Lets Discuss Security 2
Lets Discuss Security 2
Lets Discuss Security 2
4.TRENDING TOPICS
Exploits,viruses,threats..
THE IOT IS A WEAK LINK: We’re rolling out more and more sensor-packed, internet-connected
devices, but the Internet of Things remains a major weak point for defenses. All too often these
devices lack basic security features, or they aren’t properly configured and rely upon default
passwords that can give attackers easy access. This in turn is giving rise to botnets, which can be
used for volumetric attacks, to exfiltrate stolen data, to identify further vulnerabilities, or for
brute force attacks. We need to properly secure the IoT or it will continue to be a big issue in
2018.
AI : As artificial intelligence and machine learning gathers pace, and starts to impact
more and more industries, it’s sure to play a bigger role in cybersecurity. Because the
battle with cyber criminals moves so quickly, machine learning models that can predict
and accurately identify attacks swiftly could be a real boon for InfoSec professionals. In
the year ahead, these models need to be trained and honed. However, there is also a risk
that AI and machine learning may be exploited by attackers.
RAMSOMWARE: Ransomware has been a growing threat for the last few years, but it continues
to claim high profile victims. It’s not yet clear what everyone learned from the
WannaCry ransomware attacks, but we hope that it highlighted the need to back up regularly,
keep patching and updating systems, and strengthen your real-time defenses. If organizations
took these simple steps, we could dramatically reduce the impact of ransomware.
Meltdown breaks the most fundamental isolation between user applications and the
operating system. This attack allows a program to access the memory, and thus also the
secrets, of other programs and the operating system
Spectre breaks the isolation between different applications. It allows an attacker to trick
error-free programs, which follow best practices, into leaking their secrets. In fact, the
safety checks of said best practices actually increase the attack surface and may make
applications more susceptible to Spectre is harder to exploit than Meltdown, but it is also
harder to mitigate. However, it is possible to prevent specific known exploits based on
Spectre through software patches.
Based on their findings, the CLTC research team came up with five scenarios for cybersecurity
in 2020.
Scenario 1: The following bullets describe what the CLTC researchers speculate will be the new
normal.
Internet users in 2020 assume their data will be stolen and their personal information
broadcast.
Law enforcement struggles to keep pace as large-scale cyberattacks continue, with small-scale
cyberattacks becoming commonplace.
Governments are hamstrung by a lack of clarity regarding jurisdiction in digital-crime cases.
Hackers prove adept at collaborating across geographies, while law enforcement agencies are
not.
Individuals and institutions respond in diverse ways: a few choose to go offline, some make their
data public before it can be stolen, and others fight back.
##############################################################################
####
• How can we stop hackers from hacking us > \\START WITH CLAME
• Use strong password's
• Ensure robust user authentication and firewall protection
• Get the right security software
• Safe browsing
• Consider moving data to the cloud
• Keep offline backups
• 2 STEP VER
• Make sure you're on an official website when entering passwords
• Avoid jailbreaking (or rooting) your phone or side-loading apps
• Encrypt your hard drive
• Back up your data frequently.
• Avoid clicking suspicious links or responding to unknown emails.
• Enable a firmware password.
• Disable remote access.
• install antivirus software on your computer
• Use secured wireless networks.
• Download programs only from reputable sites.
• Avoid file sharing services.
• Shop only on secure sites
• Keep personal information off social media