Change is a necessity. The way of living and working is constantly changing. The same thing applies on technology. According Moore’s law computing would dramatically increase in power, and decrease in relative cost, at an exponential pace. And that happened. No other technology has made progress at that rate, not even close. No other technology … Read moreCyber Security-A Never Ending Process
What is a DDoS Attack? A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited … Read moreDDoS Attack
Well, it is, in the worst-case scenario. When an organization falls victim to cybercrime, solace can be sought in the best of the worst if it is a hack rather than a breach. A breach means the organizations cybersecurity sucks. There is a big difference between a cyber hack and a cyber breach. A hack … Read moreBetter to be hacked than breached!
It takes courage and boldness to commit a crime in the real world. Physicalinvolvement. On the other hand, criminals in the virtual world are nerdshiding behind a web of algorithms. They act remotely and do not requirephysical interaction to commit a crime. A cybercriminal will in all probabilitieslack the guts to rob a bank, but … Read moreThe Tangible and Non-Tangible Crime Factor
If they have not been keen yet, they will find it alluring now. News circulating on the recent bank breach incidences will be drawing a lot of attention in the cyber underworld. The international tech news channels are churning as the recent local news has been picked up in discussion. I recently came across an … Read moreInternational Notorious Cybercriminal Groups Getting Allured To Target Banks in Bangladesh?
সম্প্রতি খবর এসেছে এটিএম মেশিন হ্যাক করার অপরাধে কয়েকজন ইউক্রেনিয়ান পুলিশের হাতে ধরা পড়েছে। আমাদের ব্যাংকিং সিস্টেমের দুর্বলতার সুযোগ নিয়ে সেখানে দেশিদের পাশাপাশি বিদেশিরাও অনেক আগে থেকেই হামলা করে আসছে। এটা জানা ছিল বলেই এটিএম হ্যাকের চেষ্টার খবরে অবাক হইনি। কিন্তু কিছু কিছু খবরের হেডলাইন দেখে, আর পরে পুরো খবর পড়ে যেটা অবাক হয়ে দেখলাম, … Read moreসাম্প্রতিক এটিএম মেশিন হ্যাকিং প্রচেষ্টা প্রসঙ্গে:
Do you find that a valid question? I do. And that’s what I perceive interacting around. And in many cases with tech people also. People in general get to know about cybercrime incidences from the news circuit or social media. And these incidences are presented as stories. In various flavours. A 14-year-old boy is a hacker … Read moreAre people more nervous with cybersecurity than cybercrime?
With turmoil around US and European markets on and off (which seems to be happening now and then and becoming hard to follow on the news also) vendors, particularly software ones from the European part widely covered, are eyeing or even let’s say focusing on the Asia Pacific region. Their activities are increasing around here, … Read moreThe South Asia Market Dilemma
Statistically 28 to 29% of the cyber breaches are orchestrated by insiders while 70% of the cyber breaches happen due to human factors – intentional or unintentional. Sounds confusing. But two different aspects. Insider threats are a cybercrime. Intentional. Cyber breaches from human factors on the other hand are vehicles to a cybercrime. Intentional cyber … Read moreInsider Threats: Cyber vulnerability comes from inside too
It was only a few years back that cloud technology was in its infancy and used only by tech-savvy, forward-thinking organisations. Today, it is commonplace. More businesses than ever are making use of cloud services in one form another. And recent statistics suggest that cloud adoption has reached 88 percent. It seems that businesses now … Read moreHow far is Bangladesh ready to handle distributions and partnerships for global software companies locally?