Further reading
Please refer to the following links for more information:
- To see a live cyberthreat map, visit https://threatmap.checkpoint.com/.
- A good article from Malwarebytes on the Future of Undetected Malware can be found here: https://resources.malwarebytes.com/files/2018/12/Malwarebytes-Labs-Under-The-Radar-APAC-1.pdf.
- To see a visual on how quickly the WannaCry ransomware infected tens of thousands of computers, visit https://nyti.ms/2r9WIfE.
- An article from Cisco on common cyber attacks: https://www.cisco.com/c/en/us/products/security/common-cyberattacks.html.
- For a glossary of threats, visit https://www.cyren.com/resources/cyber-threat-glossary.
- An article that outlines a new threat, data manipulation: https://www.cloudmask.com/blog/is-data-manipulation-the-next-step-in-cybercrime.
- To see an overview on intangible goods, go to https://simplicable.com/new/intangible-goods.