Mobile World Congress 2017: Avast CEO demonstrates security threats targeting IoT devices
One of the realities of today’s cybersecurity threatscape is not if you will be breached, but when, and how often. As good as cybersecurity is becoming – i.e. prevention solutions provide a 99.9 percent or higher detection rate for common malware – effective cybersecurity depends upon three pillars – prevention, detection and resolution – with the latter two required to address those situations where prevention isn’t enough.
Out of all the cybercrimes from malware to social engineering, the creepiest has to be a stranger watching your child through a webcam or baby monitor in their room. As this year’s Mobile World Congress starts in Barcelona, Avast researchers reveal that half a million smart devices in the city, including webcams and baby monitors, are currently vulnerable to cyber attack.
That little black home router with the funny antennae and shiny lights could be part of an army of devices conscripted to take down the internet. It sounds dramatic, but regular people’s internet-enabled devices – routers, webcams, printers, and so on – were used in a massive online attack that shut down a huge part of the internet for hours one Friday morning last October. With the number of connected devices estimated to reach 50 billion by 2020, you can be guaranteed that cybercriminals will attempt it again.
Like most of us, you probably got the router you use in your home from your internet service provider. Like most of us, you probably have not changed the password. And like most of us, you probably didn’t even know there was a password to be changed, much less how to access it.
When computers were still relatively new, antivirus software defended against the only existing threat at the time – viruses. Today, users must protect themselves and their devices from viruses and from malware such as ransomware, as well as malicious activities carried out by cyber crooks, including Wi-Fi snooping to steal personal information, account breaching, and infecting Internet of Things (IoT) devices to perform DDoS attacks. You may be wondering, then, how to protect yourself from so many – and such diverse – threats.
While small and medium businesses don’t appear to be as concerned about their cybersecurity vulnerabilities as they should be – i.e. SMBs are the principal targets of cybercrime and as many as 60 percent of hacked SMBs go out of business after six months – the reality is that the growing and rapidly changing threatscape and limited resources are driving them to outside help to protect their businesses. That protection can include assessments, remote monitoring and management, and backup and disaster recovery, but one way to stand out from the competition is to focus on their risk tolerances and customize your offerings to their individual risk appetites.
In cooperation with researchers from CERT.PL, we are happy to announce the release of another decryptor tool, for the ransomware,CryptoMix. CryptoMix has multiple aliases, including CryptFile2, Zeta, or the most recent alias CryptoShield.
We recently released a new version of our flagship PC product, Avast 2017, which uses various engines, including CyberCapture, to scan for threats. Our engines are protection layers, that can step in at different stages to safeguard you from threats. A…
Whether internal or external, accidental or malicious, the cybersecurity threatscape is huge and growing, but successfully protecting your information, and your business, is not as difficult as you might think.
In the first of a three-part series, I’ll address how a framework consisting of these three pillars provides the basics for effective cybersecurity.