Matthias Gruber

What would you pay for your data? Ransomware as driving force for hackers’ ROI

What would you pay for your data? Ransomware as driving force for hackers’ ROI

So who are the criminal networks behind ransomware? and what is their future? The practice of holding a person or company to ransom is not at all new: the ‘professionalization’ of highwaymen in Europe was a feature of business and personal risk in the 16th and 17th century. Through the 1970s and 1980s, white- collar extortion and hostage-taking were features of the business landscape in the US: the US authorities issued guidelines to corporations on how to handle such situations.

Ransom in the Digital World – the rise of ransomware

Ransom in the Digital World – the rise of ransomware

As a tactic for coercing and threatening vulnerable targets into paying up, the technique of professional ransom has a six hundred year history. The advent of cyberspace has created a new environment through which cyber criminals, whether opportunists or organised gangs, can hold the data assets of companies and private individuals for ransom, in distant states and geographies where they are unlikely to face charges anytime soon.

Did you accept your Dark Net friendship invite?

Analyze what information is available

Did you accept your Dark Net friendship invite?

The ‘Deep Web’ is a term used to describe digital objects and data that are not accessible over the internet via search engines. It comprises protected and proprietary data (such as bank accounts, email and research data) as well as intranets. About 96% of all online data is in the Deep Web (DW), including most of the world’s Instant Messaging (IM) traffic.

Cyber Security – the underlying Problem

Cyber Security – the underlying Problem

Cybersecurity is a €100 billion global business, driven by increasingly sophisticated threats across an ever-expanding attack surface: by 2017, 600 million malware variants have been identified. The advent of the Internet of Things (IoT), connected Industrial Control Systems, digital finance and the mobile workforce have created a deep marketplace for cybercriminals to exploit. Delays in threat …