Weekend Reading: Malware Campaigns and Bitcoin Copycats


Posted on by Jennifer Lawinski

Work days are so busy that many of the week's best infosec stories often get lost in the shuffle. That's where Weekend Reading comes in. Each week we bring you the best news and analysis from the information security world, chosen by the field's best writers and editors. 

This week we've got two stories for you that shed light on cybercrime. 

Paul Wagenseil, Senior Editor, Security at Tom's Guide/Laptop Magaine, recommends checking out Malware Campaign Targets Bloggers, Holds PCs Hostage by Henry T. Casey.

The story "offers a clear glimpse into how online criminals operate. The scheme is complicated but fascinating, with password-stealing malware, negligent website administrators, clueless bloggers, unpatched Adobe security flaws, the Cryptowall ransomware and the Angler browser exploit kit all combining to form a perfect storm of digital disaster," Wagenseil says.

Mike Mimoso, editor at Threatpost, recommends Bitcoin Extortionist Copycats on the Rise, Experts Say by Chris Brook. 
 
"This article puts organizations on notice that criminals are pretty nimble in mimicking what’s worked in the past for other attack groups and capitalizing quickly," Mimoso says. "It’s becoming imperative that security professionals monitor and analyze the latest attacker tactics and assess whether their networks are at risk."  
 
This week I'm recommeding you check out a story over at The Guardian: Cybersecurity experts 'charge £10,000 a day to protect UK's top firms'. It's a lucrative time to be a security expert.
 
Enjoy! And let me know what you think @lawinski. 
Contributors
Jennifer Lawinski

Director of Social Media & Community, Arculus

hackers & threats anti-malware

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs