Not all malware is designed to extort. Much of modern cyberattacks do have some sort of ransom or monetary aim, and to be sure, the ransomware do tend to get a lot of the headlines. Other malware is aimed for anarchy, like we detailed in our last post about NotPetya, the most expensive cyberattack in history. But other malware is, … Read More
$10 billion lost, a global supply chain crippled, and a miracle mistake: A NotPetya primer — cyberattack of the century
If it hadn’t been for Somali pirates, Navy Seals or the Tom Hanks movie Captain Phillips, chances are you probably wouldn’t have heard of A.P. Moller–Maersk Group, or ‘Maersk’ for short. It’s one of those companies content to work in the background, unnoticed and unknown, while at the same time fueling the entire world economy. It’s one of the largest intermodal logistics … Read More
Why hackers target you through IoT, how to spot a breach and how to protect yourself
In our most recent post, I walked you through the promise of the Internet of Things (IoT) from a consumer perspective before relaying a seemingly crazy anecdote about the increasingly creative (and nefarious) ways hackers are using IoT devices as access points to otherwise secure networks safeguarding sensitive data. It’s an important first step — recognizing IoT as the vulnerability … Read More
Technology Pain Threshold
I’m always surprised by the difference in pain thresholds between companies. One company will put up with all sort of terrible atrocities in their infrastructure and never say a word. Another company will raise hell the moment a printer doesn’t work. I suppose this is a matter of culture, but what is that actual impact on the business? The Emerson-Ponemon … Read More
- Page 2 of 2
- 1
- 2
Dive straight into the feedback!Login below and you can start commenting using your own user instantly