Kirk was executive editor for security and technology for Information Security Media Group. Reporting from Sydney, Australia, he created "The Ransomware Files" podcast, which tells the harrowing stories of IT pros who have fought back against ransomware.
Flaws in Subaru's telematics software, discovered by a security researcher, could have been exploited to unlock the doors or provide remote access to a car's location history. The problems - now fixed by Subaru - underscore carmakers' ongoing cybersecurity challenges.
Samy Kamkar became everyone's virtual friend in October 2005. His MySpace worm is still the most potent one ever unleashed on a social network, but it was just the start of a prolific hacking career.
After several years of discussion, Australia's Parliament passed a mandatory breach notification/disclosure law in February. It requires organisations to notify affected consumers and regulators, ensuring transparency in an era of ever-increasing cyberattacks. Although large organisations generally follow the advice...
The financial risks to organizations from data breaches come from a variety of angles, from share price hits to class-action lawsuits to fines from regulators to reputational damage. As such, the insurance industry has jumped full steam into cyber. Larger insurers are already helping companies spot and mitigate...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
Russian threat intelligence firm Group-IB alleges that North Korea is behind recent attacks against financial institutions in Europe employing fraudulent SWIFT messages. But other experts caution that such conclusions shouldn't be made solely based on technical data.
Eastern European cybercrime is evolving, and some of the latest trends defy conventional wisdom. Moscow-based cybersecurity company Group-IB offers an analysis of some of these changes.
Biometric identification is increasingly being woven into our lives, from immigration crossings to smartphones. But the systems are far from foolproof. Here's what to watch.
Sweden has ended a seven-year rape investigation against WikiLeaks founder Julian Assange. But it's far from the end of the legal troubles for the man whose spilling of secrets has shaped world politics.
WannaCry ransomware victims who haven't backed up their files have a tough choice: take a risk paying the ransom or just accept the loss. But there's a slim glimmer of hope: French researchers have figured out a way to decrypt files without paying, although their tools won't work for everyone.
New legislation calls for an overhaul of the federal government's software vulnerability disclosure policies following the ransomware outbreak that was fueled by the leak of a stolen National Security Agency cyberweapon.
The Shadow Brokers leaked spying tools - likely stolen from the National Security Agency - that aided WannaCry. But the hackers blame Microsoft and the U.S. government for the ransomware outbreak and are promising fresh exploits.
As computer security analysts begin to unwind the mystery behind the global wave of WannaCry ransomware, a familiar name has surfaced: Lazarus, the nickname for a suspected elite North Korean hacking group.
Microsoft's chief legal officer has slammed U.S. spy agencies, warning that civilians are at risk if governments stockpile libraries of software vulnerabilities that eventually fall into the hands of cybercriminals.
Microsoft has patched a startling vulnerability in its anti-malware engine, once again demonstrating that security applications can sometimes be the Achilles heel of a system.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.