Resources

Blog

What Does the Future Hold for Ransomware?

The recent WannaCry ransomware attack left thousands of businesses in more than 150 countries worldwide reeling, with countless Internet users coerced into paying a Bitcoin ransom in the hope they'd regain access to their critical files. For all the advances that have been made by IT security providers to halt such malicious online activity, the...
Blog

GDPR – Good Times Ahead for Cybercriminals

Just as GDPR will bring more focus (we hope) to cybersecurity at organizations around the world, the emphasis on protecting personal private information (PII) of EU/UK citizens – no matter where the company resides – will make this information more valuable to cybercriminals. One of the first rules of cybercriminals is they will not miss an...
Blog

Encryption: The GDPR Standard That's Got Web Privacy Services Hopeful

Businesses now have less than a year to achieve compliance with the General Data Protection Regulation (GDPR). As part of their efforts, organizations must look to Article 32 of the Regulation. This section affirms the data controller's and processor's responsibility to leverage "the pseudonymisation and encryption of personal data" to protect...
Blog

What the hacking of Gordon Ramsay’s email teaches us all

It doesn't matter if you're a regular computer user, the chairman of Hillary Clinton's presidential campaign , or a notoriously short-fused celebrity chef, we all need to harden the defences of our email accounts. Tabloid readers should know that all too well, having seen plenty of stories over the years of intimate photos stolen from Hollywood...
Blog

WannaLocker - The WannaCry Copycat Targeting Android Users in China

Attackers are using a copycat version of WannaCry ransomware dubbed "WannaLocker" to target Android users living in China. WannaLocker has been targeting Chinese gaming forms disguised as a plugin for King of Glory, a popular Chinese game. Upon installation of this fake add-on, the threat conceals its icon from the Android app drawer and changes the...
Blog

Turla Using Instagram Comments to Obtain C&C Servers

The Turla threat actor group is using comments posted on Instagram to obtain command and control (C&C) servers for its watering hole campaigns. For years, Turla has been targeting government officials and diplomats with watering hole techniques. Such attacks involve compromising websites its targets are likely to visit and redirecting them to its C...
Blog

VERT Research: A Security Review of Freelance Web Development

Back in June, Robert Hansen posted an interesting write-up[1] on his Smartphone Exec blog about outsourced web development that was returned with multiple embedded PHP backdoors. While this betrayal of trust by a freelance web developer shouldn’t have been surprising, it was, and it prompted Tripwire’s Vulnerability and Exposure Research Team (VERT)...
Blog

14-Year-Old Japanese Teen Arrested for Allegedly Creating Ransomware

Japanese authorities arrested a 14-year-old teen on Monday for allegedly creating and spreading ransomware. According to reports, the third-year junior high school student is suspected of combining free encryption programs to create the malicious software. The teenager admitted to creating the malware on Jan. 6 and uploading it to a foreign website,...
Blog

Ordinary People Need Cryptography

With the British election this June, cryptography on the internet is a hot topic. This past March, British Home Secretary Amber Rudd criticized WhatsApp's implementation of encryption in the wake of a terrorist attack: "It is completely unacceptable. There should be no place for terrorists to hide. We need to make sure that organisations like...
Blog

May 2017: The Month in Ransomware

May 2017 shaped up to be the busiest ransomware month to date. The bare statistics speak for themselves: a total of 79 new strains came out and 38 existing ones received updates. Extortion-based cybercrime is obviously more prolific and ubiquitous than ever. Last month, the world confronted the unprecedented WannaCry ransomware epidemic employing...
Blog

Two Bitcoin Mining Firms Slammed with $10M Penalty for Ponzi Scheme

Two Bitcoin mining companies have received orders to each pay a $10 million penalty for conducting a Ponzi scheme orchestrated by their principal. On 2 June 2017, the U.S. District Court for the District of Connecticut issued its judgment against two Connecticut-based companies, GAW Miners, LLC and ZenMiner, LLC, that cooperated with their principal...
Blog

There Is No Cyber Talent Crunch; You’re Just Hiring Wrong

“Cyber talent crunch challenges CIOs,” says one headline. “Businesses vulnerable due to talent shortage,” screams another. Intel even published a report revealing, among other things, that 82% of IT professionals confirm there is a shortfall in information security talent. And yet, at every information security conference I attend, I find no...
Blog

Women in Information Security: Jennifer Sunshine Steffens

When a layperson imagines someone who works in cybersecurity, or any area of tech, they probably picture a man. But I'm a female information security professional, and I've had a great time speaking to other women in my industry. Last time, I spoke to Sarah Aoun, who educates journalists and political activists on how to keep their data secure. This...
Blog

Cyber Security Training Online: An Interview with Ryan Corey of Cybrary

In recent posts, The State of Security has interviewed teachers who are helping to bring cyber security education to Canada's schools. We would be remiss, however, if we didn't recognize others' efforts to bring these types of training programs online and to institutions located elsewhere around the world. To cover this broader trend, we'll now...
Blog

Hackers Breach Kmart's Store Payment Card Systems

Kmart is informing customers that their credit card details may have been stolen after learning of a security breach involving its payment processing systems. Sears Holdings, Kmart’s parent company, confirmed the incident on Wednesday, but did not disclose any information regarding the number of stores affected or when the incident occurred. The...
Blog

Customer Data Reportedly Compromised in OneLogin Security Incident

Identity and access management software vendor OneLogin has suffered a security incident that reportedly compromised customer data. On 31 May, the provider of identity-driven security solutions revealed that an unauthorized party had gained access to OneLogin data in the U.S. region. Alvaro Hoyos, chief information security officer at OneLogin,...
Blog

Hackers Leak Personal Data and Photos from Cosmetic Surgery Clinic

A group of hackers have leaked personal data and photos that belong to patients of a cosmetic surgery clinic based in Lithuania. On 30 May, the bad actors published online some 25,000 private photos, including nude images, from patients of the Grozio Chirurgija clinic. They also included personal information in their dump. Those details ranged from...