{"id":156803,"date":"2023-02-10T14:09:00","date_gmt":"2023-02-10T12:09:00","guid":{"rendered":"http:\/\/devrri.freshlemon.ro\/news-and-current-affairs\/newsflash\/challenges-in-cybersecurity-156803.html"},"modified":"2024-02-19T15:38:54","modified_gmt":"2024-02-19T13:38:54","slug":"challenges-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html","title":{"rendered":"Challenges in Cybersecurity"},"content":{"rendered":"<\/p>\n<p>The military conflict caused by Russia in neighboring&#13;<br \/>\nUkraine takes place in cyberspace too. Some researchers are saying that we are&#13;<br \/>\ntalking about the biggest war of the cybernetic era, and the most significant&#13;<br \/>\nescalation on both sides. <\/p>\n<p><\/p>\n<p>Early in the conflict, Moscow launched an impressive&#13;<br \/>\nnumber of destructive attacks against dozens of Ukrainian networks, managing to&#13;<br \/>\ndamage the Viasat satellite network, and cause grief for Ukraine&#8217;s defenses. A&#13;<br \/>\nfew weeks in, the pace of such attacks went down, and right now, almost a year&#13;<br \/>\ninto the war, the main cybernetic activity that Russia carries out in relation&#13;<br \/>\nto Ukraine is intelligence gathering. In addition to challenges caused by the&#13;<br \/>\nwar, China&#8217;s technological advance, and the pandemic, which moved a lot of&#13;<br \/>\nactivities online, are as many reasons for cyberscurity to be more and more of&#13;<br \/>\na reason for worry. <\/p>\n<p><\/p>\n<p>In this geopolitical context, with so many uncertainties,&#13;<br \/>\nthings are sure to stay the same, with organizations at all levels being more&#13;<br \/>\nand more exposed to the threat of cybercrime. The global costs of cybercrime&#13;<br \/>\nare expected to go up by 15% per year until 2025, and amount to more than 10&#13;<br \/>\ntrillion dollars a year, as seen in a report by Cybersecurity Ventures, much&#13;<br \/>\nhigher than the cumulative profits of drug trafficking worldwide. The new kinds&#13;<br \/>\nof online fraud will become more elaborate and harder to detect, as computer&#13;<br \/>\ncrime perpetrators are moving towards using artificial intelligence tools,&#13;<br \/>\naccording to the National Cybersecurity Directorate in Bucharest. The security&#13;<br \/>\nof institutions is under careful care by experts and authorities, but regular&#13;<br \/>\nusers are much more exposed, and need assistance to fend off the many kinds of&#13;<br \/>\nattacks they are vulnerable to. <\/p>\n<p><\/p>\n<p>Among the most widely used fraud attacks for&#13;<br \/>\nstealing personal data are phishing attacks by e-mail, which ask for&#13;<br \/>\nidentifying data through spurious offers, the National Cybersecurity&#13;<br \/>\nDirectorate in Bucharest warns. At the same time, many misleading messages are&#13;<br \/>\nalso disseminated on social media and search engines, as explained for Radio&#13;<br \/>\nRomania by Mihai Rotariu, the head of communication for the directorate, who&#13;<br \/>\nprovided a few examples:<\/p>\n<p><\/p>\n<p>&#13;<br \/>\n&#13;<\/p>\n<p>Mihai Rotariu: As we begin this year, we see an increase in attempts at&#13;<br \/>\nonline fraud. As usual, the attackers are using the context we are in, and are&#13;<br \/>\ntrying to take advantage of commercial discounts associated with winter. More&#13;<br \/>\nto the point, they are launching phishing campaigns using the visual identity&#13;<br \/>\nof popular brands, which are usually more active during this period. We are&#13;<br \/>\ntalking about commercial banks, retailers, some online services, and delivery&#13;<br \/>\nservices. We have even witnessed fraud attempts using the image of some public&#13;<br \/>\ninstitutions, such as the police, the fiscal authority, or even Europol. Most&#13;<br \/>\nphishing attacks occur by e-mail, but they can be propagated through social&#13;<br \/>\nmedia or text messaging, SMS, and the goal of attackers is to harvest personal&#13;<br \/>\ndata, be they financial or authentication data, mainly by redirecting the&#13;<br \/>\npotential victim to cloned websites. These are sites that look like the real&#13;<br \/>\nones, but have a slightly different address, and are in another domain. Which&#13;<br \/>\nis vital to pay careful attention to the name and security status of a websites&#13;<br \/>\nwhere we use personal data.<\/p>\n<p><\/p>\n<p>&#13;<br \/>\n&#13;<\/p>\n<p>It is no secret that attackers are relying more and more&#13;<br \/>\non artificial intelligence, enhancing and automating their activities, adapting&#13;<br \/>\nto the context better, and having a better rate of success. However, we should&#13;<br \/>\nnot panic, says Mihai Rotariu: <\/p>\n<p><\/p>\n<p>&#13;<br \/>\n&#13;<\/p>\n<p>Mihai Rotariu: If we have cybersecurity routine, and good online&#13;<br \/>\nhygiene, we should not panic, because we can sidestep about 90% of attacks.&#13;<br \/>\nWhen I am talking about routine, I am referring to forming reflexes when acting&#13;<br \/>\nonline, formed just like the ones in real life. For instance, when we cross the&#13;<br \/>\nstreet, we look right and left and check the traffic light. This is the case&#13;<br \/>\nwith links we access too. We don&#8217;t click on a link from an unknown source&#13;<br \/>\nbefore running a check on the source, using a security solution. At the same&#13;<br \/>\ntime, we have to know clearly that most companies that offer online services,&#13;<br \/>\nespecially banks, would never send e-mails with links for updating or verifying&#13;<br \/>\nauthentication data. You should never go to websites for, let&#8217;s say, online&#13;<br \/>\nbanking through a link sent by SMS or e-mail, or through sponsored ads, you&#13;<br \/>\nshould only use the smartphone app. We also recommend you enter the website&#13;<br \/>\naddress manually in your Internet browser, taking care not to end up carelessly&#13;<br \/>\non such cloned sites. You should pay close attention to the exact name of the&#13;<br \/>\ndomain, because attackers substitute digits for letters, and if we rush through&#13;<br \/>\nthe process we could be fooled into thinking we are on the original site, but&#13;<br \/>\nin fact we are on the cloned site. Last but not least, pay close attention to&#13;<br \/>\noffers online that look too good to be true.<\/p>\n<p><\/p>\n<p>&#13;<br \/>\n&#13;<\/p>\n<p>Mihai Rotariu added that we should always check with the&#13;<br \/>\ncompany purporting to make the online promotional offers before acting on the&#13;<br \/>\npurchase. (C.C.)<\/p>\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new kinds of online fraud will become more elaborate and harder to detect<\/p>\n","protected":false},"author":108,"featured_media":89024,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[43939],"tags":[34772,36204,29310,44678,28905,36582],"coauthors":[],"class_list":["post-156803","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-future-starts-today","tag-ai","tag-cybersecurity","tag-russia","tag-threats","tag-ukraine","tag-war"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Challenges in Cybersecurity - Radio Romania International<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Challenges in Cybersecurity - Radio Romania International\" \/>\n<meta property=\"og:description\" content=\"The new kinds of online fraud will become more elaborate and harder to detect\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html\" \/>\n<meta property=\"og:site_name\" content=\"Radio Romania International\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-10T12:09:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-19T13:38:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rri.ro\/wp-content\/uploads\/2023\/10\/cyber-cibernetica-sursa-pixapay-com.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Corina Cristea\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Corina Cristea\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html\"},\"author\":{\"name\":\"Corina Cristea\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#\\\/schema\\\/person\\\/f9ab1cb3569dee1b2c033a814bb7f0fc\"},\"headline\":\"Challenges in Cybersecurity\",\"datePublished\":\"2023-02-10T12:09:00+00:00\",\"dateModified\":\"2024-02-19T13:38:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html\"},\"wordCount\":838,\"image\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rri.ro\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/cyber-cibernetica-sursa-pixapay-com.jpg\",\"keywords\":[\"AI\",\"cybersecurity\",\"Russia\",\"threats\",\"Ukraine\",\"war\"],\"articleSection\":[\"The Future Starts Today\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html\",\"url\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html\",\"name\":\"Challenges in Cybersecurity - Radio Romania International\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.rri.ro\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/cyber-cibernetica-sursa-pixapay-com.jpg\",\"datePublished\":\"2023-02-10T12:09:00+00:00\",\"dateModified\":\"2024-02-19T13:38:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#\\\/schema\\\/person\\\/f9ab1cb3569dee1b2c033a814bb7f0fc\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html#primaryimage\",\"url\":\"https:\\\/\\\/www.rri.ro\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/cyber-cibernetica-sursa-pixapay-com.jpg\",\"contentUrl\":\"https:\\\/\\\/www.rri.ro\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/cyber-cibernetica-sursa-pixapay-com.jpg\",\"width\":640,\"height\":426},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\\\/challenges-in-cybersecurity-id156803.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/www.rri.ro\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Features and Reports\",\"item\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Future Starts Today\",\"item\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/features-and-reports\\\/the-future-starts-today\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Challenges in Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#website\",\"url\":\"https:\\\/\\\/www.rri.ro\\\/\",\"name\":\"Radio Romania International\",\"description\":\"Totul despre Rom\u00e2nia \u015fi rom\u00e2ni, \u00een 13 limbi\\\/dialecte!\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.rri.ro\\\/#\\\/schema\\\/person\\\/f9ab1cb3569dee1b2c033a814bb7f0fc\",\"name\":\"Corina Cristea\",\"url\":\"https:\\\/\\\/www.rri.ro\\\/en\\\/author\\\/corina-cristea\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Challenges in Cybersecurity - Radio Romania International","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html","og_locale":"en_US","og_type":"article","og_title":"Challenges in Cybersecurity - Radio Romania International","og_description":"The new kinds of online fraud will become more elaborate and harder to detect","og_url":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html","og_site_name":"Radio Romania International","article_published_time":"2023-02-10T12:09:00+00:00","article_modified_time":"2024-02-19T13:38:54+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.rri.ro\/wp-content\/uploads\/2023\/10\/cyber-cibernetica-sursa-pixapay-com.jpg","type":"image\/jpeg"}],"author":"Corina Cristea","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Corina Cristea","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html#article","isPartOf":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html"},"author":{"name":"Corina Cristea","@id":"https:\/\/www.rri.ro\/#\/schema\/person\/f9ab1cb3569dee1b2c033a814bb7f0fc"},"headline":"Challenges in Cybersecurity","datePublished":"2023-02-10T12:09:00+00:00","dateModified":"2024-02-19T13:38:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html"},"wordCount":838,"image":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html#primaryimage"},"thumbnailUrl":"https:\/\/www.rri.ro\/wp-content\/uploads\/2023\/10\/cyber-cibernetica-sursa-pixapay-com.jpg","keywords":["AI","cybersecurity","Russia","threats","Ukraine","war"],"articleSection":["The Future Starts Today"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html","url":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html","name":"Challenges in Cybersecurity - Radio Romania International","isPartOf":{"@id":"https:\/\/www.rri.ro\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html#primaryimage"},"image":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html#primaryimage"},"thumbnailUrl":"https:\/\/www.rri.ro\/wp-content\/uploads\/2023\/10\/cyber-cibernetica-sursa-pixapay-com.jpg","datePublished":"2023-02-10T12:09:00+00:00","dateModified":"2024-02-19T13:38:54+00:00","author":{"@id":"https:\/\/www.rri.ro\/#\/schema\/person\/f9ab1cb3569dee1b2c033a814bb7f0fc"},"breadcrumb":{"@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html#primaryimage","url":"https:\/\/www.rri.ro\/wp-content\/uploads\/2023\/10\/cyber-cibernetica-sursa-pixapay-com.jpg","contentUrl":"https:\/\/www.rri.ro\/wp-content\/uploads\/2023\/10\/cyber-cibernetica-sursa-pixapay-com.jpg","width":640,"height":426},{"@type":"BreadcrumbList","@id":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today\/challenges-in-cybersecurity-id156803.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/www.rri.ro\/en"},{"@type":"ListItem","position":2,"name":"Features and Reports","item":"https:\/\/www.rri.ro\/en\/features-and-reports"},{"@type":"ListItem","position":3,"name":"The Future Starts Today","item":"https:\/\/www.rri.ro\/en\/features-and-reports\/the-future-starts-today"},{"@type":"ListItem","position":4,"name":"Challenges in Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/www.rri.ro\/#website","url":"https:\/\/www.rri.ro\/","name":"Radio Romania International","description":"Totul despre Rom\u00e2nia \u015fi rom\u00e2ni, \u00een 13 limbi\/dialecte!","inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.rri.ro\/#\/schema\/person\/f9ab1cb3569dee1b2c033a814bb7f0fc","name":"Corina Cristea","url":"https:\/\/www.rri.ro\/en\/author\/corina-cristea"}]}},"_links":{"self":[{"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/posts\/156803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/users\/108"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/comments?post=156803"}],"version-history":[{"count":0,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/posts\/156803\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/media\/89024"}],"wp:attachment":[{"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/media?parent=156803"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/categories?post=156803"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/tags?post=156803"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.rri.ro\/en\/wp-json\/wp\/v2\/coauthors?post=156803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}