Binder A Bitter Reminder

image

What in the world is that? Well, you will have to be a little of an Androidnrocket scientist to fully understand it. Yet, who wants to be a rocket scientist when your cyber security is under a serious jeopardy, such as this one? The Binder itself has its roots deep into the core system of the Android itself.

Speaking about the devil hidden in those deep cyber roots, this is where all the fun begins. As soon as the hackers get their hands on your Binder, they own you literally. They can play with your Android device in the most unimaginable ways. So, what are we supposed to do about it? And Google?

Well, the new Android 5.0 is supposed to offer a poisonous Lollipop to all potential hackers. Yet, the trouble is we do not know it for sure. First, we need to test in order to trust it completely. Now, the clock is ticking and we are blinking. Are we in the trouble already, and how long we will have to wait?

This story should deliver a strong moral for the Google itself. What could it be? You should not allow yourself a luxury of waiting for the next major OS version in order to fix all problems, which go deeply to the very core of the system itself. We will see how will enjoy the new taste of the Lollipop, we or the hackers?

Airlines Grounded For Cyber Security Reasons

image

It is not a joke. Not so long ago the flight schedule of the Japanese PM was hacked. Even worse, it was offered to the black hacker’s market. Do you remember how in one of the Superman movies all oil tankers were unwillingly brought together in the middle of the ocean as a result of hacking?

Well, who says we cannot do the same on the sky? Can you believe that more than 40% of all leading airlines do not have a plan nor effective strategy in terms of cyber security? Why? Maybe, they spend too much time flying and they do not have time to deal with the mother earth related problems such as the cyber attacks.

You can hack whatever you want. We can deal with that scenario. But, what about hacking a plane? There is nothing romantic about it. You are not going to make your own version of the Lost, once your plane hits the ground. And, there will not be any superhero including the Superman to rescue you.

Of all the cyber places in the world the airlines’ IT infrastructure should be the most secured ones. Can you accept the 40% chance for a cyber attack, while you are on the plane? You have greater chances to suffer from the cyber than the terrorist attack while flying. Think about it for a change, will you?

Simplicity Atrocity

image

The hackers do not move in mysterious ways. They prefer simple and effective methods. What is the best way to obtain a private information? Well, all you have to do is call and ask, as simple as that. Or, even better. Just leave a message and your victim will get back to you. Even simpler. Right?

Well, for what is worth, the latest phone scams leave you the extremely realistic messages. Something like, your credit card reports some unusual activities, please contact our support and provide all necessary data. You are already panicking, and you do not have time to think twice about your call back.

They are counting on your fear. This is a reasonable reaction to the unreasonable consequences. Before you know it, you have said all there is to know about you to a complete stranger with some dishonest intentions. So, what can we really do about it? Are we completely helpless, or there is still hope?

Always think twice before you push the panic button in your head. Do not call the suggested number right away. Call the HQ or make some additional inquiries. Surprise your friendly neighbor hacker with your patience and reasonable decision during the hard time. Difficult, but definitely worth a try.

Amazon Cyber Pirate Bay

image

Who are the hackers, actually? The ugly, dirty and bad cyber freaks. Or, maybe you should leave your prejudices aside. Here is an additional and more appropriate definition. Nowadays, the modern hackers are the educated fools with the money on their minds. For some reason, they have embraced the dark side.

And, this is how we ended up here. In the midst of the unparalleled cyber terror. Here are some new moments to add to the existing trouble. The modern hackers have become extremely sophisticated and surprisingly patient. They plan and execute some of the most vicious actions in the long run.

The trouble with the curve in this field is that the recent attacks take the legitimate form. Did you know that almost 20% of all known cyber vulnerabilities and threats come from the Amazon Web Services. How? Well, they have found a way to become a part of the legitimate IT infrastructure.

What is the moral of this story? Our good old friendly hacker neighbors have evolved. So, we should too. Until is too late. The last thing we need it be ridiculously outdated. We should also find an IT security man to plan and fight in the long run. New circumstances call for the new solutions. Right?

Call Of Cyber Security Duty

image

No matter how hard you try, it seems you cannot unlock the mind of a hacker. Why? Well, you can try to predict the certain type of behavior, but they keep surprising you with the things they steal or hack. Here is a controversial case of the cyber theft, which makes it almost impossible to put all pieces of the puzzle together successfully?

So, what happened? It turns out that an extremely skillful hacker has paid a devastating and uninvited visit to both Xbox One and US Army systems. He or she, or eventually them, get into the possession of the Apache helicopter simulation program. Including the pre-release of the latest Call of Duty game.

The estimated value of these stolen goods, which can be classified as the top intellectual property stuff, is more than $100 millions. On the other hand, you can stop wondering. It makes a perfect sense that someone would like to steal the simulation program for one of the best military helicopters in the world.

However, what is with the Call of Duty pre-release? Maybe, our hero needs to relax after the hard work in his office? For the makers of this planetary popular game, this is not a funny story. In the real life hacking is not a video game. Once you end up in jail, you cannot restart the game from the beginning.

The BlackEnergy On The Run Again

image

Who or what is the BlackEnergy? Well, to be quite honest, no one can tell for sure. We can only speculate. However, we can make a wild guess, which sounds extremely reasonable. From what it is known, the BlackEnergy has humble DDoS beginnings. Then, all of a sudden everything has changed for this group.

They have become more sophisticated. In addition, it is more than indicative that the primary targets were in both Ukraine and Poland. This somehow strangely coincides with the recent political and military confrontation in Ukraine. That is why the rumors about the state’s support were born.

But, which state? Well, you do not have to guess twice, do you? Russia is the usual suspect in this story. This does not imply that the USA and other NATO allies do not have cyber black ops teams of their own. Yet, when you have the government’s fingers involved, then the things become even more serious.

What is the point if we keep fighting the cyber menace, which has a state’s support and origin? Solving of all political crisis in the world will not eliminate all cyber threats. Nevertheless, we can certainly decrease their numbers. The most dangerous hackers are the ones wearing state’s uniforms.

Cyber Crime And Business Punishment

image

Why do we need top IT security for our business? So, that the IT experts can earn more. Why do we hesitate to implement these adequate cyber security measures? Because, they are expensive. Because, they are time consuming. Because, we do not have enough qualified staff to implement it.

Well, we have heard so many excuses that we learned them by heart. On the other hand, there is one piece of statistical information that will make you think twice about these ridiculous excuses. There is something scarier than any known malware or virus, which can be found on the Internet.

Are you ready to face the absolute horror? Here it goes. Customers, clients, users, and others, call them what you want, who have experienced a cyber trouble associated with your business are more than likely to pay a visit to your competitors. In more than 50% of all cases, this will happen sooner or later.

Are you already googling in search for the IT security consultant? If you do not want to do it for yourself, then do it for your customers. If you are not afraid of the hackers, then you should be terrified of your competitors. What a lovely way to motivate businessmen to invest in the IT security. Indeed.

Microsoft Online Services Bug Bounty Program

image

Here is a nice way for you to earn $500, or even more. Microsoft has launched the Bug Bounty Program for its online services. The awards begin with the amount of $500 and increase accordingly. Yet, you are required to focus your findings on the MS online services alone. And, there is one more thing.

You need to identify a problem as precisely as possible and offer the most suitable suggestion in order to resolve it successfully. Microsoft will carefully evaluate your contributions and award you accordingly. It comes without saying that is a good and highly recommended activity for any IT player.

This brings us back to the good old days when we had a promising abundance of the bug bounty programs and competitions. Those were the days, weren’t they? It seems that we needed some time to start appreciating again the benefits of these recently undermined ways of improving the cyber security.

We sure hope that other players of the major IT league will join the party, as well. This is an extremely efficient solution for our cyber troubles, which we often take for granted. Luckily, there is a sign of positive changes on the horizon. So, what are you waiting for? The grandpa Microsoft dares you.

Don’t Feel Free With The IC3

image

Who or what is the IC3? The IC3 stands for the Internet Crime Complaint Center, which was launched as the partnership between the FBI and the National White Collar Crime Center (NW3C). It was supposed to protect you and work in your best interest. Then, how come the FBI has issued the warning about the IC3?

Well, it seems that we have matched our match with these hackers, who were able to disguise themselves as the IC3 itself. You cannot believe how detailed and credible they were with their plan. You were lead to believe that the IC3 is addressing you directly about the certain legal issue.

They ask you for some money to solve this matter without further troubles. People fall for it, because these hackers have done their homework properly. Now, the FBI itself has to warn you about this serious threat. So, what is the moral of this story? Well, there is more than one, that is for sure.

We should learn from these hackers. They were methodical, patient and above all, they examined the existing security system from A to Z. They have done our homework, actually. If they can do it, so can and should we. You need to know your enemy in order to defeat him. This is how it goes. Right FBI?

London Business Bridge Is Falling Down

image

Finally, someone has realized what is going on. You do not have to be a rocket scientist to know for sure how cyber attacks can seriously cripple your business. If you know, why do not you do something about it? This is an excellent question for the London Chamber of Commerce and Industry (LCCI).

According to its disturbing findings the so-called hacker’s taxes take £21 billion give it or take from the UK small and medium-sized enterprises (SMEs). You should also take into account that the average price for a skillful hacker’s attack in this case is somewhere between £50,000 and £100,000 per year.

So, what is wrong with this picture? You can do your best, but you cannot find the provider of the IT security services, who can charge you this much for an entire year. That is the moral of this story. Compared to the post festum damage the investment in an appropriate IT prevention is a symbolic one.

Then, how come we keep avoiding to make this very first affordable and necessary step? It is going to happen to someone else, but not me. I do not have time or resources to do it. I do not have qualified staff for these operations. It is time consuming. It is too expensive. So, what is your excuse?