SMT007 Magazine

SMT007-July2022

Issue link: http://iconnect007.uberflip.com/i/1472190

Contents of this Issue

Navigation

Page 47 of 103

48 SMT007 MAGAZINE I JULY 2022 Suggestions for Protection • Use secondary channels or two-factor authentication to verify requests for changes in account information. • Ensure the URL in emails is associated with the business/individual it claims to be from. • Be alert to hyperlinks that may contain misspellings of the actual domain name. • Refrain from supplying login credentials or PII of any sort via email. Be aware that many emails requesting your personal information may appear to be legitimate. • Verify the email address used to send emails, especially when using a mobile or handheld device, by ensuring the sender's address appears to match who it is coming from. • Ensure the settings in employees' computers are enabled to allow full email extensions to be viewed. • Monitor your personal financial accounts on a regular basis for irregularities, such as missing deposits. If you discover you are the victim of a fraud incident, immediately contact your finan- cial institution to request a recall of funds. Regardless of the amount lost, file a com- plaint with www.ic3.gov or, for BEC/EAC victims, BEC.ic3.gov, as soon as possible. SMT007 A new method that could automatically detect and kill cyberattacks on our laptops, computers, and smart devices in under a second has been cre- ated by researchers at Cardiff University. Using artificial intelligence in a completely novel way, the method has been shown to successfully prevent up to 92% of files on a computer from being corrupted, with it taking just 0.3 seconds on aver- age for a piece of malware to be wiped out. Using advances in artificial intelligence and machine learning, the new approach, developed in collaboration with Airbus, is based on monitor- ing and predicting the behaviour of malware as opposed to more traditional antivirus approaches that analyse what a piece of malware looks like. "Traditional antivirus software will look at the code structure of a piece of malware and say, Yeah, that looks familiar,'" co-author of the study Professor Pete Burnap explains. "But the problem is malware authors will just chop and change the code, so the next day the code looks different and is not detected by the antivirus software. We want to know how a piece of malware behaves so once it starts attacking a system, like opening a port, creating a process, or downloading some data in a particular order, it will leave a fingerprint behind which we can then use to build up a behavioural profile." By training computers to run simulations on spe- cific pieces of malware, it is possible to make a very quick prediction in less than a second of how the malware will behave further down the line. Once a piece of software is flagged as malicious the next stage is to wipe it out, which is where the new research comes into play. (Source: Cardiff University) Scientists Create New Method to Kill Cyberattacks in Less Than a Second

Articles in this issue

Archives of this issue

view archives of SMT007 Magazine - SMT007-July2022