Posts

Ransomware threat will be controlled by the new task force formed with the help of Microsoft and Citrix / Digital Information World


Viruses and hacking have many different types, one of which is ransomware. A ransomware virus attack is a badly known attack where your data files are encrypted by the hackers, in return they ask for the payment as a ransom. If you pay the money only then they decrypt your data files.

It is malware, with the help of which a hacker can have complete control over your data. Hacker can lock your data and blackmail you that he will leak your data or may delete it if you are not able to make the payment as ransom. Hackers usually send a spam link in an email in most cases. However, this is not it, you can get this spam link through a third-party website or an unknown link. This ransomware has attacked the files of many organizations and companies. This virus has plagued computer networks for more than 15 years. As a result, a task force has been formed with the help of Microsoft and Citrix to stop this attack.

The Institute for Security and Technology has created this task force to deal with this curse. The members of this task force are legal experts, cybersecurity firms, tech industry players, and policymakers. In short, this force is created with the inclusion of all experts to deal with this attack in all manners.

The founding members of this task force are completely aware that this attack could be much harmful to any entity. Because data is everything for an organization or a company. If a company is attacked by this attack, this company will be grabbed in the hands of the hackers. Ultimately, will be ready to pay a ransom.

The task force member will observe the ransomware kill chain and how the hackers give the command and regulate servers. They will also recommend taking necessary actions publicly or privately that will reduce this attack to a great level. For instance, if the anti-malware apps running on the computers of the users, this task force will recommend getting out of this app as soon as possible. in short, this task force will try its best to deal with this threat and will leave no stone unturned.

The task force will most probably start its work in the March or April. However, the good news is the website will go live in January. Everybody knows that today this…

Source…

Google Play Store’s Security System Continues to Fare Poorly at Identifying Android Malware / Digital Information World


AV-TEST has recently conducted a detailed analysis of antivirus software available for the Android, coming to the conclusion that Google Play Protect might serve as the worst of the lot. This, compounded upon by other malware breaches across Google products, might spell issues for the company.

AV-TEST, an independent antivirus evaluation agency, has made its living out of researching the effectivity certain products have against malware. Based in Magdeburg, Germany, the organisation particularly deals with software catering to Windows and Android. Software that meets a certain standard established by AV-TEST is also granted certification by them, which carries a significant amount of weight.

Their most recent list, amassing data from November, graded software on the basis of 3 categories: protection, performance, and usability. These 3 give a comprehensive report as to the level of security your device is offered, how smooth the antivirus runs, and how accessible it is to the general public. Each category was further scored out of 6. Google Play Protect, while given a supring zero in usability and a 6 in performance, was, sadly, granted zero in protection. Which might raise an eyebrow or two, especially considering past events with Google products. It also shows, relying solely on Google’s protection systems can be a risky decision for security-savvy Android users.

Avast reported, rather recently, that over 3 million users across Google Chrome and Microsoft Edge may have been exposed to malware via add-ons, extensions, and plugins that the browsers were unable to filter through. While this itself is no reason to hold Google accountable as even Avast antivirus itself was unable to nail down the threat in time, the Play Store tells a different story.

Malware often makes it onto the Store, particularly marketed towards demographics that would typically not know any better than to download it. Kaspersky Labs, an cybersecurity firm, recently highlighted 20 different malware containing apps disguised as Minecraft mods targeted towards young children unaware of the dangers such sources pose. Recently, a fake Cyberpunk 2077 mobile app was also spotted, which would hold user data at random…

Source…

What is your default digital payment option?


“Considering that most of the transactions are below 1,000, the new limit is generous. It ensures that customers have a frictionless payment experience where they don’t have to enter passwords and PINs (personal identification numbers),” said Nitya Sharma, co-founder and chief executive officer, Simpl, a platform focussed on pay later service.

Also Read | Inside the rumble in India’s coding jungle

RBI has a monetary limit for contactless payment as it does not require the cardholder to punch in any password or PIN. The regulator has made it mandatory for all transactions above 2,000 ( 5,000 from 1 January) to be authenticated twice. When an individual is using a card for any transaction above 2,000, besides keying the card details, the issuer authenticates the transaction through another means such as by sending an OTP (one-time password). The extra security layer is used to curb frauds and make electronic transactions more secure.

Besides cards, there are already different options for contactless payment. Some of these include the UPI (Unified Payment Interface), payment wallets and IMPS (Immediate Payment Service) through mobile banking apps. Each of these modes of payment has its merits and demerits. Let’s look at which one works best for contactless transfer of money.

CARDS

At the beginning of the year, RBI had issued a notification in which it had outlined steps that every issuer must take to make all types cards more secure. According to the notification, when banks are either issuing or re-issuing cards, by default, the customer should only be able to use them at domestic ATMs and contact-based payment at point of sale (PoS) terminals.

For all other transactions—such as for online transaction in India or abroad or for contactless payment—customers must call up the issuer and ask them to enable the card for specific use.

For existing cards, RBI asked issuers to use their discretion. But cards that were never used for online, international, or contactless transactions, had to be mandatorily disabled for such transactions. Banks had to implement this from 1 October.

If an individual wants to use his card for contactless…

Source…

It’s time to secure our digital sidewalks


Prior to COVID-19, the U.S. Federal Communications Commission (FCC) estimated at least 30 million Americans were on the wrong side of  the digital divide, and nearly 12 million children are part of “the homework gap” because they do not have access to broadband internet at home. Local and state governments across America have moved to fight the digital divide thanks to the leadership of elected and administrative officials, the frontline efforts of not-for-profits, and the support from corporate and private philanthropists. As we collectively move forward to bring millions of Americans online (sometimes for the very first time), we are also exposing our communities to new risks in this “new normal,” virtual world.

Cybersecurity experts have projected that cybercrime will cost the global economy as much as $6 trillion across today’s 4.57 billion internet users. For 2020, cyber incidents continue to haunt our headlines. During just the last few months in the U.S., we have seen unprecedented cyber incidents — from United Health System’s incident that affected 250 facilities to two Westchester school districts reporting data breaches to racist Zoombombing of Connecticut’s Congresswoman Jahana Hayes.

All of this in the midst of unprecedented change everywhere we look.

In response to COVID-19, most Americans rushed into the new era of a remote and digital world. We left behind our concrete sidewalks and flooded our digital sidewalks. If you imagine a typical city’s physical sidewalks, they are usually secured by local businesses, pedestrians, nosy residents, vehicles, and law enforcement. In the real world, would you worry if your elderly parent went out for a stroll at 1 a.m.? If you are a parent, how comfortable are you allowing your underage children to play on the sidewalks unsupervised — during the day or night?

But now, on these crowded digital sidewalks, Americans are conducting unprecedented commerce, education and learning, entertainment and media, civic engagement and political action, communication with family and friends, financial transactions, access to government services, and, of course, remote work for those fortunate enough to telecommute during…

Source…