This week another major outbreak in Europe reminds businesses and users all over the globe to be vigilant about their ransomware defense. Along with this new variant of Petya, new mobile ransomware surface as well.
The re-emergence of an Erebus ransomware variant last week became the latest high-profile ransomware attack after WannaCry. That and the surfacing of other relatively benign ransomware variants make up this week's recap.
Identity theft is currently a gold mine for cybercriminals—one that reached an all-time high in 2016, with up to $16 billion worth of losses caused by fraud and identity theft. But what exactly happens with the stolen information?
How do we distinguish Business Process Compromise (BPC) from targeted attacks? Can Business Email Compromise (BEC) be considered BPC? All three share similarities, but knowing their distinctions can help enterprises fine-tune their defensive measures.
This research paper explores the tools and methods used to spread fake news and manipulate public opinion: the services that enable them, their appearance on social media sites, and the motivations behind these activities.