Wednesday, August 1, 2018

The $6 million ransomware: SamSam rakes in big bucks with unique approach

Security Digest
Information security news and advice from TechTarget's network| August 1, 2018
TechTarget
FEATURED STORY
SamSam ransomware payments reach nearly $6 million
by Peter Loshin, Site Editor
New research reveals SamSam ransomware campaign has generated almost $6 million for attacker and appears to be the work of a single hacker who shows no sign of slowing down. (SearchSecurity.com)
Advertisement
NEWS
 
Malvertising campaign tied to legitimate online ad companies
A new report from Check Point Research uncovers an extensive malvertising campaign known as "Master134" and implicates several online advertising companies in the scheme. (SearchSecurity.com)
 
Yale data breach discovered 10 years too late
A Yale University data breach from 2008 was only just discovered and the school has released details on the information compromised, including Social Security numbers. (SearchSecurity.com)
 
U.S. government making progress on DMARC implementation
The deadline for full DMARC implementation in U.S. government-owned domains is less than three months away and only half of the domains have the correct policy in place. (SearchSecurity.com)
 
NetSpectre is a remote side-channel attack, but a slow one
A new PoC attack using Spectre variant 1 called NetSpectre marks the first time Spectre v1 has been exploited remotely, although questions remain on the practicality of the attack. (SearchSecurity.com)
 
Bugcrowd CTO on the need for responsible disclosure policy, 'good faith'
Bugcrowd founder and CTO Casey Ellis talks about his concerns that the era of 'good faith' between security researchers and enterprises is in jeopardy. (SearchSecurity.com)
 
Risk & Repeat: DHS warns of power grid cyberattacks
In this week's Risk & Repeat podcast, SearchSecurity editors discuss a new warning from the Department of Homeland Security regarding Russian hackers targeting the U.S. power grid. (SearchSecurity.com)
EXPERT ADVICE
 
Three steps to improve data fidelity in enterprises
Ensuring data fidelity has become crucial for enterprises. Expert Char Sample explains how to use dependency modeling to create boundaries and gather contextual data. (SearchSecurity.com)
 
How to identify and protect high-value data in the enterprise
Protecting data in the enterprise is a crucial but challenging task. Expert Charles Kao shares key steps and strategies to consider to identify and protect high-value data. (SearchSecurity.com)
 
Anonymity tools: Why the cloud might be the best option
The cloud might be the best of the available anonymity tools. Expert Frank Siemons explains the other options for anonymity for security and why the cloud is the best for privacy. (SearchCloudSecurity.com)
 
Powerhammering: Can a power cable be used in air-gapped attacks?
Air-gapped computers subject to PowerHammer attack: Proof-of-concept attack enables data exfiltration through control of current flow over power cables. (SearchSecurity.com)
About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from Security Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Security Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2018 TechTarget. All rights reserved.
TechTarget

No comments: