1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

IDG Contributor Network: Fending off cyber extortion can be difficult

Discussion in 'CSO' started by RSS, Dec 2, 2015.

  1. RSS

    RSS New Member Member

    A basic computer setup connected to the internet grants a malicious hacker the power to steal sensitive information, affect a company’s stock value, and hold corporations to a ransom with the click of a mouse. The advent of anonymizing technologies such as the Tor network and virtual cryptocurrencies like Bitcoin are taken advantage of by cybercriminals to operate in clandestine ways.

    The reality is this: the wired infrastructure we rely upon where everything from a nuclear reactor to a Wall Street firm can be hacked into merely for being connected to the internet has opened a whole new world of possibilities to criminals operating on the Internet. A ransom demand or a threat over an email was the natural step in the evolution of criminals on the Internet operating in anonymity.

    To read this article in full or to leave a comment, please click here

    Continue reading...

Share This Page