2015 First Quarter With Kaspersky Lab

image

Every now and then, we simply have to include some of the dark cloud reports, which come from the Kaspersky Lab mountains. You know how it goes, don’t you? There is no good news with the busy little bees from the Kaspersky Lab. So, let us see what wrong has happened in 2015 first quarter for us to worry about.

The number of cyber threats and attacks have simply doubled in comparison to the identical period of the previous year. We are talking only about malware and viruses registered by the Kaspersky products and solutions. Unfortunately, that is only the beginning of bad news.

There is a new bad guy in our cyber-town and it is called the Equation Group. These guys are dead serious about their malicious work. They can infect your device’s firmware. How? That is something, Kaspersky would like to know, as well. What is the moral of this depressive story?

Well, for Kaspersky and other cyber security service providers the business is as usual. They will have plenty of work to do in the future. On the other side, we do not have a choice, than to become a little bit more religious. Pray that an Equation Group’s malware does not find you in the cyberspace.

Develop or Buy, Buy or Cry?

image

Should you develop your own fully customized cyber security solution, or rather simply buy an existing one? There is a third option, as well. You can adapt some solution, you have previously acquired. All options are free to use and explore. Just like there is no answer for this puzzle.

As always, it all comes down to your choice and inner voice. Do not waste your time looking for a universal advice, because you are going to end up in a huge disappointment. Maybe, we have moved in the wrong direction all of this time. Here is an additional explanation for this claim.

Do we really to trouble our brain over this unnecessary dilemma? The real question is quite a different one. What are you waiting for? Do you really need to think twice before introducing an appropriate solution, which may or may not be tailored to our specific needs? If this is a case, then what?

Then, you have already left an open door for the hackers. Then, you have lost a right to complain. While you are wondering what to do, the hackers are deciding where to attack. It is more than obvious that cyber security is not a place for philosophers, nor for dilemmas, such as to be or not to be my cyber security.

Through Congress To Security Progress

image

It may sound a little bit unorthodox, but in the world of cyber security a debate is actually a positive thing to witness first-hand. So, who has a responsibility of pushing the security things in the right direction? Some fingers pointing impatiently and with expectations in the Congress’ direction.

Do we really need a legislative “motivation” to improve the security standards associated with our credit cards and available online payment solutions? As you might have guessed from the enclosed picture in this post, there is no opinion free of dispute nor controversy.

Business representative would gladly accept the push from the Congress in this field. On the other side, the busy little bees behind the cyber security industry are surprisingly up to a more flexible approach. Why? If there is a law, there has to be some responsibility, as well. Right?

We sure hope that the hackers will not take an advantage of this ridiculous situation where two sides are arguing over a simple and painfully obvious thing. You do not have to go to Congress, in order to achieve security progress, do you? Or, maybe there is no other way?

Cisco New Malware Disco

image

The busy little bees in the Cisco security department have an intriguing new concept for us. Are you eager to hear it? On the other hand, is there something we can do in order to radically improve our current cyber security situation? For real? We are not talking about the cosmetic changes.

Well, it is supposed to be, according to Cisco. This new guy-in-cyber-town is called the “layered defense”. You do not have to be a rocket scientist to figure it out with no additional explanations, do you? The only thing we are not quite certain about is the very structure of this layered cyber defense.

What is Cisco’s masterplan with this one? Are we talking about the cyber defense, which is structured and organized in a couple of rings? Or, maybe Cisco plans to introduce a principle, where the best is being saved for last. This means that your strongest security component will be activated at the end.

For Cisco, the things just could not be possibly simpler. Your worst nightmare malware can knock down a couple elements of your defense, but definitely not all of them. Yet, this is an extremely optimistic presumption that your layered defense is going to hold on till its very last line. Right?

XSS Bugs On WordPress Leaves

image

What is the thing between numerous bugs and the WordPress? You cure one, but before you know it the next one jumps in. The latest one is associated with the DOM or the Document Object Model, which gives the XSS cross-site scripting trouble in return. What is the cause?

Well, this bug was an unexpected “gift”, which was introduced with the WordPress 4.2.2. We do not claim to be WordPress gurus, but from what we have heard this update eliminated all non-critical HTML files. Could they have predicted that these operations would cause so many problems?

What kind of problems, exactly? First of all, in order to create a living hell for a certain website, you only need to be a registered user. In return, you could easily host all kinds of malware attacks, influence financial transactions or simply take over the entire website. Let us stop here.

There is no crystal ball for developers. However, you have to devote some of your precious time for predicting the most possible outcomes. Even the worst case scenarios. That would also mean less stress for the WordPress, as well. Or, how about some effective cyber insecticide for all of these bugs?

Banzai! Kamikaze Virus!

image

Here it goes. We have a bad and a less bad news for you. Why do you look so surprised? Take this innocent look off your face. Right now. There is no such a thing as a good news in the heartbreaking world of cyber security. So, which one of these two, you want to hear first?

Let us start with the bad one. There are some really nasty cyber guys, called the Kamikaze Viruses. You do not have to be a rocket scientist to know what these malicious busy little cyber bugs are all about, do you? They destroy both themselves and your computer as well. So, what now?

The only positive thing in this situation is that there are not too many of these killers. They are simply too bad for the business. What is the use for a hacker, if he or she kills your machine straight away? However, this does not mean that you will not hear banzai at some point in time.

So, what can you do about it? Buy yourself a new cyber ride. What else? In the meantime, think twice before you open a suspicious attachment. Yes, cyber boys and girls your own private Kamikaze Virus is not going to come out of the blue. You will hear gentle knocking on your door.

White House And Black Cyber Laws

image

In order to protect you properly, we need to spy on you enormously. Does this sound like a fair or a win-win scenario to you? The White House is a breath away from passing the Protecting Cyber Networks Act. So, what is the catch with a new member of the numerous cyber laws family?

Well, to make the long story short, we will get more surveillance in an exchange for the better cyber security. It seems that our government just cannot get enough of additional authorizations. One fine day, we will not need laws in this extremely controversial field.

Why? Because, every single moment and every available square inch are going to be covered by the state’s surveillance, this way or another. We have every reason to believe that we are not going to make it to the 2084 in order to have a proper anniversary. Are we being too much pessimistic?

Ask Edward Snowden for a second opinion, because he certainly has a lot to tell you about it. In the meantime, there is no other comfort for you than a timeless NSA advice. If you have nothing to hide, then there is nothing to worry about. Seriously? Is that all we are left with?

Battle Of Britain

image

According to the latest Symantec cyber security report the UK was the most popular destination for hackers in 2014. Almost five in six large companies were under some kind of a cyber-attack, this way or another. So, what is this supposed to mean? What should we think about this particular information?

Well, this is a painful increase of more than 40% compared to 2013. Yet again, you simply cannot avoid asking a simple question. How can this be? Who is to blame for this embarrassing negative result? Believe it or not, we are ourselves the worst cyber enemies in the entire virtual universe. How?

It is quite simple, actually. This may come as a huge surprise, but it turns out that the hackers themselves are extremely lazy and profit oriented cyber-creatures. That means they would rather allow their malicious automatized systems to do all the dirty work. They are counting on you, for real.

The absolute majority of all cyber attacks and successful phishing schemes came from the surprisingly naive malicious emails. Unfortunately, the average business UK users were even more naive. Before you know it the entire business structure was infected and compromised. Enough said, isn’t it?

Bad Cyber Boys With Real Toys

image

How do you imagine an average hacker from your neighborhood? A harmless and innocent teenager, a little bit overweight, who spends days and nights on a keyboard, under the Coca-Cola and pizza delivery ambalage. Well, if this is a case, then you are both helplessly and dangerously romantic.

What would you say, if you were to hear that more than 60% of cyber criminals already have the real-life criminal record. How about this for a change? I am not a criminal in a traditional sense, I am merely a freedom fighter on a keyboard. This hacker’s statement is just so far from the reality, isn’t it?

So, what is the moral of our story? When you are a criminal, it does not matter where you get caught. The virtual world is not an excuse for the real one, and vice-versa. Do your best to keep it clean and flawless in both worlds. What is even more important forget about the wrong kind of empathy.

There is no point in feeling sorry for the hackers and all kinds of cyber criminals. We do not need fake heroes. Your friendly neighbor hacker has not hurt anyone in the virtual world, but there is a 60% chance that someone is suffering in the real world as a result of his wrongful doings. Think about it.

Your New WatchDog WatchDox

image

BlackBerry has acquired the WatchDox. So, what is the big deal about this takeover? And, who is this WatchDox? What does it do? Well, for what is worth, BlackBerry got its cyber hands on one of the most serious players in the field of content security. Now, we are confused. What is the plan?

It is not a secret that BlackBerry struggles really hard in order to stay alive under the new mobile circumstances, including the new smart kids on the block. Once upon a business time, one in every two mobile phones in the USA was a BlackBerry model. Now, all we have is a famous brand name.

When it comes to the business survival, you do not do what you like, but rather what you can sell. One serious rumor has it that Google is eager to team up with the BlackBerry itself. Why? What could possibly BlackBerry offer to Google? Some cyber security know-how and security software, as well.

The latest BlackBerry models Passport and Classic are more of a reminder what is this proud mobile pioneer all about, than a serious threat to Apple or Samsung. Who knows, maybe we are to discover again that the cyber security can be a nice way to ensure both business survival and stimulative profit.