Remote work for Digital anxiety

Since the start of the Covid-19 pandemic in early 2020, the number of people working from home has increased dramatically. This effort to prevent health hazards may have slowed the spread of the virus, but according to F-Secure, it may have also contributed to an increase in digital anxiety among remote workers. According to a recent survey, 67 percent of internet users who work from home, compared to 58 percent of other users, are increasingly concerned about their online security and privacy, even if nothing is wrong.

Continue reading Remote work for Digital anxiety

Cyber-attack on ICRC

Server with personal information of above 500,000 people faced a complex Cyber security attack. That information is linked with data from Red Cross and Red Crescent Movement. This incident triggered the renowned organizations to re-check and test the security of their data.

The server containing various services and information that ICRC was working on to reconnect people separated by wars, violence, etc. was detected an anomaly. And when the deep investigation was conducted, it was found that hackers took over the system and can access the data. To reduce the damage and to ensure the security of accessed data ICRC was forced to shut the servers off. Further to estimate the loss and identify the loopholes in the system independent audit firm was hired. Still, the genuine and authentic information regarding the hosts of the attack has not been confirmed. No ransom has been demanded in exchange for data so even a random guess or illogical move would create a blunder. ICRC is willing to communicate directly and confidentially so the hackers would respect the humanitarian action and the principles of ICRC would be preserved. 

Continue reading Cyber-attack on ICRC

Artificial Intelligence for Cyber Security

AI is always known to be by learning. By digesting billions of data items, AI enhances its ability to “understand” cybersecurity dangers and risks. AI reasoning identifies risks more quickly. In seconds or minutes, AI evaluates correlations between risks such as malware files, strange IP addresses, or insiders.

Hackers can defeat security algorithms by targeting the data they train on and the warning flags they search for, thus machine learning and artificial intelligence can assist protect against cyber-attacks. According to internet statistics, the global market for artificial intelligence in cybersecurity is predicted to increase at a CAGR of 23.6 percent from 2020 to 2027, reaching $46.3 billion.

Because AI and machine learning can swiftly scan billions of data sets and hunt down a wide range of cyber dangers, from malware to shady behavior that could lead to a phishing attack, they are becoming increasingly crucial in cybersecurity.

Artificial intelligence aspires to mimic human intelligence. It has enormous potential in the field of cybersecurity. Artificial Intelligence (AI) systems can be trained to provide threat warnings, identify new types of malware, and protect critical data for enterprises if used correctly.

Continue reading Artificial Intelligence for Cyber Security

Intrusion Detection using Machine Learning

Telecom operators are currently using Artificial Intelligence (AI) technologies to improve their services. Cloud providers are beginning to provide AI as a service, making the technology available to all customers. Compromising an operator is valuable to the attacker, and using AI to increase their success rate is considered a technique to do so. Telecommunications providers are also under attack from two directions: direct attacks from cybercriminals attempting to compromise their organization and network operations, and indirect attacks from those attempting to steal their subscribers’ data. Many classic attack vectors are present among the top threats now attacking each of these frontlines, but with new twists in terms of complexity or size that place new demands on telecoms businesses. The following are some of the threats:

  1. Distributed Denial of Service (DDoS) attacks
  2. The exploitation of vulnerabilities in network and consumer devices
  3. Compromising subscribers with social engineering, phishing or malware
  4. Insider threat
Continue reading Intrusion Detection using Machine Learning

Cyber Warfare: Potential Role of Developing Countries

In 2013 more than dozens of government websites are hacked by hackers’ communities. As per information, most of the hackings are done from Saudi Arabian territory. A number of these hackings included displaying messages regarding scolding Nepal and Nepalese people on the victim websites. The aim of those hackings and the locations from where these hackings are being done are officially unknown yet.

Continue reading Cyber Warfare: Potential Role of Developing Countries