DUTCH-BANGLA BANK COMPROMISED BY THE NOTORIOUS SILENCE GANG

GIB on DBBL

Bangladesh Cyber Heist 2.0: Silence APT goes global Singapore, 03.07.2019 – Group-IB, an international company that specializes inpreventing cyber attacks, has established that Silence, a Russian-speakingcybercriminal group is likely to be behind the brazen attack on Dutch-BanglaBank’s ATMsresulting in the theft of $3 million, the amount reported by the localmedia. The actual amount of money … Read moreDUTCH-BANGLA BANK COMPROMISED BY THE NOTORIOUS SILENCE GANG

Backing Up May Be Easier, But There’s More to It Than You Think

652855 It Watch Why You Need To Back Up More Than You Think

Yes, of course you need to back up your critical data files, and yes, the cloud has made that task easier. But the cloud and virtualization have also added a whole new aspect to backup and many people are forgetting about it. This may not be a valid assumption but, if you’re in business, then … Read moreBacking Up May Be Easier, But There’s More to It Than You Think

Cyber Security-A Never Ending Process

0 (5)

Change is a necessity. The way of living and working is constantly changing. The same thing applies on technology. According Moore’s law computing would dramatically increase in power, and decrease in relative cost, at an exponential pace. And that happened. No other technology has made progress at that rate, not even close. No other technology … Read moreCyber Security-A Never Ending Process

DDoS Attack

Page 1 Image 1

What is a DDoS Attack? A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited … Read moreDDoS Attack

The Tangible and Non-Tangible Crime Factor

Tangiable Nontangiable

It takes courage and boldness to commit a crime in the real world. Physicalinvolvement. On the other hand, criminals in the virtual world are nerdshiding behind a web of algorithms. They act remotely and do not requirephysical interaction to commit a crime. A cybercriminal will in all probabilitieslack the guts to rob a bank, but … Read moreThe Tangible and Non-Tangible Crime Factor

International Notorious Cybercriminal Groups Getting Allured To Target Banks in Bangladesh?

International Notorious Cybercriminal

If they have not been keen yet, they will find it alluring now. News circulating on the recent bank breach incidences will be drawing a lot of attention in the cyber underworld. The international tech news channels are churning as the recent local news has been picked up in discussion. I recently came across an … Read moreInternational Notorious Cybercriminal Groups Getting Allured To Target Banks in Bangladesh?

Are people more nervous with cybersecurity than cybercrime?

Do you find that a valid question? I do. And that’s what I perceive interacting around. And in many cases with tech people also. People in general get to know about cybercrime incidences from the news circuit or social media. And these incidences are presented as stories. In various flavours. A 14-year-old boy is a hacker … Read moreAre people more nervous with cybersecurity than cybercrime?

Insider Threats: Cyber vulnerability comes from inside too

Statistically 28 to 29% of the cyber breaches are orchestrated by insiders while 70% of the cyber breaches happen due to human factors – intentional or unintentional. Sounds confusing. But two different aspects. Insider threats are a cybercrime. Intentional. Cyber breaches from human factors on the other hand are vehicles to a cybercrime. Intentional cyber … Read moreInsider Threats: Cyber vulnerability comes from inside too