Expert corner

 
 
(IN)SECURE Magazine
industry

Whitepaper: Top 20 cyber attacks on ICS

The technique for evaluating the risk of cyber-sabotage of industrial processes are well understood by those skilled in the art. Essentially, such risk assessments evaluate a typically large inventory of possible cyber attacks against the …

Hacking Team

US man is behind the 2015 Hacking Team hack?

Who’s behind the 2015 Hacking Team hack? According to a notice received by Guido Landi, one of the former Hacking Team employees that was under investigation for the hack, a 30-year old Nashville, Tennesee resident might have had something …

biohazard

Return of Necurs botnet brings new ransomware threat

The Necurs botnet has returned to the top ten most prevalent malware during November 2017, as cybercriminals used it to distribute a new form of ransomware, according to Check Point. Researchers found that hackers were using Necurs, considered …

USB

Enterprise USB security is outdated and inadequate

While USB drives are ubiquitous for employees across all industries, security policies for these devices are often severely outdated or grossly inadequate for protecting critical enterprise data, according to Apricorn. By failing to effectively …

Defending against crypto ransomware

eBook: Defending against crypto-ransomware

According to the Symantec 2017 Internet Security Threat Report, the average ransom demand has reached over $1000 in the last year. Therefore, it is critical to take steps to prevent infection and be prepared to restore from backup if prevention …

Don't miss

Malware news

Privacy news

 
(IN)SECURE Magazine