combatcyber

Latest posts

23% Of Organizations Globally Affected By Crypto-Mining Malware, Says Cybersecurity Firm

Researchers of the firm discovered three different variants of crypto-mining malware in its top 10 most prevalent threat with Coinhive ranking first. Other crypto-miner malware that made the list include JSEcoin ranked fifth, and Cryptoloot ranked eighth. The firm claims more than one-in-five organizations around the world had been affected by the Coinhive variant last month.

Telugu Chaos

Can you imagine our surprise, when we found out that there is a superb yet super easy way to crash numerous iOS devices with just one character?

The bug was first spotted by an Italian Blog called Mobile World. It's essentially a text bomb and it requires users to send one single character from the language called Telugu - a native Indian language that's spoken by over 70 million people in India. 

Here is what the character looks like: 

Email Security.

With multiple mass cyber break-ins and hackers giving all their efforts to destroy any sense of security we may have in our communications, it's natural to be concerned about the level of security that email service providers can actually give.

The email giants are all experiencing a great deal of change when it comes to their security strategy and approach, and rightly so.

Bitcoin Nazis

Many have tried to clampdown on Bitcoin regulation, including steps taken by the Chinese to end Bitcoin mining, South Koreas' total Bitcoin ban and Egypt's call for branding Bitcoin as "haram'.

Yes, powerful leaders are shaking in their boots and yet, decentralized digital trading has continued to grow exponentially.

When should an organization report a data breach?

No matter what its size or cybersecurity posture, your organization is vulnerable to cyber crime and data breaches. Under federal, state, and international laws, once organizations become aware of a breach they have a certain amount of time to report it to the relevant supervisory authority. Sitting on an incident without reporting it puts organizations at risk of legal and other ramifications.

Trouble on the horizon: what ENISA’s Report tells us about the threat of data breaches

Last month, the European Union Agency for Network and Information Security (ENISA) published its 2017 ‘Threat Landscape Report’1. The Report comments on general trends in the area of cybercrime, and identifies and gathers data on 15 top “cyber-threats”. Many of the threats identified in the Report are designed to target vulnerable individuals. However, one particularly topical cyber threat draws concern both from individuals and organisations: the increasing threat of large scale data breaches.

Knowledge Is Power in the Battle to Control Our Data

The sheer amount of data we generate on a daily basis can be more than 300 MB each day and sharing some of this information is a part of modern life. Attempting to control who collects, uses and shares our personal information requires technical tools and know-how and a basic understanding of what risks can ultimately emerge. But before anyone offers up a standard set of tips for how best to manage your privacy, it’s worth taking a moment to learn more about the complex data ecosystem in which we all now live – and what that means for controlling information about us.

Identity fraud enters a new era of complexity

The 2018 Identity Fraud Study found that despite industry efforts to prevent identity fraud, fraudsters successfully adapted to net 1.3 million more victims in 2017, with the amount stolen rising to $16.8 billion. With the adoption of EMV cards and terminals, the types of identity fraud continued to shift online and away from physical stores. The complexity of fraud is also on the rise as criminals are opening more new accounts as a means of compromising accounts consumers already have.