Category: Uncategorized

  • Kaspersky Study: Dark Web Ads Offer Jobs, Careers in Cyber Crime – Channel Futures

    Shutterstock
    For developers, designers, testers and others displaced by cybersecurity layoffs, there’s always work in cyber crime, according to a new Kaspersky study.
    The Kaspersky study examines the dark web job market. Kaspersky analyzed 200,000 employment ads about long-term or full-time jobs from 2020 through June of 2022.
    To be clear, Kaspersky isn’t recommending these ads to jobseekers. It tracked this data to keep tabs on the bad guys.
    Job requirements included creating malware and phishing pages, compromising corporate infrastructure, hacking web and mobile applications, and other responsibilities. The median levels of pay offered to IT professionals varied between $1,300 and $4,000 per month.
    Some 41% of ads were posted in 2020, with activity peaking in March. That’s possibly because of a pandemic-related income drop experienced by parts of the population.
    Polina Bochkareva is a security services analyst at Kaspersky.
    “IT headhunting is one of the numerous topics which is constantly discussed on the dark net,” she said.  “Nowadays, tracking cybercriminals’ interests and continuous analysis of their activities is vital for companies that want to proactively respond to cyberattacks and keep their information security at the highest level. The more you know about your adversary, the better prepared you are.”
    Scroll through our slideshow above for more from the Kaspersky dark web job market study.
    -or-
    Log in with your Channel Futures account
    Alternatively, post a comment by completing the form below:
    Your email address will not be published. Required fields are marked *








    .@CiscoPartners reportedly saw their inventories decline due to supply chain improvements. dlvr.it/SjXSq3 https://t.co/EjGAcUAtAP
    Channel Futures has opened the application process for the global 2023 #MSP501 along with nominations for this year… twitter.com/i/web/status/1…
    .@DocuSign latest tech company to announce #layoffs, cutting 700 workers. dlvr.it/SjX8bT https://t.co/sOPVLtgT2y
    .@hirevue: job market remains strong for tech workers despite widespread #layoffs. dlvr.it/SjX6jZ https://t.co/UFV2NKmKWO
    The Channel Futures #MSP501 application is now open for 2023! 🎉 After a healthy review & update, this year’s survey… twitter.com/i/web/status/1…
    We took a deep look into the events leading up to the sale of one of the channel’s oldest tech services distributor… twitter.com/i/web/status/1…
    .@WekaIO‘s new global partner program helps resellers take advantage of the #WEKA data platform technology.… twitter.com/i/web/status/1…
    [email protected] users now have more #cloud cost management options. dlvr.it/SjTmYp https://t.co/UCI9eCgfuC
    The industry's largest and most comprehensive partner awards program.
    Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.
    Get the latest information on the next industry-leading Channel Partners event.
    Educational slide shows and images from live events.
    Want to reach our audience? Access our media kit.

    source

  • DCMS cyber security newsletter – February 2023 – GOV.UK

    We use some essential cookies to make this website work.
    We’d like to set additional cookies to understand how you use GOV.UK, remember your settings and improve government services.
    We also use cookies set by other sites to help us deliver content from their services.
    You can change your cookie settings at any time.
    Departments, agencies and public bodies
    News stories, speeches, letters and notices
    Detailed guidance, regulations and rules
    Reports, analysis and official statistics
    Consultations and strategy
    Data, Freedom of Information releases and corporate reports
    Published 7 February 2023

    © Crown copyright 2023
    This publication is licensed under the terms of the Open Government Licence v3.0 except where otherwise stated. To view this licence, visit nationalarchives.gov.uk/doc/open-government-licence/version/3 or write to the Information Policy Team, The National Archives, Kew, London TW9 4DU, or email: psi@nationalarchives.gov.uk.
    Where we have identified any third party copyright information you will need to obtain permission from the copyright holders concerned.
    This publication is available at https://www.gov.uk/government/publications/dcms-cyber-security-newsletter-february-2023/dcms-cyber-security-newsletter-february-2023
    Finding out more about how other nations are approaching their cyber security policy is a great way to learn. That is why I was honoured to give a speech at the UK Gulf Women in Cybersecurity Fellowship last month. The Fellowship supports women cybersecurity professionals across the Gulf by providing positive female role models, promoting peer-to-peer learning and strengthening UK Gulf cooperation and partnerships. It was great to meet so many inspiring women who are making a career in this sector.
    These events and connections are essential to the success of our industry. In January Plexal hosted a showcase day for companies taking part in our Cyber Runway programme. The event gave the businesses the opportunity to pitch to industry experts and investors in order to receive feedback on their product pitches and business strategy. I would encourage you to also read Plexal CEO Andrew Roughan’s new blog where he discusses the importance of the cyber ecosystem and how startups can gain access to NCSC experts by applying for the NCSC For Startups programme in 2023.
    There is still time to register to attend our CyberASAP Year 6 Cohort Demo Day on Wednesday 22 February, where fifteen UK academic teams will be showcasing their cyber security prototypes with promising commercial potential. The teams are particularly interested in meeting investors and potential commercial collaborators.
    Finally, I would like to draw attention to the Department for International Trade’s North American Roadshow, which is visiting 12 cities across the UK between 27 February and 10 March. This is a great opportunity for businesses to learn about exporting to Canada and the USA with the DIT team and a range of experts.
    Erika Lewis
    Director, Cyber Security and Digital Identity
    On Wednesday 22 February CyberASAP, DCMS’s pre-seed accelerator, will be showcasing the 15 companies on the current cohort of the programme at Level 39, Canary Wharf, London. This is an opportunity to preview their proof of concepts, meet the teams and learn more about new products and services which could be entering the UK cyber market.
    The companies cover a range of sectors including smart home IoT, secure railways systems and protecting people online.  Registration is now open and the participating companies are particularly keen to speak to investors and potential commercial collaborators.
    The government is asking for industry views on software resilience and security for businesses and organisations. Recent incidents such as the 2020 SolarWinds attack and the discovery of the Log4j vulnerability, have demonstrated the widespread impact which insecure software can have on businesses, charities, educational institutions and other organisations. Strengthening the resilience of software is an important part of strengthening organisational cyber resilience more widely, so the government is seeking views on software cyber risk and where government action might help to mitigate them.
    The deadline to provide views is Monday 1 May and you can respond to the software security consultation here.
    The UK Cyber Security Council is partnering with CREST and Cyber Scheme to introduce a professional standard for security testing.
    The launch of the Security Testing partnership forms part of the Council’s work to introduce a universally recognised professional standard across the cyber industry. Ultimately, the professional standard will allow practitioners to achieve recognition at either Associate, Principal or Chartered level across 16 specialisms.
    CREST, an international not-for-profit membership body for the cyber security industry, and The Cyber Scheme, a NCSC accredited assessment and training provider for security testing practitioners, have partnered with the Council to deliver the programme.
    As part of National Apprenticeship Week, DCMS has been hearing from cyber security businesses and the apprentices they hire to learn about their experiences. One such business is KryptoKloud, a Lincoln based cyber security and intelligence company that currently hires five cyber security analyst apprentices from Lincoln College. 
    Ben Smith, one of KryptoKloud’s apprentices explained, “as a Lincoln College apprentice and KryptoKloud employee I have the best of all worlds: work wise, college wise and socially. The ability to live and commute from home to college and work, coupled with being able to work locally in a great modern environment with fantastic opportunities is simply amazing.”
    “The operational and work-based experience that I have gained has put me into an ideal position upon which to further develop my career and fulfil my future aspirations to be a Chief Operations or Information Officer or indeed to successfully manage my own cyber security company. Finally, when I finish, not only will I have experience and qualifications, but I will also have the freedom to progress without huge debts hanging over me.” 
    To find out how an apprenticeship could help your business, visit the Apprenticeships website.
    In January companies taking part in Cyber Runway, the DCMS-funded accelerator for UK cyber sector businesses, took part in a showcase event at Plexal. The companies were able to pitch to both investors and business experts to gather feedback on their business, strategy, product and next steps. Dell Technologies and VMware sponsored the Investor Feedback Room and Lloyds Innovation Lab also hosted a room to hear from the companies.
    Applications to join the Digital Security by Design (DSbD) Technology Access Programme are now open. Participating companies are supported by a wide network of professionals from Arm and the University of Cambridge to experiment with groundbreaking cyber security technology that has the potential to block up to two thirds of all memory related cyber attacks. A £15,000 grant is also available for companies with less than 250 employees to enable them to take part in the programme.
    The Cyber Essentials technical requirements have been updated in advance of the changes taking effect from April 2023. As part of a regular review of the scheme’s technical controls, the National Cyber Security Centre has carried out a “light touch” update to ensure it continues to help UK organisations guard against the most common cyber threats. The changes include new details around user devices, firmware, device unlocking and malware protection. This latest update (version 3.1) will take effect from 24 April 2023.
    The scheme has now awarded 116,194 certificates to businesses and organisations, including 31,353 awarded during 2022 and a record 3,338 certificates awarded during the month of December 2022. For more information on Cyber Essentials, please visit the NCSC website.
    In February and March the Department for International Trade North America is visiting  twelve cities across the UK, where they will offer presentations and interactive sessions to help you understand the opportunities in Canada and the USA. The DIT team and a range of experts will provide key information and guidance to help you on your export journey.
    You can register for a single session or a full day in a range of locations from London to Glasgow.
    UK Innovation and Tech Show –
    March 15, Brussels
    Organised by the UK Mission to the EU, the UK Innovation & Tech Show brings together innovators, companies and thought leaders from across the UK and Europe for a stunning exhibition and a series of policy discussions around cutting edge technologies.
    To be held in Brussels on Wednesday 15 March the event will include an exhibition, breakout discussions on the policy and ethics of emerging technology, a live hackathon demonstrating the potential of AI, and an inspiring opening keynote speech from the Royal Society Professor for Public Engagement in Science, Brian Cox.
    You can register for free tickets online and there are still a few spaces available for exhibitors who want to showcase their hardware and technology. Exhibiting is free and assistance is potentially available for travel and accommodation costs for SMEs.
    Does your corporation want to have a human impact in cyberspace? The CyberPeace Builders is a unique network of expert volunteers assisting humanitarian non-government organisations to manage their cyber security so they can maintain their operations. 
    CyberPeace Builders are currently looking for organisations to support their work by providing volunteer time, sharing information about their free services for NGOs or funding their work.
    Don’t include personal or financial information like your National Insurance number or credit card details.
    To help us improve GOV.UK, we’d like to know more about your visit today. We’ll send you a link to a feedback form. It will take only 2 minutes to fill in. Don’t worry we won’t send you spam or share your email address with anyone.

    source

  • DHS Expands Abraham Accords to Cybersecurity – Homeland Security

    An official website of the United States government
    Here’s how you know
    Official websites use .gov
    A .gov website belongs to an official government organization in the United States.
    Secure .gov websites use HTTPS
    A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
    TEL AVIV – This week, Department of Homeland Security (DHS) Under Secretary for Policy Robert Silvers visited Israel to deliver a keynote address at the CyberTech Global Conference and to meet with representatives from Israel and key Middle Eastern nations, in collaboration with the Department of State. Under Secretary Silvers met with President of the State of Israel Isaac Herzog, Israel National Cyber Directorate Director General Gaby Portnoy, Head of the UAE Cyber Security Council H.E. Dr. Mohamed Al Kuwaiti, CEO of the Bahrain National Cyber Security Center Shaikh Salman bin Mohamed bin Abdulla al-Khalifa, and Director General of Morocco’s Directorate General of Information Systems Security Brig. General El Mostafa Rabii to discuss the expansion of the Abraham Accords to include shared cybersecurity priorities and enhancing regional cooperation.

    “The expansion of the Abraham Accords into cybersecurity is advancing our defensive operational collaboration with Israel and our partners across the Middle East to protect our critical infrastructure,” said DHS Under Secretary for Policy Robert Silvers. “Together we can harness our capabilities to address the most pressing cybersecurity challenges to drive security and resilience.”

    At the CyberTech Global Conference, Under Secretary Silvers delivered a keynote address emphasizing the importance of cohesive private sector engagement, international cooperation, and the U.S.-Israel relationship to address shared cybersecurity threats. He also participated in the first ever public dialogue among U.S., Israeli, Emirati, Bahraini, and Moroccan cybersecurity officials to build on the Abraham Accords and normalization agreements. 

    The Department’s cybersecurity engagement in the Middle East builds on a long history of defense and security cooperation between the U.S. and partners in the region. Its work to expand the Abraham Accords and normalization agreements is focused on network defense and cybersecurity collaboration to address shared threats, including nation state targeting of critical infrastructure and widespread ransomware attacks. DHS and its Middle East partners commit to sharing information about cyber threats, incidents, and approaches to these challenges to increase global cybersecurity and resilience.     

    Partnering with the Department of State, Under Secretary Silvers engaged with Israeli leaders and emphasized the need for Israel to meet all Visa Waiver Program (VWP) requirements to become eligible for the program and thereby enhance U.S.-Israel security and travel partnership. Under Secretary Silvers met with Speaker Amir Ohana regarding VWP-related legislation and National Security Advisor Tzachi Hanegbi to discuss the significant amount of work that must be accomplished in a short amount of time for Israel to be eligible to achieve entry into the program.

    ###
     
    DHS.gov
    An official website of the U.S. Department of Homeland Security

    source

  • A National Science Foundation grant will help USF recruit students … – WUSF Public Media

    This year, the National Science Foundation is providing more than $29 million in new funding to support the development of a cybersecurity workforce.
    “Cybersecurity is one of the most important issues confronting society in the information age,” said NSF Director Sethuraman Panchanathan. “As our reliance on the national cyberspace evolves, so does the complexity of the cyber threats we face. It is imperative that we support the development of a strong cybersecurity workforce to ensure we can all benefit from secure and trustworthy cyberspace.”
    In a press release, the NSF said the money is to address the “unique challenges of recruiting and retaining cybersecurity professionals to work in careers with local, state, federal or tribal governments.”
    That includes more than $4 million in funding to the University of South Florida, home to Cyber Florida: The Florida Center for Cybersecurity and the Global and National Security Institute (GNSI).
    That money will provide scholarships and support to at least 28 domestic graduate and undergraduate students, who will work with and be mentored by professionals from Cyber Florida and GNSI.
    USF calls the new program CREST, which stands for Cybersecurity Research in Education for Service in Government.
    The students agree to work in cybersecurity for a federal, state, local, or tribal government organization for the same period of time for which they received the scholarships.
    Lead USF researcher Srinivas Katkoori, an associate professor of computer science and engineering, said the COVID-19 pandemic likely accelerated the need for people to work in cybersecurity.
    “Because a lot of things are being done digitally, there are more security attacks and vulnerabilities. So absolutely, the pandemic I think has, in some sense, definitely highlighted the problems and also probably opened more vulnerabilities which we are trying to address,” he said.
    According to a recent Cybersecurity Ventures report, the global annual cost of cybercrime is expected to top $8 trillion this year.
    And Security Intelligence, a thought leadership blog run by IBM Security, reported that ransomware attacks alone accounted for nearly $1.2 billion in costs to U.S. financial institutions in 2021.
    While cybersecurity may not be top of mind for everyone, Katkoori said it’s a part of our everyday lives.
    “We are living in digital age, where we rely more and more on, cyberspace for all our professional and personal needs,” he said, whether we’re banking or buying something online or reaching out to friends on social media.
    Katkoori added that USF is developing a website to recruit students for the CREST program, with some of the focus being on attracting individuals who may be less likely to work in the engineering or IT fields, like women or veterans.
    USF joins 89 academic institutions that are already part of the NSF’s CyberCorps: Scholarship for Service program in 39 states, the District of Columbia and Puerto Rico.

    source

  • Global Catastrophic Cyber Event Coming in 2 Years, Report Says – Popular Mechanics

    Thought you should know.
    The 2023 World Economic Forum (WEF) in Davos, Switzerland, has filled us with lots of uplifting predictions, like how companies will soon decode our brain waves. The latest warns of a global catastrophic cyber event in the very near future.
    “The most striking finding that we’ve found,” WEF managing director Jeremy Jurgens said during a presentation highlighting the WEF Global Security Outlook Report 2023, “is that 93 percent of cyber leaders, and 86 percent of cyber business leaders, believe that the geopolitical instability makes a catastrophic cyber event likely in the next two years. This far exceeds anything that we’ve see in previous surveys.”
    Add in the extreme unpredictability of these events—Jurgens cited a cyberattack recently aimed at shutting down Ukranian military abilities that unexpectedly also closed off parts of electricity production across Europe—and the global challenges are only growing.
    “This is a global threat,” Jürgen Stock, Secretary-General of Interpol, said during the presentation. “It calls for a global response and enhanced and coordinated action.” He said the increased profits that the multiple bad “actors” reap from cybercrime should encourage world leaders to work together to make it a priority as they face “new sophisticated tools.”
    One country that recently saw a massive cyberattack, Albania, is now working with larger allies in warding off the criminals, serving as a laboratory of sorts for folks to realize what is coming.
    Edi Rama, Albania’s prime minister, spoke during the presentation, saying that the growth of the cybercrime industry—from $3 trillion in 2015 to an expected $10.5 trillion in 2025, Rama says during the presentation—means that if cybercrime was a state, it would be the third largest global economy after the U.S. and China.
    That means the crime coming could truly be catastrophic.
    Rama cited the global response to COVID-19 and said a cyberattack could be much more substantial:
    Tim Newcomb is a journalist based in the Pacific Northwest. He covers stadiums, sneakers, gear, infrastructure, and more for a variety of publications, including Popular Mechanics. His favorite interviews have included sit-downs with Roger Federer in Switzerland, Kobe Bryant in Los Angeles, and Tinker Hatfield in Portland. 

    Superhuman Algorithms Could ‘Kill Everyone’
    WiFi Signals Can See People Through Walls
    The Elon Musk Doxxing Drama on Twitter: Explained
    Should You Still Trust Password Managers?
    We Can Stop AI from Taking Over (Maybe)
    Bruce Willis Didn’t Sell Out to a Deepfake Firm
    Alexa Can Speak in Your Dead Grandmother’s Voice
    Why Cybersecurity Experts Never Sleep
    Why Internet Explorer Is Dead After 27 Years
    First Look: Wyze CamPlus Pro Home Security System
    How an AI System Protects Against Eavesdropping
    Let Your Inner Superhero Update Your WiFi Name
    A Part of Hearst Digital Media
    Gear-obsessed editors choose every product we review. We may earn commission if you buy from a link.
    ©Hearst Magazine Media, Inc. All Rights Reserved.

    source

  • Southern Arizona’s largest school district hit by cyber attack – KOLD

    TUCSON, Ariz. (KOLD News 13) – Over the weekend, the Tucson Unified School District was hit by computer hackers who are now holding its data hostage.
    On Monday, Jan. 30, it forced schools to do work offline.
    Early Monday, staff across the district found a letter in their printers. The letter said the system was hit by Royal ransomware and the district’s data was allegedly encrypted and copied.
    13 News showed this letter to an expert, and he said this was an issue that’s being seen more often.
    “The group itself that had sent this letter has actually been around about a year and they’ve been ramping up a lot of their activity in the United States,” said Andy Taylor, CEO of TechTalk Radio.
    A ransomware attack like this one could’ve spread through TUSD’s system by someone simply clicking on an untrustworthy link, according to Taylor.
    The hackers claimed the district’s data has been allegedly copied and can be published online, where anyone will be able to see it.
    “There’s always the chance that this information can end up in the wrong hand,” Taylor said. “Now, in the case of Royal and the ransomware, most of the time they’re just looking for a quick payout. They’re hoping that someone will pay them the money and of course, decrypt that info. That’s what happens in a ransomware attack.”
    And that’s exactly what the letter said… that Royal was offering them a “unique deal” to get the data decrypted, restored and kept confidential. Right now, Taylor said TUSD is likely working to find the source of the issue.
    ″My biggest concern is now they’re without their systems and that can affect of course their instruction. They’ve got a day, maybe two days, some of these depending on the infection, of course they’re going through and determining that now, this could last up to months,” he said.
    In an email and voicemail sent out to staff and families, the district said a cyber security incident happened on its network and that internet and network services are down as the matter is investigated.
    “We are actively working to correct the issue and have notified all the appropriate authorities. All TUSD schools will continue their regular school schedule,” the district said.
    Taylor has a friend who works for one of the schools in the district. She also sent him the letter from Royal. He said Monday looked a little different for the teachers and students.
    “Pretty much everything is stopped right now. Education is going old school. She has turned it into an instruction on how (it was) before the internet,” he explained.
    Andy Taylor said a ransomware attack like this is good time to focus on safe practices so this doesn’t happen to you. This includes running updates, not clicking on links and questioning everything.
    Copyright 2023 KOLD News 13. All rights reserved.

    source

  • PayPal Data Breach Confirmed to Impact Thousands of Users – Tech.co

    There’s nothing worse than a payment app getting hacked, but that’s exactly what’s happened, as PayPal confirmed that it had experienced a data breach affecting tens of thousands of users.
    Security breaches are certainly nothing new to online users. Strong passwords and multifactor authentication may help, but companies with lax security continue to drop the ball and user information is often at risk.
    Unfortunately, payment platform PayPal has fallen victim to a security breach itself, and the information leaked is a lot more serious than your run of the mill hack.
    Verifying
    Don’t miss out on the top business tech news with Tech.co’s weekly highlights reel
    PayPal users might want to take a quick glance at their accounts to make sure nothing is askew. In a notice from PayPal, the company warned users “about an incident” that “may have impacted their PayPal accounts.”
    “During this time, the unauthorized third parties were able to view, and potentially acquire, some personal information for certain PayPal users.”
    The personal information in question included usernames, addresses, Social Security numbers, individual tax identification numbers, and birth dates, which is some considerably valuable data. However, PayPal remains confident that the information was merely vulnerable and not necessarily obtained by third party hackers.
    “We have no information suggesting that any of your personal information was misused as a result of this incident, or that there are any unauthorized transactions on your account.”
    No information is certainly better than bad information, but PayPal users will have to make do with the potential that their personal data is somewhere it’s not supposed to be.
    Breaches like the one PayPal just experienced are far too common in the tech industry, but unfortunately, there isn’t much you can do to protect yourself beyond exclusively using services that make a firm commitment to security.
    However, there are plenty of other ways you can make sure your online behavior isn’t opening you up to some kind breach or hack. Password managers are the best place to start, as they keep your first line of defense strong, even offering passwordless options in some cases.
    If you want to take it to the next level, VPNs and antivirus software can make sure your online activity is protected and safe from malware and other nefarious systems online. Generally speaking, though, as long as you’re vigilant and don’t click on too many random links across the web, you should be fairly safe in the eyes of the average hacker.
    Verifying
    We’re sorry this article didn’t help you today – we welcome feedback, so if there’s any way you feel we could improve our content, please email us at contact@tech.co
    Conor is the Lead Writer for Tech.co. For the last six years, he’s covered everything from tech news and product reviews to digital marketing trends and business tech innovations. He’s written guest posts for the likes of Forbes, Chase, WeWork, and many others, covering tech trends, business resources, and everything in between. He’s also participated in events for SXSW, Tech in Motion, and General Assembly, to name a few. He also cannot pronounce the word “colloquially” correctly. You can email Conor at conor@tech.co.
    As with any generation, there’s no single hive-mind opinion…
    Apple, Meta, and Twitter have all disclosed cybersecurity…
    The affordable VPN has proven that its no-log policy is…
    All three MailChimp breaches in the past 12 months have…
    © Copyright 2023

    source

  • The H & 5 Ws of cybercrime & security – Times of India

    We use cookies and other tracking technologies to provide services in line with the preferences you reveal while browsing the Website to show personalize content and targeted ads, analyze site traffic, and understand where our audience is coming from in order to improve your browsing experience on our Website. By continuing to browse this Website, you consent to the use of these cookies. If you wish to object such processing, please read the instructions described in our Cookie Policy / Privacy Policy.
    Interested in blogging for timesofindia.com? We will be happy to have you on board as a blogger, if you have the knack for writing. Just drop in a mail at toiblogs@timesinternet.in with a brief bio and we will get in touch with you.
    Mr Yashasvi Yadav is an IPS officer of 2000 batch and is presently posted as Special IGP Maharashtra Cyber Department, which is the nodal agency for cybercrime and related mat … MORE
    Cybersecurity: An all encompassing article which lucidly expounds on various facets of cyber security and answers six basic questions, which clarify the whole gamut of issues (A to Z) relating to cyber security in an insightful, non-technical manner, easily understandable to all readers.
    WHO – The victims
    In contemporary times, technology is omnipresent evident in a world where every day is a technological miracle, where internet of things (IOT)is a welcome convenience. While driverless cars, clone armies of super human robots, money transfers at the click of the mouse, smart homes and social media obsession have brought about a revolution and transformed the planet into an unrecognisable place in the last five years, cybercrime has emerged as an organised well funded enterprise. It is appropriately called the ‘arms race’ of the 21st century. It is remarkable that in India there are incredibly more than 700 million smart phone users. In this backdrop cyber security has become an iconic issue and hence the fast emerging problem of cybercrime impinges on not only the netizens but practically everybody on the planet earth. Techno-savvy corporates or students doing online classes or bureaucrats dealing with national security or even technologically illiterate senior citizens, the monster of cyber-crime impacts everybody in a very significant manner. Online frauds, Data theft, ransomware, invasion of privacy and even cyber attacks on critical infrastructure of nations makes it a very significant issue affecting all and sundry.
    WHAT – The contours of cybercrime
    The new age cybercrime has surpassed USD 6 trillion in revenues and damages, catapulting it as the top organised crime syndicate globally, easily surpassing crime syndicates like narco-trafficking and counterfeiting . Hence, we are dealing with a menace that is not merely sporadic but has transformed into a well funded enterprise operating transnationally in a borderless world. The range of damages that cyber crime or lack of cybersecurity causes are humongous. In modern times, data is called ‘the new oil’and hence data theft is one of the most prevalent forms of cybercrime. This data is then manoeuvred and used as a raw material to launch a variety of cyber attacks like phishing attacks, online financial frauds like credit card frauds, sextortion, ransomware attacks, introducing malware to cause breach of privacy, Advanced Persistent Threat to critical infrastructure and national security apparatus to grave form of cyber terrorism, which may include causing electricity outages, cyber attack on water purification plants and on railway signalling systems et cetera. Thus the impact of cybercrime is immense and across the spectrum. Not only petty Online scams but cyber terrorism impacting national security and cyber warfare are real dangers which need to be tackled urgently.
    WHEN- The monster strikes
    The threats to cyber security is an ongoing continuous problem gathering momentum with every passing day. While internet was born in late 1960s as ARPANET, a small network of government computers. It has metamorphosed into ubiquitous and all pervasive phenomenon.The world of cybercrime too has massively spread its tentacles. The scary part is that while analysing the issue of cyber threats, at this very moment ,innumerable well funded groups of cyber criminals and hackers are fervently trying to unearth ‘zero day’ vulnerabilities to scam, dupe and cause malfunctioning of computer systems. The most alarming aspect of vulnerability of cyber security is that the cyber menace is transforming rapidly into nefarious form of cyber terrorism,where even national security or lives of citizens may come under threat.
    WHERE – The playfield
    In modern times, technology is omnipresent and hence threat to cyber security is very real and all pervasive. Cybercrime threatens every thing from smartphones to bank accounts to computer controlled pacemakers to nuclear reactors and even national security. cybercrime is appropriately called the arms race of the 21st century, where there is a mad rush for unearthing zero day(unreported) vulnerabilities and exploiting them with the anonymity afforded by darknet or the onion routers. Thus,all information technology and communication systems are vulnerable to the threat of cybercrime and proper cyber security audits and hardening of systems is urgently needed.
    WHY – The raison d’etre
    With technology creeping in all facets of our existence and providing exemplary solutions to myriad of persistent problems. It is no wonder that cyber crime too is correspondingly getting emboldened and has redefined landscapes. While Internet Of Things (IOT), smart homes, driverless cars, E governance, digitalisation of records and transparency afforded by smart governance is praiseworthy , threat to cyber security is a massive concomitant danger. Cybercrime is no longer perpetrated by lone computer savant camouflaged in A hoody . It is business, a parallel economy worth trillions of USD. It is preferred and becoming prevalent because of low entry costs, technology advances are so quick that security agencies are not able to keep pace. The risk of getting caught is minimised by techniques of proxy bouncing and use of virtual private networks VPN‘s, which make the attack appear originating from a country like Iran or North Korea, which are shrouded in secrecy. Owing to the aforesaid reasons cybercrime has emerged as an all pervasive , highly lucrative enterprise with low risk and high returns.
    HOW – The unravelling
    Cybercrime re-models with blitzkrieg pace into darknet crimes where one can hire a contract killer or buy and sell narcotics with anonymity , ransomware where data of an agency is surreptitiously encrypted and ransom demanded in crypto currency, man in the middle attacks, sextortion, social online grooming of children, child pornography, Jamtara styled online financial frauds, spoofing, scamming, botnet attacks, skimming attacks,phishing and vishing, attacks on critical infrastructure by state actors or even deep fake and deep nude attacks. It is obvious that the threat to cyber security is veritable and needs to be addressed urgently. The first step towards mitigation of the threat is to appreciate that it is becoming stronger by the day and find countermeasures to make it ineffective. It is ironical that still policy makers are blissfully unaware of the Frankenstein‘s monster inspite of cyber attacks occurring with alarming regularity across the globe, cyber-heist on banks, cyber attacks on critical infrastructure, cyber-warfare and invasion of privacy is causing havoc with impunity. It is high time that have become sensitive to this burgeoning problem and immediately start the process of hardening of our information and technology systems. Awareness must be generated to undertake cyber audit measures like updation of firewalls, air gapping of servers, cyber hygienic behavior and awareness about possible cyber attacks. It is imperative that security agencies too get their act together and fight cybercrime in a sincere and concerted manner, with international cooperation and upgradation of resources, tools and skilled manpower.
    Request you to lodge online complaint on https://cybercrime.gov.in/  portal & also visit the nearest police station along with a copy of the online complaint generated on the “Cyber Crime.gov.in” portal for further necessary action.
    {{C_D}}
    {{{short}}} {{#more}} Read More {{/more}}
    Views expressed above are the author’s own.
    Union of 100 states: Why India must have many small states. It will make for better economy and better politics
    Pakistan conundrum: Islamabad’s economic collapse won’t be good for India
    Short Sellers: A short, murky history – Outfits like Hindenburg often push ethical boundaries. But the lesson from the Adani episode is that good corporate governance is the best defence against such attacks
    Cruel crackdown: Assam’s mass arrests against child marriage endanger due process, increase women’s suffering
    In Assam, the answer is schools, not jails: Crackdown on child marriage doesn’t address real causes: girls’ education & women’s jobs
    No smarts in Adani crisis: How BJP, opposition, many commentators & the group itself got their responses wrong
    Help Afghan women: Prioritise visas for them. Save them from Taliban
    MPs, use the break: Budget session’s second half should hopefully see some quality arguments on the GoI economic policy
    We the people should know who they are: Judges are not above their politics and life experiences, their diversity counts
    The aam investor: Adani crisis: retail market participants need reassurance
    Interested in blogging for timesofindia.com? We will be happy to have you on board as a blogger, if you have the knack for writing. Just drop in a mail at toiblogs@timesinternet.in with a brief bio and we will get in touch with you.
    Cash Flow
    Ruminations,TOI News,Tracking Indian Communities
    Red Herring
    Heartchakra
    Copyright © 2023 Bennett, Coleman & Co. Ltd. All rights reserved. For reprint rights: Times Syndication Service

    source

  • FBI Columbia Trains with Statewide Law Enforcement Agencies to … – Federal Bureau of Investigation

    A .gov website belongs to an official government organization in the United States.
    A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
    Columbia
    Twitter Facebook Email Email
    The FBI Columbia field office is leading a multi-agency law enforcement three-day training course this week aimed at better equipping investigators with tools and knowledge to address the ever-growing threat of cyber crime.
    The Cyber Investigations Course is a three-day course where attendees will learn skills and knowledge for advancing their investigations through a subject’s basic use of technology. The course is also designed to increase attendees’ knowledge of the Internet, investigative techniques, open-source intelligence, virtual currency, legal processes, digital evidence collection and analysis.
    Cyber crimes have rapidly increased over the last few years with bad actors enhancing their techniques and abilities to cause harm to individuals and businesses.
    “This training will be beneficial across the board to help investigators alleviate hurdles to working cases with technical aspects,” said Supervisory Special Agent Cindy Starns, who oversees the Columbia field office’s cyber investigations.
    The training is sponsored by the FBI’s Columbia field office with support from the FBI Charlotte field office.
    No Thanks

    source