Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days.
Below you’ll find a quick recap of topics followed by links to news articles and/or our blog posts providing additional insight. Be sure to check back each Friday for highlights of the goings-on each week!
In our 2017 Predictions report, “The Next Tier: 8 Security Predictions for 2017” we state that ransomware growth will plateau in 2017, but attack methods and targets will diversify. Let’s explore what we mean by this and how this threat will evolve next year.
Yahoo has suffered another hack. The company disclosed that it has discovered a breach of more than one billion user accounts that occurred in August 2013. The breach is believed to be separate and distinct from the theft of data from 500 million accounts that Yahoo reported this September.
The malware is comparatively benign, as malware goes. All it does is eat processor time, tie up RAM, and raise your power bill to mine Zcash. But coin mining software will often take up all the RAM you’re not actively using, which means this malware can really kneecap performance.
There is a common misconception across multiple industries that information leaked from pagers, such as personal conversations or company information, is useless to cybercriminals. Not only is this untrue, but can prove extremely risky and even dangerous for organizations.
With more households running smart devices that access the internet, the router is typically their only doorkeeper. And whether an end user has a laptop/desktop and router combo, or a miscellany of other devices connected to the network, the security risks are the same.
A new ransomware variant has been discovered using an innovative system to increase infections. Users who finds themselves infected with the Popcorn Time malware is offered the ability to unlock their files for a cash payment or by passing on a link to the malware.
Now that we know what bad guys can do, we’ll discuss the detection and mitigation techniques that security vendors can use to stop them. By sharing these details with other researchers, we hope to improve the industry’s collective knowledge on mobile ransomware mitigation.
An American hacker fugitive accused of hacking into JPMorgan Chase in the “largest theft of customer data” from an American bank was arrested on Wednesday, according to the U.S. Department of Justice. At this time last year, Joshua Samuel Aaron was believed to be hiding in Moscow.
For this month, Adobe released nine security patches addressing issues in Flash, Robohelp, ColdFusion Builder, InDesign, DNG Converter, Adobe Digital Editions, Animator, Experience Manager and Experience Manager Forms.
The extent of the damage isn’t clear, though two people informed of the security breach said it targeted the Saudi central bank, the transportation ministry and the agency that runs the country’s airports. One bright spot is that the Saudis have been able to restore some lost data via back-ups.
As more Enterprises embrace the flexibility, agility and cost savings of moving to cloud providers like Amazon Web Services (AWS), skills in cloud operations and security become increasingly critical.
Many Enterprises today either operate or outsource their data center operations.
‘Tis the season to mark your calendars with the hottest cybersecurity conferences for 2017. The major event producers have published their schedules for next year – check out some of the most notable in date order.
Please add your thoughts in the comments below or follow me on Twitter; @JonLClay.