main

Attack Types & VectorsSecurity

“For Educational Purposes Only”

February 15, 2017 — by Daniel Smith2

educational-purposes-960x634.jpg

Education, freedom and knowledge. These are the pillars for higher learning, but have often been used to describe some open source projects and services that have the potential to be abused by those that are not so innocent. Over the last two years, tools like stressers, Remote Administration Tools (RAT) and ransomware have been published under these pretenses, but do they serve a legitimate purpose? These projects have set off an international debate in the information security community and many wonder if they should be available to the public. Often the justification for these projects is that they are intending to show the potential risks so they can be used to prevent infections or reduce potential damage. With stressers, they claim that the services are to be used to improve and test security products and to understand attack behavior targeting their network. But are they?

Security

The Current Surge of Bitcoin Prices

January 11, 2017 — by David Hobbs1

bitcoin-surge-960x640.jpg

It has long been known that if you want to participate in the Darknet marketplaces, you’ll need to exchange your money into Bitcoin.  Bitcoin was written by someone using the alias Satoshi Nakamoto in 2008 as an anonymous and decentralized currency. We’ve written in the past about how to buy Bitcoin. Today, for various reasons, we are seeing it become mainstream.

Ransom attacks on companies are becoming big business. Many businesses say they will not pay, but when attacked, find that they do.  But how do they pay?  Bitcoin. Just like having insurance policies, companies are now investing in keeping Bitcoin around for business continuity against DDoS attacks as well as Malware CryptoLocker and Data Extortion attacks.

Security

How Lucrative is Confidential Data? Prime Bounty for Hackers, Top Concern for Businesses

January 10, 2017 — by Ben Zilberman0

Chapter_4_Emerging_Threats-960x747.jpg

IT Professionals report securing sensitive data as the #1 challenge, even more than avoiding revenue loss or protecting reputation

In the 19th century, money was the key to power. During the 20th century, it was technology. Today, information and data is the key to power. It’s why organizations are keen to safeguard their data and hackers are intent on stealing it. In 2016, this fact was underscored numerous times: Wikileaks, ransom attacks that hijacked an organization’s digital assets, or the doxing and dumping of information about officials and decision makers.

Attack Types & VectorsSecurity

2016: The Year of Cyber Ransom

December 27, 2016 — by Radware1

cyber-ransom-roundup-960x640.jpg

In 2015, we made a number of predictions for the upcoming year. One of the bigger predictions was that we would see the continued rise of ransomware and RDoS (ransom-denial-of-service) attacks. When we look back at the year, we were right – 56% of companies we surveyed reported being threatened in this manner.

Because these attacks have become so prevalent, it’s important to understand the motives behind them, and how to protect your organization. Below is a round-up of some of our most popular blog posts to bring you up to speed on this threat: