Chinese hackers have ‘hand-picked’ important information from the computers of several powerful countries around the world for nearly a decade by Cyber Attack. Canada’s software firm BlackBerry blames Beijing for such a fierce accusation. They complained that this happened because of the Chinese government.
This week, BlackBerry released a 5-page report. According to it, Chinese hackers appear on various computers disguised as advertisements. Their technology is so advanced that it doesn’t even get caught in the computer firewall. And they take advantage of the important information stored on the computer.
BlackBerry has claimed that Chinese hackers have been carrying out the espionage in government liquor since March 2012. However, without hitting the standard Windows operating system. The major operating systems of the world. The government database server.
And various operating systems and Linux operating technology work at multiple supercomputers.BlackBerry has received the Hadith of five Advanced Persistent Threat (APT) organizations that have access to information online. They also spread malware on the Windows operating system.
It is said that in the beginning, the malware was used to distribute stolen certificates from various video game companies. Currently, adware vendors’ certificates are stolen and spreading malware. Malware is spreading to Android devices too.
Source: Canadian Press.
Fear of Cyber Attacks, alarmed hospitals
One coronavirus is not protected, other cyber-virus! Whether or not Corona’s human-made demons are, there is no evidence yet. Cyber Attack is spreading but cyber-bullying. Their goal is to make hospitals more prone to Covid-1 infections and to make the disaster worse, and of course, to make more money. Interpol has sent messages to six member countries.
Engaged in public-private health organizations around the world in the fight against the Corona pandemic. The highest traffic on the Internet surrounds Quid-1. During this period hackers from many countries are trying to disable the information technology system of public-private health institutions through cyber attacks. This has already happened in several countries. The hackers have allowed activists to re-activate their computer system, mainly by collecting large sums of money through ransomware or cyber-bullying.
Interpol’s message says the Cyber Fusion Center’s Cyber Crime Threat Response Team has been monitoring cybercriminals’ increasing activity for several days. It appears that the majority of cybercriminals are trying to carry out cyber attacks in several health institutions. Hospitals and research centers around the world. The companies that are working with Quid-1 are moving at the same time. Basically, the goal of health companies is to create a ‘digital hostage’ or to impede the IT system. In order to avoid missing the patient’s medical information at important times, the required test file may not be available. Their main purpose is to demand money by ‘locking in’ e-management of health institutions. Interpol warned members of the police that they were successful in some cases.
How is the hospital or government health system being victimized by cyber-bandits?
Interpol’s Cyber Fusion Center said in their message that criminals are spreading ransomware mainly through e-mail. An e-mail is being sent to a government institution or a reputed international health organization. It contains information about Corona, news, research, documents. Many hospitals or government officials are opening it, and the hospital’s IT system is getting locked out.
Interpol secretary general Jurgen Stock told police. In five countries that a hospital system could be locked up for a moment until a patient dies.
As part of Interpol’s remedy, police have been told that they should be alert in all respects before opening corona e-mails in major hospitals. Hardware and software should be kept up-to-date and backed up regularly.
Interpol will send a list of suspected ransomware to police within days. Prior to this, health organizations and hospitals have been advised. Not to open e-mails change passwords if needed. check that antivirus software is working properly and to back up all types of files.
Cyber Range will be established to prevent cyber attacks
State Minister for Information and Communications Technology Junaid Ahmed Palk said. The cyber range will be set up at MIST at a cost of Tk 20 crore to train cyber attack prevention and counter-attack. Cyber Attack is very harmful to any country.
Referring to the cyber threat around the world, the Minister said the cyber attack could harm individuals, families and the country. He urged the younger generation to find innovative solutions to the country’s problems through local solutions as well as global solutions.
The chief guest was addressing the closing ceremony and award ceremony of the National Collegiate Programming Competition (NCPC) 2012. Organized by the Department of Information and Communication Technology and Multiparapass Hall. At the Military Institute of Science and Technology (MIST) on February 22nd.
To build a digital Bangladesh, the nation needs to be created with technology. He said that the government has made ICT education compulsory till the upper secondary level to build human resources with information technology. 4 Sheikh Russell Digital Labs have been established in various educational institutions of the country.
Besides, every university in the country has taken the initiative to establish a specialized lab. The Minister of State for ICT further said that innovation is the key strength of every nation. Under the ICT department’s Idea project, a grant of up to Tk 1 lakh is provided for seed entrepreneurs. And up to Tk 1 crore to Tk 5 crore for the growth stage under the ICT departments.
Idea project to move young and startups into innovative work. It is to be noted that 4 teams from different universities of the country participated in the National Collegiate Programming Competition (NCPC) 2020.
Dhaka University ‘DeouthSompfire’ team has been championed by solving five of the 5 problems in the competition. And the first and second runners-up to solve the eight problems were BuetHealthbent and “buried”, respectively. Fourth and fifth, respectively, were solved by BUET’s ‘Buetthofractals’ and ‘Last SloofurierFranstorum’ from the University of Shahjalal Science and Technology, respectively.
#cyber attacks, #what is cyber attacks, #cyber attacks map, #cyber attacks today,