Cyber war a real threat

SECURITY

|
Image: By ITU
Cyber war a real threat

Cyber warfare is not fiction, it’s a very real threat, delegates at ITU Telecom World 2012 have been told.

Panellists at Telecom World in Dubai said that cyber war is a threat that faced globally, right now. They noted cyber threats are everywhere and growing exponentially. There are more than six billion mobile phone subscriptions – cyber material that can be used for malicious purposes making managing of this threat hugely difficult.

In the midst of this problem, ITU Secretary General Dr Hamadoun Touré urged action, but without losing sight of the tremendous benefits and opportunities offered by the rise of the internet, especially for people in aspiring nations.

“We are today living in a cyber world, and we know there are advantages and also there are threats,” said Dr Touré. “The good things in cyberspace are much better than the threats, and that is one thing that we have to keep in mind.”

“Earlier this year, a complex piece of malware called the Flame Virus made headlines, alerting the world once again to the exciting opportunities that come with rising global connectivity also carry with them serious threats. And the threats, to date at least, are moving far faster than the institutions that can tackle them.”

“We are living in a very, very fast moving world,” said Eugene Kaspersky, Founder and CEO of Kaspersky Labs, which is credited with uncovering the Flame Virus. “Cyber malware is moving fast, and governments don’t have enough time to keep up and tackle this threat.”

Part of the problem is that there is no internationally agreed definition of what constitutes ‘cyberwarfare’ making it hard to come up with solutions when the problem itself hasn’t been clearly identified.

Even more alarming, said Kaspersky, is that the nature of cyberweapons means they can be easily copied and used for terrorist purposes.

“I think that the worst news is that the difference between cyberweapons and traditional weapons is that cyberweapons are very easy to copy – it is after all, just a piece of code,” said Kaspersky. “Think of it like this: it’s like some guys building an A-bomb in their garage.”



Share the News

Get Daily Newsletter

Search News

comments powered by Disqus

MORE SECURITY NEWS

F5 introduces standalone security products to defend against targeted attacks

F5 DDoS Hybrid Defender provides superior infrastructure protection by combining multilayered DDoS defence across network, session, and application layers. Read More

Ethical Hacking students can’t get a heck of a job

Botswana ethical hacking students report that they are failing to break into the local job market.  Read More

Pokémon GO: Sophos warns against malicious copycats

Researchers at IT security company Sophos have warned mobile users to be cautious when downloading augmented reality (AR) mobile games. Read More

New PCI multifactor authentication rules: Is it too late?

Anton Jacobsz, MD at Networks Unlimited The PCI (Payment Card Industry) Security Council has extended its requirements for multi-factor authentication to anyone who has access to credit card data.   Read More

Web apps, a leading cause of security breaches

Anton Jacobsz, MD at Networks Unlimited Web applications are the leading cause of security incidents for financial services, according to the 2016 Verizon Data Breach Investigation Report; this is up from 31 percent from last year’s report.  Read More

Analyst firm Ovum publishes SWOT analysis of Arbor Networks Spectrum v2.1

Arbor Networks has announced that leading global telecoms analyst firm, Ovum, had published a strengths, weaknesses, opportunities and threats (SWOT) analysis of version 2.1 of Arbor Networks Spectrum. Read More

New RSA Via solution innovations strengthen identity assurance and governance

RSA, The Security Division of EMC, has announced new, innovative identity assurance and identity governance capabilities in RSA Via, designed to help organisations effectively balance security and user convenience as they assure identities and better govern and manage privileged access.  Read More

Study affirms the DDoS challenge

The threat of DDoS is becoming ever more ubiquitous and attackers continue to ramp up in both scale and frequency. Read More

The sum of details at hand equals the quality of a cyber threat investigation

Anton Jacobsz, MD at Networks Unlimited Just like any detective investigating a crime scene, security analysts need to be able to access all the information pertaining to any threat incident they are investigating.  Read More

ATM/card-related frauds rise 11.95%

Fraud cases perpetrated through the use of automated teller machine (ATM) and other card payment system has risen 11.95% over last year’s cases, according to the Nigeria Deposit Insurance Corporation (NDIC) annual report. Read More

PRESS OFFICES

Sage EnterpriseSAP AfricaTrust PayVMWareSamsung ElectronicsMitsumi DistributionPhoenix DistributionMTN BusinessSchneider ElectricMultichoiceMicrosoft 4AfrikaNetworks UnlimitedArbor NetworksEricssonTigo Ghana

FEATURED STORY

First-ever Africa Barclays Accelerator programme concludesFirst-ever Africa Barclays Accelerator programme concludes

Ten fintech companies have concluded the first-ever Barclays Accelerator, powered by Techstars in Africa.

 

IN DEPTH

Ethical Hacking students can’t get a heck of a jobEthical Hacking students can’t get a heck of a job

Botswana ethical hacking students report that they are failing to break into the local job market.