Views
11 months ago

CSLATEST

online threats THE SMELL

online threats THE SMELL OF FEAR: THREAT DE TOILETTE GLOBAL CYBER-SECURITY COMPANY KASPERSKY LAB HAS LAUNCHED WHAT IT CLASSIFIES AS "TWO THREATENING, YET PROVOCATIVE, SCENTS". WILL THAT HAVE THE BIG FRAGRANCE AND PERFUME PLAYERS WORRIED, THOUGH? my business and my ability to grow my channel. My audience's experience would also be disrupted, because they wouldn't have any new content to watch." Kaspersky Lab is aware that there are many virtual threats facing consumers and, in order to address this, has additional scents in the Threat range: Kaspersky Lab has launched its Threat de Toilette pour femme and pour homme fragrances onto the market - but whether they will ever compete with the likes of Yves Saint Laurent, Versace and Chanel is most doubtful. Then again, the new perfumes have a somewhat different purpose to making you feel good in your own skin. In fact, quite the reverse. They are, instead, part of a campaign whose aim is to "educate today's modern man and woman about the virtual threats we face daily". Threat de Toilette contains all the perfectly coded base notes of cybercrime; hints of spam and drops of ransomware that, according to Kaspersky Lab, will "ensnare your love affair and cast a love virus". Says David Emm, Kaspersky Lab's principal security researcher and face of the new scent: "The men and women who wear Threat de Toilette understand today's online threats and protect themselves against them. Fear is no longer felt only in the physical world - it's all around us in our connected lives, too, and we need to make sure we're constantly protected." Scarlett London, the well-known UK beauty blogger, attending the event to illustrate how cybercrime poses a constant threat to her online livelihood, says, "I don't feel that we discuss cyber-security enough - or that enough attention is given to it, especially considering how much of our time and life is spent online. My business and livelihood is based online - so, if a hacker was to be able to get in and steal content or wipe files from my computer, channel or feeds, it would severely disrupt RANSOM Reassuringly expensive Ransomware is the theft of confidential data, with a cost (ransom) to regain access to the encrypted files. This could be priceless items, such as family photos, or financial details, such as banking documents. Imagine someone removing all your prized possessions from your bedroom and then requesting money for the safe return of them - this is the real life equivalent to ransomware. MAL-WEAR The wicked way to pierce the heart Malware (Malicious Software) are the programs that sneak onto your computer without permission, with the intent to steal your personal data or capture your passwords and other sensitive information. The term covers all sorts of viruses, worms, Trojans and spam. It's like somebody dipping into your bag unnoticed, stealing all your keys and using them to get access to all your stuff. SOCIAL ENGINOIR Lure them in One word to use when thinking of social engineering is manipulation. When using this attack method, a cybercriminal will often trick their victim into breaking their 32 computing security May/June 2017 @CSMagAndAwards www.computingsecurity.co.uk

online threats usual security procedures, for example giving away passwords, so they can gain access to the computer. It's as if you hand over your keys to someone you think is your best friend - but they're a thief masquerading as your best friend. PHISH Catch your deepest love Phishing emails are the electronic equivalent of the 'junk mail' that arrives on your doormat. These can be dangerous - posing as a tailored, credible email with the purpose being to steal financial information. These emails are designed to grab your attention, making you drop your guard, for example, they may include information on an event you've just attended. Trust us, it's not a coincidence. Meanwhile, Emm offers the following top tips to stay safe online: Get protected. This may seem obvious, but security software is the new 'black'. Its helps you stay fully protected against malware, spyware, hackers and identity theft at all times. Keep up to date. Make sure all your devices are up to date with all the latest security and firmware updates. Practise safe online shopping and banking. Always shop and bank on a secure site. Look for a URL that starts with 'https' and has the lock symbol when entering your credit card details or other personal information. Privacy is key. Avoid using public Wi-Fi to access any web sites that need a login and password to access them or that involves typing in confidential information. Socialise safely. By now, we've all had a bad link or two sent to us over our favourite social network. Utilise your social network's security settings to their optimum level. Do you really need to display every detail about your life? Safe passwords. Use secure passwords - a different one for each Internet service. Set passwords to include 12 or more upper and lower case characters and numbers. Stomp out spam. Most Internet Service Providers and security software programs have anti-spam technologies. The spam blocker will help prevent fraudulent emails from showing up in your Inbox. Fake lottery wins or chances to win the latest gadget can be very tempting! And if all of this alerts you and your organisation to be better prepared against the threats that are escalating all around, then you would have to say the Kaspersky campaign could be heaven scent! BLACKOUT BLUES Meanwhile, Eugene Kaspersky, founder and CEO, Kaspersky Lab, has warned that a blackout such as the one recently experienced in Ukraine could have deep and worrying ramifications on a much wider scale. During a blackout, none of the devices connected to the lauded Internet of Things would be able to 'talk' to each other. "By a cyberattack on critical infrastructure taking control of a country's power grid, simply nothing would work," he warns. "No urban facilities, no water, no air conditioning, no elevators, no Internet, no mobile network. Far-fetched sci-fi? "Unfortunately, this scenario is very real," he adds. "The world we live in is based upon technologies and ideas which were made 50 years ago. Many of them rely upon an architecture that predates the era of cybercrime. The hackers simply didn't exist then. As we increasingly depend on technology as the backbone of our civilisation, we need to ensure our critical infrastructure is built upon a robust architecture that is not only secure, but immune. If we don't adopt a security-first approach, we will face a very uncertain future." Eugene Kaspersky: without a security-first approach, we will face a very uncertain future. David Emm: fear is all around us in our connected lives. www.computingsecurity.co.uk @CSMagAndAwards May/June 2017 computing security 33