Tag Archive for: cyber

With cyber crime on the rise, we speak to experts to share tips on dealing with fraudulent activities


Digital advancement has given fraudsters new ammunition to target the vulnerable. In the WhatsApp fraud, the target receives a message saying the sender has found his number on contact. Scamsters gain information slowly for misuse. The Facebook fraud has a link from a friend – Is this you in the video? The account gets hacked after clicking on the link. It’s time to know ways to deal with them.

Online frauds 

Shedding light on the situation, Niranjan Upadhye, General Manager, Fraud Risk Management Division, Worldline India, says, “Most frauds are Social Engineering frauds. After gaining your trust, fear or greed, fraudsters typically coax you for a ‘call to action’, something they’d like you to do. Once they manage to get you to do the same, they would exploit your weakness further by cajoling or coercing you.” Thus, despite a generally sorted infrastructural security, India faces peril in IT-related frauds thanks to user conduct.

There are talks about the hijacking, which has the attacker taking over communication between two entities. The attacker then mimics one of the entities. It is all done to gather information or become one of the users to conduct things that he or she normally does online. This is what Shibu Paul, Vice President, International Sales at Array Networks, has observed.

“Thieves use email to try to trick you into visiting a false website where you get told to reveal confidential information,” he reveals about Phishing. “There’s ‘Vishing’. Scammers utilise a phone number in phishing emails. A person or an automated response system will ask for your personal or account details if you call. One most prevalent attack is infecting a user’s computer with malicious software, or ‘Malware’. ‘Botnet’ refers to a network of robot computers. The use of malware disseminated via Botnet allows criminals to acquire sensitive data and possibly commit fraud.”

Many might have seen newer frauds on the horizon hitting millennials and Gen Z. Like dating site frauds, fun games around celebrity crushes, credit card renewal fee waivers, credit card blocked, Buy Now Pay Later (BNPL), Cryptocurrency, AnyDesk fraud, Covid related and fuel card frauds and…

Source…

Pakistan Needs A Cyber Army To Counter Emerging Risks


Cyberspace is an exceptional, human-made domain that was created for the facilitation of communication and can be characterised as a worldwide interconnected infrastructure. It has enabled free interchange of data via a networked system for more than half of the world’s population. Emerging threats in cyberspace currently pose new hazards and challenges to societies around the world. These threats have the potential to undermine the safety of citizens and disrupt political, social and economic life.

To intellectualise cyberspace security, we need to understand the difference between two risk magnitudes: risk to cyberspace and risk through cyberspace. The risk of cyberspace can be considered as a threat to the physical infrastructure of communication technologies. The threat through cyberspace, on the other hand, is a danger posed by cyberspace itself and is enabled by the usage of its technologies.

The risk to cyberspace

Even though the internet was developed to become a mainly strong network, its growth and change of status from a small web of interconnected devices to the global hub of social and economic life introduced a wide range of security vulnerabilities to its physical structure. After being targeted many times with a malicious intent to bring disruption, many states have acknowledged cyberspace as a ‘key national asset’ and have planned to establish special organizations that will protect critical infrastructure, thereby reducing risks to the normal functioning of the network.

It is important to remember that cyberspace is a prerequisite for the existence of universal capitalism in its current form. Therefore, emerging risks to cyberspace threaten to undermine international capital marketplaces and disturb prevailing economic order. Consequently, the security needs of cyberspace infrastructure and flow of information coincide with some of the national security essentials and have to be sheltered by government actors. To this end, the Communications Security Establishment Canada (CSEC) and the National Security Agency (NSA) have established national encryption standards and protection protocols.

Furthermore, the task of safeguarding critical…

Source…

China Dismisses Concerns About Olympic Participants’ Cyber Security


A visitor in Beijing takes pictures of logos for the 2022 Winter Olympic Games. (Photo by Wang Zhao/AFP via Getty Images)(Photo by Wang Zhao/AFP via Getty Images)

A visitor in Beijing takes pictures of logos for the 2022 Winter Olympic Games. (Photo by Wang Zhao/AFP via Getty Images)(Photo by Wang Zhao/AFP via Getty Images)

(CNSNews.com) – The Chinese government has slapped down criticism after several countries’ national Olympic committees advised their athletes not to take personal mobile devices to Beijing for the upcoming Winter Games due to hacking and surveillance risks.

Organizers of the controversial games defended the security of a mobile app which all participants and attendees are required to download and use. Expert researchers in Canada have raised concerns about “a simple but devastating flaw” in the Chinese-designed app, which will hold users’ demographic information, health and travel history, and other personal data.

Athletes from the United States, Canada, Germany, the Netherlands, Belgium, and Australia, among others, are being counseled not to use personal phones or laptops in Beijing during the games.

The Wall Street Journal recently reported that the U.S. Olympic and Paralympic Committee advised athletes in recent months that “every device, communication, transaction and online activity may be monitored” while they are in China.

“Your device(s) may also be compromised with malicious software, which could negatively impact future use.”

The report said members of Team USA should consider taking cheap, disposable phones along instead.

With reports of similar advice from other countries’ national committees, Chinese foreign ministry spokesman Zhao Lijian was invited to comment.

“By raising the so-called cybersecurity issue in China, relevant countries, who are guilty of the charge themselves, are accusing the innocent party without any evidence,” he said, alluding to Beijing’s often-stated charge that it is the victim, not the perpetrator, of cyberattacks.

The Chinese Communist Party oversees one of the world’s most intrusive systems of Internet control and censorship, sometimes dubbed the “Great Firewall.”

As the coronavirus pandemic continues, the protocols for the tightly-managed Winter Olympics include a requirement that all participants download and use the “MY2022”…

Source…

A Beginner’s Guide to Cyber War, Cyber Terrorism and Cyber Espionage


Photo by Rafael Rex Felisilda on Unsplash

Tune in to just about any cable talk show or Sunday morning news program and you are likely to hear the terms “cyber war,” “cyber terrorism,” and “cyber espionage” bandied about in tones of grave solemnity, depicting some obscure but imminent danger that threatens our nation, our corporate enterprises, or even our own personal liberties. Stroll through the halls of a vendor expo at a security conference, and you will hear the same terms in the same tones, only here they are used to frighten you into believing your information is unsafe without the numerous products or services available for purchase.

The industry lacks a rubric of clear and standardized definitions of what constitutes cyber war, cyber terrorism, cyber espionage and cyber vandalism. Because of this, it’s becoming increasingly difficult for those of us in the profession to cut through the noise and truly understand risk. For example, on one hand, we have politicians and pundits declaring that the US is at cyber war with North Korea, and on the other hand President Obama declared the unprecedented Sony hack was vandalism. Who’s right?

The issue is exacerbated by the fact that such terms are often used interchangeably and without much regard to their real-world equivalents.

The objective of this article is to find and provide a common language to help security managers wade through the politicking and marketing hype and get to what really matters.

The state of the world always has been and always will be one of constant conflict, and technological progress has extended this contention from the physical realm into the network of interconnected telecommunications equipment known as cyberspace. If one thinks of private-sector firms, government institutions, the military, criminals, terrorists, vandals, and spies as actors, cyberspace is their theater of operations. Each of these actors may have varying goals, but they are all interwoven, operating within the same medium. What separates these actors and accounts for the different definitions in the “cyber” terms are their ideologies, objectives, and methods.

The best way to forge an understanding of the…

Source…