Category Archives: Internet Security

Cyber Security Software Market Report 2020 (Based on 2020 COVID-19 Worldwide Spread) by Key Players, Types, Applications, Countries, Market Size,…

In the forecast period of 2020 to 2025, Cyber Security Software Market is projected to rise at a compound annual growth rate (CAGR) of XX million. The Cyber Security Software Market Research Report from ReportsnReports offers analysis and insights into the various factors that are expected to be prevalent during the forecasted period, as well as their impacts on the markets development.

For this study, the globalCyber Security Software Marketbased upon the components, usage, application, the main participant, and the region, has Prepared by ReportsnReports Industry Research Firm.

COVID-19 Impact Analysis:

Due to the effects of COVID-19, the implementation of Cyber Security Software Marketis expected to witness a rapid advance, thereby resulting in the fast growth of the Cyber Security Software Market. This is mainly due to the rapid adoption of the technology to map the spread of the disease and implement preventive measures. Hence, various government organizations are utilizing the Cyber Security Software Market technology for varied applications during the pandemic.

Download a FREE Sample Report athttps://www.reportsnreports.com/contacts/requestsample.aspx?name=4353327

Internet security or cyber security is a branch of computer security specifically related to internet. The Internet has given rise to new opportunities almost in every field such as business, sports, education or entertainment and many others. However, the internet has its own drawbacks like cyber crime, where the computer used for various types of thefts and crime. Various types of cyber crimes include hacking, software piracy, denial of service attack, and cyber terrorism. The purpose of cyber security is to establish rules and measures to use against cyber crimes over the internet.This report elaborates the market size, market characteristics, and market growth of the Cyber Security Software industry, and breaks down according to the type, application, and consumption area of Cyber Security Software. The report also conducted a PESTEL analysis of the industry to study the main influencing factors and entry barriers of the industry.

In Chapter 3.4 of the report, the impact of the COVID-19 outbreak on the industry was fully assessed. Fully risk assessment and industry recommendations were made for Cyber Security Software in a special period. This chapter also compares the markets of Pre COVID-19 and Post COVID-19.In addition, chapters 8-12 consider the impact of COVID-19 on the regional economy.

Key players in the global Cyber Security Software market covered in Chapter 13:HerjavecFireEye Inc.Symantec CorpCisco Systems Inc.Dell Root 9BIBMAVG TechnologiesPalo Alto NetworksFortinet Inc.CyberArk Software Ltd.Imperva Inc.ProofpointTrend Micro Inc.Check Point Software Technologies Ltd.

In Chapter 6, on the basis of types, the Cyber Security Software market from 2015 to 2025 is primarily split into:Network SecurityCloud SecurityWireless SecurityOthers

In Chapter 7, on the basis of applications, the Cyber Security Software market from 2015 to 2025 covers:AerospaceGovernmentFinancial ServicesTelecommunicationHealthcareOthers

Geographically, the detailed analysis of production, trade of the following countries is covered in Chapter 4.2, 5:United StatesEuropeChinaJapanIndia

Geographically, the detailed analysis of consumption, revenue, market share and growth rate of the following regions are covered in Chapter 8, 9, 10, 11, 12:North America (Covered in Chapter 8)United StatesCanadaMexicoEurope (Covered in Chapter 9)GermanyUKFranceItalySpainOthersAsia-Pacific (Covered in Chapter 10)ChinaJapanIndiaSouth KoreaSoutheast AsiaOthersMiddle East and Africa (Covered in Chapter 11)Saudi ArabiaUAESouth AfricaOthersSouth America (Covered in Chapter 12)BrazilOthers

Years considered for this report:Historical Years: 2015-2019Base Year: 2019Estimated Year: 2020Forecast Period: 2020-2025

Get a 20% Discount on this Report athttps://www.reportsnreports.com/contacts/discount.aspx?name=4353327

The Goal of Cyber Security Software Market Report is to provide a complete market evaluation which includes insightful observations, information, actual data, market data verified by the industry, and forecasts with a proper set of hypotheses and methodologies. The study also analyzes global companies, including patterns in growth, opportunities for industry, investment strategies, and conclusions from experts. The study focuses on globally performing key players to clarify, identify and analyze the multiple aspects of the demand for Cyber Security Software Market.

About Us: ReportsnReports.com is your single source for all market research needs. Our database includes 500,000+ market research reports from over 95 leading global publishers & in-depth market research studies of over 5000 micro markets.We provide 24/7 online and offline support to our customers.

E-mail: [emailprotected]

Phone: +1 888 391 5441

See the original post:
Cyber Security Software Market Report 2020 (Based on 2020 COVID-19 Worldwide Spread) by Key Players, Types, Applications, Countries, Market Size,...

Cyber Security Today, May 12, 2021 – Hate on messaging apps, Zix used in scams and QR code warning – IT World Canada

Fight hate on private messaging apps, how Zix is used for scams, a warning on QR codes and more.

Welcome to Cyber Security Today. Its Wednesday, May 12th. Im Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com.

The government of Canada should do more to stop disinformation on private internet messaging platforms like WhatsApp, Telegram, WeChat, Facebook Messenger and Snapchat. Thats the recommendation of the cybersecurity policy exchange at Torontos Ryerson University. Theres a lot of discussion about disinformation on public social media platforms like Twitter and Facebook. But in a report issued Tuesday the exchange says private messaging apps are also being abused by fake news, hate speech, sexual comments and materials that incite violence. In a survey of 2,500 Canadians, a quarter of respondents said they get messages with hate speech at least once a month. Rates are higher among people of colour. Almost half said they get private messages at least once a month that they suspect are false. Some platforms label suspect messages and limit the number of targets that suspect messages can go to. But the report says the federal government should do more, including improving digital literacy so people can spot falsehoods, and demanding transparency from private messaging platforms on how many accounts host and distribute bad material. Theres a link to the full report here.

Recently I told you a ransomware gang had threatened to release confidential files of the Washington, D.C. police department unless it was paid. According to news reports the gang says it has started putting that data online. If true the files could damage police operations. Meanwhile the city of Tulsa, Oklahoma has suffered a ransomware attack.

Hackers are abusing the Zix secure messaging service. Heres how it works, according to a cybersecurity company called Abnormal Security: Victims get a phishing message from a companys compromised email account. For example, one message came from a real estate title searching firm and went to a legal firm or someone trying to buy a house. The attachment claims to have a closing settlement counteroffer for a residence. The header on the link looks like it goes through Zix, which checks links. Those who know about Zix are supposed to be reassured. But the link goes to a page where victims are asked to enter their Microsoft login credentials to see a document. The reason why some anti-malware systems may miss this scam is the use of Zix. Be careful with any messages that have links to documents where you have to enter a password. You may be giving away access to your computer.

QR codes are black-and-white speckled squares that are scanned with a smartphone to get access to services or apps. But be careful what you scan: Crooks also use them to infect mobile devices, because they can be made into stickers and slapped on top of legitimate codes. Victims think the scanned app will be helpful, but its really data-stealing malware. Anna Chung, a threat researcher for Palo Alto Networks, told me this week that crooks are taking more interest in QR codes. Thats because theyre being used more by legitimate businesses as a result of COVID-19. For example, restaurants and stores use them as an aid to virus contact tracing. Rather than have someone take down your name when you enter a store so you can be called if a customer tests positive for the virus, you scan the code. It takes your smartphone number. Or restaurant customers are asked to scan a code to access menus and order food from their mobile device. Chung offers this advice for protection: Install an anti-malware app for mobile devices that has QR code protection. Disable the automatic redirect capability in your mobile browser. That way instead of automatically going to where the scanned code wants, the browser will first tell you which website its going to. Ignore invitations to scan a QR code for free internet. And be careful about the codes you scan. Stay away from codes on walls or windows. Beware of codes that look like theyre made from a sticker.

I have another warning to smartphone owners to be careful choosing and downloading mobile apps. This comes after an Italian cybersecurity company called Cleafy discovered new Android malware apps whose goal is to steal passwords to bank accounts. This malware hides in apps like media players and package trackers from well-known couriers like UPS and DHL If downloaded by a victim it asks to be installed as an Android Service. Thats a warning sign. Android Services run in the background. Why would you want an app to run in the background? Other suspicious signs: The app asks for permission to observe your actions, to retrieve window content and to perform gestures. If you say yes to all of these things and the app can silently take screenshots of whatever you do, such as enter passwords. If there is no way to say no to an app when it asks for access permissions, thats another sign of a malicious app. Finally, if after you download an app you cant find its icon, for sure youve been hacked. This campaign so far is aimed at stealing passwords for banks in Europe. It probably wont be long before it goes after banks in Canada and the U.S.

Dont download apps sent to you. Only rely on Android apps from the Google Play store. Even then bad apps can sneak in. If the app you choose starts demanding permission to things you dont want, delete the app.

Finally, yesterday was the monthly Microsoft Patch Tuesday. Check that Windows has installed the latest security updates. Also check your Adobe Reader is patched. And Google has updated the Chrome browser with security fixes.

Thats it for now. Remember links to details about these stories are in the text version of this podcast at ITWorldCanada.com. Thats where youll also find other cybersecurity stories of mine.

Follow Cyber Security Today on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

Read the original post:
Cyber Security Today, May 12, 2021 - Hate on messaging apps, Zix used in scams and QR code warning - IT World Canada

ITS Internet Security and Privacy Policy | New York State …

Overview

Thank you for visiting the NYS Office of Information Technology Services (ITS) website. This website is designed to make it easier and more efficient for New York State citizens and businesses to learn about technology initiatives in New York State (State) government and to interact with ITS. ITS recognizes that visitors to this website are concerned about their privacy. ITS is committed to preserving your privacy when visiting this website.

Consistent with the provisions of the Internet Security and Privacy Act, the Freedom of Information Law and the Personal Privacy Protection Law, this policy describes ITS's privacy practices regarding information collected from users of this website. This policy describes what data is collected and how that information is used. ITS may, at its sole discretion, change modify, add, or delete portions of this policy. Because this privacy policy only applies to this website, you should examine the privacy policy of any website, including other State websites, you access through this website.

For purposes of this policy, personal information means any information concerning a natural person, as opposed for instance to a corporate entity, which, because of name, number, symbol, mark, or other identifier, can be used to identify that natural person. ITS only collects personal information about you when you provide that information voluntarily by sending an e-mail or by initiating an online transaction, such as a survey, registration or order form.

Information Collected Automatically When You Visit This Website

When visiting this website ITS automatically collects and stores the following information about your visit:

None of the foregoing information is deemed to constitute personal information.

This information that is collected automatically is used to improve this website's content and to help ITS understand how people are using this website. This information is collected for statistical analysis, to determine what information is of most and of least interest to our visitors, and to identify system performance or problem areas. The information is not collected for commercial marketing purposes and ITS does not sell or distribute the information collected from the website for commercial marketing purposes.

Cookies

Cookies are simple text files stored on your web browser to provide a means of distinguishing among users of this website. The use of cookies is a standard practice among Internet websites. In order to better serve you, we may use "temporary" cookies to enhance, customize or enable your visit to this web site. Temporary cookies do not contain personal information and do not compromise your privacy or security and are erased during the operation of your browser or when your browser is closed.

During your visit to this website, you may complete a registration form in order to personalize your use of the website. In such an event, we may deliver a "persistent" cookie which would be stored on your computer's hard drive. This persistent cookie will allow the website to recognize you when you visit again and tailor the information presented to you based on your needs and interests. ITS uses persistent cookies only with your permission.

The software you use to access the website allows you to refuse new cookies or delete existing cookies. Refusing or deleting these cookies may limit your ability to take advantage of some of the features of this website.

Information Collected When You Email this Website or Initiate an Online Transaction Through this Website

If during your visit to this website you send an email to ITS, your email address and the contents of your email will be collected. The information collected is not limited to text characters and may include audio, video, and graphic information formats you send us. The information is retained in accordance with the public record retention provisions in the State Arts and Cultural Affairs Law. Your email address and the information contained in your email will be used to respond to you, to address issues you identify, to further improve this website, or to forward your email to another agency for appropriate action. Your email address is not collected for commercial marketing purposes and ITS does not sell or distribute your email address for any purposes.

During your visit to this website you may initiate a transaction such as a survey,registration or order form. The information, including personal information, volunteered by you in initiating the transaction is used by ITS to operate ITS programs, which include the provision of goods, services and information. The information collected by ITS may be disclosed by ITS for those purposes that may be reasonably ascertained from the nature and terms of the transaction in connection with which the information was submitted by you.

Currently, ITS does not knowingly collect personal information from children or create profiles of children through this website. People are cautioned that the collection of personal information provided by any individual in an email or through an online transaction will be treated the same as information given by an adult, and may, unless exempted from access by federal or State law, be subject to public access. ITS encourages parents and teachers to be involved in children's Internet activities and to provide guidance whenever children are asked to provide personal information on-line.

Information and Choice

As noted above, ITS does not collect any personal information about you during your visit to this website, unless you provide that information voluntarily by sending an e-mail or initiating an online transaction such as a survey, registration, or order form. You may choose not to send us an e-mail, respond to a survey or complete an order form. While your choice not to participate in these activities may limit your ability to receive specific services or products through this website, it will not prevent you from requesting services or products from ITS by other means, and will not normally have an impact on your ability to take advantage of other features of the website, ncluding browsing or downloading most publicly available information.

Disclosure of Information Collected Through This Website

The collection of information through this website and the disclosure of that information are subject to the provisions of the Internet Security and Privacy Act.ITS will only collect personal information through this website, or disclose such personal information, if the user has consented to the collection and disclosure of such personal information. The voluntary disclosure of personal information to ITS by the user, whether solicited or unsolicited, constitutes consent to the collection and disclosure of the information by ITS for the purposes for which the user disclosed the information to ITS, as was reasonably ascertainable from the nature and terms of the disclosure.

However, ITS may collect or disclose personal information without user consent if the collection or disclosure is: (1) necessary to perform the statutory duties of ITS, or necessary for ITS to operate a program authorized by law, or authorized by state or federal statute or regulation; (2) made pursuant to a court order or by law; (3) for the purpose of validating the identity of the user; or (4) of information to be used solely for statistical purposes that is in a form that cannot be used to identify any particular person.

Further, the disclosure of information, including personal information, collected through this website is subject to the provisions of the Freedom of Information Law and the Personal Privacy Protection Law. Additionally, ITS may disclose personal information to federal or State law enforcement authorities to enforce its rights against unauthorized access or attempted unauthorized access to ITS's information technology assets and any other inappropriate use of its website.

Retention of Information Collected Through this Website

The information collected through this website is retained by ITS in accordance with the records retention and disposition requirements of the New York State Arts and Cultural Affairs Law. Information on the requirements of the Arts and Cultural Affairs Law may be found at http://www.archives.nysed.gov/records/mr_laws_acal5705.shtml. In general, the Internet services logs of ITS, comprising electronic files or automated logs created to monitor access and use of state agency services provided through this website, are retained for one year and then destroyed. Information, including personal information that you submit in an e-mail or when you initiate an online transaction such as a survey, registration form, or order form is retained in accordance with the records retention and disposition schedule established for the records of the program unit to which you submitted the information. Information concerning these record retention and disposition schedules may be obtained through the Internet privacy policy contact listed in this policy.

Access to and Correction of Personal Information Collected Through this Website

Any user may submit a request to the ITS privacy officer to determine whether personal information pertaining to that user has been collected through this website. Any such request shall be made in writing to the address below and must be accompanied by reasonable proof of identity of the user. Reasonable proof of identity may include verification of a signature, inclusion of an identifier generally known only to the user, or similar appropriate identification. The address of ITSs privacy compliance officer is: Privacy Officer, Office for Technology, State Capitol ESP, PO Box 2062, Albany, New York 12220-0062.

The privacy compliance officer shall, within five (5)business days of the date of the receipt of a proper request: (i) provide access to the personal information; (ii) deny access in writing, explaining the reasons therefore; or (iii) acknowledge the receipt of the request in writing, stating the approximate date when the request will be granted or denied, which date shall not be more than thirty (30)days from the date of the acknowledgment.

In the event that ITS has collected personal information pertaining to a user through the state agency website, and that information is to be provided to the user pursuant to the users request, the privacy compliance officer shall inform the user of his or her right to request that the personal information be amended or corrected under the procedures set forth in section 95 of the Public Officers Law.

Confidentiality and Integrity of Personal Information Collected Through this Website

ITS limits employee access to personal information collected through this website to only those employees who need access to the information in the performance of their official duties. Employees who have access to this information are required to follow appropriate procedures in connection with any disclosures of personal information.

In addition, ITS has implemented procedures to safeguard the integrity of its information technology assets, including, but not limited to, authentication, monitoring, auditing and encryption. These Security measures have been integrated into the design, implementation, and day-to-day operations of this website as part of our continuing commitment to the security of electronic content as well as the electronic transmission of information.

NOTE: The information contained in this policy should not be construed in any way as giving business, legal, or other advice, or warranting as fail proof, the security of information provided via this website. For site security purposes and to ensure that this website remains available to all users, ITS employs software to monitor traffic to identify unauthorized attempts to upload or change information or otherwise cause damage to this website.

Links Disclaimer

In order to provide visitors with certain information, this website provides links to local, State and federal government agencies, and websites of other organizations. A link does not constitute an endorsement of the content, viewpoint, accuracy, opinions, policies, products, services, or accessibility of that website. Once you link to another website from this website, including one maintained by the State, you are subject to the terms and conditions of that website, including, but not limited to, its privacy policy.

Information Disclaimer

Information provided on this website is intended to allow the public immediate access to public information. While all attempts are made to provide accurate, current, and reliable information, ITS recognizes the possibility of human and/or mechanical error. Therefore, ITS, its employees, officers and agents make no representations as to the accuracy, completeness, currency, or suitability of the information provided by this website, and deny any expressed or implied warranty as to the same.

Contact Information

For questions regarding this Privacy Policy please email ITS at [emailprotected].

Original post:
ITS Internet Security and Privacy Policy | New York State ...

Ransomware: How the NHS learned the lessons of WannaCry to protect hospitals from attack – ZDNet

Four years ago, the UK's National Health Service suddenly found itself one of the most high profile victims of a global cyber attack.

On 12 May 2017, WannaCry ransomware hit organisations around the world, but hospitals and GP surgeries throughout England and Scotland were particularly badly affected. A significant number of services were disrupted as malware encrypted computers used by NHS trusts, forcing thousands of appointments to be cancelled and ambulances to be rerouted.

Wannacry was launched by North Korea which used EternalBlue, a leaked NSA hacking tool, to spread as far and wide as possible and it just so happened that many NHS Trusts were running Windows machines which had yet to receive the critical security patch released by Microsoft earlier.

It was and still is the largest cyber attack to hit the UK to date and even if the NHS wasn't actually a specific target of WannaCry it was a wakeup call at to how ransomware and other cyber campaigns could be a risk to an organisation with 1.5 million employees which provides healthcare services across the entire country.

WannaCry happened before ransomware rose to become the significant cybersecurity issue it is today and the NHS and National Cyber Security Centre know that if another ransomware campaign infiltrated the network, the impact could be devastating particularly during the Covid-19 pandemic.

"For the NHS, ransomware remains one of our biggest concerns," said Ian McCormack, deputy director for government, NCSC, speaking during a panel discussion at the NCSC's CYBERUK 21 virtual conference.

"Ransomware packages have got much more sophisticated, ransomware is becoming much slicker in terms of how it's developed".

SEE:Network security policy(TechRepublic Premium)

To protect networks from ransomware attacks, the NHS has learned the lessons from WannaCry and is aiming to ensure that it's harder for cyber criminals to exploit vulnerabilities in order to distribute malware.

One of those lessons is making NHS Trusts aware about newly disclosed security vulnerabilities and, if needed, providing support in order to apply the relevant patches.

The NHS trusts which had applied the critical Microsoft update to patch EternalBlue avoided falling victim to WannaCry so it's hoped that by providing the resources to enable patch management, networks can be protected against future attacks which attempt to exploit new vulnerabilities.

"Within NHS Digital and working closely with NHSX and NCSC, we offer a high severity alerts process, so we will review and triage vulnerabilities," said Neil Bennett, chief information security officer (CISO)at NHS Digital, the national IT provider for the NHS.

"And where we believe vulnerabilities are particularly critical and applicable to the NHS, we'll push out alerts advising organisations to take action to remediate and put time scales around it".

Recent vulnerabilities NHS Digital has helped hospitals and GP surgeries protect their networks against include zero-day vulnerabilities Microsoft Exchange server, plus TCP/IP vulnerabilities discovered in millions of Internet of Things devices.

If abused, both could enable cyber attacks to take control of machines and gain wider access to networks, helping lay the groundwork for additional attacks so NHS Digital was keen to ensure the patches were applied.

"We've encouraged organisations to move at pace and when needed, offer support," said Bennett.

But there's more to protecting against a ransomware attack than just applying the correct security patches and a lot of effort has gone into ensuring there are backups for NHS systems across the country.

That means if the worst happens and somehow a network did fall victim to a ransomware attack, it's possible to restore the network from a recent point, without having to consider paying a ransom to cyber criminals.

"Backups was a very key area of focus for us," said Bennett, who described how in some cases, that has meant new backup systems entirely.

"We provided support to individual trusts on reviewing their backups, very much aligned with the NCSC's backup guidance. Then with the findings we'd support the organisations remediating against recommendations and in some cases NHSX actually funded new backup solutions, ideally cloud-based backup solutions," he explained.

It's evident that cyber criminals will attempt to exploit any vulnerability they can in order to infect a network with ransomware or any other form of malware and it's hoped by regularly providing assistance with security patching and providing advice on backups, another WannaCry can be avoided, especially as cyber attacks against healthcare providers elsewhere have demonstrated how dangerous they can be.

"There's been numerous ransomware incidents around the world that have affected healthcare organisations in the US and France, for example and that shows that the health sector is certainly not immune to that threat," said McCormack.

MORE ON CYBERSECURITY

The rest is here:
Ransomware: How the NHS learned the lessons of WannaCry to protect hospitals from attack - ZDNet

Cant eat the internet! Raab pledges 22m cyber security for vulnerable countries as 4bn cut from foreign aid – The London Economic

Dominic Raab has announced 22 million worth of investment to bolster cyber security capabilities in developing countries as he warned hostile state actors and criminal gangs are using technology to undermine democracy.

It comes as NGOs dismissed a claims by U.K.Foreign Secretary Dominic Raab thatno one is going hungry because we havent signed checks as shocking and simply not true. Following the economic shock of the coronavirus crisis,the chancellor cut the foreign aid budgetfrom 0.7% to 0.5% of total national income a reduction of around 4bn.

Cuts to humanitarian aid by the UK are a tragic blow for many of the worlds most marginalised people, 200 charities said in a joint statement, in April.

Organisations including Save the Children and Oxfam said humanitarian assistance was being reduced by more than 500m.

While the UK will continue cutting aid through 2021, Joe Biden announced this month an increase of $5.4bn (3.9bn) or 10% for USAid, the US governments international development agency.

Aid organizations are still grappling with funding uncertainty despite being weeks into a new financial year and have said they are gravely concerned about the impact their programs will feel from U.K. aid cuts, including in Syria, Yemen, and the Democratic Republic of Congo.

Jean-Michel Grand Action Against Hungers Grandsaid Raabs comment was simply not true. He wrote: Right now in the DRC, 27 million people are going hungry, and 22 days into the new financial year our teams are still waiting for assurances on their funding. Health centres will close. Lives will be lost.

The co-founder and co-CEO of Purposeful in Sierra Leone said: The timing of this is terrible not just because of the G7 and pandemic. It will means thousands of girls will not have access to life-saving sexual reproductive facilities. It undercuts the UKs moral authority. These are political cuts.

The Foreign Secretary told the CyberUK conference that authoritarian regimes including North Korea, Iran, Russia and China are using digital technology to sabotage and steal, or to control and censor.

Speaking at the conference on Wednesday, Mr Raab urged for international law to be respected in cyber space and concluded there is a need to clarify how rules around online activity are enforced.

The UK, jointly with Interpol, will set up a new cyber operations hub in Africa working across Ethiopia, Ghana, Kenya, Nigeria and Rwanda to support joint operations against cyber crime.

In a speech four years on from the WannaCry ransomware attack, which hit the NHS and affected hospitals across England and Scotland, Mr Raab said cyber criminals now also acted as a threat to democracy.

He said: There is also a democratic dimension to the threats that we see because elections are now a prime target.

The Foreign Secretary referred to the UKs 2019 general election, which he said Russian actors attempted to interfere with, as well as multiple cyber attacks during the 2016 and 2020 US elections.

In the last year alone, the National Cyber Security Centre dealt with 723 major cyber security incidents, the highest figure since the agency was formed five years ago, according to the Foreign Secretary.

Some of this activity is aimed at theft or extortion, but it all too often is simply focused on sabotage and disruption, he told the conference.

I think its worth saying these actors are the industrial-scale vandals of the 21st century.

These hostile state actors, the criminal gangs, they want to undermine the very foundations of our democracy.

Outlining the UKs strategy in dealing with such threats, including advice to businesses and families, Mr Raab said the efforts were starting to pay off as the nation made improvements in disrupting and deterring malicious activity.

We want to see international law respected in cyberspace, just as we would anywhere else, he told the conference.

We need to show how the rules apply to these changes in technology, the changes in threats, and the systematic attempts to render the internet a lawless space.

Our challenge is to clarify how those rules apply, how they are enforced, and guard against authoritarian regimes bending the principles to meet their own malicious ends.

The 22 million of new funding is set to support cyber capacity in vulnerable countries, particularly in Africa and the Indo-Pacific, which will go towards supporting cyber response teams and online safety awareness campaigns.

Mr Raab added: We can lead internationally in protecting the most vulnerable countries and at the same time bring together a wider coalition of countries to shape international rules that serve the common good.

Related: European Commission worried about EU citizens detained by UK

Since you are here, we wanted to ask for your help.

Journalism in Britain is under threat. The government is becoming increasingly authoritarian and our media is run by a handful of billionaires, most of whom reside overseas and all of them have strong political allegiances and financial motivations.

Our mission is to hold the powerful to account. It is vital that free media is allowed to exist to expose hypocrisy, corruption, wrongdoing and abuse of power. But we can't do it without you.

If you can afford to contribute a small donation to the site it will help us to continue our work in the best interests of the public. We only ask you to donate what you can afford, with an option to cancel your subscription at any point.

To donate or subscribe to The London Economic, click here.

The TLE shop is also now open, with all profits going to supporting our work.

The shop can be found here.

You can also SUBSCRIBE TO OUR NEWSLETTER .

Excerpt from:
Cant eat the internet! Raab pledges 22m cyber security for vulnerable countries as 4bn cut from foreign aid - The London Economic

Hozon Auto teams up with cybersecurity giant | Automotive Industry News | just-auto – just-auto.com

Qihoo 360 CEO and founder Hongyi Zhou announced the plan to join the elite club of tech CEOs turned smart-carmakers at a company meeting on Tuesday. Household names such as Huawei, Xiaomi and Baidu have recently revealed similar plans to enter the automotive industry.

The Qihoo 360 announcement comes after Hozon Auto-owned EV brand Nezha announced in April that it planned to raise roughly 3 billion Chinese yuan (about $467m) in a Series D financing round. The cybertech firm is leading the raise and, according to Chinese media, is expected to become Hozon Auto's second largest shareholder at its close.

The formal confirmation of a partnership between the two companies was met with ample media attention in China, where the appetite for home-grown smart vehicles has grown in recent years.

Some, however, were left sceptical as Qihoo 360's core business is internet security, not vehicles. Zhou countered that, in his opinion, "not too many internet companies are building cars, but too few," adding that "without the help of the internet, car manufacturers would still follow traditional ways of thinking by replacing fuel tanks with batteries. Although this is a change in the industry, it cannot be considered a paradigm change."

Zhou explained that Qihoo 360 aims to take over the software development aspect for the vehicle's design. "For a good smart car, the hardware is the body and the software is the soul," the CEO said. "360 will use internet technology and the ideology of connectedness to transform Nezha's traditional car manufacturing model into a connected car model."

Qihoo 360 will likely bring its expertise in the area of cybersecurity into the smart car industry. Zhou said, "[Smart] cars are expected to become one of the largest players in the field of smart technology, and network security as well as the cybersecurity of connected vehicles will inevitably become an important aspect of 360's future strategy."

The fear of car hacking has become a growing concern among connected car owners. Last month, cyber insurer HSB found that a third of smart vehicle owners are worried that their cars will be hacked.

Qihoo 360 is the largest provider of internet and mobile security products in China. According to GlobalData's companies database, its product portfolio includes security guards, mobile guards, safe browsers, antivirus software and mobile assistants. It also provides entertainment services, loan navigation and credit guards.

The company previously owned a research group dedicated to automobile security, 360 Sky-Go Team, which carried out cooperations with several mainstream auto brands like Mercedes-Benz and BYD.

Qihoo 360 and Hozon Auto will also jointly set up a research centre in Beijing to promote the smart car revolution.

Continue reading here:
Hozon Auto teams up with cybersecurity giant | Automotive Industry News | just-auto - just-auto.com

Governments and Organizations Can’t Ignore Threats Posed by Disinformation – Infosecurity Magazine

Disinformation is undoubtedly on more peoples radars. But just because we know more about it doesnt mean we are better prepared to face the challenge it is posing.

With normal cyber-attacks, governments and organizations are often targeted directly. Disinformation is different. Instead of attacking core infrastructure, bad actors or nation states attack the population by attempting to skew their beliefs.

Disinformation, a form of misinformation that is createdspecificallyto manipulate or mislead people, is becoming more prevalent mainly because its easy to create and disperse. The tools behind deepfakes and malicious botshave been democratized, creation can now be automated and disinformation-as-a-service has emerged.

The threat of disinformation has two key components. Nation states and bad actors use it to discredit governments and organizations, and target employees to infiltrate businesses from the inside.

In the UK, experts recently told a House of Lords inquiry that upcoming legislation should force internet companies to provide real-time information on disinformation. While CIOs cannot tackle this problem alone, they can take some steps to mitigate the risk.

Retaining Credibility

Nation states and bad actors can harm governments and organizations without targeting them directly utilizing a cyber-attack. For instance, they could impact the number of coronavirus vaccines administered by the National Health Service (NHS) by using disinformation to sow distrust about vaccine effectiveness or safety. Late last year, the media reported that hackers tried to break into the systems of researchers at AstraZeneca and the University of Oxford. In response, the National Cyber Security Centre (NCSC) stated that it was working to protect the UKs most critical assets, the health sector and crucial vaccine research and development against threats.

Its hard to control how disinformation spreads, but awareness campaigns can be run to counter the threat of disinformation, while also creating certified FAQs and resource pages.

In November 2020, the UK government and social media platforms agreed a package of measures to reduce vaccine disinformation. This includes ensuring a timely response to disinformation content flagged to platforms and joining new policy forums to prepare for future threats. In March 2021, the government also launched a social media campaign to tackle false vaccine information shared amongst ethnic minority communities.

While CIOs alone cannot regain control of information in the internet age, governments can consistently remind people that they represent a reputable source and can be diligent in only driving citizens tootherreputable sources. Governments and departments may even look to more traditional efforts, like marketing, in order to disseminate verified information.

Educating and Protecting Employees

But what does this have to do with a cybersecurity company? Some types of disinformation can lead to insider threats. Social media and other sources of inaccurate information can radicalize employees, who may feel compelled to steal sensitive data or IP. For example, activist group QAnon left breadcrumbs of secrets peppered with pledges and pro-Trump themes on message board 4chan.

Just as disinformation is now for sale, insider-threat-as-a-service also exists. While bad actors and nation states formerly attempted to bribe and extort their way to sensitive information, they can now either serve disinformation to existing employees, or ultimately become employees themselves.

To prepare for the former, organizations and governments need to implement more disinformation education and training programs. Employees should be required to take training to recognize disinformation and understand the techniques that can be used to skew the publics common belief system, the use of verifiable information fused with false information to alter narratives and how to discredit reliable sources. As this relates directly to insider threats, by helping employees validate sources, organizations are protecting their data in the long run.

Additionally, in order to combat both types of insider threat, organizations and governments must be adept at continuous monitoring of user behavior. By having a baseline of normal user behavior, IT teams can determine if a radicalized employee is attempting to hoard data or access restricted information. There is simply no way to completely eliminate the threat of disinformation and malicious insiders. Thus, IT teams must put behavioral analytics in place to quickly identify and respond to potentially dangerous user behavior.

The Bottom Line

The tough reality is that, in an age of social media, there is no silver bullet to combat this real and growing threat.Everyonemust be diligent about questioning what they see online, rather than simply taking it at face value and internalizing it as facts. IT professionals in governments and organizations should be most concerned about disinformation undermining their own credibility and potentially turning their own employees against them.

Awareness is crucial to combating disinformation, but it should be supplemented by behavioral analytics. CIOs should proceed as if disinformation is already impacting both their employees and citizens because it is. This is an all-hands-on-deck issue and its time to combat the threat of disinformation today.

Here is the original post:
Governments and Organizations Can't Ignore Threats Posed by Disinformation - Infosecurity Magazine

Another COVID-19 side-effect: Booming business on dark web – WRAL.com

By Cullen Browder, WRAL anchor/reporter

Raleigh, N.C. The recent ransomware attack on the Colonial Pipeline has raised new concerns about cybersecurity.

Cyberattacks have grown during the coronavirus pandemic, and sites on the dark web are thriving with information and good obtained through those hacks, according to security experts.

"Theyve got everything from bank logins, credit cards, corporate intelligence," says Neal Bridges, a cybersecurity expert and chief content officer for Cary-based INE. "There are quite a few known dark net marketplace websites that sell anything from drugs, guns, fake IDs, passports, credit card numbers, personal identifiable information."

Most people surf the surface web, which accounts for only 4 percent of the internet. The deep web, which includes protected sites for medical and legal records, accounts for about 90 percent. The remainder is the dark web and its illicit activities.

Using a special browser to hide his identity and navigate the dark web, Bridges searched "Carolina" on one site and found plenty of hits:

"Theres a database leak from the NorthCarolina.gov website," he said,

The majority of the personal information on the dark net was stolen through hacking or email scams, he said.

Simon Migliano, who researches sales trends on the dark web, said regardless of how the information is obtained, business has been booming during the pandemic.

"Weve probably seen some of the most interesting movement over the past couple of years in the last 12 months," he said. "What I would say is since the pandemic theres been a lot more listings."

Migliano attributed the increase to lockdowns that had more people at home spending more time on the internet buying more services and goods to survive the isolation.

"Were seeing a lot more lifestyle brand accounts for sale on the dark web that weve never seen before," he said. "The users on many of these accounts you're finding on the dark web now, like Peloton, may not have had a lot of online accounts before but are being forced to use more online accounts because theyre stuck in their homes."

Among the pandemic-fueled items found by Migliano, Instacart account information going for more than $22, Peloton accounts at almost $18, Drizly, the alcohol delivery service, and Amazon Prime Video at just above $13 per account. None was on the hot list in 2019, he noted.

"Theyre fresh blood, so to speak," he said, adding that the new accounts contain the most recent email addresses and passwords used by consumers.

Debit and credit cards, as well as bank information, still garner top dollar on the dark web. But it takes only one username and password for a cyber criminal to hit the jackpot. They can take that combination and run it through programs that submit it to hundreds, if not thousands, of other businesses.

Making it a volume business lets criminals keep their prices low enough that law enforcement is less likely to get involved.

"The risk/reward factor for hackers is definitely in favor of the hackers," Bridges said.

Both Bridges and Migliano urged people to use password managers and two-factor authentication to protect their account and personal information and to limit the potential damage if any of it does end up in the wrong hands.

"You have to be more diligent than what youre used to right now in protecting your personal information, your financial information and just everything about your digital life," Bridges said.

Original post:
Another COVID-19 side-effect: Booming business on dark web - WRAL.com

Department of Labors Cybersecurity Guidance for Benefit Plans Signals Increased Scrutiny – JD Supra

On April 14, 2021, the Department of Labor (DOL) issued its first set of guidance documents related to the cybersecurity of retirement benefit plans covered by the Employee Retirement Income Security Act (ERISA). The three-part guidance is aimed at various stakeholdersplan fiduciaries, service providers, plan participants and beneficiariesand provides cybersecurity expectations for plan fiduciaries and best practices for their service providers.

Cybersecurity has become an area of critical importance to plan sponsors and administrators of employee benefit plans, as well as their service providers, as they increasingly rely on the Internet and IT systems to administer those plans. In a February 2021 Government Accountability Office (GAO) Report, the GAO, an independent and non-partisan U.S. legislative agency that monitors and audits government spending and operations, highlighted the significant cybersecurity risks to benefit plans and called on the DOL to clarify responsibilities for fiduciaries and provide guidance related to minimum cybersecurity expectations. Although DOLs recent guidance is sub-regulatory guidance, which does not have the authority of federal agency regulations under the Administrative Procedure Act (APA), the guidance presents DOLs first official action focused on mitigating the significant cybersecurity risks to participant data and plan assets.

DOLs three pieces of cybersecurity guidance target different audiences and emphasize the importance of each stakeholders role in preventing fraud and loss. The following is a brief summary of each guidance document.

DOLs guidance makes clear the protection of participant data and plan assets from cybercriminals is a critical consideration for all benefit plan stakeholders. ERISA establishes minimum standards and requirements intended to protect plan participants and beneficiaries in private sector benefit plans and requires plan fiduciaries to act prudently when administering plans. But ERISA regulations are silent on how plan constituents should comply with these requirements. Prior to issuing its guidance, DOL had not clarified its view as to whether plan administrators were responsible for mitigating cybersecurity risks. The recent literature makes clear that in DOLs view, retirement plan fiduciaries are obligated to ensure the proper mitigation of cybersecurity risks, and the guidance provides helpful data points for plan record-keepers and service providers to protect plan data.

In light of DOLs guidance, plan sponsors and administrators that handle data management in-house that have yet to develop a formal cybersecurity program should do so now, and those with cybersecurity programs currently in effect should re-evaluate those programs to ensure they align with DOLs suggested best practices. Plan sponsors and administrators should also revisit their contractual engagements with service providers to ensure they have adopted a well-documented cybersecurity program that offers adequate protections in the event of a breach. Although the guidance is framed as tips and best practices and currently has no enforcement mechanism, it signals the DOLs heightened focus on cybersecurity in light of more frequent attacks and increasingly sophisticated breach techniques. The guidance specifically addresses retirement plans, but fiduciaries of health and welfare plans are subject to the same fiduciary responsibilities under ERISA. Stakeholders should evaluate their cybersecurity practices and policies and implement the DOLs best practices where possible to ensure their benefit plans do not fall victim to data compromise.

See original here:
Department of Labors Cybersecurity Guidance for Benefit Plans Signals Increased Scrutiny - JD Supra

Why Nigerian small businesses aren’t using the full power of social media – The Conversation CA

Around the world, the use of social media continues to grow and to influence commerce. It offers great benefits for marketing businesses.

African businesses, too, could gain from the features and popularity of these platforms, though social media use varies widely between regions of the continent. The estimates for 2021 are that 45% of the population in northern Africa use social media, 8% in central Africa, 10% in eastern Africa, 16% in western Africa and 41% in southern Africa.

Facebook is the most popular platform in Africa, with 58.74% of social media users. Its followed by YouTube with 23.01% of users and Twitter with 11.75% of users.

The internet economy which refers to businesses performed through the worldwide web or internet markets is estimated to contribute close to $115 billion or about 4.5% of the continents total gross domestic product. It is projected to reach $180 billion or 5.2% of GDP by 2025 and $712 billion by 2050.

Some of the reasons for using social media in business relate to its low cost, higher level of communication efficiency and a shift towards a consumer driven environment. But the level of interest in Africa, especially among small scale business owners, is less well understood and evidence is relatively scarce.

Small and medium sized businesses play an important role in the economy of Africa. More than 90% of businesses are in this sector, which employs close to 60% of the continents workers.

In a study in southwest Nigeria, I explored the experiences of small scale craft workers using social media platforms for business. These business owners spoke about the benefits, risks and obstacles involved in using social media. They shed light on what gaps need to be filled before the full potential of social media in commerce can be achieved in Nigeria.

I chose 170 craft workers, including dressmakers, goldsmiths, interior decorators, caterers, hair dressers and barbers in the city of Ado Ekiti. Through questionnaires and interviews I sought to gauge their understanding and perception of social media. Over half (55.6%) of the respondents were women; 68% were between the ages of 20 and 29; and 54.1% had tertiary education.

Asked about which social media they were comfortable with, 46% named Facebook, 27.8% WhatsApp, 16.7% Twitter and 9.5% BlackBerry messenger.

Respondents said social media was relevant to business performance. They believed it had improved their business sales and enabled them to communicate with clients. But they felt that it would not improve their business performance on its own. And the number of respondents who actually used it for business purposes was small. They tended to use it for advertising but not for transacting business. While many of the respondents used the platforms when they first started their business, maintaining the tempo became difficult.

Recounting the benefits of using the platforms, most respondents claimed they had met new clients far away from their immediate environment and they had been able to showcase their products online, thus saving the cost of physical showrooms for marketing their wares.

Some of the participants did not see a use for the platforms beyond showing pictures of what they made or did. And there was a lack of consistency in the use of the platforms respondents stopped using them or used them only once in a while or when clients asked to transact that way.

One participant mentioned the risk of online fraud. Others said social media was expensive, unsafe and restrictive due to connectivity issues. Connectivity issues refer to the ability to get quality and fast internet for business purposes. In the localities of these entrepreneurs, internet speed and quality were bad. Transacting business through social media platforms thus become challenging. Many felt the policy makers and others had not done enough to create a conducive atmosphere for using social media in business transactions.

Small business owners in the study appeared to be getting little from what the digital economy has to offer. Connectivity issues and maintenance costs, limited understanding of the use of social media for business growth and internet security all restricted the use of platforms among the study participants. These issues put together show the gaps that government and others need to fill to provide the infrastructure for small scale entrepreneurs in Nigeria.

Training and skill acquisition programmes at all levels are essential to impart the full value of social media in business to users.

The issue of internet security needs proper attention.

Service providers may need to create cost effective and user friendly services for small business owners.

All hands must therefore be on deck to ensure that the right atmosphere is created for small business owners, who make up a great part of Africas business base.

See the rest here:
Why Nigerian small businesses aren't using the full power of social media - The Conversation CA