According to one security expert, “2016 is proving to be the year of online extortion.” Attackers, he says, are no longer interested in just your credit cards: they want your personal information so they can hold it for ransom — or even sell it to the highest bidder. Continue reading
By John Mounteer, NYSTEC Information Security Consultant
A cybercriminal has just wiped all traces of an attack from your server. Now you’ll never know the source of the attack or the extent of the damage, right?
Not if you have a network forensic investigator on the trail.
The ability to interpret the data in log and capture files and recognize malicious activity in the data is a special skill that requires in-depth knowledge of network and application protocols. This article provides a short introduction to network-based forensic investigations of suspected criminal activity related to information technology systems.
Back in 2014, JP Morgan was one of 12 financial institutions hacked by cybercriminals who stole personal information from more than 100 million customers. The hackers didn’t use the stolen data for identity theft. Instead, they used it to push penny stocks in what amounted to multimillion dollar “pump and dump” schemes.
Such high-profile crimes can be a wake-up call for businesses to reevaluate their cybersecurity protocols. See the 10 Lessons Learned from a Major Security Breach slideshow at CIO Insight.
Disclaimer: The link to this content is provided because it has information that may be useful. NYSTEC does not warrant the accuracy of any information contained in the link and neither endorses nor intends to promote the advertising of the resources listed therein. The opinions and statements contained in such resources are those of the author and do not necessarily represent the opinions of NYSTEC.