Terrorists Resorting to Bitcoin for Funding

The military wing of Hamas, known by the name of ‘Qassam Brigades’, has established a highly sophisticated system which allows people to contribute in raising money by making donations which are extremely hard for the law department to trace.In the mos…

August 22, 2019
Read More >>

IDG Contributor Network: By 2020, 60 percent of digital businesses will suffer major service interruptions

Today’s digital landscape is inconceivably broad and deep. It’s a convergent environment in which every desktop, laptop, smart phone and IoT device owned or used by organizations is simply another node in a global network. And it’s never been harder for organizations to situate themselves in the landscape of which they are a tiny part. As organizations transition more of their operations to the digital universe, the infrastructure and services…

December 3, 2018
Read More >>

IDG Contributor Network: 5 ways to beef up your cyber defenses for 2019

Cyber defenses have short lifespans. The malware catalog in your cybersecurity system requires constant updating, the passwords used by your employees may be exposed over time, and without frequent fortification of your digital walls and constant vigilance, your existing security measures may not protect you against newer threats. Many of the measures you used to defend your system in 2018 may be obsolete by 2019, as new threats such as…

November 13, 2018
Read More >>

IDG Contributor Network: Escaping the line of fire: 2018 U.S. State of Cybercrime

Companies in all sectors, everywhere, are continuing to experience cyber-breaches. This is no surprise: as more and more organization embrace digitization, they inevitably become prey to new cyber-dangers and, in turn, need to put much greater emphasis on the availability, stability and resilience of their IT systems. If things go south these days, both the corporate coffers and the firm’s public opinion can suffer hugely. Given the frequency of cyberattacks…

November 12, 2018
Read More >>

IDG Contributor Network: Harvard PhD Andy Yen provides tips to governments on cybersecurity protections

Recently, I asked Harvard PhD and ProtonMail co-founder and CEO Andy Yen his thoughts on how to prevent government cybersecurity attacks. A physicist and economist by training, Andy was part of the ATLAS experiment at CERN, where his research focused on searches for supersymmetric particles. He is translating his experience in large-scale computing to build the infrastructure that is used to run ProtonMail. With two colleagues, Wei Sun and Jason Stockman,…

July 21, 2017
Read More >>

FBI’s top 10 most wanted cybercriminals

10 most wanted cybercriminals Image by FBI The FBI’s list of the most wanted cybercriminals includes 27 individuals, as cybercrime becomes an increasingly important topic in our global discourse. With repeated attacks on businesses, regular citizens and government entities, it’s become more important than ever to weed out organized cybercrime. These 10 individuals are some of the most wanted cybercriminals to date, but with each passing year, as cybercrime continues…

May 30, 2017
Read More >>

China pays for Windows XP addiction as ‘WannaCry’ hits

The WannaCry ransomware has wormed its way into tens of thousands of Windows PCs in China, where Windows XP runs one in five systems, local reports said Monday. [ Related: 8 ways to manage an internet or security crisis ] More than 23,000 IP addresses in the People’s Republic of China (PRC) show signs of infection, the country’s National Computer Network Emergency Response Technical Team/Coordination Center (CNCERT) told Xinhua, the…

May 15, 2017
Read More >>

McAfee: Wave of Shamoon cyberattacks being coordinated by a single group

The waves of cyberattacks that have rocked Saudi Arabia over the past few months are linked to the earlier Shamoon attacks. However, the initial 2012 attack was the work of a single group, whereas the latest attacks have been carried out by different groups of varying skills and expertise, all following instructions provided by one malicious actor, McAfee researchers have found. Researchers at McAfee Strategic Intelligence believe the 2012 Shamoon attacks…

April 26, 2017
Read More >>