<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区

          Financial data being held hostage by hackers

          Updated: 2015-08-12 09:23

          By Timothy Chui in Hong Kong(HK Edition)

            Print Mail Large Medium  Small

          IT experts urge firms to be vigilant on malware and update security patches

          Financial institutions are increasingly finding their data is being held hostage by hackers - and the number of digital ransom cases may be higher than official tallies.

          Information sector lawmaker Charles Mok Nai-kwong told a cloud computing security conference on Tuesday that many financial institutions had approached him. This was after learning hackers were demanding ransoms in bitcoin - a digital currency created and exchanged independently of banks or governments - after encrypting sensitive and confidential business data.

          "The financial services industry wants to make sure consumers see them as secure," Mok told the conference of information security officers.

          "But in fact, in the last couple of years there has been quite a number of these crypto lockers targeting their servers and systems and injecting the malware into the system and then locking out the system and calling you for ransom," he said.

          "I have to say that many of those that are being targeted don't want their names to be leaked out, so I can't even say who they are," he added.

          Mok said that once targeted, organizations were confronted with the dilemma of paying either a lot of money or letting their company services stop - and suffering a huge loss to their reputations.

          The Hong Kong Computer Emergency Response Team (HKCERT) said in its latest security note there was an increasing trend of crypto ransom ware targeting the city. It reported an average of five incidents per month from February to April this year.

          The Bank of China and Bank of East Asia were reportedly hit with crypto locker ransom ware attacks in May. Both banks claimed customer data and services were not affected.

          HKCERT began detecting random ware affecting network storage less than two years ago, according to senior consultant Leung Siu-cheong, who advised targeted companies not to pay ransoms.

          "They will come back asking for more," he said, noting ransoms were kept relatively low to encourage compliance. Some ransoms were in the thousands for individuals, the tens of thousands for small businesses. But millions were demanded from larger entities which were threatened with denial-of-service (DoS) attacks.

          The solution for the attacks is not cheap. Companies are recommended to make multiple daily or hourly offline backups of their data in the event of an infection.

          Ransom ware attacks are started through phishing emails, encrypting not only files located in affected machines but all files shared on connected networks. An extortion message on infected computers typically demands a specified ransom in bitcoin in exchange for the decryption key, otherwise the unique decryption key will be deleted, HKCERT said.

          International Information Systems Security Certification Consortium Asia-Pacific technical adviser Chuan-Wei Hoo said that cities such as Hong Kong and Singapore are lucrative targets - given the concentration of large financial institutions, data centers, and small and medium enterprises.

          On average, a 10th of workers in companies with more than 100 employees clicked on infected links in phishing emails, former chief technology officer of the US Central Intelligence Agency (CIA) and President of IT consulting company Applicology Bob Flores said.

          HKCERT recommends that users keep up to date with patches in its 2015 security outlook. Some 96 percent of patchable vulnerabilities being exploited were more than two years old, Flores said.

          tim@chinadailyhk.com

          (HK Edition 08/12/2015 page10)

          主站蜘蛛池模板: 2021中文字幕亚洲精品| 国产伦视频一区二区三区| 国产欧美日韩亚洲一区二区三区 | 久久精品国产中文字幕| 高中女无套中出17p| 国产微拍一区二区三区四区| 精品久久精品午夜精品久久| 中文字幕欧美日韩| 亚洲天堂领先自拍视频网| 综合图区亚洲另类偷窥| 久久一日本道色综合久久| 欧美极品色午夜在线视频| 露脸一二三区国语对白| 国产精品久久久久影院色| 亚洲一区sm无码| 久久精品丝袜高跟鞋| 亚洲精品无码日韩国产不卡av| 亚洲另类无码一区二区三区| 99这里有精品视频视频| 亚洲高清在线天堂精品| 成人午夜污一区二区三区| 黄色A级国产免费大片视频| 国产在线乱子伦一区二区| 亚洲嫩模一区二区三区视频| 亚洲综合小综合中文字幕| 午夜男女爽爽影院免费视频下载| 一出一进一爽一粗一大视频| 99久久精品午夜一区二区| 成人精品视频一区二区三区| 91亚洲国产成人精品性色| 午夜福利在线观看6080| 国产情侣激情在线对白| 夜色福利站www国产在线视频| 亚洲成人精品综合在线| 二区中文字幕在线观看| 成人精品色一区二区三区| 国产欧美精品一区二区色综合 | 国产一区二区三区四区色| 日韩免费无码一区二区三区| 国产天美传媒性色av高清| 久久亚洲精品情侣|