Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Business
What's Your Cyber Protection Game Plan?, Paul Murphy
What's Your Cyber Protection Game Plan?, Paul Murphy
Metro Denver Dental Society Articulator Magazine
The article discusses offensive and defensive strategies for protection against cyberattacks and ransomware. Best practices detailed include engaging with credentialed experts, safeguarding against potential breaches through updated technology and vulnerability assessments and training staff to recognize and respond to threats.
Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin
Ransomware - A Strategic Threat To Organizations, James Frost, Alan R. Hamlin
Mountain Plains Journal of Business and Technology
Ransomware is a strategic threat to government, business, and academic organizations. It has both short term and long term consequences, requiring strategic planning to create defenses, assess options, and create policies.
The purpose of the study is to answer three questions: What is the strategic risk of cyberattack to organizations? What are the current attitudes and practices of executives who are vulnerable to such threats? What are specific options that organizations should consider to prevent and deal with possible incidents in the future? The article is thus comprised of the following components: A) a history of the development and complexity …
Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz
Voice Hacking: Using Smartphones To Spread Ransomware To Traditional Pcs, Bryson R. Payne, Leonardo I. Mazuran, Tamirat Abegaz
Journal of Cybersecurity Education, Research and Practice
This paper presents a voice hacking proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, …