• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Skip to footer
  • Articles
  • News
  • Events
  • Advertize
  • Jobs
  • Courses
  • Contact
  • (0)
  • LoginRegister
    • Facebook
    • LinkedIn
    • RSS
      Articles
      News
      Events
      Job Posts
    • Twitter
Datafloq

Datafloq

Data and Technology Insights

  • Categories
    • Big Data
    • Blockchain
    • Cloud
    • Internet Of Things
    • Metaverse
    • Robotics
    • Cybersecurity
    • Startups
    • Strategy
    • Technical
  • Big Data
  • Blockchain
  • Cloud
  • Metaverse
  • Internet Of Things
  • Robotics
  • Cybersecurity
  • Startups
  • Strategy
  • Technical

The New Mob is on the Internet

Andrew Heikkila / 5 min read.
December 28, 2018
Datafloq AI Score
×

Datafloq AI Score: 84

Datafloq enables anyone to contribute articles, but we value high-quality content. This means that we do not accept SEO link building content, spammy articles, clickbait, articles written by bots and especially not misinformation. Therefore, we have developed an AI, built using multiple built open-source and proprietary tools to instantly define whether an article is written by a human or a bot and determine the level of bias, objectivity, whether it is fact-based or not, sentiment and overall quality.

Articles published on Datafloq need to have a minimum AI score of 60% and we provide this graph to give more detailed information on how we rate this article. Please note that this is a work in progress and if you have any suggestions, feel free to contact us.

floq.to/KR8bE

According to the Secureworks State of Cybercrime Report 2018, the bulk of cybercrime-related damage around the globe is perpetrated by a small group of well-organized, dangerous, and covert criminal groups. What’s worse, the report shows that the boundary between a nation-state and cybercriminal actors is becoming increasingly blurred as the former learns about the tools and techniques employed by the latter and vice/versa.

The report shows that these groups are avoiding the dark web where at all possible to evade detection by threat research and government law enforcement groups, employing highly sophisticated tactics such as social engineering and ransomware. As we move forward into 2019, these threats will likely only become more advanced and harder to detect, requiring authorities and private citizens alike to invest in heightened protection, training, and deterrences.

Blurring the Lines

When it comes to cybercrime and terrorism, the reports show that criminals are typically more common. Norwich University’s online resources illuminate the overall breakdown: 67 percent cybercrime, 20.8 percent hacktivism, 9.8 percent espionage, and 2.4 percent warfare.

In other words, they write, civilians and professional or personal computers are the most likely targets, not national systems.

Nevertheless, these groups are hitting state systems, as illustrated via the hack that crippled the city of Atlanta’s infrastructure in March of 2018, incurring costs of over $2.7 million. This attack was carried out by the SamSam group, one of the most successful ransomware crime rings, which is believed to have extorted more than $1 million from some 30 target organizations in 2018 alone, according to WSJ.

The problem is, unfortunately, that we can’t attribute many of the hacks that we’ve seen definitively to cybercriminals over nation-state hackers because, as the Cybercrime Reports shows, they are using many of the same techniques, mirroring each others’ tactics. This is the case with another major hack that affected millions of Americans the Equifax hack of 2017.

Michael Riley, Jordan Robertson, and Anita Sharpe, writing for Bloomberg Businessweek, report that experts looking at monumental breaches noticed many of the tools used by the perpetrators were Chinese. Concerning the experts, these people say the Equifax breach has the hallmarks of similar intrusions in recent years at giant health insurer Anthem Inc. and the U.S. Office of Personnel Management; both were ultimately attributed to hackers working for Chinese intelligence, they write.

Evolution of Tactics: Database Hacks, Ransomware, Social Engineering

This rise in cybercrime shouldn’t necessarily surprise us. Where there are valuables, there will always be thieves, and we’ve seen information breaches slowly rise in frequency and severity since the early 2010s, particularly in healthcare.

Since the switch over to Electronic Health Records (EHR), and the apparent lacking of security surrounding this switch, the healthcare field has been a ripe and frequent target for cybercriminals. According to Duquesne University, the healthcare system in the United States generated up to 150 exabytes of data in 2011.

This explosion of information proliferation progressed to include credit card information and its storage, which has been equally as abysmal in terms of security. Major breaches as recent as 2018 have included major brands:


Interested in what the future will bring? Download our 2023 Technology Trends eBook for free.

Consent

Uber attempted to conceal a breach of 57 million users by a 20-year-old hacker, while Whole Foods confirmed 117 store locations had credit card information stolen, writes Cole Mayer with Fiscal Tiger.

Beyond healthcare and credit card data, criminals have been adapting by stealing and holding critical systems hostage with Ransomware the same type of malware used to attack the city of Atlanta. Fortunately, more companies are catching on to this trend and employing advanced record backup and encryption programs.

Of course, in response, cybercriminals have adapted and adopted more effective and advanced tactics.

That is why most cyber-criminals go “spear-phishing” instead, according to BusinessInsider. This involves targeting a low-level individual in an organisation using an e-mail scam that fools the hapless individual into visiting a tainted website. Once there, a malicious tag in the HTML code responsible for the page’s appearance is injected into the visitor’s browser. The inserted malware can be a virus, a Trojan or, most likely, a key-logger. This watches for the user’s log on and password and reports the keystrokes back to the attackers. It is then only a short step to stealing secrets from the victim’s employer.


The Future of Cybersecurity

This game of escalation means that cybersecurity experts need to be on top of their game, and ready to combat the threats of the future. Forbes published an answer from Quora, the question originally being: What will cybersecurity look like ten years from now?

First, we will need to interconnect our defense systems to be able to act in real time, writes the poster. For example, our network gateway will need to share information with our personal devices. Second, the human analyst will not be able to cope with all this information, and we will rely on more artificial intelligence to help us in making decisions. We will also need to cultivate the next generation of cyber experts who know how to develop and drive those systems. New professions and domain expertise will be formed. Last but not least, we will need to shield all our systems.

Utilizing AI via interconnected systems, and training enough people to wield this technology seem to be the two major problems that we currently face. The good news is that AI is already being employed by multinational corporations and small businesses alike, while cybersecurity and data are extremely hot fields in the jobs market right now.

We only stand a chance against the consistent onslaught, however, as long as we keep paying attention to the cybersecurity landscape and continue to understand what’s at stake. Hopefully, we won’t need more reports linking cybercrime to nation-state techniques, and vice/versa, to mobilize and shore up our infrastructure.

In this game, the reactive party loses. We need to get ahead of the game and start fighting back harder than we ever have before.

Categories: Cybersecurity
Tags: big data security, cyber, EHR, hackers, hacking

About Andrew Heikkila

I'm a Big Data, IoT nerd who is also a performing artist out of Boise, ID. I started working in IT while I was attending College of Idaho '08 to '12 and then moved into web development and social/internet marketing and blogging shortly after. After ghost-writing a couple of whitepapers on data warehouse management software, I slowly but surely found myself increasingly interested in Big Data and Analytics and how it's seeping into basically every aspect of our lives. This opens up a whole new world of possibilities--both good and bad. I'm here to write about them. Follow me on Twitter @AndyO_TheHammer

Primary Sidebar

E-mail Newsletter

Sign up to receive email updates daily and to hear what's going on with us!

Publish
AN Article
Submit
a press release
List
AN Event
Create
A Job Post
Host your website with Managed WordPress for $1.00/mo with GoDaddy!

Related Articles

The Advantages of IT Staff Augmentation Over Traditional Hiring

May 4, 2023 By Mukesh Ram

The State of Digital Asset Management in 2023

May 3, 2023 By pimcoremkt

Test Data Management – Implementation Challenges and Tools Available

May 1, 2023 By yash.mehta262

Related Jobs

  • Software Engineer | South Yorkshire, GB - February 07, 2023
  • Software Engineer with C# .net Investment House | London, GB - February 07, 2023
  • Senior Java Developer | London, GB - February 07, 2023
  • Software Engineer – Growing Digital Media Company | London, GB - February 07, 2023
  • LBG Returners – Senior Data Analyst | Chester Moor, GB - February 07, 2023
More Jobs

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto customers Data design development digital environment experience future Google+ government information learning machine learning market mobile Musk news Other public research sales security share social social media software strategy technology twitter

Related Events

  • 6th Middle East Banking AI & Analytics Summit 2023 | Riyadh, Saudi Arabia - May 10, 2023
  • Data Science Salon NYC: AI & Machine Learning in Finance & Technology | The Theater Center - December 7, 2022
  • Big Data LDN 2023 | Olympia London - September 20, 2023
More events

Related Online Courses

  • Oracle Cloud Data Management Foundations Workshop
  • Data Science at Scale
  • Statistics with Python
More courses

Footer


Datafloq is the one-stop source for big data, blockchain and artificial intelligence. We offer information, insights and opportunities to drive innovation with emerging technologies.

  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Recent

  • 5 Reasons Why Modern Data Integration Gives You a Competitive Advantage
  • 5 Most Common Database Structures for Small Businesses
  • 6 Ways to Reduce IT Costs Through Observability
  • How is Big Data Analytics Used in Business? These 5 Use Cases Share Valuable Insights
  • How Realistic Are Self-Driving Cars?

Search

Tags

AI Amazon analysis analytics app application Artificial Intelligence BI Big Data business China Cloud Companies company costs crypto customers Data design development digital environment experience future Google+ government information learning machine learning market mobile Musk news Other public research sales security share social social media software strategy technology twitter

Copyright © 2023 Datafloq
HTML Sitemap| Privacy| Terms| Cookies

  • Facebook
  • Twitter
  • LinkedIn
  • WhatsApp

In order to optimize the website and to continuously improve Datafloq, we use cookies. For more information click here.

Dear visitor,
Thank you for visiting Datafloq. If you find our content interesting, please subscribe to our weekly newsletter:

Did you know that you can publish job posts for free on Datafloq? You can start immediately and find the best candidates for free! Click here to get started.

Not Now Subscribe

Thanks for visiting Datafloq
If you enjoyed our content on emerging technologies, why not subscribe to our weekly newsletter to receive the latest news straight into your mailbox?

Subscribe

No thanks

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.

Marketing cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.

Please enable Strictly Necessary Cookies first so that we can save your preferences!