Results 41 to 50 of about 21,893 (200)

Ransomware through the lens of state crime: Conceptualizing ransomware groups as cyber proxies, pirates, and privateers

open access: yesState Crime, 2023
Cybercrime and other cybersecurity harms are gaining increasing political and public attention across many countries. One of the most serious and fastest growing categories of such harms relates to ransomware attacks.
James Martin, Chad Whelan
doaj   +1 more source

Evolution of ransomware

open access: yesIET Networks, 2018
Cybercrime has long since transformed from a world of Maverick attackers to a criminal business. Ransomware is a malware that renders a victim's computer or data unusable and is increasingly being used by criminals to generate revenue through extortion ...
Philip O'Kane   +2 more
doaj   +1 more source

Ransomware detection using deep learning based unsupervised feature extraction and a cost sensitive Pareto Ensemble classifier

open access: yesScientific Reports, 2022
Ransomware attacks pose a serious threat to Internet resources due to their far-reaching effects. It’s Zero-day variants are even more hazardous, as less is known about them. In this regard, when used for ransomware attack detection, conventional machine
Umme Zahoora   +5 more
doaj   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

A fine-tuning of decision tree classifier for ransomware detection based on memory data [PDF]

open access: yesInternational Journal of Data and Network Science
Ransomware has evolved into a pervasive and extremely disruptive cybersecurity threat, causing substantial operational and financial damage to individuals and businesses.
Mosleh M. Abualhaj   +6 more
doaj   +1 more source

Deep dive into ransomware threat hunting and intelligence at fog layer [PDF]

open access: yes, 2018
Ransomware, a malware designed to encrypt data for ransom payments, is a potential threat to fog layer nodes as such nodes typically contain considerably amount of sensitive data.
Ahmadzadeh, M   +6 more
core   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Ransomware

open access: yes, 2018
This final work talks about who the ransomware works, the regulation regarding to ransomware, how to do the payment and also about the attack suffered in May 2017 by WannaCry.
  +5 more sources

Unveiling evasive ransomware and breaking through the predicament: a comprehensive review of evasion techniques and defense mechanisms

open access: yesCybersecurity
Ransomware has become one of the most destructive cyberattacks worldwide in recent years and has caused billions of dollars. Numerous defense mechanisms have been proposed to mitigate the ransomware threat.
Lingbo Zhao   +3 more
doaj   +1 more source

A behavioural in‐depth analysis of ransomware infection

open access: yesIET Information Security, 2021
Ransomware is a type of malware that has spread rapidly over the last 4 years, causing significant damage, especially in Windows environments. It is designed to encrypt or block victim's data, including documents, backups, and databases, unless a ransom ...
Yassine Lemmou   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy