[Report] The New Cyber Threat Landscape: Tactics are Getting Simpler, Outcomes are Becoming Unprecedented

It will come as no surprise to anyone that 2016 saw an alarming increase in targeted attacks aimed at politically motivated sabotage and subversion. This new level of ambition by cyber criminals is corroborated by the annual Internet Security Threat Report from DLT partner, Symantec. The perceived success of several campaigns – particularly the U.S.

What You Need To Know About The WannaCry Ransomware Virus

On May 12 a ransomware virus, WannaCry, was released on the Internet and rapidly spread to hundreds of thousands of Microsoft Windows based computers in over 150 countries.  The malware encrypts critical files on a computer, such as Excel, Word, and other important files, and seeks out backup copies for encryption as well.  Once it infects a system, it requires the victim to pay approximately $300 in digital currency (Bitcoin), and immediately tries to find other systems to infect.

Technically News – 10/28

This week in Technically News: What To Do When Your Computer Gets Kidnapped By Ransomware; Why the US Government Needs a “Digital Core”; Google or Microsoft? Army Users Get Choice; 8 Areas for Improvement in Securing Critical Infrastructure; Stabilizing DHS Cybersecurity Leadership

Mobile Malware is the New PC Malware

In 2004, Cabir became the first mobile-based worm, infecting Symbian-based devices including old Samsung and Nokia models. Although it was developed as a proof-of-concept, within a year Cabir helped spawn mobile malware including the first mobile Trojan (Qdial) and mobile application hack (Skulls). Today, explosion of smartphones and tablets has spawned an entirely new hacking industry – one that has the potential to bypass your current cybersecurity strategies if you have not included mobile protection.

GovDefenders Wednesdays: What is Ransomware & Why Is It a Threat?

The Ransomware Threat Neal Stephenson’s most recent novel REAMDE is a 1,000-page technology thriller that I recommend to those of you who enjoy complex novels. Stephenson develops the plot from the consequences of a hacker in Asia who uses ransomware to encrypt a hard drive containing a list of thousands of stolen credit card records. The hacker promises a decryption key to unlock the hard drive upon payment of a ransom fee. What the poor hacker does not realize is that the Russian mafia had previously purchased the stolen credit card data for a large sum of money and now cannot use it. As you may surmise, mayhem ensues across several continents.