Tag Archive for: reasons

Balochistan: Internet services restricted for security reasons


BALOCHISTAN: Balochistan, amidst rising security concerns due to a surge in terrorist attacks, has decided to limit internet services in sensitive polling stations leading up to the February 8 elections, as reported by Pakistan-based newspaper News International
Jan Achakzai, the caretaker information minister, declared the decision, citing the potential threat of terrorist activities during the polling process.
Taking to X, Jan Achakzair stated that there was a risk that the terrorists might use social media platforms as a means of communication for their nefarious plans.
“Ensuring the safety and security of ordinary citizens is of utmost importance, as there is a concern that terrorists may exploit social media platforms such as Facebook, Twitter, and other similar channels for communication purposes,” he wrote in an X post.
He further stated that internet access will be restricted in the lead-up to the elections in regions including Turbat, Mach, and Chaman, the latest areas to witness a terrorist attack in the province.
The move, aimed at safeguarding citizens, comes amid a challenging security landscape, particularly with an escalation in attacks targeting political parties and their campaign gatherings, as per The News International
However, the intermittent network outages have posed challenges for independent candidates, like lawyer Jibran Nasir in Karachi, who heavily rely on social media for outreach due to budget constraints.
According to The News International, Jibran Nasir, expressing concerns over the government’s actions, deems the shutdowns as setting a “dangerous precedent” and violating constitutional rights, particularly freedom of expression.
With less than a week until the polls, security measures have intensified nationwide to ensure a conducive environment for the electoral process.
Despite the security measures, Chief Election Commissioner Sikandar Sultan Raja has assured the public of an uninterrupted polling day experience, ruling out the possibility of communication and internet service disruptions.
However, the situation differs in Sindh, where caretaker Information Minister Ahmed Shah stated that no decision has been made regarding the suspension of internet…

Source…

Five reasons you should never use it


In today’s hyper-connected world, access to the internet has become an essential part of our daily lives. Public Wi-Fi networks have emerged as convenient options to stay connected on the go. However, despite their convenience, using public Wi-Fi networks can pose significant risks to your online security and privacy. In this article, we’ll delve into five compelling reasons why you should think twice before connecting to public Wi-Fi networks.

Estimated reading time: 3 minutes

Public Wi-Fi: Reasons To Avoid It

Public Wi-Fi: Five reasons you should never use it

Security Vulnerabilities

Public Wi-Fi networks are inherently less secure than private networks. When you connect to a public Wi-Fi hotspot, you’re sharing the network with a multitude of strangers, which increases the likelihood of security breaches. Hackers often exploit these vulnerabilities to intercept data transmitted between devices and the network. This could include sensitive information such as login credentials, credit card numbers, and personal messages. Without proper encryption measures, your data is essentially up for grabs.

Man-in-the-Middle Attacks

One of the most common threats associated with public Wi-Fi is the “man-in-the-middle” attack. In this scenario, hackers position themselves between your device and the network, intercepting and potentially altering the information you’re sending and receiving. This can happen without your knowledge, putting your sensitive data at risk. Even if you’re accessing secure websites (denoted by “https” in the URL), a skilled attacker can still manipulate the traffic and gain unauthorized access to your data.

Rogue Hotspots

Cybercriminals often set up rogue Wi-Fi hotspots with names similar to legitimate ones to trick users into connecting to them. Once connected, these malicious hotspots can unleash a host of attacks, including malware distribution and data theft. Users are typically unaware of these fake networks, as they appear to be legitimate options in the list of available connections. Always double-check with the establishment or venue staff to confirm the correct Wi-Fi network name before connecting.

Unencrypted Networks

Many public Wi-Fi networks lack proper encryption protocols, leaving your data…

Source…

3 Reasons to Focus More on Cyber Resilience than Compliance


To say our country is at war with cyber criminals is an understatement.

The onslaught of attacks is relentless, and the numbers are staggering. Last year, 800,944 cybercrime-related complaints – or nearly 2,200 per day – were reported to the FBI’s Internet Crime Complaint Center. While the number of complaints dipped by five percent, the dollar value of potential losses skyrocketed 48 percent to $10.2 billion. 

It seems that each day we hear or read about a new breach at some of our country’s most venerable private and public sector institutions. In mid-June, for example, Russia-linked criminals breached several federal agencies. Among those agencies was the Department of Energy, which oversees our country’s nuclear weapons – and whose cyber defenses were breached two years earlier. 

Recognizing that our country is in an unending war, lawmakers have proposed more funding for cybersecurity for fiscal year 2024, earmarking $13.5 billion for the Pentagon and another $12.7 billion for other agencies. The recommended funding package includes $3.1 billion for the Cybersecurity and Infrastructure Security Agency, which would represent a modest $145 million bump in the agency’s current budget. 

That is a positive step forward, but here is the problem: Our federal government has a long history of being obsessed with compliance-related rules and regulations. That mindset thwarts progress for a couple of reasons.

  • First, our adversaries do not have compliance standards to meet. They only care about winning each battle and causing maximum harm.
  • Second, a compliance mindset is reactive rather than proactive. With each successful breach, policymakers seek to “fix” the problem through improved compliance. It is a slow and ineffective approach because by the time new standards are approved and implemented, threat actors have found other ways to bypass the new safeguards. There is a long and growing list of organizations that met compliance standards, yet fell prey to criminals.
  • Compliance is the lowest rung on the cybersecurity ladder that also includes maturity and, at the top, effectiveness. The obsession with compliance has another negative consequence….

Source…

5 reasons why you should buy a router instead of using the one from your ISP


If you switch your internet service provider (ISP) or sign up for a new internet plan, chances are that the company you’re dealing with will set you up with a new Wi-Fi router as part of the deal. However, there are plenty of advantages to using your own Wi-Fi router instead.

Although we now use the Internet for almost everything, most people don’t think twice about their home Wi-Fi network until something goes wrong. Maybe your internet connection has gone down, you can’t keep all of your devices connected at the same time or you’re noticing several Wi-Fi dead zones in your home. If you’ve experienced any of these problems, perhaps the idea of upgrading to one of the best Wi-Fi routers has crossed your mind.

Source…