Monday September 16, 2019
Home Lead Story No Environmen...

No Environment Immune to Cyber Attacks: Check Point

The growing popularity of public Cloud environments has led to an increase in cyber attacks targeting enormous resources and sensitive data residing within these platforms

0
//
Cyber Attack, Web-Listing, Malware
The dark net is that part of the Internet which is inaccessible when using standard browsers like Google. Pixabay

Be it supply chain, email, mobile or the Cloud, no environment is immune to cyber attacks as threat actors continue to develop new tool sets and techniques, thus targeting corporate assets stored on Cloud infrastructure, individuals’ mobile devices, trusted third-party supplier applications and even popular mail platforms, a new report by cyber security firm Check Point Software said on Friday.

“Be it Cloud, mobile or email, no environment is immune to cyber attacks. In addition, threats such as targeted Ransomware attacks, DNS attacks and Cryptominers will continue to be relevant in 2019, and security experts need to stay attuned to the latest threats and attack methods to provide their organisations with the best level of protection,” Maya Horowitz, Director, Threat Intelligence and Research, Products, Check Point, said in a statement.

According to Check Point Software’s “Cyber Attack Trends: 2019 Mid-Year” report, with over 50 per cent increase in attacks when compared to 2018, banking malware has evolved to become a very common mobile threat.

Today, banking malware is capable of stealing payment data, credentials and funds from victims’ bank accounts, and new versions of these malware are ready for massive distribution by anyone that’s willing to pay.

Cyberattacks
An employee works near screens in the virus lab at the headquarters of Russian cybersecurity company Kaspersky Labs in Moscow, July 29, 2013. VOA

Email scammers have started to employ various evasion techniques designed to bypass security solutions and anti-spam filters such as encoded emails, images of the message embedded in the email body, as well as complex underlying code which mixes plain text letters with HTML characters.

The growing popularity of public Cloud environments has led to an increase in cyber attacks targeting enormous resources and sensitive data residing within these platforms.

Also Read: Amazon Optimistic on Stable e-commerce Policy from India

The lack of security practices such as misconfiguration and poor management of the Cloud resources remains the most prominent threat to the Cloud ecosystem in 2019, subjecting Cloud assets to a wide array of attacks.

Threat actors are extending their attack vectors such as focusing on the supply chain. In software supply chain attacks, the threat actor typically instils a malicious code into legitimate software by modifying and infecting one of the building blocks the software relies upon. (IANS)

Next Story

OLX and Quikr Users Get Cheated By Fraudsters

How fraudsters attempt to cheat OLX, Quikr users

0
OLX
People often tend to forget that if someone sends them money, they do not get OTP. Pixabay

If you are planning to sell your old refrigerator or air conditioner on OLX or Quikr, first make sure that you understand all the nitty-gritties of digital transactions as fraudsters often target users of these platforms to cheat them of money.

If you lack some basic understanding of how the Unified Payments Interface (UPI)-based transactions work on apps, you may actually end up losing money while attempting to sell stuff on OLX or Quikr.

As soon as you post your ad on these platforms, you may get calls from fraudsters posing as customers. They often appear ready to pay the price that you quote for the item. Sometimes they may even be willing to pay much more than what you originally quoted. Once the deal is fixed, the caller could say that he/she would send the money through PhonePe, Google Pe or other UPI apps.

Where people tend to get tricked is instead of sending the seller money, the fraudsters “Request Money”. If someone does not read the SMS properly, they may fall prey to the tricks of the fraudsters, share the OTP and transfer their own money to them. People often tend to forget that if someone sends them money, they do not get OTP.

“In the last six months, we have identified hundreds of cellphone numbers, which we suspect are of fraudsters and have blocked them. Of the total listings OLX receives each day, nearly 25% of ads are rejected and over 100,000 suspicious accounts are banned every month,” said Lavanya Chandan, General Counsel, OLX India.

To promote cybersafety in India, OLX has also partnered with Cyber Peace Foundation, a civil society organization and think tank of cyber security.

Under this partnership, Cyber Peace Foundation will conduct workshops with users on how to stay safe on the Internet, including on C2C platforms so that they can get the most from their Internet experience. In the first phase of the initiative, OLX and Cyber Peace have rolled out workshops across the states of Karnataka and Haryana.

OLX app.
In the first phase of the initiative, OLX and Cyber Peace have rolled out workshops across the states of Karnataka and Haryana. Pixabay

“With our partnership with Cyber Peace Foundation, we aim to intensify our efforts in promoting the safe use of the Internet. This partnership augments and aids our initiatives in this area, focused on creating a better Internet for everyone,” Chandan said.

Also Read: Zomato CEO Deepinder Goyal Took to Twitter to Embarrass NRAI President

“Our interventions are holistic and include introducing newer safety features on our app/platform, working with law enforcement, a 24X7 helpline for customer safety issues, increased technology-based fraud detection and prevention.

“With Cyber Peace Foundation we are now also going directly to users to help equip them with the knowledge and confidence to use the Internet and digital platforms to their advantage,” Chandan said. (IANS)