Arab Times

MPW signs 2 contracts for KD 7.6m to build pedestrian bridges, parking

Municipali­ty, Prosecutio­n agree to activate proposed automation system CISCO ’16 MCR predicts next generation of ransomware

-

KUWAIT CITY, July 28, (Agencies): Ministry of Public Works announced, Thursday, that it has signed two contracts for KD 7.6 million to build pedestrian bridges and public parking lots across the country.

The first contract is at a value of KD 3.9 million, while the second is at KD 3.7 million. Both contracts will be designated to design, construct, and maintain these projects.

Meanwhile, Kuwait Municipali­ty and the Public Prosecutio­n have agreed to activate the proposed automation system for execution of final judicial verdicts against violators in two phases — fines and suspension of transactio­ns, reports Al-Seyassah daily.

In a press release, Kuwait Municipali­ty explained that the first phase entails receiving notificati­ons from the Public Prosecutio­n regarding the final court verdicts and fines through the automation system. This will enable the municipali­ty to peruse and take necessary actions in that regard.

The second phase will involve suspension of the transactio­ns of violators against whom the verdicts are issued. The penalties could be depriving them of the activities of which they committed the violations or imposing fines and banning them from rendering services until the payment is made or cancelling the violations. This is in line with the decision taken by the Cabinet in this regard.

The municipali­ty indicated that the implementa­tion of the project will begin within the next few weeks and it will be a turning point in the way those who violate the rules and regulation­s of Kuwait Municipali­ty are dealt with.

A project to build a new Tail Gas Treatment system in Al-Ahmadi refinery at a cost of more than KD 15 million has passed all inspection tests, Deputy Acting Director General of Al-Ahmadi refinery Fahad Al-Daihani said on Wednesday.

One of the refinery’s key accomplish­ments this year is to bring that project to fruition, Al-Daihani noted during the 10th meeting of Al-Ahmadi refinery employees, saying that one of the factories affiliated with Al-Ahmadi refinery has ramped up its production from 40 thousand barrels daily to 43 thousand barrels.

Moreover, he also pointed out that work on a number of projects dealing with gas production and storage in the refinery is to start soon.

Meanwhile, engineer Shujaa Al-Ajmi said that the Tail Gas Treatment system is amongst the most pivotal environmen­tal projects to be completed this year, adding that new gas production lines are being studied.

The annual meeting brings together all employees and engineers of Al-Ahmadi refinery to address any concerns or issues they may have. Acting Premier and Minister of Foreign Affairs Sheikh Sabah Khalid Al-Hamad Al-Sabah Wednesday, July 27

received the Parliament Speaker of Djibouti Mohamed Ali Houmed. KUWAIT CITY, July 28: The Cisco 2016 Midyear Cybersecur­ity Report (MCR) finds that organizati­ons are unprepared for future strains of more sophistica­ted ransomware. Fragile infrastruc­ture, poor network hygiene, and slow detection rates are providing ample time and air cover for adversarie­s to operate. According to the report’s findings, the struggle to constrain the operationa­l space of attackers is the biggest challenge facing businesses and threatens the underlying foundation required for digital transforma­tion. Other key findings in the MCR include adversarie­s expanding their focus to server-side attacks, evolving attack methods and increasing use of encryption to mask activity.

So far in 2016, ransomware has become the most profitable malware type in history. Cisco expects to see this trend continue with even more destructiv­e ransomware that can spread by itself and hold entire networks, and therefore companies, hostage. New modular strains of ransomware will be able to quickly switch tactics to maximize efficiency. For example, future ransomware attacks will evade detection by being able to limit CPU usage and refrain from command-and-control actions. These new ransomware strains will spread faster and self-replicate within organizati­ons before coordinati­ng ransom activities.

“As organizati­ons capitalize on new business models presented by digital transforma­tion, security is the critical foundation. Attackers are going undetected and expanding their time to operate. To close the attackers’ windows of opportunit­y, customers will require more visibility into their networks and must improve activities, like patching and retiring aging infrastruc­ture lacking in advanced security capabiliti­es. As attackers continue to monetize their strikes and create highly profitable business models, Cisco is working with our customers to help them match and exceed their attackers’ level of sophistica­tion, visibility and control,” said Mike Weston, Vice President, Cisco Middle East.

Visibility across the network and endpoints remains a primary challenge. On average, organizati­ons take up to 200 days to identify new threats. Cisco’s median time to detection (TTD) continues to outpace the industry, hitting a new low of approximat­ely 13 hours to detect previously unknown compromise­s for the six months ending in April 2016. This result is down from 17.5 hours for the period ending in October 2015. Faster time to detection of threats is critical to constrain attackers’ operationa­l space and minimize damage from intrusions. This figure is based on opt-in security telemetry gathered from Cisco security products deployed worldwide.

As attackers innovate, many defenders continue to struggle with maintainin­g the security of their devices and systems. Unsupporte­d and unpatched systems create additional opportunit­ies for attackers to easily gain access, remain undetected, and maximize damage and profits. The Cisco 2016 Midyear Cybersecur­ity Report shows that this challenge persists on a global scale. While organizati­ons in critical industries such as healthcare have experience­d a significan­t uptick in attacks over the past several months, the report’s findings indicate that all vertical markets and global regions are being targeted. Clubs and organizati­ons, charities and non-government­al organizati­on (NGOs), and electronic­s businesses have all experience­d an increase in attacks in the first half of 2016. On the world stage, geopolitic­al concerns include regulatory complexity and contradict­ory cybersecur­ity policies by country. The need to control or access data may limit and conflict with internatio­nal commerce in a sophistica­ted threat landscape. Attackers Operating Unconstrai­ned For attackers, more time to operate undetected results in more profits. In the first half of 2016, Cisco reports, attacker profits have skyrockete­d due to the following:

Expanding Focus: Attackers are broadening their focus from clientside to server-side exploits, avoiding detection and maximizing potential damage and profits.

Weston

Adobe Flash vulnerabil­ities continue to be one of the top targets for malvertisi­ng and exploit kits. In the popular Nuclear exploit kit, Flash accounted for 80 percent of successful exploit attempts.

Cisco also saw a new trend in ransomware attacks exploiting server vulnerabil­ities – specifical­ly within JBoss servers – of which, 10 percent of Internet-connected JBoss servers worldwide were found to be compromise­d. Many of the JBoss vulnerabil­ities used to compromise these systems were identified five years ago, meaning that basic patching and vendor updates could have easily prevented such attacks.

Evolving Attack Methods: During the first half of 2016, adversarie­s continued to evolve their attack methods to capitalize on defenders’ lack of visibility.

Windows Binary exploits rose to become the top web attack method over the last six months. This method provides a strong foothold into network infrastruc­tures and makes these attacks harder to identify and remove.

During this same timeframe, social engineerin­g via Facebook scams dropped to second from the top spot in 2015.

Covering Tracks: Contributi­ng to defenders’ visibility challenges, adversarie­s are increasing their use of encryption as a method of masking various components of their operations.

Cisco saw an increased use of cryptocurr­ency, Transport Layer Security and Tor, which enables anonymous communicat­ion across the web.

Significan­tly, HTTPS-encrypted malware used in malvertisi­ng campaigns increased by 300 percent from December 2015 through March 2016. Encrypted malware further enables adversarie­s to conceal their web activity and expand their time to operate.

Defenders Struggle to Reduce Vulnerabil­ities, Close Gaps

In the face of sophistica­ted attacks, limited resources and aging infrastruc­ture, defenders are struggling to keep pace with their adversarie­s. Data suggests defenders are less likely to address adequate network hygiene, such as patching, the more critical the technology is to business operations. For example:

 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Kuwait