Cyber security

Increasing cyber-attacks – are we heading towards cyber doom?

The recent Petya ransomware tragedy that struck the computer systems worldwide, is the second largest cyber-attack after the WannaCry Ransomware that had hit the world last month. The recent attack hit many countries, locking up the PCs and crippling enterprise-services. Ukraine and Russia were identified among the worst affected countries. Based on the findings of security firm Kaspersky, the ransomware could possibly be a variant of Petya.D, Petya.A, or PetrWrap. Though it widely affected the systems just like WannaCry, but it is not its variant. The Petya ransomware locks a computer’s files with a message and demands a ransom in lieu. The attack reportedly started through an update that was used on a third-party Ukraine software, known as MeDoc. The software was used by many organizatio...

CISPA CyberSecurity Bill Passes the House 288 to 127; Now to head to Senate

The House of Representatives have passed Cyber Intelligence Sharing and Protection Act on Thursday by a heavy margin of 288 to 127 after two days of intensive debate on whether the threat of “cyberattacks” was grave enough to justify the over-lingering privacy concerns. The bill which was moved  to the House  after a closed-door 18 to 2 vote, received  support from 92 Democrats and will now move to the Senate and then to the president Obama, whose advisers recently threatened a veto of the bill as it overrides the digital privacy of American Citizens. “In the case of Boston they were real bombs, in this case they’re digital bombs. And these digital bombs are on their way.”- said Rep. Mike McCaul (R-TX), a vehement CISPA supporter to hard-press the need of pass...

How New Privacy Laws will Affect Digital Commerce: Legislation of Privacy- (Part 2)

In my last post, I discussed how many of the newer and upcoming laws regarding privacy in the United States can heavily effect your life, from how you buy insurance to which bits of personal information are gathered while you shop online, go to the bank, or talk on the phone. While the first post of this four part series dealt with the effect of these laws on your digital life;  this post, in particular, will focus on the effects of the same on Digital commerce. Much like your social activities, your consumer habits and activities are also subject to privacy violations, especially when they occur online or through a mobile device. The following are laws that seek to address a number of major issues related to consumer privacy rights. Cyber Intelligence Sharing and Protection Act (CISPA)Pro...

Skip to toolbar