Category: Science

  • The Russian Cyber Attack on Ukraine

    The Russian Cyber Attack on Ukraine

    Ukraine has been hit by cyberattacks that are feared to be backed by President Putin of Russia. The distributed denial-of-service (DDoS) attacks were targeted at the web portal of Ukraine’s ministry of defence as well as the country’s financial systems.
    The scope of the DDoS attack is such that hackers flood the servers hosting a website until it becomes overloaded and shuts down.

    Several major Ukrainian banks, including PrivatBank, Oschad and the State Savings Bank of Ukraine, experienced issues with transactions and mobile app.

    Clients began to complain on Tuesday about difficulties using teller machines and mobile phone applications. The banks confirmed the attack but said the funds in users’ accounts had not been affected, though users said they had been temporarily unable to withdraw money or use their credit cards. Some clients of the banks were worried, as their bank balances appeared drained. By Tuesday evening it was confirmed that most financial services had been restored.

    Ukrainian Ministry of defence and armed services websites were also brought down by these cyber attacks.

    Ukraine has been under constant attack from Russian and Kremlin-backed hackers since February and March 2014 when Russia invaded and subsequently annexed the Crimean Peninsula from Ukraine. This event took place in the aftermath of the Revolution of Dignity and is part of the wider Russo-Ukrainian conflict.

    In a briefing after the attack, Deputy Prime Minister Mykhailo Fedorov said, “This attack is unprecedented, it was prepared in advance. And the key goal of this attack is destabilization, it is to sow panic, to do everything so that certain chaos appears in our country.” “And today we know that the only country that is interested in such attacks on our state, especially against the backdrop of massive panic about a possible military invasion, the only country that is interested is the Russian Federation.”

    Fedorov said the attacks came from many places and involved IP addresses from Russia, China, Uzbekistan and the Czech Republic.

    Cyber espionage, damage to databases and servers, disruption to power and communications and disinformation are all now routine weapons in the Russian armoury.
    It has been estimated that approximately 150,000 Russian forces were gathered on Ukraine’s northern, eastern and southern borders around the time of the attack.
    Russia seems to be poking Ukraine in a bid to find weak spots, sow panic and show them what they’re capable of.

  • Female developers rising as push for STEM courses get attention

    Female developers rising as push for STEM courses get attention

    The interest of Nigerians, especially the female folks in technology development is on the rise as the push for science, technology, engineering and mathematics (STEM) courses are getting huge attention.

    Findings by TechCabal in the Nigerian Women in Tech Report, powered by the UK-Nigeria Tech Hub, which confirmed this, informed that more than 65 percent of the female STEM university students surveyed applied for those courses as a result of their passion and interests as against being pressured by their parents to do so or because it was the only available option.

    distribution and level of involvement of women in Nigeria’s technology and STEM fields



    The report, which examined the distribution and level of involvement of women in Nigeria’s technology and STEM fields, noted that 59 percent of the survey respondents admit to facing challenges in their course of study, however, over 75 percent of the same respondents said that the challenges are not gender-related. However, despite the challenges faced, 54 percent of them are happily studying the course.

    Female in Stem Field

    Read Also : Nigerian Startup AltSchool raises $1 million pre-seed round to help Young Africa’s get into tech

    Furthermore, the majority of the founders surveyed, about 55.6 percent said that the challenges they faced were gender-based while many of the developers surveyed didn’t feel this way. 83 percent of the latter felt that their challenges weren’t gender-based.

    According to the report, the number and percentage of female developers in the tech companies we surveyed are increasing with each passing year, which shows that there is a growing interest in women’s participation in the tech field.

    It also disclosed that less than 50 percent of the female students surveyed see themselves having a STEM-related career in the next five to 10 years. The report, which is available for free download, looks at the gaps that exist in women’s participation, challenges and highlights recommendations for improvement. It also puts the spotlight on 21 women entrepreneurs, c-suite executives, and seven women developers working in the Nigerian technology industry.

    According to the Chief Executive Officer at Big Cabal Media, the parent company of TechCabal, Tomiwa Aladekomo, said: “Notwithstanding decades of progress towards workplace equality, women remain underrepresented in Nigeria’s technology workforce. We’ve embarked on this report to showcase the arena where women in technology play across Nigeria, and the contribution to the big picture when we look at it through the lens of STEM.”


  • IOS or ANDROID Which is Safer from Cyber Attack?

    IOS or ANDROID Which is Safer from Cyber Attack?

    The fear that you would wake up one day and your phone would no longer be yours to control is a valid fear especially with how hackers so easily take over social media accounts even though these companies are constantly upgrading their security systems.

    Experts have said that security systems on computers are better than security systems on mobile phones because cyber security awareness level is very high with computer corporations.

    One of the world’s leading cyber security experts Gil Shwed, founder of Check Points, in an interview with Forbes, expressed concern over the threat of a cyber pandemic. He warned that the need for cybersecurity “is now bigger than ever,’ “Before, security people were saying, ‘you can’t come in because it’s unsafe.’ Today, we’re all forced to say everything is open because that’s the only way we can work. So I think that the task that we have for next year, and then beyond that, is not to close these doors, but to secure them.”

    Android and iOS are two major operating systems (OS) in mobile phones, tablets.
    Apple was founded by Steve Jobs and Steve Wozniak in 1976 while Android was developed by Andy Rubin in 2008.

    Android Security Features

    App sandbox
    Android assigns a unique user ID (UID) to each Android app and runs it in its own process. Android uses this UID to set up a kernel-level App Sandbox.

    App signing
    App signing allows developers to identify the author of the app and to update their app without creating complicated interfaces and permissions. Every app that runs on the Android platform must be signed by the developer.

    Authentication
    Android uses the concept of user-authentication-gated cryptographic keys that requires cryptographic key storage and service provider and user authenticators.

    On devices with a fingerprint sensor, users can enroll one or more fingerprints and use those fingerprints to unlock the device and perform other tasks. The Gatekeeper subsystem performs device pattern/password authentication in a Trusted Execution Environment (TEE).

    Read Also : Cyberattacks Ravages European Oil Companies

    Biometrics
    Android 9 and higher includes a BiometricPrompt API that app developers can use to integrate biometric authentication into their apps in a device- and modality-agnostic fashion. Only strong biometrics can integrate with BiometricPrompt.

    Encryption
    Once a device is encrypted, all user-created data is automatically encrypted before committing it to disk and all reads automatically decrypt data before returning it to the calling process. Encryption ensures that even if an unauthorized party tries to access the data, they won’t be able to read it.

    Keystore
    Android offers a hardware-backed Keystore that provides key generation, import and export of asymmetric keys, import of raw symmetric keys, asymmetric encryption and decryption with appropriate padding modes, and more.

    Security-Enhanced Linux
    As part of the Android security model, Android uses Security-Enhanced Linux (SELinux) to enforce mandatory access control (MAC) over all processes, even processes running with root/superuser privileges (Linux capabilities).

    Trusty Trusted Execution Environment (TEE)
    Trusty is a secure Operating System (OS) that provides a Trusted Execution Environment (TEE) for Android. The Trusty OS runs on the same processor as the Android OS, but Trusty is isolated from the rest of the system by both hardware and software.

    Verified Boot
    Verified Boot strives to ensure all executed code comes from a trusted source (usually device OEMs), rather than from an attacker or corruption. It establishes a full chain of trust, starting from a hardware-protected root of trust to the bootloader, to the boot partition and other verified partitions.

    IOS Security Features

    Passcode
    Setting a passcode to unlock iPhone is the most important thing you can do to safeguard it.

    Face ID or Touch ID
    Face ID or Touch ID provides a secure and convenient way to unlock an iPhone, authorize purchases and payments, and sign in to many third-party apps.

    Find My iPhone
    Find My helps to find an iPhone if it is lost or stolen and prevents anyone else from activating or using the iPhone.

    Apple ID
    Apple ID provides access to data in iCloud and a user’s account information for services like the App Store and Apple Music.

    Two-factor authentication
    To help users set up accounts, many apps and websites offer Sign in with Apple. Sign in with Apple limits the information shared about the user, it conveniently uses their Apple ID, and it provides the security of two-factor authentication.

    Read Also : The Race To Conquer Space in Africa

    For sites and apps that offer two-factor authentication, IOS users can get automatically generated verification codes on their iPhones without relying on SMS messages or additional apps to provide the codes.

    App tracking
    All apps must receive IOS users’ permission before tracking them across apps and websites owned by other companies to target advertising to them or share their information with a data broker.

    ICloud Private Relay
    When iCloud Private Relay is turned on, the traffic leaving IOS is encrypted and sent through two separate internet relays. This prevents websites from seeing IOS user’s IP addresses and location and network providers from collecting their browsing activity.

    Vulnerabilities.
    The world of technology understands that the mobile security situation is a disaster. From banking trojans to mobile remote access trojans, deployed by both nation-state threat actors and criminal enterprises, arms-length espionage by state intel agencies on overseas targets. Our social engineering creates these threats.

    Read Also : Technologies that powers Football

    There have been more mobile vulnerabilities targeting and exploiting Android devices than iPhones in the last year even though iPhones are not more secure.

    Similarity and Difference between IOS and Android Security.

    If you use an android, there’s loads of security companies who could help secure your phone while Apple, on the other hand, sees to the cybersecurity of your device. Apple regulates what’s on the IOS platform securing it from the back end.
    The versatility of Android creates a huge space for errors and shortcomings due to improperly configured hardware while Apple’s exclusive source code access eliminates errors.

    Conclusion

    Neither IOS nor Android is free from malware attacks, malicious data breaches, weak security features, and cyber scams.

    There is a need for cybersecurity awakening because even though both IOS and Android have come a long way with software and hardware development, they can do more to ensure that users enjoy secure experiences.