The primary target for the attack is Sweden, but additional campaigns may follow, replicating the same model.
SANS Maps SAP Security to CIS Critical Security Controls
As cyber-attacks targeting SAP continue to grow, organizations need to secure their SAP landscape as part of an overall security posture.
ICSA Labs Launches New IoT Certification Program
Firm hopes to make it easier to seek out secure products
Carding Site ‘Owner’ Extradited After Making Millions
Macedonian accused of operating Codeshop.su now in US custody
UK Government Agrees to Snoopers’ Charter Review
David Anderson will look into proposed bulk data collection powers
DDoS-for-Hire Services Go Up on Fiverr for 5 Bucks
The $5 DDoS-for-hire services bill themselves as “stressor” services to “help test the resilience of your own server.”
52% of Consumers Want Biometrics and Other Post-Password Options
Good news for Google’s Project Abacus, 80% of consumers believe biometric authentication is more secure than traditional passwords.
Ransomware Targets Amazon Users, Though They’re Likely Clueless
A widespread Locky campaign emerges just as survey numbers show that most consumers have no idea about ransomware or what to do.
(ISC)2 Partners with PivotPoint on Risk Assessment
The idea is to financially quantify cyber-risk in terms of dollars and cents using value-at-risk modeling.