Category: Risk

Ransomware evolution: Locky and Sage combine in phishing

The ransomware marketplace is far from dissipating. New variants have already appeared in 2017 and researchers have detected that one new iteration, Sage, shares infrastructure with another already notorious malware, Locky, according to a PhishMe blog post. In digging into samples of Sage, the PhishMe researchers found that while the coders behind the ransomware at ...

Cisco: Data breaches costing some businesses 20% of revenue

The cyber crime landscape underwent several changes in 2016 with malicious actors taking a more ''corporate'' approach to their craft, which helped lead to even greater losses by business hit with a cyber attack. The damage inflicted on organizations victimized by data breaches and other cyber attacks last year included losing customers, revenue and potential ...

Top 10 operational risks for 2017

Risk.net presents the top 10 operational risks of 2017, as chosen by risk practitioners.

INTERPOL and Council of Europe experts meet to discuss major event security

A meeting between the Council of Europe's Secretariat of Sport Conventions and INTERPOL's Project Stadia provided an opportunity to review security issues connected to major public events. Areas of discussion at INTERPOL's General Secretariat headquarters focused on cooperation between both organizations on safeguarding major sports and other public events, best practices to mitigate potential threats, ...

Kaspersky: DDoS attacks growing stronger with unsecured IoT

Kaspersky researchers spotted a record setting 292 hour-long (12.2 day) DDoS attack in Q4 2016, significantly beating the previous quarter's maximum attack, which lasted 184 hours (7.7 days) days. And poorly secured internet of things (IoT) may be to blame. The firm also found that 80 countries had their resources targeted, compared to 67 in ...

20K Overwatch hackers banned in South Korea

Overwatch players can rest easier knowing that they can get a fair shake in their online battles after thousands of hackers have been banned from the game. Blizzard Entertainment, the game's developer, announced the company banned more than 20,000 players in South Korea on the grounds of ''unauthorized use of third-party programs,'' also known as ...

This is what happens when you reply to spam email – James Veitch

Suspicious emails: unclaimed insurance bonds, diamond-encrusted safe deposit boxes, close friends marooned in a foreign country. They pop up in our inboxes, and standard procedure is to delete on sight. But what happens when you reply? Follow along as writer and comedian James Veitch narrates a hilarious, months-long exchange with a spammer who offered to ...

New assessment of UK climate change risks published

The Department for Environment, Food & Rural Affairs has published ''The UK Climate Change Risk Assessment,'' a new report into the future threats that climate change could engender. UK Climate Change Risk Assessment 2017 recognises how the trend towards warmer winters, hotter summers and changing rainfall patterns is affecting communities across the UK and sets ...

Report reviews risk incident trends

Fraud, cyber, and security incidents are now the ''new normal'' for companies across the world, according to the executives surveyed for the 2016/17 Kroll Annual Global Fraud and Risk Report. The proportion of executives that reported their companies fell victim to fraud in the past year rose significantly to 82 percent, from 75 percent in ...

ATM Malware Retooled to Strike More Machines

Upgraded Ploutus-D Malware Designed to Drain ATMs From Any Manufacturer In early 2013, cybercriminals began deploying in Mexico what some security experts described as one of the most advanced pieces of malware that's ever been built to steal money from ATMs. Nicknamed Ploutus, it evolved to become the first ATM malware that could be controlled ...

Researchers reconstruct fingerprint data from digital photo

Researchers in Japan have been able to "copy" fingerprint data from a digital photo of a person holding up a peace sign. This research is surely going to raise questions over the potential theft of fingerprint data through photos. Currently, many smartphones, laptops, and tablets feature some sort of biometric finger scanner that allows the ...

The simple steel box that transformed global trade

Perhaps the defining feature of the global economy is precisely that it is global. Toys from China, copper from Chile, T-shirts from Bangladesh, wine from New Zealand, coffee from Ethiopia, and tomatoes from Spain. Like it or not, globalisation is a fundamental feature of the modern economy. In the early 1960s, world trade in merchandise ...