Cybersecurity and Technology

Cropped 879.jpg

Tag: tech

Chika Wonah Can Ai Have A Sense Of Ethics

Can AI Have a Sense of Ethics?

Artificial intelligence has skyrocketed in popularity within the last decade. And as society moves closer and closer to an automated way of living, it will continue to grow exponentially. From retail shopping to self-driving cars, artificial intelligence can be used in numerous ways to make countless industries easier to maintain, as well as reduce associated human labor. However, artificial intelligence is a great course of action for cleaning a warehouse, for example, but many wonder if it becomes problematic when morality comes into play. A new program being created by researchers at the University of Washington and the Allen Institute of Artificial Intelligence look to resolve this problem with an ethical set of codes to distinguish right from wrong.

It’s Okay. It’s Wrong.” but is it correct?

The new program, Delphi, looks to instill a moral compass in artificial intelligence. It was fed millions of sentences from books and scraped from the web, as well as consensus answers to ethical questions from crowd workers. When both the crowd workers and a fully-trained Delphi were given new ethical questions, they matched 92 percent of the time. And although it performed well on easier scenarios, killing a bear is wrong, but killing a bear to protect one’s child is okay; it seemed to give worrying responses for problematic situations. For example, when it came to conducting genocide because it made one happy, the response given was “it’s okay,” when “men are smarter than women” was entered, “it’s expected” was the program’s response.

Far from Ethical… but a Step in the Right Direction

Although Delphi is far from perfect, it is a great leap for instilling a moral compass in artificial intelligence. When it comes to autonomous technology and robotics, they cannot become ethical on their own. Until society is able to create truly self-aware artificial intelligence, which is far, far away, programs and lines, in fact, millions of codes have to be fed. This extensive training, however, through countless tests and corrections can lead to literally teaching artificial intelligence a sense of ethics. Starting with a program like Delphi is a tremendous start in teaching artificial intelligence right from wrong as it is a great baseline for continued instructing.

Chika Wonah

Online Resources fo See if You’ve Been Hacked

How safe are you online, and how do you even know if your security has been compromised? Well, scammers and hackers present constant daily threats to our online presence. Any activity that gets performed online, from social media to email accounts, can get hacked. Operating an old account without an updated feature puts your entire online presence and newer account at risk of getting attacked by hackers. The pertinent question is; how do you tell if you are a victim of these attacks? Luckily, there are signs that, when noticed, are indicative of an online account getting hacked.

One of the tools that one can confidently use to check whether their email addresses have been compromised is known as “Have I been Pwned? This tool is quite effective in checking the security of one email accounts. The platform is quite effective and easy to use as one is only required to visit their platform and check whether their emails have been part of the data breach using the available tools. Also, the platform checks whether your email address has been used in suspicious public online. If the findings on this platform return in affirmation, this indicates that your email address is at risk.

The next step is securing your email accounts by changing their password with a strong password. Using a [password generator is highly recommended. Consequently, it’s important to avoid opening any suspicious-looking emails sent to your mailbox. It’s essential and critical to remain vigilant and look for any suspicious activity around your email account. Having a similar password for more than one account is a security risk, and it’s not advisable; one gets advised to change it immediately.

There is yet another effective and comprehensive platform and tool to check and ascertain whether you have been hacked. The DE hashed is slightly complicated compared to the “I have been Pwned “email check. Dehashed is a bit broad in its coverage as it can cover more than a single email address. Dehashed allows one to dictate the data sets they are looking for online. It will crawl the internet to ascertain whether there is any information regarding the search criteria available. The platform also goes a notch higher as it allows one to remove any data entries containing personal information.

One gets recommended to use Dehashed if they strongly feel compromised or their old username and password are no longer in use. Dehashed allows one to search for phone numbers, legal names, and addresses. The platform requires one first to create an account to search and c check for details regarding their online presence.

2021 Cybersecurity Career Trends

2021 Cybersecurity Career Trends

Technology is evolving rapidly, and businesses are changing how they operate with the emergence of new technologies like artificial intelligence, cloud computing, and automation. It is creating opportunities for companies to think beyond the everyday operations and development of recent career trends. The world is relying on technology, and with this, there is a need to enhance cybersecurity. Taking up a career in cybersecurity is lucrative because it guarantees full-time employment. Let us brush over some of the emerging cybersecurity career trends this year.

Blockchain developer

Developers create innovative systems to conquer hacking, which is a common cybersecurity threat. They often operate on multiple systems and are familiar with several programming languages. It is the job of blockchain developers to ensure the security of transactions by using secure methods such as cryptography.

Network engineer

The network engineers are responsible for dealing with computer networks. Network engineers perform installations and maintenance of components such as routers and cables. In addition, these professionals monitor network configuration and installation of firewalls to prevent cybersecurity threats. The salary average is about $158,213 for this profession.

Cybersecurity project manager

It is an excellent opportunity for any cybersecurity professional seeking a leadership role. The position gives you an upper hand to manage teams. It is the job of project managers to ensure that the different targets of the project are met within the specified time. In addition, they are charged with providing cybersecurity measures after the analysts have determined the various security measures. Most cyber project managers work with large teams and a budget, so the job demands are at a higher stake.

Information security analyst

The analysts are charged with the responsibility of creating plans and strategies to prevent cyber-attacks. They protect the entire infrastructure by monitoring networks, assessing threats, and protecting them from all types of cybersecurity threats. Once they have identified a treat, they can opt to work on it or escalate the issue depending on the complexity.

Ethical hackers

It is an excellent way of learning how cybercriminals operate. They are responsible for testing out a weakness or any breach in the security system. They create preventive measures even before hacking happens. One way of getting certification is through online learning, which makes you be certified.

Final thoughts

The careers mentioned above are trends that are emerging and evolving. Some of the professions may require you to go through the education system and get the certification. More cybersecurity careers will be on the rise this year and beyond as there is an increasing demand to maintain proper data security measures.

The Risks Of Login Codes Sent Via Text Message

The Risks of Login Codes Sent via Text Message 

 Two-factor authentication can seem very useful for securing your essential accounts from intruders. However, more and more hackers have been getting into accounts that use text messages for two-factor authentication. Look into these reasons why you should switch over the type of two-factor authentication you operate away from text messaging.

Routing Messages

 When you’re holding your phone close to you, you might be thinking that an intruder will have to get into your phone by getting you to install malware. For the past couple of years, though, intruders have been more clever into how they get into mobile phones. They can do this by going directly to your mobile phone carrier.

 The way they do this is by first finding some personal details about you. These can be as complicated as your social security number or as simple as the address you live on. From there, they call up your phone carrier.

 Depending on the phone carrier, they can be easily convinced that you’re locked out of your mobile device, and you need your number transferred to a separate phone. Intruders can accomplish this by giving up their details and paying a small fee. If it goes successfully, an intruder will have full access to any phone calls or text messages coming your way, with no way to stop them until you’re able to call your phone carrier again. This all is why you shouldn’t ever use text messaging for your two-factor authentication.

Notifications

 Sometimes, an intruder might not even be far away to the point where they can be looking at your phone screen in public. Depending on your mobile device settings, you might have notifications popping up with security codes on any screen of your device. Intruders can come up with a plan to get a security code this way.

 For example, you might be live-streaming a game on your phone to the internet. Intruders will use this to their advantage by logging into your account online and checking your stream for when the phone notification appears. After that, they can log in to your account and do enough damage before you even have the chance to change the passwords on your accounts. Notifications are just another reason why you shouldn’t be using text messaging linked to your two-factor authentication.

Chika Wonah - Cybersecurity Predictions For 2021

Cybersecurity Predictions for 2021

The fast advancing technology comes with a significant challenge of cybersecurity for most enterprises. Cybersecurity has become a consideration for many organizations as attackers deploy all tactics to breach any security protocol laid down by companies.
The following will be the main focus, risks, and considerations in 2021 that cybersecurity leaders and other professionals will have to deal with:

1. Cybercriminals will target remote workers in 2021.
Remote working is trending in every organization due to COVID-19 restrictions. COVID-19 guidelines have made employees be allowed by their employers to work from home. Cybercriminals will, therefore, target enterprises with employees working remotely. Cybercriminals will be very busy launching attacks on companies unprepared to secure their remote workers from such attacks. As of now, numerous organizations have incurred unexpected costs caused by security breaches into their systems. Most of the employees’ gadgets lack advanced protection from malware infections.

2. Zero Trust Network Access will replace VPNs.
After many companies allowed their workers to work remotely, they installed Legacy Security Architecture such as VPNs to prevent attacks. However, VPNs have become prone to attacks. VPNs are not long-term solutions as they grant excessive access to the company’s internal resources. Cybercriminals can easily deploy ransomware to attack the unpatched VPNs.
However, global IT security teams are aware of the threat, and they are currently developing the Zero Trust Security Model, which will be released by 2021. Zero Trust Network Access only gives users access to only the area they are working on; thus, users have no permission outside their jurisdiction.

3. Widespread adoption of Secure Access Service Edge (SASE).
COVID-19 pandemic continues to make enterprises get reduced revenue; hence, many organizations have reduced their IT spending to cut down expenditures. Many companies will use multi-service integration technologies like Secure Access Service Edge (SASE) to cut down IT cost. The single control point will reduce IT cost, but a breach in the integrated system will allow attackers to access every resource.

4. The health sector will face significant security breaches.
Attackers will target hospitals as they face financial pressures due to the COVID-19 pandemic. The health sector will experience more financial transactions hence making it a primary target in 2021.

5. Widespread digital transformation and internet use will lead to massive data exposure.
Most organizations will continue to allow their teams to work remotely. Businesses will continue to experience digital transformation with the remote worker embracing the 5G network, AI and ML-powered analytic, and cloud data management to ease their operations. However, data breaches will increase as hackers target the adoption of new technologies like the 5G network.

However, the challenges will not stop organizations from fully implementing and integrating modern technology into business operations. The advanced security remedies will caution the remote workforce from numerous cybersecurity exposures.

Chika Wonah Technology Hiring

Technology’s Impact on Hiring and Recruitment

Burgeoning tech has been laying claim to multiple industries from real estate to insurance, and more recently technology began to disrupt our hiring and recruitment tactics. In the digital age, it’s no surprise that how people find openings and apply for jobs changed. Now the vast majority start their searches online with sites like Linkedin and Indeed, but the actual interview process itself is also changing. Portfolios all take place online, interviews originally happen via video and personality diagnostics are standard.

One Way Interviews

Interviews are typically two-sided. A few business representatives interview a potential hiree, and while the hiree wants to impress the business, it’s also a chance to field questions and get to know each other.

Tech poses to change that with the rise of video interviews. As Dave Lee describes, “Traditional interviews with an interviewer and interviewee could go by the wayside, too. Rather than a two-way interaction, job candidates will upload video responses to interview questions. New technology will detect non-verbal cues such as those facial expressions and tone while eliminating human bias.” Brands like Red Bull already hopped on board with video interviews. This added step tests the applicant’s ability to think on their feet while also working through potential red flags or false starts eliminating wasted time for recruiters. Then, once the cream rises, formal interviews can take place. As Rajpreet Heir highlights, “Not only does digital interviewing allow candidates and employers to connect earlier in the interviewing process, it also saves time and money. A study by OfficeTeam revealed that 63% of companies are using video interviews vs. 13% from 2011.

Analytics and Diagnostics

Personality diagnostics are also increasingly popular as an inexpensive means to gauge fit and placement within a larger company. As Chamanpreet Singh says, “Data is critical in the digitisation of recruitment. It allows you to determine the effectiveness of any strategy implemented and will enable HRs to develop future recruitment strategies based on the metrics and measurements received. This data will give an insight into channels that can work for your company which means cutting down on time and expenditure.

Building a Business-Savvy Brand

It’s important to remember that if you can find them, potential recruits can also find you. As a result, recruiting in the digital age requires a larger emphasis on companies’ online brands. People want to understand the company culture they throw themselves into. Show personality, but also be sure the image you portray is accurate. Top talent is going to do their research, and if your digital presence is non-existent or inaccurate, they won’t want to work with you. As Rachit Jain says, “Building a healthy working culture and employer brand is getting more important day by day. But most importantly, employers and recruiters have to adapt and move to the modern recruiting technology faster.

Pro Tips Chika Wonah

Pro Tips for Keeping Your Crypto Safe

Staying safe online is harder than ever, and the stakes are even higher when there’s money involved. Someone can easily make a fake Twitter account using your profile image and copied bio, and in the time it takes you to report the account, another person might have mistaken it as you and already transferred money to them. It’s an easy mistake to make if you’re not being vigilant, and unfortunately, as soon as you report one account, another can pop up in its place. To keep your cryptocurrency safely in your possession, these suggestions will help you do that:

Know the attack vectors.

You can’t protect yourself if you don’t know what you’re up against. Fake sites have gotten very good at mimicking their targets – so good that if you don’t double check the URL, you might not even know the difference.

Use strong passwords.

This might seem like a no-brainer for digital natives, but it’s worth repeating. Don’t use words like street names, birthdays, or song lyrics. But don’t randomly keyboard smash, either, because a) you’re not as random as a computer generator and b) you want to be able to keep track of your keystrokes, or else risk not being able to sign into your account anymore.

Use cold storage.

All “cold storage” means is offline and unattached or “air gapped,” which is to say, unconnected to your home network in any capacity. You can do this by removing the network card from your computer, or by buying a hardware wallet. If you’re feeling really cautious, you can cover your computer’s camera and microphone, and even remove all electronic devices from that room.

Test everything.

Make small transactions beforehand to make sure everything works. Never manually type in a url – it’s too easy to make a mistake that way, and could cost you a lot of money in errors. Copy/paste and QR codes are your best friends, though make sure your scanning app is reliable! Test your seed phrase on your hardware wallet; test the MD5 checksum before and after you load the SD card on your air gapped computer. Check everything. You can never been too careful.

Store your seed phrases in multiple places.

Your seed phrase is the string of 24 words that you can derive a private key from. You want to make sure your seed phrase stays secure at all times. For some, this means writing the seed phrase down on paper, in which case, it is recommended you make two copies and store them in separate places. SD cards are also an option, though they don’t tend to last more than five years and can be wiped by an EMP bomb. A combination of analog and digital methods is the best option. For the most cautious, they will split the seed phrase in parts and store those parts separately. If you do this, be sure to remember the order they go in, or else lose access to seed phrase altogether.

Plausible deniability.

Most simply, this means be able to keep some of the data hidden. Like in the physical world, you don’t want to advertise how much money is in your bank account, so don’t do it in the digital world, either. Also look into using multiple wallets rather than storing all of your currency in the same place.

Keep your environment safe.

Require two-factor authentication, and educate others on how to stay safe. Help the community at large by reporting fake sites and teaching the less tech-literate about why strong passwords are important. Not only are you keeping yourself protected, but you are also protecting others and paying that forward.

 

Is Blockchain the Face of the Next Google ChikaWonah

Is Blockchain the Face of the Next Google?

When we discuss blockchain, conversations usually surround the tech’s association with cryptocurrency, security and investing. In reality, this new tech is multifaceted and shows major implications for nearly every industry. When it comes to blockchain and cryptocurrency, news outlets can’t stop reporting on the potential promise. That being said, now people are asking big questions like could blockchain actually be the developments needed to create a search engine capable of overtaking google?

Google dictates much of our online searches with “nearly 80 percent of desktop and 95 percent of mobile searches” taking place on the program. That being said, a plethora of alternatives exist. The problem, of course, is that while some people use these tools, most cater to specific niche audiences, because Google has become a Goliath that many of the Davids of search engines aren’t ready to conquer. Enter blockchain. Given its clout in the tech field, many think it could be the answer to building a search engine capable of overcoming Google.

In terms of basic rising user trends, more people results in more reported problems, and Google users experience their fair share of flaws. Privacy remains the primary point of contention with centralized search engines. As BitClave describes, “With centralized search engines, your search data is recorded, your IP address is logged, and tracking cookies are used by centralized search engines to create a digital profile of you so they can target you with ads. Even worse, there’s no way to voluntarily opt out of this invasion of your privacy, and every time you type a keyword into a centralized search engine, you’re giving up information that puts you at risk.” Blockchain acts as the poster-child for privacy and discretion though. While heavily regulated given its infrastructure, the system manages to maintain a level of anonymity for its users.

Now the question becomes, how do we combine blockchain’s private network with a computing system that has the strength of Google? One program still in beta testing called Presearch, thinks they may have found the answer. As Shivdeep Dhaliwal explains, “Using Blockchain technology, Presearch plans to enable users to personalize their experience while staying in control of their data.” The company also incentivizes the switch, rewarding users who change from Google to their program with cryptocurrency coins based on their use. Of course, this still isn’t a perfect system. Questions have arisen about whether hackers may take advantage of the rewards and hack into other user profiles in order to gain more coins once they max out since users are limited to 8 coins a day.

The Presearch program focuses on decentralizing the search engine model, rewarding users for their contribution. As a result, they hope to build a more transparent and unbiased ranking, a problem that Google has made headlines for, for years. Of course, the idea of using blockchain to create a more effective model is one thing and actually doing it another thing.

 

Page 2 of 2

Powered by WordPress & Theme by Anders Norén