Meet ransomware’s equally shady cousin

Mobile ransomware

Ransomware has been grabbing headlines this year through attacks on high-profile targets such as hospitals and major retailers. And while most of the prominent ransomware attacks have come through PCs, ransomware files targeting mobile devices have increased dramatically this year. Data from the Kaspersky Lab Malware Report for the first quarter shows that 218,625 mobile […]

Worse than ransomware? That’s just great.

Cyber attack

If you or your enterprise were victims of the reported massive ransomware attack that rocked the digital world Tuesday, you may have seen a message on your infected device informing you that your data will be unlocked after you pay a $300 hostage fee in bitcoin. Researchers initially thought the “malware was a new version […]

Healthcare industry still concerned about medical device hacking

A Ponemon survey released last week, Medical Device Security: An Industry Under Attack and Unprepared to Defend, shows that many in the healthcare industry still believe medical devices are primed for, and defenseless to, attack. While the study’s title smacks of hyperbole – medical devices are not coming under significant attack in the wild today (yet) […]

Law firms targeted in hacks seeking insider info

Last week, three Chinese hackers were charged with stealing inside information in order to profit from trading equities. According to an indictment unsealed Tuesday, Jan. 3, 2017, in the Southern District of New York, the three were charged with “devising and carrying out a scheme to enrich themselves by obtaining and trading on material, nonpublic information […]

6 keys to enterprise mobile security

mobile device security enterprise IT CSC Blogs

There was a time when mobile devices just didn’t face the same kind of threats from attackers and malware as full-featured operating systems did. Those days are gone. Criminals, spies and whoever wants to access data have to make the transition to exploiting mobile devices because that’s where the users, apps and data reside today. The […]

On spreading malware and mayhem with a USB stick

USB stick security penetration

If you see a USB stick lying on the street, you might be better off just walking by. And if you happen to pick it up, make sure it ends up in the trash compactor. No matter how curious you may be, it’s just not worth the risk of plugging in. This was my takeaway reading articles about […]

NewPoSThings malware tries new tricks

Cybersecurity CSC Blogs

The NewPoSThings point-of-sale malware may be a few years old, but it’s not too old to learn new attack tricks. Just like other memory scrapers, NewPoSThings would scrape memory for credit card data and then exfiltrate that information back to the attackers. And this attack software, like most, would use many different techniques to try […]