Tag Archive for: Warrior

Cyber security warrior!



Jacob Lunda will protect you from hackers.  Photo by Noko Mashilo.



JACOB Lunda (26), the owner of G-IIT World, is here to protect you from black hat hackers.

The cyber security specialist from Kensington in Joburg protects people against the global threat on computer networks or the internet, like when an evil person tries to use malware and penetration testing viruses to hack one’s system.

Jacob’s desire to go into cyber security was inspired by the movie, Mr Robot.

“The character Elliot, a cyber security expert, protects the company during the day and hacks it at night.

“There are many characters like Elliot out there.”

This inspired Jacob to become a Cisco Certified Network Associate, who deals with routing and switching, network associate security, and network associate cyber security. He’s now a certified ethical hacker who protects people and organisations.

After studying, he worked for Asetos Computers as a computer technician.

“This was followed by Nuztech, where I was providing IT support for my current employer, Show Me Your Number, where I am a network specialist. I make sure our network is secured, there is stable connectivity and I maintain the server.”

Jacob is also the technical producer for their online radio, where he takes care of eight shows and makes sure every presenter goes out to the listeners loud and clear.

“Covid-19 has introduced a new way of working where people can work from home.

“Most are using Windows on computers that can be easily be attacked by hackers.”

He said hackers send infected emails to compromise their systems.

“This is when the cyber security specialist comes in to educate and protect people against cyber tricks.”

Jacob stressed that computer users should not trust any link they see, even if related to what they’re doing.

“Hackers can use your organisation’s information to win your trust. They are good at cloning information. They will manipulate you until you reveal your confidential information.”

Source…

How Russia’s ‘Info Warrior’ Hackers Let Kremlin Play Geopolitics on the Cheap


The sprawling SolarWinds hack by suspected Russian state-backed hackers is the latest sign of Moscow’s growing resolve and improving technical ability to cause disruption and conduct espionage at a global scale in cyberspace.

The hack, which compromised parts of the U.S. government as well as tech companies, a hospital and a university, adds to a string of increasingly sophisticated and ever more brazen online intrusions, demonstrating how cyber operations have become a key plank in Russia’s confrontation with the West, analysts and officials say.

Moscow’s relations with the West continue to sour, and the Kremlin sees the cyber operations as a cheap and effective way to achieve its geopolitical goals, analysts say. Russia, they say, is therefore unlikely to back off from such tactics, even while facing U.S. sanctions or countermeasures.

“For a country that already perceives itself as being in conflict with the West practically in every domain except open military clashes, there is no incentive to leave any field that can offer an advantage,” said

Keir Giles,

senior consulting fellow at Chatham House think tank.

The scope of Russia’s cyber operations has grown in tandem with Moscow’s global ambitions: from cyberattacks on neighboring Estonia in 2007 to election interference in the U.S. and France a decade later, to SolarWinds, seen as one of the worst known hacks of federal computer systems.

“We can definitely see that Russia is stepping on the gas on cyber operations,” said

Sven Herpig,

a former German government cybersecurity official and expert at German independent public-policy think tank Stiftung Neue Verantwortung. “The development of new tools, the division of labor, the creation of attack platforms, has all increased in sophistication over the years,” he said.

Jamil Jaffer,

a former White House and Justice Department official, said that cyber operations have become “a significant part of [Russia’s] play.”

“It’s allowed them to level up,” said Mr. Jaffer, senior vice…

Source…

Practical mobile device security for the road warrior – Networks Asia

Practical mobile device security for the road warrior
Networks Asia
Employees who use their smartphones and other mobile devices while traveling face greater risk that their devices will be compromised, posing a threat to corporate systems. Travelers can minimize the risk by taking a few simple and inexpensive precautions.

mobile security – read more