Tag Archive for: Preparation

Qatar bolsters cyber security in preparation for World Cup


Qatar hosts the FIFA World Cup this year – the first time the event has been staged in the Arab world. Cyber security experts in the country predict that ticketing, hotel bookings and restaurant reservations will be faked by hackers to capture personal data from people travelling to Qatar. Also, phishing and social engineering will be used to steal personal and financial information from anyone using the internet to get information about the tournament. 

“If there is anything we have learned about cyber crime from past encounters, it would be that it thrives around major global events,” said Mohammad Al-Kayed, director of cyber defence at Black Mountain Cybersecurity. “Both viewers and attendees are advised to keep their guard up for cyber threats in the form of online scams and malicious emails promoting the sales of tickets and sporting goods. The biggest threat of all is piracy of ongoing football matches through online platforms.” 

On 25 March, Interpol gathered a group of global cyber security experts together in Qatar to analyse threats ahead of the World Cup. The meeting was part of Project Stadia, which was established by Interpol in 2012 and funded by Qatar. Although special emphasis is placed on the 2022 World Cup, the project aims to contribute to security arrangements for any major sports event. 

Qatar has partnered with several countries to provide physical security for the World Cup, including Turkey, France and the UK. Turkey will send 3,000 riot police, France will send four airborne warning and control systems to track airborne threats, including drones, and the UK will providing maritime security support and counter-terror policing.  

But surprisingly, the biggest announcement so far about helping Qatar with cyber security comes from Morocco, which will send a team of cyber security experts to Qatar as part of the two countries’ efforts to expand cooperation in security. Could it be that Qatar thinks it has enough home-grown expertise in cyber security not to call on help from more powerful countries? 

Al-Kayed told Computer Weekly: “The Supreme Committee for Delivery and Legacy has already issued a cyber security framework ahead of the…

Source…

Despite years of preparation, Ukraine’s electric grid still an easy target for Russian hackers


“If Russia wants to take down the Ukrainian electric system, I have full confidence that they can, and the Ukrainian playbook in many ways is in a place where prevention’s not going to happen,” Robert M. Lee, CEO and co-founder of cybersecurity group Dragos, said in an interview. He argued corruption and economic barriers in Ukraine have gotten in the way of hardening the electric grid. The Ukrainian Embassy in Washington, D.C., did not respond to a request for comment.

President Joe Biden said Friday that the U.S. has every indication that Russian leader Vladimir Putin has decided to invade “in the coming days.” His warning came after a senior U.S. official estimated that Russia had lined up 169,000 to 190,000 fighters for the invasion, in “the most significant military mobilization in Europe since the Second World War.”

Alongside a physical invasion, Putin could marshal the full array of cyber and disinformation tools that it has inflicted on targets around the world during the past decade, including the U.S. And the electric grid is a ripe target.

Ukraine has repeatedly served as a laboratory for these kinds of attacks since Russia’s invasion and seizure of its Crimea region in 2014.

The first example came almost seven years ago, when three Ukrainian power stations went dark for six hours in the middle of winter, blacking out Kyiv and a large swathe of Western Ukraine. The hackers — identified by U.S. officials as Russian — tunneled inside the plants’ controls and opened breakers to prevent power flow. On top of that, they locked out power station employees from their accounts so they couldn’t respond to the attack, and overwhelmed the power stations’ call centers with a barrage of malicious online traffic — making it difficult for customers to report outages.

One year later, in 2016, Russian hackers went one step further and tried to disable the transmission equipment by overloading controls with internet activity, which would have made it unsafe for workers to manually restore power, according to a report from Dragos. The attack left portions of Kyiv in the dark for more than an hour — and even though the attackers failed to fully incapacitate…

Source…

Data Breach Preparation and Response: Breaches are Certain, Impact is Not – TechTarget


TechTarget

Data Breach Preparation and Response: Breaches are Certain, Impact is Not
TechTarget
The following is an excerpt from Data Breach Preparation and Response: Breaches are Certain, Impact is Not by author Kevvie Fowler and published by Syngress. This section from chapter five explores the methods of containment after a data breach.

“data breach” – Google News