header-image

Cyber Security Experts

Blog

top feature image

Cyber Security Workshop Port Harcourt

We have workshop for every internet user who wishes to browse in a secure manner to protect his/her data and ICT Infrastructure while providing counter measures to cyber attacks.

 

* Learn How to protect you PC and Data from WannaCry Ransomware and other Spyware that ravage your Devices.

 

* Learn how to protect your self from falling victim to Social Engineering.

 

Enroll now at www.cybersecurityexpertsng.com

 

Date: 16th – 17th June, 2017

Venue: Plot 144 Circular Road, Elekahia Housing Estate, Port Harcourt, Nigeria.

Email: info@cybersecurityexpertsng.com

Tel: 08063629122, 08177226939

 

top feature image

Certified Ethical Hacker Training Port Harcourt

Are you a Security Professional, Network Administrator, Auditor, Web Programmer or are you concerned about the integrity of network infrastructures and cyber security? If yes,

Then you need to master hacking technologies and become a Certified Ethical Hacker!

 

Enroll now at www.cybersecurityexpertsng.com

Date: 16th – 17th June, 2017

Venue: Plot 144 Circular Road, Elekahia Housing Estate, Port Harcourt, Nigeria.

Email: info@cybersecurityexpertsng.com

Tel: 08063629122, 08177226939

 

 

Most Advanced Hacking Course

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it!

You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

 

Underground Hacking Tools

The hacking tools and techniques in each of these five phases are provided in detail in an encyclopedic approach to help you identify when an attack has been used against your own targets. Why then is this training called the Certified Ethical Hacker Course?

This is because by using the same techniques as the bad guys, you can assess the security posture of an organization with the same approach these malicious hackers use, identify weaknesses and fix the problems before they are identified by the enemy, causing what could potentially be a catastrophic damage to your respective organization.

We live in an age where attacks are all susceptible and come from anyplace at any time and we never know how skilled, well-funded, or persistent the threat will be. Throughout the CEH course, you will be immersed in a hacker’s mindset, evaluating not just logical, but physical security. Exploring every possible point of entry to find the weakest link in an organization. From the end user, the secretary, the CEO, misconfigurations, vulnerable times during migrations even information left in the dumpster.

top feature image

Panama Papers

The Panama Papers are a huge trove of high confidential documents stolen from the computer systems of the Panamanian law firm Mossack Fonseca that was leaked online during recently.

It is considered the largest data leaks ever, the entire archive contains more than 11.5 Million files including 2.6 Terabytes of data related the activities of offshore shell companies used by the most powerful people around the world, including 72 current and former heads of state.

Figure 1 – Data Leaked (Source: Süddeutsche Zeitung)

To better scale the dimension of the data leaks, let’s compare the dimension of the stolen data to the size of archives disclosed after other incidents occurred in the past.

Figure 2 – Panama Papers – Scale of the data leak (WEF)

Despite the great clamor on the case, most of the clients of the Mossack Fonseca weren’t breaking any law because the services offered by the firm are legal. The problem is that the service offered by the Panamanian firm could be abused by a part of its client to evade taxes and launder money.

Mossack Fonseca states it conforms to anti-money-laundering, it states it could not be condemned for failings by intermediate that consist of financial institutions, legislation companies and also accounting professionals.

Mossack Fonseca is the globe’s fourth greatest company of overseas solutions. Even more compared to fifty percent of the firms are signed up in British-administered tax obligation places, as well as in the UK itself.

The Panama Papers case is exposing the offshore activities of hundreds of politicians and public figures around the world, including Vladimir Putin and the Iceland’s Prime Minister David Gunnlaugsson.

At the time I was writing, despite the Vladimir Putin’s name does not appear in the leaked documents, $2 Billion route leads right to Vladimir Putin. The Russian head of state’s buddy, Sergei Roldugin, is the link between the Russian leader and the financial operations managed by the Panamanian firm.

The leaked documents also revealed the existence of an overseas mutual fund run by the dad of the British head of state David Cameron that allowed him to avoid paying tax obligation in Britain by employing a little military of Bahamas citizens to authorize its documents.

Amongst national leaders with overseas wide range are Nawaz Sharif, Pakistan’s head of state; Ayad Allawi, ex-interim head of state as well as previous vice-president of Iraq; Petro Poroshenko, head of state of Ukraine; Alaa Mubarak, child of Egypt’s previous head of state; as well as the head of state of Iceland, Sigmundur Davíð Gunnlaugsson.

Figure 3 – Panama Papers

Bloomberg first confirmed the authenticity of the leaked archive, citing the declaration of Ramon Fonseca, the co-founder of the Mossack Fonseca firm.

The Panama Papers documents were shared with the German newspaper Suddeutsche Zeitung by an anonymous source and the International Consortium of Investigative Journalists (ICIJ) that includes the Guardian as well as the BBC.

The journalists of the ICIJ have analyzed the documents in the huge archive for an entire year and now are sharing their findings.

The Panama Papers archive includes emails, bank records, and invoices belonging to the clients of the Mossack Fonseca firm.

Who is the anonymous source and how did it exfiltrate the data from the computers of the company?

According to Ramon Fonseca, the confidential documents had been obtained illegally by hackers; likely the data breach affected an e-mail server of the company last year.

The media agency El Espanol confirmed this hypothesis; Mossack Fonseca firm sent an email to its clients announcing that it was investigating the causes of the data breach and that it’s taking “all necessary steps to prevent it happening again.”

“This firm, considered the largest platform figureheads of Latin America and has a large portfolio of Spanish customers, said in a statement that it has opened an investigation after confirming that “unfortunately” has suffered an “attack on your server email.”” reported the El Espanol.

“Mossack Fonseca says it is taking “all necessary steps to prevent it happening again”; which has “reinforced” its security systems; and is working with “expert consultants” to determine the exact information they have accessed “unauthorized persons”. The firm, through its Director of Marketing and Sales, apologizes to its customers and offers an email to clarify any further questions.”

The ICIJ has identified more than 214,000 organizations for a total turnover of several billion dollars.

Who and how Hacked the Mossack Fonseca firm?

Let’s start trying to understand how hackers breached the firm. After the attack, security experts started testing the systems of the company trying to discover the presence of alleged flaws exploitable by attackers.

How is it possible that a company that keeps secrets of thousands of the world’s leading organizations and men have been hacked in the so simple way?

The tests conducted by security researchers revealed the existence of flaws in the systems the company exposed on the Internet.

One of the first assumptions made about the alleged hack is that the hackers exploited a flaw in a plugin called Revolution Slider used by the WordPress-based website used by the company.

Sources on the Internet state that Mossack Fonseca has been compromised by hackers that run a SQL Injection attack on one of its sub-domains used for payments.

Figure 4 – Mossack Fonseca’s Domain alleged breached by hackers

An unknown researcher that used the Twitter account @1×0123 claimed to have found a SQL injection flaw on one of the corporate systems belonging to the Panamanian lawyers Mossack Fonseca firm.

“They updated the new payment CMS, but forgot to lock the directory /onion/,” he said via the “1×0123” Twitter profile.

In the past, the same hacker has discovered many other security issues in the systems of major media outlets, including the LA Times and New York Times. He also offered for sale the access to insecure systems at NASA.

@1×0123 also contacted Edward Snowden, notifying him of some bugs on one of his projects. Snowden acknowledged the bug report on the Freedom of the Press Foundation website.

Figure 5 – @1×0123 claims to have discovered a SQL Injection in the MossackFonseca Systems

Giving a close look at the image shared by the hacker, it seems that system is based on an Oracle database. Of course, it is not possible to be sure if this is the flaw exploited by hackers. Anyway, the presence of similar bugs is worrying if we consider the secret information contained in the database of the Panamanian firm.

Experts at WordFence security firm also provided an interesting analysis of the incident, describing how the hackers may have violated the email servers of the company via the WordPress Revolution Slider plug-in.

They also explained how attackers likely accessed the documents of the Mossack Fonseca firm exploiting the vulnerabilities affecting an outdated version of the Drupal CMS.

The hack of the email server, confirmed by the firm in an email sent to its customers, occurred by exploiting a vulnerability in the version of Revolution Slider that the company was running.

Once the attacker gained access to the WordPress website, he was able to view the contents of wp-config.php which contains the database credentials for the WordPress instance, and these credentials are in clear text.

The attacker would have used the credentials to access the database.

Experts at WordFence discovered that the www.mossfon.com is running two plugins in addition to Revolution slider, the WP SMTP plugin and the ALO EasyMail Newsletter plugin.

The WP SMTP plugin stores email server address and login information in plain text in the WordPress database.

Once the attacker had access to WordPress database credentials in the wp-config.php file, he was able to access the mail server.

The ALO EasyMail Newsletter plugin offers list management functionalities and needs access to read emails from the email server. Also, in this case, the plugin stores email server login information in the WordPress database in plain text.

“Once the attacker also had access to this data, after gaining access to the WordPress database via Revolution Slider, they would have been able to sign-into the email server and would be able to read emails via POP or IMAP.” Reported Wordfence.

Summarizing, it is likely that an attacker gained access to the WordPress website by exploiting a known vulnerability in the Revolution Slider; then he accessed the database where were stored information on the email systems.

 

top feature image

Nigeria records 3,500 cyber attacks in last one year year

ABUJA— Nigeria has experienced 3,500 cyber attacks within the last one year, with over 70 per cent success rate and a loss of $450 million, Acting Director General of the National Information Technology Development Agency, NITDA, Dr. Vincent Olatunji, has said.

Cyber crime Cyber crime Olatunji said this during a capability and capacity building training workshop organized by NITDA in partnership with its Malaysian counterpart, Malaysia Cyber Security Agency, in Abuja, yesterday. Similarly, an IT consultant, Abdul-Hakeem Ajibola, said 0.80 per cent of Nigeria’s Gross Domestic Product, GDP, equivalent to the cement sector, was lost to cybercrime. According to th NITD boss, the country’s GDP lost $568.51 billion in 2014, which amounts to annual loss of $450 million, an equivalent of N89.55 billion annual direct loss to the Nigerian economy, at the Central Bank of Nigeria, CBN, exchange rate of N199 to $1.

With the increasing penetration of technology into the economy and continuous loss to cybercriminals, he advised that measures must be put in place to mitigate the capacity of cybercriminals from taking advantage of the environment. The NITDA boss, who lamented the outrageous rate of attacks in Nigeria, said the Federal Government had a lot of work to do to checkmate further attacks of public and private facilities.

He said: “We are preparing people to prepare against cybercrime, private and public sectors, within the last one year. So, there is a lot of work to do. “The high rate of attacks in Nigeria shows that we need to work harder to ward off these attackers to ensure that we prevent such attacks and even where they take place, we ensure they are countered.”

He stated that Nigeria, like any other country, was facing many challenges from network design, security prevention as well as cyber-attack to cybercrimes, saying the need for effective security measures to create trust and confidence in the various platforms could not be over-emphasised. Olatunji further explained that the workshop was in fulfilment of NITDA’s mandate, particularly in the area of fostering the development and growth of information technology for sustainable socio-economic development in Nigeria.

He said the commitment of the Federal Government to effective ICT development in various sectors of the economy had led to the creation of requisite enabling environment for stakeholders to contribute to the level of ICT development in the country.

top feature image

Nigeria’s internet users reduced by 536,346 in December 2016 – NCC

The number of internet users in Nigeria’s telecommunications networks declined to 91,910,341 in December 2016, the Nigerian Communications Commission, NCC, has said.

 

The NCC made the disclosure in its Monthly Internet Subscribers Data for November and December, obtained on Monday by the News Agency of Nigeria, NAN.

 

According to the data released, internet users on both Global System for Mobile communications, GSM, and Code Division Multiple Access, CDMA, networks dropped to 91,910, 341 in December as against 92,446,687 users recorded in November 2016, recording a decline of 536,346.

 

The analysis showed that out of the 91,910,341 internet users in December, 91,880,032 were on GSM networks, while 30,309 were on CDMA networks.

 

The data also revealed that the GSM service providers lost 536,346 internet customers after recording 91,880,032 users in December as against 92,416,378 it recorded in November.

 

The CDMA operators, however, retained 30,309 internet subscribers in December, the same figure it recorded in November 2016.

 

top feature image

NITDA: 14% Internet Users in Nigeria Suffer Cyber Attacks

The Chief Executive Officer (CEO) of the National Information Technology Development Agency (NITDA), Mr. Ibrahim Pantami, has said that 14 percent of the 90 million Internet users in the country suffer one form of cyber attacks or the other.

The CEO in a statement signed by the Head of Corporate Affairs and External Relations, Mrs. Hadiza Umar, said the staggering statistics of cyber attacks necessitated the setting up of the National Cyber Implementation Committee, which is being overseen by his office.

According to Pantami, in 2013, global payment giant, paypal.com disclosed that Nigerians lost about N159 billion to cyber security threats.

He said it is becoming more worrisome that since 2014, the country has lost approximately N90 billion to cybercrimes.

Pantami said: “In December 2015, Nigeria was the 17th most attacked nation in the world.” This information, he averred was obtained from Check Point Software Technologies cyber threat intelligence report.

The Office of the National Security adviser (ONSA), the CEO said recently that 2,175 Nigerian websites were hacked in 2015, with 585 being government parastatals and agencies.

He said: “The inter-ministerial Technical Committee on the implementation of the national cyber security strategy held its inaugural meeting at the headquarters of the National Information Technology Development Agency.”

While reiterating the advantages derived from ICT, he said government is proactively putting measures in place to be ahead of hackers with the aim of preventing them from abusing or encroaching on users websites.

Pantami, said: “Information Technological tools that have become vital in our critical activities are also avenues adopted by individuals and groups to carry out a range of malicious activities.”

He noted that these threats on cyber space could be targeted at national critical infrastructures, government/private institutions or individuals.

“Today, information assets are very valuable and various sectors of the Nigerian government have come to rely on technological tools to carry out their processes both critical and non-critical.

“Financial services, telecommunications, navigational systems, manufacturing sector, oil and gas, power and energy, food and agriculture, emergency services and healthcare systems.” he stressed.

The CEO said the scale and dimension of the threats have compelled the agency to develop and implement a new cyber security strategy for the public service as approved by the Minister of Communications, Mr. Adebayo Shittu.

He called on every stakeholder in the committee for continuous collaborative effort, stressing that information security is not a one-off programme, as the threat landscape keeps changing.

The committee, he said consists of representatives from the ministry, ONSA, Nigeria Postal Service (NIPOST), Nigeria Computer Society (NCS) and Nigeria Communications Satellite (NIGCOMSAT).

On the committee’s terms of reference, he said: “The Technical Committee is aimed at countering an increasing number of threats and develop a strategy through greater inter-agency coordination, cooperation and information sharing

top feature image

7 Steps to Protect Your Data From Insider Threats

Like it or not, your greatest risk is already on the payroll. When internal users with trusted access to data are careless, become compromised or have malicious intent, enterprise data is exposed. Just ask the CIA.

Detecting insider threats, however, is challenging for organizations due to the combination of increased personal digital activities (think web, mobile and cloud-based applications) and more access to enterprise data than ever before. Since internal users have legitimate access to valuable information, it’s difficult for organizations to discern between appropriate data access and a true insider threat incident.

Use these seven steps as a guide to help detect and contain insider threats:

#1 – Discover and classify sensitive data

Consistent discovery and classification of sensitive data is mandatory. You can’t rely on data owners to do consistent data classification using a manual process, and it’s simply not scalable. Ideally, you need to establish a large number of predefined data types and support the definition of custom data types. Data classification tools allow you to automatically and repeatedly identify business critical information that’s exposed to insider risk. You also want to prioritize certain sensitive data types based on the risk exposure to your organization.

Discover and classify sensitive data

Classification tools can automatically scan the database for sensitive information.

#2 – Monitor all user access to data

Successful monitoring should track all users (not just privileged users) who access databases and network files. By monitoring the who, what, where, and when, and identifying and isolating abnormal behavior, you can evaluate risk tolerance and respond appropriately. Leveraging built-in native auditing tools is costly and won’t ensure that you’re capturing all of the important details about how users are interacting with your sensitive data.

Monitor all user access to data

Granular data access monitoring shows all the details about user access to files or databases.

#3 – Define and enforce organizational policies

Policy enforcement allows you to immediately prevent unwanted data access behavior and enforce separation of duties. Policies should cover both security and compliance requirements with the flexibility and scalability that matches your needs. With an easy-to-use policy management system, you can process rule sets across data repositories.

identify insider threats_define_policies

Defined policies look for specific behavior. For example, users may not retrieve more than 10 credit card numbers.

#4 – Leverage advances in artificial intelligence detect unknown threats against enterprise data

Machine learning can accurately uncover unknown threats against your data by sifting through massive amounts of detailed data access logs. This technology allows security teams to establish a behavioral baseline of user access to data and quickly identify inappropriate or abusive data access. This allows you to filter through the sea of noise generated by alerts and proactively identify the truly worrisome data access incidents. Malicious users, who have valid access to enterprise data and have the intent to deliberately steal classified, confidential, or sensitive data with the intent to cause damage, can be identified early. Machine learning also helps identify compromised or careless user behaviors that have the potential to expose the business to massive data losses.

artificial intelligence detects unknown threats_suspicious access

Imperva CounterBreach uses machine learning to identify suspicious data access. When an incident is detected, security teams can see what occurred and what influenced the severity of the incident.

artificial intelligence detects unknown threats_ops that caused incident

Users can drill down into the specific operations that caused the incident to occur.

artificial intelligence detects unknown threats_typical behavior

CounterBreach also displays the typical behavior, so that SOC teams have full content into the incident.

#5 – Use interactive analytics tools to investigate security incidents

Your security teams should be able to quickly drill down and understand all data access activities of individual users in order to investigate incidents that are identified using machine learning. With the right solution, you should be able to analyze, correlate, and view database activity from virtually any angle with just a few mouse clicks. This allows you to easily identify trends and piece together patterns that may conceal security risks or compliance problems. Audit tools should make it simple to analyze failed logins, identify attack sources, investigate unauthorized operations, and track privileged operations.

#6 – Quarantine risky users

Once you identify suspicious data access incidents, you want to drill down into the audit trail to perform forensics then decide whether or not to quarantine a user from accessing data repositories until the investigation is complete. Granular policies allow you to block access to specific data and proactively prevent or contain data breaches.

#7 – Generate reports to document security events

Accurate reporting on all insider-related security incidents provide an understanding of your overall security posture and allow you to provide detailed information to management. In addition to graphical dashboards, pre-defined reports should be available in the solution as and offer the flexibility to create custom reports.

Run reports to document security events

Run PDF reports to document incidents.

To learn more about effective insider threat mitigation and Imperva’s unique approach to threat management, see our complete library of threat protection resources.

 

top feature image

Internet Usage Statistics for Africa

Internet Usage Statistics for Africa ( Africa Internet Usage and 2017 Population Stats )
INTERNET USERS AND POPULATION STATISTICS FOR AFRICA
AFRICA REGION Population (2017 Est.) Pop. % of World Internet Users, Latest Penetration (% Population) Internet % Users Facebook 30-Jun-2016
Total for Africa 1,246,504,865 16.6 % 345,676,501 27.7 % 9.3 % 146,637,000
Rest of World 6,272,524,105 83.4 % 3,386,296,922 54.0 % 90.7 % 1,532,796,530
WORLD TOTAL 7,519,028,970 100.0 % 3,731,973,423 49.6 % 100.0 % 1,679,433,530
NOTES: (1) Africa Population data are 2017 mid-year estimates. (2) Africa Internet Usage Statistics in this table are in March 31, 2017. (3) The Facebook subscriber data are in June 30, 2016, the last available from FB. (4) CLICK on each region or country name for details for each individual location. (5) For methology, help and definitions please see the site surfing guide. (6) Population 2017 estimates are based mainly on figures from the United Nations – Population Division and local sources. (7) The Internet usage numbers come mainly from data published by WWW , ITU , the Nielsen Company, Facebook, and other trustworthy sources. (8) Data from this table may be cited, giving the due credit and establishing an active link back to Internet World Stats. Copyright © 2017, Miniwatts Marketing Group. All rights reserved worldwide.

 

top feature image

Cyber Security Experts

Cyber Security Experts is a Subsidiary of Jenslaw Data Professionals Ltd, incorporated to drive the Cyber Security campaign to secure our Cyber Space.

The Cyber Security team is made up of Certified Ethical Hackers (CEH), Chief Information Security Officers (CISO), Certified EC-Council Instructors (CEI), Penetration Test Practitioners, Programmers, Web Developers, Network Administrators, and Cyber Security Experts.

Jenslaw Data Professionals Ltd is a major player in the ICT Industry with several international partnerships not limited to EC-Council International, SAP (Germany), Oracle (US), PearsonVue (UK) etc. in several areas such as;

  • Accredited Test Center (ATC) to administer all EC-Council Exams and Trainings
  • SAP Education and Implementation Center to Train and administer all SAP Exams
  • PearsonVue Authorized Test Center, administers all Information Technology Exams

Through Cyber Secuity Experts, we want to sanitize the cyber space by providing adequate security measures and recommendations on how to combat and prevent cyber attacks (cyber crime) in our workplace and individual homes and devices which connect to the internet one way or the other.