Panel: How Hackers Used and Abused the Pandemic to Profit
How Hackers Used and Abused the Pandemic to Profit
In a year like no other, the world has faced unprecedented change and challenges, with the impact of the COVID-19 pandemic affecting so many aspects of everyday life. During such a period of difficulty, scammers and malicious actors have sought to exploit the health crisis for their own means.
Whether it has been through targeting business support or tax relief schemes, bludgeoning healthcare organizations with attacks or seeking to sow the seeds of fear and doubt in vaccine efforts, fraudsters have implemented various techniques for profit and gain at the expense of a global community under immense pressure.
In this session, a panel of experts will reflect on the various ways in which hackers have targeted the pandemic over the past 12 months, lifting a lid on the methods employed and outlining how businesses and users can best protect themselves from ongoing COVID-related attacks, scams and fraudulent activity.
Key takeaways:
– How the COVID-19 pandemic has been maliciously exploited for profit and gain
– Insight into some of the standout criminal campaigns detected over the last year
– How the security community can help protect organizations as they recover from the pandemic
Similar Posts
eBook: Educated Endpoints
The proverbial endpoint is everywhere. Consumers have more IoT and mobile devices than ever before. Industrial IoT is becoming ubiquitous and IoT malware is as common as cell phones. While conveniences are making their way into every facet of life, so are malicious software, social engineering attack and all manner of bad actors.
Thinkers360 Predictions Series – 2020 Predictions for Cloud Computing
Cloud computing will continue to grow despite the frequency of breaches due to a lack of administrative controls and unintentional configuration errors. When an administrator had access to an on-premises server, they could only administer that server; a “cloud administrator” can administer all the assets in a given cloud instance, including backing up and exfiltrating entire servers. This is like the unintentional configuration errors that have plagued so many Amazon S3 buckets in 2019, where organizations have stored PII in S3 in a default configuration, and then those data have been accessed by security researchers.
How the Social Media Platform Discord is Helping Parents Keep Kids Safe
“Discord initially was used as a way for gamers to hold real-time voice and text chats in games that either didn’t support real-time communications or where the in-game system wasn’t robust,” says Kayne McGladrey, a senior member of IEEE, a professional organization for technology and engineering. But the platform gained popularity, particularly during the COVID-19 shutdown. “During the pandemic, Discord emerged as a free alternative to Zoom for gamers, friends, cryptocurrency enthusiasts, and other communities to host remote events,” McGladrey says.
Opening keynote speech at the Seattle Electrical Conference
“I hope that you want to create safe products that benefit individuals and society, that make life better.
That you want to reverse course, and can advocate for security in face of lean IT, DevOps, and less money and less time and less people.
IEEE code of ethics includes the phrase “disclose promptly factors that might endanger the public or the environment”.
Not as strong as language as the other code of ethics I’m bound to follow as a CISSP, to “protect society, the common good, necessary public trust and confidence, and the infrastructure”
Regardless of which code of ethics you’re following, we have responsibility to society to turn this around.”
How CISOs Follow The Money
Kayne posits, “If you want to see what your new product features are going to be in the next 12 to 18 months, see where the VCs are spending their dollars. If we’ve seen something consistently in the past, in the past 10 years we’ve seen $30 billion of investment inside of cyber security.”
McGladrey is a gadfly for cyber security leaders to forecast budgets based on the newest in new technology. Whether the CISO in question is a bleeding edge, leading edge, fast follower or back-with-the-pack type executive is up to them. Any which way you slice it, you should be able to see where you are spending money in the future based on where venture capitalists are putting their money now.
4 Ways Private/Hybrid Clouds Improve Business Outcomes
CIO Online interviewed me for this article about authentication and authorization for hybrid and private clouds.