Remove Data breaches Remove Encryption Remove Libraries Remove Military
article thumbnail

Weekly podcast: 2018 end-of-year roundup

IT Governance

As is now traditional, I’ve installed myself in the porter’s chair next to the fire in the library, ready to recap some of the year’s more newsworthy information security events. Equifax issued its financial report for the first quarter of 2018, revealing that its huge 2017 data breach had so far cost it $242.7

article thumbnail

The Hacker Mind Podcast: Going Passwordless

ForAllSecure

You might not think of it as a major aspect of security and yet, stolen credentials are really the key to data breaches today. For example, here’s Jerry Lewis in a scene from a 1950s film, where he’s trying to break into a Nazi German military base. Fact is, we’ve long had passwords as a credential.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The History of Malware: A Primer on the Evolution of Cyber Threats

IBM Big Data Hub

In the case of double-extortion ransomware attacks, malware is used to not only encrypt the victim’s data but also exfiltrate sensitive files, such as customer information, which attackers then threaten to release publicly.

article thumbnail

EP 49: LoL

ForAllSecure

Vamosi: Whenever there's a data breach, a ransomware attack, large security event in general, I would like to learn something about how it happened. And what they'll do is they'll use a legitimate program that depends on the library, bring malicious libraries with them, they get something sideways.