Quantcast

10 Years after 9/11, Cyber Attacks Are Big Threat

Cyber security needs to be taken more seriously, says expert

Get the WebProNews Newsletter:
[ Technology]

In light of the 10th anniversary of 9/11, security experts are warning that cyber attacks could be the biggest area of threat. This news, however, should not come as a major shock, since attacks have been on the rise recently and have even managed to reach organizations such as Sony and Epsilon. This week, the famous “Anonymous” has even gone so far as to launch a new Twitter hijacking tool.

What is your biggest cyber security concern? Let us know.

Dr. Farshid Delgosha, a professor at the New York Institute of Technology, told us that the reason these attacks are becoming more prevalent is a result of the “widespread usage of ubiquitous computing.” In other words, consumers are able to access the Internet and complete tasks from nearly anywhere through mobile devices. While mobile developments have brought about an increased level of convenience for consumers, there are still risks involved.

“This makes it easier for attackers to monitor wireless traffic exchange, hack into someone’s device, and steal personal data,” said Dr. Delgosha.

Another reason he believes cyber attacks have increased is because consumers have become overly confident on the Internet. Social networks are, in part, to blame for this trend since they create a comfortable, fun environment for consumers to share information.

“Individuals are becoming more confident in their online activity because that is where technology is taking us,” he said. “We should be cautious.”

While mobile and social media are both areas of vulnerability in regards to security, Dr. Delgosha does not think that open platforms pose any real danger. He told us that they could be secure if they are properly designed. On the topic of cloud technology, he was a little more cautious and said that it needs more work and understanding.

Even though technological advances can make it easier for attackers to breach security, Dr. Delgosha was quick to point out that he is not against mobile devices, social media, and other new developments. He does, however, think that people should be aware of the security issues involved and take them seriously.

“Every person, any corporation, no matter what the size is – small or big – they should take security very, very seriously,” he said.

He went on to echo what Charles Dodd, a U.S. government consultant on cyber defense, told us in June when he said, “Cyber will be the next generation warfare.”

“Now, because of the widespread usage of the Internet and the Web and the great deal of information and sensitive information that exists on the Web, definitely that [cyber] is the battleground in the future,” said Dr. Delgosha.

In an attempt to bring these issues into the spotlight and protect consumers and businesses, he, along with the entire team at the New York Institute of Technology, are putting on a Cyber Security Conference on September 15. The event hopes to examine and increase awareness of all these security issues.

This past week, Senator Richard Blumenthal introduced the Personal Data Protection and Breach Accountability Act of 2011. “The goal of the proposed law is essentially to hold accountable the companies and entities that store personal information and personal data and to deter data breaches,” he is quoted as saying. ”While looking at past data breaches, I’ve been struck with how many are preventable.”

Essentially, businesses would face substantial fines for not complying with a set of guidelines.

We’ll continue to monitor the progress on that front, but clearly cyber security is being taken more seriously than ever.

How concerned are you about cyber attacks? Let us know in the comments.

View 9/11 and Freedom Tower news and media at NYC-Tower.com.

10 Years after 9/11, Cyber Attacks Are Big Threat
Top Rated White Papers and Resources
  • http://www.youtube.com/danielvincentkelley Daniel Vincent Kelley

    What some vapid nonsense that was. Invasion of privacy is necessary for cyber security? You’re a effen moron. How bout we bust up monopoly operating system on common PC’s and then seriously secure those operating system options by only satisfying requests made by local input hardware, skip this opening ports on windows entry ridiculous invite to hackers. Plus, seriously prosecute cyber crime. For example, I’ve received spam mail with no unsubscribe link for years. Why shouldn’t I be able to elicit a police response for that violation of federal law? The system is hokey and ridiculous and you advocate reading scare tactics cyber war and allowing the government to further criminally invade privacy, in our already mandatory airport groping society. You’re demented. Go straight to hell please.

  • http://www.zazzle.com/djskagnetti* djskagnetti

    This is some 1984 bullshit. The government wants to control the internet just like China controls the internet. If you want to see hackers, let the government take over internet control, where they create a white list where you can only visit “government-approved” websites on that list, just like China. The hackers will have a field day. There should be Less government if anything, not more. Who’s to say that the cyber attacks that make the headlines aren’t done by CIA operatives in the first place? Can you really prove otherwise? Wouldn’t it be convenient for them if they said some government agency had a ‘cyber attack’ so they can install a Nazi 1984 white-list control grid? Can you prove otherwise? Just so you know, these government organizations aren’t even on the internet, they are connected to their own servers and anything important is not connected to the outside world. So if there was ever a ‘cyber attack’ on one of these government agencies, know that they are spewing forth yet more Lies. Get rid of the Patriot Act and get rid of Government Control. And keep your hands off my interwebz. Thanks.

  • http://my-gem.net James

    I can’t believe that it has already been 10 years. WOW!!!

  • Jerald Archer

    It seems no matter what one can do, the probability of being highjacked or data being obtained illegally is always going to be a problem. The system is too new to tell, but more secure measures are, and will be implemented in the future. This seems to be a necessity, even if it is a little restrictive to the beliefs of some paranoid individuals who would rather entertain conspiracy theories, and a bad understanding of history itself, than to help solve the problem by understanding it better. That is where we have to learn what information is necessary to give and what is not when dealing with certain companies. The fact will be that people who have nothing to hide will not have to worry and those with very little assests anyway are not worth the effort or risk. Still, the greatest danger lies in top security situations, which for the most part we as general consumers would not begin to understand or fathom as to the intricate nature of the systems themselves.

    As a general observation, why does it seem that every article I am reading today seems to want to cash in on the 9/11 situation? We need to move on and learn from the past and our mistakes in assuming we are always secure and relying on another to handle the situation for us.

  • Optimal Optimus Supreme

    Both people in these videos and the article are so far off. The terrorists use the Amiga to attack PC x86= Mac systems yes that includes Linux as both are just outdated. All this tech. or lack of it is over 60 years old. Remember years ago and more closely about 3 years ago when they got several hundred terrorists and in the 90s also. Well, they use the Amiga morons. SO you need an Amiga or some other true UNIX system. Means no Linux or mac same thing. The Amiga multitask in true real-time you need both to have the other. Plus there are 2 viruses developed on the Amiga that cant be stop via the mac side aka Linux or the windows side – they are called linksys and fuck virus . Both attack get information and then destroy your system. SO no information or trails are left behind. Yes, this is easily done so watch for news of this forming if they let it out.

    • Internet User

      No offence, but what the hell are you talking about Amiga’s for??!?! Amigas are useful for nothing nowadays…

      You also reference “Mac aka Linux”… Mac is not Linux! They are completely different!

      Keep your BS comments to yourself Sub Optimal!

  • http://www.worldclassdomains.net Josiah Burks

    Lets be totally clear about something. The military is on their own network apart from the www. so stop pushing the fear of terrorist attack when the only way to compromise military industrial complex is from within. Did you research the supposed stucks-net virus? How did they get the internal code of Windows? Do people who love freedom a favor and unplug from the lying boob box. You honestly believe it isn’t called TV programming for a reason? It’s time we all started rubbing our brain cells together and looking at everything logically.

  • http://www.annonces-de-maroc.com/ Johana

    September 11th it’s over now we must look for another story to make more objective

  • http://www.westnet.net.au/~gordon451/ Gordon Edwards

    Cyberwarfare? Or Cyber-stupidity?

    For example, how was ComodoHacker able to penetrate Comodo CA? (Shhhh… dictionary password AND dictionary username!!!!)

    And the IPv6 hole? I quote:

    When flooding the local network with random router advertisements,
    hosts and routers update the network information, consuming all
    available CPU resources, making the systems unusable and unresponsive.
    As IPv6 and autoconfiguration are enabled by default (except on FreeBSD,
    Windows XP/2000/2003), all are affected in their default configuration.
    For Windows, a personal firewall or similar security product does not
    protect against this attack, as the default filter rules allow these
    packets through.

    Note: Microsoft does not want to fix this security issue for their
    products.

    With this sort of thing going on, a Cyberwar might be a blessing.

    Gordon.

  • chris

    I agree with most responses here. Nice, people are waking up to the bull. Government involvement in anything is a problem, not a solution. The government already has control of just about everything except the internet. And now we see the common line “FOR OUR SAFETY” the government must protect us. The government only protects itself at our expense. I have a business and have to deal with government jerks occasionally,and they are the worst punks I have ever dealt with. Maybe its just the ones I have to deal with. These jerks might as well be talking corpses. I don’t want to deal more with the any government. WHO FALLS FOR THIS CRAP?

  • http://www.silverlingo.com Kyle Proudfoot

    Dear WebPro News,
    To me the greatest security concern on Internet is all the Noobies who use very weak username and passwords, also not updating and/or upgrading fast enough is a major problem.

  • http://www.gfxcasa.com Gfxdesign

    I can’t think that it was already Ten years. !!!

  • http://hdddrivedatarecovery.blogspot.com Benaissa

    I can not feel that it had been Ten years. Amazing!