A lot have been investigated, written and said about how to better protect companies against the unstoppable proliferation of advanced and sophisticated cyber-threats/attacks. By default, and by common sense, we tend to think that by adopting and implementing cutting-edge security technologies, companies will be on a better position to stop, prevent, and reduce security threats from cyber-criminals. This is not so far from reality. Lots of technologies have emerged and being adopted to reach that goal. Among these technologies are: Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Firewalls, Antivirus, Network Access Control (NAC), Proxies, Gateways, Advance Threat Analytics (ATA), Sandboxes, Multi-factor Authentication (MFA), Artificial Intelligence (AI), and Machine Learning (ML) solutions to mention a few. However, security and data breaches still happen and are on the news all around the world, every day.
0 Comments
![]() In the last decade of the proliferation of the World Wide Web, there has been a shift from normal human combat warfare to electronic warfare, where a person with a computer can do more damage to the infrastructure of a country than thousands of soldiers. The amount of data, intelligence, and damage generated by such warfare is astronomical. This type of warfare requires artificial intelligence and Expert Systems to go to the forefront of the battlefield in order to analyze data and trends to identify potential attacks and provide countermeasures to such attack. AI has put in a new perspective how Decision Support Systems (DSS) improve defense. DSS implemented today are in place to stop and deter in the shortest possible amount of time a cyberattack, and assist cyber defenders in finding the correct response. WannaCry or Wanna Decrytor ransomware is an informatic virus that attacks Windows operating system based computers primarily (including servers) by taking advantage of system vulnerabilities exploited by Eternalblue, a tool believed to be developed by the USA National Security Agency. What is the unique effect once infected by the virus? Well, you will notice it fast. The system will show you a Popup window letting you know that your computer is infected, all your files are encrypted, and for you to recover it all, they require a ransom payment using bitcoins. Unless you make the payment, all your files will stay encrypted. The worst thing about this virus is that, if you do not pay in a certain period, the ransom payment will keep rising.
But, wait! The intention of this article is not to create panic. Even though you should panic if your computer got infected and you didn't backed up your files recently (last day or night before the infection). ![]() As of today, we have many technological gadgets around us. We have them at home, in our offices, automobiles, even as personal dressing accessories. Definitively we live in a technological era in which smart devices allow us to make collaborations, and to share personal or business data on social networks, such as Facebook®, Twitter®, LinkedIn®, Instagram®, and Google® to name a few. We also have the never ending clouds on our environment, such as Dropbox®, Box®, AmazonDrive®, GoogleDrive®, and Microsoft OneDrive®, among others. We have entered into an era in which even baby boomers interact with mobile devices and high-end technologies, not to mention millennials who were born with their genetic codes already programmed for these technologies. Even my niece, less than one year old, uses an iPad. We enjoy technology. Or at least, marketing departments make us believe it is a high-priority need, and convince us to rush and get the latest gadget. |
AuthorDr. Gilberto Crespo is an information security researcher & technology expert. Archives
June 2022
Categories
All
|