Fraud Management & Cybercrime , Governance & Risk Management , Next-Generation Technologies & Secure Development

How the NotPetya Malware Spread

Also, Why Information Technology Users Can't Secure Their Systems
How the NotPetya Malware Spread
Server farm at the Ukrainian software firm that develops M.E. Doc software. (Source: Ukraine police)

The latest edition of ISMG Security Report leads with a conversation with DataBreachToday Executive Editor Mathew J. Schwartz on how the NotPetya malware spread from its Ukraine origins.

Also in the Security Report, you'll hear (click on player to listen):

  • Former FBI cyber leader Steven Chabinsky explain why information technology users can't secure their systems;
  • ISMG Security and Technology Editor Jeremy Kirk report on how Australia Medicare battles a fraudster; and
  • President Donald Trump hedge on whether Russia hacked last fall's presidential election.

The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Check out our June 27 and June 30 reports that respectively analyzed the growing industry of mobile spyware designed for the exclusive use of governments and how artificial intelligence can be used by hackers to threaten IT systems and by organizations to defend critical digital assets.

The next ISMG Security Report will be posted on Tuesday, July 11.

Theme music for the ISMG Security Report is by Ithaca Audio under a Creative Commons license.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.