<tt id="6hsgl"><pre id="6hsgl"><pre id="6hsgl"></pre></pre></tt>
          <nav id="6hsgl"><th id="6hsgl"></th></nav>
          国产免费网站看v片元遮挡,一亚洲一区二区中文字幕,波多野结衣一区二区免费视频,天天色综网,久久综合给合久久狠狠狠,男人的天堂av一二三区,午夜福利看片在线观看,亚洲中文字幕在线无码一区二区

          Financial data being held hostage by hackers

          Updated: 2015-08-12 09:23

          By Timothy Chui in Hong Kong(HK Edition)

            Print Mail Large Medium  Small

          IT experts urge firms to be vigilant on malware and update security patches

          Financial institutions are increasingly finding their data is being held hostage by hackers - and the number of digital ransom cases may be higher than official tallies.

          Information sector lawmaker Charles Mok Nai-kwong told a cloud computing security conference on Tuesday that many financial institutions had approached him. This was after learning hackers were demanding ransoms in bitcoin - a digital currency created and exchanged independently of banks or governments - after encrypting sensitive and confidential business data.

          "The financial services industry wants to make sure consumers see them as secure," Mok told the conference of information security officers.

          "But in fact, in the last couple of years there has been quite a number of these crypto lockers targeting their servers and systems and injecting the malware into the system and then locking out the system and calling you for ransom," he said.

          "I have to say that many of those that are being targeted don't want their names to be leaked out, so I can't even say who they are," he added.

          Mok said that once targeted, organizations were confronted with the dilemma of paying either a lot of money or letting their company services stop - and suffering a huge loss to their reputations.

          The Hong Kong Computer Emergency Response Team (HKCERT) said in its latest security note there was an increasing trend of crypto ransom ware targeting the city. It reported an average of five incidents per month from February to April this year.

          The Bank of China and Bank of East Asia were reportedly hit with crypto locker ransom ware attacks in May. Both banks claimed customer data and services were not affected.

          HKCERT began detecting random ware affecting network storage less than two years ago, according to senior consultant Leung Siu-cheong, who advised targeted companies not to pay ransoms.

          "They will come back asking for more," he said, noting ransoms were kept relatively low to encourage compliance. Some ransoms were in the thousands for individuals, the tens of thousands for small businesses. But millions were demanded from larger entities which were threatened with denial-of-service (DoS) attacks.

          The solution for the attacks is not cheap. Companies are recommended to make multiple daily or hourly offline backups of their data in the event of an infection.

          Ransom ware attacks are started through phishing emails, encrypting not only files located in affected machines but all files shared on connected networks. An extortion message on infected computers typically demands a specified ransom in bitcoin in exchange for the decryption key, otherwise the unique decryption key will be deleted, HKCERT said.

          International Information Systems Security Certification Consortium Asia-Pacific technical adviser Chuan-Wei Hoo said that cities such as Hong Kong and Singapore are lucrative targets - given the concentration of large financial institutions, data centers, and small and medium enterprises.

          On average, a 10th of workers in companies with more than 100 employees clicked on infected links in phishing emails, former chief technology officer of the US Central Intelligence Agency (CIA) and President of IT consulting company Applicology Bob Flores said.

          HKCERT recommends that users keep up to date with patches in its 2015 security outlook. Some 96 percent of patchable vulnerabilities being exploited were more than two years old, Flores said.

          tim@chinadailyhk.com

          (HK Edition 08/12/2015 page10)

          主站蜘蛛池模板: 国产精品毛片一区视频播| 爱如潮水在线观看视频 | 亚洲中文字幕日产无码成人片 | 亚洲精品人成网线在播放VA| 国产精品99久久免费观看| 亚洲国产综合一区二区精品| 亚洲中文字幕日产无码成人片| 国产偷国产偷亚洲高清午夜 | 色综合天天综合| 日韩在线一区二区每天更新| 亚洲最大在线精品| 国产精品综合av一区二区国产馆| 久久久国产精品樱花网站| gogogo免费高清日本tv| 欧美牲交a欧美牲交aⅴ图片 | 免费人成在线观看品爱网| 国产系列丝袜熟女精品视频| 亚洲精品在线少妇内射| 另类 亚洲 图片 激情 欧美| 国产69精品久久久久人妻| 偷拍精品一区二区三区| 青青草视频免费观看| av亚洲一区二区在线| h动态图男女啪啪27报gif| 亚洲 成人 无码 在线观看| 在线视频中文字幕二区| AV人摸人人人澡人人超碰| 丁香婷婷在线视频| 韩国精品视频在线日韩| 老王亚洲AV综合在线观看| 成人午夜av在线播放| 377P欧洲日本亚洲大胆| 在线中文字幕日韩| 老妇xxxxx性开放| 综合成人亚洲网友偷自拍| 亚洲一区二区三区十八禁| 久久996re热这里只有精品无码| 亚洲精品一品二品av| 在线观看美女网站大全免费| 国产精品国产精品无卡区| 国产精品亚洲а∨天堂2021|