Cybersecurity was the virtual elephant in the showroom at this month's Consumer Electronics Show in Las Vegas. Attendees of the annual tech trade show, organized by the Consumer Technology Association, relished the opportunity to experience a future filled with delivery drones, autonomous vehicles, virtual and augmented reality and a plethora of "Internet of things" devices, including fridges, wearables, televisions, routers, speakers, washing machines and even robot home assistants. Given the proliferation of connected devices--already, there are estimated to be at least 6.4 billion--there remains the critical question of how to ensure their security. The cybersecurity challenge posed by the internet of things is unique. The scale of connected devices magnifies the consequences of insecurity.
WhatsApp has launched an unprecedented lawsuit against a cyber weapons firm which it has accused of being behind secret attacks on more than 100 human rights activists, lawyers, journalists, and academics in just two weeks earlier this year. The social media firm is suing the NSO Group, an Israeli surveillance company, saying it is responsible for a series of highly sophisticated cyber-attacks which it claims violated American law in an "unmistakeable pattern of abuse". WhatsApp said it believed the technology sold by NSO was used to target the mobile phones of more than 1,400 of its users in 20 different countries during a 14-day period from the end of April to the middle of May. In this brief period, WhatsApp believes those who were the subject of the cyber-attacks included leading human rights defenders and lawyers, prominent religious figures, well-known journalists and officials in humanitarian organisations. A number of women previously targeted by cyber-violence, and individuals who have faced assassination attempts and threats of violence, as well as their relatives, were also the victims of the attacks, the company believes.
The media makes sensationalist claims about AI, but let's take a closer look at the facts: AI is not a trend! Cisco has been doing it for years to help businesses across the globe quickly and easily identify banking trojans, botnets, phishing and ransomware. A taxonomy of AI algorithms used in cyber threat detection What AI can and can't do for your organisation How to leverage AI as a preventative measure to help detect & uncover threats before they hit your business Best practices on how to incorporate AI into your threat detection and defence systems What AI can and can't do for your organisation During this webinar, we'll go beyond the hype and show you real-world examples of AI algorithms that helps us keep our customers safe on the internet, anywhere their users go. See how Cisco Umbrella uses AI to effectively detect current and emerging threats.
Cashless payments are all the rage but people in Sweden have been told to squirrel away notes and coins in case of a cyber attack on the nation's banks. Digital payments offer convenience for both buyers and sellers alike and the Scandinavian nation has been an eager adopter of the technology. Now, government experts are concerned that people could be left without any money should its computer networks become victim to an attack. Sweden's Civil Contingencies Agency has issued guidance to every household telling residents to stockpile'cash in small denominations' for use in emergencies. The warning will ring alarm bells around the world as developed nations increasingly make the move to a cashless society.
After a cyber-attack disrupted IT services across the globe, many people have written to the BBC with questions about why it happened, how you can protect your computers and smartphones, and if the attackers will be caught. BBC Technology reporter Chris Foxx and security expert Prof Alan Woodward provide some answers. "Practically speaking, it's not possible to completely isolate the NHS network," said cyber-security expert Prof Alan Woodward. "The NHS sends emails to patients who have email addresses outside of the NHS network. "Even a private network can be compromised, especially in an organisation with thousands of people using it daily.