Ransomware and BEC scams lead the wave of threats that are turning 2016 into the Year of Online Extortion. Learn how these have changed the landscape and how organizations can protect themselves in our midyear security roundup.
Security researchers have been exposing smart car vulnerabilities for years, showing how susceptible they are to hackers. The automotive industry has since implemented robust cybersecurity practices while governments take steps to enact new legislation.
Various business websites were recently hijacked to deliver crypto-ransomware to visitors. Why do attackers repeat the cycle of compromising legitimate websites via exploit kits, malware and vulnerable software?