More About Sony

image

Here is more about the latest cyber controversy associated with the Sony Pictures Entertainment and North Korea. It turns out that the notorious Bureau 121 has some talented individuals, rather than the cyber magicians. Why? For what is worth, the Sony itself was an easy cyber prey. Really?

Unfortunately, the hackers have found an entire file in the Sony’s cyberspace with an intriguing title – Passwords. Yes, cyber boys and girls, the entire Sony Entertainment IT structure was offered at a glance in an unprecedently reckless way. So, what is the moral of this story for us to be remembered?

If you want to make a movie about some of the world’s most notorious dictators, you have to make sure that the top cyber security experts are among your employees. Otherwise, you will inevitably hit the wall, which is not going to be made of cyber bricks, but the rock-solid materials. Is that enough?

Well, it is advisable for you not to have identical user names and passwords. In addition, you should make a living hell for the hackers, who are trying to cause you harm. In the meantime, we shall see what is going to happen with the clash between Hollywood and the North Korea. Maybe, they will make a movie about it, as well.

The Bureau 121

image

Is this a lovely name for some SF or action movie, or what? Well, you should be fully aware that this a code name of the top hackers unit in North Korea. These guys are deadly serious with what they do. And, apparently very sensitive when it comes to their dear leader. So, what happened?

You should google a little bit about the new movie about North Korea. Although, this is a comedy, for the North Korean leadership there was nothing funny. As a result, Sony Pictures Entertainment division was hacked. As you can see cyber warriors can easily reach wherever you are or what you do.

These intriguing details were revealed by one of the Bureau 121 former members, who was able to escape to where else, than South Korea. So, what is so interesting in this story? Well, we tend the underestimate this country, over and over again. Some people think they still live in the stone age in terms of technology.

North Korea takes care of the talented guys from this group in a fascinating way. They are the elite, and they are treated as such. It turns out that North Korea knows how to take care of its priorities. Cyber warfare is definitely one of them. There is something we can learn from the Bureau 121. Right?

Samsung Galaxy vs Nokia 3310

image

It is a ridiculous thing to even try comparing these two mobile phones in the very first place. Who could have done such a thing and what could we possibly prove with that? Luckily for us, there are some busy little bees with some funny and original unorthodox ideas. This is what we got as a result.

The very purpose of some very painful experiments for our dearest shining gadgets was to prove how far we have gotten with our progress. Really, once a proud pioneer of the promising mobile revolution looks like a primitive toy compared to its younger smartphone relatives. Yet, this is notnthe whole story.

It turns out that our old little fellow is more resistant in both real and cyber worlds. How could that be? It is quite simple actually. If you try to break it, you will have to put some additional effort. On the other hand, if you want to hack it, you have to forget about it. Sometimes, being primitive has its advantages.

So, which one should you use? The modern one, of course. Why? So, you can enjoy all those shiny apps. Then why was it necessary to destroy two phones to make only one point? Believe it, it was totally worth it. This is a nice reminder that we have not achieved anything remarkable. We have merely improved it.

Gmail Attachments With A New Address

image

From now on, you can find all of your Gmail attachments on your Google Drive account. So, what is up with this one? We are a little bit confused. This is supposed to be a good or a bad news for us? It comes without saying that can be a nice and cozy feature for Gmail users. We have to give them a credit for that.

On the other side, we cannot help ourselves noticing an obvious attempt of Google to push up a little bit the use of its cloud services. Now, let us examine what is very likely to happen with our cyber security. This is not such a smart thing to do. It is just like you put all of your data eggs in one gasket.

This can potentially allow easier access for the hackers. All they have to do is to get your Google Drive account. No need to mess up or waste time with the Gmail account in the first place. For the sake of all of us, we sure hope that Google knows what he is doing with this one. Otherwise, we are in serious trouble.

It comes without saying that our attachments are very often the most vulnerable and important parts of our emails. Sure thing, we need to do something that will ease our use and downloading process. However, we should not compromise our security with this new option. Right? Otherwise, what is the use?

Happy Hour Virus

image

Although, this idea is not quite compatible with our efforts to fight the unprecedented economic crisis, we cannot neglect or ignore its originality and brilliance. So, what is this app all about? In case you an urgent day off, here is a quick and simple solution. This app will give exactly what you need.

You have a several visual simulation of some of the worst computer malfunctions for your screen. This is supposed to give you a nice excuse in order to make a quick disappearance from your office. Oh no, my computer is broken, I have to go home. This is a simplified option. There are some additional options.

You can use it as a prank as well. Yet, we do not recommend it to your friends, who have some weak heart issues. On the other hand, we have even a better idea. How about the cyber security version of the Happy Hour Virus app? This is supposed to be much more effective compared to a broken computer.

Your IT staff will allow you to move away from your office much more willingly, as soon as you report a virus attack. However, this is not something you should make jokes about. So much trouble for a single day off. How about calling your office and telling them that you are under a flu attack, for a change?

Lock ‘n’ Roll

image

So, what is your excuse to keep forgetting to lock your smartphone? For the absolute majority of people this is an unbearably annoying thing. In addition, according to some researches and statistics you can lose up to one hour each month for locking and unlocking your smartphone. Is that all?

Some people are skeptical for a reason when it comes to the lock phone protection efficiency. That should not be much of a trouble for a skillful hacker. On the other side, a lucky finder of your smartphone could give you a call, if he can access its phonebook in the first place. Who wants to lock it after these reasonable arguments?

Now, let us move to the positive side of your smartphone being locked for the most of the time. With a password protection you are buying yourself some invaluable time to resolve your situation with a stolen or lost phone. Now, it is the right moment for you to think twice about locking your smartphone.

How hard could it be? This is a reasonable investment of your time, which can save you more time and money in advance you would have to spend in dealing the consequences of the cyber attack aftermath. Better to lose a couple of minutes each day for unlocking and locking thing, than to say goodbye to your smartphone.

Happy ATM Monday

image

Our new trouble has a name. It is called the Backdoor.MSIL.Tyupkin. Thanks to the busy little bees from Kaspersky Lab and the Interpol, we know that even the good old ATMs are not excluded from the malicious cyber intentions. With so many online opportunities for stealing money, who wants to be an ATM millionaire?

For what is worth, even the ATM can get infected with an efficient malware. This one empties an ATM in less than an hour. The funny thing about the way it operates, though, is that it allows you to withdraw the money at the very specific hour on Mondays. Why? No one knows for sure, but this is how it needs to be done.

We are not directly influenced as the ATM users. However, how can you feel confident when the financial system is not fully secured? Although, we do not love too much our banks and other financial institutions, we should not find joy in their misery. Who knows, we may easily turn out to be the next direct target?

Unfortunately, everything electronic can become extremely problematic. That is the hacker’s law. This should be an invaluable lesson for all of us. WE should not allow ourselves a luxury of thinking that there are machines out of hacker’s reach. Poor old ATMs, we should do something to protect them.

Nuremberg Star

image

The biggest European IT security fair takes place each October in Nuremberg. If you care about the cyber security and Europe is your cyber neighborhood, you should definitely pay it a visit. If you want to hear something different, pay attention to the following story. You will be surprised.

Who says that big security names have to necessarily deliver the top cyber security solutions? On the other hand, we had a nice chance to witness the arrival some of the most unusual partners in crime. One Japanese and one Serbian IT security companies have teamed up to shake the cyber ground.

Their Tower Netdefender is an inspirational cyber bodyguard. It is very reasonable when it comes to the process requirements. On the other side, it is a fully automatized system. You can Google about the other relevant security features. We would like to use an opportunity of pointing out something else.

We have two partner companies from half across the globe, which have found a way to communicate in this matter. Quite successfully and efficiently. This should be something to follow and apply all over the world. Till the next time in the Nuremberg, and some new creative cyber partnerships and solutions.

ENISA The Goddess of Cyber Security

image

European Union Agency for Network and Information Security or simply the Enisa is supposed to be the backbone of the EU cyber security system. So it is, that is not an issue here. What we would like to know is what can it do in order to protect us. One of the highly appreciated contribution is an event.

We are referring to the EU month of cyber security. Which is also the great thing, as well. Yet, under the current circumstances, it would be more suitable to organize an event with the more appropriate title. The year of the EU cyber security. We are not exaggerating and there is no bitter tone in these words.

We simply need to do much more. As you have probably realized by now, we are a little bit lazy when it comes to the Google research actions. Do we have some similar agencies at the international level? How about the UN? We even have one much better idea to solve the matters here as it should be.

Each major organisation in the world should have a special cyber security department or some kind of a committee. Can you imagine what we could achieve with all of these potential months devoted entirely to our cyber security? One organization. One month. We would not have enough years for all of these cyber months.

I Am The Moderator!

image

So, how do you think the system works? We are talking about the immense content sea of the social networks. You think that you have seen it all, don’t you? You take the situation on the modern social networks for granted. You do not like what you see. Well, without moderators that would have been a living hell.

According to some very reliable urban legends and unreliable rumors there is an entire army of literally hundreds of thousands of social network moderators out there. Most of them are freelancers from the third world countries. For a couple of hundreds of dollars per month you get the top class human filter.

Thanks to these busy little bees we have a unique chance to enjoy ourselves in the cleaned version. Do not you even dare to ask what had to be eliminated during the process itself. All for your pleasure and convenience. Why? Because the good old Facebook does not want to upset its users too much.

If so, how come we do not have hundreds of thousands of cyber security moderators? Well, that is more costly. In addition, from the provider’s point of view, this is a completely different thing. The one he is ready to pay for, only when something bad happens. Poor busy little bees, they fly only in one direction.