Thursday 22 September 2016

Digital Divide: Emerging Economy Cyber Alerts - September 22, 2016


Policy 
their legislation today could be yours tomorrow

Zimbabwe's flag and map


At a consultative workshop, Zimbabwe's Secretary for Information Communication and Technology, Postal and Courier Services Sam Kundishora suggested that because of frequent changes in ICT, the country's Computer Crime and Cyber Security Bill should be reviewed every two years in order to make corresponding adjustments. 




Privacy, Surveillance and Censorship 
government isn't always on your side

Indian flag and map


India’s government is working to include Aadhaar, its biometric authentication system, on all smartphones within the country. If companies such as Google, Samsung and Microsoft do not comply, they would likely find themselves non-competitive in a country with such a rapidly growing smartphone market. The change would also send all mined smartphone data to the Indian government rather than the phone manufacturers. 



Research and Initiatives 
making your world a more cybersecure place

Emirati flag and map
Recent research reveals cause for concern in the United Arab Emirates: “UAE workplace security research conducted by Cisco and GBM showed employee behavior is a genuine weak link in cybersecurity and becoming an increasing source of risk—more through complacency and ignorance than malice—because companies have so insulated employees from the scale of daily threats that people expect the company’s security settings to take care of everything for them. Training employees to understand that they too are liable on an individual level is of critical importance.” Today marks the 8th e-Crime Congress Abu Dhabi, which will explore the advances in and shortcomings of cybersecurity. 

Indian flag and map 
High Representatives from Brazil, Russia, India, China and South Africa (BRICS) recently met in New Delhi to discuss issues including cybersecurity in anticipation of October’s BRICS Summit. The representatives agreed to focus on information sharing and cooperation in order to strengthen cybersecurity. 

Malaysian flag and map 


CyberSecurity Malaysia plans to produce 10,000 certified cybersecurity professionals by 2020. “It is vital to develop a strong pool of cyber security talent in order to build a dynamic cyber security eco-system that can support Malaysia’s transformation into a high income digital economy,” said Datuk Seri Panglima Madius Tangau, Malaysia’s Science, Technology and Innovation (MOSTI) minister. 




Cyberattacks 
the threats we all face

Chinese flag and map


Chinese e-commerce company Alibaba recently fired four employees who stole 124 boxes of mooncakes with a sales system hack. Although those fired were surprised to see such decisive action, a PR representative for Alibaba reported that “the decision was made to remind myself and every employee that everything has a bottom line.” 

Russian flag and map

Russian hackers APT28 and Fancy Bears have breached the World Anti-Doping Agency (WADA) in an attack that has made public the medical records of Olympians from countries including Argentina, Belgium, Burundi, Canada, Denmark, France, Great Britain, Hungary, Spain and the United States. WADA believes the attack is an effort to destroy reputations and retaliate for investigations into doping in Russia

Israeli flag and map 



18-year-old Israelis and leaders of an international hacking operation, Itay Huri and Yarden Bidani, were recently arrested for knocking websites offline and compromising databases. It is believed that Huri and Bidani collected over $600,000. 





All images credit of BOLDG/Shutterstock.com.
Want more emerging economy cyber alerts? Read on!
 
Want emerging economy cyber alerts sent to your inbox? Sign up for our weekly newsletter ("Security Tips and News" at bottom of page). 

Have valuable insight to share from your part of the world? Write for us!
 
SumRando Cybersecurity is a Mauritius-based VPN, Web Proxy and Secure Messenger provider. Surf secure and stay Rando!

No comments:

Post a Comment