The recent WikiLeaks drop of CIA documents has raised awareness of the reality of cyber-threats and espionage, and how digital infrastructure in America and around the world is under threat thanks to hacking attacks and ransomware, James Lyne told Tom Costello on NBC’s Today show.
It’s day 4 of RSA Conference 2017 as I write this. For me, the event ends with a flight home in a few hours. Before doing so, a review of the week is in order.
Greetings from RSA Conference 2017. This year we’ve been taking advantage of Facebook Live* to help us deliver news from the show floor.
Here, I talk to Chester Wisniewski, principal research scientist in the Office of the CTO, about IoT threats and ransomware.
SophosLabs has released a malware forecast to coincide with the start of RSA Conference 2017.
Typically, our research papers focus on Windows, which has traditionally been the largest battleground. While some of the report does indeed look at Microsoft-specific challenges, we decided to focus more on the increasing malware threats directed at platforms where the risks are often not as well understood, specifically Linux, MacOS and Android devices.
In case you hadn’t heard, ransomware is big, big business. In 2016 alone, ransomware payouts are closing in on the billion-dollar mark, with a whopping 70% of companies reporting that they paid to have their maliciously-encrypted data liberated after being hit.
We’re not talking chump-change, either. For many businesses, these payments can and do routinely land in the tens-of-thousands-of-dollars range.
Working day in day out with IT departments around the world to keep cyber attacks at bay, we at Sophos understand what worries them about the ever-changing threat landscape, the effect a malware infection could have on the running of the business and the work the departments do to keep their businesses ticking over.
But, it is consumers who are the most susceptible to malware, ransomware and other cyberattacks. Without an up-to-date knowledge of the cyber security industry or the benefit of an IT department quietly looking after their backs, the role of ‘IT support’ often falls to the one person who holds the most knowledge. However, that person might not have the time, possess the self-assurance or even the know-how to look after a whole ‘family and friends’ network of computers.
In 2016 alone, hackers have taken over $1 Billion in the form of ransoms from users trying to retrieve their files after being infected with ransomware.
Ransomware is the most successful malware attack today. It works by locking up your files and crippling your systems until you’ve handed over money.
And, one of the biggest problems in the fight against ransomware is the constantly reinvented attacks. Cybercriminals are finding new methods of spreading the malware, evading detection and even developing ransomware that deletes itself as soon as files are encrypted so that even IT security teams are unable to uncover what variant is on the system.