The Nigeria Data Protection Bureau (NDPB) said it has launched an investigation into allegations of data breach by Zenith Bank and Guaranty Trust Bank.
The Head of Legal Enforcement and Regulations of NDPB, Mr. Babatunde Bamigboye, said the investigations were triggered by allegations of unlawful disclosure of banking records to a third party, unlawful access, and processing of personal data.
The statement quoted the National Commissioner of NDPB, Dr. Vincent Olatunji, saying that the investigation would cover the data governance practice of the banks in all their branches in Nigeria.
Privacy concern: While noting that the investigation would extend to all third parties carrying out their data processing activities, the NDPB boss said:
According to him, such attacks can only be addressed through foolproof data security and data privacy measures by data controllers, and data processors in the industry. Olatunji, however, enjoined all financial institutions to emulate the Central Bank of Nigeria in compliance with the Nigeria Data Protection Regulation (NDPR) 2019 by creating a robust data governance system.
He also called on all organisations to leverage the ongoing National Privacy Week to set their records straight on how they handle the data of citizens. Olatunji added that enforcement measures would be taken against wilful violators of privacy rights going forward.
For the records: The Bureau had last September announced the launch of investigations into reports of a breach of data privacy involving Wema Bank PLC and KC Gaming Networks (Bet Naija). However, the outcomes of the investigations are yet to be made public.
Business News | Stock Market | Money Market | Cryptos | Financial Literacy | SME |
Follow us on social media:
© 2023 Nairametrics
© 2023 Nairametrics
Author: rescue@crimefire.in
-
Nigeria Data Protection Bureau probes two banks over alleged data breach – Nairametrics
-
Community event on protecting against cyber crime is March 20 in … – The Sumter Item
REMBERT – On March 20, CyberSafe Policy will host a free community event, “Cybersecurity Training and Awareness of Cyber Crime.” This event is aimed at educating senior citizens and small business owners about the dangers of cyber crime and how to protect themselves and their businesses from cyberattacks.
Cyber crime is an increasing threat to both individuals and organizations, and this event will provide valuable information and resources to help participants safeguard their personal and business assets. The event will feature experts in the field of cybersecurity who will present a range of topics, including online fraud, identity theft and cyber threats to small businesses.
“The impact of cyber crime is far reaching, and it is important for everyone, especially senior citizens and small business owners, to be aware of the risks and know how to protect themselves,” said CyberSafe Policy Founder Chastity Johnson, organizer of the event. “We are proud to host this important event and help provide the knowledge and tools needed to stay safe online.”
The “Cybersecurity Training and Awareness of Cyber Crime” event will take place on March 20 at the Greater Township Community Center at 4050 S.C. 261 Rembert. The event is open to all senior citizens and small business owners and is free to attend. Space is limited, so early registration is recommended.
For more information and to register for the event, visit .More Articles to Read
Arts & Entertainment
36 W Liberty St, Sumter, SC 29150
803-774-1200
newstip@theitem.com -
How Falling Crypto Prices Impacted Cyber Crime – Security Intelligence
Some rare good news in the world of cyber crime trends: Certain crimes declined in 2022 after years of constant rises. Should we credit crypto?
Some estimates say that cryptocurrencies have lost $2 trillion in value since November 2021. During that time, the costs associated with cyber crimes, such as ransomware payouts and financial scams, declined.
Pop the champagne! The crypto crash is also crashing cyber crime, right? Well, not so fast.
There are four major categories of cyber crime that lean heavily on, or fully require, the use of cryptocurrencies like Bitcoin, Ethereum and Monero: ransomware, DDoS extortion, cryptojacking and crypto theft.
Ransomware is usually facilitated by cryptocurrency, for example. The scam typically involves malware-encrypted files, which perpetrators say they’ll unlock when the victim pays the ransom. Paying in crypto allows criminals to maintain anonymity and non-traceability. (In the increasingly common “double extortion” variant, malicious actors also threaten to expose the files publicly if victims don’t pay.)
DDoS extortion is similar to ransomware. Instead of gaining access to and encrypting files, however, cyber attackers launch a sustained DDoS attack until a ransom in crypto is paid.
Another major crime is illegal cryptocurrency mining, called cryptojacking. Malicious hackers gain access to computing power owned by others, usually via special malware. They then use it to mine crypto illegally.
Unlike most kinds of computer-related crimes, cryptojackers don’t steal money or data directly or demand ransom payments. Instead, they steal computer resources. This translates to higher energy costs, lower performance for users and accelerated declines in battery performance.
Cryptojacking actually rose in 2022. An Atlas VPN analysis found that instances of cryptojacking grew 3.8 times in the third quarter of 2022. (Interestingly, the number of victims declined.)
Analysts assume that cryptojackers are anticipating growth in crypto after it hits bottom and are illegally mining aggressively in the hopes of profiting.
Finally, crypto theft is the hacking of crypto exchanges and other platforms to steal coins directly from their rightful owners. This kind of attack has been reduced because the crypto exchanges themselves were going out of business with the crash in the value of cryptocurrencies.
Cyber criminals use dark web exchanges because they don’t check user identities. These don’t typically store currencies but merely enable the exchange of crypto from one service to another, often at inflated fees. These exchanges operate in many ways like legitimate businesses. They need to spend big on advertising, for example, in part to engender trust among malicious actors who themselves don’t want to get ripped off.
Crashing cryptocurrency prices are squeezing dark web exchanges. This reduces incentives for threat actors because it reduces income, makes vulnerability purchasing more expensive and cuts revenue needed to fund Malware-as-a-Service organizations. In other words, falling crypto prices kneecapped the purchasing power of organizations using crypto for illegal activities.
During the rapid declines in early 2022, exchanges tried to convert their crypto to fiat currencies, such as the U.S. dollar (a currency issued by a government not backed by a physical commodity, such as gold or silver), but the value after conversion wasn’t enough to sustain the business.
Advertising for dark web exchanges nearly stopped in the Spring of 2022. Many went bankrupt or out of business.
The cryptocurrency value drop radically slowed financial crimes, including illegal dark web transactions. Losses for the first half of 2022 were way down, according to blockchain data company Chainalysis. Scammer income dropped by two-thirds — 65% — for the first seven months of the year.
It’s easy to conclude that the drop in the value of cryptocurrencies directly caused the decline in scam revenue. But that would be a mistake.
This drop wasn’t due entirely to the drop in cryptocurrency, according to the report. Both potential victims and police chalked up notable successes in countering such scams. In other words, the general defense against some of these crimes has improved, and credit there is due.
Another point to consider is that total annual scam revenue is usually determined by a very small number of very large scams. One massive scam could upend these numbers and reverse the trend.
In addition, the crash caused cryptocurrency transaction volumes — both legitimate and illegal — to fall. So it reduced “good” transactions in equal measure as “bad” ones.
Also, ransomware gangs likely don’t care if the value of cryptocurrencies is low. They demand ransoms typically in U.S. dollar amounts in the form of whatever quantity of cryptocurrencies are equivalent at the time of demand. While there may be a disincentive to strike while crypto is rapidly declining, once it hits bottom, that disincentive is removed. Volatility in one direction (down) disincentivizes ransomware temporarily. Unfortunately, ransomware is here to stay.
Most importantly, however, it would also be a mistake to assume that cryptocurrency valuations will stay low, or that reductions in crimes that rely on cryptocurrencies will stay low. The consensus among experts is that such crimes will come roaring back to life.
The crypto declines that began in late 2021 and continued for more than a year did, in fact, disrupt everything that depended on crypto — the good, the bad and the ugly. But there’s no question that complacency is the wrong response to this brief semi-respite.
As crypto-using criminal gangs regroup, retool and re-think their operations, they will no doubt come roaring back to attack legitimate organizations with new scams and new crimes.
I write a popular weekly column for Computerworld, contribute news analysis pieces for Fast Company, and also write special features, columns and think piece…
4 min read – Discover how threat actors are waging attacks and how to proactively protect your organization with top findings from the 2023 X-Force Threat Intelligence Index.
17 min read – Overview In this post, IBM Security X-Force Red offensive hackers analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. Over the last few years, public accounts have increasingly shown that less sophisticated attackers…
4 min read – As the U.S. looks to bolster electric vehicle (EV) adoption, a new challenge is on the horizon: cybersecurity. Given the interconnected nature of these vehicles and their reliance on local power grids, they’re not just an alternative option for getting…
Zero-day attacks are on the rise. Not only was 2021 a record-breaking year for the total number of zero-day attacks, but it also accounted for 40% of the zero-day breaches over the last decade. In part, this race to zero is tied to the sheer number of web, mobile and cloud-based applications being developed and deployed. With so much code created so quickly, it’s not surprising that attackers are finding more digital doors unlocked. The massive volume of users constantly…
Vulnerabilities like Log4j remain responsible for security breaches a full year after the discovery of the flaw. In the months after widespread reporting about the vulnerability, 40% of Log4j downloads remained vulnerable to exploitation. Rapid Response — by Both Security Teams and Hackers What made this exposure so damaging was how widespread this piece of code is and how hard it is to find exactly where it’s used. This open-source logging code from Apache was the most popular java logging…
As part of our ongoing series highlighting various roles in the cybersecurity industry, this article shines the light on the incident response professional. While there are many misconceptions surrounding the role, let’s examine a few frequently asked questions. How In-Demand is this Particular Role? Why? Year after year, the story is the same: Cybersecurity jobs are one of the most in-demand roles in the country. But recent data from Cyberseek, a cybersecurity workforce analytics platform developed in partnership with NIST,…
During a recent get-together, my friend arrived late. She apologized, quickly explaining that she’d had trouble finding a charging station for her electric vehicle (EV). While she knew where the stations in her hometown were, she couldn’t easily find them on the road. This piqued my curiosity, and I began asking her questions about EVs and, most importantly, about charging them. Our household had been considering buying an EV, but we were concerned about just this type of issue with…
Analysis and insights from hundreds of the brightest minds in the cybersecurity industry to help you prove compliance, grow business and stop threats. -
Cyber fraud incidents rising in India: how to file a complaint online on Cyber Crime portal – India Today
By Divya Bhati: National Crime Records Bureau (NCRB) data registered 52,974 incidents of cyber crimes in 2021. The stats increased by nearly 6 per cent in comparison to the previous year. While the data show the severity of the increasing cyber crime rate, what's more, alarming is that this data estimates the stats based on only the reported cases. So the real cyber crime cases incidents would be even more if we consider the under-reported cases.
But why will people not report a case? Well in most of the reported cases, we see that people are complaining about losing big financial amounts, so for a minimal amount people don't even bother to file a complaint or see it as a hassle. On top of it, many are still not aware of the types of cybercrime or the mechanism to report related cases. So let's take a detailed look at what cyber fraud is and how to register a complaint for the same.Cyber fraud, also known as online fraud or internet fraud is a crime in which someone uses the internet to steal money. Fraudsters can target the individual and contact them via SMS, call, email, or other ways to get personal information or send the malicious link to apps or websites to hack into the computer, mobile device, or network to get sensitive information, such as bank account numbers, credit card details, social security numbers, and personal information.
With advancing technology, cyber scammers are also following new ways to target people and real money. Some of the common cyber frauds include identity theft, phishing scams, credit card fraud, romance scams, investment fraud and more.
Let's take a look at 5 common types of cyber fraud that you should be aware of-
Phishing Scams: In such scams, scammers send fake emails, text messages or make phone calls claiming to be a legitimate organization and trick people to give their sensitive information like usernames, passwords OTP or other.Identity theft: In identity thefts, scammers steal someone's personal information, like name, address, and social security number, and use it to open accounts, apply for loans or commit other crimes in their name.
Malware: Scammers send malicious link apps which are designed to damage, disrupt, or gain unauthorised access to a computer system and get sensitive information to get financial benefits. Some of the Common types of malware include viruses, worms, Trojan horses, and ransomware.
Job scam: As the name suggests, scammers target people online on the pretext of offering a job and later stealing their money.
Online Shopping Scams: This is one of the most common scams. Cybercriminals set up fake e-commerce websites or advertise fake products on legitimate websites and trick people into making purchases. Through these fake websites, they may also steal credit card details to steal money.National Cyber Crime Reporting portal is an online website by the Government of India to help victims/complainants to report cybercrime complaints including cyber fraud online. This portal takes complaints pertaining to cyber crimes and has a special focus on cyber crimes against women and children.
One can reach out to the National Cyber Crime Reporting portal (Helpline Number -1930) to register any complaint about cyber crime, including cyber fraud. You can also contact the nearest police station to file your complaint. You can also file your complaint online through cybercrime.gov.in .
Here is a step-by-step guide to filing a complaint on National Cyber Crime Reporting portal– Open your web browser and visit the webpage https://cybercrime.gov.in
– On the homepage, click on 'File a complaint'.
– Next, read and accept the terms and conditions on the next page.
– Click on the 'Report other cybercrime' button.
– Select the 'citizen login' option and enter the required details including name, email, phone number, etc.
– Enter the OTP sent to your registered phone number and fill in the captcha, then click on the submit button.
– On the next page, enter the details of the cybercrime you want to report in the form.
– The form is divided into four parts – General Information, Victim Information, Cybercrime Information, and Preview. Fill in all the relevant details in each section and preview the information filled in to make sure it's correct.
– After reviewing the information, click on the 'Submit' button.
– You will be directed to an incident details page. Here, mention the details and supporting evidence of the crime, such as screenshots or files. Once you have entered the details, click on 'Save and Next'.
– The next page requires information about the alleged suspect if you have any. Fill in the details if you have any information about the suspect.
– Now verify the information and click on the 'Submit' button.
– You will receive a confirmation message that your complaint has been registered, and you will also receive an email with the complaint ID and other details related to your complaint.If you are filing a cyber fraud case related to online transactions, lottery scams, ATM transactions, fake calls, or internet banking you will have to attach proof of the alleged fraudulent transactions, along with supporting evidence like bank statements, address, and ID proof, and any suspicious messages or emails you have received.
-
North Korean State-Sponsored Cyber Actors Use Maui … – CISA
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Search
The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Department of the Treasury (Treasury) are releasing this joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health (HPH) Sector organizations.
This joint CSA provides information—including tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs)—on Maui ransomware obtained from FBI incident response activities and industry analysis of a Maui sample. The FBI, CISA, and Treasury urge HPH Sector organizations as well as other critical infrastructure organizations to apply the recommendations in the Mitigations section of this CSA to reduce the likelihood of compromise from ransomware operations. Victims of Maui ransomware should report the incident to their local FBI field office or CISA.
The FBI, CISA, and Treasury highly discourage paying ransoms as doing so does not guarantee files and records will be recovered and may pose sanctions risks. Note: in September 2021, Treasury issued an updated advisory highlighting the sanctions risks associated with ransomware payments and the proactive steps companies can take to mitigate such risks. Specifically, the updated advisory encourages U.S. entities to adopt and improve cybersecurity practices and report ransomware attacks to, and fully cooperate with, law enforcement. The updated advisory states that when affected parties take these proactive steps, Treasury’s Office of Foreign Assets Control (OFAC) would be more likely to resolve apparent sanctions violations involving ransomware attacks with a non-public enforcement response.
For more information on state-sponsored North Korean malicious cyber activity, see CISA’s North Korea Cyber Threat Overview and Advisories webpage.
Download the PDF version of this report: pdf, 553 kb.
Click here for STIX.
Since May 2021, the FBI has observed and responded to multiple Maui ransomware incidents at HPH Sector organizations. North Korean state-sponsored cyber actors used Maui ransomware in these incidents to encrypt servers responsible for healthcare services—including electronic health records services, diagnostics services, imaging services, and intranet services. In some cases, these incidents disrupted the services provided by the targeted HPH Sector organizations for prolonged periods. The initial access vector(s) for these incidents is unknown.
Maui ransomware (maui.exe) is an encryption binary. According to industry analysis of a sample of Maui (SHA256: 5b7ecf7e9d0715f1122baf4ce745c5fcd769dee48150616753fec4d6da16e99e) provided in Stairwell Threat Report: Maui Ransomware—the ransomware appears to be designed for manual execution [TA0002] by a remote actor. The remote actor uses command-line interface [T1059.008] to interact with the malware and to identify files to encrypt.
Maui uses a combination of Advanced Encryption Standard (AES), RSA, and XOR encryption to encrypt [T1486] target files:
During encryption, Maui creates a temporary file for each file it encrypts usingGetTempFileNameW(). Maui uses the temporary to stage output from encryption. After encrypting files, Maui createsmaui.log, which contains output from Maui execution. Actors likely exfiltrate [TA0010]maui.logand decrypt the file using associated decryption tools.
See Stairwell Threat Report: Maui Ransomware for additional information on Maui ransomware, including YARA rules and a key extractor.
See table 1 for Maui ransomware IOCs obtained from FBI incident response activities since May 2021.
Table 1: Maui Ransomware IOCs
Attribution to North Korean State-Sponsored Cyber Actors
The FBI assesses North Korean state-sponsored cyber actors have deployed Maui ransomware against Healthcare and Public Health Sector organizations. The North Korean state-sponsored cyber actors likely assume healthcare organizations are willing to pay ransoms because these organizations provide services that are critical to human life and health. Because of this assumption, the FBI, CISA, and Treasury assess North Korean state-sponsored actors are likely to continue targeting HPH Sector organizations.
The FBI, CISA, and Treasury urge HPH Sector organizations to:
In addition, the FBI, CISA, and Treasury urge all organizations, including HPH Sector organizations, to apply the following recommendations to prepare for, mitigate/prevent, and respond to ransomware incidents.
If a ransomware incident occurs at your organization:
Note: the FBI, CISA, and Treasury strongly discourage paying ransoms as doing so does not guarantee files and records will be recovered and may pose sanctions risks.
The FBI is seeking any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, bitcoin wallet information, the decryptor file, and/or benign samples of encrypted files. As stated above, the FBI discourages paying ransoms. Payment does not guarantee files will be recovered and may embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. However, the FBI understands that when victims are faced with an inability to function, all options are evaluated to protect shareholders, employees, and customers. Regardless of whether you or your organization have decided to pay the ransom, the FBI, CISA, and Treasury urge you to promptly report ransomware incidents to the FBI at a local FBI Field Office, CISA at us-cert.cisa.gov/report, or the USSS at a USSS Field Office. Doing so provides the U.S. Government with critical information needed to prevent future attacks by identifying and tracking ransomware actors and holding them accountable under U.S. law.
The FBI, CISA, and Treasury would like to thank Stairwell for their contributions to this CSA.
To report suspicious or criminal activity related to information found in this Joint Cybersecurity Advisory, contact your local FBI field office at fbi.gov/contact-us/field, or the FBI’s 24/7 Cyber Watch (CyWatch) at (855) 292-3937 or by e-mail at CyWatch@fbi.gov. When available, please include the following information regarding the incident: date, time, and location of the incident; type of activity; number of people affected; type of equipment used for the activity; the name of the submitting company or organization; and a designated point of contact. To request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov.
July 6, 2022: Initial Version |July 7, 2022: Added STIX -
Bachelor's Degree in Cybersecurity – pnw.edu
B.S.
Request Information
Purdue University Northwest’s (PNW) Bachelor of Science (B.S.) in Cybersecurity prepares you with the technical competency, knowledge and skills needed to protect networks, systems, software programs and data from criminal or unauthorized access. You will learn concepts, knowledge, skills, technologies and practices in a broad spectrum of cybersecurity areas, including the emerging fields of applied data science and artificial intelligence.
This program is hands-on and application-oriented. Upon the completion of the program, you’ll be ready to take highly sought-after industry certification exams.
Department of Computer Information Technology and Graphics
Upon completion, a student will:
You’ll take a balance of general education courses, College of Technology core courses and cybersecurity courses. This balance blends theory, applied research and experiential learning in all the vital aspects of IT, including networking, database administration, security and project management.
The cybersecurity program provides the specialized training you need for a career in this complex, in-demand field.
You can currently complete this degree at PNW’s Hammond campus.
First-year courses cover the basics of IT in areas such as organization, history, related informing disciplines, application domains, computer math and other IT-related topics.
Cybersecurity Course of Study
Sample Courses
Your second year covers in-depth discussions of networking, programming, database and fundamentals of information assurances.
Cybersecurity Course of Study
Sample Courses
Topics include administration, confidentiality, integrity, authentication, non-repudiation, intrusion detection, physical security, encryption and machine learning foundations.
Cybersecurity Course of Study
Sample Courses
In your final year, you’ll cover defensive programming techniques, bounds analysis, error handling, advanced testing techniques, detailed code auditing and software specification in a trusted assured environment.
Cybersecurity Course of Study
Sample Courses
Cybersecurity Degree Program Highlights
Cybersecurity workforce development is the key to assuring that the nation has adequate capacity to protect information and information systems.
This quickly growing field is both challenging and competitive. At PNW, we provide the tools you need to stand out, including US government-recognized curriculum and individualized attention from instructors.
Cybersecurity Degree Program Outcomes
Through classroom and lab interaction with experienced faculty, applied research and experiential learning, you’ll begin your professional work with the confidence and knowledge to be successful in a dynamic, competitive field.
Cybersecurity Degree Program Career Paths
This degree prepares you for a number of careers in the cybersecurity field, including:
Cybersecurity Degree Program Employers
Our alumni work with some of the most innovative organizations across the region and around the world, including:
Beyond the Cybersecurity Classroom
We encourage you to get involved in activities like:
Cybersecurity Degree Program Scholarships
In addition to the scholarships available to all PNW applicants, students seeking a bachelor’s degree in cybersecurity may also be considered for program-specific scholarship awards, such as:
See All Technology Scholarships
It was a class in Linux system administration that helped me the most…I was assigned a real-world problem and I applied my education and experience to solve it.
Lucas D’Antonio, ’23, Computer Information Technology—Concentration: Cybersecurity
All of the hands-on training I’m receiving at PNW is helping me narrow down exactly what I want to do once I graduate.
Joshua Phillips, ’22
Computer Information Technology: Cybersecurity
I was able to learn a little bit about everything – networking, programming, databases, security. It provided me a better understanding of how everything works together. It also gave me a wide variety of skills, not just for cybersecurity, that I can take with me into my career.
Travis McKinney, ’22, Computer Information Technology
Michael Tu, Ph.D.
Professor, Computer Information TechnologyMichael Tu is a professor of computer information technology and director of the Center for Cybersecurity.
Ricardo A. Calix, Ph.D.
Associate Professor, Computer Information Technology and GraphicsRicardo A. Calix, Ph.D. is an Associate Professor of Computer Information Technology at Purdue University Northwest.
Tae-Hoon Kim, Ph.D.
Associate Professor, Computer Information Technology and GraphicsTae-Hoon Kim is associate professor of computer information technology in the department of Computer Information Technology and Graphics. His expertise includes computer network, security and data science.
Ying Luo, Ph.D.
Assistant Professor, Computer Information Technology and GraphicsYing Luo is an assistant professor in the department of computer information technology and graphics. Her research and teaching focus on algorithm design, database management and cybersecurity.
Chuck DeCastro, M.S.
Lecturer, Computer Information TechnologyCurrent responsibilities include teaching Networking, Operating System, Cyber Security and Computer Forensic Courses. I’m also the Advisor for the Gamers’ and Cyber ROAR Clubs.
Earn a Bachelor’s Degree in Cybersecurity at PNW
Purdue University Northwest’s Cybersecurity degree enables you to reach a genuine understanding of all aspects of the industry while building a solid foundation in technology through hands-on experiences.
To see how a Bachelor’s Degree in cybersecurity from PNW opens doors, from corporate boardrooms to non-profit leadership, take the next step today!
Request Info
Computer Information Technology
BS
Computer Graphics Technology
BS
Computer Engineering
BSCmpE
Hammond Campus
2200 169th Street
Hammond, IN 46323
(219) 989-2400
(855) 608-4600
Westville Campus
1401 S. U.S. 421
Westville, IN 46391
(219) 785-5200
(855) 608-4600
For assistance with accessibility issues while using this page, please contact Marketing and Communications at marketing@pnw.edu. -
G20: Need to Cut out Cyber crime through collective Action | – NewsOnAIR

A recent data by CERT-In had showed that cyber attacks had increased from 41,378 attacks in 2017 to 14,02,809 attacks in 2021. In India, 3,377 cyber crimes were reported in 2012, and in 2020, the number of such reported crimes reached 50,000. More than 11 lakh complaints of different types, have been registered so far, and more than two lakh complaints have also been registered for social media crimes. In the thick of these gory developments, it is not possible to imagine the development of any country without ensuring cyber safety. Hence, figuring out challenges and finding effective solutions for cyber security becomes a thing of utmost importance for this digital economy to grow and sustain, which the G20 summit laid much stress on.
The first meeting of the Digital Economy Working Group under India’s G20 Presidency witnessed Cyber security dominating the discourse of the session, and it was termed as ‘crucial’ for digital transformation and digital economy by experts. If crores of people feel empowered digitally due to brisk Internet expansion and proliferation of innumerable applications, products and services, cyber crimes are also on the rise with almost the same speed if not greater. A sharp increase in organized crime gang hacking activities, supported and sponsored by hostile nations, have raised the risk. Hence, trade and business related to restricting cyber crimes are said to be one of the most profitable businesses globally.
Cybercrime are predicted to inflict damages totalling more than 6 trillion dollar globally, and the cost of cybercrime is estimated to grow by almost 15% every year over the next 4-5 years, reaching 10.5 trillion dollar annually by 2025. This enormous cost simply puts growth of digital economy in danger, which makes discussion and action on cyber theft very relevant for the entire world. Digital technology has the potential to address the myriad of problems still confronted by crores of people in Indian and other developing economies. Results are there to corroborate the claims. Today, 80 crore Indians have an online presence in India and by 2025, another 40 crore will enter the digital world, thanks to India’s Digital India campaign. In the last 8 years, the data cost per GB has come down by about 96%, which is expected to come down further.
Riding on the back of the speed and spread of the internet, transactions on UPI have crossed one trillion dollar in FY 2022, making India the first in the world in digital payments. BHIM-UPI are no longer just Indian apps, but have become truly global, as they are accepted in Singapore, the UAE, Bhutan, Nepal, France and a number of countries may adopt them in the coming days. Today, 130 crore Indians get the benefit from the government directly in their bank accounts through DBT. Rs.6,000 reaches the accounts of 13 crore farmers annually. Just a few years earlier, one could not have even imagined it.
However, the big challenge of securing the country from cyber fraud and other cyber attacks still needs to be addressed in an effective and speedy manner. To tackle this menace, the Cyber and Information Security (CIS) Division was formed in 2017, and from there, a lot of steps have been taken. More than 16,000 officers from police forces have been trained. A lot of research works are also going on in the National Cyber Crime Forensic Laboratory and the National Forensic Science University in cybercrime forensic investigation. However, this fight of global magnitude, can’t be fought in isolation. Here, the G20 summit promises a lot through research & analysis of global patterns and developments, and then collective actions to combat the issue.
Explore all issues of PBNS Daily Magazine Read Here.
Continue reading
Get an online subscription and you can unlock any article you come across.
Get access to PBNS Daily Magazine.
Get an online subscription and you can unlock any article you come across, getting instant emails when our site updates, too.
Get access to PBNS Daily Magazine. -
Police can get cyber crime awareness training from emergency … – Warren County Record
Law enforcement officers from across Missouri can now receive continuing education credit for attending a cyber crime prevention class called “Social Engineering 101,” led and developed …
This item is available in full to subscribers.
We have recently launched a new and improved website. To continue reading, you will need to either log into your subscriber account, or purchase a new subscription.
If you are a digital subscriber with an active subscription, or you are a print subscriber who had access to our previous wesbite, then you already have an account here. Just reset your password if you have not yet logged in to your account on this new site.
If you are a current print subscriber and did not have a user account on our previous website, you can set up a free website account by clicking here.
Otherwise, click here to view your options for subscribing.
If you’re a print subscriber, but do not yet have an online account, click here to create one.
Click here to see your options for becoming a subscriber.
Law enforcement officers from across Missouri can now receive continuing education credit for attending a cyber crime prevention class called “Social Engineering 101,” led and developed by Warren County Emergency Management Director Jim Sharp.
Sharp recently announced that his two-hour seminar has received certification from Missouri’s Peace Officer Standards and Training (POST) Commission, the governing board that sets the licensing standards for law enforcement officers. The certification means officers can attend Sharp’s course to help fulfill continuing education requirements set by POST.
The class focuses on social engineering — the process of manipulating people’s behavior — because that’s how the vast majority of current cyber attacks begin, Sharp told The Record. He said most people associate cyber crime with the idea of an expert computer hacker, but that most criminals don’t actually have that expertise. Instead, they use low-tech methods of manipulating people into giving them access to computer networks.
“Making a computer do something it wasn’t designed to do is almost impossible unless you know how to reprogram it. Getting the users of those computers to do something different is relatively simple,” Sharp explained. “Social engineering means manipulating people to do things that they wouldn’t normally do, or tell you things that they wouldn’t normally tell you.”
The seminar is available to any law enforcement or emergency agency, or any community organization, all at no cost, Sharp said. He commented that part of his job as director of Warren County’s Emergency Management Agency is to provide information about preparedness and prevention that can help anyone in the community avoid the impacts of natural or man-made emergencies.
He added that POST certified the social engineering seminar because of how important it has become for law enforcement officers to be aware of how these criminals operate.
“The most important part is the self-awareness of the information that we all put out there,” Sharp said. “Watch what you say, watch what you put on social media. … Be aware of what you’re casually saying about yourself that might make you a little more vulnerable than you might have been otherwise.
“I didn’t write (the course) specifically for law enforcement, but the folks at POST decided it was worthwhile to award credit for it because of the relevance of it,” he added.
Sharp noted that the POST certification for the social engineering class is actually the third of his seminars to receive continuing education certification. He also provides a presentation on organizing and responding to school shooter scenarios, and another on communicating with the public during a crisis.
For information about disaster prevention and preparedness, or to schedule an informational presentation, go online to www.warrencountyema.com, or email Sharp at jsharp@warrencountymo.org.
No comments on this item Please log in to comment by clicking here
Other items that may interest you
The Warren County Health Department is excited to announce the release of the organization’s new smartphone application. This app will serve as a new way for the health department to …
View this issue
Browse other issues
103 E. Booneslick,
Warrenton, MO 63383
(636) 456-6397 -
‘Life savings lost’, US citizen deposes before Alipore court judge – Telegraph India
A 76-year-old American woman recorded her statement before a magistrate in an Alipore court over video on Thursday in connection with an online fraud for which Kolkata police have arrested three men.
According to the complaint that was forwarded to Kolkata police by the FBI, the woman who lives in the US was duped by men allegedly posing as support staff of an anti-virus company over the phone.
Police said the woman had lost her life savings to the fraudsters. Her statement was recorded virtually under Section 164 of the CrPC.
The magisterial statement recording started around 5pm and took over five hours to complete, the police said.
Based on the communication received from the FBI, the police here said they learnt there were at least four American victims cheated by two or more people from Kolkata using the name “David” between April and June 2022.
“All these victims are senior citizens who were made to believe they were speaking to tech support persons for installation of antivirus software on their computers,” said an officer of the cyber cell at Lalbazar.
Based on details provided by their American counterparts, the police here started a case and arrested three men in January. Shizan Ali Haider and Mohammad Atif were arrested from Beniapukur in south Kolkata and Sabtain Ali Haider was picked up from Ajmer in Rajasthan.
During the investigation, the police said they found details of an IP address from where the alleged calls were made.
“On analysing the IP address and the internet router through which it was used, we zeroed in on the identity of the three suspects,” said an officer.
At least one of them had used a mobile app that helps conceal the IP address from where an internet connection is used.
The police found the same app on the phone of one of the three arrested. The phone and several laptops have been seized, the officer said.
Several Kolkatans and many across the globe get cheated over the phone by fraudsters who pose as customer care support teams or officials of e-commerce companies. The callers convince them to download screen-sharing apps on their phones that give the fraudsters access to the victims’ phones even if they are in another continent.
‘Charlie Chopra & The Mystery of Solang Valley’ will stream on SonyLIV
Certified skin-friendly colours for the festive season
Comfy, cool and pretty — all in one
A ‘saag’ recipe that you need to make today
The documentary will stream from March 17
Copyright © 2021 The Telegraph Online. All rights reserved.
