Nifty99000 100%

Sensex99000 100%

Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: No rating
Article rating: 4.0
RSS

News

Sharing information necessary to safeguard against cyber threats

Author: IANS/Thursday, April 26, 2018/Categories: IT & ITeS

Sharing information necessary to safeguard against cyber threats

Bengaluru, April 26 - Sharing information is a key factor in making enterprises, governments and individuals safe against growing cyber threats, a report said on April 26.

The report by global Cloud delivery platform Akamai came at a time when the top 34 global technology and securities firms, led by Microsoft and Facebook, have signed a "Cybersecurity Tech Accord" to defend people from malicious attacks by cybercriminals and nation-states.

The Akamai report analysed data from more than 14 trillion DNS queries collected by Akamai between September 2017 and February 2018 from communications service provider (CSP) networks around the world.

A DNS query is the process of a computer or networking device making an inquiry to get an IP address for a DNS name. 

For more than 19 years, Nominum, acquired by Akamai in 2017, has leveraged in-depth DNS data to improve overall protection against sophisticated cyber attacks. 

The Akamai's new report builds upon the Nominum expertise and highlights the effectiveness of DNS-based security that is enriched with data coming from other security layers. 

Communicating with varying platforms is critical when acquiring knowledge across teams, systems and data sets.

"We believe that the DNS queries that our service provides act as a strategic component to arming security teams with the proper data necessary for that big picture view of the threat landscape," said Yuriy Yuzifovich, Director of Data Science, Threat Intelligence, Akamai. 

The exponential rise in public consumption of cryptocurrency adoption has resulted in an increase in crypto-mining malware strains and the number of devices infected with them, the report said.

Akamai observed two distinct business models for large-scale cryptomining. 

The first model uses infected devices' processing power to mine cryptocurrency tokens. 

The second model uses code embedded into content sites that make devices that visit the site work for the cryptominer. 

Akamai conducted extensive analysis on this second business model, as it poses a new security challenge for users and website owners alike. 

After analysing the cryptominer domains, Akamai was able to estimate the cost, in terms of both computer power and monetary gains, from this activity. 

"An interesting implication of this research shows that cryptomining could become a viable alternative to ad revenue to fund websites," the report added.

Print Rate this article:
No rating

Number of views (117)/Comments (0)

Kavita Giridhar Mallya

IANS

Other posts by IANS
Contact author

Leave a comment

Name:
Email:
Comment:
Add comment

Name:
Email:
Subject:
Message:
x

Videos

Ask the Finapolis.

I'm not a robot
 
Dharmendra Satpathy
Col. Sanjeev Govila (retd)
Hum Fauji Investments
 
The Finapolis' expert answers your queries on investments, taxation and personal finance. Want advice? Submit your Question above
Want to Invest
 
 

Categories

Disclaimer

The technical studies / analysis discussed here can be at odds with our fundamental views / analysis. The information and views presented in this report are prepared by Karvy Consultants Limited. The information contained herein is based on our analysis and upon sources that we consider reliable. We, however, do not vouch for the accuracy or the completeness thereof. This material is for personal information and we are not responsible for any loss incurred based upon it. The investments discussed or recommended in this report may not be suitable for all investors. Investors must make their own investment decisions based on their specific investment objectives and financial position and using such independent advice, as they believe necessary. While acting upon any information or analysis mentioned in this report, investors may please note that neither Karvy nor Karvy Consultants nor any person connected with any associate companies of Karvy accepts any liability arising from the use of this information and views mentioned in this document. The author, directors and other employees of Karvy and its affiliates may hold long or short positions in the above mentioned companies from time to time. Every employee of Karvy and its associate companies is required to disclose his/her individual stock holdings and details of trades, if any, that they undertake. The team rendering corporate analysis and investment recommendations are restricted in purchasing/selling of shares or other securities till such a time this recommendation has either been displayed or has been forwarded to clients of Karvy. All employees are further restricted to place orders only through Karvy Consultants Ltd. This report is intended for a restricted audience and we are not soliciting any action based on it. Neither the information nor any opinion expressed herein constitutes an offer or an invitation to make an offer, to buy or sell any securities, or any options, futures or other derivatives related to such securities.

Subscribe For Free

Get the e-paper free