A while ago Turkish security group Otku Sen created the hidden tear ransomware and published the source code online. Idea behind it was to “teach” security researchers how ransomware works. Right from the beginning the reaction of various security professionals was negative. And we were right, it didn’t take long before the first ransomware variants arrived based on the hidden tear source code.
With the emergence of wearables, the convergence between the virtual and the physical world makes people feel more natural using technology all the time. Unfortunately, the emergence of new technologies also entails new security risks.
Financial data stealing is one of the most effective ways to monetize malware, exploits and other cybercriminal's tools. At the same time, attacks against cash machines (ATM) seemed to explode in year 2015 with several public incidents and a rush by law enforcement authorities globally to respond to this crisis.
Advanced Persistent Threats or APT - concerted, stealthy, ongoing attacks against specific organisations. Typically make use of highly sophisticated malware to breach an organisation's security defences and gain the access and control necessary to achieve their aims.