Two major cyberattacks have siphoned over $50 million and nearly $80 million from a Belgian bank and an Austrian aircraft parts manufacturer, respectively. They were both victim to a scam known as Business Email Compromise.
The recommendation by the FBI that victims of ransomware pay up to have their files decrypted created a buzz within IT folks of all kind. It’s time to ask: Should paying the ransom really be considered an option?
The detection and blocking of malicious code employed by modern threats, whether targeted attacks or mass-spreading campaigns, has been a game of cat-and-mouse for some time now. Is it time for a new approach?
It’s here, folks! If the replaced DNSChanger servers don’t get another deadline extension, more than 500,000* computers may not be able to reach their configured DNS service after next Monday, July 9, 2012. In other words, it will be practically impossible for the users of those computers to surf the Internet using human friendly domain
Update: A US Federal Court extended the deadline for shutting down the replacement DNS servers to July 9, 2012. On Wednesday, the German Federal Office for Information Security (BSI) published a press release advising users to recheck DNS server settings on their computers. This recommendation is related to the successful botnet takedown – dubbed ‘Operation
Says the first line of the presentation entitled “Building a Distributed Satellite Ground Station Network – A Call To Arms” given some time ago at the 28th Chaos Communication Congress (28C3) in Berlin by hackers from the Hackerspace Global Grid team. The presentation was lead off by Nick Farr who had already proposed the need
<h3><a class="wls-article" href="http://www.welivesecurity.com/2016/02/03/european-firms-financial-departments-target-cyberattacks/">European firms’ financial departments the target of cyberattacks</a></h3><a class="wls-link" href="http://www.welivesecurity.com" target="_blank" >BY WELIVESECURITY.COM - security news, views and insight from ESET experts</a></div>