Business

The Possible Fallouts From The U.S. And China’s Trade War

Just last June, there was a ray of hope at the G-20 meeting in Osaka, Japan with the announcement by the leaders of China and the United States that their trade war was thawing out. According to the U.S. President Donald Trump, the two countries had set negotiations “back on track.”  This led to the U.S jettisoning any idea of new tariffs on Chinese goods and also suspending the embargo placed on U.S. companies from trading with Huawei, the Chinese IT giant that the U.S has blacklisted. Nations across the globe heaved a sigh of relief, markets picked up, and the media was abuzz with “cease-fire” reports. But alas, it turned out to be a “false flag,” just like many diplomatic on and off between Beijing and Washington. The outcome of the “jigsaw puzzle” was to have the Trump administration increased tariffs on another $125 billion worth of Chinese imports in September.  It’s a war and there is no going back, China retaliated by announcing further tariffs on $75 billion worth of U.S. goods. Nobody knows how the U.S. will respond to this but there are feelers that further tariffs will be issued in December, in an attempt to possibly…

Continue Reading

Technology

Backdoor Encryption, An assault on Privacy

Facebook has certainly had its fair share of problems over the years, right from the Cambridge Analytica scandals to a host of other privacy issue related problems, which led to a lot of people deleting their accounts from the platform. Now that they have come up with a beautiful one, the end-to-end encryption that everybody should applaud, it’s a huge surprise that there is a concerted effort to stab privacy in the back through backdoor encryption. Salvos have been coming from all corners at end-to-end encryption. The surprising aspect of the whole thing is that these reactions are coming from largely unexpected quarters, that is those you thought would be very happy to fight cybercrime to a standstill.  The U.S. Attorney General William Barr in a reaction to the technology world says, “If the cops and Feds can’t read people’s encrypted messages, you will install backdoors for us, regardless of the security hit.” FBI head honcho Christopher Wray is not left out in the call for a backdoor, saying that the cops and Feds should be able to spy on end-to-end encrypted chats and the like. Also noteworthy is the fact that UK home secretary Priti Patel, US attorney general…

Continue Reading

Business, Technology

Why You Must go For Cyber Insurance Now

Cyber insurance may sound alien or strange, you won’t be the only one having such a view. You may even frown at anybody who suggests that you go for cyber insurance and you will be right. Insurance policies are, however, not strange to businesses but going for cyber insurance sounds as if we are taking the game too far. But then, you have never thought even in your wildest dreams that you will get to a situation where the fear of cyber threats is the beginning of business wisdom. Even where you want to believe there is no need for cyber insurance, the evidence on the ground completely contradicts any such notion you may be having. Cyber attacks are not in any way relenting and cybercriminals are becoming more sophisticated and tech-savvier  Jeremiah Grossman, founder of WhiteHat Security and organizer of the cyber insurance micro summit Black Hat 2019, said he believes cyber insurance will have “a profound impact on every single one of us, in every single thing that we do in this industry.” This is definitely the reason why the cyber insurance market has experienced a boom in recent years. The bitter truth is that despite the boom…

Continue Reading

Technology

Cyber Immunity Maybe The Antidote to Your Cyber Threats

It’s very obvious that the traditional firewall and intrusion detection systems often struggle to detect and repel so far unknown attacks but they may have not been working perfectly. This then calls for another dimension and cyber immunity could definitely be what you earnestly need. The fact today is that cybercrimes don’t recognize borders and the criminals are becoming more proficient in their dastardly attacks. They are appearing every day, in all their different guises and through many different attack vectors.  There is also and unfortunately so, no single known solution that offers comprehensive protection.  As the case might be even in our big data world, however, knowing where to pinpoint the source of the danger will go a long way to being able to combat the latest threats.  For your business to thrive, it’s your overriding duty to protect your organization against today’s threats. You must endeavor to anticipate and be proactive about the dangers that lie ahead in the coming years.  You can’t achieve this feat by employing just the normal smart operational protection against known threats. It definitely demands more than that, you need to put in place a high level of strategic security intelligence. Cyber immunity…

Continue Reading

Technology

How Data Architects Can Improve Your Business’ Cybersecurity

Brands engage the services of information security professionals to ensure the security of both their information and system. However, doing this without the input of data architects may turn out to be an exercise in futility. It has always been the focus of governments, businesses, and individuals to protect their information even before the coming of the age of computers. Highly sensitive information was marked as  “TOP SECRET,” “SECRET,” and “CONFIDENTIAL,” while some organizations go to the length of adding a stamped seal on paper.  All these were measures used to indicate and also maintain the confidentiality, integrity, and availability (CIA) of the information for the intended recipient. Technological advancements have caused us to jettison some of these practices but that does not in any way mean that the security of information is no longer of immense importance. In this era of big data where corporations scramble for information and cybercriminals are upping their tech-savviness all in an effort to lay their hands on your data for obvious reasons, contemplating such an idea would even have been suicidal. The quantity of data and information you handle on a day-to-day basis has tremendously increased also and apart from information security professionals,…

Continue Reading

Technology

How to Stay Safe From Threat Onslaughts on the Android

The Statista estimates that the number of smartphone users in the world in 2019, is 3.3 billion and should reach a projected 3.8 billion in 2021. Gartner research for the second quarter of 2016, however, shows that Android holds 86.2 percent of the market, up from 82.2 percent in the year-ago quarter. The upsurge in the penetration of Android and other smartphones come with a price. Researchers at Check Point examined cyberattacks in the first half of 2019 and found that those targeting smartphones and other mobile devices have risen by 50% compared with last year. You don’t need a rocket scientist to decipher that the main reason for this increase in cyberattacks is due to increased use of mobile banking applications. Cybercriminals have a nose for the money and are increasingly distributing malware designed to steal payment data, login credentials, and ultimately funds from victims’ bank accounts.  The surge in mobile banking malware is attributed, in part, to the availability of malware-building kits for sale in underground forums. Top mobile malware detected so far this year include Android backdoor Triada (30%), Android hacking tool Lotoor (11%), and Android repackaging tool Hidad (7%). As an Android user, you should do…

Continue Reading