In a previously unreported exchange last week, Musk told Thierry Breton, the EU’s industry chief, that he planned to comply with the region’s Digital Services Act, which levies hefty fines on companies if they do not control illegal content.
The self-described free speech absolutist agreed to hold a meeting with Breton, a former French finance minister, in the coming weeks, two EU officials familiar with the discussions told Reuters. The exchange came after Breton took to Twitter to warn Musk about the new European legislation on Friday. “In Europe, the bird will fly by our EU rules,” Breton tweeted on Friday.
EU lawmakers approved the landmark rules to rein in tech giants over the summer, which will require online platforms to do more to police the internet for illegal content, with big platforms required to have more moderators than small ones.
Companies will face fines of up to 6% of annual global turnover for breaches of Digital Services Act. The assurances from Musk appeared to suggest a pragmatic attitude from the CEO of electric car maker Tesla Inc, who has previously expressed his desire to see Twitter with fewer limits on content.
Musk has so far offered little details on how he will run the company after his $44 billion buyout.
He has said he plans to cut jobs, leaving Twitter’s 7,500 employees fretting about their future. He also said on Thursday he did not buy Twitter to make more money but “to try to help humanity, whom I love.”
Breton and Musk had met in May, and the two had signalled at the time agreement on complying with EU regulation.
In a video posted on Twitter by Breton after their May meeting, the EU official says he explained the Digital Services Act to Musk. “It fits pretty well with what you think we should do,” Breton said. “I think it’s exactly aligned with my thinking,” Musk responded in the May video.
Women in Tech: The technology industry in South Korea is highly male-dominant. A 2019 survey from the Korean ministry of science and technology shows that only 29 per cent of people who work in software or digital content development are female. Reports also indicated that female tech workers get paid less than their gender counterpart peers, earning 60 to 70 per cent of their salary even though they work in the same positions.
Nevertheless, women’s interest in the industry is higher than ever in the country. The number of female computer programmers and developers increased from 5,900 in 2018 to 6,500 in 2019, and in 2021, the share of female engineering college graduates surpassed 25 per cent for the first time in history. People with no experience or background knowledge of tech also enrol on extracurricular academies, hoping for a change in their careers. Still, the journey of having a tech job can seem vast and boundless if they don’t know where to begin.
Kim Seon-Ja, who now works as a front-end developer, also didn’t major in computer programming when she was in college. Kim was in her 30s when she started learning computer programming at a boot camp, a short-term learning programme for people who need a foundation in this field. Before entering the tech industry, she worked as a flight attendant for five years.
“I always loved to study languages,” Kim tells 4i Magazine. “We say computer programming is also a language, which intrigued me to try studying it. I started with learning JavaScript, then completed projects in the boot camp. I sometimes stayed up late at night to do them, but I enjoyed the study overall.”
Lee Su-jin, who worked as a project manager until recently, studied a different major than technology. A math and science enthusiast, Lee wanted to keep her feet on the ground in tech-related fields and started her position as a project manager, overseeing all projects, including technical writing, designs, and marketing promotions.
“It was a coincidence that I joined the tech industry,” Lee recalls. “I first joined my company as a marketer, then repositioned to a project manager. It is a position where you must actively communicate with the developers to make the best version of your products, so I also had some challenges at the beginning. I started to feel confident about what I do as I continued studying (such as computer programming) outside of my work, too,” she says.
Surviving in the Tech Industry as a Female
Kim and Lee both agree that there are fewer female workers than males in the tech industry and find the reason in the country’s socioeconomic landscape.
“It’s simple – when there is a lower number of female students studying tech, the number of female workers will be lower,” Lee says. “The pressure you feel from studying a male-dominant major among your male peers at a college is not neglectable. This pressure continues even after you (graduate from your college) and find a job,” she reiterates.
Lee adds it is, therefore, difficult to find female senior employees in the tech industry who kept their jobs despite the “pressure”. “Juniors will not have a role model to look up to (if experienced workers quit), which then creates another vicious cycle,” she says.
“The older generations of this country used to think tech jobs are for men,” Kim says. “When they thought of studying ‘technology’, the first thing that came to their minds was operating heavy machinery, which was traditionally thought to be a man’s expertise. Females thus had fewer opportunities to pursue tech-related careers,” she explains.
There is an array of gender-biased prejudices that female tech workers face while working, too. For example, when one developer introduces herself as a “developer”, many might think that she is a “front-end” developer who builds the user interface rather than a “back-end” developer who takes care of data or servers. “We say that working conditions for women in tech have improved over the years, but some minor challenges still exist,” Lee concludes.
Courtesy of Women Who Code Seoul
A Group Dedicated to “Women Who Code”
For those who want to broaden their horizon of careers in the tech industry and jump into a community of female tech workers, Kim and Lee have been working as organisers of the South Korean edition of the Women Who Code (WWC).
The international, non-profit organisation was first made in 2011, and its Korean branch, dubbed Women Who Code Seoul (WWCS), was founded in April 2018 and now has more than 2,200 members on its Facebook group. The primary goal of this organisation is to empower and inspire women who are in technology careers. It offers various events and services for its members to level up their careers, such as conferences with a panel of female tech workers, regular newsletters, and insightful articles on its social media channels.
Of all events, WWCS’s first and most remarkable event was the “First Half of the Year Special“, which was held in June this year. The organisers invited experts and professionals from the industry to share their insights during the one-day online event.
The organisation first expected 30 to 50 participants to come but ended up having almost 200 people on the day and dropped the curtain with great feedback.
“Most participants were people who are interested in joining the tech industry or new hires,” Lee says. “We covered a wide range of topics, from how to use LinkedIn to what to expect when you work as a junior software developer. It must have been a fruitful experience for people who wanted to learn more about the industry.” Kim adds that the event was suitable for people from diverse career backgrounds to gather and exchange their knowledge.
“As an organiser of WWCS, It feels amazing to share what I know with people who want to learn more about tech,” Lee says.
“It’s Okay to Have Courage”
Two women say entering the tech industry does not require a particular qualification from anyone. Their age, previous experiences, and backgrounds don’t matter to start the grand expedition to a new career path. But what they do need is “courage”.
Lee says she has met many people, “especially women”, who feel unconfident when they cannot satisfy all qualifications written on job descriptions of positions they want.
“They sometimes don’t apply for the positions because they think they are less competent than those who qualify all the values in the descriptions – but they should. There’s nothing to lose from applying for a job,” she says. “People say that the tech industry’s entry barrier is too high for those who don’t know about the industry that well. However, I think even the workers now had joined without a full understanding of what they have signed up for.”
Kim agrees that aspiring tech workers would have to study hard, but their efforts can be rewarded in the end. “When it is their first time studying tech, of course, there comes the point where they feel frustrated by what they don’t know,” Kim says. “But someday, there will be rewards, like a new job or a promotion.
“I want everyone to have courage and carry on with their dreams,” she says.
KUALA LUMPUR (Reuters) – Four Malaysian mobile operators said on Monday they had agreed to use the government’s state-owned 5G network, paving the way for 5G services to be rolled out to customers after months of delayed talks.
Malaysia’s 5G plans had been repeatedly set back since last year amid an impasse between the government and major carriers over pricing and transparency, including concern that a sole state-run network would result in a nationalised monopoly.
The government has said a single shared network would reduce costs, improve efficiency and speed up infrastructure works.
Celcom Axiata, DiGi Telecommunications, Telekom Malaysia and U Mobile said on Monday they had signed agreements to access the 5G network run by state agency Digital Nasional Berhad (DNB) for 10 years.
In its statement, U Mobile said it would begin making 5G services commercially available to its customers from Thursday.
DiGi said the access agreement incorporated “improvements to a few key terms” in the government’s “reference access offer” (RAO) – a document published earlier this year setting out pricing, service commitments, and other details of DNB’s wholesale 5G model.
Logo of U Mobile, Malaysian mobile carrier, is displayed at a monorail station in Kuala Lumpur, Malaysia, September 26, 2022. REUTERS/Hasnoor Hussain
The updated RAO was expected to be published upon approval by Malaysia’s communications regulator, DiGi said.
A fifth operator, Maxis Bhd , said it was still assessing the governance requirements for the access agreement.
Maxis, Celcom, DiGi and U Mobile – the country’s four major telco firms – had earlier requested the government review the RAO, describing its pricing model as “not commercially viable”, Reuters had reported in May.
The signing of the access agreements comes after Celcom, DiGi, Telekom and a fourth firm YTL Communications – agreed to take up a collective 65% stake in DNB this month.
U Mobile and Maxis declined to take up equity after the government declined their proposal for a majority stake.
BENGALURU (Reuters) – The Reserve Bank of India (RBI) will launch the pilot for a central-bank-backed digital rupee for the wholesale segment on Nov. 1, it said on Monday, identifying nine banks, including top lender State Bank of India, to participate in the project.
The pilot’s use case will be to settle secondary market transactions in government securities, with the e-rupee expected to make the interbank market more efficient, the RBI said in a statement.
Settlements in central bank digital currency would reduce transaction costs, the RBI added.
Digital Rupee: Pros and Cons
Besides SBI, the pilot will include Bank of Baroda, Union Bank of India, HDFC Bank, ICICI Bank, Kotak Mahindra Bank, Yes Bank, IDFC First Bank and HSBC, the RBI said.
The launch of the e-rupee for the retail segment is planned within a month in select locations, the RBI added.
The RBI has been exploring the pros and cons of a central bank digital currency for some time and is working towards a strategy to implement it in a phased manner, it said earlier this month.
The central bank’s plans for a currency in digital form comes amid its staunch opposition of cryptocurrencies.
BEIJING (Reuters) – China on Monday launched the last of the three modules that will comprise its space station, set to be the second permanently inhabited outpost in low-earth orbit after the NASA-led International Space Station.
The uncrewed Mengtian, or “Dreaming of the Heavens“, module was launched atop China’s most powerful rocket, the Long March 5B, at 3:37 p.m. (0737 GMT) from the Wenchang Space Launch Centre in the southern island province of Hainan.
In April 2021, China began construction of its space station with the launch of the Tianhe module, the main living quarters for astronauts. In July this year it launched Wentian, or “Quest for the Heavens”, a laboratory module where scientific experiments will be performed.
The 23-tonne Mengtian, also a laboratory module, is expected to dock with an axial port at one end of Tianhe later on Monday.
But the space station will only take on its final T-shape – with Tianhe as the core flanked by the two lab modules – when Mengtian is repositioned, while in orbit, to one of Tianhe’s radial ports on its side.
The completion of the Chinese space station, designed for a lifespan of at least 10 years, will be a milestone in China’s ambitions in low-rarth orbit, with NASA‘s aging ISS potentially ceasing operation by the end of the decade.
GROWING CLOUT
The Chinese-built “Celestial Palace”, as the space station is known at home, will also be an emblem of China’s growing clout and self-sufficiency in its space endeavours and a challenger to the United States in the domain, after being isolated from the ISS and other collaboration with NASA.
The space station also caps President Xi Jinping’s 10 years as leader of China’s ruling Communist Party.
During the station’s lifetime, China is planning more than 1,000 scientific experiments – from studying how plants adapt in space to how fluids behave in microgravity.
International demand for experiments to be conducted on the Chinese station will also rise if the ISS retires in the coming years. More than 3,000 science experiments have been performed aboard the ISS since November 2000.
China has approved at least nine proposals from scientists in countries ranging from Switzerland to India in the first batch of experiments in cooperation with the United Nations space office.
Russia’s space agency in August unveiled a physical model of a planned Russian-built space station, the final form of which would be years away.
Two more missions this year are needed before China’s station is ready for operation.
An automated cargo resupply vessel – the Tianzhou-5 – is expected to be launched in November, ahead of the arrival of three astronauts in December on the Shenzhou-15 spacecraft for long-term habitation on the space station.
China’s space programme has come far since late leader Mao Zedong lamented that the country could not even launch a potato into orbit.
China became the third country to put a man in space with its own rocket, in October 2003, following the former Soviet Union and the United States.
A blockchain-based games platform where players can do whatever they want, including jumping to another marketplace. This is the idea behind Infinity Games, an ecosystem created by a Serbian team that aims to offer a fun and convenient solution for players and developers. To find out more, we spoke to Ante Medic, the company’s co-founder.
Hello Ante, could you introduce yourself and Infinity Games: what is it about, and how and when did the idea that led to the company’s foundation come about?
I have a degree in computer science and have been working as a freelancer for more than ten years. I have been around blockchain since 2017, and in 2018 I created my first website in the blockchain niche. It was one of the first crypto airdrop portals. During that period, I examined more than 20 blockchain projects per day.
Soon after, I met Srdjan Vukmirovic, a full professor at the Faculty of Technical Science in Novi Sad. Srdjan also had an IT company. We very soon created our first blockchain project called Prometheus, a data aggregator for the blockchain. Recently, we pivoted it to the copyright NFT marketplace and got a grant for the Serbian Innovation Fond in cooperation with the EU.
One night, Srdjan and I talked and decided to create a blockchain game. I, as a gamer, was delighted and, the next day, came up with an idea for our first game Infinity Heros. It will be one of the blockchain’s most advanced tactical auto battlers.
Infinity Games were created with Srdjan as a founder and me as a co-founder. The easiest way to describe Infinity Games is as a combination of Unity store and Steam on the blockchain. Our idea was that players would like to play with their assets in different games, but their assets will keep the same feeling and look across all the games. We then realized that we wanted to create more than just a game; we needed a whole gaming ecosystem on the blockchain.
Ante Medic, co-founder Infinity Games
How many of you are in the company, and how do you divide the tasks?
Srdjan and I are more focused on securing the funding for the next stage. We are focusing on finishing the alpha of our first game. It should be ready for December 2022. Currently, we have in total seven developers and game designers.
You are beginning a long and ambitious journey: how do you plan to make yourself known and spread the Infy ecosystem?
We have strong connections in the blockchain space. That will surely ease the process of establishing Infinity Games on the market. But, we are starting from the basics, solid foundations. There needs to be more quality and enjoyable games on the blockchain. We want to create a quality and fun game with the blockchain component as an additional new feature.
Similar is with the ecosystem. We want to create an ecosystem that will mostly, at first, benefit indy studios. We can build on that to create an entirely new game development environment using the blockchain component.
The Infinity Games project is based on blockchain: why this choice, and what advantages does it bring you and the users?
Blockchain is such a simple yet astonishing and wonderful technology. Today, in the Web3 environment, users are in control of their data for the first time. That means big Internet corporations and game publishers are not keen to implement this new technology. While selling your data or users’ gaming assets, they are making all the profits.
In the Web3 economy, things are working differently. Users will decide if they want to sell their data or for what purposes it can be used. With gaming assets, users will see how rare some item is. Or they can re-sell it, gift it or borrow it from someone.
The last one is the crucial part of the games in our ecosystem. Users will be able to do with their assets as they wish. They can use it on our marketplace or a 3rd party marketplace.
Infinity Heroes
Talking about the players: how do you plan to convince them to opt for Infinity Heroes and your other future games in a landscape that is filling up with alternatives?
Our paradigm is that games should be fun and that players, first and foremost, have to enjoy them. Otherwise, they are not playing the games but at a job of grinding the games. Players earn by winning the assets and developing them. My philosophy is that earning is a byproduct of a healthy gaming ecosystem.
Infinity Games will have its INFY token for logistical support of the whole ecosystem. Its primary role is to power the ecosystem by servicing the logistical support to onboarding gaming studios and awarding the community for supporting the network with the Infinity Nodes. It will be the primary currency across our whole ecosystem and in our marketplace.
In the end, play to earn rewards is also planned, especially for our first game Infinity Heroes, and to be at the disposal of new games in the ecosystem. But, the future community will decide if the new gaming studios applying for the entering ecosystem have a good business model through DAO.
Let’s move on to game developers. I read that you will offer them funding: what modalities have you established?
We are not only offering them funding but full logistical support. Those gaming studios that join our ecosystem will get all 3D models and libraries in the ecosystem. Also, they will need to provide their created assets to the participants in the ecosystem. Our main goal with this model is that all assets (NFTs) in the ecosystem have the same or similar look.
We will also provide publishing for the studios that join our ecosystem. We must mention that we provide them with an already established player base. And in the end, we will provide them with funding in the form of an INFY token. But, it is important to mention that they need a good game and a solid business plan because the community (DAO) will decide if they will be accepted into the Infinity Games ecosystem.
Also, we are creating the SDK, so studios can use our assets without joining our ecosystem. But in that case, they will need to pay a fee for using them and will not have the benefits mentioned above.
Infinity Games
In your litepaper, you write: “Infinity Games metaverse will be an ever-growing metaverse with which users can connect and identify.” Can you explain the point further?
With NFTs, we have a premise that anybody can use the data stored on the blockchain and, in this case, build games around it. But, on the blockchain, only metadata is stored. Independent studios don’t have 3D (or 2D) models for those assets.
What we are creating is that we want all assets across all games in our ecosystem to have a similar look. Players will then identify and familiarize themselves with assets they own, which they can use in multiple games.
Our premise is that with independent studios building various games around assets from our ecosystem, we will have an organically growing metaverse connected with all games in our ecosystem. In the end, limitations are the creativity of the gaming studios, and the DAO will govern all.
Is there someone or something that inspired you to develop Infinity Games?
Yes, of course. Gala Games and Vulcan Forged are good examples of excellent gaming blockchain ecosystems. But they both need the feature that other gaming studios can use their assets and participate in creating a connected and significant metaverse.
The lack of that feature inspired us to create an ecosystem where the new concept of developing games will lead to the possibility of developing an ever-growing metaverse.
You have the support of the Serbian government. Still, you are looking for investors: Have you received any expressions of interest from anyone?
We are very proud that we have support from the Serbian government. It allows us to fully concentrate on developing the Infinity Games ecosystem and Infinity Heroes game.
But, we are open to private investments also, and we have an exciting development in that field. I cannot discuss them now, but we will announce them on our social media as soon as the deals are closed.
Infinity Games is a wide-ranging project which needs patience, money, and perseverance: when do you expect to start recording revenues?
We plan to finish the alpha version of the Infinity Heroes game in December 2022. The alpha version of the portal for the gaming studios will be completed in Q1 2023. The platform will go live in Q3 2023, and that is when we are expecting the first revenue
SYDNEY (Reuters) – Hackers have targeted a communications platform used by Australian military personnel and defence staff with a ransomware attack, authorities said on Monday, as the country battles a recent spike in cyberattacks across businesses.
The ForceNet service, one of the external providers that the defence department contracts to run one of its websites, has come under attack but so far no data have been compromised, Assistant Minister For Defence Matt Thistlethwaite said.
“I want to stress that this isn’t an attack or a breach on defence (technology) systems and entities,” Thistlethwaite told ABC Radio. “At this stage, there is no evidence that the data set has been breached, that’s the data that this company holds on behalf of defence”.
But some private information such as dates of birth and enlistment details of military personnel may have been stolen, the Australian Broadcasting Corp reported, citing an unidentified source with knowledge of the investigation.
Thistlethwaite said the government will view the incident “very seriously” and all defence personnel have been notified, with suggestions to consider changing their passwords.
Ransomware hackers hit Australia’s biggest companies
A Defence department spokesperson told Reuters in an emailed statement the department was examining the contents of the impacted data set and what personal information it contained.
Ransom software works by encrypting victims’ data and hackers typically will offer the victim a key in return for cryptocurrency payments that can run into the hundreds of thousands or even millions of dollars.
Some of Australia’s biggest companies, including No. 2 telecoms company Optus, owned by Singapore Telecommunications Ltd, and the country’s biggest health insurer, Medibank Private Ltd, have had data hacked recently, likely exposing the details of millions of customers.
Technology experts said the country has become a target for cyber attacks just as a skills shortage leaves an understaffed, overworked cybersecurity workforce ill-equipped to stop it.
SAO PAULO (Reuters) – Human rights groups and researchers have raised concerns in Brazil that social media platforms are failing to effectively police disinformation ahead of a highly polarized presidential vote on Sunday.
Brazil’s Superior Electoral Court (TSE) bolstered measures this month to tackle disinformation around the election, especially on video sharing platforms. Sunday’s runoff vote pits far-right President Jair Bolsonaro against leftist former President Luiz Inacio Lula da Silva.
Groups that monitor the online spaces told Reuters that tech companies are still struggling to follow through on agreements they signed with the TSE in February, in which they promised to combat material that could undermine the democratic process.
The TSE did not respond to a request for comment.
“Social media platforms are failing Brazil’s voters,” said Deborah Brown, a senior researcher on digital rights at Human Rights Watch, who called the platforms and messaging apps “extremely important” spaces for electoral debate.
“That space has been riddled with electoral disinformation, such as baseless allegations of electoral fraud,” she said.
Social Media Platforms
Bolsonaro, who is narrowly trailing Lula in recent opinion polls, has repeatedly criticized the country’s electronic voting machines for allegedly being vulnerable to fraud, without providing evidence, raising concerns that he might not concede defeat if he loses.
Jon Lloyd, senior advisor at UK-based Global Witness, said the platforms have “many correct policies” in place to combat disinformation but “the enforcement is really lacking.”
“They’re not actually following through on what their policies say and that’s a big concern,” he said.
Online disinformation has intensified since Brazil’s first round of voting on Oct. 2, according to Philip Friedrich, a senior research analyst for technology and elections at Freedom House.
“Social media companies bear some responsibility for the country being on tenterhooks about this year’s election,” Friedrich said. “While major social media companies like Twitter and Meta released statements about their preparations before the first round of voting, we’ve seen few updates about how they are responding to shifts in disinformation.”
An explosion of video-based platforms has also added to the difficulty of fighting disinformation compared to past elections, said Brazil researcher Rosana Pinheiro-Machado at Dublin’s University College.
“The last election was the election of WhatsApp. This is the election of Tiktok and Instagram,” she said.
TikTok said in a statement to Reuters “we take our responsibility to protect the integrity of our platform and elections with utmost seriousness.”
A spokesperson for Meta Platforms Inc, parent company of Facebook, Instagram and WhatsApp, said: “We’ve prepared extensively for the 2022 election in Brazil,” adding that around 30 million people in Brazil have clicked on the electoral label on Facebook and have been directed to the TSE’s website.
Twitter and YouTube, which is owned by Google parent Alphabet, did not immediately respond to requests for comment.
SHANGHAI (Reuters) – China Star Market: China’s Nasdaq-style STAR Market will officially launch market making on Monday, in a bid to make the tech-focused board more liquid, vibrant and resilient, the Shanghai Stock Exchange said.
The first batch of qualified market markers on STAR will start trading next week, which will cut investors’ trading cost, and improve pricing efficiency, the bourse said in a statement on its website.
REUTERS/Stringer
The STAR Market, home to some of China’s biggest chipmakers, biotech companies and high-end manufactures, is tasked with funding Beijing’s tech innovation amid growing Sino-U.S. rivalry.
The Shanghai Stock Exchange said it will continue to improve market mechanisms to help China achieve tech independency and self-sufficiency.
Regulators have approved 14 brokerages as the first batch of market makers, which actively quote in stocks, providing liquidity and depth to the market.
They include Industrial Securities, Guotai Junan Securities and Sinolink Securities.
Cyber Halloween is just around the corner, and you can already sense the spookiness in the air. But this month is not all about Halloween, tricks, and treats; it is also about cybersecurity awareness. Most people might think, what do Halloween and Cybersecurity have in common? Halloween is all about scary stories, and we can all agree that all hacking stories we have heard so far are more than terrifying. The sole factor that makes this case so frightening is that all of them are real and could be happening to us.
The number of cyber-attacks, especially ransomware attacks, has increased enormously, and it seems that these numbers are only going up. All the statistics for the first two quarters of this year are in scary numbers. We are now numbering over 9.1 million data breaches experienced by internet users worldwide. And during the spooky season of October, the number tends to go a little higher. Since this is a time when e-commerce has a bounce in sales, and all users refer to online websites, the risk of getting exposed to such danger increases highly. We could be facing data breaches, information system corruption, and even business interruption. Unfortunately, these attacks and more are widespread, and the possibility of them happening to us is pretty strong.
The scary tales from past Halloweens – How scary can it get?
The frightening truth is that data breaches are widespread and happen to companies of all sizes. In the last year, many major brands have experienced their scary security crisis’, including LinkedIn, T-Mobile, and Audi. For example, last year, on June 2021, more than 700 million user data were breached from LinkedIn and exposed on the dark web by a user called the God User, who even bragged about the data exposure.
But data breaches are not the only thing to watch out for; during this time, organizations and companies need to be on alert. A cyber attack that happened a year ago during Halloween was a ransomware attack that targeted a candy factory. Candy is one of the main treats circulating during Halloween; the industry pulls in a whopping $4.6 billion of its $36 billion in yearly sales. And, of course, the perfect time to get hit by ransomware would be during the Halloween season. The Ferrara Candy Co, based in Chicago, was the victim of this fatal attack a year ago, which led to production disruption that resulted in a significant shortage of classic candies. Fortunately, Ferrara says that most of its Halloween shipments had already been sent out before the incident.
top 3 security trends. Credits to FinancesOnline
Tricking the attackers by having an excellent cyber defensive treat
With an increase in cyber-attackers seeking to penetrate secure networks through “backdoors,” it is essential that organizations continue to add to their cybersecurity arsenal. A comprehensive cybersecurity defense should include prevention techniques, visibility, and early detection. Here are some sweet suggestions from us to not get tricked during this year’s Halloween season.
A multi-layered cyber security strategy is critical. Multi-factor authentication is a fa-boo-lous way to add an extra layer of protection to your passwords. This means that, even if cyber criminals do obtain your login details, they cannot log in to your accounts without another means of verification. Adding more security layers will help confirm a person’s identity and keep the blood-sucking hackers out.
Password managing. There are a lot of password-managing tools out there (some of them for free) that do a great job at managing our multiple passwords and encrypting them to keep them safe from hackers’ intentions. Once you’ve set up your account with a password manager, you’ll be able to log in to all your other accounts automatically without needing to remember each password. This enables you to create long, complex passwords without worrying about forgetting them.
Nonstop monitoring, even outside your perimeter. What I mean by this is always to look at what is going on in dark or underground communities, such as the dark web. Dark web monitoring means continually searching the dark web to be on the lookout for any of your details or sensitive data getting exposed since they can be sold to cyber criminals who can use them maliciously to launch a cyber-attack.
You are preparing for the ‘battle.’ One of the most significant weaknesses in a business is often the naivety of its employees. Suppose your team needs to identify a security risk quickly. In that case, they could end up putting your passwords, sensitive data, and business at risk. Cyber awareness training should be a periodic event, not only for the season holiday. By doing cyber awareness training, you can teach employees how to identify and combat security threats.
So overall, it shouldn’t come as a surprise that cyber criminals will increase their level of attacks. Hackers spend this time snooping around the victim’s network, looking for sensitive information to snatch or other vulnerable systems to compromise. Months can sometimes occur between the initial breach and the launch of a full-blown attack. What we have to do is to be prepared to face these attacks coming our way. This year don’t just dress up and get ready to party or go for treats, but also wear your amour of knowledge and protect yourself from any cyber risks and attacks that may lurk their way in your direction.
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.