Posts

Showing posts from September, 2020

Shopify Data Breach- The Insider Attack

Image
W hen an authorized person of an organisation is entangled in the cyber attack, just think of what level of damage it can lead to? The above situation where an organization's employee is involved in the attack perpetration on the network or the computers of the organization is referred as INSIDER ATTACK .  Insider attack is one of the most dangerous sort of attack for any company.  The company's employee has an edge advantage over the external threat. The insider is very well aware of the company's policies, strength, weaknesses any many confidential details. Due to the scenario, it becomes very easy for the insider to frame a attack domain and deploy the attack. While on the other hand, the external actor need to first analyse the organization's environment, the details, employees trust on organization, its outreach co-ordinations and so as like… Image Source: https://www.google.com/amp/s/www.forbes.com/sites/gregpetro/2019/04/05/shopping-malls-arent-dying-theyre-evolv...

Amalgamation of Data Science and Cyber Security

Image
 “ 32% of confirmed data breaches  and 86% of email attacks include phishing attacks and $24.26 billion were lost in 2018 due to card payment fraud. ” Image Source:  https://www.google.com/amp/s/www.digitalnest.in/blog/how-data-science-plays-an-important-role-in-addressing-cyber-security-risks/amp/ Before starting with anything, let's first talk about WHAT IS DATA SCIENCE? Data Science is the interdisciplinary field that deals with the programming, domain expertise, algorithm, scientific methods and systems to extract significant evidence and insights from either structured or unstructured data. The term interdisciplinary is used because it is the confluence of mathematics and statistics, computer science and business knowledge. Image Source: https://www.techiexpert.com/difference-data-science-machine-learning/ Data is something that cannot be confined in limits, it has a vast category- images, text, videos, voice, speech, and many more.- all are data and are divided as s...

Social Media- Exposing Personal Data

Image
I n the time when everyone has their social essence and in today’s world of data breaches, it becomes very necessary to be defensible against such invasions.  Source: https://www.itweb.co.za/static/pictures/2018/10/resized/-fs-social-media-icons-2018.xl.jpg The time when all your details are available online- • Your facial recognition database on TikTok  • Your fingerprints database on smartphone companies • All your friends and family list on Facebook  • Your videos choices and audio database on YouTube • Your work and professional colleague database on LinkedIn  • Celebrities and your ideals you follow on Twitter and Instagram  And many more, many more….. These are only some of that information of yours available online and it’s  not a big bargain to steal them especially from your own social media account. Social media poses biggest threat when it comes  to data breach.  “ A recent Stratecast study states that 22% of social med...

App Permissions Posing a Great Threat to Security

Image
F rom gaming application to banking application, from personal use to business use, from child to adult, a commonly used most popular word everyone would found. Its MOBILE PHONE .   Yes, mobile phones or say smart phones nowadays are mostly used among any gadgets. There is a huge increase in use of smartphone in India from 524.9 million in 2013 to 813.2 million in 2019 and this is in urge of increment. (Data in millions) With increase in smart phones bring increase in number of mobile apps. Currently 2.8 millions apps are available for download in Google Play Store and about 2.2 million apps in Apple App Store. A normal person has about 60-90 apps installed on his/her smartphone but not use all of them. The ones in use are very less. All apps present on the play store or app store are not secure. Every 5 out of 7 apps in play store are infected and so every 3 out of 7 in apple app store. This means that we are really surrounded with malicious actors. Now let’s talk about how a...