According to the National Security Agency (NSA) Data Center, there are 300,000 hacking attempts every day across the globe. That is completely insane! It literally means that there are 3.5 attempts every second to breach a security system and obtain information.
Many people picture a hacker as a computer nerd sitting in a dark basement targeting a victim, analyzing their system, and then somehow guessing their passwords.
Another stereotype is that hacking only happens to big businesses, not individuals, but neither are an accurate assessment of today’s hackers.
Most computer hackers are quite sophisticated, with hardware and software that is automated and can scan thousands of computers at the same time, looking for vulnerabilities. They can and will go after anyone, big or small, where there is weakness and opportunity.
Many takeovers begin with a program the infiltrates your computer through an email or text. One such program is called SubSeven or Sub7, which finds an exposed port through which the intruder can enter and take over your computer.
This article discusses the high tech equipment of today’s hackers:
Seven Scary Things Hackers Can Do to Your Computer
One of the tools a hacker uses sends out packets of data to probe computers and find out if there are any vulnerable ports available that are ripe for exploitation. All computers have ports that are open when they’re on the Internet. The ports accept different types of data from different sources—think of them as different doors in a house, or boating docks in a busy seaside port.
The nasty Sub7 program, for example, is known to use port 27374, as well as others. If port 27374 happens to be running that day, Sub7 will open that port. The port probe then alerts the hacker that, indeed, port 27374 is open for business…or hacking. The hacker knows that with a few keystrokes, they can take control of your computer.
Read the full post here: Seven Scary Things Hackers Can Do to Your Computer
IBM has been in the artificial intelligence industry since 2005 with their Watson supercomputer. Through developments in AI and IBM’s DeepQA platform, Watson can answer questions by generating a hypothesis, gathering massive evidence, and analyzing data.
Watson, named after IBM’s first CEO Thomas J. Watson, originally debuted in 2011 by competing on Jeopardy against some of the previous big winners. Watson took home the big prize, and from that time has been helping solve questions for medical, telecommunications, financial and government entities.
In May of 2016, it was announced that Watson would be helping battle the bad guys in cybersecurity. Using the X-Force Exchange, an intelligence sharing platform, this system enables collaboration with research on security threats and aggregation of intelligence information.
This video shares how IBM Watson would fight cyber-criminals:
It was announced this week that IBM has again raised the bar in the cybersecurity battle with its z14 mainframe. This system enables protection for valuable data and simplifies compliance to regulations by using machine learning to encrypt the data in a way that has never been done before.
How powerful is it? It can process 12 billion encrypted transactions per day and up to 13 gigabytes of data per second per chip. Caleb Barlow, vice president of threat intelligence at IBM Security, stated that it offers a “400 percent increase in silicon that’s dedicated specifically to cryptographic processes—over six billion transistors dedicated to cryptography,”
This article provides more details on how the IBM z14 will be used:
IBM dangles carrot of full encryption to lure buyers to new z14 mainframe | TechCrunch
Peter Rutten, an analyst with IDC says all-encompassing encryption is clearly the key to this release. “It’s like a security blanket across the entire system — database, applications, data at rest, data in flight, APIs, etc. — that can just be turned on, rather than manually picking and choosing what to encrypt, which typically has led to much [data] remaining unencrypted,” he explained.
Beyond pure encryption, customers also told IBM they wanted this capability delivered in a cost-effective way. Of course, IBM is promising this, and has revealed a new pricing strategy called a “container pricing model,” but Mauri wouldn’t discuss details, so it’s difficult to know exactly how the company defines “cost-effective.”
Read the complete post here: IBM dangles carrot of full encryption to lure buyers to new z14 mainframe | TechCrunch
The cost of utilizing this new defense against hackers isn’t cheap. It was stated in the Los Angeles Times that the cost was going to approximately $500,000 for new customers to use its newest mainframe technology. Upon looking at IBM’s site, it shows that financing is available, but for most small businesses, this might be a little out of their price range.
The following article New Defense Against Hackers with IBM and z14 Mainframe is courtesy of http://ssprosvcs.com