
Sanctions for NotPetya? You Betcha.
The White House deployed words to chide Russia for the NotPetya attack. On 15 February 2018, the White House Press Secretary released a blunt statement: […] More
The White House deployed words to chide Russia for the NotPetya attack. On 15 February 2018, the White House Press Secretary released a blunt statement: […] More
The newest ransomware attack called NotPetya has re-ignited the debate ongoing since the earlier WannaCry attack. Cybersecurity experts, policymakers, and citizens affected have all asked: who is to blame for […] More
Over the past few weeks, a critical question has been discussed amidst cybersecurity professionals and experts. Who would pair North Korean-linked malware with an alleged […] More
Despite the insistence of many pundits and technical experts, the recent WannaCry outbreak was – mercifully – a poorly organized attack with a poorly constructed tool. […] More
Everybody who depends on digital information systems, which is everybody, saw a few glimpses of silver lining from the WannaCry ransomware attack that took the […] More
Who’s to blame for the astonishingly successful ransomware attack sweeping the planet? Microsoft, the information technology giant whose popular Windows operating systems harbored the flaw […] More
Friday’s global attack on computers in some 150 countries was clearly a wake-up call. It took government systems offline, affected corporations of all kinds, took […] More
Over the weekend, businesses and critical services like banks, hospitals, telecommunications services and transportation hubs around the world were hit with a cyber attack that […] More
In response to the massive Wannacry ransomware attack that infected over 200,000 computers around the world, Brad Smith, Microsoft’s President and Chief Legal Officer, wrote […] More
As businesses wake up to the possibility that the WannaCry ransomware tool will spread beyond the already estimated 200,000 computers already infected across Europe, experts […] More
As people’s lives become more attached to the internet, cyber attacks will have more of an impact. One of the most pressing threats is the […] More
Imagine an army of computers, acting under the instructions of a criminal syndicate, terrorist group, or foreign government. The sheer size of this network of […] More
The problem of stolen credentials is a well-known threat in the security industry. But knowing something is a problem and understanding the full scope are […] More
This week I’m attending the annual RSA Conference in San Francisco, where government and industry leaders have come together to discuss the looming challenges and […] More
Trying to keep malware off your computer is standard practice at this point, but not many people know that malware also poses a threat to […] More
What do you use your phone for in a given day? Texting, checking the news, social media, banking, getting directions, playing games – most people […] More
Bring-your-own-device culture is very convenient, but with a growing amount of malware targeting mobile devices, it is also creating new vulnerabilities. The Cipher Brief spoke […] More
As malware continues to grow and change, the number and types of at-risk devices will do the same. Currently, malware oriented towards mobile devices is […] More
Industrial control systems (ICS) underly many aspects of our critical infrastructure, and there are concerns that they are becoming more vulnerable to hackers. The Cipher […] More
Search