Connect with us

Features

Email Security – Paladion’s Approach

Published

on

Email phishing and business email compromises (also known as BEC or CEO fraud) are among the biggest challenges that organizations are facing in 2018. A phishing email contains one or more bad URLs or bad attachments and targets many individuals at the same time. A BEC attack usually targets one highly-placed individual and uses high level sophisticated social engineering.

BEC / CEO Impersonation Attacks 
In BEC or CEO fraud, hackers craft emails to impersonate specific senior management executives, vendors, or suppliers to trick the recipients into transferring money or providing sensitive information to the hackers. The attackers first do their research on their targets via LinkedIn and other social media. The specially prepared emails may also contain attachments with hacker tools like keyloggers and mouse event trackers for installation on a victim’s PC or mobile device.

The skillful personalization of the email content by attackers serves two purposes. First, it helps the email to pass through spam filters and other checks for undesirable emails. Second, it persuades the victim that the sender is somebody that the victim knows and trusts. For example, a CFO might be convinced that a fake email for an urgent funds transfer was sent personally by the CEO. Attackers also time their attacks to coincide with absences or business trips of the purported sender, making it difficult for the recipient to double check that the email is authentic.

Paladion’s Approach to Email Security

There are several best practices that when used together can be effective in containing the problem and that we have listed below.

Tighten Email Security Configuration
Implement SPF, DKIM, DMARC: Sender Policy Framework (SPF) restricts emailing to a list of servers allowed to send email for a given domain. DomainKeys Identified Mail (DKIM) is used to verify that emails have not be changed after leaving the originating server. With Domain-based Message Authentication, Reporting and Conformance (DMARC), an enterprise defines a policy for using SPF and DKIM, together with the reporting of email statistics for conformance.

Open relay prevention: Also called an insecure relay, an open relay is an email server that relays emails from a third party. Spammers can locate such open relays relatively easily. They can then use them to send large amounts of junk mail (or worse).

Multi factor authentication (or 2FA) for all users: When a BEC attack involves an attacker accessing an executive’s email account, making MFA a security policy will make such illicit access more difficult. For example, two-factor authentication or 2FA may consist of account credentials (only the account owner should know these), plus a code sent to the account owner’s mobile phone (only the account owner has this phone).

Subscribe to TI feeds to filter out emails at entry point: Threat Intelligence feeds can list compromised domains. Filtering rules based on this information can reduce the amount of email attacks, although very recently registered or compromised domains may not always feature in the latest TI feed.

Subscribe to Advanced Malware Protection modules: Advanced malware protection goes beyond simple signature matching to perform other inspection and analysis, such as checks for malicious dormant and dynamic code that might otherwise be missed.

Anti-spam filters for bad file types: A classic example of a risky file type is “.exe”, the file type of an application. Microsoft Office file types may also be blocked or flagged upon reception, as MS Word, Excel and other Office documents may contain malicious macros or scripts.

Monitor Your Emails Wisely

Filtering based on location, subject, sender: There are two basic choices: keep known offenders out (blacklisting); or only let approved senders in (whitelisting). Each choice has its pros and cons.

Bad attachment found based on hashes: Attachment file names can be changed at will and tell-tale file types can be hidden behind others. On the other hand, the hash of the file content allows immediate checking against a list of hashes of files of known hacker tools and applications.

Special focus on spam emails received by VIP or high-risk members: So-called whaling attacks can be harder to detect, as they rely more on social engineering and less on malware. VIP awareness training should also be mandatory.

Correlate email threats with other cases like brute force and failed logins: Remember that attackers can use several attack methods. If you detect a phishing campaign, check other attack surfaces and vulnerabilities that may be threatened at the same time.

Consider Additional Security Controls

User awareness trainings: Employees are often the weakest link in information security and enterprise security policies alone are not enough. Employee behavior must change and proper awareness training helps them develop good security habits.

Similar domains registered like yours: Machines are excellent at picking out the smallest differences, but human beings are less so. Use awareness training to demonstrate how even small differences of a letter or two in a domain name can indicate hackers at work and threats of email compromise. (Domain Typosquatting is where an attacker registers a similar sounding domain to yours and uses it for trapping victims. Register your domain records for people to identify the genuine domains and initiate take down services for Typosquatted Domains that have been proven to cause an attack impacting you or your users.)

Social Engineering exercise: Everybody needs to do this. Make sure that VIPs and other employees do not fall for fake URLs or malicious attachments, and that all departments follow a strict policy of checking email requests for fund transfers or for sensitive information via another channel (face to face or phone, for example).

Consider advanced email solutions with email inspection capabilities: Good inspection capabilities can help stop or contain email attacks and campaigns, identify known and unknown malwares in email attachments, and detect data exfiltration via emails.

Email attacks can be very lucrative for hackers when they scam top executives or people working directly for them. With so much information available today on social media and elsewhere, hackers can often piece together the data they need to make a business email compromise attack look like an authentic everyday operation to its targets. By applying the practices described above, you will at least be able to significantly reduce the risk of such an attack succeeding on your enterprise or organization.

By Prashant Verma, AVP, MDR – IR & Forensics at Paladion

Continue Reading

Features

Cash and Its Persistent Meaning

Published

on

digital payments

Authored by: Konstantin Vladimirovich Tserazov

In recent years, the global shift towards digital payments has been evident. More countries are witnessing a decline in cash transactions, with Gulf countries upholding this trend. By the end of this year, over half of all financial interactions in this region are expected to be cashless. Despite this tendency, cash remains in the pockets of millions of people, and this phenomenon can’t be ignored.

The Evolution of Money

Before money existed, bartering was used, but it was inefficient. As a result, mediums of exchange were created, beginning with items like shells, which later developed into metals, coins, and eventually banknotes. While this shift towards digital payments offers convenience and efficiency, it also creates challenges for certain groups in any society, such as the elderly, minors, and individuals with disabilities. Even in the face of digitalization, cash remains important for those who cannot access banking services, such as temporary migrants. Unfortunately, these groups face a risk of digital exclusion.

The Cash Dilemma

In some countries, the demand for cash increases even as cash payments decline. This can be explained by the fact that cash is used sometimes as a preferred savings method, especially during times of crisis.

The push towards cashless and digital payments is driving a reduction in physical bank branches, encouraging the transition to digital money.

However, this transition faces several obstacles:

  • High Cost of Smartphones: Not everyone can afford a smartphone, which is crucial for conducting digital transactions.
  • Unreliable Internet Access: Consistent Internet connectivity is necessary for digital payments, yet it is not universally accessible.
  • Challenges for Older Adults: Seniors may struggle to adapt to digital payment systems.
  • Fraud Risk: Ease of transfer increases fraud risk, especially for vulnerable groups.
  • No Local CBDCs: Many countries lack central bank digital currencies (CBDCs).
  • Unclear Crypto Laws: Cryptocurrency laws are often unclear or restrictive.

Cryptocurrency as a Potential Solution

Cryptocurrencies could potentially address some of these challenges, but it is essential to ensure that the development of CBDCs and the broader crypto ecosystem includes applications for the deaf, blind, or visually impaired, as well as individuals with developmental disabilities.

This area currently receives little attention in the crypto sphere but holds the potential for successful business models and innovative solutions for millions of people. Ultimately, these solutions will contribute to the adoption of digital means of financial interaction.

The Necessity of Digitization

The move towards digitization aligns with the Environmental, Social, and Governance (ESG) agenda for money emission. Managing cash incurs costs for the state, and a digital system should be significantly more efficient than handling physical cash, which requires transport and management. The marginal cost per transaction would be very low if the central bank provided a digital payment system.

Moreover, if CBDCs were interest-bearing, they could theoretically impact monetary policy quicker. This would make it more advantageous to hold money in CBDCs rather than cash, which does not generate income.

Digital Money as a Tool for Inflation Management

When high interest rates are necessary to curb inflation, digital money could become a silver bullet. The circulation of such financial instruments reduces business costs, allowing them to raise prices less.

In short, the distribution of CBDCs could be as effective a tool for central banks in managing inflation as increasing key interest rates and tightening reserve requirements for banking activities. Unlike cash, where it is unclear what goods are being purchased at any given moment, CBDCs provide for monetary policy makers transparency in transactions .

Why People Still Prefer Cash

Despite the advantages of digital payments, many people still prefer cash. This preference can be traced back to when dollars had guaranteed gold backing. When thinking about digital currencies and cryptocurrencies, some feel they are “somehow out of thin air,” not backed by anything.

In reality, current fiat currencies are also not backed by anything. However, cryptocurrencies like Bitcoin have a guaranteed reduction in the rate of issuance and a “cap” on the maximum number of units that can be issued, unlike any fiat currency.

The inflationary nature of fiat encourages even those who save in cash to spend it. If a person saves in Bitcoin, there are no such incentives; due to its deflationary model, there is a high likelihood of further increases in the value of such cryptocurrency relative to fiat money. This is precisely why the adoption of Bitcoin as a means of payment is stagnating — in El Salvador, for example, despite the ability to pay with Bitcoin in stores, there is no significant enthusiasm.

Another interesting point about why people prefer cash is the relative anonymity of spending. Additionally, there is the feeling of control. In some countries, there is a strong fear that hard-earned money in banks could disappear during a financial crisis. The Cypriot banking debacle of 2012-2013 serves as a chilling reminder. Billions of euros—a staggering €8 billion—were simply wiped out, leaving depositors high and dry. Fast forward a decade, and a glimmer of hope emerged: last year a Cypriot court ordered the government to make amends to one unlucky depositor. But whether this lone victory will set a precedent for broader compensation remains a major question mark.

The Convenience of Cash

There are many instances where, if you travel to another country, you can often pay with your home country’s bank card. However, the exchange rate is a significant question. Additionally, there are built-in fees. In some cases, carrying cash from your home country and exchanging it locally can be more beneficial than using a card or ATM.

Sure, digital payments are all the rage, but cash still holds its own. It’s secure and private and gives you a sense of control. If we go completely cashless, some people will get left behind. We need to embrace the new while still holding onto the old. That’s how we build a financial system that works for everyone.

Continue Reading

Features

Paving the Way for AI Success in Business

Published

on

AI in business

By Karim Azar, Regional Vice President – Middle East & Turkey, Cloudera

The digital landscape is evolving at an unprecedented pace, and at the heart of this evolution lies the transformative potential of artificial intelligence (AI). Across industries, AI is not merely a buzzword but a revolutionary force driving innovation, efficiency, and growth. Its impact extends beyond automation, touching every side of business operations and decision-making. It can revolutionize multiple sectors and fundamentally reshape the corporate industry.

Nonetheless, challenges arise with technological evolution, particularly in accessing and overseeing varied datasets across diverse environments. These challenges frequently act as obstacles to achieving successful AI implementation. In response to these challenges, the technology landscape is witnessing significant advancements in open data lakehouse technologies, providing a robust foundation for AI and analytics. Let’s delve into key technological developments and their advantages, focusing on the broader implications rather than specific products.

Unlocking Business Potential

AI has the potential to unleash new opportunities for businesses. McKinsey’s findings reveal that more than 62% of companies in the Gulf Cooperation Council (GCC) region currently utilize Generative AI in some operational aspect. The research underscores the substantial potential of AI to create tangible value in the GCC, with an estimated value of up to $150 billion.

This adoption trend is not without merit; statistics show that 83% of businesses adopting AI report substantial (30%) or moderate (53%) benefits. AI can address various challenges by providing predictive analytics and personalized customer experiences, enabling organizations to make faster and more accurate data-driven decisions.

Despite the obstacles in adopting AI, such as data management complexities and security concerns, offering air-gapped deployment for large language models (LLMs) is still a viable option. This feature boosts security, data privacy, and performance while also lowering customer operational expenses. However, overcoming these challenges requires more than just technological solutions. It demands a comprehensive approach that includes robust data governance frameworks, continuous employee training programs, and collaboration with regulatory bodies to ensure compliance with data protection laws.

AI Across Industries

AI is not a one-size-fits-all solution. It is applied differently across industries and business functions, including healthcare, finance, manufacturing, and retail. The potential uses of AI are vast, from boosting supply chain efficiency to transforming healthcare outcomes and customer service.

For example, in the healthcare industry, AI-powered predictive analytics can help doctors identify patients at high risk of developing certain diseases, allowing for early intervention and personalized treatment plans. AI algorithms can analyze market trends and financial customer behavior to recommend customized investment strategies. In manufacturing, AI-driven predictive maintenance can proactively anticipate equipment failures and schedule maintenance activities, minimizing downtime and reducing costs.

As businesses increasingly adopt AI, they invest in their organization’s future. By promoting innovation and agility, companies can leverage AI to maintain competitiveness in a digital era. Prioritizing data privacy and security helps build trust with customers and stakeholders, ensuring AI technologies’ responsible and ethical use.

AI is a significant transformation in how businesses function and innovate. Embracing AI opens up vast opportunities for organizations to reshape their operations, stimulate growth, and influence the future of business. While the journey may present challenges, the potential benefits are boundless for those willing to embrace the power of AI.

Continue Reading

Features

Smart Cities and the Rise of Intelligent Transportation Systems: Exploring the Benefits and Risks of Vehicle Surveillance

Published

on

By: Dr Ryad Soobhany, Associate Professor, School of Mathematical & Computer Sciences, Heriot-Watt University Dubai

Intelligent Transportation Systems (ITS) have emerged as a transformative solution in urban areas, tackling challenges such as high traffic and pollution. These systems, incorporating a network of static and mobile sensors, including cameras on buildings or vehicles/drones, embedded in the smart city infrastructure, are revolutionizing traffic management. By harnessing data from cameras, in-vehicle GPS systems, in-vehicle Near Field Communication (NFC), IoT devices, and Artificial Intelligence (AI), ITS enable the monitoring and tracking of vehicles for Intelligent Traffic Management Systems (ITMS) or Public Transportation Management Systems (PTMS).

While intelligent transportation systems offer significant benefits, it’s crucial to acknowledge the challenges and risks they pose. ITMS provides real-time monitoring of traffic on roads and at junctions, while PTMS focus on managing transportation fleet and passenger information services. Emergency Response Management Systems (ERMS) primarily monitor the emergency responders of the smart city. The use of intelligent vehicle surveillance systems improves traffic management, public safety, and urban planning, but it also raises concerns about the data privacy and security of users and infrastructure, a risk that must be carefully managed.

Benefits

There are several benefits from the implementation of vehicle surveillance systems in urban areas and the most obvious one is a better vehicle traffic flow by using ITMS. Cameras placed strategically across the city monitor traffic to identify congested areas and road traffic incidents (e.g. accidents). Implementing dynamic traffic lights systems at junctions and temporary speed limits can improve traffic flow. Using AI, predictive traffic routing forecasts traffic bottlenecks and suggests alternative routing.  The use of PTMS leads to enhanced scheduling of public transportation; for example, the arrival/departure of trains/metro at the station is synchronized to feeder buses or taxis being stationed outside the station. There is an improvement in customer satisfaction and journey planning with real-time updates for public transport. Traffic flow is also improved by monitoring of cycle and pedestrian lanes, where safer cycle lanes will encourage road users to adopt cycling in certain urban areas adapted for cycling.

There is an overall improvement in public safety by better traffic management, with better response time to emergency situations by the ERMS, such as ambulances. LPR/ANPR (Licence Plate Recognition/Automatic Number Plate Recognition systems and GPS tracking systems in cars allow the monitoring of vehicles while they are located withing the bounds of the smart city. Stolen or wanted vehicles can be detected and followed through the city. The use of surveillance cameras, LPR/ANPR systems and GPS tracking can improve identification of criminal activities, which should enhance the response of law enforcement. Under-Vehicle Surveillance Systems (UVSS), which are cameras placed at strategic places on roads in the city take pictures or videos of the underside of vehicles to check the chassis for stolen cars. UVSS can also be used to detect contraband at ports or entry/exit points in smart cities.

The use of LPR/ANPR systems ease the management of Low Emission zones, which are areas where low emission vehicles (e.g. electric or hybrid vehicles) can circulate without charges and vehicles with higher emission rates have to pay an hourly or daily charge. The implementation of Low Emission zones can bring environmental benefits. The improved traffic flow in the urban areas can also lead to environmental benefits with less emissions in traffic jams and long traffic queues at junctions. Apart from environmental benefits, there are economic benefits linked to better health and overall happiness of citizens and visitors.

Risks

Several risks are associated with the amount of data collected from the vehicle surveillance systems. The main concern is the privacy of the smart city’s car drivers and car owners. Vehicles and their drivers are tracked everywhere they travel around the city and the speed they travel. This can lead to tracking drivers and without proper legal frameworks, the data collected can be used to encroach on the users’ privacy. The large amount of collected and stored data can be quite attractive to cyber criminals and might lead to cyber-attacks. Any data breach from these attacks might expose the personal information of drivers and their vehicles. Cyber-criminals can target the surveillance systems, for example hacking the intelligent dynamic traffic speed system and changing the traffic speed around the city.

Having video surveillance around the urban areas recording the public can lead to ethical issues. Most of the time, drivers might not have provided informed consent to participate in the vehicle surveillance systems. The lack of consent from users can lead to non-compliance with regulatory bodies and can result in legal challenges from user groups. Users need to be made aware that they are entering a vehicle surveillance zone and their data might be recorded. Vehicle surveillance systems can be used to discriminate against certain sections of the community, for example, young drivers might be unfairly targeted by the vehicle surveillance systems because they allegedly drive fast and dangerously, which allegedly cause accidents. Any cyber security attack or data intrusion can lead to users losing trust in the vehicle surveillance system.

The use of vehicle surveillance systems can benefit smart cities and enhance the quality of life of residents and visitors, but the authorities must respect the personal privacy of the public by ensuring that data are collected and processed ethically and guarded against any cyber-attack. Security policies and mitigation plans are primordial for vehicle surveillance systems.

Continue Reading

Trending

Please enable JavaScript in your browser to complete this form.

Copyright © 2023 | The Integrator