References
- [1] ENISA - Threat Landscape Report 2017, 15 Top Cyber-Threats and Trends, 2018.
- [2] https://www.aig.com/knowledge-and-insights/k-and-i-article-state-of-cybersecurity-ukmiddle-east-africa#
- [3] https://hotforsecurity.bitdefender.com/blog/bitcoin-hijack-steals-from-bothransomware-authors-and-their-victims19525.html?utm_source=SMGlobal&utm_medium=Facebook&utm_campaign=H4S
- [4] https://www.itproportal.com/features/cyber-security-deployment-guide-to-effectivelysafeguard-systems-data/
- [5] https://www.rt.com/business/418790-doom-roubini-crypto-crazies-terrorists/<
- [6] https://securityboulevard.com/2018/01/an-infrastructure-plan-in-the-21st-century-needsto-address-cybersecurity/
- [7] http://securityaffairs.co/wordpress/69100/hacking/bitmessage-zero-day.html;
- [8] https://www.symantec.com/content/dam/symantec/docs/security-center/whitepapers/istr-ransomware-2017-en.pdf
- [9] https://www.symantec.com/blogs/feature-stories/2018-cyber-security-predictions
- [10] https://www.theregister.co.uk/2017/04/25/british_malware_author_2_years_jail_titanium_stresser/ .
