Cybersecurity / en Mitigating Cybersecurity Threats and Preparing for a Quantum-Driven Landscape /blog/mitigating-quantum-computing-threats-to-cybersecurity Mitigating Cybersecurity Threats and Preparing for a Quantum-Driven Landscape <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2025-06-23T12:08:27-04:00" title="Monday, June 23, 2025 - 12:08">June 23, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Quantum%20computing%20threats%20to%20cybersecurity_2.jpeg" width="640" alt="man working on computer screen showing how quantum computing affects cybersecurity" typeof="foaf:Image"> <p><span><span><span><span><span><span>Our digital lives are built on the promise of protected secrets. Every online transaction, personal file, and secure communication depends on complex encryption algorithms to keep that data safe from unintended exposure. For decades, the classic cryptographic algorithms known as Rivest–Shamir–Adleman (RSA), Digital signature algorithm (DSA), and Elliptic curve cryptography (ECC) have served as the <a href="https://www.sectigo.com/resource-library/rsa-vs-dsa-vs-ecc-encryption">most common and useful digital guards</a> protecting our private assets. However, the emergence of quantum computing is introducing new challenges to how we keep information safe and demands a reevaluation of how cybersecurity professionals are approaching the quantum future.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Threats to Cybersecurity and Current Encryption Methods</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Leveraging the principles of quantum mechanics, quantum computers possess the potential to solve computational problems exponentially faster than traditional computers. This capability poses a direct threat to many of our current encryption methods. The implications are far-reaching as vast amounts of secured personal, financial, governmental, and industrial data could become vulnerable to decryption in a matter of moments.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>&nbsp;A recent study by Forrester suggested that <a href="https://www.ey.com/en_gr/insights/innovation/why-organizations-should-prepare-for-quantum-computing-cybersecurity-now">all current cryptosystems could be hacked by quantum computers in as few as the next five years</a>. And the financial and operational costs of successful attacks are expected to rise.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Concern within the technology community is growing, with 95% of software developers expressing worry regarding the security implications of quantum computing and cybersecurity experts warning about potential exploits. British accounting firm EY reported that malicious actors may already be engaged in a "<a href="https://www.ey.com/en_au/insights/cybersecurity/improving-tomorrow-s-security-by-decoding-the-quantum-computing-threat">harvest now, decrypt later</a>" strategy—gathering encrypted data to be exploited later as quantum decryption capabilities become more sophisticated.</span></span></span></span></span></span></p> <h3><span><span><span><span><em><span>“The last decade has witnessed not just advancements in quantum hardware but</span></em></span></span></span></span><span><span><span><span><span><span> </span></span></span></span></span></span><span><span><span><span><em><span>&nbsp;also significant progress in quantum algorithms aimed at breaching cryptographic protocols. Additionally, considering the time value of data—the idea that security protocols must protect information throughout its entire lifecycle—emphasizes the urgency of transitioning to quantum-safe solutions.”</span></em></span></span></span></span></h3> <p><span><span><span><span><span><span>—Aaron Perryman, EY Asia-Pacific Financial Services Consulting and Digital Leader, Charles Lim, JPMorgan Chase, Global Head of Quantum Communications and Cryptography, and Kaushik Chakraborty, JPMorgan Chase, Applied Research Lead in Quantum Communications</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Many organizations have been slow to adapt due to the complexity of the technology and the requirement for overwhelming infrastructure changes. Companies will also need people on IT and security teams who are well-educated in the intersecting fields of quantum computing and cybersecurity to strengthen key management practices, enhance network segmentation, and improve intrusion detection systems. As quantum computing may eventually enable more advanced attack vectors beyond decryption, such as faster brute-force or machine-learning exploits, companies must prepare now with both technology and trained personnel.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>A Quantum-Resistant Approach</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>One promising and innovative approach to quantum cyber threats involves <a href="https://www.coevolve.com/insights-striking-a-balance-centralized-vs-decentralized-security-in-enterprises/">decentralized security networks</a>. Unlike traditional centralized security systems that rely on only one central point of control, decentralized security networks distribute security responsibilities and data across a network of independent nodes or participants. This distributed architecture enhances resilience by eliminating single points of failure, increases transparency through distributed validation processes, and supports the development of novel security mechanisms that are inherently more resistant to quantum attacks.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The concept of Decentralized Physical Infrastructure Networks (DePIN) exemplifies this approach by leveraging blockchain technology and cryptographic principles to create secure and resilient physical infrastructure networks. The belief in DePIN's potential to address quantum threats is significant, with <a href="https://www.ulam.io/blog/how-depin-is-revolutionizing-infrastructure-in-the-web3-era">87% of respondents in a Naoris Protocol survey expressing confidence in its pivotal role over the next decade</a>.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Innovation at the Intersection of Quantum and Cybersecurity</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>While the quantum computing revolution presents a clear threat to cybersecurity, it also unlocks unprecedented opportunities within computer science and related disciplines. Quantum computers can accelerate breakthroughs in <a href="/blog/how-ai-and-quantum-computing-are-transforming-drug-discovery-and-healthcare-industry">drug discovery through advanced molecular simulations</a>, <a href="/blog/how-quantum-computing-is-revolutionizing-financial-industry">financial analysis and asset management</a>, and the development of more sophisticated artificial intelligence and machine learning algorithms. Quantum computing itself can also contribute to the next generation of cybersecurity tools, including quantum key distribution and quantum-resistant cryptography.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Cybersecurity can help protect against the growing challenges posed by the integration of quantum computing primarily through developing and implementing post-quantum cryptography (PQC). These new algorithms are designed to be secure by not relying on mathematical problems that quantum computers can easily solve (like factoring large primes), but instead using problems believed to be hard even for quantum machines, such as lattice-based or code-based cryptography.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Another layer of protection comes from hybrid cryptographic systems, which combine classical and post-quantum algorithms to ensure compatibility with existing systems while preparing for future threats. This transitional approach allows organizations to test and implement PQC gradually, which can alleviate concerns about the immediacy of the finances and manpower needed to perform an infrastructure overhaul.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Cybersecurity policies must also evolve to include quantum risk assessments, supply chain audits, and international collaboration to align defenses with emerging standards. By taking proactive, multi-layered approaches, cybersecurity can stay resilient in the face of quantum-powered threats and reduce the burden of adoption over time.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Quantum Computing at Capitol Tech</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Addressing the nature of quantum computing to serve as both a threat and a solution requires a dedicated force of skilled professionals. The demand for experts proficient in quantum computing principles, post-quantum cryptography, and decentralized security architectures is rapidly increasing. Continuous education, collaborating across industries, and supporting the development of post-quantum standards are going to be essential to ensure a secure digital future.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Capitol Technology University offers programs in <a href="/fields-of-study/cyber-and-information-security">Cybersecurity</a> and <a href="/fields-of-study/computer-science-artificial-intelligence-and-data-science">Computer Science</a> that prepare graduates to meet this demand, fostering the expertise necessary to mitigate the risks posed by quantum-powered cyberattacks and leveraging the transformative power of technology for innovation and security.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Explore what a degree from Capitol Tech can do for you! To learn more, <a href="mailto:admissions@captech.edu">contact our Admissions team</a> or <a href="/request-information">request more information</a>.</span></span></span></span></span></span></p> <p>&nbsp;</p> <p><em><span><span><span><span><span><span>Written by Jordan Ford</span></span></span></span></span></span></em></p> <p><em><span><span><span><span><span><span>Edited by Erica Decker</span></span></span></span></span></span></em></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-51131" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 23 Jun 2025 16:08:27 +0000 zqureshi 13016 at How Cybersecurity is Addressing the Rising Threat of Online Romance Scams /blog/how-cybersecurity-is-addressing-the-rising-threat-of-online-romance-scams How Cybersecurity is Addressing the Rising Threat of Online Romance Scams <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2025-05-15T13:54:00-04:00" title="Thursday, May 15, 2025 - 13:54">May 15, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/how-cybersecurity-is-addressing-rising-threat-of-online-romance-scams.jpg" width="7392" alt="scammer in red hoodie working on laptop" typeof="foaf:Image"> <p><span><span><span><span><span><span>Searching for friendships and relationships online has continued to grow in popularity, with an all-time high of <a href="https://www.breakthecycle.org/how-many-people-use-dating-apps/">381 million people using dating apps in 2024</a>. The convenience of dating apps, social media messaging, gaming platform chat, and other digital tools makes it easy to form connections with people both locally and globally. While these platforms provide a user-friendly forum for socializing, they also pose a risk as scammers can hide in plain sight and exploit users’ good intentions.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Romance and Friendship Scams in Cyberspace</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>According to the Federal Trade Commission (FTC), more than <a href="https://public.tableau.com/app/profile/federal.trade.commission/viz/shared/4WS8HTYQ6">65,000 victims lost a staggering $1.18 billion to romance scams</a> in 2023. These scams commonly start through matching on dating apps or unexpected private direct messages (DMs) on social media. Once contact is established, scammers can craft intricate lies, using stolen photos or data and believable details to make their fake profiles incredibly convincing. <a href="https://about.fb.com/news/2025/02/how-avoid-romance-scams-this-valentines-day/">Many fraudsters pose as celebrities, military personnel, or successful businesspersons</a> to reel in their targets.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The psychology behind the success of a relationship scam lies in a victim’s emotional vulnerability. Scammers create a sense of urgency, trust, and emotional dependency, often <a href="https://www.scamwatch.gov.au/types-of-scams/online-dating-and-romance-scams#:~:text=They%20'lovebomb'%20you%2C%20messaging,%2C%20WeChat%2C%20Line%20or%20WhatsApp.">by showering victims with excessive affection and attention early on</a>. This manipulation—known as “love bombing”—lowers defenses, making victims feel more trusting and likely to comply with requests.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Scammers then exploit victims’ affection for financial gain. Payment methods like cryptocurrency and bank wires are particularly popular, <a href="https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2023/02/romance-scammers-favorite-lies-exposed">accounting for over 60% of reported losses in these scams</a>. Additionally, gift cards are frequently requested, as they’re harder to trace and easier to liquidate, as well as asking for help with emergency financial situations.</span></span></span></span></span></span></p> <p><span><span><span><span><em><span>"Unlike traditional scams, [these scammers] rarely ask for money outright; instead, they manipulate victims into offering financial help through fabricated medical emergencies, legal crises, or investment opportunities."—<a href="https://www.financemagnates.com/forex/regulation/looking-for-valentines-love-dont-be-part-of-the-4-billion-romance-scam/">Jonathan Frost, Director, Global Advisory at BioCatch</a></span></em></span></span></span></span></p> <p><span><span><span><strong><span><span>The Growing Role of Deepfakes and AI</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>The emergence of new technologies has made relationship scams more sophisticated and harder to detect. <a href="https://www.mcafee.com/ai/news/how-romance-scammers-are-using-deepfakes-to-swindle-victims/">Scammers can now use AI and deepfake technology</a> to create realistic images, videos, text messages, email communications, and voice recordings, making their fake identities appear more authentic. Victims may believe they are speaking to a real person, only to discover later that the entire interaction was digitally created.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The accessibility of these technologies has made it easy for even amateur scammers to create successful high-level deceptions. This scalability also means that fraudsters can target multiple victims simultaneously, increasing the reach and impact of their schemes.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Identifying and Avoiding Romance Scams</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>To combat relationship scams, the Commodity Futures Trading Commission recently launched the <a href="https://www.cftc.gov/PressRoom/PressReleases/9052-25">“Dating or Defrauding?” campaign</a>. The campaign focuses on educating the public about recognizing red flags and taking proactive measures to avoid falling victim to online romance scams. The <a href="https://www.newsweek.com/fbi-warns-sinister-romance-scams-2028993">FBI also released a warning</a> to highlight the rising prevalence and dangers of these scams.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Often with cybersecurity concerns, <a href="https://www.ftc.gov/business-guidance/blog/2024/02/love-stinks-when-scammer-involved">human factors play a critical role</a>, where the weak point is the untrained eye of an unsuspecting victim. Here are a few ways users can spot relationship scammers and protect themselves.</span></span></span></span></span></span></p> <ul> <li><span><span><span><strong><span><span>Verify before you trust.</span></span></strong></span></span></span><span><span><span><span><span><span> Never rush into sharing personal information or giving away money—especially cryptocurrency—online, even with someone who seems trustworthy. If a&nbsp; stranger asks you for money, consider it a scam and stop communicating with them. If you think it is someone you know, like a relative or co-worker, call that person on the phone to verify it is them. Often, personal accounts can be hacked, and scammers will pose as that person, sending DMs to all their contacts for financial help.</span></span></span></span></span></span></li> <li><span><span><span><strong><span><span>Be cautious of over-affection. </span></span></strong></span></span></span><span><span><span><span><span><span>Scammers often use intense displays of affection to build quick trust. Proceed with caution if someone’s attention feels overwhelming or too good to be true.</span></span></span></span></span></span></li> <li><span><span><span><strong><span><span>Look for inconsistencies.</span></span></strong></span></span></span><span><span><span><span><span><span> Fake profiles often have inconsistencies in their stories or images. Reverse image searches can help identify stolen photos.</span></span></span></span></span></span></li> <li><span><span><span><strong><span><span>Report fake accounts. </span></span></strong></span></span></span><span><span><span><span><span><span>Most social media and dating platforms provide ways to report accounts, or to share the scammer’s information within a group or forum to warn others, or even reported to law enforcement.</span></span></span></span></span></span></li> <li><span><span><span><strong><span><span>Secure your accounts.</span></span></strong></span></span></span><span><span><span><span><span><span> Use strong passwords that you update regularly and avoid sharing sensitive information through online platforms. Learning and exercising personal cybersecurity tactics and using common sense can be your first line of defense to avoiding relationship scams.</span></span></span></span></span></span></li> </ul> <p><span><span><span><strong><span><span>How the Cyber Industry is Fighting Online Romance Scams</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>The cybersecurity industry utilizes several tactics to detect and prevent the rising threat of online relationship scams. AI and machine-learning models can be used to monitor platforms for suspicious behaviors such as repeated messaging patterns, rapid relationship escalation, and inconsistencies in user profiles. Image-recognition tools can help identify AI-generated, stolen, or reused photos, while natural language processing (NLP) systems are trained to pick up on common scammer dialogue or psychological manipulation tactics. These tools can flag potential spam accounts for human moderators to investigate, or even shut them down automatically, depending on the platform’s protocols.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The popular dating app Bumble recently <a href="https://bumble.com/en/the-buzz/bumble-deception-detector">announced their new AI-powered tool called the Deception Detector™</a>, which was developed to better address fake, spam, or scam profiles. During testing, this software supported blocking 95% of these types of accounts automatically with improved accuracy. Another dating app, Hinge, states they “<a href="https://hinge.co/trustandsafety">use a combination of machine-learning-driven technology and content moderators</a> to maintain the safety and integrity of the Hinge experience.” Facebook has been using AI, machine learning, and hand-coded tools for several years to help remove fake accounts. In 2019, <a href="https://screenrant.com/how-facebook-ai-removes-fake-accounts/">they reported more than 6 billion fake accounts were removed</a>, and that number continues to grow.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>In addition to technical solutions, the fields of cyberpsychology and <a href="https://globalcybersecuritynetwork.com/blog/product-managers-cybersecurity-role/">cyber product management are playing an increasingly important role </a>in understanding how scammers manipulate emotions and exploit systems. Certain branches of cyberpsychology as well as product management involve experts who collaborate with cybersecurity teams to identify and map the tactics commonly used by scammers—like “love bombing,” mirroring, and urgent crisis scenarios—and help in the product design of systems that can detect these behavioral red flags. This interdisciplinary approach demonstrates the industry’s work toward building increasingly resilient and trustworthy online platforms, where people can connect without falling prey to digital deception.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Cybersecurity Education at Capitol Tech</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>The growing threat of online relationship scams underscores the urgent need for education and skills development in cybersecurity.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Capitol Technology University is proudly designated as a National Center of Academic Excellence in Cyber Defense by the NSA and DHS. Our <a href="/fields-of-study/cyber-and-information-security">Cybersecurity programs</a> prepare you for real-world cyberattacks and help you develop innovative defense strategies in our evolving, cyber-focused world.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>To learn more,&nbsp;<a href="mailto:admissions@captech.edu">contact our Admissions team</a>&nbsp;or&nbsp;<a href="/request-information">request more information</a>.</span></span></span></span></span></span></p> <p>&nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-51071" class="section background-white"> <div class="super-contained"> </div> </section> Thu, 15 May 2025 17:54:00 +0000 zqureshi 12956 at Cybersecurity in the Age of IoT: Protecting Our Interconnected World /blog/cybersecurity-age-of-iot-protecting-our-interconnected-world Cybersecurity in the Age of IoT: Protecting Our Interconnected World <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2025-05-07T09:38:43-04:00" title="Wednesday, May 7, 2025 - 09:38">May 7, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/March%20Blog%20-%20IoT%20Cybersecurity%20.jpg" width="640" alt="March 2025 Blog - IoT Cybersecurity" typeof="foaf:Image"> <p>The Internet of Things (IoT) provides internet connectivity for an incredible variety of devices, from cell phones, computers, smart homes, and classrooms to industrial machines, autonomous vehicles, and more. By connecting and sharing data over the internet, IoT offers more than just convenience—it provides information at lightning speed, vastly expanding knowledge-sharing, process automation, remote monitoring, and real-time data analysis. But this quick access and efficiency comes with risks. With <a href="https://www.comptia.org/content/articles/what-is-iot-cybersecurity" target="_blank">more than 24 billion IoT devices active today</a>, hackers can use this technology against users to launch devastating cyberattacks.&nbsp;</p> <figure role="group"> <div alt="Internet of Things Interconnected WiFi devices in household" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{&quot;image_style&quot;:&quot;&quot;,&quot;image_link&quot;:&quot;&quot;,&quot;image_loading&quot;:{&quot;attribute&quot;:&quot;lazy&quot;}}" data-entity-type="media" data-entity-uuid="11ab749f-8df2-4d77-ad2a-642f1e511d0f" data-langcode="en" title="March 2025 Blog Internet of Things Cybersecurity" class="embedded-entity"> <img loading="lazy" src="/sites/default/files/AdobeStock_378969966%20-%20Gorodenkoff.jpg" alt="Internet of Things Interconnected WiFi devices in household" title="March 2025 Blog Internet of Things Cybersecurity" typeof="foaf:Image"> </div> <figcaption>© Gorodenkoff/Adobe Stock</figcaption> </figure> <p>&nbsp;</p> <p><strong>The Inherent Cybersecurity Risks of IoT&nbsp;</strong></p> <p>Some types of IoT devices are less likely to have strong security features, making them easy targets for cybercriminals. Hackers can take advantage of weaknesses like <a href="https://www.crowdstrike.com/en-us/cybersecurity-101/exposure-management/internet-of-things-iot-security/" target="_blank">easy-to-crack passwords, outdated software, or no built-in security protections</a> to steal data, spy on users, or cause disruptions.&nbsp;&nbsp;</p> <p>The rise of botnets, where a single hacker or group can take control of thousands—or even millions—of devices, is just one way that malicious actors are launching large-scale cyberattacks. One of the most infamous of these is the <a href="https://www.cisecurity.org/insights/blog/the-mirai-botnet-threats-and-mitigations" target="_blank">Mirai botnet</a>, which exploits weak default passwords to install malware in IP routers, cameras, and DVRs, remotely controlling them to act as “bots” for further attacks. In 2016, compromised devices were used to launch a massive Distributed Denial-of-Service (DDoS) attack, which overwhelmed websites and online services and caused widespread internet outages affecting platforms like Netflix and Reddit. In late 2024, Cloudflare reported mitigating a record-breaking DDoS attack that targeted an East Asia-based telecommunications firm, with the <a href="https://www.forbes.com/sites/kateoflahertyuk/2025/01/22/record-breaking-ddos-cyberattack-reaches-56-tbps-cloudflare-reports/" target="_blank">attack peaking at a record 5.6 terabits per second and lasting 80 seconds</a>. In early 2025, a large-scale DDoS attack caused intermittent <a href="https://www.wired.com/story/x-ddos-attack-march-2025?utm_source=chatgpt.com" target="_blank">outages to the social network X</a>.&nbsp;</p> <p>IoT devices in smart homes, fitness trackers, and industrial sensors also collect vast amounts of personal and business data. Without strong security, this information can be stolen or misused. <a href="https://www.asisonline.org/security-management-magazine/monthly-issues/security-technology/archive/2024/february/Internet-of-Things-Increasing-Threats-Electric-Grid/" target="_blank">IoT devices embedded in power grids</a>, hospitals, and transportation also open these crucial systems to real-world harm, including critical infrastructure outages or <a href="/blog/why-cybersecurity-is-important-for-the-healthcare-industry" target="_blank">medical equipment failures</a>.&nbsp;</p> <p><strong>Strategies to Strengthen IoT Security&nbsp;</strong></p> <p>To reduce these risks, individuals and businesses must take proactive steps. Changing default passwords and using multi-factor authentication (MFA) can strengthen security and prevent unauthorized access. <a href="https://www.mckinsey.com/industries/technology-media-and-telecommunications/our-insights/cybersecurity-for-the-iot-how-trust-can-unlock-value" target="_blank">Keeping firmware and software updated</a> is essential for fixing security holes and preventing exploits. Keeping IoT devices on a separate network from critical systems can also limit exposure in case of an attack, and encrypting communication between IoT devices can help prevent unauthorized access to sensitive data.&nbsp;</p> <p>Cybersecurity experts play a key role in developing and using new tools to combat these challenges. <a href="https://www.paloaltonetworks.com/cyberpedia/ai-risks-and-benefits-in-cybersecurity" target="_blank">Artificial intelligence can help identify unusual activity in real time</a>, allowing faster responses to cyber threats. The Zero Trust Architecture approach requires every device to be verified before accessing a network, reducing the chances of unauthorized access. Blockchain technology can create <a href="https://www.sciencedirect.com/science/article/pii/S2405844024149481#:~:text=Blockchain%20technology%20and%20the%20IoT%20offer%20a%20promising%20future%20for,allows%20for%20granular%20access%20control." target="_blank">secure, tamper-proof records of device activity</a>, making it harder for hackers to manipulate data. As IoT expands, the need for cybersecurity professionals grows, with ethical hackers, security analysts, and IoT risk managers playing a crucial role in protecting these networks.&nbsp;</p> <p><strong>Education in IoT Security&nbsp;</strong></p> <p>IoT is here to stay, and its security challenges will only increase as the network of connected devices expands. Cyber professionals must stay up to date with technological advancements, and how they work for, and against, sensitive IoT systems.&nbsp;</p> <p>Capitol Technology University’s award-winning programs in <a href="/fields-of-study/cyber-and-information-security" target="_blank">cyber and Information security</a> can prepare you to create this safer and more secure digital world. With resources such as our <a href="/student-experience/centers-and-labs/cyber-lab" target="_blank">Cyber Lab</a> and <a href="/student-experience/centers-and-labs/critical-infrastructure-center-cic" target="_blank">Critical Infrastructure Center</a> (CIC), as well as our expert faculty and partnerships with leading cyber agencies, Capitol Tech empowers graduates to succeed in this diverse and expanding field.&nbsp;</p> <p>To discover our academic programs, <a href="mailto:admissions@captech.edu" target="_blank">contact our Admissions team</a> or <a href="/request-information" target="_blank">request more information</a>.&nbsp;</p> <p lang="EN-US">&nbsp;</p> <p lang="EN-US"><em>Edited by Erica Decker&nbsp;</em></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-51066" class="section background-white"> <div class="super-contained"> </div> </section> Wed, 07 May 2025 13:38:43 +0000 emdecker 12946 at Cyber Attacks on Grocery Stores Threaten Food Security and Supply Chains /blog/cyber-attacks-on-the-food-industry-supply-chain Cyber Attacks on Grocery Stores Threaten Food Security and Supply Chains <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2025-03-07T16:08:34-05:00" title="Friday, March 7, 2025 - 16:08">March 7, 2025</time><br><br> </span> <img loading="lazy" src="/sites/default/files/cyberattacks%20on%20grocery%20stores%20and%20food%20industry.jpg" width="4832" alt="cashier scanning grocery store items" typeof="foaf:Image"> <p><span><span><span><span><span><span>We’ve all seen news reports with pictures of empty grocery store shelves and closed checkout lanes. While the cause of these problems has often come from some combination of factors like panic-buying, natural disasters, understaffing, or physical supply chain problems, there are new concerns about the vulnerability of digital systems that increasingly manage everything from inventory to logistics to transportation and more. In the near future, those empty shelves may be caused by something more sinister—cyberattacks.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>From Farm to Table: A History of Digital Transformation in the Food Industry</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Historically, food safety and security in the United States has focused on the improvement of physical labor conditions, manufacturing plant sanitation, and product quality control. Over the last century, federal <a href="https://www.fsis.usda.gov/about-fsis/history">agencies like the USDA and FDA have set rigorous standards</a> for food preparation, production, processing, and distribution to prevent contamination and reduce foodborne illnesses and related deaths. In today’s more technology-driven world, “<a href="https://www.techtarget.com/whatis/feature/The-future-of-the-food-industry-Food-tech-explained">food tech has become its own sector</a> with the rise of big data, AI and the internet of things (IoT).” While this shift has brought innovations such as food product tracking, inventory management efficiency, and streamlined logistics, it has also created new vulnerabilities via cyber hacking.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>According to a 2023 report by the Food and Agriculture-Information Sharing and Analysis Center (Food Ag-ISAC), the food and agriculture industry faced 167 ransomware attacks that year. This was the seventh highest out of eleven other sectors featured in the study, trailing critical manufacturing and financial services. The interconnectedness of the food industry’s infrastructure also creates vulnerability, as cyberattacks could quickly spread between systems and even affiliated companies. The food industry is estimated to be worth more than $1 trillion <a href="https://www.techtarget.com/whatis/feature/The-future-of-the-food-industry-Food-tech-explained">in the U.S.</a>, and with over 333 million people relying on the dependability of this market, the stakes are high.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Grocery Stores: The Next Cyber Frontier&nbsp;</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>A cyberattack on your local grocery store can create financial losses, threaten food security, and destabilize food supply chains. A successful attack could lead to those empty shelves at the store because companies cannot process deliveries. It could affect your wallet, too, because limited supply could eventually increase food prices. And the integrity of the food supply can be compromised if refrigeration systems are affected, causing food to spoil.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The often-limited cybersecurity resources and reliance of grocery stores on complex IT systems, especially among smaller regional chains, make them a prime target for cybercriminals to unleash attacks in a variety of ways.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Ransomware attacks using malicious software can prevent stores from processing payments, managing inventory, or even opening their electronic doors until they pay their attackers to release these systems. Data breaches can compromise sensitive customer information, eroding trust and increasing legal exposure. Attackers can also target third-party vendors to interrupt the flow of goods to stores. Point-of-sale skimming attacks, where compromised card readers steal payment data, can put customers at financial risk.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>In 2023, Dole, a well-known fruit and vegetable distribution company, was forced to pause North American production and shipments, leading to a nationwide lettuce supply shortage. In 2021, JBS, a multi-national food company, was attacked by hackers, resulting in a ransom payout of $11 million.</span></span></span></span></span></span></p> <p><span><span><span><span><em><span>“</span></em></span></span></span></span><span><span><span><strong><em><span>Food </span></em></strong></span></span></span><span><span><span><span><em><span>security is </span></em></span></span></span></span><span><span><span><strong><em><span>national </span></em></strong></span></span></span><span><span><span><span><em><span>security, so it’s critical that American agriculture is protected from cyber threats. No longer just some tech issue, cyberattacks have the potential to upend folks’ daily lives and threaten our food supply.” —<a href="https://www.gillibrand.senate.gov/news/press/release/gillibrand-cotton-colleagues-introduce-legislation-to-address-cybersecurity-threats-to-american-agriculture/">Rep. Elissa Slotkin, D-Mich</a>.</span></em></span></span></span></span></p> <p><span><span><span><span><span><span>For consumers, limited access to food can have devastating effects, particularly in vulnerable communities already facing food insecurity. The possible panic-buying and price-gouging that might result could make it harder for families to put food on their tables. Consumers may also resist shopping at stores they perceive as vulnerable, which could result in loss of business and even bankruptcy for the company.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Building a More Secure Food Supply Chain</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Protecting our food supply chain from cyberattacks requires proactive and coordinated strategies. At the federal agency level, it remains to be seen what impact the <a href="https://www.axios.com/2025/02/20/fda-food-division-cuts">major 2025 federal staffing and funding cuts will have on the ability to introduce or maintain food safety</a> and cybersecurity programs in the U.S.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>To combat cyberattack threats, <a href="https://www.forbes.com/sites/daphneewingchow/2024/09/20/agri-food-sector-under-increasing-threat-from-cyber-attacks/">grocery stores must strengthen their cybersecurity infrastructure</a>, including firewalls, intrusion detection systems, and data encryption. Regular vulnerability assessments and penetration testing can help identify weaknesses in systems before attackers can exploit them. Developing incident response plans is also crucial for minimizing the impacts of a successful attack. Outdated legacy systems should be reviewed and reworked as well, with modern technology and advanced cyber threats in mind.</span></span></span></span></span></span></p> <p><span><span><span><span><em><span>"The legacy systems that many companies rely on today are not built to withstand the complexity and scale of modern cyber threats. Unknown and unresolved issues within the underlying legacy software will continue to expose the companies to catastrophic failure or cyber attacks." —<a href="https://www.forbes.com/sites/daphneewingchow/2024/09/20/agri-food-sector-under-increasing-threat-from-cyber-attacks/">Cory Brandolini, co-founder of Railtown</a>&nbsp;</span></em></span></span></span></span></p> <p><span><span><span><span><span><span>Collaboration and information-sharing within the food industry can help stores and suppliers stay ahead of evolving cyber threats. And as <a href="https://www.cisecurity.org/insights/blog/why-employee-cybersecurity-awareness-training-is-important">knowledgeable employees are typically the first line of cyber defense</a>, comprehensive IT training and awareness programs to educate all staff—and consumers—about phishing scams, social engineering tactics, and other common attacks is a critical aspect of any cybersecurity plan. Protecting these digital systems and mitigating these threats is not only good for business, it is necessary for our communities to survive as we further integrate technology into this industry.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Exploring a Career in Cybersecurity</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Addressing the complex challenges of cybersecurity in supply chain management requires well-educated professionals equipped with the specialized knowledge and skills necessary to defend against a multitude of threats. Capitol Technology University's <a href="/fields-of-study/critical-infrastructure">critical infrastructure programs</a> are uniquely designed to meet this demand. Our curriculum delves into the specific vulnerabilities of critical systems, providing students with hands-on experience in areas like network security, penetration testing, and incident response. With resources such as our <a href="/student-experience/centers-and-labs/cyber-lab">Cyber Lab</a> and <a href="/student-experience/centers-and-labs/critical-infrastructure-center-cic">Critical Infrastructure Center</a> (CIC), as well as our expert faculty and partnerships with leading cyber agencies, Capitol Tech empowers graduates to succeed in this diverse and expanding field.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>To learn more,&nbsp;<a href="mailto:admissions@captechu.edu">contact our Admissions Department</a>&nbsp;or&nbsp;<a href="/request-information">request more information</a>.</span></span></span></span></span></span></p> <p>&nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-50796" class="section background-white"> <div class="super-contained"> </div> </section> Fri, 07 Mar 2025 21:08:34 +0000 zqureshi 12766 at White House Cyber Initiative Aims to Fill 500,000 Open Cybersecurity Jobs /blog/critical-shortage-of-cybersecurity-professionals White House Cyber Initiative Aims to Fill 500,000 Open Cybersecurity Jobs <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2024-11-22T15:36:23-05:00" title="Friday, November 22, 2024 - 15:36">November 22, 2024</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Cyber%20Professionals%20Working%20on%20Cyber%20Initiative.jpg" width="640" alt="Cyber Professionals Working on Cyber Initiative" typeof="foaf:Image"> <p><span><span><span><span><span><span>In an increasingly interconnected world, cybersecurity has become an international concern. From protecting sensitive data to safeguarding critical infrastructure, skilled cybersecurity professionals are in high demand. However, the shortage of qualified experts poses a significant challenge. Recognizing this urgency, the U.S. White House’s Office of the National Cyber Director recently launched the "Service for America” program, which aims to fill approximately 500,000 open cybersecurity positions in the United States by connecting Americans with jobs in cybersecurity, technology, and artificial intelligence (AI).</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>The White House Cyber Initiative Addresses Critical Shortage of Cybersecurity Professionals</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>The "<a href="https://www.whitehouse.gov/oncd/preparing-our-country-for-a-cyber-future/service-for-america/">Service for America</a>" program is a collaborative effort between the federal Office of Management and Budget (OMB), and the Office of Personnel Management (OPM). The primary goal is to address the critical shortage of cybersecurity professionals in the American job market. By establishing clear pathways for individuals seeking cybersecurity careers, National Cyber Director Harry Coker Jr. explains, the initiative can bring awareness to unknown positions, as “many Americans do not realize that a cyber career is available to them.” Whether through <a href="https://news.clearancejobs.com/2024/09/09/white-house-cyber-initiative-aims-to-fill-500000-open-cybersecurity-jobs/">formal education, apprenticeships, or reskilling programs</a>, the initiative aims to guide aspiring professionals toward relevant opportunities.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Recognizing that <a href="/blog/the-need-for-women-in-cybersecurity">diversity enhances problem-solving and innovation</a>, the initiative actively encourages participation from underrepresented groups. In doing so, it seeks to create a more inclusive and robust cybersecurity workforce.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Specific actions taken in promotion of this initiative include the development of the National Initiative for Cybersecurity Careers and Studies (NICCS) <a href="https://niccs.cisa.gov/workforce-development/cyber-career-pathways-tool">Cyber Career Pathways Tool</a> that “presents a new and interactive way to explore work roles within the Workforce Framework for Cybersecurity (NICE Framework).” <a href="https://www.whitehouse.gov/wp-content/uploads/2024/09/Service-for-America-Checklist-for-Job-Seekers.pdf">USAJobs applicants are also encouraged to include the term</a> “ServiceForAmerica” tag in their resume to make it more searchable for federal hiring managers. There are also several recommended portals and events that cyber career applicants are recommended to explore.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Additionally, the program is <a href="https://www.whitehouse.gov/oncd/briefing-room/2024/10/18/service-for-america-cyber-talent-is-everywhere-and-opportunity-should-be-too/">collaborating with universities, community colleges, and technical schools</a> like Pennsylvania Cybersecurity Center (PCC) and University of Wisconsin-Whitewater (UW-Whitewater) to develop specialized cybersecurity curricula. <a href="/blog/importance-of-higher-education-cybersecurity-studies">By aligning education with industry needs</a>, it ensures that graduates are well-prepared for real-world challenges. And because existing professionals need continuous training to keep pace with evolving threats, the program is <a href="https://federalnewsnetwork.com/cybersecurity/2024/09/wh-launches-cyber-hiring-sprint-to-fill-open-tech-roles/#:~:text=The%20White%20House%20is%20pushing%20to%20fill%20hundreds%20of%20federal">investing in upskilling and professional development programs</a> to enhance the capabilities of the current workforce.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Some institutions have been forging pathways to cybersecurity education for several decades. Since 1927, Capitol Technology University was established on the foundation of this need for accessible education in industry relevant skills, and offers <a href="/fields-of-study/cyber-and-information-security">Cybersecurity programs for professional career development</a>. Designated by the National Security Agency (NSA) and Department of Defense (DoD) as a National Center of Academic Excellence in Cyber Defense (NCAE-CD), Capitol Tech is a recognized leader in cyber education.&nbsp;</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Examining Other Cyber Workforce Initiatives</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Other cyber initiatives, such as "Service for America," build upon previous efforts by the government to bolster cybersecurity education and recruitment. The <a href="https://www.nist.gov/itl/applied-cybersecurity/nice">National Initiative for Cybersecurity Education(NICE)</a> was launched in 2014 by the National Institute of Standards and Technology (NIST) to focus on cybersecurity education, training, and workforce development. It provides a framework for defining skills, competencies, and career pathways.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The <a href="https://new.nsf.gov/funding/opportunities/sfs-cybercorps-scholarship-service">Scholarships for Service program</a>, administered by the National Science Foundation (NSF), offers scholarships to undergraduate and graduate students pursuing cybersecurity degrees. In return, recipients commit to working in federal agencies for a set number of years upon graduation. Similarly, the <a href="https://sfs.opm.gov/">CyberCorps Scholarship for Service program</a> provides scholarships to students studying cybersecurity. Graduates then serve in government agencies or critical infrastructure sectors, helping protect national interests.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>The Critical Need for Cybersecurity Professionals</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Malicious actors can use advancing technology like AI and cyrptography to better exploit vulnerabilities in software, networks, and critical infrastructure. The <a href="https://www.mckinsey.com/industries/public-sector/our-insights/follow-the-leaders-how-governments-can-combat-intensifying-cybersecurity-risks">need for skilled professionals who can defend against these threats</a> is more critical than ever. Cybersecurity experts play a crucial role in ensuring system integrity, while also <a href="https://www.cisa.gov/topics/cyber-threats-and-advisories">protecting against and mitigating the fallout from an increasing number of data breaches and cyberattacks</a>.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>The "Service for America" initiative represents a significant step toward closing the cybersecurity job gap. By educating, diversifying, and upskilling the workforce, government and private organizations can better defend against cyber threats and secure our digital future.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>To learn more about Cybersecurity programs at Capitol Technology University,&nbsp;<a href="mailto:admissions@captechu.edu">contact our Admissions team</a> or <a href="/request-information">request more information</a>.</span></span></span></span></span></span></p> <p>&nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-49476" class="section background-white"> <div class="super-contained"> </div> </section> Fri, 22 Nov 2024 20:36:23 +0000 zqureshi 12441 at Are Passwords Becoming a Thing of the Past? /blog/are-passwords-becoming-thing-of-past Are Passwords Becoming a Thing of the Past? <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2024-09-09T10:58:48-04:00" title="Monday, September 9, 2024 - 10:58">September 9, 2024</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Passwords-less%20Future%20Blog%20Sept%202024.jpg" width="640" alt="Passwords-less Future with Biometrics and AI" typeof="foaf:Image"> <p><span><span><span>In recent years, a conversation around the future and usefulness of passwords has grown among tech giants and cybersecurity professionals. The possibility of a password-less future, while not entirely new, has gained significant interest with the advancement of artificial intelligence, biometrics, and other technologies. While a complete shift away from passwords has yet to materialize, it may be closer than ever before. </span></span></span></p> <p><span><span><span><strong>The Password Landscape</strong></span></span></span></p> <p><span><span><span>Passwords have long been the cornerstone of digital security, but their effectiveness has been increasingly questioned. <a href="https://www.microsoft.com/en-us/security/blog/2021/09/15/the-passwordless-future-is-here-for-your-microsoft-account/?msockid=1566e1a9ab016a9d20e6f0afaa746b66">The rise in data breaches, phishing attacks, and the general inconvenience of managing multiple complex passwords</a> have led to calls for a more secure and user-friendly solution. Several tech companies are at the forefront of the password-less movement, each implementing innovative methods to enhance security and improve user experience.</span></span></span></p> <p><span><span><span>Microsoft, for instance, has introduced password-less sign-ins for many of its services, using methods like Windows Hello, which leverages facial recognition, and FIDO2 security keys, which allow users to authenticate with biometrics or a security key. Google has been promoting the use of two-factor authentication and has integrated biometric authentication into its services as well, recently announcing that <a href="https://www.msn.com/en-us/news/technology/google-is-getting-ready-to-kill-passwords-seriously/ar-AA1hZOeT#:~:text=Passwords%20aren%E2%80%99t%20going%20away%20immediately%2C%20and%20it%20will,opt%20out%20of%20using%20passwords%20altogether%2C%20for%20now.">passkeys would replace passwords as the default sign-in method</a>. Apple’s Face ID and Touch ID are prime examples of biometric authentication that aim to replace traditional passwords. These companies are not only enhancing security but also improving user experience by reducing the reliance on passwords and creating an easier and more convenient authentication process.</span></span></span></p> <p><span><span><span><strong>Password-less Pros and Cons</strong></span></span></span></p> <p><span><span><span>According to Verizon, <a href="https://www.cnbc.com/2022/04/24/what-a-future-without-passwords-would-look-like-when-it-might-happen.html">more than 80% of data breaches result from weak or compromised passwords</a>, so the push for password-less authentication brings several advantages. Enhanced security is a significant benefit, as password-less methods such as biometrics and hardware tokens are generally harder to steal or replicate due to their nature. Eliminating the need to remember multiple passwords simplifies the user experience, and biometric authentication, for example, is quick, easy, and always within the user’s control. Additionally, with less credentials to steal, phishing attacks could become less prevalent. </span></span></span></p> <p><span><span><span>However, a password-less future would also present new challenges. Implementation costs can be a significant barrier for organizations, as transitioning to password-less systems would likely require new hardware and software for capturing or storing biometric or passkey data. Many alternatives are only available on select websites and apps, meaning <a href="https://www.consumerreports.org/electronics/digital-security/should-you-use-passkeys-instead-of-passwords-a1201817243/?msockid=1566e1a9ab016a9d20e6f0afaa746b66">users may need to manage both passwords and alternative authentication methods</a> until the technology becomes more widely used. Because biometric data cannot be changed, it can pose significant privacy risks if compromised. And not all users may have access to the necessary technology, such as smartphones with biometric capabilities and physical security keys, nor is everyone comfortable with having their biometric information captured for privacy reasons.</span></span></span></p> <p><span><span><span><strong>The Impact of AI on Cybersecurity and Passwords</strong></span></span></span></p> <p><span><span><span>AI is playing a crucial role in the development and implementation of password-less authentication methods. Behavioral biometrics, for instance, use AI to analyze patterns in user behavior, such as typing speed and mouse movements, to authenticate users without the need for passwords. AI-powered voice recognition systems are also being developed to authenticate users based on their unique vocal patterns. Additionally, AI algorithms can detect unusual activities and potential security threats in real-time, providing an additional layer of security.</span></span></span></p> <p><span><span><span>The intersection of AI and cybersecurity is fostering new trends that support the move towards password-less authentication through "adaptive authentication."&nbsp;<a href="https://www.onelogin.com/learn/what-why-adaptive-authentication">AI systems can adapt authentication methods</a> based on the context, such as the user’s location or the device being used, which can enhance security without compromising convenience. Continuous authentication is another trend where AI continuously monitors and authenticates users throughout their session, thus reducing the risk of unauthorized access. The zero-trust security approach, which assumes that threats could be both external and internal, leverages AI to continuously verify users and devices, making password-less authentication more robust. Conversely, AI technology is also <a href="https://www.forbes.com/sites/daveywinder/2024/06/19/smart-guessing-algorithm-cracks-87-million-passwords-in-under-60-seconds/">making it easier for passwords to be cracked</a> through tactics like “smart-guessing algorithms.”</span></span></span></p> <p><span><span><span>While passwords have been a staple of digital security for decades, the push towards password-less authentication is gaining momentum. Tech companies are leading the charge, leveraging AI and other technologies to create more secure, robust, and user-friendly authentication methods. However, the transition comes with its own set of challenges, including implementation costs and privacy concerns. As AI and cybersecurity continue to evolve, the dream of a password-less future may soon become a reality.</span></span></span></p> <p><span><span><span><strong>Cybersecurity Programs at Capitol Tech</strong></span></span></span></p> <p><span><span><span>Capitol Technology University offers a variety of <a href="/fields-of-study/cyber-and-information-security">Cybersecurity</a>&nbsp;and <a href="/fields-of-study/computer-science-artificial-intelligence-and-data-science">Computer Science programs</a> that can prepare you to create a password-less future and analyze the risks and cyberthreats of today’s digital landscape. To learn more, <a href="mailto:admissions@captechu.edu">contact our Admissions team</a> or <a href="/request-information">request more information</a>. </span></span></span></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a>, <a href="/blog/category/artificial-intelligence" hreflang="en">Artificial Intelligence</a> <section id="section-48891" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 09 Sep 2024 14:58:48 +0000 emdecker 12196 at Top Cyber Scams to Watch Out For in 2024 /blog/top-cyber-scams-watch-out-2024 Top Cyber Scams to Watch Out For in 2024 <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2024-07-22T11:17:46-04:00" title="Monday, July 22, 2024 - 11:17">July 22, 2024</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Top%20Scams%20of%202024%20Blog%20-%20July%202024.jpg" width="640" alt="Top Cyber Scams of 2024" typeof="foaf:Image"> <p>Digital-based scams are nothing new, but recent technological developments – especially in artificial intelligence – are helping scammers grow more sophisticated in their attacks and leaving users more vulnerable. In 2023, the FBI reported nearly 900,000 cases of suspected internet crime totaling nearly $12.5 billion in damages and losses. The lucrative nature of these attacks and the challenge users face in battling these evolving schemes means these numbers are likely to increase in the future unless we take proactive measures to protect ourselves. Here, we look at some of the newest and most innovative scams to watch out for in 2024 and beyond.&nbsp;</p> <p><strong>Crypto Scams&nbsp;</strong></p> <p><a href="https://www.forbes.com/advisor/investing/cryptocurrency/top-crypto-scams/" target="_blank">Investment scams promise huge financial gains on cryptocurrency investments</a> for the holder if they transfer their cryptocurrency to the fake financial manager. Scammers may also pray on individuals’ vulnerabilities by posing as celebrities or potential love interests, or socially engineer scams through social media. Once the crypto is transferred, the criminal sells or offloads the coin, leaving the original holder empty-handed.&nbsp;</p> <p>Cryptocurrency phishing scams involve deceptive tactics that trick individuals into revealing sensitive information, such as private keys or personal details related to their digital wallets. Scammers often initiate these attacks through email, social media, and text messages. By sending emails that mimic legitimate crypto exchange communications or creating lookalike replicas of authentic crypto trading platforms, scammers may get users to unknowingly enter their private keys onto these sites.&nbsp;&nbsp;</p> <p>Scammers are also targeting crypto holders through fake software upgrades and stealing two-step verification codes often required to access digital wallets. Others set up fake crypto exchanges and wallets, enticing users with lower prices and frequent investment requests.&nbsp;</p> <p><strong>Robocall Scams</strong>&nbsp;</p> <p>Long the bane of nearly all recipients, robocalls are nothing new. However, as these calls become powered by artificial intelligence, they are becoming increasingly convincing and manipulative. AI can be used to clone voices and spoof numbers, making scam calls look like legitimate outreach from banks, government agencies, and other organizations. “When combined with well-thought-out social engineering campaigns, GenAI can cause unprecedented financial damage in mass-scale phishing or fraud campaigns,” states&nbsp;Dr. Ilia Kolochenko, an adjunct professor at Capitol Technology University and global cybersecurity expert, <a href="/news-events/first-ai-robocall-scammer-named-fcc-capitol-tech-faculty-gives-expert-opinion-fox-news" target="_blank">in his recent interview with Fox News</a>. &nbsp;</p> <p>AI is even being used to spoof voices of family members and other loved ones <a href="https://www.newyorker.com/science/annals-of-artificial-intelligence/the-terrifying-ai-scam-that-uses-your-loved-ones-voice" target="_blank">to fake kidnappings and demand ransom</a>. These scams are so prevalent and dangerous that <a href="https://www.wired.com/story/ai-generated-voices-robocalls-illegal-fcc/" target="_blank">using AI-generated voices in robocalls is now illegal in the United States</a>.&nbsp;</p> <p lang="EN-US"><strong>Exploitive Emails&nbsp;</strong></p> <p lang="EN-US">The number of exploitive spam and scam emails that people receive daily is daunting. Some hackers have found a <a href="https://it.ucsf.edu/jan-2023-phishing-attacks-abuse-microsoft-onenote" target="_blank">new exploitation by using a workaround within OneDrive and the app, OneNote</a>. They send what looks to be a legitimate link to your email, which opens a OneNote file. There may be a “button” to press, such as “View PDF Here,” which is actually an overlay banner hiding several run scripts and .exe (execute) files underneath. When you click the “button”, you initiate a malware download onto your device. They can also manipulate the OneNote file to ask you to enter your OneDrive credentials. If you receive an unexpected OneDrive or OneNote file from a trusted sender, such as in the workplace, it is best to call the sender to be sure it’s safe before opening.&nbsp;</p> <p><strong>AI-Powered Scams&nbsp;</strong></p> <p>Despite many of these tech-based scams being around for decades, artificial intelligence is helping to make them easier to set up and harder to detect. AI is being used to <a href="https://www.fbi.gov/contact-us/field-offices/sanfrancisco/news/fbi-warns-of-increasing-threat-of-cyber-criminals-utilizing-artificial-intelligence" target="_blank">write more believable text for phishing emails and create fake social media profiles</a> that can trick users into sharing personal information. Fake apps and websites may claim to use GPT technology but are a vehicle for scammers to trick users into entering sensitive information. And AI-powered scams are deceiving people in two of their most vulnerable settings – in the workplace and in their love lives – by creating convincing but fake job postings and online dating profiles. Backed by AI, these scams can more efficiently and effectively trick users and leave them vulnerable to financial and emotional exploitation.&nbsp;</p> <p><strong>Other Cyber Threats&nbsp;</strong></p> <p>While these scams may be the most novel or prevalent, there are plenty of other cyberthreats threatening our financial security. Instead of being erased chemically, <a href="https://www.aarp.org/money/scams-fraud/info-2023/top-scammer-list.html" target="_blank">physical checks can be altered digitally</a> and reprinted to show a new payee and then deposited through a mobile banking app. Scammers can also capture your simple responses during a phone call to create a deepfake of your voice to navigate automated phone menus and conversations for their benefit. These deepfakes&nbsp;can be applied to the common “grandparent scam,” where someone pretends to be a grandchild in legal trouble who calls their grandparent asking for money. In a similar tactic, scammers may pretend to be a family member who is having trouble on a trip – a lost wallet, a run in with police, a medical emergency – and then reach out to a person’s phone contacts or Facebook friends asking for money. Fraudulent claims that you’ve won a digital sweepstakes can leave you vulnerable to identify theft as well, as scammers may ask for personally identifiable information like a social security number to distribute your prize. When they have that information, they can open credit cards in your name and access other financial resources.&nbsp;</p> <p lang="EN-US"><strong>Quick Tips for Protecting Against Scams&nbsp;</strong></p> <p lang="EN-US">When protecting yourself against cybercriminals, you must be vigilant and wary of incoming threats. From emails to physical mail to phone calls to social media messages – <a href="https://consumer.ftc.gov/articles/how-avoid-scam" target="_blank">each of these avenues has potential for scams</a>. Below are just a few of the many tips that can help prevent falling victim to such crimes:&nbsp;</p> <ul role="list"> <li> <p lang="EN-US">DO NOT CLICK any links within an email, text, or social media message that you do not trust. If you do trust the sender and they send you a link unexpectedly, call them to verify first. Even trusted sources can get hacked, and even just clicking a link or opening a PDF, etc. can install malware onto your computer.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">If it sounds too good to be true, it is. Do not trust offers of money, free items, or suspiciously good deals, especially if it requires an exchange of sensitive information, money up front, or bargaining outside of a protected site.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Hover your mouse over a hyperlink (do not click it) to check what the actual link directs to – if it is different from the hyperlink text, avoid it.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Be wary of solicitors that call you first, or out of the blue. For example, if your bank calls you asking for information, politely hang up and call the number on their official website and check if they just called you. More likely than not, the original call&nbsp;was not from them.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Look out for spoof numbers that pretend to be from a legitimate source. Malicious actors can mask their numbers to read as actual government agencies like the FBI.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Agencies like the IRS, <a href="https://mva.maryland.gov/about-mva/Pages/Premier-Customer-Protection.aspx" target="_blank">MVA (DMV)</a>, and United States Postal Service have specific methods of contacting you and what information they collect. For example, the IRS will never call or email you, they only send physical mail, and the USPS will not text you about a package hold. Be wary of suspicious communications from people who claim they are from these agencies.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Shred documents and mail that display your information before throwing them away.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Be on the alert for Facebook marketplace or Craigslist scams, like fake paper bills, fake Zelle and PayPal emails or texts, and other scams. &nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Do not log into an account from an email or text received. Type the site into your browser or log in from the app. &nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Set up online banking alerts for any transaction run on your credit card or accounts. Most banks will send a text alert for any charge, or changes made to your account, but you often need to set these parameters yourself.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Consider setting up secure online payments for bills instead of sending physical checks in the mail, as this practice has become increasingly risky.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Install and routinely run anti-virus on your devices from trusted vendors and have your Windows, Android, or Apple software set to update regularly. Security patches are important for protecting your computer and cell phone.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p lang="EN-US">Do your research – watching the news, joining your neighborhood’s Nextdoor app group, and searching information online from legitimate sites can help you stay in-the-know as to what to watch out for when it comes to both local and global scams.&nbsp;</p> </li> </ul> <p><strong>Cybersecurity Education with Capitol Tech&nbsp;</strong></p> <p>Capitol Technology University is a leader in cybersecurity education, recognized by the National Security Agency (NSA) and Department of Defense (DoD) as a National Center of Academic Excellence in Cyber Defense (NCAE-CD). We are committed to cyber education that emphasizes the ethical and technical proficiencies needed to excel in the field. Our <a href="/fields-of-study/cyber-and-information-security" target="_blank">Cyber &amp; Information Security programs</a> teach students how to identify and protect against cyber scams that threaten organizations, helping them become experts across many industries and trades. For more information,&nbsp;<a href="mailto:admissions@captechu.edu" target="_blank">contact our Admissions team</a> or <a href="/request-information" target="_blank">request more information</a>. &nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a>, <a href="/blog/category/artificial-intelligence" hreflang="en">Artificial Intelligence</a> <section id="section-48466" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 22 Jul 2024 15:17:46 +0000 emdecker 11886 at The Importance of Higher Education in Cybersecurity Studies /blog/importance-of-higher-education-cybersecurity-studies The Importance of Higher Education in Cybersecurity Studies <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2024-06-06T09:06:05-04:00" title="Thursday, June 6, 2024 - 09:06">June 6, 2024</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Capitol%20Tech%20Dr.%20Butler%20with%20Cyber%20Student.jpg" width="640" alt="Capitol Tech's Dr. Butler with Cyber Student" typeof="foaf:Image"> <p>The global demand for cybersecurity professionals is significant. Despite recent growth in the field, there’s still a shortage of roughly 4 million cybersecurity experts. And many cybersecurity jobs are resilient to economic downturns, making them a secure choice for your career.&nbsp;</p> <p>Whether you're a student or a professional, gaining formal education and expertise in cybersecurity is paramount. University programs can provide a comprehensive understanding of technical expertise combined with practical experience and interpersonal skills. A cybersecurity degree can open doors to diverse, adjacent career paths and networking opportunities. Staying on top of emerging trends through continuous learning and certifications is crucial. Universities must adapt by offering relevant curricula, industry collaborations, and alignment with certifications. By doing so, they play a crucial role in preparing the next generation of cybersecurity professionals to safeguard our digital landscape.&nbsp;</p> <p><strong>Earning a Cybersecurity Degree&nbsp;</strong></p> <p>Pursuing a degree in cybersecurity is a valuable step for those aspiring to join the field. Cybersecurity programs offer a well-rounded education, <a href="https://www.forbes.com/advisor/education/it-and-tech/cybersecurity-degree/" target="_blank">covering key areas such as network security, programming, cryptography, incident response, risk management, and risk assessment</a>. This foundational knowledge, encompassing computer science, networking, information systems, and security principles, equips students with a robust understanding of cybersecurity fundamentals, including the nature of cyber threats and strategies to counter them.&nbsp;</p> <p>These programs can also provide practical experience with security tools and technologies <a href="/student-experience/builder-culture/student-projects" target="_blank">through labs and projects, ensuring students are job ready</a>. Importantly, they can foster the development of critical thinking, problem-solving, and communication skills, which are vital in a field where technical information often needs to be conveyed to non-technical stakeholders.&nbsp;</p> <p>The combination of theoretical knowledge and hands-on technical skills is highly sought after by employers. Obtaining a degree not only demonstrates a commitment to the cybersecurity field and a solid grasp of its core concepts, but it also enhances one’s credibility as a subject matter expert – often ensuring a higher salary to reflect this.&nbsp;</p> <p>A cybersecurity degree can pave the way for <a href="https://umsafoundation.org/10-reasons-why-a-cyber-security-degree-is-worth-it/" target="_blank">a broad spectrum of career paths and advancement opportunities</a> within the field. It allows for specialization in areas such as cyber defense, ethical hacking, and cyber policy, and creates opportunities in diverse industries, including finance, insurance, healthcare management, and consulting. Additionally, a foundation in cybersecurity can inform adjacent fields like cyberpsychology, <a href="/blog/powering-our-defenses-doe-invests-energy-sector-cybersecurity" target="_blank">critical infrastructure</a>, law enforcement, and more.&nbsp;</p> <p>Furthermore, university programs often enable networking opportunities with industry professionals, professors, and fellow students. These connections can offer valuable insights, advice, and job opportunities, as well as foster collaboration on projects and research that can enrich the learning experience.&nbsp;</p> <p><strong>Continuing Education and Professional Development</strong>&nbsp;</p> <p>The field of cybersecurity is in a constant state of flux, with new threats, technologies, and regulations regularly emerging. A formal education equips you with the necessary tools and mindset to adapt to these changes and stay at the forefront of your career, as it is crucial to stay informed about current trends and tactics.&nbsp;</p> <p>In addition to a degree program, <a href="https://niccs.cisa.gov/education-training/cybersecurity-certifications" target="_blank">earning industry-relevant and job-specific certifications</a> may be necessary and can enhance your resume, particularly with professional experience earned. Certifications such as the Certified Information Systems Security Professional (CISSP), Cybersecurity and Infrastructure Security Agency (CISA), and Certified Ethical Hacker (CEH) are well-regarded in the cybersecurity field and can strengthen your marketability and career prospects.&nbsp;</p> <p>Technological advancements, such as the <a href="/blog/how-iot-puts-consumers-risk-of-cyber-attacks" target="_blank">rapid expansion of Internet of Things</a> (IoT) devices and the rise of AI, along with unforeseen challenges like the COVID-19 pandemic, can introduce new vulnerabilities and opportunities for the exploitation of sensitive systems and information. Self-learning is key to staying informed and adaptable in the ever-changing cyber landscape. This can be achieved through online resources, courses, and active participation in online communities and conferences.&nbsp;&nbsp;</p> <p>A <a href="/fields-of-study/cyber-and-information-security" target="_blank">blend of formal education</a>, certifications, and a commitment to lifelong learning can lay a strong foundation for a successful cybersecurity career, enabling you to safeguard your organization’s assets effectively – effectively making you a highly sought after candidate in a competitive job landscape.&nbsp;</p> <p><strong>Building Strong Cybersecurity Programs in Higher Education&nbsp;</strong></p> <p>To stay relevant in cybersecurity education, universities need to adapt their programs to keep pace. Designing a strong curriculum that covers both fundamental concepts and in-demand skills like ethical hacking and cloud security is critical. Updating courses regularly and recruiting faculty with industry experience can ensure students learn from those who have been in the field.&nbsp;</p> <p>Educational programs that teach both cybersecurity theory and practical experience through labs, simulations, and real-world projects are better suited to prepare their graduates for success. Similarly, universities can facilitate industry collaborations by partnering with cybersecurity companies, <a href="/news-events/white-house-oncd-invites-capitol-technology-university-roundtable-discussion" target="_blank">government agencies</a>, and non-profits. This opens doors for guest lectures, internships, and joint research projects, giving students valuable industry exposure. Because cyber education should continue after graduation, universities should integrate content aligned with industry certifications that prepare students for credentialing exams.&nbsp;</p> <p>Universities should seek designations such as <a href="/news-events/capitol-tech-chosen-nsa-lead-regions-cybersecurity-programs" target="_blank">National Centers of Academic Excellence in Cybersecurity from the National Security Agency</a> to showcase program quality and attract talented students. Finally, universities should promote diversity in the field by encouraging underrepresented groups to pursue cybersecurity careers. Coupled with efforts to teach students about ethical hacking, privacy, and legal considerations, these initiatives can ensure students graduate as responsible cybersecurity professionals.&nbsp;</p> <p><strong>Cybersecurity Programs at Capitol Tech&nbsp;</strong></p> <p>Cybersecurity is a constantly changing field, where earning an accredited degree can position you for long-term success. Capitol Technology University’s degree programs in <a href="/fields-of-study/cyber-and-information-security" target="_blank">Cyber and Information Security</a> prepare you through&nbsp;an award-winning curriculum, hands-on skills, and networking opportunities with the world’s top experts, government agencies, and corporate partners –&nbsp;all invested in your progress towards mastering&nbsp;cybersecurity.&nbsp;</p> <p>Capitol Tech is a <a href="/about-capitol/why-capitol-tech" target="_blank">leading STEM institution with a strong history of cybersecurity higher education</a>. We provide many offerings to our students to boost their cyber-focused learning. A degree with Capitol Tech is highly regarded within the industry and can&nbsp;help distinguish you in an ever-changing and competitive field.&nbsp;</p> <p>To learn more, <a href="mailto:admissions@captechu.edu" target="_blank">contact our Admissions team,</a>&nbsp;<a href="/admissions-and-financial-aid/capitol-connections" target="_blank">attend an online info session</a>, or <a href="/request-information" target="_blank">request more info</a> today!&nbsp;</p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a>, <a href="/blog/category/stem" hreflang="en">STEM</a> <section id="section-48186" class="section background-white"> <div class="super-contained"> </div> </section> Thu, 06 Jun 2024 13:06:05 +0000 emdecker 11786 at The Urgent Need for Women in Cybersecurity /blog/the-need-for-women-in-cybersecurity The Urgent Need for Women in Cybersecurity <span><span lang about="/user/69396" typeof="schema:Person" property="schema:name" datatype>edragisic</span></span> <span><time datetime="2023-03-02T14:54:37-05:00" title="Thursday, March 2, 2023 - 14:54">March 2, 2023</time><br><br> </span> <img loading="lazy" src="/sites/default/files/the-need-for-women-in-cybersecurity.jpg" width="640" alt="a woman of color stands using a laptop in front of a wall of wires to demonstrate the need for women in cybersecurity" typeof="foaf:Image"> <p><span><span><span><span><span><span>In recent years, the field of cybersecurity has become increasingly important as businesses and governmental industries rely more on technology to store and protect sensitive data. Despite the critical role that cybersecurity professionals play in protecting these assets and the extraordinary need for a full workforce, the industry has traditionally been dominated by men. However, there is a growing recognition that we need more women in the field of cybersecurity to address the shortage of skilled professionals and to bring diversity of thought and skill to the industry.&nbsp;</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>The Demand for Women in Cybersecurity</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>First and foremost, the cybersecurity industry is facing a shortage of skilled professionals. <a href="https://www.isc2.org/News-and-Events/Press-Room/Posts/2022/10/20/ISC2-Research-Reveals-the-Cybersecurity-Profession-Must-Grow-by-3-4-Mil-to-Close-Workforce-Gap#:~:text=70%25%20of%20respondents%20report%20their,extreme%22%20risk%20of%20a%20cyberattack.">According to a report by (ISC)<sup>2</sup></a>, </span></span></span></span></span></span><span><span><span><span><span><span>the world's largest nonprofit association of cybersecurity professionals, the global shortage of cybersecurity professionals reached 4.07 million in 2019, up from 2.93 million in 2018. This shortage is a significant concern, as it means that businesses and government agencies are struggling to find the expertise they need to protect their assets from cyber threats. Increasing the number of women in the field can help to address this shortage, as women represent a largely untapped source of talent in cybersecurity.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Women are also uniquely positioned to address the cybersecurity skills gap in developing countries. In many other countries besides the US, there is a shortage of skilled cyber leaders. Female cybersecurity professionals can help to address this gap by taking positions overseas, while also promoting gender equality and empowerment in these countries. Through the right education and training, women can help close the tech skills gap in developing nations.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>The Value of Increased Diversity in Cybersecurity</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Women also bring diversity of thought and unique perspectives to the cybersecurity industry. <a href="https://hbr.org/2019/02/research-when-gender-diversity-makes-firms-more-productive">Research has shown that diverse teams are more innovative, productive, and creative</a>, </span></span></span></span></span></span><span><span><span><span><span><span>as they bring different viewpoints, experiences, and skills to the table. This is particularly important in cybersecurity, where attackers are constantly evolving their tactics and techniques. By having a diverse team of cybersecurity professionals, organizations are better equipped to identify and respond to emerging threats.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Finally, increasing the number of women in cybersecurity can help to promote a more inclusive and diverse industry. Women currently make up only a small percentage of the cybersecurity workforce, and they face many challenges including unconscious bias, discrimination, and lack of representation. By employing more women in cyber, we can help to create a more inclusive and welcoming environment for all cybersecurity professionals, regardless of gender, race, ethnicity, or background. </span></span></span></span></span></span></p> <p><span><span><span><span><span><span><a href="/student-experience/centers-and-labs/center-women-cyber">Capitol Technology University recently opened the Center for Women in Cyber</a> for this very purpose––to promote the inclusion of women in this critical industry and to give the future female industry leaders a voice. Through training programs, webinars, workshops, and other events, the Center for Women in Cyber encourages women to step up and become role models within the cybersecurity industry and take charge of a field largely dominated by men.</span></span></span></span></span></span></p> <p>&nbsp;</p> <p><span><span><span><span><span><span><em>Written by Erica Decker</em></span></span></span></span></span></span></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a>, <a href="/blog/category/women-in-stem" hreflang="en">Women in STEM</a> <section id="section-41091" class="section background-white"> <div class="super-contained"> </div> </section> Thu, 02 Mar 2023 19:54:37 +0000 edragisic 9741 at Social Engineering Threatens Windows 11 Upgrade /blog/social-engineering-threatens-windows-11-upgrade Social Engineering Threatens Windows 11 Upgrade <span><span lang about="/user/69196" typeof="schema:Person" property="schema:name" datatype>emdecker</span></span> <span><time datetime="2022-02-24T12:16:33-05:00" title="Thursday, February 24, 2022 - 12:16">February 24, 2022</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Social%20Engineering%20Threatens%20Windows%2011%20Upgrade.jpg" width="640" alt="Computer Coding" typeof="foaf:Image"> <p><span><span><span><span>Windows 11, the latest version of the Microsoft Windows operating system (OS), was released in October 2021 with a broad upgrade deployment hitting in late January. Between media related to the OS release and many systems pushing out recommended checks for upgrading, users were encouraged to check out the new version. For hackers, it was the perfect time to employ social engineering tricks to lure users into installing malware via a fake installer.</span></span></span></span></p> <p><span><span><span><span>Hewlett-Packard (HP) was the first to identify the malicious software. On January 27, the day after Windows posted their announcement of the OS’s final upgrade phase, hackers registered the domain “windows-upgraded.com” to an organization located in Moscow, Russia. This housed a fake installer containing malware, </span><a href="https://threatresearch.ext.hp.com/redline-stealer-disguised-as-a-windows-11-upgrade/">HP’s Threat Research Blog reports</a><span>. HP refers to this as a “topical lure” – since this was a hot topic at the time, that can be easily used to take advantage of users’ expectations and interest. Creating domain names that are similar to existing and trusted domains is a popular form of social engineering. Many users don’t look that closely at the URL they are visiting – especially if that link is found and clicked on via a search engine.</span></span></span></span></p> <p><span><span><span><span>“The attackers copied the design of the legitimate Windows 11 website, except clicking on the ‘Download Now’ button downloads a suspicious zip archive called Windows11InstallationAssistant.zip,” reports Patrick Schläpfer for HP. “The file was hosted on Discord’s content delivery network.”</span></span></span></span></p> <p><span><span><span><span>The malware used to create the malicious software is RedLine Stealer, an inexpensive and widely available malware that gathers information from users’ browsers, including saved credentials, autocomplete data, and credit card information. HP did not share any details on how many people may have been impacted by the malware.</span></span></span></span></p> <p><span><span><span><span>HP quickly discovered that the compressed installer download was only 1.5 MB, but once decompressed, expanded to 753 MB in size, showing a far larger compression rate than typically seen with executable files. HP says this is because the .exe contained a large quantity of highly compressible padding.</span></span></span></span></p> <p><span><span><span><span>“One reason why the attackers might have inserted such a filler area, making the file very large, is that files of this size might not be scanned by an anti-virus and other scanning controls, thereby increasing the chances the file can execute unhindered and install the malware,” states Schläpfer.</span></span></span></span></p> <p><span><span><span><span>HP shares that a similar attack was conducted back in December 2021, which utilized RedLine Stealer to disguise malware within a Discord installer. In that instance, the hackers bought “discrodappp.com” and implanted malware into the app’s install software. </span></span></span></span></p> <p><span><span><span><span>“In both campaigns, the threat actor used fake websites mimicking popular software to trick users into installing their malware, registered the domains using the same domain registrar, used the same DNS servers, and delivered the same family of malware,” says Schläpfer. </span></span></span></span></p> <p><span><span><span><span>Both instances highlight the importance of ensuring cybersecurity professionals are aware of the latest updates to frequently used systems and software. It is also vital that cybersecurity departments ensure that the employees within their organizations are educated on knowing what resources to trust when it comes to installing or upgrading software – both personally and professionally.</span></span></span></span></p> <p><span><span><span><span>Want to learn more about cybersecurity? View the full list of bachelor’s, master’s, and doctorate degrees in </span><a href="/fields-of-study/cyber-and-information-security">cyber and information security</a><span>. Many courses are available both on-campus and online. To learn more about Capitol Tech’s degree programs, contact </span><a href="mailto:admissions@captechu.edu">admissions@captechu.edu</a><span>.</span></span></span></span></p> Categories: <a href="/blog/category/cybersecurity" hreflang="en">Cybersecurity</a> <section id="section-34726" class="section background-white"> <div class="super-contained"> </div> </section> Thu, 24 Feb 2022 17:16:33 +0000 emdecker 8401 at