Cyber war a real threat
SECURITY| Oct. 16, 2012, 10:14 a.m.
Cyber warfare is not fiction, it’s a very real threat, delegates at ITU Telecom World 2012 have been told.
Panellists at Telecom World in Dubai said that cyber war is a threat that faced globally, right now. They noted cyber threats are everywhere and growing exponentially. There are more than six billion mobile phone subscriptions – cyber material that can be used for malicious purposes making managing of this threat hugely difficult.
In the midst of this problem, ITU Secretary General Dr Hamadoun Touré urged action, but without losing sight of the tremendous benefits and opportunities offered by the rise of the internet, especially for people in aspiring nations.
“We are today living in a cyber world, and we know there are advantages and also there are threats,” said Dr Touré. “The good things in cyberspace are much better than the threats, and that is one thing that we have to keep in mind.”
“Earlier this year, a complex piece of malware called the Flame Virus made headlines, alerting the world once again to the exciting opportunities that come with rising global connectivity also carry with them serious threats. And the threats, to date at least, are moving far faster than the institutions that can tackle them.”
“We are living in a very, very fast moving world,” said Eugene Kaspersky, Founder and CEO of Kaspersky Labs, which is credited with uncovering the Flame Virus. “Cyber malware is moving fast, and governments don’t have enough time to keep up and tackle this threat.”
Part of the problem is that there is no internationally agreed definition of what constitutes ‘cyberwarfare’ making it hard to come up with solutions when the problem itself hasn’t been clearly identified.
Even more alarming, said Kaspersky, is that the nature of cyberweapons means they can be easily copied and used for terrorist purposes.
“I think that the worst news is that the difference between cyberweapons and traditional weapons is that cyberweapons are very easy to copy – it is after all, just a piece of code,” said Kaspersky. “Think of it like this: it’s like some guys building an A-bomb in their garage.”
MORE SECURITY NEWS
F5 introduces standalone security products to defend against targeted attacksF5 DDoS Hybrid Defender provides superior infrastructure protection by combining multilayered DDoS defence across network, session, and application layers. Read More
Ethical Hacking students can’t get a heck of a jobBotswana ethical hacking students report that they are failing to break into the local job market. Read More
Pokémon GO: Sophos warns against malicious copycatsResearchers at IT security company Sophos have warned mobile users to be cautious when downloading augmented reality (AR) mobile games. Read More
New PCI multifactor authentication rules: Is it too late?The PCI (Payment Card Industry) Security Council has extended its requirements for multi-factor authentication to anyone who has access to credit card data. Read More
Web apps, a leading cause of security breachesWeb applications are the leading cause of security incidents for financial services, according to the 2016 Verizon Data Breach Investigation Report; this is up from 31 percent from last year’s report. Read More
Analyst firm Ovum publishes SWOT analysis of Arbor Networks Spectrum v2.1Arbor Networks has announced that leading global telecoms analyst firm, Ovum, had published a strengths, weaknesses, opportunities and threats (SWOT) analysis of version 2.1 of Arbor Networks Spectrum. Read More
New RSA Via solution innovations strengthen identity assurance and governanceRSA, The Security Division of EMC, has announced new, innovative identity assurance and identity governance capabilities in RSA Via, designed to help organisations effectively balance security and user convenience as they assure identities and better govern and manage privileged access. Read More
Study affirms the DDoS challengeThe threat of DDoS is becoming ever more ubiquitous and attackers continue to ramp up in both scale and frequency. Read More
The sum of details at hand equals the quality of a cyber threat investigationJust like any detective investigating a crime scene, security analysts need to be able to access all the information pertaining to any threat incident they are investigating. Read More
FEATURED STORYFirst-ever Africa Barclays Accelerator programme concludes
Ten fintech companies have concluded the first-ever Barclays Accelerator, powered by Techstars in Africa.
BEST READ NEWS
IN DEPTHEthical Hacking students can’t get a heck of a job
Botswana ethical hacking students report that they are failing to break into the local job market.