Category: Uncategorized

  • From social media to ChatGPT, cyber criminals quick to adopt new tech – Business Standard

    Topics
    Social Media | Cyber crimes | cyber security
    IANS  |  New Delhi 

    https://mybs.in/2cCPo7U

    Forget Jamtara that has kept on inspiring cyber thugs to steal your data or money via traditional, OTP-based methods to date. Brace yourself for a new age of hacking via artificial intelligence (AI)-based tools.
     
     
    A new crop of con artists is now thriving that is utilising newer means — from platforms to UPI-based frauds and from operating fake gambling websites to now working on AI chatbot ChatGPT — to rob you of your hard-earned money.
    A woman was duped of Rs 27 lakh last week by a woman fraudster who promised her handsome returns on investment in digital marketing on WhatsApp.
    "The task was to like and subscribe to YouTube accounts," the victim said in the FIR.
    The Delhi Police's Crime Branch last week busted a racket involved in forging documents including Aadhaar cards, PAN card, and driving license for obtaining SIM cards, opening bank accounts and taking loans.
    On interrogation, police found that the con group used ordinary persons who don't have any ID documents for preparing these documents and further misusing them.
    Cyber-security researcher Rajshekhar Rajaharia has unearthed a new type of fraud online.
    Every day from 5 p.m., several satta (gambling) websites start trending on Google, which offer quick money upon playing the satta that starts from as little as Rs 100 and goes into thousands.
    "These websites start appearing in the evening and every website guarantees profits. These gambling websites are being run with tier 1 and 2 city names like Delhi Satta King, Disawar gali Satta, Shri Ganesh Chart, Satta King Delhi Bazar and more," Rajaharia told IANS.
    Those who place satta, using various UPI payment platforms, get nothing in return as the winning prize always goes to people these websites had already selected.
    "There are thousands of such fake gambling websites now operating in the country. They also have Telegram groups and each group has more than 25,000 members," said Rajaharia.
    First captured by trendingbot.org, it is impossible to guess which website is real or which is fake and nearly 90 per cent people who place their money don't get anything.
    "Satta owners announce the only number with the lowest targeted number to make maximum profit and there are hundreds of websites related to one satta market," Rajaharia explained.
    In January, a Lucknow woman who had saved Rs 1 lakh for her daughter's surgery was duped by fraudsters who offered her prize money in a lucky draw. She said she paid the money through Google Pay app.
    According to cyber experts, scammers operating high-yielding investing scams called "pig butchering" have found a way to compromise Google Play and Apple's App Store.
    Pig butchering scams are those which involve fake websites, malicious advertising, and social engineering.
    By adding fraudulent apps to official download platforms, scammers can gain a victim's trust easier, reports BleepingComputer.
    According to Sophos researchers, scammers are targeting victims on Facebook or Tinder and convincing them to download the fraudulent apps and "invest" large sums of money in assets that appear to be real.
    The fraudsters appear to target male users over Facebook and Tinder using women's profiles with stolen images from other accounts.
    Sophos discovered malicious apps called "Ace Pro" and "MBM BitScan" on the Apple App Store, and "BitScan" on the Google Play Store.
    The next big challenge for cyber authorities is to tackle ChatGPT-based .
    Cyber criminals have already started using ChatGPT to create Telegram bots that can write malware and steal your data.
    Currently, if you ask ChatGPT to write a phishing email impersonating a bank or create malware, it will not generate it.
    However, hackers are working their way around ChatGPT's restrictions and there is an active chatter in the underground forums disclosing how to use OpenAI API to bypass ChatGPT's barriers and limitations.
    "This is done mostly by creating Telegram bots that use the API. These bots are advertised in hacking forums to increase their exposure," according to CheckPoint Research (CPR).
    The coming months will reveal further how hackers are using new-age techniques and AI-based tools to commit financial frauds.
    The time is to minimise your digital footprints to stay away from the new breed of hackers, advise experts.
    (Nishant Arora can be reached at nishant.a@ians.in)
    –IANS
    na/bg
    (Only the headline and picture of this report may have been reworked by the Business Standard staff; the rest of the content is auto-generated from a syndicated feed.)
    Exclusive Stories, Curated Newsletters, 26 years of Archives, E-paper, and more!
    Insightful news, sharp views, newsletters, e-paper, and more! Unlock incisive commentary only on Business Standard.
    Download the Business Standard App for latest Business News and Market News .
    First Published: Sun, February 19 2023. 16:19 IST

    source

  • See Yourself in Cybersecurity | U.S. Department of Labor Blog – U.S. Department of Labor (.gov)

    An official website of the United States government
    The .gov means it’s official.
    Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.
    The site is secure.
    The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.
    We have transformed into a digital society where most data is stored electronically. Unfortunately, the increase in accessible data has also led to an increase in cyber threats. With this shift, cybersecurity has become one of the fastest-growing industries within the information technology space for federal agencies. The Office of the Chief Information Officer is at the forefront of cybersecurity solutions for the Department of Labor and is constantly seeking the brightest talent to protect the data of America’s workers.
    The cybersecurity field is booming. As of August 2022, there were over 700,000 open roles in cybersecurity in the United States and, according to  US Bureau of Labor Statistics projections, jobs for information security analysts are expected to grow 35% by 2031. It’s clear that cyber talent is in demand.
    At the Department of Labor, we’re focused on promoting good jobs, and most cybersecurity positions meet the criteria for what we consider a good job under our Good Jobs Principles.  There are currently thousands of cybersecurity positions available in the federal government across a wide range of industries and fields, including security testing and assessment, cyber training, cyber privacy, and security operations centers.
    While there are many open opportunities across the industry, OCIO frequently hires for the following roles:
    IT specialist: Responsible for setting up, managing, and troubleshooting the technology systems that OCIO uses to maintain computer and software networks.
    IT project manager: Responsible for execution aspects of the project management lifecycle, including initiating, planning, executing, monitoring and controlling the closeout process groups.
    IT cybersecurity specialist: Responsible for conducting vulnerability scans and identifying and remediating system vulnerabilities in an effort to maintain sound systems’ security posture.
    Explore all of our open positions here.
    In the future, the demand for cybersecurity will continue to grow across public and private organizations; there are two areas where we expect to see the greatest momentum. First is the shift from security compliance (process of ensuring systems comply with requirements and cyber standards), to risk management (likelihood of a threat exposing a vulnerability) and vulnerability management (process of managing vulnerabilities within a system).
    Second, we will see cyber leaning on machine learning and artificial intelligence to identify and respond to threats faster and more efficiently. This will increase the demand for skill sets focused on monitoring and fine-tuning network security and mitigating vulnerabilities.
    If you intend to join the cybersecurity industry of the future, there are a few ways you can set yourself apart.
    Any candidate looking to stand out can invest in new skill sets. Penetration testing, also known as pen testing or ethical hacking, and application development security –  both of which are in high demand. Additionally, candidates searching for a career in cybersecurity should prioritize training and certification programs. Training and certifications like CISSP (Certified Information Systems Security Professional) and CISA (Certified Information Systems Auditor) can help candidates validate and develop cybersecurity skills to align their skills with positions.
    Cybersecurity is undoubtedly one of the fastest-growing industries. If you are looking for a challenging and rewarding career path where you are protecting the American public, this is the industry for you. Now is a great time to see yourself in cyber and find an opportunity to make an impact.
    Karl Hellmann is the deputy chief information security officer for OCIO at the Department of Labor. Follow OCIO on Twitter and LinkedIn.    
    Are you interested in joining the OCIO Team? View available positions and apply today!
    1-866-4-USA-DOL (1-866-487-2365)
     
    200 Constitution Ave NW
    Washington, DC 20210
    1-866-4-USA-DOL
    1-866-487-2365

    www.dol.gov
    Connect With DOL

    source

  • What you need to land a six-figure cybersecurity job – Fortune

    Cyber attacks are becoming more prevalent; in fact, Accenture estimates that the number of incidents rose 31% between 2020 and 2021. As the number of attacks climbs, the industry becomes increasingly desperate for qualified cybersecurity professionals. In the U.S. there’s a massive talent gap—to the tune of 715,000 cybersecurity jobs left to be filled, an Emsi Burning Glass market report shows. 
    While there are a plethora of open positions, there may not be enough qualified individuals to fill these jobs. Companies often require certain credentials, certifications, or other education requirements for high-level cybersecurity jobs. But top cybersecurity professionals agree that there are plenty of ways to break into the industry. 
    “There are different archetypes of how people find their way into security,” Ryan LaSalle, head of Accenture Security’s North America practice, told Fortune in a recent interview. Some of those continued education programs, certification programs, self-study programs, and even some of the master’s degrees, and online programs really help those folks make the pivot with some confidence.”
    No matter the path you take to get there, pursuing cybersecurity positions do often pay off. Many cybersecurity jobs pay well over the six-figure mark, with some professionals earning $225,000 and more, according to research from Mondo, a recruiting firm for tech and creative companies.
    “We often see that cybersecurity skills carry a significant salary premium in some cases on the order of $10,000, $15,000 or more” than other technical roles, Will Markow, vice president of applied research–talent at Emsi Burning Glass, previously told Fortune. 
    ISC2, an organization that specializes in training and certifications for cybersecurity professionals, reported that 40% of cybersecurity workers had a master’s degree in the field in 2021. What’s important to recognize, however, is that ISC2 represents and helps very high-level professionals who are often studying to earn the most coveted certifications in the field. 
    “Too many people are scared away from our field when they hear associations saying that you need a master’s degree or other qualifications that really aren’t required for most positions in our field,” Steve Morgan, founder of Cybersecurity Ventures, tells Fortune. “While some portion of cyber workers in highly technical positions or executive roles may have a master’s degree, that is not true for the bulk of people employed in our field.”
    Of entry- and mid-level cybersecurity professionals, about 15% have a master’s degree in the field, several sources show. The figures from ISC2 most likely refer to senior-level positions at Fortune 500 companies, Morgan says.
    While you don’t necessarily need a master’s degree in cybersecurity to make six figures, several experts agree that going to grad school can often help you earn a higher salary than a bachelor’s degree or other certifications alone. 
    Master’s degree students in cybersecurity “have more demonstrated critical thinking experience from the written reports and oral presentations they have completed,” Nick Schneider, CEO of cybersecurity firm Arctic Wolf, tells Fortune. “This is often because the master’s candidate may be able to skip an entry-level role and immediately go into a second-level position. But be aware, where you start does not dictate where you end.”
    Education can also be substituted by additional work experience or relevant cybersecurity certifications, he adds. Plus, some cybersecurity jobs with the federal government require security clearances, which can increase compensation packages.
    Completing cybersecurity certifications is also a promising way to work toward making a six-figure salary. Kayne McGladrey, IEEE senior member and cybersecurity strategist at Ascent Solutions, cites a cybersecurity workforce study by ISC2 that shows that certifications result in an average $33,000 more in annual salary. 
    “Cybersecurity remains a clear path to a middle-class salary for people with a two-year degree, a relevant certification to overcome gatekeeping by HR departments, a desire to help protect one’s friends and community, and a willingness to continuously learn as part of a team,” he tells Fortune. 
    Sven Dietrich, another IEEE member and professor at Hunter College, also points out that employers will often offer cybersecurity-focused training and certifications. Aside from hard technical skills, landing top-paying cybersecurity jobs also requires a number of soft skills. 
    “A six-figure job in cybersecurity is likely to require a candidate that can lead and express themselves clearly in front of management, a team, or even customers,” Dietrich says. “For my team, I want to hire someone who has creative thinking in response to a challenge problem, can use sideways thinking to get to the solution, and has good team abilities to first follow, but also lead as necessary. Project management skills are another plus.”
    Another thing to consider? Cybersecurity isn’t your average 9-5 job, Schneider says. It requires a “mission-oriented attitude,” and appeals to people “motivated with a higher calling.”
    “Cybersecurity is an industry that is evolving at an exponential rate and requires a chameleon-like mindset to roll with the punches,” Schneider says. “Although a specific degree might be nice to have, the threat landscape is the wild west where hands-on, real-world experience is critical in defending against rising threats.”
    See how the schools you’re considering fared in Fortune’s rankings of the best computer science programscybersecurity programspsychology programs, public health programsbusiness analytics programsdata science programs, and part-timeexecutive, full-time, and online MBA programs.

    source

  • Don't fall victim to cyber crime – The Wahkiakum County Eagle

    ClassifiedsPhotosAboutContactAdvertise
    FaceBookRSS
    Free TrialSubscribeSign In

    February 16, 2023
    To The Eagle:
    Cyber crime, is for the most part, tricking someone, or someone’s computer, into doing what the criminal wants it to do, without you knowing. I was a victim of that last week, and would like to let the community know, that they are here as well, or rather their intrusions are here. “They” could be anywhere in the world, connected in, to me, unknown ways of cyber space.
    Do not do, as I did, call the number provided in the following account, of what happened. Working on the computer, all of a sudden, the screen is black, with a prominent message as follows: “Microsoft Security, Has Detected A Cyber Intrusion, On Your Computer. Call Microsoft Security For Help At: 877-657-1592.
    I then proceeded to converse with said security, only to finally see the red flag, shut down computer and call to secure bank accounts, credit cards, Social Security, Equifax and anything else they may be able to get into.
    Then contacted computer link NW in Cathlamet, who not only cleaned the infected computer but gave me a lot of helpful advice. Bonus of that, was it was free of charge, thanks to a grant from Washington State Commerce, through Computer Link NW, 360-795-5000, CLNW.com.
    Beware.

    Poul Toftemark
    Rosburg

    P.O. Box 368
    Cathlamet, WA 98612
    Ph: (360) 795-3391

    © 2023 The Wahkiakum County Eagle Inc.

    Powered by ROAR Online Publication Software from Lions Light Corporation
    © Copyright 2023

    source

  • Have You Ever Been Doxxed? What Is Doxxing? | Cyber Crime | F.101 – News18

    Last Updated: February 15, 2023, 09:02 IST
    Have You Ever Been Doxxed? What Is Doxxing? | Cyber Crime | F.101Have You Ever Been Doxxed? What Is Doxxing? | Cyber Crime | F.101Doxxing is one of the most insidious forms of cybercrime. It is widespread too. But what is doxing though? Learn how you can beat it—-Doxxing| Cyber Crime| Cyber Security| insidious forms| Online data| Social Media Posts| invasion of privacy| privacy| Top Headlines| World News| Latest News | Firstpost

    source

  • Cyber Guidance for Small Businesses – CISA

    An official website of the United States government
    Here’s how you know
    Official websites use .gov
    A .gov website belongs to an official government organization in the United States.
    Secure .gov websites use HTTPS
    A lock (A locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
    Search
    Cyber incidents have surged among small businesses that often do not have the resources to defend against devastating attacks like ransomware. As a small business owner, you have likely come across security advice that is out of date or that does not help prevent the most common compromises. For example, odds are that you have heard advice to never shop online using a coffee shop’s wi-fi connection. While there was some truth to this fear a decade ago, that’s not how people and organizations are compromised today. The security landscape has changed, and our advice needs to evolve with it.
    This advice is different.
    Below, we offer an action plan informed by the way cyber-attacks actually happen. We break the tasks down by role, starting with the CEO. We then detail tasks for a Security Program Manager, and the Information Technology (IT) team. While following this advice is not a guarantee you will never have a security incident, it does lay the groundwork for building an effective security program.
    Cybersecurity is about culture as much as it is about technology. Most organizations fall into the trap of thinking the IT team alone is responsible for security. As a result, they make common mistakes that increase the odds of a compromise. Culture cannot be delegated. CEOs play a critical role by performing the following tasks:
    A note on MFA: Multi-factor authentication (MFA) is a layered approach to securing your online accounts and the data they contain. It’s the idea that you need more than a password to keep your data and accounts safe. When you enable MFA for your online services (like email), you provide a combination of two or more authenticators to verify your identity before the service grants you access. Common forms of MFA are SMS text messages sent to your phone, 6-digit codes generated on a smartphone application, push notifications sent to your phone, and physical security keys.
    Using MFA protects your account more than just using a username and password. Users who enable MFA are MUCH less likely to get hacked. Why? Because even if one factor (like your password) becomes compromised, unauthorized users will be unable to meet the second authentication requirement ultimately stopping them from gaining access to your accounts.
    The Security Program Manager will need to drive the elements of the security program, inform the CEO of progress and roadblocks, and make recommendations. These are the Security Program Manager’s most important tasks:
    In addition to the advice here, we urge you to look at the information and toolkits available from our Cyber Essentials series to continue to mature your program.
    The top tasks for the IT lead and staff include the following:
    There are, of course, many other IT tasks that add to a good security program. While this list is not exhaustive it does contain the top actions you can take that addresses the most common attacks. 
    When security experts give cybersecurity advice, they usually assume you are only willing to make small changes to your IT infrastructure. But what would you do if you could reshape your IT infrastructure? Some organizations have made more aggressive changes to their IT systems in order to reduce their “attack surface.” In some cases, they have been able to all but eliminate (YES, WE SAID ELIMINATE!) the possibility of falling victim to phishing attacks. Sound interesting? Keep reading!
    One major improvement you can make is to eliminate all services that are hosted in your offices. We call these services “on premises” or “on-prem” services. Examples of on-prem services are mail and file storage in your office space. These systems require a great deal of skill to secure. They also require time to patch, to monitor, and to respond to potential security events. Few small businesses have the time and expertise to keep them secure.
    While it’s not possible to categorically state that “the cloud is more secure,” we have seen repeatedly that organizations of all sizes cannot continuously handle the security and time commitments of running on-prem mail and file storage services. The solution is to migrate those services to secure cloud versions, such as Google Workspace or Microsoft 365 for enterprise email. These services are built and maintained using world-class engineering and security talent at an attractive price point. We urge all businesses with on-prem systems to migrate to secure cloud-based alternatives as soon as possible.
    While all operating system vendors work to continuously improve the security of their products, two stand out as being “secure by design,” specifically, Chromebooks and iOS devices like iPads.
    Some organizations have migrated some or all their staff to use Chromebooks and iPads. As a result, they have removed a great deal of “attack surface,” which in turn makes it much harder for attackers to get a foothold. Even if an attacker were able to find a foothold on those systems as part of a ransomware attack, the data primarily lives in a secure cloud service, reducing the severity of the attack.
    Any form of MFA is better than no MFA. Any form of MFA (like SMS text messages, or authenticator codes) will raise the cost of attack and will reduce your risk. Having said that, the only widely available phishing resistant authentication is called “FIDO authentication.” When an attacker eventually tricks you into trying to log into their fake site to compromise your account, the FIDO protocol will block the attempt. FIDO is built into the browsers and smartphones you already use. We urge you to learn how FIDO resists phishing attacks.
    The combination of a cloud-hosted email service, secure-by-default devices, and FIDO authentication will dramatically raise the cost for attackers and will dramatically reduce your risk. It’s worth considering.
    In addition to those highlighted above, here are some additional resources available, at no cost, to help improve your cybersecurity.
    Stopransomware.gov
    As part of the whole-of-government approach to combating ransomware, CISA created StopRansomware.gov, a one-stop-shop of free resources for organizations of any size to protect themselves from becoming a victim of ransomware. If you have experienced a ransomware attack, we strongly recommend using the following checklist from our Ransomware Guide
    Regional Support
    Reach out to our Regional Team in your local area for tailored assistance.  Aligned to specific areas, the regions provide a range of cyber and physical services to support the security and resilience of critical infrastructure owners and operators and state, local, tribal, and territorial partners.
    Free Cybersecurity Tools and Resources
    CISA offers a list of free cybersecurity tools and services that serves as a living repository of cybersecurity services provided by CISA, widely used open-source tools, and free tools and services offered by private and public sector organizations across the cybersecurity community. 
    Cybersecurity Evaluation Tool (CSET)
    The Cybersecurity Evaluation Tool (CSET) is an open-source self-assessment tool designed for stakeholders to install on their endpoint device.  For those interested in using the tool or participating in CISA’s open-source community, visit https://github.com/cisagov/cset. To download the file, click https://cset-download.inl.gov/.
    Risk Management Considerations
    For businesses and organizations considering using a Managed Service Provider (MSP) for your security services, review CISA’s guidance on important risk management considerations.
    Cloud Security
    For businesses and organizations, considering using a Cloud Service Provider (CSP), review CISA’s guidance on cloud security.

    source

  • Dismal conviction rate in cyber crime cases, chargesheet couldn’t be filed in most instances: Rajasthan Govt data – The Indian Express

    The Rajasthan police failed to file a chargesheet in over half of the cyber crime cases in the state that came up in the last three years, data from the state Home Department has revealed.
    The Congress government led by Ashok Gehlot recently provided this information in reply to a question put up in the Assembly by BJP MLA from Kota South Sandeep Sharma.
    According to the reply, the Home Department, which is under CM Gehlot, has stated that in the past three years, 4,405 cases of cyber crime were registered but chargesheet was filed in only 1,443 cases.
    The data reveals that a final report has been submitted in 2,278 of these cases, which is more than 51 per cent of the total cases.
    Similarly, the state government stated that while 2,427 cases of online fraud were registered in the last three years, in 1,841 cases — which is 75 per cent of the total online fraud cases — a final report has been submitted and no chargesheet could be filed.
    In reply to another question by BJP MLA from Ajmer South BJP MLA Anita Bhadel, the Home Department stated that convictions from court have taken place in only 10 cases in the last four years, while the arrest of accused could not be made in 904 cases.
    Police say that technical challenges pose big hurdles in cracking cyber crime cases and arresting the accused.
    “When it comes to cyber fraud, at times when money gets deducted from a bank, and there is a delay in the complaint, it becomes very difficult to trace the account. We have managed to retrieve the money for the complainant in several online fraud cases. Last year we could recover around Rs 10 crore. But still, this is only 10 per cent of the amount cheated. This is a technical challenge,” Rajasthan ADG Crime Ravi Prakash Meharda told The Indian Express.
    Meharda added that cyber criminals often use new techniques, at times in sync with current happenings, to lure gullible people and cheat them by sending false links.
    “The government is opening cyber police stations in every district. There is a need for capacity building and training, which is being conducted. It is a process that will take time. At times, social media sites don’t share all information, which again results in a challenge for the police to provide all evidence to the court for ensuring conviction,” said ADG Meharda.
    New Zealand declares National State of Emergency as Cyclone Gabrielle causes havoc


    Deep MukherjeeDeep Mukherjee is a senior correspondent based in Jaipur. He covers Ra… read more

    source

  • Fortinet helps launch Cybercrime Atlas global knowledgebase – iTWire

    Equinix GXI EN Scale 728x90
    Leaderboard Small 2023
    Network and security product provider Fortinet has announced the launch of the Cybercrime Atlas, a joint initiative between it, Microsoft, PayPal, and Banco Santander to aid industry, law enforcement, and government agencies by providing a first-of-its-kind visibility to help take down cybercriminals and their infrastructure around the world.
    The Cybercrime Atlas was launched this month in Davos at the organisation’s Annual Meeting by the World Economic Forum (WEF) and is aimed to disrupt cybercrime at a global scale, by mapping and fighting the cybercrime landscape, and covering criminal operations, structures, and networks.
    FortiGuard Labs chief security strategist and VP of global threat intelligence Derek Manky said, “disrupting global cybercriminal organisations requires a global effort with strong, trusted relationships and collaboration across public and private organisations and industries. It is part of Fortinet’s mission to secure people, devices, and data everywhere, and Fortinet is proud to be one of the founding members of the World Economic Forum Centre for Cybersecurity and an active contributor as part of its Partnership against Cybercrime(PAC). The Cybercrime Atlas initiative is about driving real impact and is a coordinated effort to create a chain of disruption in the world of cybercrime. We are excited to continue our work with private and public sector leaders to help make our digital world a safer place.”
    Cybercrime impacts everyone, from individuals to multinational corporations, as well as governments and critical infrastructure. It causes immense damage, even if not always visible, to economies and societies. The Cybercrime Atlas was first conceptualised by the Forum’s PAC community, which has over 40 private and public sector members.

    The Cybercrime Atlas is a collaborative effort to build an action-orientated, global knowledge base​ of the cybercriminal landscape to enable mitigation and disruption of cybercrime. Building on the expertise of the Forum’s PAC, the Cybercrime Atlas initiative will provide a platform for leading cybercrime investigators, national and international law enforcement agencies, and global businesses to share knowledge, generate policy recommendations and identify opportunities for coordinated action to fight cyberthreats.
    The Cybercrime Atlas aims to build a comprehensive picture of the cybercrime landscape that covers criminal operations, shared infrastructure, and networks. The links between the information gathered about threat actors will help the security industry more effectively disrupt the cybercriminal ecosystem, more efficiently allocate resources in the fight against them, and make their unlawful efforts more cost prohibitive.
    The Cybercrime Atlas has benefited from a year of analysis into 13 criminal groups by specialised analysts and cybercrime investigators, using only publicly available information. The accumulated knowledge from the Cybercrime Atlas efforts will ultimately help to identify and disrupt the cybercrime ecosystem. The analysis will shed light on cybercriminal artifacts to aid industry, law enforcement, and government agencies to create a chain of disruption. The approach and initial findings of the group have been welcomed by law enforcement agencies. The uncovering of these non-traditional artifacts will help aid in the capture and successful prosecution of cybercrime gang members.
    Fortinet’s FortiGuard Labs’ leadership in the threat intelligence community over the last decade has helped take the fight to adversaries and improve protections for customers, partners, and governments around the world. By sharing threat intelligence and working with other threat intelligence organisations, it helps improve protections for customers and enhances the effectiveness of the entire cybersecurity industry.
    FortiGuard Labs is committed to partnership and cooperation with global law enforcement, government organisations, and industry organisations. In addition to the work with WEF Centre for Cybersecurity and being a contributor to PAC, Fortinet also invests meaningful resources in further global partnerships, including the MITRE Engenuity Center for Threat Informed Defense (CTID). Fortinet is also a long-standing member of the NATO Industry Cyber Partnership (NICP), is an active contributor and member of INTERPOL Gateway, is a founding member of the Cyber Threat Alliance (CTA), and more.
    International Criminal Police Organisation INTERPOL secretary-general Jürgen Stock, said, “this initiative underlines the need for an enhanced multi-sector approach to combat the increasing cybercrime threat. A global solution must include private sector insights to enable law enforcement to prevent, detect, investigate and disrupt cybercrime.”
    Microsoft president and vice-chair Brad Smith said, “Cybercriminals work in the shadows to exploit vulnerabilities and inflict attacks. The Cybercrime Atlas provides an effective forum that brings the public and private sectors together to share and put data to use to disrupt cybercrime quickly, and at scale.”
    World Economic Forum managing director Jeremy Jurgens said, “The Cybercrime Atlas is a collaborative research initiative that gathers and collates information about the cybercriminal ecosystem and major threat actors operating today. The insights generated will help promote opportunities for greater cooperation between the private sector and law enforcement to address cybercrime.”

    DOWNLOAD NOW!

    PROMOTE YOUR WEBINAR ON ITWIRE

    It’s all about Webinars.

    Marketing budgets are now focused on Webinars combined with Lead Generation.

    If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

    The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

    Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinars and campaigns and assistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

    We look forward to discussing your campaign goals with you. Please click the button below.

    MORE INFO HERE!

    MORE INFO HERE!

    David has been computing since 1984 where he instantly gravitated to the family Commodore 64. He completed a Bachelor of Computer Science degree from 1990 to 1992, commencing full-time employment as a systems analyst at the end of that year. David subsequently worked as a UNIX Systems Manager, Asia-Pacific technical specialist for an international software company, Business Analyst, IT Manager, and other roles. David has been the Chief Information Officer for national public companies since 2007, delivering IT knowledge and business acumen, seeking to transform the industries within which he works. David is also involved in the user group community, the Australian Computer Society technical advisory boards, and education.
    Election propaganda!!!!!
    What a rip off!!!! Backed by a dubious survey by the promoters themselves.I say liar, liar pants on fire.I expect[…]
    This wouldn’t be a self serving report from a provider of anti-malware VPN programs would it by any chance?Are they[…]
    Many years ago there was a guy called Bob Ansett who started a car rental company. He required that phone[…]
    The article lists external factors — what other people do to you. However, internal factors must be considered. That is[…]

    source

  • White House Committee Advocates Collaboration, Consensus in … – Nextgov

    dkfielding/Getty Images

    By Alexandra Kelley
    Consistent cybersecurity standards and presidential action are two of the several recommendations released today by the White House’s National Security Telecommunications Advisory Committee in a working draft document that looks to strengthen the U.S. communication industry’s cybersecurity posture in the face of increasing digital attacks.
    First reported by the Washington Post, the NSTAC developed a series of draft recommendations, following a request from the Executive Branch back in May 2021 to help establish a stronger national foundation of cybersecurity preparedness. This latest report focuses on previous key findings in the first three reports and spotlights challenges organizations have in adapting to increasing federal cybersecurity regulations. 
    A major theme for the NSTAC’s final report is uniformity in cybersecurity standards and requirements for critical infrastructure technologies. 
    “ICT [information and communication technology] standards for security requirements and assurance approaches developed with industry, regulators and other experts collaborating across sectors and regions are reflective of global best practices,” the report reads. “Alignment with consensus standards will deconflict, simplify and align regionally developed compliance solutions so assurance activities can be done efficiently once and reused globally.”
    Sector-specific regulations, differing general uses and resource constraints are the primary challenges to establishing universal security requirements for ICT systems.
    “These requirements often result in an increased need for organizations to prove that they are meeting their cybersecurity requirements through different assurance or certification programs, but these programs often end up diverging across sectors or countries resulting in additional cost without adding security benefit,” the report states. 
    Chief recommendations to help combat the variety of cybersecurity standards include more visible and robust actions to promote cybersecurity requirements from the White House, as well as collaboration between industry and government. Intergovernmental agency communication was also listed as an area where cybersecurity requirements consensus can falter. 
    To help combat these regulatory discrepancies, the NSTAC recommended establishing a new government office within CISA dubbed the Office of Cybersecurity Regulatory Harmonization, whose primary function would be to establish expertise on cybersecurity regulations and promote regulatory uniformity in standards development and adoption.
    “An opportunity exists for CISA to establish and resource an office with the primary mission of advancing cybersecurity regulatory harmonization and tasking it with studying existing regulations and developing resources that could define how to create harmonized regulations,” the report notes. 
    The advisory committee also noted the importance of keeping post-quantum cryptography as a priority area for cybersecurity requirements.
    “The president should direct CISA and NIST to form a large-scale partnership inclusive of the private sector, public sector and academia focusing on transition to post quantum cryptography…with the goal of speeding up the adoption and deployment of PQC,” the report said. It further clarified that post-quantum cryptographic standards should be based off of the NIST Cryptographic Standards and Guidelines Development Process, and specifically named the Department of Commerce and Department of Homeland Security as two agencies that should be tasked with creating incentives for mass adoption of quantum-resistant cryptography. 
    Fortifying the nation’s cybersecurity defenses has been a priority within the Biden administration, especially amid the onslaught of foreign and domestic cyber attacks targeting critical infrastructure networks in sectors like energy and health care.
    In 2021, President Joe Biden signed an executive order to assess and improve the federal cybersecurity defense protocols and foster better collaborative efforts for software security. 
    The White House is also expected to release a new National Cyber Strategy in the wake of escalating cyber attacks and threats from emerging technologies.
    NEXT STORY: House Dems Call for Info on Racially-Motivated Cyber Attacks
    Do Not Sell My Personal Information
    When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.
    Manage Consent Preferences
    Strictly Necessary Cookies – Always Active
    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
    Sale of Personal Data, Targeting & Social Media Cookies
    Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link
    If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.
    Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.
    Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.
    If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

    Save Settings

    Cookie List
    A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:
    Strictly Necessary Cookies
    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
    Functional Cookies
    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
    Performance Cookies
    We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.
    Sale of Personal Data
    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
    Social Media Cookies
    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
    Targeting Cookies
    We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.
    Help us tailor content specifically for you:

    source