A Magnet for Cybercrime: Financial Services Sector

According to the 2017 IBM X-Force Threat Intelligence Index, cybercriminals targeted the financial services sector more than any other industry in 2016.

The post A Magnet for Cybercrime: Financial Services Sector appeared first on Security Intelligence.

Continue reading A Magnet for Cybercrime: Financial Services Sector

Disposing of Your Device: Don’t Throw the Data Out With the Old PC

Disposing of your device securely means wiping old data, deauthorizing account access and finding an ecologically sound home for the old device.

The post Disposing of Your Device: Don’t Throw the Data Out With the Old PC appeared first on Security Intelligence.

Continue reading Disposing of Your Device: Don’t Throw the Data Out With the Old PC

IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches

A new report based on IBM MSS data revealed that ransomware, insider threats and third-party breaches plagued health care organizations in 2016.

The post IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches appeared first on Security Intelligence.

Continue reading IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches

IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches

A new report based on IBM MSS data revealed that ransomware, insider threats and third-party breaches plagued health care organizations in 2016.

The post IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches appeared first on Security Intelligence.

Continue reading IBM Report Finds Health Care Data at Growing Risk From Ransomware, Insiders and Third-Party Breaches

Attackers Targeting Retail Are Shopping for Low-Hanging Fruit

A recent IBM study revealed that many high-profile attacks against retail companies originate from vulnerabilities classified as low-hanging fruit.

The post Attackers Targeting Retail Are Shopping for Low-Hanging Fruit appeared first on Security Intelligence.

Continue reading Attackers Targeting Retail Are Shopping for Low-Hanging Fruit

Rising Attack Rates and Massive Breaches Plague Government Organizations

IBM’s “2016 Cyber Security Intelligence Index” reported that the government sector is now the fourth most frequently targeted industry in the U.S.

The post Rising Attack Rates and Massive Breaches Plague Government Organizations appeared first on Security Intelligence.

Continue reading Rising Attack Rates and Massive Breaches Plague Government Organizations

Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

According to IBM Managed Security Services data, cybercriminals most commonly target the SIP and SCCP protocols in VOIP spam attacks.

The post Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP appeared first on Security Intelligence.

Continue reading Hello, You’ve Been Compromised: Upward Attack Trend Targeting VoIP Protocol SIP

Consequences of IoT and Telnet: Foresight Is Better Than Hindsight

Cybercriminals have learned how to exploit the IoT and Telnet servers to commit record-shattering DDoS attacks against major websites.

The post Consequences of IoT and Telnet: Foresight Is Better Than Hindsight appeared first on Security Intelligence.

Continue reading Consequences of IoT and Telnet: Foresight Is Better Than Hindsight

Researchers Detect Second Wave of Shellshock Attacks Since Two-Year Anniversary

Researchers detected an increase in Shellshock attacks — the second wave of activity since the malware celebrated its two-year anniversary in September.

The post Researchers Detect Second Wave of Shellshock Attacks Since Two-Year Anniversary appeared first on Security Intelligence.

Continue reading Researchers Detect Second Wave of Shellshock Attacks Since Two-Year Anniversary