Need to catch up on the past week’s cybersecurity news?

This week’s cyber resilience headlines included topics ranging from the automatic translation of email, to talk of the cyberrisk landscape of 2018, to Australia’s NDB scheme. Check out the latest goings on in the world of cybersecurity.

  1. Introducing e-mail that speaks your language Via BusinessLive
    • Most of us take e-mail attachments so much for granted, we don't realize that the medium was not initially designed to contain anything more than the text typed into the message. Sending documents, receiving bills and forwarding cat photos became possible when a standard for attachments was created, way back in 1992.  It was called multipurpose internet mail extensions, or MIME, and is still at the heart of e-mail today.  The very first attachment was sent by Nathaniel Borenstein, who created the standard with Ned Freed.  Now Borenstein is at it again. He has helped create a new e-mail standard that allows for automatic translation of any e-mail message into the recipient's chosen language.  Read More
  2. 2018 Cyberrisk LandscapeVia Risk Management Magazine
    • The risk and insurance community consistently ranks cyberrisk as its top area of interest and concern, and it’s no wonder—these days, every year is a banner year for cybersecurity. The more that stays the same, the more things change. Cyberrisk management and awareness continue to improve, but many companies still lag on even fundamental risk assessment and mitigation measures, and hackers are perpetually refining the tools in the cybercrime arsenal to stay several steps ahead, whether to steal data, sow discord, or simply stay profitable. As risk managers and cyberthreat actors get further entrenched in their roles, cybersecurity concerns have been maturing beyond stunt hacks and buzzword-laden headlines to become more nuanced. Managing this complex dynamic requires a deeper understanding of the tactics, tools, and trends currently in the field and coming down the pike. Cybersecurity, risk management, and legal experts expect these 10 trends will define the cyberrisk landscape in 2018.  Read More
  3. ‘Ransomware’ among words added to Oxford English Dictionary in latest update  Via The Washington Times
    • Ransomware, a type of computer virus responsible for several recent wide-scale cyberattacks, has joined the ranks of nearly a million other words recognized by the Oxford English Dictionary.  Read More
  4. RIG and GrandSoft exploit kits shell out new GandCrab ransomware Via SC Magazine
    • Breaking from typical ransomware distribution tactics, the attackers behind the new malicious cryptor GandCrab are relying on a pair of exploit kits – RIG EK and GrandSoft EK – to infect unwitting victims. The finding is unusual, as exploit kits are more typically used to deliver downloaders, RATs, cryptominers and other trojans such as Ramnit, as opposed to ransomware programs, Malwarebytes explains in a Jan. 30 company blog post.  Read More
  5. Don't Fall for This FBI Email Scam Via Tom’s Guide
    • A new scam going around features email messages claiming to be from the FBI, and while the scam is not particularly hard to avoid, you have to marvel at the sheer audacity of it. This information comes from — you guessed it — the actual Federal Bureau of Investigation, courtesy of its Internet Crime Complaint Center (IC3). Users receive an email message entitled “RE: Internet Crime Victim Restitution” from an organization claiming to be the IC3. (The FBI did not specify an email address from which the scam originates, but it’s not hard to spoof something to look like a government communication.)  Read More
  6. Data breach notification laws will force businesses to say if they've been hacked Via abc.net.au
    • On February 22 new data breach notification laws will come into effect, potentially leaving thousands of Australians businesses on the wrong side of the law.  Under the proposed laws, businesses will be required to alert the Australian Information Commissioner and all of its affected clients if they get hacked. Read More
  7. 3 Ways Hackers Steal Your Company's Mobile Data Via Dark Reading
    • The most effective data exfiltration prevention strategies are those that are as rigorous in vetting traffic entering the network as they are traffic leaving it.  It's the unfortunate reality of the cybersecurity threat landscape today that malicious actors are advancing their tactics at a breakneck pace, finding new vulnerabilities in network defenses to execute attacks faster than IT teams can keep up.  Read More

Want more great articles like this?Subscribe to our blog.

Get all the latest news, tips and articles delivered right to your inbox

You may also like:

The 5 Biggest Challenges of Mobile Email Management

Cloud archiving addresses The many CHALL…

Cloud archiving addresses The many CHALLENGES of mobile emai… Read More >

Margot Carmichael Lester

by Margot Carmichael Lester

Mimecast Contributing Writer

Posted Sep 06, 2017

Getting Ready for Australia’s NDB

Australia’s Notifiable Data Breach regim…

Australia’s Notifiable Data Breach regime is just weeks away… Read More >

Garrett O'Hara

by Garrett O'Hara

Principal Technical Consultant

Posted Dec 08, 2017

Cybersecurity vs. Cyber Resilience

What’s the difference between Cybersecur…

What’s the difference between Cybersecurity and Cyber Resili… Read More >

Matthew Gardiner

by Matthew Gardiner

Director of Product Marketing

Posted Jan 22, 2018