You are currently viewing SemiWiki as a guest which gives you limited access to the site. To view blog comments and experience other SemiWiki features you must be a registered member. Registration is fast, simple, and absolutely free so please, 
join our community today! 
		
	
	
		
							  
							
			
					
		
	
		
			
		
	
	
		
		
	
	
	
		Cybersecurity will be hard pressed to take on the new challenges of bank managed digital currencies.
Banks are developing their own digital currencies. The introduction of Central Bank Digital Currencies (CBDC) is the beginning of an interesting trend that will change the cybersecurity dynamic for banking as it opens up an … Read More 
	 
	
	
	
		
	
		
			
		
	
	
		
		
	
	
	
		As predicted, the rise of cryptocurrency valuation has captured the attention of cybercriminals. New hacks, thefts, misuse, and fraud schemes are on the rise. Where there is value, there will be a proportional risk of theft.Criminals always pursue and exploit systems where they can achieve personal financial gain. It is the … Read More 
	 
	
	
	
		
	
		
			
		
	
	
		
		
	
	
	
		A South Korean web hosting company struggles for survival after agreeing to pay a ransomware extortion of $1 million to hackers.
New Record for Ransomware
Nayana, the South Korean web hosting firm, suffered a ransomware attack that resulted in 153 infected Linux servers. The resulting data that was encrypted by the malware impacted… Read More 
	 
	
	
	
		
	
		
			
		
	
	
		
		
	
	
	
		Methbot  is a state-of-the-art ad fraud infrastructure, capable of hosting  legitimate videos and serving them to 300 million fake viewers a  day. Each view earns the criminals about $13, translating to around four  million dollars a day. Over the past few months, Methbot has pulled in  an estimated $180 million. It represents one … Read More 
	 
	
	
	
		
	
		
			
		
	
	
		
		
	
	
	
		Installing a home surveillance camera system can add great benefits  but also may introduce new risks to privacy and network security. The  goal is to increase the security and peace of mind, while avoiding  cybersecurity threats. Here are three tips to consider when purchasing,  installing, and configuring your new home camera … Read More 
	 
	
	
	
		
	
		
			
		
	
	
		
		
	
	
	
		In the previous blog, Cybercriminals Next Targets: Short Term Dangers (part 1 of 2),  I outlined how cybercriminals will use the holiday season to victimize  unwary consumers and target businesses. They will also dive deeper into  leveraging Internet-of-Things (IoT) devices. The longer-term outlook  expands their reach to more… Read More 
	 
	
	
	
		
	
		
			
		
	
	
		
		
	
	
	
		Knowing what cybercriminals are targeting today is easy. Their  attacks are loud, impactful, and have the elegance of a herd of bulls  crashing through a glassware shop. The tougher challenge is figuring out  where they will take aim tomorrow. Knowing where cyber threats will  attack in the future, gives the necessary insights to … Read More 
	 
	
	
	
		
	
		
			
		
	
	
		
		
	
	
	
		Cyber threats are currently outpacing the defenders but it does not  need to be the case. Attacks are increasing in number and type, with  the overall impacts are becoming greater. Cybersecurity is struggling to  keep our digital lives and assets protected from the onslaught of  attacks but facing great challenges. By understanding… Read More 
	 
	
	
	
		
	
		
			
		
	
	
		
		
	
	
	
		The IBM X-ForceTrend and Risk Report reveals how 2010 was a pivotal year for internet security as networks faced increasingly sophisticated attacks from malicious sources around the world. The X-Force reportedly monitors 13 billion real-time security events every day (150,000 events per second) and has seen an increase in … Read More