NOT IMPOSSIBLE
Tim&Larry

Guide to Handling Online Privacy the Right Way




Here is the weekly roundup :

The Future Cyber Risk Insurance Market
The importance of cybersecurity in the future can hardly be overstated. Organizations everywhere know this very well and are increasing their cybersecurity spending – which in turn propels the cybersecurity industry forward at an increasing rate. Similarly, there is an immense growth potential in the cyber risk insurance market.

Report: US Bank Suffered 513 Trojan Attacks in 2015
A Symantec threat report has revealed that an unnamed United States bank was struck with 513 financial Trojans last year alone.

Bangladesh Bank Hack Security Researcher Goes Missing
A 34-year-old security researcher who was a part of the investigations following the $81 million cyber heist of the NY Fed account belonging the Bangladesh central bank has gone missing, days after accusing the banks officials of negligence.

Multiple Swedish Newspapers Targeted in Hacker Attacks
An unknown hacker or group of hackers have targeted a number of leading Swedish newspapers over the weekend in a series of coordinated attacks.



Did Hackers Leak Donald Trump’s Social Security Number?
Hackers claiming to be a part of the infamous Anonymous hacking group claim to have leaked Donald Trump’s personal details, including his Social Security Number online.

Linux Distribution for Forensic Investigations? MantOS Delivers
Download our new Incident Response and Digital Forensics Linux distribution - MantOS - completely free of charge and let us know your thoughts. MantOS is a newly release free open-source project by LIFARS.



Interesting Reading From Around the Web:

It Might Cost The FBI Just $1,500 To Get Into Terrorist's iPhone
Such is the complexity of iPhone exploits, they can earn hackers as much as $1 million. But Israeli company Cellebrite, today reported to be helping the FBI unlock the iPhone of San Bernardino shooter Syed Rizwan Farook, has a clever way of cracking open iPhones for a low fee whilst keeping the valuable vulnerabilities required to access protected data to itself. And it can cost as little as $1,500.


Hospital Declares ‘Internal State of Emergency’ After Ransomware Infection
A Kentucky hospital says it is operating in an “internal state of emergency” after a ransomware attack rattled around inside its networks, encrypting files on computer systems and holding the data on them hostage unless and until the hospital pays up.


Locky Ransomware Infecting 90,000 Systems Daily
Ransomware is quickly becoming a mainstream form of malware, according to the Clearwater, Fla.-based cybersecurity firm KnowBe4, and one driving factor is the significant amount of cash being racked up by the notorious Dridex banking Trojan gang with its new Locky strain.



Upcoming Events:


Your Digital World Secured: How to Prevent Personal & Corporate Hacking

Eventsy teams up with LIFARS, NYC's elite cybersecurity firm, to bring you a diverse panel on Media Cyber Security and a rich evening of networking!

We are thrilled to present: How to Prevent Personal & Corporate Hacking: a premiere panel featuring speakers with experience in the FBI, Secret Service, digital forensics, and more. Come learn how to protect yourself on both the personal and corporate level in our new media-rich era and earn 2 CPE credits.

FOR A 50% DISCOUNT, PLEASE USE THE FOLLOWING CODE: LIFARS50


March 31, 2016, New York, NY



Find Out More



LIFARS at the QuBit Conference 2016

Always wanted to visit Prague? Now is your chance! Yet another good reason to visit - the QuBit Conference. So what are you waiting for? Tickets won't be this cheap for long!

Special packages are now available!


April 12-14, 2016, Prague, Czech Republic



Register Now

DataSolutions Secure Computing Forum

The 4th annual Secure Computing Forum brings world-class speakers together to discuss various aspects of cybersecurity and the way they are all interconnected in protecting your brand and securing your business.

May 12, 2016, Dublin, Ireland



Find Out More


Featured Guide



Increase Your Online Privacy with These 4 Easy Steps

As our lives move further into the digital world, we’re often paying for newly-gained comforts with our privacy. Yet, because the effects from these compromises are not often immediately visible, it is easy to dismiss the potential impact of privacy loss on our lives and overlook the steps necessary to minimize it.In collaboration with Assurex Global, we have prepared this easy-to-follow guide to help you keep your privacy online.

Download Now



Webinar:



Fuel Incident Response with Threat Intelligence to Lower the Impact of a Data Breach

In this webinar, we will explain how threat intelligence can help secure your company, how to implement an intelligence strategy, how a thorough threat intelligence program can reduce the risk of breaches, and how this intelligence spearheads an incident response and describe the process of investigation and evidence collection.



Register Now




Featured Q&A:



Joe AbiDaoud & Mike Jankowski on Business Value of Information Technology

Joe AbiDaoud, the Chief Information Officer of Hudbay, and Mike Jankowski, the Enterprise Architect and IT Security Officer of Hudbay, talk about the real business value of IT in in corporate environments and how it has changed over time to its current state.



Read Full Article






Going to Enfuse? Save on Tickets with LIFARS

Enfuse (formerly CEIC) is one of the biggest cybersecurity events of the year and we have partnered up with Guidance Software to bring you special savings on registrations.

For groups of three or more, use this link to contact enfuse to get a special code.
For individual discount, please use the promo code "LIFARS" (no quotes) when registering to get $200 off. The offer ends on February 28, so act fast!



Find Out More



Featured Article:



Computer Data: Is It Tangible Property & Subject to “Physical Loss or Damage”?



PART 2

In this webinar, we will explain how threat intelligence can help secure your company, how to implement an intelligence strategy, how a thorough threat intelligence program can reduce the risk of breaches, and how this intelligence spearheads an incident response and describe the process of investigation and evidence collection.



Read Full Article





Computer Data: Is It Tangible Property & Subject to “Physical Loss or Damage”?



PART 2

Business policy holders were scratching their heads – for the purposes of insurance – to find out if stored data in the form of media, software, or programs are deemed “tangible property.” Alternatively, could computer data be subject to “physical loss or damage”? Ondrej Krehel takes a look at some prior court cases to find out in this 2 part series.



Read Full Article



Connect with us

LinkedIn Twitter Facebook Google Website YouTube

LIFARS LLC, 244 Fifth Avenue, Suite 2035, New York, NY 10001 Copyright © 2016 LIFARS, LLC, All rights reserved.