How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary.
In the last year, we’ve all heard of the Mirai malware, but did you know that Mirai is Japanese for ‘the future’? And that’s what I believe we are seeing: The future of cyber-attacks.
This doesn’t mean that everything else goes away. There will still be phishing attacks, socially engineered access and advanced persistent threats, but these are costly to develop and with distributed denial of service (DDoS) in IoT, the bad guys seem to have found a simple and successful business model to raise needed funds:
Develop malware --> Use in high profile attack --> Monetise threats with service model
There’s no law of supply and demand on the Dark Net; threats exist as code and can be downloaded, modified and used by any number of people.
IoT is everywhere. There are around 15 billion connected devices in the world today. Putting it bluntly, that equals billions of opportunities to launch a cyber-attack. I’m sure we all saw the news at the end of 2016 when IoT cameras were infected with the Mirai malware and turned into ‘bots that were used to disable websites and Internet services.
This post is the second part of my series around the impact of encrypted protocols on network security. You can find the first article about HTTP/2 here:
Now let us focus on the new and upcoming specification of TLS 1.3. It is important to understand what advantages TLS 1.3 brings to us, but also what is the impact on certain parts of our network security: firewalls and transparent proxy systems.
Imagine this type of message arriving on your cell phone:
“Psst. I’ve got a secret. A secret that you just have to know but you can’t share with anyone. I know you’ll keep it to yourself. Yes, you will. I can trust you. You’ve always been so trusting with what I told you before.
Many users feel safe behind their monitors and why shouldn’t they? With the myriad of IT security measures available out there, it’s easy to make any device feel like Fort Knox. What many people underestimate though, is the tenacity and relentless determination which cyber criminals have when searching for the tiniest loophole they can find […]
Used with the permission of http://thenetwork.cisco.com/
Cybersecurity for Education: Learn from the Experts
Matthew Gibbs - August 8, 2016 - 0 Comments
Previously on the blog, we’ve discussed why cybersecurity is such an important topic in the education space, including the different types of attacks schools, colleges and universities might face, such as ransomware.
Here on earth, clouds are relatively simple phenomena: visible masses of water vapor making their way across the sky. But in the world of IT, “the cloud” is a bit more complex, referring to technology that allows businesses to take a more hands-off approach to managing their IT resources.
Cisco’s architectural approach makes security more effective and simple for customers
JULY 11, 2016
LAS VEGAS, NV – July 11, 2016 – Cisco today announced new services and cloud-based security solutions built with Cisco’s threat-centric security architecture.