Over fifty million users have had their data harvested through social media platform Facebook. Following the crisis of Cambridge Analytica, CEO Mark Zuckerberg admits the data scandal was a “major breach of trust”, and has publicly apologized. He has agreed to testify in front of U.S. Congress, and states in a public interview that Facebook has “a basic responsibility to protect people’s data”. He promises a full forensic audit to investigate who is improperly using private data of Facebook users.

Although Zuckerberg, has pledged to restrict access to app developers moving forward, there is still  concern regarding Android users and how data has been collected by Facebook from their mobile devices, without given permission. Fears of privacy invasion on Facebook is at its greatest, although Facebook highlights that two of the Android apps have opt-in/out features with prompts.

Apple iOS mobile devices do not allow access into the users’ calls and texts data unless a certain protocol is followed, therefore iPhones and iPads, are slightly more protected. The architecture of Android is different and not so secure.

There is a growing concern in some circles, that social media platforms could face strong government regulations in the aftermath of these incidents. There may even be a decline in activity since users are also likely to become skeptical, due to privacy protection concerns. This will in turn affect advertisers.

Facebook’s most valuable asset is the user, and the ability to follow the user track. the company monitors pages clicked on, as well as posts tagged and liked. By sharing this information, Facebook makes over 90% of profits on advertising, which according to research is in the realm of close to 40 million dollars.

Zuckerberg, has spoken of a commitment to 20,000 employees, working on security and content review, by the end of the year. In a recent public interview the Facebook guru states, “security isn’t a problem that you ever fully solve; you can get to a level where you are better than your adversaries and then continue evolving”.

Stocks and shares have already plummeted, with a loss estimated around $80 billion in market value. Consumers are now being extra cautious. After-all, no-one wants a “peeping Tom” in their phone.

To read a full report visit Ars Technica.

 

 

VERIZON is partnering with visionaries from different industries, using data and technology to turn innovative ideas into reality, in their operation HUMANABIITY. Their slogan, “ We don’t wait for the future. We build it”, has engaged them in projects that reduce C02, save lives and keep food safe.

By creating a device with a sensor the size of an American nickel (10 cents), environmental conditions can be tracked through an advanced network system that protects food shipments from the risk of contamination.

According to data provided by VERIZON, 4 billion pounds of seafood, was consumed in America during 2009. Their studies also show that 47.8 million Americans get sick from food borne diseases each year, 128,000 people are hospitalized by food poisoning annually, and 3,000 Americans actually die each year from food borne diseases.

Advertisements created by the VERIZON team, proudly demonstrate the effectiveness and necessity of this safety sensor. Tom Villa, VERIZON Global Asset Management, speaks fluently on the product, “ We took our world class network and developed devices to track environmental conditions. This device allows people to understand what’s happening not only with the location of that asset, but also if it is too hot or too cold”. He describes the senor as “completely unique”, Chris Harrison, Shipping Manager, explains how products such as “Fish, beef, poultry, vaccines and insulin”, are protected and monitored by the device during shipping.

Trawler fisherman, Captain Dennis Woloshuck, Ocean Venture, in the VERIZON advertisement confidently states, “ I catch all this beautiful fish, but once its out of my hands I have no control over it. If you have a sensor that can keep track of your product, it can keep everyone honest that way”.

With trillions of transactions a year, a good competent network is vitally important and not many companies on the world have the capacity to handle such volume. There is nothing fishy about VERIZON, they have proven to have a grip on it with their little tiny sensor that is “keeping the food chain safe”.

1. Crypto Currency for the Layman – NAC3: The North American Crypto Currency Conference.

NAC3 – the only Bitcoin and Blockchain conference designed for the “average person”.

Topics: “A Beginner’s Guide to Trading Crypto Currency”, “Investing in Today’s Crypto Market”, “Wallets and Security”, “Tax Implications”, “Legal Regulations”.

New York City

February 24-25, 2018

Eden on the Hudson (more…)

On 23rd and 24th November 2017, India will be proud to host the world’s largest conference on Cyber Space in New Delhi.

Inaugurated by Prime Minister Narendra Modi, this prestigious 2-day conference is predicted to attract over 2000 delegates from different countries around the world. The theme for GCCS 2017 is, Cyber4All: An Inclusive Sustainable Developmental, Safe and Secure Cyberspace”. Key notes include: Cyber4Inclusive Growth, Cyber4DigitalInclusion, Cyber4Security and Cyber4Diplomacy.

Under the spotlight, at the GCCS, will be the program, “Digital India“, a campaign launched by the Government of India, with an objective of connecting rural areas with high-speed Internet networks and improving digital literacy. It’s motto “Power to Empower, speaks for itself. Speakers will address growth opportunities and development challenges.

At a recent press meeting, the Honorable Union Minister for Electronics and Technology information, and Law & Justice, Shri Ravi Shanker Prasad, spoke while promoting the prestigious conference, ”it will help provide vision of inclusive digital society for inclusive growth, education, healthcare, especially for the developing world”.

This will be the first time the conference shall take place outside the Organization for Economic Co-operation and Development nations (OECD), and it will be the fifth edition. Audiences will include industry leaders, senior government officials and civil servants. There will also be seminars, sessions, exhibitions and other activities and events.

 

 

 

How many parents feel safe leaving their children to their own devices when it comes to the Internet? Access to inappropriate websites is extremely easy for children nowadays. In a very busy world, where most youngsters are given the latest technology gadgets to keep themselves occupied, we are learning that this oftentimes, has a tremendous downside; too much time alone and unmonitored, children are susceptible to Internet predators.

Last week, in an effort to assist in protecting children from onine violence and exploitation, Pope Francis spoke about this disturbing subject at the Child Dignity in the Digital World congress, organized by Pontifical Gregorian University in Rome, and the WeProtect Global Alliance. The Pontiff, appealed to stakeholder organizations, politicians and religious leaders to collectively promote digital online safety. The focus was toward social media platforms such as Facebook and Microsoft, and the risks of pornography, paedophilia, trafficking, as well as online bullying

Co-sponsored by the London School of Economics and by an international research project Global Kids Online (GKO), facts were presented by UNICEF innocenti, based on data collected from 10 countries around the world.

Although there is specifically designed software on the market that assists in monitoring Internet activity for children, not all parents are clued in, or up to date on such applications and technologies. In addition, most teenagers demand a certain amount of privacy. Whether in the USA, India or any other country, this issues is a huge topic and one that needs constant attention.

This is a subject of serious magnitude and as Baroness Shields, OBE, UK Minister for Internet Safety and Security emphasized, according to reports, “ Our increasingly connected society greatly empowers children, but also exposes them to risks that compromise their safety and wellbeing. To address these escalating global threats we need a broad coalition of government, faith leaders, academia, and industry, all committed to protecting the dignity of children in this digital age”.

Keeping up with the evolving cyber landscape in India, Pune Police announced the launch of ‘We Fight Cyber Crimes’ initiative to sensitize the students and teachers of the city on tackling cyber crimes. This comes against the backdrop of rising counts of cybercrimes in the city, with youth between the age of 18 and 24 being a susceptible target of the menace. The initiative will help to counter this problem, as the programs strive to educate over thousand teachers and more than 20,000 students on the many ways of tackling cyber crimes effectively. The initiative will commence on October 16.

The Pune Policy has sided with a three pronged approach in order to successfully implement the program with optimum impact. The first step would involve actively creating awareness among students and teaches on the various aspect of cyber security and cyber crimes, as well as highlight the ways in which cyber threats can be prevented. This will be carried out through robust sharing of information via social media websites, blog and videos on online platforms. The second step would be to transfuse the issue of cyber crimes to school competitions such as debates, slogan making, etc. This would help in deepening the impact from the initial programs. The final step would include providing coherent training and education to the teachers from different schools and colleges on dealing with cyber crimes efficiently, who will then be expected to educate their students on the matter through workshops and teaching sessions.

In a bid to leverage the impact, full day conferences and workshops will also be exclusively organised by technical cells of various schools and colleges detailing the cyber landscape and the many ways to approach it. This is evidently a welcome step in an environment in which more and more elements are falling prey to cyber threats and crimes. Deputy Commissioner of Police (Cyber Crime) Sudhir Hiremath said in a statement that the students “would be given intensive trainingon cyber crime issues. Cyber experts from C-DAC, Google India and Career Corner have extended their support for the initiative.”

We are all vulnerable to crime, especially cyber crime. Everyday we read about another new hack or criminal attack in our personal space. Unfortunately, it is all becoming such frequent happenstance, as our society at large becomes more and more dependent upon technology. It is inevitable that citizens globally, need to investigate better ways to protect themselves and stay up-to-date with the latest protection mechanisms available on the market.

Governments around the world are constantly trying to combat cyber intrusion, and businesses are prioritizing themselves to a position of preventative measures; therefore as individuals, we must immerse ourselves in knowledge, to find the best strategies which will assist in combating these cyber threats.

Around the world policy makers and security leaders gather together at summits and conventions to discuss solutions. These frequent events not only offer platforms of discussion about the issues and challenges we are facing in this industry of technology – they also offer excellent networking and learning opportunities.

Countries such as the United States of America, as well as the United Kingdom, are known for hosting many respected security events, however India, is also stepping up to the plate, with a keen focus on taking security information to the next level. From Goa to Mumbai, or New Delhi to Kota and Kollam, brilliant minds congregate with pride and enthusiasm to discuss cyber security, and other security related subject matter. Security integration information on all levels can be found at these most well attended and worthwhile events.

To find some of the most talked about cyber security conferences in India 2017-2018 click on the link:

infosec-conferences.com/events/cybersecurity-conferences-india

 

 

 

Colleges in the U.S. are stepping up their security game

 

 

Adapting with the modern day security programs

With the growing complexity of the modern day security programs, it is becoming increasingly essential for organizations to comprehend as much of what’s happening in the security landscape. Understanding new age technologies and strategies surrounding them can be a critical aspect of success for any organization and therefore, must be addressed with specialized efforts. Find out how organizations are keeping pace with the latest advancements in the security sector, as Dr. Niyazi Bodur shares his insights on a wide range of physical and virtual security threats.

Dr. Bodur oversees all of his university’s information technology and telecommunication services, as well as facilities management, design and construction, and security.

He has 27 years of professional experience in information technology, business-driven engineering research and development, instruction, and academia, as well as with major construction and renovation projects. He is highly proficient in leading and managing a variety of IT and facilities functions.

What are the key components that one must take into consideration while securing an organization?

In my opinion, securing any organization has to be an effective mix of humans and technology. While humans can play an imperative role in identifying threats and tracking abnormalities, be it in the physical or virtual space, technology can be utilized to augment these human efforts to obtain optimum results. Harmonizing properly trained and sensitized staff with relevant technologies will successfully assist in offsetting any imminent attack, both in terms of technical and physical security.

At our university, we employ staff members who continuously monitor global security practices in order to be effectively prepared before anything happens. These two components are further strengthened by other factors such as sound strategies, strong relationships with local police force, law enforcement meetings and drills.

What precautions and safety measures does your institution keep in mind while formulating a security plan for your organization?

The first step is to assess the available technologies and leverage them for the best protection of the college by encouraging a relatively simple and open flow of information among the faculty, students and other third party collaborations. While understanding the threats and solutions becomes the underlying factor of any security mechanism, we believe it is important to adopt a more pro-active approach rather than a reactive one. Thus, we do not just strategize systems to simply tackle the threats in real time but also understand patterns to eliminate threats before their arrival.

For example, the systems at our college were able to successfully tackle the recent WannaCry threat because of its pro-active approach. You cannot simply rely on a reactive model for disruptions as huge as this one.

How often do you update the security systems of your institution to overcome such a wide array of threats?

Our firewalls and other security devices in the network are updated automatically. The frequency of these updates are primarily subject to the vendor making patches or the availability of new updates in the market. The systems are also upgraded whenever a virus is detected or vulnerabilities in the system are tracked.

It is also essential to note that the demographics of virtual security are now constantly evolving. Ransomwares are emerging based on the concept of social engineering which involves targeting particular individuals or groups. Another concept is spear fishing, which is in the form of a fake email from a known contact containing a link. If you click the link you become a victim. Therefore in addition to updates, sensitizing users on these threats also plays an important role in overcoming their impact.

Could you elaborate on how new technologies in security impact the way you secure your premises?

I believe we are currently at a stage where things are just starting to take off and there is a lot of room for evolution. It is therefore crucial to stay abreast of all the new technologies and implement them as they come. In terms of virtual security, new and innovative tools and strategies assist in minimizing the threat significantly.

New technologies are also playing a critical role in terms of physical security, with now substantially improved IP cameras enabling better surveillance and precise outcomes. We can now constantly be on the lookout for any perceived or real threats by strategically placing cameras in critical areas, as the new technologies have brought the IP surveillance to areas where it might not have been otherwise practical.

How do you think we should feel in terms of security?

One of our biggest assets in terms of security is our knowledge and the ability to educate ourselves. Security problems will happen to us all at some point in life at some level or another. Nothing is 100% secure. We are now living in a virtual world, where hackers are giving new definitions to online threats every day. Therefore, we must make efforts to familiarize ourselves with such situations by staying updated with the latest detector and prevention systems, backing up data regularly on more than one device, watching out for Bitcoin, and staying alert in the overall sense.

Leveraging modern day campus security with IP-based camera

IP-enabled cameras are successfully revolutionizing security designs in business and organisations across the world. With seamless integration of networks, enhanced quality and easy-to-use software, IP cameras are becoming an effective tool in mitigating physical threat and minimizing their incidence. In addition to corporate businesses, schools and campuses too are embracing video surveillance in an elaborate way, with many now shifting their focus to IP-based infrastructure to optimize security. So how are IP camera revolutionizing campus security? Let’s find out with Dr. ABC.

How are IP-based cameras changing the face of campus security?

Cameras have evidently become a vital component of security solutions for college and school campuses, and this is just the beginning of the revolution. Although the rate of crime has been persistently declining on campuses across the nation, we are still faced by a variety of instances where the security solutions fall just short – most of them being burglaries. Video cameras are developing a wide-spread market for itself, however, by assisting in taking a huge step forward in tackling such instances.

Is it safe to say that IP-enabled cameras are successfully replacing analog systems?

An implementation of 400 high-res cameras gives fixed-dome and pan/tilt/zoom capabilities, all of which could be controlled through a centralized management system. Campuses can use several of these cameras to enhance security at places where it was not possible for the analog systems to reach, including, parking lots, poorly lit areas and various outdoor spaces. So yes, in terms of quality advancements IP-cameras are definitely replacing the aging analog systems

What is the current rate of acceptability on campuses when it comes to IP-based cameras?

As per the 2016 Campus Safety Video Surveillance, a large number of campuses and schools are now using video surveillance systems, with more and more looking to expand these systems in the next three years. More than nine out of 10 campuses have installed some type of video surveillance equipment, of which, 79 percent plan on buying more camera systems in the next three years – a clear indication of how cameras are impacting the campus security design.

How exactly have IP cameras improved on the older analog systems?

Many universities are now going in for IP-enabled cameras that integrate seamlessly with their video management system. This has enabled the university’s security staff to enhance surveillance of remote areas such as parking lots and other outdoor spaces, and employ intelligent systems to prep for any imminent threats.

IP-enabled cameras are also equipping campuses with a more easy-to-use software, therefore enhancing the efficiency of their security solutions significantly. If a security officer wishes to obtain a specific part of the video feed for examination, they can do so easily without any sort technical assistance. This kind of ease in functionality is important in a security design as it enables more security staff to access high calibre information resulting in faster security application.

Would you say IP-cameras have optimized on-campus safety?

We have to understand that campuses are just beginning to adopt IP-based cameras and there is still certainly much room for further optimization of security designs. That said, the combination of analytics and video is without a doubt proving to be a quality value addition to the existing analog systems and assisting campuses in making the most out of their security solutions. If security staff can successfully employ analytics with the video systems, they can not only efficiently provide assistance during a threats or unusual activities but can also mitigate these activities in order to completely avoid them.

Modern Day Security Program

Adapting with the modern day security programs

With the growing complexity of the modern day security programs, it is becoming increasingly essential for organisations to comprehend as much of what’s happening in the security landscape. Understanding new age technologies and strategies surrounding them can be a critical aspect of success for any organisation and therefore, must be addressed with specialized efforts. Find out how organisations are keeping pace with the latest advancements in the security sector, as Dr. Niyazi Bodur shares his insights on a wide range of physical and virtual security threats.

Dr. Niyazi Bodur oversees all of NYIT’s information technology and telecommunication services, as well as facilities management, design and construction, and security.

He has 27 years of professional experience in information technology, business-driven engineering research and development, instruction, and academia, as well as with major construction and renovation projects. He is highly proficient in leading and managing a variety of IT and facilities functions.

What are the key components that one must take into consideration while securing an organisation?

In my opinion, securing any organisation has to be an effective mix of humans and technology. While humans can play an imperative role in identifying threats and tracking abnormalities, be it in the physical or virtual space, technology can be utilised to augment these human efforts to obtain optimum results. Harmonizing properly trained and sensitized staff with relevant technologies will successfully assist in offsetting any imminent attack, both in terms of technical and physical security.

At NYIT, we employ staff members who continuously monitor global security practices in order to be effectively prepared before anything happens. These two components are further strengthened by other factors such as sound strategies, strong relationships with local police force, law enforcement meetings and drills.

What precautions and safety measures does your institution keep in mind while formulating a security plan for your organisation?

The first step is to assess the available technologies and leverage them for the best protection of the college by encouraging a relatively simple and open flow of information among the faculty, students and other third party collaborations. While understanding the threats and solutions becomes the underlying factor of any security mechanism, we believe it is important to adopt a more pro-active approach rather than a reactive one. Thus, we do not just strategize systems to simply tackle the threats in real time but also understand patterns to eliminate threats before their arrival.

For example, the systems at NYIT were able to successfully tackle the recent WannaCry threat because of its pro-active approach. You cannot simply rely on a reactive model for disruptions as huge as this one.

How often do you update the security systems of your institution to overcome such a wide array of threats?

Our firewalls and other security devices in the network are updated automatically. The frequency of these updates are primarily subject to the vendor making patches or the availability of new updates in the market. The systems are also upgraded whenever a virus is detected or vulnerabilities in the system are tracked.

It is also essential to note that the demographics of virtual security are now constantly evolving. Ransonwares are emerging based on the concept of social engineering which involves targeting particular individuals or groups. Another concept is spear fishing, which is in the form of a fake email from a known contact containing a link. If you click the link you become a victim. Therefore in addition to updates, sensitizing users on these threats also plays an important role in overcoming their impact.

Could you elaborate on how new technologies in security impact the way you secure your premises?

I believe we are currently at a stage where things are just starting to take off and there is a lot of room for evolution. It is therefore crucial to stay abreast of all the new technologies and implement them as they come. In terms of virtual security, new and innovative tools and strategies assist in minimising the threat significantly.

New technologies are also playing a critical role in terms of physical security, with now substantially improved IP cameras enabling better surveillance and precise outcomes. We can now constantly be on the lookout for any perceived or real threats by strategically placing cameras in critical areas, as the new technologies have brought the IP surveillance to areas where it might not have been otherwise practical.

How do you think we should feel in terms of security?

One of our biggest assets in terms of security is our knowledge and the ability to educate ourselves. Security problems will happen to us all at some point in life at some level or another. Nothing is 100% secure. We are now parallelly living in a virtual world, where hackers are giving new definitions to online threats every day. Therefore, we must make efforts to familiarize ourselves with such situations by staying updated with the latest detector and prevention systems, backing up data regularly on more than one device, watching out for Bitcoin, and staying alert in the overall sense.