• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Digital Fortress of Information

5G, Machine Learning & Artificial Intelligence

  • Home
  • AI
    • Artificial Intelligence in Telecom – From Hype to Reality – AI
    • AI vs. Human
    • Incredible Examples Of AI And Machine Learning In Practice
    • Must Have Marketing Skills to Survive in The Age of AI
  • 5G
    • What is 5G? The Ultimate Guide Available on Internet
    • 5 Reasons Why 5G is The Future
    • What is The Difference between 5G and 6G?
    • The Technology of The Year 2020 Will Be 5G
    • How Operators Should Expedite 5G Deployment
    • Evolution of 5G in Internet of Medical Things (IoMT)
    • 5G in South Asia: Opportunities & Challenges
    • Beamforming 5G – Mobile Radio With Pinpoint Accuracy
    • Scientists Warn of Health Risks From 5G
  • IoT
    • 5 Ways the IoT Can Change the Business World
    • IoT Data Security Issues Popped up in 2019
    • IoT Security Threats and How to Handle Them
    • Business Internet Of Things | IoT Applications 2019
  • ML
    • Future Technology Predictions 2020
    • Machine Learning Trend To Find Bugs
    • Secret Methods of Applying Text Analytics ( AI and Machine Learning Application )
    • The Present And Future of Machine Learning on Devices
  • Technology
    • Cloud Computing
      • What is Cloud Computing? Explained With Examples!
      • Blade Shadow Cloud Gaming Review
    • AMD
      • AMD Ryzen 9 3900X Stress Test Results – Incredible Performance Show
      • Why AMD Makes Less Sales and Profits in Q2 FY 2019
    • Cyber Security
      • 2019 Onward: Everyday Is Information Cyber Security Day
      • Russian Security Researcher Accessed Xiaomi Furry Tail Pet Smart Feeder
      • FaceApp Aging Challenge: Is FaceApp A Danger To Our Privacy?
    • Tech Business
      • 2 Steps to Ensuring Project Success
      • Public Sector vs Private Sector For IT Professional in EU
      • Healthy Employees Manage Digital Transformation Better
      • How to Protect Production Facilities Effectively in 2020
      • Great Example of Socially Responsible Business
      • Great Example of Socially Responsible Business
    • Tech Facts
      • Cutting Edge Technologies That Will Change Marketing Industry Forever
      • This is How Phone Phishing Scams Try To Fool You
      • Google is Buying Fitbit: Now What?
      • Healthy Employees Manage Digital Transformation Better
      • Privacy and Security is in WhatsApp’s DNA
      • The End of the iPhone? Apple is Planning the Next Big Thing
      • Google Wants to Do More with Chrome
  • Blog
  • Books
You are here: Home / AI / 2019 Onward: Everyday Is Information Cyber Security Day

2019 Onward: Everyday Is Information Cyber Security Day

5G, AI and IoT driven Industrie 4.0 has biggest challenge ahead and that is implementing industrial graded security systems. Smart cities, autonomous vehicles and Nuc plants just imagine the importance of computer network systems security and impact of any cyber attack. World cyber security day, week and month November 2019 is here to highlight the importance of this challenge that we are going to face in future.Talks, demo, conferences, and an AI, 5G,IoT Hackathon will compose the month of cyber security.

During all these awareness efforts we are here, Windows ‘BlueKeep’ CyberAttack Is Happening Right Now.

Even That U.S. Government has warned us about the devastating risks of BlueKeep a security vulnerability that was discovered in Microsoft's Remote Desktop Protocol implementation, which allows for the possibility of remote code execution.

As a vulnerability such as Wanna Cry describes Microsoft Bluekeep. Now security researchers discovered the first malware that exploits the gap. However, this is still a long way from the worst-case scenario.

Already in May, Microsoft vigorously warned of a vulnerability that could spread like Wanna Cry independently. For the first time, security researchers Kryptos Logic have been able to sift through malicious software that exploits the Bluekeep gap. However, it seems almost harmless to the potential of the vulnerability.

Since Microsoft released security updates in May for all supported and even unsupported operating systems, there was silence before the storm. A wave of attack on unprotected devices that did not play the security updates was just a matter of time. Gradually, security researchers also released proof of concepts (PoC) or even exploits for pentesting software. But the big attack was slow is coming.

For the first time, security researchers discovered malicious software in the wild, exploiting the Bluekeep vulnerability. In a honeypot, a computer with vulnerabilities run by security researchers to detect and analyze malicious software, they discovered malicious software that used the loophole to steal computing power. This used the malicious software for cryptomining. However, the malicious software crashed the affected Honeypot, so security researchers doubt the reliable functioning of the malicious software.

The Bluekeep Cryptominer is not a worm


The Bluekeep vulnerability allows malicious code to be executed on an affected Windows system without the need for system authentication or user interaction. A computer worm could self-propagate through the vulnerability from vulnerable computer to vulnerable computer. However, according to the security researchers, the malicious software that has now been discovered does not spread on its own. Instead, the attackers scan for vulnerable systems and then attack them.

One reason for the absence of a Blueekeep worm could be Microsoft's handling of the vulnerability. Security updates and warnings from Microsoft may have contributed to significantly reducing vulnerable devices. "Every month that passes without a worm being released, more people are turning to security updates and the number of vulnerable devices is falling," said security researcher Jake Williams Wired. That so far no attacker had exploited the gap on a large scale, could also be based on a cost-benefit calculation. There may be too little affected Windows machines, as that is worth the effort, explains Williams.

In contrast, Wanna Cry paralyzed millions of Windows machines in 2017 , leading to system failures at a number of companies . In addition to the scoreboards of the train denied many money, ticket and gas station machines the service. Calculator of the mobile operator Telefónica were also affected, and the car manufacturer Renault had stopped its production in some plants as a precaution. The Wanna Cry malware was based on a vulnerability in Samba hoarded by the US National Security Agency (NSA), leaked by the hacker group The Shadow Brokers.

Author Profile

Amram David
Amram David
Amram is a technical analyst and partner at DFI Club Research, a high-tech research and advisory firm .He has over 10 years of technical and business experience with leading high-tech companies including Huawei,Nokia,Ericsson on ICT, Semiconductor, Microelectronics Systems and embedded systems.Amram focuses on the business critical points where new technologies drive innovations.
Latest entries
  • best gaming pcAMD2022.02.22Best PreBuilt Gaming PC For Money
  • ampere_nvidia_rtx_3000AMD2022.02.01Nvidia Ampere: New GPU Generation Unveiled 2022
  • 5G2021.01.10What is The Difference between 5G and 6G?
  • online food deliveryTech Business2020.06.1610 Advantages That Apps Have Over Websites For Your Business

Trending

best gaming pc

Best PreBuilt Gaming PC For Money

ampere_nvidia_rtx_3000

Nvidia Ampere: New GPU Generation Unveiled 2022

What is The Difference between 5G and 6G?

online food delivery

10 Advantages That Apps Have Over Websites For Your Business

AI robot

Is The World Better Without AI (Artificial Intelligence)?

Pinchtype-Facebook-Reality-Labs 2020

Facebook Shows The Strangest Keyboard You Have Ever Seen

AI and Corona

AI in the First Line Of Defense Against Corona

AI in medicine 2020

What AI Means For Medicine

AI 2020

Always Question AI Systems

Top Subreddits

  • Facebook
  • Instagram
  • YouTube
  • Home
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Top Subreddits
  • About

Copyright © 2023 | DFIClub | DFICLUB:ORG IS A PARTICIPANT IN THE AMAZON SERVICES LLC ASSOCIATES PROGRAM, AN AFFILIATE ADVERTISING PROGRAM DESIGNED TO PROVIDE A MEANS FOR SITES TO EARN ADVERTISING FEES BY ADVERTISING AND LINKING TO AMAZON.COM. AMAZON, THE AMAZON LOGO, AMAZONSUPPLY, AND THE AMAZONSUPPLY LOGO ARE TRADEMARKS OF AMAZON.COM, INC. OR ITS AFFILIATES. AS AN AMAZON ASSOCIATE WE EARN AFFILIATE COMMISSIONS FROM QUALIFYING PURCHASES.