You searched for coverage | SC Media

Your search for coverage returned 41 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Security News remove
Features remove

Your search for coverage returned 41 results

Sort Results:

Relevant Recent
Features, Security News

The hottest topic: Ransomware

The attacks that transpired last year alone arguably made ransomware the hot topic of the year and most likely a leading contender for 2020, as well, but a new element that cropped up late last year – attackers adding a layer of blackmail to the threat of locking a target’s computer system – solidified its…
Features, Security News

2019’s weird and wonderful news

Dead Cows, HackerGiraffes, fast food-craving lemmings, foul-mouthed scooters and golf pranksters made SC Media’s rather eclectic list of the most bizarre cyber news from the last 12 months.  In 2016, hackers tried to influence who became president. This time, hackers are running for president!   Well, make that a former teenage hacker – and a fairly harmless one at…
Ransomware, Security News

Ransomware: To pay or not to pay

The crudely written ransom notes in movies 20-30 years ago may have been replaced by more modern, digital missives – like a texted photo a la Liam Neeson’s “Taken” – but the message remains the same: Pay up or else.   That is the quandary business owners, municipal governments, school administrators and even librarians are now…
Ransomware, Security News

Captives of industry

Ransomware is everywhere. It plagues businesses big and small, across the globe, even in the most hidden corners. Still, over the past year, certain industries have been feeling the pain more than others. A Malwarebytes quarterly report released last August found that detections of ransomware among organizations rose 365 percent from Q2 2018 to Q2…
Cybercrime, Security News

Wicked (dark web) wish list

The dark web can be a fairly lawless place, but even the most hidden corners of the darknet are not immune to the laws of supply and demand. Malware programs, cybercriminal services and stolen data can skyrocket in popularity on the underground market just as quickly as they can fall out of favor – same…
Features

No business like breach business

Repeated exposure of private data is giving rise to a new class of companies promising to clean up the mess - and they don't come cheap. Lee Sustar reports.
Features

Educating boards

C-suites and boards of directors are increasing their knowledge of IT security risks and needs - before a breach happens. Larry Jaffee reports.
Next post in Features