PDF Archive search engine
Last database update: 10 April at 18:52 - Around 76000 files indexed.
Overview According to numerous open-source reports, a widespread ransomware campaign is affecting various organizations with reports of tens of thousands of infections in over 150 countries, including the United States, United Kingdom, Spain, Russia, Taiwan, France, and Japan.
• GPS (GPS Spoofing) • Vessels and safe navigation • Cargo tracking systems • Automatic identification systems • Satellite communications • Marine radar systems • Automatic Identification System (AIS) • Electronic Chart Display and Information System (ECDIS) What a compromised ship system could trigger ➢Physical harm to the system or the shipboard personnel — potentially endangering human lives or the loss of the ship ➢The loss of sensitive information, including commercially sensitive or personal data ➢Criminal activity, including kidnap, piracy, fraud, theft of cargo, or imposition of ransomware ➢Loss of tangible assets and reputational damages
48% 86% 72% 20% 2014 0% Web Server Cookie Security System Privacy Violation Misconfiguration Information Leak Cross-Frame Scripting • Year-over-year change in % of web apps that exhibit one or more flaws in “Security Feature” development • Server misconfigurations were the most common category of vulnerabilities across all analyzed apps Spotlight on Mobile Top Mobile App Vulnerabilities Number of Android ransomware samples detected in 2014, by quarter (through November) 74% Privacy Violation 71% Insecure Storage 66% Insecure Transport 324+ 350 300 250 200 150 100 50 0 0 Q1 52 69 Q2 Q3 Q4 Notable Numbers, Rankings, and Statistics 0 Major Oracle Java zerodays discovered in the wild in 2014 6 On our minds:
This w 4h Cybersecurity Market ITL’s National Cybersecurity Center of Excellence Announces New Data Integrity Project The National Cybersecurity Center of Excellence (NCCoE) is currently seeking feedback on Detecting and Responding to Ransomware and Other Destructive Events .
Ransomware was also a key theme throughout the past year as attackers continued to exploit a business model in which users’ data is held for ransom by malware, often using asymmetric encryption algorithms.