Home > Search
Found 19 Results
Writing for IBM’s Security Intelligence publication, Douglas Bonderud notes that the advantages of smart cities offset neither the potential security issues, nor the risk of connected devices and vehicles as unwitting malware carriers. “While it’s impossible to design impenetrable infrastructure, the combination of basic security hygiene with cloud-based detection and remediation tools makes it possible […]
Written by Asaf Ashkenazi for Rambus Denise Johnson of Claims Journal recently observed that there has been a noticeable jump in spearfishing and ransomware incidents. Concurrently, data security has weakened due to an increase in connected and mobile devices. As such, it has become critical for businesses and insurers to fully understand how to effectively […]
Did you know that millions of implanted medical devices (IMDs) do not typically receive software upgrades to address security vulnerabilities? Such devices – which are often connected via the internet or wireless technologies – include cardiac pacemakers, insulin pumps and brain neurostimulators. Consequently, IMDs pose very clear risks along with their obvious benefits. “Hackers who […]
Trend Micro has confirmed a 752% increase in ransomware families during 2016, with spam ranked the top infection vector. According to the cyber security company, the availability of open source ransomware and ransomware-as-a-service (RaaS) will continue to make it easier for cyber criminals to run their own ransomware operations. Image Credit: Trend Micro “Organizations should […]
Written by Asaf Ashkenazi Industry estimates suggest the global cyber insurance business could reach approximately $20 billion by 2020. Currently, most cyber insurance policies cover damages related to data leaks, such as the inadvertent publication of SSNs, bank account or credit card numbers and patient medical history. Other cyber insurance policies offer compensation for ransomware […]
Last week, cyber criminals targeted computer systems operated by the government of Licking County, Ohio with a virus and an accompanying financial demand that has been labelled ransomware. Ransomware is typically used to lock systems and encrypt files, effectively denying access to data until payment is remitted. Although county offices remained opened to the public, […]
A recent report authored by TrapX details three instances where hospitals were hit by data breaches. According to DarkReading’s Kelly Jackson Higgins, the digital intrusions occurred after certain medical devices had been infected with malware backdoors. “In all three cases, the hospitals were unaware that these devices – a blood gas analyzer, a picture archive […]
The RSA 2015 Cryptographers’ Panel in San Francisco featured a number of prominent security personalities such as Adi Shamir, Ed Giorgio, Ronald Rivest and Whitfield Diffie. Moderated by Paul Kocher, the President and Chief Scientist of Rambus’ Cryptography Research Division, the panel touched on a wide range of topics, including E.M.V. smart credit cards, the […]
The RSA 2015 Cryptographers’ Panel in San Francisco featured a number of prominent security personalities such as Adi Shamir, Ed Giorgio, Ronald Rivest and Whitfield Diffie. Moderated by Paul Kocher, the President and Chief Scientist of Rambus’ Cryptography Research Division, the panel touched on a wide range of topics, including E.M.V. smart credit cards, the […]