New and emerging threats are comprised of highly sophisticated and potentially catastrophic campaigns. Cybercriminals use multiple components and social media elements and privilege escalation to bypass security and access private and confidential files and resources. Blended; Spear Phishing; Classic Phishing; Novel Media; Rapid-Evolution Malware; Highly Permuted, Short-Lived Campaigns; and Smartphone Attacks are covered in this paper. Only zero-minute defense will enable companies to protect their networks, data, and employees.
Jon Collins’ in-depth look at tech and society
Phil Muncaster reports on China and beyond
Rupert Goodwins’ unique angle on tech change