Tag Archive for: world

Cyber, Kinetic Implications for the World


Cyberwarfare / Nation-State Attacks
,
Fraud Management & Cybercrime
,
Video

Zscaler CISO Sam Curry on Impact on People, Geo-Political Tensions, Cyber Community

Sam Curry, vice president and CISO, Zscaler

The eruption of war in Israel has sent shockwaves throughout the world. Zscaler Vice President and CISO Sam Curry, who has deep connections in Israel, pointed out that the global economy is vulnerable to this regional conflict, and the war can quickly escalate to the world stage – both through kinetic and cyberwarfare.

See Also: Challenges and Solutions in MSSP-Driven Governance, Risk, and Compliance for Growing Organizations

“There are many single points of failure … so things that happen in Israel affect things in China and affect the United States or Brazil,” he said. “It’s worth talking to your board about real risks. And I don’t mean just blowing it off and reading it, I mean spending some time and workshopping it.”

Curry urged cybersecurity organizations to prioritize human life and employee well-being above all, and then focus issues such as productivity, supply chain resilience and risk management in the face of a potential global crisis.

Curry said that as governments around the world respond to the conflict, he hopes they don’t lose site of their core values of freedom. Democracy, while complicated, offers more freedom and potential for citizens than authoritarian regimes, so it’s worth defending, he said. “Liberty comes at a price,” Curry added.

In this video interview with Information Security Media Group, Curry discussed:

  • The implications of the Israeli conflict on global cyber…

Source…

Russian hackers seek war crimes evidence, Ukraine cyber chief says – World


KYIV: Russian spies are using hackers to target computer systems at law enforcement agencies in Ukraine in a bid to identify and obtain evidence related to alleged Russian war crimes, Ukraine’s cyber defence chief told Reuters on Friday.

The hackers, working across Russia’s foreign, domestic and military intelligence agencies, have stepped up digital intrusion campaigns targeting the Ukrainian Prosecutor General’s office and departments documenting war crimes, said Yurii Shchyhol, head of the State Service of Special Communications and Information Protection of Ukraine (SSSCIP), which handles cyber defence in the embattled country.

“There’s been a change in direction, from a focus on energy facilities towards law enforcement institutions which had previously not been targeted that often,” Shchyhol said.

“This shift, towards the courts, prosecutors and law enforcement units, shows that hackers are gathering evidence about Russian war crimes in Ukraine” with a view to following Ukraine’s investigations, he added.

The espionage activity will be flagged in an upcoming SSSCIP report, due to be published on Monday.

Russian hackers targeted US nuclear scientists

The report, a copy of which was reviewed by Reuters, says hackers were also trying to gather intelligence on Russian nationals arrested in Ukraine, with a view to “help these individuals avoid prosecution and move them back to Russia”.

“The groups we’ve identified as being engaged in this activity are part of Russia’s GRU and FSB intelligence agencies,” Shchyhol said.

Russia’s Foreign Ministry and the Federal Security Service (FSB) did not immediately respond to written requests from Reuters for comment. Russia’s GRU military intelligence agency could not be reached for comment.

Shchyhol declined to identify exactly which units had been targeted by the hacking campaign, citing security concerns. The number of cybersecurity incidents documented by the SSSCIP grew by 123% in the first six months of this year compared with the second half of 2022, he added.

Russian hackers have prioritised targeting government bodies and trying to gain access to their e-mail servers, Shchyhol said, without elaborating. Reuters was unable…

Source…

Three Exciting Pixel 8 Pro Leaks That Will Change The World


Google has set the scene for its “Made By Google” event on October 4th, and the Pixel 8 and Pixel 8 Pro are set to take center stage. The Pixel 8 Pro especially will break new ground in hardware and software. Looking through the leaks, details, and information available, here are three experiences that will have a significant impact on the smartphone world.

First up is the Tensor G3 system on chip. Rather than go for the off-the-shelf premium chipset from Qualcomm in 2021, Google set out to design its own chipset for the Pixel 6. The Tensor G1 didn’t quite match the raw power of the then-current SnapDragon 888. It was designed around artificial intelligence and machine learning, which provided more software benefits that positively impacted the user experience.

The camera software’s post-processing was one area, but you also had faster on-device translation and transcription as other visible advantages. Last year’s Tensor G2 built on these, and you can expect the Tensor G3 to carry on down this path, allowing the Pixel 8 and Pixel 8 Pro to excel in these areas.

As to the performance gap to the Snapdragon chipsets, the Tensor G3 is set to match the current Snapdragon 8 Gen 2, although the Gen 3 is expected to launch early next year.

Then, you have the investment put into the camera, both in software and hardware.

For the latter, Google is set to use the new Samsung Isocell GN2 image sensor on both the Pixel 8 Pro and the Pixel 8. This is a step up from the previous GN1 sensor, allowing the new handset to sample 50 megapixels while capturing 35 percent more light. It also supports recording video at 8K resolution and 30 frames per second. Still, we are waiting to see if Google will unleash that level of performance – it will be incredibly intensive on power usage and require careful thermal management.

The software is also seeing new features in the updated Camera app. Google’s Camera app is only available (officially) on Pixel devices, and version 9 will only run on Android 14; you can be sure this app harnesses both the new optical hardware and the AI and ML capabilities of the Tensor G3.

Previous Pixels…

Source…

Cyber Security Essentials: Safeguarding Your Digital Life In An Increasingly Connected World


Welcome to the digital age, where everything from our personal lives to global commerce relies on technology. As we revel in the convenience and endless possibilities it offers, we must also face a sobering reality – the ever-growing threat of cybercrime. With each passing day, hackers are becoming savvier and more relentless, posing serious risks to our digital lives. In this blog post, we will delve into cyber security essentials – an indispensable guide to fortify your online defenses in an increasingly connected world. Whether you’re a tech enthusiast or just starting out on your digital journey, join us as we navigate through the complexities of safeguarding your valuable data and ensuring peace of mind in this rapidly evolving cyber landscape.

What is Cyber Security?

Cybersecurity is the practice of protecting information systems from cyberattacks. Cyberattacks can take many forms, including:

-Spyware and malware: Private data such as e-mails, bank account numbers, and passwords can be stolen by spyware or malware. Spyware and malware can also monitor user activity and gather sensitive information.

-Data breaches: In a data breach, hackers access personal data belonging to either individuals or organizations. This can include name, address, e-mail addresses, and Social Security numbers. Data breaches can also result in the release of confidential information.

-Criminals exploiting online security vulnerabilities: Criminals could exploit online security vulnerabilities to gain unauthorized access to a system or to steal confidential information.

What are the threats to your digital life?

In an increasingly interconnected and digital world, cyber security is more important than ever. Here are five of the most common threats to digital life and how to safeguard yourself against them:

1. Hackers: Hackers can steal your personal information, passwords, and other confidential information. To protect yourself from hackers, make sure you keep…

Source…