Tag Archive for: Ward

Computer Hacking Challenge To Educate That We Can All Ward Off And Completely Impede Cyber Data Crimes


(MENAFN– EIN Presswire)

Excelitte Logo2

Computer Hacking challenge above was put out about three months ago and after an average of 150 weekly brute-force hacking attempts, no one has succeeded.

We are now in the era of generating, capturing, and storing large volumes of sensitive data, cybersecurity at the Data layer is the only 100% guaranteed approach that will impede Cyber Data Crime.”” – Valentine WatsBRISBANE, QUEENSLAND, AUSTRALIA, October 12, 2023 /EINPresswire / — Hidden either in an Excelitte encrypted file or in the Excelitte database are some random text/numbers that will be referred to as Secret text waiting to be exposed for 10,000 US Dollars.

Anyone able to retrieve this 72-character line text and send it to us – () will automatically be paid $10,000 transferred to any designated bank account or bitcoin wallet.

A simple question that requires an answer to be provided has also been included to also prove that a person or persons has gained access to the secret text.

To win the challenge details such as the device name, file location or database type, and name from where the secret text was retrieved will need to be provided

There is a 100% conviction that it can’t be done, but in the unlikely event that anyone succeeds in exposing the text data, Excelitte will also pursue a working arrangement with such an individual provided he or she is not on any security services wanted list globally.
It has now been over three months since this challenge above was publicised and after an average of 150 weekly brute force hacking attempts, no person or entity has been able to breach our IT infrastructure.

If an IT network is breached, Excelitte serves as a last line of defence for all data and provides a 100% guarantee that your data can’t be viewed, or ‘ransomwared’ by unauthorised persons.

Excelitte also will use Predictive Analytics – Artificial Intelligence/Machine Learning precepts and probability Scoring to pre-empt, defend against all cyber-attacks and take offensive action as necessary.

Want to know more? Visit .

Follow us on LinkedIn:

Team Excelitte
Excelitte
email us here
Visit us on social media:
LinkedIn

Excelitte 3D video…

Source…

Apple plans new encryption system to ward off hackers and protect iCloud data


Apple Inc. is planning to significantly expand its data-encryption practices, a step that is likely to create tensions with law enforcement and governments around the world as the company continues to build new privacy protections for millions of iPhone users.

The expanded end-to-end encryption system, an optional feature called Advanced Data Protection, would keep most of the iCloud’s data secure, even in the event that Apple is hacked. It would also prevent Apple from being able to provide data from iCloud phone backups in response to law-enforcement requests. 

While Apple has drawn attention in the past for being unable to help agencies such as the Federal Bureau of Investigation access data on its encrypted iPhones, it has been able to provide much of the data stored in iCloud backups upon a valid legal request. Last year, it responded to thousands of such requests in the U.S., according to the company. 

People walk by an Apple store in Shanghai

People wearing face masks walk their dogs past an Apple store on a shopping street, after the lockdown placed to curb the coronavirus disease (COVID-19) outbreak was lifted in Shanghai, China June 1, 2022. REUTERS/Aly Song (REUTERS/Aly Song / Reuters Photos)

With these new security enhancements, Apple would no longer have the technical ability to comply with certain law-enforcement requests such as for iCloud backups—which could include iMessage chat logs and attachments and have been used in many investigations.

APPLE SUED BY WOMEN WHO CLAIM AIRTAG DEVICES LET STALKERS TRACK VICTIMS

The company said the security enhancements, which were announced Wednesday, are designed to protect Apple customers from the most sophisticated attackers.

Ticker Security Last Change Change %
AAPL APPLE INC. 142.65 +1.71 +1.21%

“As customers have put more and more of their personal information of their lives into their devices, these have become more and more the subject of attacks by advanced actors,” said Craig Federighi, Apple’s senior vice president of software engineering, in an interview.  Some of these actors are going to great lengths to get their hands…

Source…

Healthcare Highlights: Cyber-Security, Licensing Board Issues, and Employer COVID-19 Regulations | Ward and Smith, P.A.


Recently, several Ward and Smith attorneys held a Health Care Breakfast and Learn to provide insights on the healthcare industry relevant to their specific areas of expertise, from privacy and data security to professional licensing issues and, labor and employment.

Privacy and Data Security

Peter McClelland, a privacy, data security, and technology attorney who is also a Certified Information Privacy Professional, began the discussion with some trends and tips for healthcare providers to be aware of in regards to cybersecurity.

“Healthcare and financial services are always neck and neck each year for which industry in the United States gets targeted the most by malicious cyber actors,” said McClelland.

In the world of data security, there are three major trends that have been especially relevant to healthcare providers over the past few years:

  • Substantial increase in cyberattacks – malicious actors using trusted third parties or managed service providers to gain access to computer systems and personal information
  • Significant uptick in the sophistication of cyberattacks – phishing schemes, tiny changes in email addresses, and spoofed email accounts increasingly difficult to identify
  • Increased costs associated with successful attacks – average cost for a data breach in 2020 was around $4 million

Outside of the healthcare industry, an attack on a managed service provider, service partner, or supplier is typically referred to as a supply chain attack. These supply chain attacks are the ones that have made headlines in recent years, with companies such as Colonial Pipeline, Microsoft, and Cassia experiencing significant costs to their finances and brand reputation.

“When you read or hear about any of these things in the news, it can be easy to think that events are only tangentially relevant to you,” explains McClelland, “but the same techniques in all of those get repurposed against entities in the healthcare space every day, whether they make headlines or not.”

McClelland reported that phishing scams in prior years almost seemed to be deliberately obvious in terms of sophistication. Formerly, the most advanced phishing and ransomware technology was mostly just available to…

Source…

Purdue researchers create ‘self-aware’ algorithm to ward off hacking attempts


WEST LAFAYETTE, Ind. — It sounds like a scene from a spy thriller. An attacker gets through the IT defenses of a nuclear power plant and feeds it fake, realistic data, tricking its computer systems and personnel into thinking operations are normal. The attacker then disrupts the function of key plant machinery, causing it to misperform or break down. By the time system operators realize they’ve been duped, it’s too late, with catastrophic results.

The scenario isn’t fictional; it happened in 2010, when the Stuxnet virus was used to damage nuclear centrifuges in Iran. And as ransomware and other cyberattacks around the world increase, system operators worry more about these sophisticated “false data injection” strikes. In the wrong hands, the computer models and data analytics – based on artificial intelligence – that ensure smooth operation of today’s electric grids, manufacturing facilities, and power plants could be turned against themselves.

abdel-kahlik-groupPurdue researchers have developed a novel self-cognizant and healing technology for industrial control systems against both internal and external threats. The project is led by Hany Abdel-Khalik (center) with Yeni Li, a nuclear engineering postdoctoral associate (right) leading the anomaly detection work and third-year nuclear engineering Ph.D. student, Arvind Sundaram, the covert cognizance algorithms implementation. (Purdue University photo/Vincent Walter)
Download image

Purdue University’s Hany Abdel-Khalik has come up with a powerful response: to make the computer models that run these cyberphysical systems both self-aware and self-healing. Using the background noise within these systems’ data streams, Abdel-Khalik and his students embed invisible, ever-changing, one-time-use signals that turn passive components into active watchers. Even if an attacker is armed with a perfect duplicate of a system’s model, any attempt to introduce falsified data will be immediately detected and rejected by the system itself, requiring no human response.

“We call it covert cognizance,” said Abdel-Khalik, an associate professor…

Source…