Kasper­sky Ex­perts Laid Out What En­ter­prises Should Ex­pect in the Form of So­lu­tions and Threats From the Cy­ber Se­cu­rity Per­spec­tive

HWM (Malaysia) - - SMB -

To date, 12 dif­fer­ent types of Ad­vanced Per­sis­tent Threats were de­tected in 2015. Th­ese in­clude: Wild Neu­tron, Darkhotel, Naikon, and Duqu 2.0. Each cy­ber­at­tack held vary­ing lev­els of in­ten­sity in terms of dam­ages and ma­li­cious ac­tiv­i­ties ex­e­cuted.

“Cy­ber­at­tack­ers, par­tic­u­larly those in­volved in ma­jor op­er­a­tions, are mainly mo­ti­vated by mon­e­tary gains and pur­poses re­lat­ing to self­in­famy. Some are even sup­ported by sov­er­eign en­ti­ties and other so­cial move­ments, which ex­plains the source of their re­sources and their mo­ti­va­tions,” said Vi­taly Kam­luk, Prin­ci­pal Se­cu­rity Re­searcher, Global Re­search & Anal­y­sis Team (GReAT) of Kasper­sky Lab, at the Cy­ber Se­cu­rity Sum­mit re­cently held in Port Dickson.

How­ever, as cy­ber­se­cu­rity com­pa­nies de­velop their knowl­edge li­braries and in­crease aware­ness to com­bat th­ese APTs, the ef­fec­tive­ness of such threats di­min­ishes sig­nif­i­cantly. As a re­sult, ma­li­cious agents and en­ti­ties are ex­pected to evolve and de­velop al­ter­na­tive means.

Sergey Lozhkin, Se­nior Se­cu­rity Re­searcher, GReAT of Kasper­sky Lab, added that the ac­cess to hack­ing and net­works breach­ing tools is still widely avail­able. Il­le­gal hack­ing tools in­clud­ing hack­ing codes, data ex­fil­tra­tion viruses, as well as Bot­nets, are avail­able on the Dark Web, de­spite gov­ern­men­tal and law en­force­ment mea­sures to shut down the Dark Web.

“The Dark Web is not dead. It is merely re-build­ing and it might end up be­com­ing more se­cure,” he said in his pre­sen­ta­tion: ‘The Evo­lu­tion of Ran­somware: Dan­gers of Cryp­tolock­ers’.

When talk­ing about fu­ture tech­nolo­gies, Chief Dis­rup­tion Of­fi­cer and Thinker, Hannes Sjoblad, and Sergey Lozhkin pre­sented ‘Bio­Hack­ing: Se­cur­ing the Last Line’. In the pre­sen­ta­tion, Sjoblad pre­sented the mul­ti­tu­di­nal ben­e­fits of Near Field Com­mu­ni­ca­tions (NFC) chips em­bed­ded into the hu­man body used as bio iden­ti­fi­ca­tion.

In dis­cussing the po­ten­tial vul­ner­a­bil­i­ties this poses, Lozhkin ex­plained that this area re­quires ex­ten­sive study and re­search, as it is an in­evitable evo­lu­tion of how hu­mans share and ex­change in­for­ma­tion in the fu­ture.

Sergey Lozhkin, Se­nior Se­cu­rity Re­searcher, GReAT, Kasper­sky Lab.

Newspapers in English

Newspapers from Malaysia

© PressReader. All rights reserved.