searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus

Video: Could criminalizing ransomware payments put a stop to the current crime wave?

Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

Industry news

Get our top stories in your inbox

NeuVector now offers extensive compliance reporting and enforcement for PCI DSS, GDPR

August 18, 2020

NeuVector released the newest version of its cloud-native Kubernetes security platform. The enterprise-trusted, build-to-production container security solution now includes …

Viasat MDD now available for the new Samsung Galaxy S20 Tactical Edition solution

August 18, 2020

Viasat announced its Mobile Dynamic Defense (MDD) cybersecurity software is now available for the new Samsung Galaxy S20 Tactical Edition (TE) solution. The Viasat MDD …

HID Global acquires Access-IS to broaden technology portfolio, boost market expansion

August 18, 2020

HID Global announced that it has acquired Access-IS to broaden HID Global’s technology portfolio, accelerate its vertical market expansion, and add new product offerings that …

New IBM POWER10 processor has transparent memory encryption for end-to-end security

August 17, 2020

IBM revealed the next generation of its IBM POWER CPU family: IBM POWER10. Designed to offer a platform to meet the unique needs of enterprise hybrid cloud computing, the IBM …

AWS launches Amazon Braket to help customers explore and design quantum algorithms

August 17, 2020

Amazon Web Services (AWS), an Amazon.com company, announced the general availability of Amazon Braket, a fully managed AWS service that provides a development environment to …

Sectigo unveils Sectigo Quantum Labs to help orgs prepare for quantum computers

August 17, 2020

Sectigo announced the launch of Sectigo Quantum Labs to help organizations prepare for the time when quantum computers render existing standard encryption algorithms obsolete. …

Infineon and Fingerprint Cards partner to enable mass deployment of biometric payment cards

August 17, 2020

Biometric payment cards with an integrated fingerprint sensor make contactless payments more convenient, more secure and hygienic. The contactless card remains in the hands of …

2020 (ISC)² Global Achievement Awards: Celebrating achievements in cybersecurity

August 17, 2020

(ISC)² announced the list of honourees for its 2020 (ISC)² Global Achievement Awards, which recognize and celebrate the most outstanding annual and lifetime achievements in …

TAG hires Danielle Meah as Director of Threat Intelligence

August 17, 2020

The Trustworthy Accountability Group (TAG) announced the hiring of Danielle Meah, former Global Head of Threat Intelligence for Citigroup, as TAG’s first Director of …

PCTEL expands IIoT portfolio with its wireless communication sensor platform

August 14, 2020

PCTEL announced the expansion of its IIoT portfolio with its new wireless communication sensor platform. The integrated wireless communication sensor platform includes a …

Trend Micro integrates with AWS to enhance agility and automation in cloud security

August 14, 2020

Trend Micro enhances agility and automation in cloud security through integrations with Amazon Web Services (AWS). As a result, Trend Micro delivers flexible and scalable …

BAE Systems awarded $85M contract to secure transfer of government’s sensitive information

August 14, 2020

The U.S. Air Force Research Laboratory (AFRL) has awarded BAE Systems a five-year $85 million contract to continue to develop, deploy, modernize, and maintain cross-domain …

Posts navigation

1 … 480 481 482 483 484 485 486 487 488 … 816

Featured news

  • Three ransomware gangs consecutively attacked the same network
  • Understanding your attack surface is key to recognizing what you are defending
  • Dissecting Google’s Titan M chip: Vulnerability research challenges
5 key things we learned from CISOs of smaller enterprises survey

What's new

Microsoft fixes exploited zero-day in Windows Support Diagnostic Tool (CVE-2022-34713)

Three ransomware gangs consecutively attacked the same network

Kali Linux 2022.3 released: Packages for test labs, new tools, and a community Discord server

LogoKit update: The phishing kit leveraging open redirect vulnerabilities

Don't miss

Microsoft fixes exploited zero-day in Windows Support Diagnostic Tool (CVE-2022-34713)

Kali Linux 2022.3 released: Packages for test labs, new tools, and a community Discord server

Three ransomware gangs consecutively attacked the same network

Twilio confirms data breach after its employees got phished

Understanding your attack surface is key to recognizing what you are defending

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • Understanding your attack surface is key to recognizing what you are defending
  • Machine learning creates a new attack surface requiring specialized defenses
  • Browser synchronization abuse: Bookmarks as a covert data exfiltration channel
  • Ransomware gangs are hitting roadblocks, but aren’t stopping (yet)

(IN)SECURE Magazine ISSUE 72 (July 2022)

  • 7 threat detection challenges CISOs face and what they can do about it
  • How to set up a powerful insider threat program
  • An offensive mindset is crucial for effective cyber defense
Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise