Cyber Security-A Never Ending Process

0 (5)

Change is a necessity. The way of living and working is constantly changing. The same thing applies on technology. According Moore’s law computing would dramatically increase in power, and decrease in relative cost, at an exponential pace. And that happened. No other technology has made progress at that rate, not even close. No other technology … Read moreCyber Security-A Never Ending Process

DDoS Attack

Page 1 Image 1

What is a DDoS Attack? A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic. DDoS attacks achieve effectiveness by utilizing multiple compromised computer systems as sources of attack traffic. Exploited … Read moreDDoS Attack

The Tangible and Non-Tangible Crime Factor

Tangiable Nontangiable

It takes courage and boldness to commit a crime in the real world. Physicalinvolvement. On the other hand, criminals in the virtual world are nerdshiding behind a web of algorithms. They act remotely and do not requirephysical interaction to commit a crime. A cybercriminal will in all probabilitieslack the guts to rob a bank, but … Read moreThe Tangible and Non-Tangible Crime Factor

International Notorious Cybercriminal Groups Getting Allured To Target Banks in Bangladesh?

International Notorious Cybercriminal

If they have not been keen yet, they will find it alluring now. News circulating on the recent bank breach incidences will be drawing a lot of attention in the cyber underworld. The international tech news channels are churning as the recent local news has been picked up in discussion. I recently came across an … Read moreInternational Notorious Cybercriminal Groups Getting Allured To Target Banks in Bangladesh?

সাম্প্রতিক এটিএম মেশিন হ্যাকিং প্রচেষ্টা প্রসঙ্গে:

সম্প্রতি খবর এসেছে এটিএম মেশিন হ্যাক করার অপরাধে কয়েকজন ইউক্রেনিয়ান পুলিশের হাতে ধরা পড়েছে। আমাদের ব্যাংকিং সিস্টেমের দুর্বলতার সুযোগ নিয়ে সেখানে দেশিদের পাশাপাশি বিদেশিরাও অনেক আগে থেকেই হামলা করে আসছে। এটা জানা ছিল বলেই এটিএম হ্যাকের চেষ্টার খবরে অবাক হইনি। কিন্তু কিছু কিছু খবরের হেডলাইন দেখে, আর পরে পুরো খবর পড়ে যেটা অবাক হয়ে দেখলাম, … Read moreসাম্প্রতিক এটিএম মেশিন হ্যাকিং প্রচেষ্টা প্রসঙ্গে:

Are people more nervous with cybersecurity than cybercrime?

Do you find that a valid question? I do. And that’s what I perceive interacting around. And in many cases with tech people also. People in general get to know about cybercrime incidences from the news circuit or social media. And these incidences are presented as stories. In various flavours. A 14-year-old boy is a hacker … Read moreAre people more nervous with cybersecurity than cybercrime?

Insider Threats: Cyber vulnerability comes from inside too

Statistically 28 to 29% of the cyber breaches are orchestrated by insiders while 70% of the cyber breaches happen due to human factors – intentional or unintentional. Sounds confusing. But two different aspects. Insider threats are a cybercrime. Intentional. Cyber breaches from human factors on the other hand are vehicles to a cybercrime. Intentional cyber … Read moreInsider Threats: Cyber vulnerability comes from inside too

How far is Bangladesh ready to handle distributions and partnerships for global software companies locally?

It was only a few years back that cloud technology was in its infancy and used only by tech-savvy, forward-thinking organisations. Today, it is commonplace. More businesses than ever are making use of cloud services in one form another. And recent statistics suggest that cloud adoption has reached 88 percent. It seems that businesses now … Read moreHow far is Bangladesh ready to handle distributions and partnerships for global software companies locally?