Tuesday, March 25, 2014

Cybersecurity: choose the right boat

You call a security expert to audit your systems. After several hours testing your network, finally he approaches you, look you in the eyes and tells you very seriously: “You're gonna need a bigger boat”. On the Internet, we not only face one huge white shark, as happened in the famous Steven Spielberg's "Jaws", but thousands sharks of different types and sizes. So we better go very well prepared.

For example, to avoid being bitten by those cybercriminals who are currently using an unpatched vulnerability on Microsoft Word to hijack a computer, after opening a malicious RTF file. Or to prevent that one of your bank’s ATMs is attacked by thieves attempting to infect it with malware and connect it to a mobile phone with the aim of get cash via SMS messages.

What kind of boat would be the most appropriate to penetrate into the waters of the web?

Users of email services such as Hotmail, Gmail or Yahoo! have a lifeboat if their credentials are stolen and distributed on the black market. We are talking about two-factor authentication, a secondary method of identification that would pop up if the attempt is made from an unusual network or location, as evidenced by Chema Alonso in his blog.

Meanwhile, people who want to surf cyber waters in a more secure way and keeping better control of their privacy, can use remote cloud-based browsers, such as "SILO", which does not show the users’ IP address to servers and leaves no browsing traces on their devices.

Very soon, in the UK, law enforcement officials will have a new support ship, which is a cloud service that will allow them to quickly compare the seized child pornography content against an international database, so they can identify the most recent material and protect its victims.

The Secure Domain Foundation also plans to charter a boat in order to help the domain industry to identify whether, behind a specific domain or a domain registration request, they will find a cybercriminal network or not. To this end, they will provide tools connected to their API which will show a “credit score” indicating the likelihood of a specific domain belonging, in fact, to a group of dangerous sharks.

Do not forget! If you are going to face some sharks, make sure you took the right boat with you!


We invite you to rate our posts, to leave your comments and to share them on social networks. Also, if you want you can follow us on our profiles. At the sidebar, you’ve got the links ;-)


Post a Comment