EFF and Lookout traced Dark Caracal to Lebanon and has infected Android users in more than 20 countries and stolen hundreds of gigabbytes of dat. Cyber espionage using fake apps with Android malware is the new trend as nation states and cybercriminals move towards using mobile as the target platform.
There is a tremendous amount of potential for machine learning and cyber security within the enterprise. In order for machine learning to live up to the hype, it will need to offer a fully robust security solution and plenty of organizations are now betting that machines will be up to the task.
The Unique Identification Authority of India (UIDAI) has denied reports that the Aadhaar data breach has made masses of biometric data available to external players for a miniscule sum. Has big government in India simply overreached itself as far as its vision for this database is concerned?
Are you a victim of cryptojacking? Both individuals and organizations are now at risk of this new hacking approach to tap into your computer’s processing power. Most famously, Coinhive has been promoting this controversial new practice to tap for mining the cryptocurrency Monero.
Recent study by Imperva gets under the skin of what can now be characterized as an increasingly complex and rapidly maturing phishing industry. The study examined more than 1,000 free phishing kits that allow for the development of phishing web sites in what has been called an ‘easy to deploy’ format.
For years, China has used the World Internet Conference to advance its vision for cyber sovereignty. Now it looks like the various ideas and concepts, including the new Cybersecurity Law, undergirding this vision are starting to be put into effect for China’s Internet, with unknown implications.
AIG releases new cyber risk benchmarking model to quantify and score cyber maturity of clients, boosting cyber insurance and promoting metrics useful for the industry to evaluate the risks that organizations face in terms of cyber security.
It’s not all about the safeguards and technical measures around information. Savvy security experts need to understand privacy and how it interacts with the security world and what privacy means for an organization’s security strategy and compliance with things like HIPAA, GDPR, CBPR, etc.
Incident response is a team sport. A smart and effective cyber defense must go beyond individual technologies or SOC to collaborate across the enterprise.
Increased reliance on digital systems for manufacturing and industrie 4.0 will emphasize the criticality of industrial control systems (ICS) security.