Eversheds Sutherland Cybersecurity and Privacy Insights Blog
content top

Helping it click into place – Our monthly Asia cybersecurity update

During 2017, cyberattacks continued to evolve and develop sophistication, exploiting both previously unidentified vulnerabilities and known vulnerabilities in new ways. Ransomware attacks such as Petya and WannaCry put critical functions across the world and across industries on hold, while the Mirai botnet attack, unleashed in late 2016, highlighted the increasing vulnerabilities of...

Cyber Attacks on U.S. Power Grids Can Be Deterred With Password Changes

A key to preventing cyber attacks from crippling U.S. power grids could be changing passwords on internet routers, wifi-connected thermostats and smart lawn-sprinklers. “A significant share” of internet attacks result from unchanged factory default passwords on web-connected devices that allow hackers to break in and and install malware, according to a Jan. 18 report by the Advanced...

Triton Malware Shuts Down Industrial Plant

Cybersecurity experts at FireEye have issued a warning after a recent hacker attack caused “operational disruption to critical infrastructure” at an unnamed industrial plant. The hackers introduced a malware program that FireEye is calling “Triton” into the security system, likely in preparation for a larger attack. Learn...

The High Stakes, High Seas Cyber Peril

Those who work in shipping are accustomed to the perils of the high seas, whether from storms, pirates, floods or fires. But now, a new danger is lurking—the possibility of a cyberattack. Despite the growing prevalence and severity of cyberattacks across industries, the shipping industry as a whole has been slow to react, and many are less than optimally prepared. When it comes to...

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing

In September 2015, then-Director of National Intelligence James Clapper warned that the next “push of the envelope” in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the very beginning of such insidious attacks in the form of GPS spoofing—a technique that sends...

« Older Entries