Connect with us

Expert Speak

Five Reasons to Keep Your Software and Devices up to Date

Published

on

Next time you’re tempted to hold off on installing software updates, remember why these updates are necessary in the first place says Phil Muncaster, guest writer at ESET

Technology enables us to do wonderful things. The PCs and mobile devices at the center of our digital world are an indispensable part of our personal and working lives. They offer us a gateway to social media, online banking, media streaming, instant messaging, fitness tracking, and much else besides. Depending on your circumstances they may also be an essential tool for work. But they’re also permeated by software that needs to be updated if you want a secure and optimized experience.

The more software you have on these devices, the more likely it is that your use of them will be interrupted at some point by an update notification. But next time you’re thinking about hitting “decline” or “postpone”, remember why updates are necessary in the first place. As the need to keep your software up to date is also one of the core messages of this year’s edition of Cyber Security Awareness Month, this is a timely opportunity to look a little more closely at why software updates matter.

Why bother updating?
The software runs the world. There was an estimated 230 billion app downloads in 2021 alone, up by over 63% since 2016. And it’s claimed the average smartphone user has 40 separate apps installed. That’s not to mention the other devices you may be using: PCs and laptops, as well as fitness trackers and other smart technology.

All of these applications need updating, as does the underlying operating system (OS), web browser, and possibly firmware – a special type of software that hooks into device hardware. Multiply this across multiple machines and devices and those annoying update pop-ups could amount to a major productivity headache. But updates are essential for several reasons:

Updates keep you more secure
Software is written by humans. That means the underlying code is prone to human error. Sometimes these errors – known as software vulnerabilities – can be exploited by malicious hackers, who can then take advantage of these security flaws. Such attacks can start with attempts to get people to click a malicious link, open an attachment in a message or lure them to specially crafted malicious websites. The end result can be remote code execution on vulnerable systems or malware downloaded to the device, which is designed to steal login information and any personal and financial data stored in the apps or on the device/PC.

That means threats such as:

  1. Identity theft and fraud
  2. Hijacking of sensitive apps and accounts like online banking accounts
  3. Ransomware designed to extort you by encrypting the files on your machine until you pay
  4. Cryptojacking, where a hacker uses your computer to illegally mine for cryptocurrency, increasing your energy bills and running down your equipment
  5. Botnet malware that hijacks your machine and uses it to attack others

Updates fix these vulnerability problems by upgrading your operating system and other software to the latest version, which “patches” the security issue in question.

Updates will keep your friends and family safe
It goes without saying that any shared computers at home that aren’t updated could expose not just your accounts and personal and financial information to attackers, but also those of your family members or housemates. Hackers may also hijack your email, messaging, and social media accounts to send hidden malware to your contacts. So, by keeping your devices and software on the most secure version, you’ll be doing your friends and family a favor, too.

Updates will ensure you have the best-performing device
Software updates don’t just keep your device secure. They are also issued to fix any performance issues the developers may have identified. So updating could help enhance your battery life, stop apps and other programs from crashing due to glitches, improve the speed at which pages load, and add a range of other functionality designed to make the user experience better. In other words, you deserve the best, don’t you?

Updates give you the latest functionality for free
Software developers also use updates to enable new features for their users. Consider an iOS update – the latest of them had a huge range of new capabilities, from message editing and customizable lock screens to Apple Pay enhancements and even a Safety Check feature to help people in abusive relationships. Again, who wouldn’t want to be on the latest and greatest version of their software?

Updates will head off trouble with your employer
Many companies insist that their remote working employees use only corporate-owned devices, which will have their own update mechanisms. But some may allow staff to use their personal devices to connect to corporate networks and access business apps in the cloud. However, if these devices are compromised because you failed to update key software, there could be trouble.

An attacker could steal your corporate logins to access sensitive company data and systems Or they could use the same access to infect the corporate network with malware. This could lead to a serious data breach or ransomware attack. The average cost of data breaches today stands at nearly US$4.4m per incident.

Other things to consider
To make matters easier, most devices and PCs today have automatic updates turned on by default. If for some reason yours doesn’t, a quick web search will show you how. Also, consider:

  1. Backing up regularly, in case an update breaks your machine/device and you lose any data
  2. Taking care where to download software from in the first place: only use approved app stores
  3. Adding extra security to your environment with security software for PCs and other devices, from a reputable provider

Ultimately, updates are about getting the safest, freshest, most feature-rich experience possible. That’s something every technology user should be on board with.

Cyber Security

Skills Gap Exposes Organisations to Risks

Published

on

Written by Rob Rashotte, Vice President, Global Training & Technical Field Enablement at Fortinet (more…)

Continue Reading

Expert Speak

Telegram’s Privacy Paradox: The Challenges of Balancing Security and Responsibility

Published

on

Written by Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East

In the complex and ever-evolving world of digital communication, Telegram has emerged as a platform that uniquely exemplifies the tension between privacy, security, and the responsibilities of tech companies in the 21st century. From its inception, Telegram has distinguished itself from other social networks and messaging apps by offering features designed to enhance user privacy and facilitate large-scale communication. These include end-to-end encryption (in secret chats), anonymous accounts, and the ability to create groups with up to 200,000 members, making it a popular choice for users worldwide. However, this popularity brings significant challenges, particularly in the realm of cyber security.

One of Telegram’s most distinctive aspects is its strong emphasis on privacy. Unlike many other platforms, Telegram allows users to join groups and communicate without revealing their phone numbers, offering a level of anonymity highly valued in an age where digital footprints are increasingly scrutinized. This focus on privacy extends to its encryption practices, with end-to-end encryption available in secret chats, ensuring that messages are accessible only to intended recipients. Additionally, Telegram’s use of its MTProto protocol for standard chats balances speed and security, making it a preferred choice for users prioritizing both performance and privacy.

However, the same features that make Telegram attractive to privacy-conscious users also create vulnerabilities that can be exploited by malicious actors. The platform’s capacity for anonymous communication and its less aggressive approach to content moderation have made it a haven for those engaging in illegal activities. From the sale of illegal goods to the coordination of cyberattacks, Telegram’s infrastructure has, at times, facilitated activities outside the bounds of the law. This has led to growing concerns among governments and cybersecurity experts about the potential for misuse.

The recent arrest of Telegram’s CEO under allegations related to the platform’s use by illegal groups has brought these issues to the forefront. This event highlights the ongoing struggle to balance the protection of user privacy with the need to prevent and mitigate illegal activities online. It also raises important questions about the responsibilities of platform providers in policing content and communications on their networks. In a world where digital privacy is increasingly valued, how can platforms like Telegram ensure they are not inadvertently enabling criminal behaviour? What role should governments and cyber security firms play in monitoring and regulating these platforms?

From a cyber security perspective, Telegram’s challenges are significant. The platform’s distributed infrastructure, spread across multiple jurisdictions, makes it difficult to block or take down, even in countries where it is officially banned. This resilience against censorship is one of Telegram’s key strengths, allowing it to remain operational in regions with restrictive governments. However, it also means that law enforcement agencies face significant hurdles in monitoring and shutting down illegal activities on the platform. The built-in proxy support that allows users to bypass government restrictions further complicates efforts to control the flow of information and activity on Telegram.

Another key issue is the scale at which Telegram operates. With the ability to create groups of up to 200,000 members, Telegram facilitates the rapid dissemination of information, which can be both a blessing and a curse. While this capability allows for the formation of large, engaged communities, it also makes it easier for bad actors to spread harmful content or coordinate large-scale illegal activities. The sheer size of these groups makes moderation a daunting task, and Telegram’s relatively lenient approach to content takedowns has been a point of contention for critics who argue that the platform does not do enough to curb illegal behaviour.

Despite these challenges, Telegram’s rise to popularity is understandable. The platform offers a level of privacy and functionality that is unmatched by many of its competitors. For users who value their anonymity and want to engage in large-scale communication without the fear of being tracked or monitored, Telegram is an ideal choice. The platform’s features are particularly appealing in regions where government surveillance is prevalent, providing users with a means of communication that is resistant to censorship and government interference.

However, as the arrest of Telegram’s CEO demonstrates, the platform’s success comes with significant risks. The fine line between protecting user privacy and enabling illegal activities is one that Telegram, like many other tech companies, must navigate carefully. The challenge lies in finding a way to uphold the principles of privacy and freedom of speech while also taking proactive measures to prevent the platform from being used for nefarious purposes.

For cyber security firms, the situation with Telegram underscores the importance of developing advanced solutions that can address these complex issues. As the digital landscape continues to evolve, tech companies, governments, and cyber security experts need to work together to create an environment where users can communicate freely without fear of their privacy being compromised, while also ensuring that these platforms are not used to facilitate illegal activities. The arrest of Telegram’s CEO is a reminder of the ongoing challenges in this space and the need for continued innovation and collaboration to protect both individual freedoms and global security.

In conclusion, while Telegram offers unique advantages in terms of privacy and scalability, these same features also pose significant challenges from a cybersecurity standpoint. The platform’s resilience, anonymity, and large group capabilities make it both a powerful tool for legitimate communication and a potential hotspot for illegal activities. As we move forward, it will be crucial to find a balance that allows for the protection of user privacy while also addressing the security concerns that come with such a powerful platform.

Cyber security Tips for Telegram Users:

  1. Enable Two-Factor Authentication (2FA): Adding an extra layer of security to your Telegram account helps protect against unauthorized access.
  2. Be Cautious with Public Groups and Channels: Always verify the authenticity and purpose of public groups or channels before engaging to avoid potential scams or malicious content.
  3. Regularly Update Your Telegram App: Ensure you have the latest security patches and features by keeping your Telegram app updated.
  4. Use Secret Chats for Sensitive Conversations: Secret Chats offer end-to-end encryption, providing an additional layer of privacy for sensitive communications.
  5. Monitor App Permissions: Regularly check and manage the permissions Telegram has on your device to prevent unnecessary access to your data.
Continue Reading

Cyber Security

Is Artificial Intelligence a Boon or Bane for Cybersecurity?

Published

on

Written by Sergey Belov, Head of Internal Security at Acronis (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.