Give the ransomware threat the same priority as terrorism, says US official guidance

John Leonard
clock • 2 min read

US launches a coordinated effort to track down cyber gangs using the same model deployed against terrorist groups

Ransomware gangs should be tracked and disrupted using the same strategies deployed against terrorist groups, US Department of Justice officials have suggested. In internal guidance sent to US a...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Threats and Risks

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

Apple M-series CPU vulnerability enables attackers to purloin cryptographic keys from Macs

US researchers find baked-in flaw

Graeme Burton
clock 22 March 2024 • 2 min read
US National Security Advisor Jake Sullivan warns of 'digital Pearl Harbor' targeting infrastructure

US National Security Advisor Jake Sullivan warns of 'digital Pearl Harbor' targeting infrastructure

White House warns of 'disabling cyberattacks' by Iran and China

Graeme Burton
clock 21 March 2024 • 3 min read
Fujitsu exposed client data, AWS keys and passwords for nearly a year, report

Fujitsu exposed client data, AWS keys and passwords for nearly a year, report

Unanswered questions about how many unauthorised parties may have accessed the sensitive information

clock 21 March 2024 • 3 min read