Malwarebytes latest report for the quarter ended September 2018 found that cybercriminal activity targeting businesses grew 55% QoQ with trojan attacks growing by a whopping 86%. But luckily malicious cryptocurrency mining fell by as much as 26%. The company today released its Cybercrime Tactics and Techniques report for Q3 2018, which found that detections of cybercriminal … [Read more...] about Malwarebytes says business cyberattacks surged 55% in Q3, but malicious cryptocurrency mining fell 26%
CTOvision Provides Cyberwar Context From Recognized Experts
Cyber War Is Not A Traditional Violent Clash On A Battlefield. But It Is A Conflict On A Broad Scale And You Are A Target.
|The study of cyberwar is more important now than it has ever been. Over the last 20 years we have witnessed cyberwar evolve from an obtuse but prescient concept to a theoretical possibility to a world of constant cyber attacks to today, where all war has cyber components. All war today is cyber war, and all conflict is cyber conflict.|
Cyberwar is a state of conflict. It is related to the technological environment and to cybersecurity, but cyber conflict comprehends those and many other topics into a greater national security construct. Today our nation faces constant adversary action and conflict in cyberspace. Meeting the challenges this adversary action causes requires an understanding of what people and companies and governments can proactively do to bring the fight to adversaries. It also involves deep understanding of adversary tactics and capabilities so we can really understand The Cyber Threat.
|We track the the history of cyber conflict, the cutting edge concept being implemented in government, the technological dimensions of cyber war, and, most importantly, the key actions you should take to help protect your personal and business information in cyber conflict. We do that by capturing the thoughts of national security experts and cyber warriors with direct experience in this very serious domain. Our thought leaders take positions, but provide you with the insights you need to evaluate whether or not you support those positions. For example, see: What If This Is The Most Important Thing The Government Can Do To Enhance Our Cybersecurity? where we advocate for the intelligence community to provide compelling insights on the cyber threat to the American people. We also encourage everyone to consider that: Now That You Are A Soldier In The Cyber War You Must Know Your Cognitive Biases For a primer on strategic topics associated with cyberwar see: Twelve Principles of DoD Cyber Conflict|
The Chief Information Security Officer (CISO) of a company is becoming more and more important as cybersecurity threats increase in both frequency and reach. Every business needs to ensure that their CISO is not only concerned with security, particularly when it comes to any IT systems, but will also be responsible for risk management throughout the company. This risk … [Read more...] about The CISOs Role in Risk Management
Read Prof. Joshua M. Pearce argue that open-source hardware could be the ultimate key against cyber attacks that companies are trying hard to find on The Conversation : You must have heard about open-source software helping in fighting cyber attacks but imagine open-source hardware doing the same job for you in much better way. Imagine you had a secret document you had to … [Read more...] about We love ideas like this: Open-source hardware could defend against the next generation of hacking
Read why Troy Wolverton says that the latest 50 million + data breach at Facebook is its own making on Business Insider : It's been four years since Facebook ditched the latter part of its "Move Fast and Break Things" motto, but we're still uncovering its consequences and experiencing its aftermath. The hacking attack Facebook discovered recently is only the latest outgrowth … [Read more...] about The Facebook hack that exposed 30 million accounts shows we’re going to be dealing with the consequences of its ‘Move Fast’ motto for years to come
Apple' App store is plagued with some top utility apps on the App Store that are making millions of dollars by using dark patterns, tricking users into signing up for subscriptions. While subscriptions have been the mainstay for Apple and App developers, accounting for $10.6 billion in consumer spending on the App Store in 2017, and poised to grow to $75.7 billion by 2022. But … [Read more...] about Beware: Sneaky subscriptions are plaguing the App Store