Technology

How to Win the Ever-Changing Threats of the Cyberwar

Image by Clker-Free-Vector-Images from Pixabay  Based on the volume, frequency, and dastardness of attacks launched by cybercriminals, it is no longer a hidden fact that the world is in for a cyberwar. The magnitude of the war has made it absolutely imperative that we must embark on building nation-level defenses to fight cyberwar.  It may have been a bit late already but it can never be an overstatement to say that nation-states should put their acts together, fashion out well-articulated cyber defense measures to be able to protect themselves from the most advanced threats ever seen. Looking at the strategies cybercriminals have employed in launching attacks we have experienced so far, we may be at the early stages yet.  It is a cyberwar  Cyber threats and cyberattacks did not just start to manifest yesterday, however, the worldwide gruesome WannaCry and NotPeyta ransomware attacks of 2017, brought cyberattacks to a new level altogether. As if that were not a notification that we the world is grappling with something very mammoth, the expanding levels of malware-related data breaches in 2018, are sheer warnings and realities of the increasingly critical, vulnerable, and fast-developing world of cybercrime we all live and conduct business activities in.  Governments, individuals,…

Continue Reading

Technology

Cybersecurity Measures That Could Have Stopped The Exposure of Four Billion Users’ Records

Image by Katie White from Pixabay In the face of the multiple waves of cyberattacks that governments, corporations, and individuals suffer almost on a daily basis, it’s very annoying to note that any form of information can still be left unguarded and unsecured despite all the cybersecurity measures that are readily available. That is why the news that personal data relating to 1.2 billion people, including email addresses, phone numbers, and LinkedIn and Facebook profile information, has been leaked online via an open and unsecured Elasticsearch server came as a shock. The said data was uncovered on 16 October 2019 by researchers Bob Diachenko and Vinny Troia of threat intelligence platform Data Viper. Diachenko and Troia were able to access and download the data via a web browser without having to use an ordinary password or any other form of authentication. According to the researchers, the first dataset was discovered to contain, among other things, data on 1.5 billion unique individuals, a billion personal email addresses including work emails for millions of decision-makers in Canada, the UK, and the US, 420 million LinkedIn URLs, a billion Facebook URLs and IDs, over 400 million phone numbers and 200 million valid US mobile phone numbers.…

Continue Reading

Business

The Possible Fallouts From The U.S. And China’s Trade War

Just last June, there was a ray of hope at the G-20 meeting in Osaka, Japan with the announcement by the leaders of China and the United States that their trade war was thawing out. According to the U.S. President Donald Trump, the two countries had set negotiations “back on track.”  This led to the U.S jettisoning any idea of new tariffs on Chinese goods and also suspending the embargo placed on U.S. companies from trading with Huawei, the Chinese IT giant that the U.S has blacklisted. Nations across the globe heaved a sigh of relief, markets picked up, and the media was abuzz with “cease-fire” reports. But alas, it turned out to be a “false flag,” just like many diplomatic on and off between Beijing and Washington. The outcome of the “jigsaw puzzle” was to have the Trump administration increased tariffs on another $125 billion worth of Chinese imports in September.  It’s a war and there is no going back, China retaliated by announcing further tariffs on $75 billion worth of U.S. goods. Nobody knows how the U.S. will respond to this but there are feelers that further tariffs will be issued in December, in an attempt to possibly…

Continue Reading

Technology

Backdoor Encryption, An assault on Privacy

Facebook has certainly had its fair share of problems over the years, right from the Cambridge Analytica scandals to a host of other privacy issue related problems, which led to a lot of people deleting their accounts from the platform. Now that they have come up with a beautiful one, the end-to-end encryption that everybody should applaud, it’s a huge surprise that there is a concerted effort to stab privacy in the back through backdoor encryption. Salvos have been coming from all corners at end-to-end encryption. The surprising aspect of the whole thing is that these reactions are coming from largely unexpected quarters, that is those you thought would be very happy to fight cybercrime to a standstill.  The U.S. Attorney General William Barr in a reaction to the technology world says, “If the cops and Feds can’t read people’s encrypted messages, you will install backdoors for us, regardless of the security hit.” FBI head honcho Christopher Wray is not left out in the call for a backdoor, saying that the cops and Feds should be able to spy on end-to-end encrypted chats and the like. Also noteworthy is the fact that UK home secretary Priti Patel, US attorney general…

Continue Reading

Business, Technology

Why You Must go For Cyber Insurance Now

Cyber insurance may sound alien or strange, you won’t be the only one having such a view. You may even frown at anybody who suggests that you go for cyber insurance and you will be right. Insurance policies are, however, not strange to businesses but going for cyber insurance sounds as if we are taking the game too far. But then, you have never thought even in your wildest dreams that you will get to a situation where the fear of cyber threats is the beginning of business wisdom. Even where you want to believe there is no need for cyber insurance, the evidence on the ground completely contradicts any such notion you may be having. Cyber attacks are not in any way relenting and cybercriminals are becoming more sophisticated and tech-savvier  Jeremiah Grossman, founder of WhiteHat Security and organizer of the cyber insurance micro summit Black Hat 2019, said he believes cyber insurance will have “a profound impact on every single one of us, in every single thing that we do in this industry.” This is definitely the reason why the cyber insurance market has experienced a boom in recent years. The bitter truth is that despite the boom…

Continue Reading

Technology

Cyber Immunity Maybe The Antidote to Your Cyber Threats

It’s very obvious that the traditional firewall and intrusion detection systems often struggle to detect and repel so far unknown attacks but they may have not been working perfectly. This then calls for another dimension and cyber immunity could definitely be what you earnestly need. The fact today is that cybercrimes don’t recognize borders and the criminals are becoming more proficient in their dastardly attacks. They are appearing every day, in all their different guises and through many different attack vectors.  There is also and unfortunately so, no single known solution that offers comprehensive protection.  As the case might be even in our big data world, however, knowing where to pinpoint the source of the danger will go a long way to being able to combat the latest threats.  For your business to thrive, it’s your overriding duty to protect your organization against today’s threats. You must endeavor to anticipate and be proactive about the dangers that lie ahead in the coming years.  You can’t achieve this feat by employing just the normal smart operational protection against known threats. It definitely demands more than that, you need to put in place a high level of strategic security intelligence. Cyber immunity…

Continue Reading