Category Archives: Thematic Signals

herd-banner---Twitter

Thematic Signals highlights confirming data points and items to watch for our list of investing themes. Whether it’s a news item, video clip, or company commentary, we’ve included this full list of items literally “ripped from the headlines.”

Microsoft warns of huge COVID-19 related email phishing scam

Microsoft warns of huge COVID-19 related email phishing scam

It seems that almost a day doesn’t go by that we don’t learn of a new COVID-19 related cyber attack. One of the latest ones comes from Microsoft’s Security Intelligence team concerning a new widespread Covid-19 themed phishing campaign. Once again, the attackers are impersonating a trusted entity to lure unsuspecting users into harms way to steal their passwords and other data.  While some may become desensitized to the growing number of phishing schemes and other attacks, we see it all adding credence and conviction to our Cybersecurity & Data Privacy investing theme.

The attack begins with potential victims receiving an email that impersonates the John Hopkins Center. This email claims to provide victims with an update on the number of coronavirus-related deaths in the US. However, attached to the email is an Excel file that displays a chart showing the number of deaths in the US.

The threat installs the NetSupport Manager remote administration tool to completely take over a user’s system and even execute commands on it remotely.

The Microsoft Security Intelligence team provided further details on this ongoing campaign in a series of tweets in which it said that cybercriminals are using malicious Excel attachments to infect user’s devices with a remote access trojan (RAT).

When a user opens the Excel file, it then prompts them to ‘Enable Content’ and doing this executes the file’s malicious macros which download and install the NetSupport Manager client from a remote site.

Source: Microsoft warns of huge email phishing scam – here’s how to stay protected | TechRadar

The World Economic Forum: Global Risks report names Cybersecurity to its top 10 Covid-19 global fallout list 

The World Economic Forum: Global Risks report names Cybersecurity to its top 10 Covid-19 global fallout list 

The World Economic Forum recently debuted its latest Global Risks report, which included cybersecurity as one of its “Top 10 Fallout” issues from COVID-19. This comes as little surprise following the fivefold increase in cyber attacks reported by the World Health Organization. What does stand out is the WEF’s Global Risk report tends to focus on global macro issues, and we see the inclusion of cybersecurity in the report as confirmation of its status as a pervasive, global threat with significant growth prospects ahead.

Nearly 38 percent of those surveyed say changing work patterns will lead to increases in cybersecurity and fraud incidents.

“The constant flow of information on the virus, accompanied by fear, confusion and even the boredom of confinement, have multiplied opportunities for cybercriminals to deliver malware, ransomware and phishing scams,” said Algirde Pipikaite, the WEF’s project lead in its Center for Cybersecurity.

Pipikaite added that the corporate digital infrastructure that normally protects most organizations with multiple layers of security has become much tougher to manage while the majority of employees work from home

Source: Cybersecurity makes World Economic Forum’s top 10 Covid-19 global fallout list | SC Media

COVID-19: Why The Largest Cyberattack In History Will Happen in the Coming Months

COVID-19: Why The Largest Cyberattack In History Will Happen in the Coming Months

During the pandemic there has been a growing sense as well as no shortage of data showcasing the growing by cyber attackers and other malicious folks looking to compromise corporate, personal and other data through an evolving set of digital schemes. As this article highlights, if hackers can break into the networks of America’s largest defense contractor, Lockheed Martin, by targeting remote workers there is little question that remote workers with little security are easy targets.

Practically every employee in every firm in America is working from a makeshift desk on their kitchen table. Firms only had days to cobble together remote work plans. So you can bet most didn’t set up secure systems, like the one my friend is using. In fact, the vast majority of employees probably don’t even have dedicated work laptops.

So hundreds of millions of folks are using personal laptops–on unsecured home internet connections–to access work files. Many of which likely contain confidential information and personal data.

This is a dream come true for cyber criminals. Hackers only need to gain access through one entry point to seize control of a whole network. Once they’re in they can steal data, secrets, and even lock you out of the network.

 

Source: Why The Largest Cyberattack In History Will Happen Within Six Months

Thematic Reads: May 18, 2020

Thematic Reads: May 18, 2020

Each week Team Tematica consumes a voracious amount of content as we look to stay on top of the latest data and mine it for tailwind and headwind signals for our 10 investment themes.

Aging of the Population
The global demographic shift towards a more senior population


Cleaner Living
Growing demand for items that claim to be better for you and the planet:


Cyber Security & Data Privacy

Securing individuals and organizations against cyber threats and privacy violations:


Digital Infrastructure
The Buildout and upgrading of our Networks, Data Storage Facilities, and Equipment


Disruptive Innovators
Business models designed to transform an entire industry and leap-frog over incumbents.


Digital Lifestyle
The increasingly digital landscape that now underpins the entire consumer experience.


Guilty Pleasures

The products and services people will consume no matter the economic environment.


Living the Life

Those things that bridge the gap between want and ability at every socioeconomic level.


Middle-Class Squeeze

Consumers trading down when and where possible or looking to stretch the disposable dollars they do have.


Tematica Research Indices

Researchers Prompt Google to Take Action

Researchers Prompt Google to Take Action

Malware, Ransomware, Spyware, Creepware? New York University and Cornell Tech researchers in coordination with NortonLifeLock (NLOK:NASDAQ) unveil a new frontier in cybersecurity & data privacy.

The applications were discovered with a new algorithm called CreepRank, developed by a team of academics.

Source: Google removed 813 creepware apps from the Android Play Store | ZDNet

Thematic Reads: May 11, 2020

Thematic Reads: May 11, 2020

Each week Team Tematica consumes a voracious amount of content as we look to stay on top of the latest data and mine it for tailwind and headwind signals for our 10 investment themes.

Aging of the Population
The global demographic shift towards a more senior population


Cleaner Living
Growing demand for items that claim to be better for you and the planet:


Cyber Security & Data Privacy

Securing individuals and organizations against cyber threats and privacy violations:


Digital Infrastructure
The Buildout and upgrading of our Networks, Data Storage Facilities, and Equipment


Disruptive Innovators
Business models designed to transform an entire industry and leap-frog over incumbents.


Digital Lifestyle
The increasingly digital landscape that now underpins the entire consumer experience.


Guilty Pleasures

The products and services people will consume no matter the economic environment.


Living the Life

Those things that bridge the gap between want and ability at every socioeconomic level.


Middle-Class Squeeze

Consumers trading down when and where possible or looking to stretch the disposable dollars they do have.

 


Tematica Research Indices

WHO – Hackers Attack Using Spearfishing Approach

WHO – Hackers Attack Using Spearfishing Approach

In the same way hackers look to dupe victims with targeted scenarios, it is reported that hackers used this same approach with the World Health Organization recently.

 

The messages began arriving in World Health Organization employees’ inboxes in early April, seemingly innocuous emails about the coronavirus from news organizations and researchers.

Source: Hackers Target WHO by Posing as Think Tank, Broadcaster – Bloomberg

UK Retailer Employee Data Privacy Case sets Precedent for Future Cases

UK Retailer Employee Data Privacy Case sets Precedent for Future Cases

Companies are finding out that data privacy is not just for customers and further, failures are punishable outside of data privacy regulations.

A UK High Court ruling has found supermarket giant Morrisons liable for the data leak that saw nearly 100,000 of its employees’ sensitive details posted online. Here’s what the first class action of its kind in the UK means for future breaches

Source: This Is What The Morrisons Data Leak Class Action Means For Future Breaches

Data Leaks, Not Just For Hackers These Days…

Data Leaks, Not Just For Hackers These Days…

Author Zach Edwards does a Mariana Trench worthy deep dive on how easy it is for companies to mishandle customer information. “How it’s always been done” is the current Data Privacy standard. GDPR and other regulations are starting to redefine this standard of care and is a theme with some of the strongest tailwinds out there.

Breaches have been found on websites including Wish.com, JetBlue.com, Quibi.com, WashingtonPost.com, NGPVan.com and numerous other…

Source: The 2020 URL Querystring Data Leaks — Millions of User Emails Leaking from Popular Websites to Advertising & Analytics Companies

Thematic Reads: May 4, 2020

Thematic Reads: May 4, 2020

Each week Team Tematica consumes a voracious amount of content as we look to stay on top of the latest data and mine it for tailwind and headwind signals for our 10 investment themes.

 

Aging of the Population
The global demographic shift towards a more senior population


Cleaner Living
Growing demand for items that claim to be better for you and the planet:


Cyber Security & Data Privacy

Securing individuals and organizations against cyber threats and privacy violations:


Digital Infrastructure
The Buildout and upgrading of our Networks, Data Storage Facilities, and Equipment


Disruptive Innovators
Business models designed to transform an entire industry and leap-frog over incumbents.


Digital Lifestyle
The increasingly digital landscape that now underpins the entire consumer experience.


Guilty Pleasures

The products and services people will consume no matter the economic environment.


Living the Life

Those things that bridge the gap between want and ability at every socioeconomic level.


Middle-Class Squeeze

Consumers trading down when and where possible or looking to stretch the disposable dollars they do have.


New Global Middle Class

Areas around the world where rising disposable incomes are driving demand for a host of products and services.


Safety & Security

Reflecting the evolving needs across individual, cyber, corporate and homeland security.