Cibersecurity

Fraud with which the ‘hackers’ have achieved $ 26K million

By Technology

The action is not sophisticated: the financial officer of a company receives an email in which its executive director or CEO asks him to transfer a sum of money to a business partner.

There is nothing strange in the message. Nothing blows the alarms. He is your boss giving you an order. And as this enters the work plan of the person who deals with finances, there would be nothing to verify.

However, hours or days later, when the other party in the business claims that the transfer has not arrived, in the office they realize that there was an error, and that the situation is serious.

The money has been sent to a plot of bank accounts that diversify even outside the country, so it is very difficult to warn banks to stop the operation. Sometimes a part of the funds is recovered, but at other times the cybercriminals have already vanished with what is not theirs after having imitated the CEO’s mail and cheated on an employee.

This is known as Business Email Compromise (BEC), which in Spanish we know as Corporate Email Committed, one of the modalities of cyberattack to the cash counter of companies.

A worldwide scam with many zeros
According to figures provided by the FBI, this hacking has generated worldwide losses of at least $ 26 billion since 2016. And all through a relatively unsophisticated attack, according to a BBC report, which depends more on social engineering and deception. than traditional hacking.

The conclusion provided by cybersecurity experts is that emails cannot be trusted, when it comes to sensitive issues, linked to finance, no matter how powerful a company is.

According to the note, at the beginning of September 281 alleged hackers were arrested in 10 different countries as part of a massive operation against global cybercriminal networks linked to these types of scams.

“Committed corporate email is the most expensive problem in all cybersecurity,” says Ryan Kalember, executive vice president of cybersecurity strategy at Proofpoint, a cybersecurity company based in California. There is no other form of cyber crime with the same degree of scope in terms of monetary losses. ”

For Kalember, during the last year the tactics have evolved in different ways. First, hackers focused on the highest-level executive characters of large companies, whether they are executive presidents or chief financial officers, who do not have much time to carry out verifications prior to a transfer order.

But also the focus has been directed to cadres of lower hierarchy.

Smaller hackers, but equally pernicious, manage to imitate the email of a common employee, and from there they ask the company to allocate their monthly salary to a new bank account, that is, the one that belongs to criminals.

The way of acting
Another peculiarity is that, according to Proofpoint, more than 30% of BEC-style emails arrive on Mondays, when hackers try to capitalize on the pending jobs of the weekend.

“The attackers know how people and offices work,” Kalember says. They depend on people making mistakes and have a lot of experience with what works. It is not a technical vulnerability, it is a human error ”.

Attackers also usually put a “Re:” or an “Fwd:” at the beginning of the subject of their emails, so that it seems part of a previous conversation and thus give credibility to your message.

Fraudulent attempts using this technique, according to the researchers, have increased by more than 50% year-over-year.

“One of the reasons why this problem is particularly difficult to eradicate is that it depends on the systematic risk that all of us trust emails as a means of communication,” says Kalemeber.

According to Pindrop Security, an information security company based in Atlanta, Georgia, companies in the United States lost more than $ 246 million in 2015 due to CEO fraud, overcoming losses generated by other attacks such as phishing, vishing, ransomware and credit card fraud.

That year, the FBI would have received more than 7,800 complaints about BEC scams.

Credit card fraud losses totaled about $ 41 million, while corporate data breach losses exceeded $ 39 million.

SOURCE: https://es-us.finanzas.yahoo.com

Teleworking

Taking advantage of telecommuting benefits?

By Business

The emergence of online work platforms in recent years has increased the emergence of new job profiles that, thanks to the development of technology, have made possible the proliferation of innovative professional projects through teleworking.

Technology, and with it hyperconnectivity, are changing the ways of understanding the world, also in the workplace. While the existence of a virtual worker was practically unthinkable a few years ago, today telecommuting has become a practice that many companies already see as usual.

The rupture of the space / time paradigm is undoubtedly one of the factors that enable this type of distance employment, since technology allows a person to attend a meeting or be in charge of an important action from anywhere in the world , without needing to be physically present in the space where the activity takes place.

In this context, the game of crowdemployment or crowdsourcing enters, that is, the use of technology platforms by companies through which projects that are usually managed entirely through the Network are commissioned. One of those tools is Amazon Mechanical Turk, used for simple, low-unit jobs that require a certain level of intelligence that a machine cannot do.

To get it going, organizations demand technology profiles and freelance workers, following the American model. Although at the moment only 3% of workers live solely from digital platforms, the upward trend is visible and the Labor Force 2020 survey states that 83% of managers plan to increase the use of consultants or intermittent employees in the next three years.

The advantages offered by teleworking are immense. The company saves numerous costs related to the rental of a physical space to work and these are redesigned to adapt them to the new template. In addition, there is greater labor flexibility which contributes to the development of employees’ talents and skills and improves productivity.

In this way, an online work culture is generated that implies the frequent use of electronic information processing methods and the permanent use of some telecommunication means for the contact between the teleworker and the company.

In short, the virtual worker adapts to a new environment that is innovative and digital, and that provides numerous advantages for the organizations that apply it, for teleworkers, their family environment and society as a whole.

SOURCE: Next

PlayStation

PlayStation 5 controlled by an AI

By eSports

From the little we know about the next Sony console, it seems that it will be a very powerful tool. Either by its Zen 2 CPU or the SSD to reduce loading times, it is most likely that the next generation of PlayStation should talk. Especially after the data published by Daniel Ahmad, an analyst in the video game industry. Apparently, Sony has patented PlayStation Assist, a voice assistant for PS5.

And it is not surprising, since with the existence of Siri, Alexa and Cortana, there was a voice assistant for consoles. It is true that both Xbox and PlayStation respond to voice commands. However, what PlayStation Assist would bring us would go much further.

“PlayStation Assist would be the name of the voice assistant”

As published by Ahmad, the voice assistant would be controlled by artificial intelligence (AI). And not only would you listen to the typical commands of opening video games or turning on the console, it would also help to help you in the games. In the PlayStation patent, he is described as a voice assistant very integrated into video games.

In fact, players could ask questions like: “Where can I find” X “object?” and the assistant would indicate several ways to achieve it. Among them, I could even mark it on the game map. In the same way, we could also ask you questions about how to defeat a specific enemy, or what is the next step in case some level gets stuck.

Also, players could ask the questions in various formats. In addition to audio, they could do it with images or videos. Of course, as with the other patents, there is no meaning that we will see a voice assistant on PlayStation 5. But at least it’s nice to know that Sony is still working hard on the improvements of the next generation of consoles.

SOURCE: https://thegamersports.com

Cibersecurity

Cybersecurity for your security in the digital world

By Technology

Computer security, also known as cybersecurity or information technology security, is the area related to computer science and telematics that focuses on the protection of computer infrastructure and everything related to it and, especially, the information contained in a computer or circulating through computer networks. For this there are a series of standards, protocols, methods, rules, tools and laws designed to minimize possible risks to infrastructure or information. Cybersecurity includes software (databases, metadata, files), hardware, computer networks and everything that the organization values ​​and represents a risk if this confidential information reaches the hands of other people, becoming, for example, inside information.

The definition of information security should not be confused with that of “computer security”, since the latter is only responsible for security in the computer medium, but the information can be found in different media or forms, and not only in media computer.

Computer security also refers to the practice of defending computers and servers, mobile devices, electronic systems, networks and data from malicious attacks.

In summary, security in a network environment is the ability to identify and eliminate vulnerabilities. A general definition of security must also pay attention to the need to safeguard the organizational advantage, including information and physical equipment, such as the computers themselves. No one in charge of security should determine who and when they can take appropriate action on a specific item. When it comes to the safety of a company, what is appropriate varies from organization to organization. Regardless, any company with a network must have a security policy that addresses convenience and coordination.

SOURCE: https://es.wikipedia.org/wiki/Computer_security