How artificial intelligence is taking on ransomware

NEW YORK — Twice in the space of six weeks, the world has suffered major attacks of ransomware — malicious software that locks up photos and other files stored on your computer, then demands money to release them.

It’s clear that the world needs better defenses, and fortunately those are starting to emerge, if slowly and in patchwork fashion. When they arrive, we may have artificial intelligence to thank.

Read the source article at StarTribune.com
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__gizfgfznmludmyk.png

Petya/NotPetya: What We Know in the First 24 Hours | SecurityWeek

The Petya/NotPetya outbreak that originated in Ukraine on Tuesday but spread globally within hours might have been more than a financially motivated ransomware incident, security researchers suggest. The attack caught security researchers’ attention because the same EternalBlue SMB exploit employed by WannaCry was used to spread to new machines, and because of the fast pace at which reports of infections started to emerge worldwide.

Read the source article at securityweek.com
None

Half of Ransomware Victims Are Hit Multiple Times

Half of organizations hit by a ransomware attack are struck multiple times, with exposed infrastructure stretching well beyond the endpoint, according to a new study from Druva. The security vendor polled over 830 IT professionals across the globe to compile its Annual Ransomware Report. It revealed that 80% believe attacks are increasing, with half of those already struck claiming that they’d been hit more than once.

Read the source article at Infosecurity Magazine
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__i80lngargmon9bl.jpeg

NotPetya Ransomware Devastates Organizations, Hospitals, Banks, and Transportation

The latest ransomware attack has greatly impacted Europe and the U.S. on June 27th, 2017. A U.S. hospital is among the victims of this large scale cyberattack. Pharmaceutical companies, Chernobyl radiation detection systems, the Kiev metro, an airport, and banks have been affected across Europe. The further implications of this attack are yet to be fully realized. The ransomware is called NotPetya and upon infecting a computer demands $300 for the unlock key.

Read the source article at crossroadstech.net
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__4wcitdwfe8bfear.png

Cybersecurity Training Often a Tangled Web

Damaging cybersecurity attacks have become an increasingly regular occurrence in business. In 2013, Target Corp. notified 70 million customers that hackers had stolen their personal data from their computer systems. In 2016, Yahoo Inc. informed 500 million users their names, email addresses, dates of birth and telephone numbers were stolen by hackers. And just this week, a massive ransomware attack hit computer systems across Europe and the United States, the second such attack in two months.

Read the source article at Chief Learning Officer
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__a6u9ekh3u8ziewg.jpeg

Basic Cybersecurity Hygiene Tips Are Ransomware Vaccine

Companies that follow basic cybersecurity hygiene are likely to avoid the ravages of global ransomware attacks such as the one that crippled thousands of computer systems June 27, cybersecurity pros told Bloomberg BNA. The global ransomware attack struck at the core of major organizations, such as shipping magnate A.P.

Read the source article at bna.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__e4kgvhrjdge8mib.jpeg

Are mass cyber security attacks like WannaCry and Petya now the norm? | The latest news from the Computer and IT Industry

Ransomware now has to be the number one issue for governments and security experts put in charge of fighting cybercrime. In fact, it should be the top concern for anyone running a business or even anyone who owns a computer. It has already been proven that last month’s WannaCry was not a one off. As the ‘Petya’ ransomware sweeps around the world, infecting systems in Russia, Europe, the US (and everywhere in between), IT security experts are signalling the dawn of a new era.

Read the source article at pcr-online.biz
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__nsuwowzz7z6v8hj.jpeg

Cyber-attack was about data and not money, say experts

The Petya malware variant that hit businesses around the world may not have been an attempt to make money, suspect security experts. The malicious program demanded a payment to unlock files it scrambled on infected machines. However, a growing number of researchers now believe the program was launched just to destroy data. Experts point to “aggressive” features of the malware that make it impossible to retrieve key files.

Read the source article at BBC – Home
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__m7fsirn3vuki8qj.jpeg

Global ransomware attack may not have been for money

The dramatic data-scrambling attack that hit computers around the world Tuesday appears to be contained. But with the damage and disruption still coming into focus, security experts worry the sudden explosion of malicious software may have been more sinister than a criminally minded shakedown of computer users.

Read the source article at cnbc.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__kvt0g95mlgb118e.jpeg

Where Business is Getting IoT Security Wrong

Securing IoT is tricky business. IoT exploits include firmware spoofing, compromising hardware, man-in-the-middle attacks, interface exploits, and cloud hosted application hacks, among others. Businesses are not always ready for the unique security challenge posed by the massive deployment of IoT devices.

Read the source article at IT Communities
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ci159jyfp3li6as.jpeg

Lexmark discusses security – The Recycler

After the WannaCry virus infecting hospitals and businesses worldwide, Lexmark looks at the risks and solutions. As cyber attacks hit the headlines again Lexmark said that it is “riskier than ever” having employees travelling with computers and “mobile devices that allow access to emails, files and data”.

Read the source article at therecycler.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__xecqluz96lnvijf.jpeg

Anatomy of a secure internet-connected thing

Now working as director of product security at Silicon Labs, he discusses the steps required to make IoT devices properly secure. Many of the things we use on a daily basis are becoming smart and connected to the Internet. The Internet of Things (IoT) will improve our lives by helping us reach our health and fitness goals, reduce resource consumption, increase productivity, and track and secure our assets.

Read the source article at Electronics Weekly
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__8piuqxb8wy249cg.jpeg

Identifying and Overcoming Cybersecurity Risks: 5 Steps

Like it or not, modern businesses are placing themselves in the firing line if they fail to take action to protect themselves from hackers. The recent global cyber breach outlined how important information security is to business. The cost to organizations, including the U.K.’s National Health Service (NHS), is estimated to run into the billions. WannaCry was the name given to the malware that infected computers running Windows XP.

Read the source article at Data Center Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__cdgu5ookxwsr30q.jpeg

The cyber security challenge for retail branch IT – Information Age

Over the last few months, cyber security has been one of the most talked about challenges for businesses across all industries. This is put into sharp focus with recent media coverage of cyber attacks that have affected thousands of companies across the globe. The retail sector is in the frontline of the cyber attack battle. Retailers need to be concerned about the security of their own data, and that of their customers. Lack of customer confidence in data security impacts brand value.

Read the source article at information-age.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__utw1lxo4ltmpwqr.jpeg

Top 8 Cyber Security Attack Types and How to Avoid Them

HPE Secure Compute: Find out how security information management, governance, application security and event management help you avoid the top eight cyber security attack types—while reducing the cost of cybercrime. Cyber security attacks are continuing to grow in both volume and sophistication. Cybercriminals now take computer systems hostage at hospitals across the U.S., and they target banks around the world—even stealing $12.7 million in a massive ATM heist in Japan.

Read the source article at Community
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ur3ypybj2ntqeq0.jpeg

Cybersecurity Governance: Transform Mediocrity into Excellence

Good cybersecurity requires full commitment from senior management: in fact the international standard for information security demands it. The concept of strong leadership lies at the heart of ISO 27001: “Top management shall demonstrate leadership and commitment with respect to the information management system”. That puts responsibility for creating and maintaining an environment in which excellent security can flourish squarely in the C-Suite’s lap.

Read the source article at Infosecurity Magazine
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__61w9j4xqrm7ttqp.jpeg

How to protect your startup from a cyber crime crisis | Security

Startups that regard themselves as too small to be targeted by cyber crime are putting their businesses at considerable risk. Two thirds of small UK businesses were attacked by hackers in the past two years. This assumption, combined with a lack of cyber awareness and dedicated IT teams, makes startups tempting targets to well-funded networks of cyber criminals. Unfortunately, the result of poor cyber security is only apparent after your startup has been hacked.

Read the source article at techworld.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__4x1bua3rqajo9dj.jpeg

3 Cybersecurity Practices That Small Businesses Need to Consider Now

All businesses, regardless of size, are susceptible to a cyberattack. Anyone associated with a company, from executive to customer, can be a potential target. The hacking threat is particularly dangerous to small businesses who may not have the resources to protect against an attack let alone ransomware.

Read the source article at Tech.Co
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__9ty1slhiiw25qru.jpeg

Ten Cybersecurity Tips for Small Businesses

Broadband and information technology are powerful tools for small businesses to reach new markets and increase sales and productivity. However, cybersecurity threats are real and businesses must implement the best tools and tactics to protect themselves, their customers, and their data.

Read the source article at Minority Business Development Agency
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__s2qtpcm16kpfwj8.jpeg

The Newbie Retailer’s Guide to E-commerce Security

A secure web environment ensures the protection of customer data, but it also makes for a fast and optimized website that drives conversions. An unsecured web environment will be slow, frequently unresponsive, and even dangerous. Opening your first online store is an exciting milestone, and security should be one of your priorities. It’s important that you take control and ownership of your e-commerce security.

Read the source article at tripwire.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ja1brhzyto0qxuo.png

Ransomware: The Risk is Real | SecurityInfoWatch.com

On May 12, the now-familiar threat of ransomware took the offensive, as more than 230,000 computers in 150 countries were encrypted for ransom at hospitals, telecommunications systems, governments, banks and more. Known as “WannaCry,” the ransomware demanded 300 bitcoin in exchange for decryption. The attack exploited known vulnerabilities in an older version of Microsoft Windows – vulnerabilities that could have been avoided with recent patches.

Read the source article at Security Magazines
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ifa4zfizmr90qz4.jpeg

How to protect your business data from cyber -attacks?

“By 2018, 40 percent of large enterprises will have formal plans to address aggressive cybersecurity business disruption attacks”-Gartner. Stories of cyber threats disrupting businesses hit headlines almost daily. Cyber-attacks vary from phishing to DDOS attacks to SQL attacks to malware – with ransomware being the latest. So, cyber- attacks have different forms but have one aim – ‘disruption’. They reach deeply into the IT systems and lead to widespread business damage.

Read the source article at mdsc1.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__nubttmeuwnvggxe.jpeg

GameStop Confirms Payment Card Breach | SecurityWeek

Video game and electronics retailer GameStop has started warning customers that their personal details and payment card data may have been stolen by cybercriminals. Security blogger Brian Krebs reported on April 7 that the GameStop.com website had apparently been breached. Krebs learned at the time from his sources in the financial industry that hackers had stolen names, addresses and card data entered on the site between mid-September 2016 and early February 2017.

Read the source article at securityweek.com
None

Apple Mac computers targeted by ransomware and spyware

Mac users are being warned about new variants of malware that have been created specifically to target Apple computers. One is ransomware that encrypts data and demands payment before files are released. The other is spyware that watches what users do and scoops up valuable information. Experts said they represented a threat because their creators were letting anyone use them for free.

Read the source article at BBC – Homepage
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__kdb5alemi9t4ltn.jpeg

New Mac Malware Discovered on Dark Web as Security Experts Remind Mac Users Not to Be ‘Overconfident’ – Mac Rumors

Two new pieces of malicious software aimed at Mac computers have been discovered on the Dark Web, offered through Malware-as-a-Service (MaaS) and Ransomware-as-a-Service (RaaS) portals and estimated to have been up for around the past three weeks, beginning May 25.

Read the source article at Mac Rumors
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__ejfy5wzki3pgakr.jpeg

This is the sick new way scammers are trying to hack your computer

Security researchers have uncovered a sick new form of computer-locking ransomware that lures in victims by posing as an appeal to help starving toddlers. With a note titled ‘Save Children’, the malware will encrypt personal files and demand cryptocurrency for their return. The variant first came to light this week (12 June) after the ransom demand was uploaded to ID-Ransomware, an online platform which helps identify known malware strains.

Read the source article at amp.ibtimes.co.uk
http://retailanditconsulting.com/wp-content/uploads/2017/06/curata__kbpw2byjcgqfj9r.jpeg

In the Hacker Age, How Secure Is Your PLC?

Let’s face it, hackers have racked up some pretty impressive scores lately. From the most recent WannaCry attack, to exposing Ashley Madison, to reportedly “stealing an election”, hackers have been busy exploiting vulnerabilities and gaining massive notoriety. A recent study by the Identity Theft Resource Center concluded that in 2016 U.S companies and government agencies were breached 1,093 times. That’s a new record and a 40% increase from the 780 breaches in 2015.

Read the source article at Automation.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__0t5hxw5ilmi6nsl.jpeg

Five ways to protect your business from cyber security breaches

Credit: Hard disk file locked with monitor show ransomware cyber attack internet security breaches. Malware lock file concept for security article i.e. WannaCry or WannaCrypt attack all over the world Businesses across the world were horrified by the tsunami of cyber security breaches that dominated the news recently. Such breaches can cripple organisations and the threat is increasing. Hackers are taking advantage of modern connectivity and increasingly targeting mobile devices.

Read the source article at insidesmallbusiness.com.au
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__mxxqqal4srrlzd4.jpeg

6 ways businesses can become more digitally secure

Web security is a term we’ve constantly been hearing about in recent days, especially in the news. We’ve seen an onslaught of high-profile hacks, most notably the 2016 US presidential election. Web security will always be a hot topic because of the constant development of technology and how, as a society, we will continue to rely on it. Attacks happen for a number of reasons, but it is usually due to human error. It can be a flaw in the code, an unsecure network, and so on.

Read the source article at Packt Publishing
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__wmn8xlshwsp2xrf.png

Don’t Forget Basic Security Measures, Experts Say

Some security leaders argue there is little point in worrying about emerging threats when businesses can’t defend against today’s attacks. INTEROP ITX – Las Vegas – New technologies like machine learning, artificial intelligence, and IoT will drive the scale and complexity of cyberattacks. Businesses have every reason to be concerned as the threat landscape continues to grow.

Read the source article at Dark Reading
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__j6en0xarcsvpksk.jpeg

Credit cards hacks, breaches and thefts: Why they keep happening

SAN FRANCISCO — After the huge Target breach of 2013, you’d have thought retail companies would have figured out how to protect their cash register systems from malware that attempts to steal customers’ data. Then came Home Depot. Then Neiman Marcus. Then Wendy’s. In the past few months, Chipotle, Arby’s and Kmart were all hit. Why are these attacks still happening? Time and money, say experts.

Read the source article at azcentral.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__fkjntirbfnvhvu4.jpeg

Four Takeaways from the WannaCry Ransomware Attacks

The recent WannaCry ransomware attacks put cyber security on the front page of every newspaper in the world. Now, everyone knows what ransomware is and how destructive it can be, but will anything change? Following are four critical lessons that both organizations and individuals should take away from WannaCry. Too many businesses still think that only national or multinational firms, or companies in certain industries, have to worry about cyber security.

Read the source article at medium.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__hlliwajkspnyqzt.jpeg

Cybersecurity: A Small Business Guide

Online threats are on everyone’s minds after this week’s breach at OneLogin. The identity and access management company with over 2,000 enterprise clients was hacked, and the fallout isn’t over. During the security breach, private information about users, apps, and various keys may have been obtained by the still unknown hackers.

Read the source article at Business News Daily
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__iwvuz7hii9npxeh.jpeg

Why a Security Audit is Vital for Today’s Small Businesses

One of the often overlooked security vulnerabilities for today’s small businesses is a lack of a plan to protect the business’s electronic data. Many owners who would never dream of leaving their office unlocked after hours will leave their electronic data unprotected, often costing their company thousands of dollars in damages when that data is stolen or corrupted. Most small businesses are known to have passwords taped to their monitors or use shared accounts for all of their employees.

Read the source article at Josh Giesing
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__qtp4xmyg47ecink.jpeg

Good Security Makes Good Business Sense

Nearly every day, a cybersecurity news article hits the press, so it’s not surprising that senior executives are asking their chief information officers and security teams whether their own company might be the next victim of cybercrime. But that’s not the only question they should ask, because preventing cybercrime is not only about managing risk and improving security defenses; an effective cybersecurity program also has the power to create value for an organization and lead to additional revenue, more profit, increased customer sales, and higher levels of customer retention. The cybersecurity field has evolved progressively—initially for defence …

Read the source article at When it Really Matters
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__bz3dt0tpbz4e3dh.jpeg

5 Essential Measures for a Business Security Plan

The tech-driven transition of business enterprises has brought immense benefits for the organizations. It has quantified work and performance, optimized efficiency, and made it convenient for business organizations to expand their areas of operations and invade new markets on the global spectrum.

Read the source article at tripwire.com
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__m5y6m31khsfconr.jpeg

7 Fallacies That Could Impact Your Network Security

The mounting threats to network security may stem from external sources, but common misunderstandings about how to protect a business’ networks against them can create one big threat from within. High profile cases regularly make the headlines, proving that even the biggest businesses are failing to understand how to responsibly safeguard against potential attacks.

Read the source article at home – Information Security Buzz
http://retailnetworksecuritysolutions.files.wordpress.com/2017/06/curata__90mi4qrb0wuqyrt.png