In this third and final part of my three-part series on the challenges we face to securely functioning online in 2018, I’ll look at the threat of Business Email Compromise (BEC) scams during tax season in the United States.
For the past couple of yea...rs, I’ve written about how Business Email Compromise scams are associated with tax season which runs from January through April in the United States. As we head into the 2018 tax season it’s a good time to remind employees how to recognize these emails so as to not fall prey to these scams.
For the last two...Read More
In Part One of this three-part series about the top threats to be aware of for operating on the internet in 2018 I reviewed the trust issues around verifying secure sites and different aspects of SSL certificates. I’ll now move on to discuss the issu...es associated with malware and what we expect to see in 2018.
Malicious software has transitioned over the years, from relatively harmless adware to spyware, to keystroke loggers and banking trojans, to the massive ransomware attacks widely reported around the world in 2017 — such as with the Wannacry and Petya attacks. Throughout these developments, there has...Read More
As of April 2017, there were 3.8 billion people in the world accessing the Internet.
That’s roughly 51 percent of the world’s population and officially means non-Internet users are becoming the minority. As 2018 dawns, it’s important to ...understand that in developed countries, we now live in a digital society; indeed, it’s nearly unheard of to live, work, or go to school without Internet access being required. As our digital penetration increases, so does the risk that individuals and organizations are exposed to when operating online. In fact, as real-world traditional crime has been going down, online related crime and...Read More
There was a time when the biggest perceived threat to corporations online was the lone, basement-dweller whose mission to unleash makeshift mayhem left unsuspecting networks vulnerable to attack. Names like Albert Gonzalez, who notoriously extracted ...millions of credit and debit card numbers from TJX Companies, might come to mind.
Cybercrime, however, has evolved to unprecedented levels of complexity that looked more like business structures than singular bad actors. Today, crime rings often include organizational charts, international reach, C-level executives and even human resources departments. Crimeware-as-a-service (Caas) tools like these make recruiting easier than ever for ring leaders. In fact, some even...Read More
I’m guessing quite a few people did back on May 13, 2017, a Saturday, when a unique new ransomware, dubbed WannaCry, swept the world, targeting computer systems in almost 100 countries. This malicious software, stolen from the National Se...curity Agency, was distributed via email to many large global companies and government agencies, taking over the computers and encrypting the data files. The ransom demand was for $300 or more via Bitcoin (anonymous online currency), to receive the encryption key needed to unlock the files.
Ransomware of this nature leaves many corporations in a bit of quandary. Should they pay...Read More