The Age of Ransomware: mitigating the next cyber heartbreak after WannaCry

The Age of Ransomware: mitigating the next cyber heartbreak after WannaCry

A cyber catastrophe has occurred. A little before noon on Friday, 12 May 2017, a highly virulent strain of the ransomware WannaCry (known as WannaCrypt) began to spread through Windows systems worldwide, crippling the NHS healthcare system, Russian government ministries and French automobile plants, and ultimately impacting more than 200,000 computers in 150 countries byRead more

Cyber-extortionists Take a Bite at Apple – Update

Cyber-extortionists Take a Bite at Apple – Update

The Turkish Crime Family (TFC) versus Apple cyber extortion case is unique in being one of the first widely reported incidents of a large tech company being subjected to extortion. TCF claimed access to hundreds of millions of iCloud accounts, which they threatened to wipe if Apple did not pay a ransom (the amount inRead more

Cyber-extortionists Take a Bite at Apple

Cyber-extortionists Take a Bite at Apple

On Friday April 7, a group of cybercriminals calling themselves the ‘Turkish Crime Family’ claim that they will wipe hundreds of millions of iCloud credentials, instantaneously rendering Apple users unable to play or purchase music, use apps, or access email or Cloud file backups, perhaps indefinitely. That is, unless Apple pays the extortionists a ransomRead more

Lights Out at Amazon

Lights Out at Amazon

Tuesday, 28 February, saw “high error rates” in multiple AWS services in the US’ eastern region. These began in the S3 service provided by the US-East-1 North Virginia site before spreading to other services hosted by US-East-1 including CloudWatch, EC2, Storage Gateway, and WAF (web application firewall). Disruptions to the S3 Service, which allows clientsRead more

Artificial Intelligence in the Not-So-Distant Future

Artificial Intelligence in the Not-So-Distant Future

  The motto of the Tyrell Corporation – the corporation responsible for android production in Ridley Scott’s 1982 classic Blade Runner – is “more human than human”. As autonomous systems become increasingly ubiquitous and permanent fixtures in modern societies, there is both concern and curiosity that our not-so-distant future resembles something out of a scienceRead more

NSA Cyber Weapon Stash for Sale

NSA Cyber Weapon Stash for Sale

Éireann Leverett Risk Researcher, Centre for Risk Studies, Judge Business School at University of Cambridge, and CEO, Concinnity Ltd. Dr. Andrew Coburn SVP, RMS, Inc., and Director of Advisory Board, Cambridge Centre for Risk Studies, Judge Business School On 13 August the ‘ShadowBrokers’, a previously unknown hacker group, posted an online auction of a setRead more

Analytics is Integral to Resilience and Sustainability

Analytics is Integral to Resilience and Sustainability

(Photo credit: David Baron, Flickr Creative Commons) As the United States looks toward the next four years of presidential decision-making and economic policy, the federal capital has played host to the ongoing discussion on finding solutions to both social and economic resilience and sustainability for the future. It was heartening to learn, in attending severalRead more

Is Regulation of Risk Culture the Missing Piece?

Is Regulation of Risk Culture the Missing Piece?

Greater use of civil and administrative sanctions will steer good corporate behaviour more effectively than prescribed risk culture as a regulatory tool divorced from business relevance, say Dr Michelle Tuveson and Professor Danny Ralph, Directors of the Cambridge Centre for Risk Studies. Their paper “Is Regulation of Risk Culture the Missing Piece? Civil Actions Reconsidered”Read more

Who Believes Forecasters?

Who Believes Forecasters?

Cassandra, the mythological Trojan, was given the power of prophecy but cursed with never being believed.  Modern forecasters generally suffer from the Cassandra predicament. Yet the appetite for prophecy has only expanded. As we enter the new year, it is as appealing now as it ever was to attempt to forecast how a variety ofRead more

Tags: