FireSale HackBoy

Knowledge Shared By FireSale HackBoy...

Hacking

The Art Of Exploitation...

Ethical Hacking

Security Experts...Same Techniques To Make Hacker's Stuff Useless.

Black Hat Hacking

Dark Side Of Hacking... In Short Destruction Of Cyber Stuff.

Digital Stuff

All The Digital Stuff Is Under The Influence Of Cyber Attacks... Be Safe

Friday, May 17, 2024

Disadvantages of Cyber Insurance

Cyber insurance provides financial protection for businesses in the event of a cyber attack. However, despite its benefits, there are several drawbacks to consider before committing to a policy. Here are some key disadvantages:

Evolving Cyber Threats: The landscape of cyber threats is constantly changing as cybercriminals develop new tactics to exploit vulnerabilities. This poses a challenge for insurance providers, as it may be difficult to accurately predict and cover the financial impact of emerging threats. As a result, coverage gaps may arise, leaving policyholders vulnerable to losses that are not adequately addressed by their insurance policies.

Lack of Standardization: Unlike other forms of insurance, such as health or auto insurance, there is no standardized framework for cyber insurance policies. Each provider offers its own terms and exclusions, making it challenging for businesses to compare and select the most suitable coverage. It is essential for businesses to carefully review and understand the terms of any policy before making a decision.

Limited Coverage: Many cyber insurance policies offer limited coverage for certain expenses associated with a cyber attack, such as data restoration, business disruption, and legal fees. Some policies may only cover business disruption costs, leaving businesses responsible for other expenses. It is important for businesses to assess their potential liabilities and ensure that they have adequate coverage for all potential costs.

Vulnerability Assessment: Insurance providers often require businesses to undergo a vulnerability assessment to determine their level of risk exposure. This may involve evaluating the organization’s existing security measures and identifying any vulnerabilities that need to be addressed. While this assessment can help insurers calculate premiums more accurately, it may also result in higher premiums for businesses with greater risk exposure.

Premium Costs: The cost of cyber insurance premiums can be prohibitive for many small and medium-sized businesses (SMBs). Insurers take into account factors such as the organization’s size, industry, and security posture when calculating premiums, which can result in higher costs for businesses with limited resources. As a result, some SMBs may choose to forego cyber insurance coverage altogether, exposing themselves to significant financial risk in the event of a cyber attack.

In conclusion, businesses should carefully consider the potential drawbacks of cyber insurance before purchasing a policy. By thoroughly evaluating their coverage needs and consulting with insurance providers, businesses can make informed decisions that mitigate their cyber risk exposure effectively.

The post Disadvantages of Cyber Insurance appeared first on Cybersecurity Insiders.


May 17, 2024 at 08:42PM

7 Essential Security Tips to Identify Fake Mobile Apps

In today’s digital age, mobile applications have become an integral part of our daily lives, facilitating various tasks from communication to banking. However, with the proliferation of mobile apps, there’s also an increase in fake and malicious applications aiming to compromise users’ security and privacy.

To help you navigate the digital landscape safely, here are seven essential security tips to spot fake mobile apps:

1. Verify the Developer: Before downloading any app, take a moment to research the developer. Legitimate apps are usually developed by reputable companies or individuals with a track record of producing quality apps. Check the developer’s website, reviews, and ratings to ensure authenticity.

2. Check App Permissions: Be wary of apps that request excessive permissions. If a flashlight app asks for access to your contacts and location, it’s a red flag. Review the permissions requested by the app and question if they align with its functionality. Avoid apps that ask for unnecessary access to your personal data.

3. Read Reviews and Ratings: User reviews and ratings provide valuable insights into an app’s reliability. Look for patterns of complaints or suspicious activity reported by other users. If an app has numerous negative reviews citing security concerns or unexpected behavior, it’s best to steer clear.

4. Inspect the App Description: Pay close attention to the app description and screenshots provided in the app store. Genuine apps often have detailed descriptions, including information about features, functionality, and company background. Beware of apps with vague descriptions, grammatical errors, or inconsistent branding, as these could indicate fraudulent intentions.

5. Download from Official Sources: Stick to reputable app stores such as Google Play Store for Android devices and the Apple App Store for iOS devices. These platforms have robust security measures in place to detect and remove malicious apps. Avoid downloading apps from third-party sources or unverified websites, as they pose a higher risk of malware infections.

6. Verify App Authenticity: Some counterfeit apps mimic the appearance of popular legitimate apps to deceive users. Before downloading, double-check the app’s authenticity by comparing its icon, name, and logo with the official version. Look for subtle differences or inconsistencies that may indicate a fake app.

7. Install Security Software: Consider installing reputable antivirus or mobile security software on your device. These tools can help detect and prevent the installation of fake apps, as well as provide ongoing protection against malware, phishing attempts, and other cyber threats.

By following these security tips, you can safeguard your mobile device and personal information against the threat of fake apps. Stay vigilant, trust your instincts, and prioritize security when downloading and using mobile applications. Remember, it’s better to err on the side of caution than to fall victim to malicious actors in the digital realm.

The post 7 Essential Security Tips to Identify Fake Mobile Apps appeared first on Cybersecurity Insiders.


May 17, 2024 at 11:30AM

Know the least common PIN numbers that can thwart Cyber Threats

In the modern digital era, safeguarding devices and the sensitive information they contain is paramount, as any vulnerability can attract unwanted attention from malicious actors. Biometrics stands out as a formidable method for protecting devices and the data stored on them from prying eyes of cybercriminals. Among the various security measures, employing a 4 or 6-digit PIN code serves as a fundamental defense against unauthorized access.

Delving into the realm of 4-digit PINs, Jake Moore, a security advisor at ESET, offers insightful perspectives. Particularly noteworthy is the exploration of the least common PIN numbers, which can significantly bolster account and device security. This compilation originates from the late Nick Berry, who was associated with Data Genetics, providing a curated list of 4-digit PINs adept at mitigating contemporary cyber threats.

Here’s a glimpse at some of these less common yet effective 4-digit PINs-

1.    8557
2.    8438
3.    9539
4.    7063
5.    6827
6.    0859
7.    6793
8.    0738
9.    6835
10.    8093

While these PINs aren’t impervious to automated guessing techniques employed by cybercriminals, they offer a layer of defense by being less frequently utilized. This aspect makes them particularly valuable in thwarting password spray attacks and similar security breaches.

Contrastingly, the following are the most commonly used 4-digit PINs:

1.    1234
2.    1111
3.    0000
4.    1212
5.    7777
6.    1004
7.    2000
8.    4444
9.    2222
10.    6969

It’s crucial to recognize that for every 4-digit PIN, there exist over 10,000 possible combinations, illustrating the vast array of choices available for enhancing security. Similarly, 6-digit PINs offer even greater permutations, with over 100,000 combinations, a concept rooted in mathematical principles of permutations and combinations.

For individuals less acquainted with the evolving landscape of cyber threats, it’s essential to grasp the essence of the risks prevalent in today’s digital environment. Merely relying on a PIN for security is insufficient. Whenever feasible, implementing Multi-Factor Authentication (MFA) is advisable, or alternatively, leveraging biometric authentication methods such as fingerprint or iris scans can significantly fortify the security of online accounts.

The post Know the least common PIN numbers that can thwart Cyber Threats appeared first on Cybersecurity Insiders.


May 17, 2024 at 11:21AM

Thursday, May 16, 2024

The six rules of secure software development

Code Responsibly: Developers’ Blueprint for Secure Coding

Software is more important than ever – our connected world’s beating heart is made of it. Unfortunately, as the importance of software increases, so does the activity of cybercriminals and other bad actors trying to make a profit at the developers’ expense. The Department of Homeland Security has long claimed that 90% of security incidents are a consequence of defects in the design or code of software. Many developers are unarmed against this onslaught – the number of new vulnerabilities discovered in software has been steadily going up each year since 2016 and this trend is showing no signs of slowing down. If anything, the process is accelerating at a worrying rate. But this doesn’t mean the situation is hopeless – far from it! Many of these security problems have been known for a long time and we have a long list of industry best practices to help deal with them. In this eBook we introduce our six rules of secure software development that present the most important things you can do right now to stem the tide.

1. Shift left

The rule of Ê»shift left’ has turned into a bit of a buzzword in the last 7-8 years. Like the rest of these six rules, this is not a great revelation or a closely-held secret – in fact, the concept of shift-left testing was originally coined in 2001 in a Dr. Dobb’s article by Larry Smith. Back then, Ê»shift left’ referred to testing early and often to nd defects as early in the SDLC as possible – literally shifting activities to the left in the V-model of software development.

So, what does this have to do with security?

The idea is simple: move security considerations earlier in the software development lifecycle. Obviously, the earlier a security issue is discovered, the cheaper it is to x it. Programmers shouldn’t just rely on security experts to “do security stuff” a few weeks before shipping the code, but each team member should be actively involved with preventing, finding, and eliminating potential vulnerabilities during development. Of course, this only works if developers actually have the necessary security expertise! This makes understanding the potential threats and best practices (and thus, secure coding) absolutely critical for everyone: all architects, developers, testers and ops folks, not just a few chosen security champions.

This makes understanding the potential threats and best practices (and thus, secure coding) absolutely critical for everyone: all architects, developers, testers and ops folks, not just a few chosen security champions.

2. Adopt a secure development lifecycle approach

It is tempting to deal with software security as an Ê»add-on’ to the process: a brief penetration test just before release, or maybe a two-week security review at the end of a project. But as discussed before in the context of shifting left, the later we deal with a security issue, the more expensive it gets. And, unfortunately, a lot of security issues stem from decisions made at an early stage of development such as design or even requirements specification!

We can solve this conundrum by building security in: instead of just ‘doing security’ at a certain point in the development Lifecycle, we introduce security activities throughout the entire software development lifecycle (SDLC). This is an established best practice popularized within Microsoft via the MS SOL (Security Development Lifecycle) as well as security experts via the BSIMM (Build Security In Maturity Model) or the OWASP SAMM (Security Assurance Maturity Model):

We can solve this conundrum by building security in: instead of just Ê»doing security’ at a certain point in the development lifecycle, we introduce security activities throughout the entire software development lifecycle (SDLC). This is an established best practice popularized within Microsoft via the MS SDL  (Security Development Lifecycle) as well as security experts via the BSIMM (Build Security In Maturity Model) or the OWASP SAMM (Security Assurance Maturity Model):

  • MS SDL is the most prescriptive of the three – which makes sense, considering it was a process that Microsoft originally developed for internal use in the early 2000s. Its 12 main practices cover security training of all stakeholders, the creation and maintenance of security requirements, threat modeling via data flow diagrams (DFD), secure use of cryptography, managing the risk of third-party components, heavy use of automated tools (SAST, DAST, SCA) and incident response.
  • BSIMM, on the other hand, is a descriptive model. It is released every year, containing data about what companies are doing these days to improve their security and provides a scorecard to measure your company’s security posture. Then you can figure out which of those activities are most reasonable to implement in your specific context. The activities are grouped into 4 domains: Governance (managing a software security initiative with training as one of its three pillars) Intelligence (threat modeling and proactive security guidance), SSDL touchpoints (building security into development via design and code reviews as well as security testing), and Deployment (secure configuration and maintenance).
  • OWASP SAMM is also a prescriptive model, giving concrete guidance in various categories, depending on what maturity level (1to3) the company is aiming for in the area of Governance (improving security at the organizational level-via education and guidance among others), Design (security requirements, secure design and threat modeling), Implementation (secure build and deployment including vulnerability management), Verification (manual and automated security testing and reviews), and Operations (incident response, hardening and patch management).

As for validating the real-world use of these models: the longitudinal analysis in BSIMM 14 (2023) shows that companies are steadily improving their security posture. In particular, after adopting BSIMM, companies tend to implement a secure SDLC, scale it with the development of security champions, create (and enforce) a security policy, and manage the risk of third-party components. The two priorities after these are threat modeling and security training for engineering teams. As a matter of fact, training engineers on security is emphasized in all of the above models: it is the very first practice in SDL and is part of Governance in both BSIMM and SAMM.

As a final note, penetration testing is often brought up as a one-size-fits-all solution. It is true that a quick and focused test to identify vulnerabilities in the system is useful as an ‘acid test’ before release. But over-reliance on penetration testing is quite dangerous, and it is not a real substitute for secure software development! On the other hand, training developers in security is included in each of these secure SDLC models, with good reason.

3. Cover your entire IT ecosystem

When we’re talking about securing code, we don’t just mean the code specifically written by you – but also all third-party code that’s included in the application. What are weak links in the npm supply chain? Zahan et al (2022) points out that 80% of all code in modern software comes from third-party packages! That is a massive attack surface, and ultimately the hackers don’t care where the weak point in the system is and how it got there. If a third-party component is vulnerable, they’ll exploit it just the same -as it happened with the Log4Shell vulnerability at the end of 2021 that impacted almost every Java application – and thus, Java developer – in the world.

Not to mention that it is also lucrative for attackers to perform supply chain attacks: injecting malicious code into one of the open-source packages (or replacing them entirely). This can be difficult to notice if the package in question is, maybe, a forgotten dependency-of-a-dependency-of-a-dependency somewhere. The attack trends support this as well: according to the paper, supply chain attacks against applications (not just talking about npm here!) have increased 650% in 2021 alone. The SolarWinds supply chain attack against the United States government was so impactful it has shaped the country’s cybersecurity strategy as a whole.

These issues are exacerbated in the container world – for example, the ‘Red Kangaroo’ study has found that at the end of 2020, 80% of all images on Docker Hub were found to contain at least one known vulnerability, with 51 % of all images containing critical vulnerabilities!

We like to say that

“vulnerabilities in third-party code are not your fault, but they will definitely become your problem”.

You definitely need to have vulnerability management processes in place to identify, assess, and deal with vulnerabilities discovered in any of the program’s dependencies – and a strategy on how to release security patches and even hotfixes if the situation calls for it.

4. Move from reaction to prevention

Discussing code security goes hand in hand with robustness and resilience. Resilience implies a system that is not significantly impacted by failures (limiting the amount of damage they can do, and making it possible to recover from them), while robustness implies a system that anticipates failures and prevents them from happening in the first place. Even though both of these are important, preventing an incident is always better than reacting to an incident after the fact!

There are two philosophies to ensure robustness and resilience that are sometimes said to be opposites of each other: design by contract and defensive programming.

  • Design by Contract (DbC) defines so-called contracts for functions to declare expected preconditions, postconditions and invariants – and works under the assumption that these contracts will not be broken. These contracts are frequently implemented via asserts (not present in production code) and in case there is a failure at runtime, they are typically handled via exceptions. In type-safe languages, DbC may be a built-in feature of the language itself that won’t even allow compilation if the contracts can be violated. Rust is a good example for this.
  • Defensive programming assumes that any interaction with the system may be incorrect, erroneous, or even malicious. To this end, the developer should explicitly implement input validation in functions that process user input of any kind. Input validation means the implementation of checks that verify that the received input corresponds to the developer’s expectations. This should happen in the context of the specific function, “there and then”, right before the input is to be used. If the input fails these checks, it is rejected, so that no piece of code will be executed with unexpected inputs it is not prepared to handle.

Design by contract seems to be better for code efficiency and maintainability – after all, implementing defensive programming techniques requires writing additional code, which adds complexity and is itself a potential source of bugs. But when we look at code security, the goal is to reduce the attack surface and thus guard against intentional misuse, which is exactly what defensive programming provides. Furthermore, reacting to a bad input after it’s already been processed is much more dangerous than proactive input validation that can catch it beforehand. This is recognized by many secure coding standards (see e.g. MISRA C:2023 Directive 4.14)

Just to reiterate: in security, preventing an error is always better than catching the error after it has already happened!

As an example, consider processing an XML document describing a money transfer. Following DbC, we can define a ‘contract’ (an XML schema) and make sure the input conforms to it. This prevents many different attacks (e.g. the attacker duplicating tags, or specifying a negative value for the money transfer). But not every kind of bad in put can be covered by a schema. Just a few examples: the attacker can send us a document that references a nonexistent user, performs XXE, contains an invalid transaction date (e.g. 2 years in the future), or performs a cross-site scripting attack against the recipient by specifying a comment like <script>alert(‘hacked’)</script>.

This doesn’t mean that design by contract is bad – in fact, those techniques are very useful, but they need to be combined with defensive programming techniques to effectively protect against vulnerabilities. Whenever code security is concerned, input validation is perhaps the single most critical thing you can do according to experts – it’s the first category in the Seven Pernicious Kingdoms and its improper use comprise the root cause of many other vulnerability types; it is #5 on the OWASP Proactive Controls (OPC) list, and also has its own cheat sheet on OWASP! Even redundancy isn’t necessarily a dirty word here – in fact, validating the same input multiple times (in different parts of the code) is an example of defense in depth, which is an essential protection principle. For example, even if the XML schema ensures that the money transfer value isn’t negative, the function doing the transfer should still have a sanity check on the value to be transferred. We should simply accept that everyone makes mistakes, and the code should be always prepared for that.

5. Mindset matters more than tech

If you ask anyone “what do you do to prevent cyberattacks?”, it is likely the answer will be “firewalls and IDS”. It’s true that web application firewalls and intrusion detection systems are important (see A9 in the OWASP Top Ten 2021!), but they won’t solve the problem of vulnerable code. They may mitigate the effects of already existing vulnerabilities and make exploitation of these vulnerabilities more difficult, but even in that arena the attackers are constantly coming up with new ways to get around perimeter defenses (e.g. Server-side Request Forgery aka SSRF) and evade WAF filters to deliver their payload.

As a matter of fact, no firewall could stop the exploitation of zero-days like Heartbleed or Log4Shell before it was already too late.

But how do we deal with vulnerable code, especially in codebases that have been around for decades?

The sheer amount of code that developers must deal with is increasing rapidly. Source graph’s The Emergence of Big Code (2020) shows that developers have to work with remarkably more code than ever before: 51 % of participants claimed the amount of code at a company has increased by a factor of 100 compared to the previous 10 years, and over 90% of them said coding velocity and the value of the code itself has also increased drastically. In order to find, fix, and prevent vulnerabilities, developers need to be responsible for them and take ownership of the code in question -that can be a challenge by itself in these massive code bases.

And then there is legacy code…

Some companies are looking at Al to solve this problem by automatically identifying vulnerabilities or just making sure all code is secure. Putting aside the nascent and vulnerable nature of machine learning applications, this ultimately relies on these AIs being able to write secure code by default. But right now, that goal is far out of reach. Let’s face it: we’re still light-years away from achieving flawless Al-generated code. Consider that the models are mainly trained on the ‘wisdom of the masses’: open-source projects and popular third-party Q&A sites such as Stack Overflow. Such sources have been hotbeds of vulnerable code exam pies in the past (see Stack Overflow Considered Harmful? The Impact of Copy&Paste on Android Application Security Fischer et al, 2017).

As always: garbage in means garbage out.

On the other hand, it doesn’t help to put the responsibility for security on developers’ shoulders while failing to give them the necessary resources and support for it.

Bruce Schneier pointed out in 2019 that even though 68% of security professionals believe it’s a programmer’s job to write secure code, they also think less than half of them can actually spot security holes.

Gitlab’s yearly Global Developer Report from 2022 underscored this as well: as DevOps transforms into DevSecOps, security is becoming the #1 concern. More importantly, now that 43% of “Sec” teams are fully responsible for security, despite the vast variety of tools at their disposal they feel much less optimistic and confident about this responsibility than the “Dev” and “Ops” part of the triad (56% vs 76%!). Automation is not going to solve the problem by itself. It isn’t a coincidence that DevSecOps folks sometimes call SAST tools “False Positives as a Service’.

Tools are handy and valuable, but there is no substitute for human expertise.

6. Invest in secure coding training

As we’ve seen so far, there are two challenges in cybersecurity today: how to deal with issues from the past (unknown vulnerabilities in existing code, legacy code, and third-party code) and how to deal with issues in the future (vulnerabilities in all code written by the developers from this point on).

For the first question, we have lots of answers: various code analyzers, testing tools, and vulnerability management. However, for the second question, the only realistic answer is writing code that is free of such vulnerabilities. And that’s not something a tool can do for us.

The only solution is education: making developers aware of these security problems in all phases of the SDLC and giving them the necessary mindset and skills so they will be able to avoid them (and spot them in existing code).

This is also well reflected in real-world numbers. Is Secure Coding Education in the Industry Needed? An Investigation Through a Large Scale Survey (Gasiba et al, 2021) indicates that over half of developers are not aware of secure coding guidelines and issues-furthermore, developers overestimate their awareness of security issues, leading to a false sense of security.

The best method to address this discrepancy is through secure coding education supported with hands-on exercises. Developers need to see vulnerable code in action, see the (often devastating) consequences of vulnerability exploitation, and then actually fix the vulnerable code themselves. Only this way will they acquire the needed skills and fully understand and retain knowledge about these vulnerabilities.

CTF – Capture the flag

Capture the ag (CTF) events and platforms are popping up as a popular alternative in this area. CTFs are popular when it comes to improving the offensive skills of cyber security experts: they are fun (and gamified out-of-the-box), they provide realistic hacking scenarios, and they help establish the Ê»hacker mindset’. But when it comes to defensive best practices and establishing company-wide secure coding initiatives, they have pretty clear deficiencies compared to real training: a relative inability to cater to developers without prior experience in security, weak (or even negative) motivation for developers less interested in competition, and poor coverage of Ê»less cool’ (but still critically important) security issues. 

Sometimes microlearning is also brought up as a possible solution: teaching about security issues in small bite-sized (even just 5- or -minute) videos or brief activities that programmers can check when they first encounter such an issue or just during their free time (if such a thing exists at all). But secure coding is one of the areas where this doesn’t really work. As per Amy Fox’s 2016 article Microlearning for Effective Performance Management:

“Microlearning is not a panacea for every training need. If an employee is learning something for the first time, particularly a complex skill, individual coaching or another form of more intensive training may be best. Microlearning often is best used for reinforcement to help learning stick and to build up employees’ skills.”

In the context of secure coding, microlearning can be effective only as a reinforcement technique once developers already know about vulnerabilities and best practices – in other words, once they have already taken part in an in-depth training course.

And that’s exactly what we believe in: with blended learning, developers should first establish a deep foundation for secure coding in their programming language(s) of choice via an instructor-led training course. And once this is achieved, they can follow it up with regular monthly ‘bite-sized’ e-learning modules to keep their skills sharp and up to date.

Finally, a note about gamified capture the flag (CTF) events and platforms. CTFs are popular when it comes to improving the skills of cyber security experts: they are fun (and gamified out-of-the-box), they provide realistic hacking scenarios, and they help establish the ‘hacker mindset’. But when it comes to learning about secure coding, they have pretty clear deficiencies compared to blended learning: they tend to focus on ‘fun’ attack scenarios and thus ignore many common vulnerability types, they aren’t adaptive to the needs of individual participants, and their competitive aspects can actually have a negative effect on motivation. On the other hand, blended learning also drives high engagement without having to lose the benefits of gamification. If you’re interested in the details, we have analyzed these limitations in a separate article: CTF in secure coding education – a critical look.

About Cydrill

Established in 2019 and recognized by Enterprise Security in 2021 as one of the top companies shaping the cybersecurity landscape, Cydrill is on a mission to tackle the root cause of poor cyberdefense: inadequate coding practices.

Cydrill’s blended learning journey provides training in proactive and effective secure coding for developers from Fortune 500 companies all over the world. By combining instructor-led training, e-learning, hands-on labs, and gamification, Cydrill provides a novel and effective approach to learning how to code securely.

Learn more about our courses and learning environment.

The post The six rules of secure software development appeared first on Cybersecurity Insiders.


May 16, 2024 at 07:58PM

Cybersecurity in Utilities: How the Utility Industry has Become a Pioneering Force in Cybersecurity Tech

Historically, the utility industry has been thought of as reliable, slow moving, and heavily regulated. People want to know that their lights will turn on and water will run, and by prioritizing that consistency, the general public and regulators have not pushed the industry to be particularly innovative. However, in recent years, the utility industry has transformed to become modern, innovative and technology-centric with cutting edge automation and controls. With the increased reliance on technology, the need to invest in cybersecurity has pushed utility companies to the cutting-edge of cybersecurity innovation. 

With technology driving utility operations, a cyberattack against critical infrastructure, including the power grid and water systems, has the potential to cause catastrophic consequences. Even a data breach that doesn’t directly impact critical infrastructure can become extremely costly. In fact, according to IBM, the average cost of a data breach hit a worldwide record high in 2022, reaching $4.72 million in the energy sector

Government Regulation as a Force for Change

In the utility industry, cybersecurity serves as the fortress within the organization. Just as you secure your home against potential intruders, cybersecurity protects utility organizations from technology breaches that impact the intricate systems managing power plants, grids and overall business operations. Common regulations such as the North American Energy Reliability Corporation’s (NERC) Critical Infrastructure Protection (CIP) standards were created to keep the fortress secure. Regulations impose stringent requirements on utilities, ensuring that only authorized personnel and trusted advisors can operate within the highly secured environment. As another impact of these regulations, utility organizations have been compelled to collaborate with government agencies in an ongoing effort to identify, manage and communicate emerging vulnerabilities and risks. This proactive approach has positioned the industry to embrace new technologies as they come to market, rather than relying on periodic updates every few years.

The Role of AI

As automation, AI and machine learning take over the digital landscape, utility companies are using these technologies to fortify their organizations against threats. For example, automation streamlines routine security tasks, such as threat detection and response, enabling utilities to detect and mitigate cyber threats in real-time. AI and machine learning solutions can continuously analyze data to identify shadow data, monitor for abnormalities and alert cybersecurity professionals about potential threats. 

One major application of AI in utilities cybersecurity stems from the ability of artificial intelligence to spot threats faster than humans and monitor a range of potential cyber issues. The rise of AI and automated cybersecurity technologies has also allowed the utility industry to decrease human error as professionals try to keep up with the increased volume of attacks.

Barriers to Implementation

When adopting new cybersecurity solutions, utility companies will often encounter the most significant hurdles during the implementation stage. Despite an organization’s desire to incorporate new technology and processes, the industry is challenged by limited availability and experience in resources needed for new implementations. Technology and cybersecurity skill levels can be critical bottlenecks in the process as even the most advanced systems require human oversight and intervention for effective operation. 

Cybersecurity education is critical during this implementation phase. Imagine a home with the best alarm system and security cameras. This technology is effective in both deterring bad actors and detecting suspicious activity, yet, if the front door of the home is left open, the protection offered by the technology doesn’t matter. Employee education is a necessary part of a cybersecurity strategy for this reason. The protection the technology offers won’t matter if a bad actor gains access to critical systems through a malicious URL or guesses the password on an unattended laptop at a coffee shop. 

Measuring the ROI

Even when an implementation is successful, many organizations overlook the importance of assessing the technology’s long-term value. It can be challenging to evaluate the return on investment, especially when that evaluation requires additional time and resources. However, neglecting this post-implementation value assessment means missing insights into the effectiveness of new cybersecurity measures. It’s incredibly valuable to measure how many threats or attempted breaches the technology prevented, and to extrapolate the potential cost of each incident. This comprehensive understanding will enable organizations to allocate resources efficiently in the future. 

Looking forward, the utility industry will continue to be a pioneering force in adopting innovative cybersecurity technologies to protect its data and evolving technology solutions, which serve as a blueprint for other industries to follow. Through the industry’s strict regulations and investment in new technologies, the utilities sector continues to forge the path forward to a secure digital future. 

 

The post Cybersecurity in Utilities: How the Utility Industry has Become a Pioneering Force in Cybersecurity Tech appeared first on Cybersecurity Insiders.


May 16, 2024 at 11:28AM

Wednesday, May 15, 2024

Google Android to lock screen of stolen smart phones with AI

Google is gearing up to introduce a groundbreaking feature aimed at enhancing smartphone security through the power of Artificial Intelligence (AI) in its upcoming Android 15 operating system.

The tech giant, a subsidiary of Alphabet Inc., is poised to unveil the ‘Theft Detection Lock’ safety feature, designed to thwart mobile device theft and fraud. Leveraging AI technology, this feature enables smart devices to detect instances where a phone is forcefully taken from its user and promptly locks the screen, preventing unauthorized access by thieves.

This functionality relies on monitoring motion and disruptions in motion patterns following a theft. To enable this feature, smartphones must be equipped with built-in sensors like accelerometers capable of detecting sudden movements indicative of theft, such as snatching the device and making a swift getaway on a bike or in a car.

Once these suspicious motions are identified, the device automatically activates a lock to thwart further access by unauthorized individuals.

“During the beta testing phase, this feature demonstrated promising results with participants in cities like Sao Paulo, London, Brazil, and France,” stated Dave Burke, Vice President of Engineering at Google. “Following positive feedback, we made the decision to include this feature in our upcoming Android release.”

This innovation is particularly significant for regions like Brazil and London, where smartphone theft occurs at an alarming rate, with incidents reported every 5 to 6 minutes, respectively.

Interestingly, this announcement coincides with Google’s initiative launched a year ago, wherein tech industry leaders were urged to take action against the rising trend of mobile phone thefts, which had seen a significant uptick over the preceding months.

In addition to the Theft Detection Lock, another noteworthy feature aimed at bolstering mobile security is the introduction of the Private Space Tool. This tool allows users to securely share data-intensive yet sensitive mobile applications, such as banking or social media applications, enhancing privacy and safeguarding personal information.

The post Google Android to lock screen of stolen smart phones with AI appeared first on Cybersecurity Insiders.


May 16, 2024 at 10:46AM

New Apple iOS security update blocks Bluetooth Spying

Apple has unveiled significant security enhancements with the introduction of iOS 17.5, addressing nearly 15 vulnerabilities. Among the key features is a capability to thwart Bluetooth-based iPhone tracking, a move aimed at bolstering user privacy.

The latest iOS update, version 17.5, includes an alert system to notify users of potential cross-platform tracking attempts. This feature serves as a safeguard against unauthorized surveillance of iPhones via Bluetooth signals. Additionally, enhancements to the AirTag System provide added security measures, assisting users in locating misplaced items like car keys while safeguarding against potential privacy breaches.

Apple has also prioritized the resolution of malware concerns, particularly those exploiting the Find My app to track user locations and transmit data to criminal servers. Furthermore, updates have been implemented to fortify the security of Apple Maps navigation software, thwarting attempts by hackers to exploit vulnerabilities and compromise user data.

These proactive measures underscore Apple’s commitment to ensuring the privacy and security of its users. Regular updates are integral to mitigating potential threats and maintaining a secure user experience.

Looking ahead, iOS 17.5 may mark the culmination of Apple’s ongoing efforts in this regard, as attention shifts towards the forthcoming iOS 18 release. Anticipated to debut with AI-powered features, iOS 18 is expected to be unveiled at the Worldwide Developers Conference (WWDC) scheduled for June of this year.

The post New Apple iOS security update blocks Bluetooth Spying appeared first on Cybersecurity Insiders.


May 15, 2024 at 08:41PM