West

now browsing by tag

 
 

#nationalcybersecuritymonth | Opportunistic scammers are preying on coronavirus fears, warn West Yorkshire Police

Source: National Cyber Security – Produced By Gregory Evans

Numerous scams have emerged as criminals seek to take advantage of concerns ranging from how to reclaim money lost on holidays to financial support when schools close.

West Yorkshire Police, Action Fraud and others have been using their own social media channels to raise awareness of the tactics being used.

Ramona Senior, the head of West Yorkshire’s Economic Crime Unit, said her team was anticipating an influx in reports of such scams as fraudsters were very good at “diversifying”.

West Yorkshire Police are warning people about coronavirus scams Copyright: jpimedia

Investigators typically see seasonal scams tied into things like Christmas shopping, Hajj pilgrimages or HMRC tax return deadlines.

Tickets scams linked to big events like music festivals are another example of how the criminals will seek to exploit people using whatever is topical.

Ms Senior said fraudsters will also look at big talking points in the news like last year’s collapse of Thomas Cook, using emails, text messages and cold calling to try to lure in potential victims.

“They make up all sorts of things that sound legitimate at the time,” she said. “Everything that’s in the public eye, a news report about something that creates anxiety or people may lose money and want to protect themselves, is a bit of an opportunity for the fraudsters.”

The force’s Cybercrime Team has warned in recent days about the risk of downloading apps claiming to provide information on the spread of the virus, which are being used as a way to get malware onto people’s phones.

It also shared an image of a malicious website which is luring in people searching for coronavirus maps. Visiting the website infects the user’s phone or computer with malware, steals information and accesses sensitive data.

And within days of the news that the UK’s schools would be closing to everyone but the children of key workers, another scam has emerged.

One such email containing fake links and promising funding for families says that if your child’s school is closed and they are entitled to free school meals, then you should click on the link to send your bank details to the school.

Industry body UK Finance advised earlier this week that criminals were using publicity around coronavirus to “pose as genuine organisations, including banks, police officers, government, the World Health Organisation or other health service providers”.

Katy Worobec, managing director of economic crime at UK Finance, said: “We would urge the public to be vigilant against criminals using the publicity around the coronavirus as a chance to target their victims with fraudulent emails, phone calls, text messages or social media posts”.

The organisation said criminals have used coronavirus as a cover story to attempt to get victims to “disclose personal or financial information or click on links that may contain malware”.

Take Five, the national campaign led by UK Finance and others, is also advising people unable to take planned holidays to be wary as criminals may pose as travel companies or airlines.

It has urged anyone in that situation to contact the organisation they made their booking with directly to enquire about refunds.

Meanwhile, experts from the National Cyber Security Centre (NCSC) have revealed a range of attacks being perpetrated online as cyber criminals seek to exploit coronavirus, known officially as Covid-19.

Techniques seen since the start of the year include bogus ‘phishing’ emails with links claiming to have important updates, which once clicked on lead to devices being infected.

Also in crime: ‘The scammers don’t discriminate’ warns trainer with advice on staying safe

As part of GCHQ created to keep the UK safe online, the NCSC has taken measures to automatically discover and remove malicious sites which serve phishing and malware. These sites use Covid-19 and coronavirus as a lure to make victims ‘click the link’.

Director of operations Paul Chichester said: “We know that cyber criminals are opportunistic and will look to exploit people’s fears, and this has undoubtedly been the case with the coronavirus outbreak.

“Our advice to the public is to follow our guidance, which includes everything from password advice to spotting suspect emails.

“In the event that someone does fall victim to a phishing attempt, they should look to report this to Action Fraud as soon as possible.”

Last month, the World Health Organisation (WHO) warned of fraudulent emails sent by criminals posing as the WHO.

This followed a warning from the US Federal Trade Commission about scammers spreading phishing ‘clickbait’ via email and social media, as well as creating fraudulent websites to sell fake antiviral equipment.

Elsewhere, cyber criminals have impersonated the US Center for Disease Control (CDC), creating domain names similar to the CDC’s web address to request passwords and even bitcoin donations to fund a fake vaccine.

Individuals in the UK have also been targeted by coronavirus-themed phishing emails with infected attachments containing fictitious ‘safety measures.’

Source link

The post #nationalcybersecuritymonth | Opportunistic scammers are preying on coronavirus fears, warn West Yorkshire Police appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | West Coast Fishery Rebounds

Source: National Cyber Security – Produced By Gregory Evans Groundfish is a catch-all term that refers to dozens of species that live or on, or near, the bottom of the Pacific off the West Coast. Trawling vessels drag weighted nets to scoop up as many fish as possible, but that can also damage critical rocky […] View full post on AmIHackerProof.com

#cybersecurity | hacker | Is 5G the security silver bullet for system integrators in the West?

Source: National Cyber Security – Produced By Gregory Evans

U.S. vs. China heavyweight
fight not ending soon

As we endure the ongoing U.S.
vs. China trade talks, it has become increasing clear that the U.S.
administration’s on-again off-again relationship with China is not going to
change.  The U.S. is seeking a reset
in its relationship with China
including better protections for American IP,
and Huawei has become a victim of this reset.

This ongoing instability has
resulted in having the Five Eyes’ (United States, Britain, Canada, New Zealand
and Australia) decision
not to use technology from Huawei in the “sensitive” parts of their telecoms
networks.  The U.S. told allies not to
use Huawei for fear of Chinese spying through the back doors of the equipment.

The key to share shift is
5G

Now let’s look at the U.S. vs.
China spat through the lens of wireless system integrators.  Ericsson and Nokia have long been dominant
players in world since 2G.  Huawei made
significant share increases in APAC with LTE deployments and to a lesser extent
in Latin America, Africa and Eastern Europe. 
Now LTE deployments (first national deployments begun in 2009) are
largely complete. 

The networks are built, the vendors
are selected, and their services are up and running.  Global market share is set, for now.  Now enter the 5G major deployments for 2020.  New 5G vendors are performing acceptance
testing on initial deployments imminently at this very moment, and this represents
the biggest chance in 10 years for any of the major vendors (Ericsson, Nokia,
Huawei, Samsung, Cisco) to gain share.

Enterprise fears and China
leers

Once we accept that Huawei’s position
in the cross hairs of the U. S. administration isn’t changing, there are two
aspects we must consider.  First, though
Huawei’s executives have made multiple statements saying there are no back
doors to their equipment, two Chinese laws- the 2017 National Intelligence Law
and the 2014 Counter Espionage Law -remain very problematic for the
company.    Some of the most troubling language is
content like Article 22 which states:

“When the state security organ investigates and understands
the situation of espionage and collects relevant evidence, the relevant organizations
and individuals shall provide it truthfully and may not refuse
.”

Legal experts
have interpreted this as a legal basis upon which the Chinese government could
compel any Chinese company including Huawei to share any and all customer data from equipment deployed both inside China
and throughout the rest of the world.

With the understanding that
Huawei may have a legal obligation to share customer data with the intelligence
wing of the Chinese government, non-Chinese vendors gain a distinct advantage.  Because enterprises believe they can be and
are being penetrated (Radware research
found that 67% of C-Suite executives believe their networks can be penetrated
by hackers).  Cisco, Nokia, Ericsson and
others can differentiate themselves by developing a superior security offering.  And they can make a statement to Service
Providers that Huawei never can: “We will never share any customer data with
any foreign governments and have ZERO legal obligation to do so.”

Once Cisco, Ericsson, Nokia
and others embrace this statement, Service Providers will clearly understand they
can build superior, high quality, agile security services with Western vendors. 

Thousands of security
instances, when and where you need them

As Service Providers build
out their new 5G core networks, many will build out thousands of Mobile Edge
Compute (MEC) nodes across the network. 
These MECs give the Service Providers a service edge that is geographically
very close to tens of thousands of enterprises, and that sees all the
applications flowing in and out of the enterprise.  This becomes an ideal point to insert a
security instance at the network, or application layer (or both) to inspect
traffic in real-time as it enters and exits the enterprise.  When the security instance sees any anomaly,
it can signal to the orchestration layer to spin up an enforcement instance to
clean the traffic and block the offending IP address (or whatever action is
required by the pre-programmed security policy).

In addition, the MEC nodes
are effectively distributed private cloud instances.  As such, they enable Service Providers to
deploy this highly valuable security service as a completely software-based
cloud solution.  This results in a
significantly lower cost service with new business models in which enterprises could
pay for a monitoring only service that increases to an additional enforcement
service just for the actual minutes spent thwarting an attack.  This opens new avenues for revenue to
businesses that see themselves as vulnerable, but can only afford a small
amount per month to monitor their applications.

Increase growth 30X? Yes
please

Managed Security Services are
going through a period of explosive growth. 
For example, Akamai saw 29%
growth YoY
in its most recent quarter.

In an environment where large
Service Providers are growing
overall revenues
in the low single digits, a high value, high margin service
growing almost 30X faster than the overall company is very attractive. 

Cisco, Ericsson, Nokia and
other non-Chinese vendors have a unique opportunity to lead with security in
their 5G MEC applications.  This will
enable them to differentiate against Huawei with the superiority of their
offerings and the ability to provide peace of mind from foreign government
hacking that clouds Huawei networks.  It
truly is a great opportunity for Western network equipment vendors to:

  • Gain 5G share
  • Help Service Providers
    build a superior high value security service
  • Differentiate
    themselves as the pro security, pro privacy vendors for Service providers in an
    environment where most enterprises see themselves as vulnerable.

Original Source link

The post #cybersecurity | hacker | Is 5G the security silver bullet for system integrators in the West? appeared first on National Cyber Security.

View full post on National Cyber Security

#nationalcybersecuritymonth | GLACY+: Inter-Ministerial Round Table on cyber security and cybercrime in West Africa, Ghana an ECOWAS best practice

Source: National Cyber Security – Produced By Gregory Evans

An Inter-Ministerial Round Table on cyber security and cybercrime in West Africa was held in Accra, Ghana, as high-level event of the Climax Week of the National Cyber Security Awareness Month. The meeting gathered together Ministers, diplomats and other dignitaries of countries from the ECOWAS Region, including Ministers from Ghana, Guinea Bissau, Liberia, Niger, Sierra Leone. The meeting was chaired by the Minister for Communication of Ghana, co-chaired by ECOWAS and the Council of Europe, and attended by additional participants coming from Embassies of Burkina Faso Togo and Benin, Ministry of Communications of Nigeria, U.S. Department of State, UK High Commission.

 

A declaration was prepared in the end of the meeting, reporting the main take aways of the day, and will be formally submitted by the Ghanaian government to the next gathering of the ECOWAS Technical Committee.

 

During the meeting, ECOWAS Commission endorsed Ghana as the champion in the region on cyber security and cybercrime matters, requesting the country to act as “ambassador” in the field and share best practices with neighboring countries.

 

Source link

The post #nationalcybersecuritymonth | GLACY+: Inter-Ministerial Round Table on cyber security and cybercrime in West Africa, Ghana an ECOWAS best practice appeared first on National Cyber Security.

View full post on National Cyber Security

West African Cyber Security Summit (WACSS)

Source: National Cyber Security News

General Cybersecurity Conference

 March 20 – 21, 2018 | Lagos, Nigeria

Cybersecurity Conference Description 

The West African Cyber Security Summit is a one-day conference co-located alongside Securex West Africa 2017. See key industry experts take to the stage as they host specialist sessions and panel discussions around the West African cybersecurity industry.

2017’s event brought together over 80 senior members and stakeholders from the private and public sector to learn about important developments, key trends, cutting-edge technology and discuss the latest risks and threats facing the future of the industry.

Speakers included leading experts from prominent cybersecurity firms and government agencies such as KPMG, the Economic and Financial Crimes Commission, Ernst & Young, G3, CSEAN, Interpol and more.

Read More….

advertisement:

View full post on National Cyber Security Ventures

Cybersecurity Connect West

Source: National Cyber Security – Produced By Gregory Evans

General Cybersecurity Conference

 March 8, 2018 | Calgary, Canada

Cybersecurity Conference Description 

An Invitation-Only Summit for Heads of Cyber Security

Cyber Security Summit West was designed in collaboration with leading cyber security experts and is a peer-to-peer discussion to ensure your network and organization are resilient in a time of increased and sophisticated cyber-attacks.

Read More….

The post Cybersecurity Connect West appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

West Valley man faces 31 charges in alleged identity theft, forgery sprees

hands-and-breaking-handcuffs_shutterstock_58240561A West Valley man faces 31 federal charges in connection with alleged forgery and identity theft crime sprees in Salt Lake County in 2013 and 2015. Prosecutors say Kevin Russell Humphreys, 35, stole mail, identifications and checks, and then forged the checks for various amounts before cashing them in the names of people whose identities […] View full post on AmIHackerProof.com | Can You Be Hacked?

SANS Security West 2016

sans

Cybersecurity Training in San Diego, California

Take Cybersecurity training in San Diego from SANS Institute, the global leader in information security training. At SANS Security West 2016 + Emerging Trends, we offer more than 20 hands-on, immersion-style security training courses taught by real-world practitioners and interactive bonus sessions, led by a star-studded panel, on Emerging Trends in cybersecurity.
Event Schedule

Two-day courses: Begin on Friday, April 29th.
Five-day courses: Begin on Monday, May 2nd.
Six-day courses: Begin on Sunday, May 1st.
View the complete schedule, which includes all Courses, Bonus Sessions, and NetWars Tournaments. For a printable schedule, download the Security West event brochure.

With cyber-attacks and data breaches on the rise, attacks becoming more frequent, sophisticated and more costly the gap in the ability to defend has become wider and more time sensitive. Now is the perfect time to take the next step in your career. Cybersecurity is more vital, crucial, and important to the growth of your organization than ever before. Join us at SecWest to gain the skills and knowledge to help your organization succeed.

The line-up of cybersecurity courses below, covers IT security, digital forensics, ethical hacking, penetration testing, software security, and security courses for legal and management personnel. In addition to these security courses, the Emerging Trends discussions will provide the insight necessary to stay ahead of the latest cybersecurity threats and keep your organization secure.

The site of SANS Security West 2016, May 1-6, 2016, is the Manchester Grand Hyatt Hotel in San Diego, located where the culture and beauty of the sun sparkling off the San Diego Bay is right outside your door. At SANS Security West, you have the opportunity to advance your information security skill set, learn to prepare your organization for the future, and enjoy the fun and sun of San Diego
Source:http://www.sans.org/event/sans-security-west-2016?utm_medium=Referral&utm_source=Concise+Courses&utm_content=FEL_SecW16_Concise&utm_campaign=SANS+Security+West+2016

The post SANS Security West 2016 appeared first on AmIHackerProof.com.

View full post on AmIHackerProof.com | Can You Be Hacked?

North West And Penelope Disick Prove You’re Never Too Young For Hair Extensions

If you’re a member of the Kardashian family, you know there’s nothing more important than a good glam team. 

North West, 2, and Penelope Disick, 3, clearly already have a better hair and makeup crew than most, as the two little gals have been rocking what look like extensions for a little while.  

It appears Khloe Kardashian might have something to do with P’s hair, since she Instagrammed a photo of the two twinning a few days ago with the caption, “I made her my mini me!!” 

ISIS to unleash TENS OF MILLIONS of jihadi hackers on West in blitz worse than NUCLEAR WAR

Source: National Cyber Security – Produced By Gregory Evans

ISIS to unleash TENS OF MILLIONS of jihadi hackers on West in blitz worse than NUCLEAR WAR

The computer security expert, who invented the McAfee anti-virus software, claimed “fifteen to 25 percent” of the world’s 1.6 billion Muslims are extremists, meaning ISIS could have an army of 400 million fanatical followers ready to strike at any minute.  Computer boffins at the terrorists’ headquarters in Raqqa have developed a secret smartphone application designed to spread Islamist propaganda and help followers carry out terrorist attacks from the comfort of their own homes. A team which may have included British hacker Junaid Hussain invented a feature which allows even the most computer illiterate of jihadis to launch sophisticated Distributed Denial of Service (DDoS) attacks against websites. DDoS attacks work by flooding a site with fake traffic, causing it to grind to a halt, and have been successfully used against some of the world’s biggest companies and government departments. Experts now believe that ISIS hackers carried out a major test of the app’s capabilities last week by launching an audacious attempt to bring down the 13 root servers which keep the Internet running worldwide. Whilst the attack ultimately failed, it did temporarily slow down services across the globe and has been described as an unprecedented attempt to strike at the heart […]

For more information go to http://www.NationalCyberSecurity.com, http://www. GregoryDEvans.com, http://www.LocatePC.net or http://AmIHackerProof.com

The post ISIS to unleash TENS OF MILLIONS of jihadi hackers on West in blitz worse than NUCLEAR WAR appeared first on National Cyber Security.

View full post on National Cyber Security