Photographee.eu - Fotolia

Problem solve Get help with specific problems with your technologies, process and projects.

Risk & Repeat: Doxware emerges as a new threat to data privacy

Listen to this podcast

In this episode of SearchSecurity's Risk & Repeat podcast, editors discuss the emergence of doxware and extortionware and what that means for enterprises and their employees.

A new spin on the ransomware model could spell trouble for enterprises and data privacy.

The recent emergence of ransomware attacks threatening to make encrypted data public -- rather than threatening to delete the data -- has security experts contemplating the concept of "doxware," also known as extortionware. The concept of extortionware has been around for some time. However, recent ransomware attacks that threatened to expose or "dox" victims' private information, such as the "Epic" Crypt.Locker ransomware variant, have highlighted the threat.

The threat of doxware could complicate matters for enterprise security teams because it negates one of the best defenses for ransomware attacks -- backup and recovery services. In addition, recent breaches and exposures of private emails and documents, such as the phishing attack on Clinton campaign chairman John Podesta, have demonstrated that data becoming public can be much more damaging than data being destroyed.

How are cybercriminals adapting their ransomware attacks in 2017? Who will be targeted by these extortionware attacks? What steps can enterprises take to defend against doxware?

In this episode of SearchSecurity's Risk & Repeat podcast, editors Rob Wright and Peter Loshin discuss those questions and more on the topic of doxware. They also discuss recent MongoDB security issues, as well as a Federal Trade Commission lawsuit against D-Link over alleged security weaknesses in the vendor's wireless routers. 

Next Steps

Risk & Repeat: CES Cybersecurity Forum tackles passwords, internet of things threats

Risk & Repeat: Corero discusses new distributed denial-of-service defense tactics

Risk & Repeat: Tatu Ylonen on solving SSH security woes

Join the conversation

1 comment

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Has your company taken any steps to defend against extortionware attacks?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close