The expanding attack surface

2017 was the year of digital transformation. Traditional network environments were upended by the rapid adoption of things like cloud infrastructure and cloud-based applications and services, the virtualization of data centers, the integration of billions of new, connected IoT devices, and the continued expansion of mobility, BYOD, and related applications.

Because this change has happened so rapidly, many organizations have had to scramble to find ways to extend security to new network ecosystems, devices, and applications. For example, organizations today use an average of about 200 different applications, ranging from productivity tools used internally, to consumer-facing applications that provide quick access to data and enable tap-of-the-screen transactions. These applications span from remote devices to cloud services, and mine deep into the data center for real-time information. The number of high-profile data breaches and the resulting theft of hundreds of millions of data

Read more at: https://securityboulevard.com/2017/12/executive-insights-2017-threat-trends-looking-at-our-threat-reports/

Executive Insights: 2017 Threat Trends – Looking at Our Threat …

The expanding attack surface

2017 was the year of digital transformation. Traditional network environments were upended by the rapid adoption of things like cloud infrastructure and cloud-based applications and services, the virtualization of data centers, the integration of billions of new, connected IoT devices, and the continued expansion of mobility, BYOD, and related applications.

Because this change has happened so rapidly, many organizations have had to scramble to find ways to extend security to new network ecosystems, devices, and applications. For example, organizations today use an average of about 200 different applications, ranging from productivity tools used internally, to consumer-facing applications that provide quick access to data and enable tap-of-the-screen transactions. These applications span from remote devices to cloud services, and mine deep into the data center for real-time information. The number of high-profile data breaches and the resulting theft of hundreds of millions of data

Read more at: https://securityboulevard.com/2017/12/executive-insights-2017-threat-trends-looking-at-our-threat-reports/

Looking ahead: 2018 cybersecurity forecast

From the WannaCry cyberattack on the operations of major multinational corporations, to the Equifax data breach that impacted 145.5 million customers in the U.S. and Canada, 2017 marked a shift in the cybersecurity landscape. 

Hackers upped their game—exploiting new vulnerabilities, leaking spy tools from U.S. intelligence agencies, and hacking political campaigns. As hackers gear up to unleash new and improved attacks in 2018, enterprises will need to be more proactive and reevaluate where they are dedicating resources. Here are my top ten predictions for what we can expect to see in 2018:

‘Hacking back’ policy will be an increasing concern. Two members of the U.S. House of Representatives introduced a bill earlier this year that allows victims to hack their hackers. The trouble is, we already know that real, definitive attribution is incredibly difficult. So, how can we ever be sure that we’re attacking the real source of an attack? What will

Read more at: https://www.itproportal.com/features/looking-ahead-2018-cybersecurity-forecast/

​Why business is looking good for ransomware criminals

New findings from a report that Carbon Black has just released show it is easier than ever for criminals to extort money from victims through ransomware.  Our report ‘The Ransomware Economy’, shows that the market from this insidious form of malware is an estimated $1 billion.

Investigations by our Threat Analysis Unit (TAU) found that cyber criminals are increasingly seeing opportunities to enter the market and looking to make a quick buck via one of the many ransomware offerings available via illicit dark web marketplaces. In addition, the basic appeal of ransomware is simple: it is turnkey. Unlike many other forms of cyber attacks, ransomware can be quickly and brainlessly deployed with a high probability of profit.

As a result, the amount of money being extorted by ransomware is much higher than it’s ever been.  Payments associated with ransomware went from $24 million to $1 billion from 2015 to

Read more at: https://www.cso.com.au/article/629705/why-business-looking-good-ransomware-criminals/

Bailed man ‘looking for friends’ wanted over stabbing

Detectives are searching for a man out on bail after two people were stabbed at a bar in Melbourne at the weekend.

Police want to speak to Damen Stephens, 43, after a 44-year-old and 29-year-old man were stabbed at a bar in on Fitzroy Street in St Kilda about 9pm yesterday.

The injured men were transported to hospital with non-life threatening injuries.

Mr Stephens is also wanted over a suspicious house fire on Gilmour Road, Bentleigh, about 1am yesterday.

Earlier this year, Mr Stephens posted to Facebook saying he had been released on bail after serving eight months in prison for a “slight cyber-stalking incident/misunderstanding/love-story”.

“Out on bail for a while,” he wrote.

Anyone who sees Mr Stephens is urged not to approach him and to instead call Triple Zero.

He is described as being about 180cm tall, with a thin build, bald head, unshaven face, glasses and was last seen wearing a long-sleeved dark

Read more at: http://www.9news.com.au/national/2017/10/08/11/38/damen-stephens-bailed-man-looking-for-friends-wanted-over-stabbing

Bailed man ‘looking for friends’ wanted over stabbing – 9News

Detectives are searching for a man after two people were stabbed at a bar in Melbourne at the weekend.

Police want to speak to Damen Stephens, 43, after a 44-year-old and 29-year-old man were stabbed at a bar in on Fitzroy Street in St Kilda about 9pm yesterday.

The injured men were transported to hospital with non-life threatening injuries.

Mr Stephens is also wanted over a suspicious house fire on Gilmour Road, Bentleigh, about 1am yesterday.

Anyone who sees Mr Stephens is urged not to approach him and to instead call Triple Zero.

He is described as being about 180cm tall, with a thin build, bald head, unshaven face, glasses and was last seen wearing a long-sleeved dark top.

© Nine Digital Pty Ltd 2017

Read more at: http://www.9news.com.au/national/2017/10/08/11/38/damen-stephens-bailed-man-looking-for-friends-wanted-over-stabbing

Cyber crime: Romance fraudsters extracting £34m a year from Britons looking for love online

JOHNSTON PRESS INVESTIGATIONS: Cahal Milmo, Aasma Day, Don Mort, Chris Burn, Ruby Kitchen, Paul Lynch, Oli Poole, Gavin Ledwith, Ben Fishwick, Philip Bradfield and Deborah Punshon

Cyber con artists targeting dating websites are defrauding Britons of at least £34m a year by exploiting growing use of online matchmaking to extract money under a pretence of romance, the i can reveal.

The number of cases of so-called romance fraud across the UK rose by more than a fifth last year to more than 3,100 with victims losing on average £11,000, according to figures obtained by the i and Johnston Press investigations.

“Simple rules: find something to say, find common interests to talk about, research them, where they live, everything they talk about. Have a story, a good one and live it.”

Convicted romance fraudster

Online dating worth £2bn worldwide

The total amount stolen from this particularly cruel form of fraud rose by a third last year to

Read more at: https://inews.co.uk/essentials/news/uk/cyber-crime-romance-fraudsters-extracting-34m-year-britons-looking-love-online/

Even homeowner associations are targets of hackers looking to profit off cybercrime

Question: Our HOA’s website, which was created and controlled by the management company, houses a treasure trove of documents and information pertaining to our association and its members.

The website has been hacked, causing embarrassing and confidential information to be leaked and destroying our attorney-client privilege in a legal case. It also caused a huge uproar by owners about the board’s cavalier attitude about cybersecurity.

The breach prompted owners to remove nearly the entire board. Only one director was even concerned enough to question what would happen to our website information when our management company is terminated, which should be soon.

But even the new board members are unprepared and do not want to hire a cybersecurity expert for advice, reasoning that there are more important things to spend our money on.

The Army is looking into allegations that soldiers were involved in nude photo sharing

The Army is looking into allegations that some soldiers may be involved in an image-sharing message board where troops from all branches of the service are allegedly crowdsourcing naked pictures of female service members.

“Special agents from the U.S. Army Criminal Investigation Command’s specialized Computer Crime Investigative Unit are currently assessing information and photographs on a civilian website that appear to include U.S. Army personnel,” Army spokeswoman Cynthia Smith said in a statement to Army Times.

The special agents are working to “determine if a criminal offense has occurred,” Smith said.

First reported by
Business Insider, the Army’s inquiry comes one day after news broke about AnonIB, a website where purported male service members request naked pictures of their female counterparts by name, rank and duty station. The Business Insider report also said the men allegedly were cyber-stalking and sharing nude photos of their female

Read more at: https://www.armytimes.com/articles/army-looks-into-allegations-soldiers-were-involved-in-nude-photo-sharing

The Army is looking into allegations that soldiers were involved in …

The Army is looking into allegations that some soldiers may be involved in an image-sharing message board where troops from all branches of the service are allegedly crowdsourcing naked pictures of female service members.

“Special agents from the U.S. Army Criminal Investigation Command’s specialized Computer Crime Investigative Unit are currently assessing information and photographs on a civilian website that appear to include U.S. Army personnel,” Army spokeswoman Cynthia Smith said in a statement to Army Times.

The special agents are working to “determine if a criminal offense has occurred,” Smith said.

First reported by
Business Insider, the Army’s inquiry comes one day after news broke about AnonIB, a website where purported male service members request naked pictures of their female counterparts by name, rank and duty station. The Business Insider report also said the men allegedly were cyber-stalking and sharing nude photos of their female

Read more at: https://www.armytimes.com/articles/army-looks-into-allegations-soldiers-were-involved-in-nude-photo-sharing