All citizens in Kazakhstan are forced to install a government-issued national security certificate as part of Internet surveillance strategy. This certificate will allow government to read all their messages or even alter them.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
Record-setting FTC fine of $700 million on Equifax data breach settlement is a warning of things to come as federal agencies step up protection of consumer data and personal information.
Tax information of five million Bulgarians were exposed in a massive data breach at country's national tax agency. Not only do the government need to worry about the leaked data, they are also subjected to GDPR penalties.
Sprint claims recent data breach will not cause risk to fraud or identify theft but the compromised customer information could lead to SIM swap attacks and allow attackers to take over victim’s accounts.
Recent Cyber Incident & Breach Trends report not only reveals a $45 billion cyber crime industry in 2018, it also suggests a shift in cyber attack trends towards focused attacks on businesses.
Exclusion of Huawei from U.S. market is a distraction from addressing cyber threats in 5G networks where much greater number of connected devices could be subjected to attacks.
Deepfake audio is becoming the powerful new tool to perform AI cyber attacks by impersonating executives to convince employees to authorize money transfers.
Beyond the challenges around risk and uncertainty, can bug bounties really deliver on their promise? Even as crowdsourced security testing continues to gain acceptance, what’s important is designing the right model to increase efficiency and avoid diminishing marginal returns.
Investors can no longer ignore the cyber resilience of their target companies, in fact the new WEF report shows they should be actively play a role in incentivizing responsible and secure innovation.
It appears that Chinese hackers have been running Cloud Hopper attacks targeting tech providers for access to their customers' corporate intellectual property and government secrets.