The Data Blog
With the recent Twitter account hacks of notable celebrities and politicians such as Barack Obama, Bill Gates, and Kanye West, the question of "can you ever be too secure?" comes to light. Notable people with millions of followers on Twitter were being hacked, so why can't it happen to you? Even if your accounts aren't the ones being directly hacked, what if you're a victim of an indirect hacking? Many Twitter users were tricked into sending over bitcoin to the person behind these celebrity account hacks, so despite not even being touched, their information and assets were rendered vulnerable.
While the cyber security industry is certainly seeing improvements over time, computer hackers are also becoming more advanced in how they can steal information or assets from the general public. They've evolved from spam emails and phone calls, which many people still fall for, to password cracking, IP tracing, and webcam spying over the years and soon may hit the next big thing as well.
So how do you keep your information secure? Here are a few quick tips you can try!
1) Make sure your password is different for every website/account you have
2) Keep your virus protector and anti-malware subscriptions up-to-date
3) Don't click any links on social media, emails, or other websites that you don't recognize
4) Don't connect to public WiFi when you have sensitive information that can be easily accessed
5) Remember you aren't above cyber security; just because it hasn't happened to you yet, doesn't mean it won't.
Anomaly Detection, a common topic in machine learning, is a field dedicated to detecting unexpected or behavior-deviating trends and events in data sets, which if left unnoticed, can disrupt or skew the data as a whole. Typically used in heavy data domains such as finance, economics, statistics, and other technology sectors, anomaly detection is becoming more popular in the world to ensure the absolute perfection of data findings. While once not relied on due to the criticisms anomaly detection algorithms grew for having high false-positive rates, algorithms over the years have developed significantly and the field is becoming more popular than ever.
Software engineers, data analysts, and statisticians, are several among many of the professions who in the future will rely on anomaly detection to ensure their findings are as accurate as possible. Using more advanced techniques such as multivariate anomaly detection, findings become even more reliable as outliers are signaled out in an even greater pace. For example, anomalies can be spotted in VIF tests to search for multicolinearity, ensuring that the data isn't skewed because many factors have the same backbone to rely on. On the other hand, logistic regressions can show exactly where outliers lie in comparison to the two variables they're tested against to ensure outliers that have nothing to do with our data are left out as well.
Anomaly detection is becoming more prominent in society and as such, machine learning algorithms and all of technology continue to advance each and every year for the benefit of data scientists everywhere.
Partnership with Edgeworx
ExactData and Edgeworx Excited to form Partnership
ExactData and Edgeworx will work closely together to market and distribute synthetic data to Canadian technology sectors
ExactData and Edgeworx have formed a partnership to market ExactData’s synthetic data to relevant businesses across borders that would benefit from the innovative technology. Not only will this help expand the opportunities and growth for artificially generated data, but it will open the world of possibilities for model testing and training using synthetic data as opposed to its traditional authentic counterpart.
Synthetic data generation is predominantly used in place of authentic data due to its more flexible and adaptable nature. As it can be continuously generated for several different purposes, synthetic data has the potential to test much more scenarios and train advanced applications in a shorter period. Common use cases for synthetic data are applying it for machine learning, threat detection, and AI behavior modeling, all of which are fields that have benefited greatly from the use of synthetic data. Furthermore, there are many more sectors of the technology and cybersecurity industries that will benefit greatly by using ExactData’s smart data for all their data needs.
Edgeworx Solutions provides clientele with all their technology needs which ranges across different fields throughout the world of modern technology. Examples include cloud networking, cybersecurity, performance optimization, data analytics, and now, all synthetic data needs. Entering new technology markets with Edgeworx help is a clear, exciting step in the right direction. Edgeworx direction and network and ExactData’s technology will make a great team for years to come that shows both promise and endless possibilities.
Edgeworx website can be found here!
Raising the Cost of Adversary
Every company or government agency has had some sort of data breach at some point in time. They might not even know that the breach has happened. An interesting new strategy gaining interest within the cyber security community is the use of offensive misinformation campaigns.
Misinformation campaigns involve generating synthetic databases that would be indistinguishable from the production databases and having them passed to adversaries either through a honeypot deception solution or directly placed on dark websites dealing with selling stolen data. The result is that the adversaries will uselessly expend resources trying to sort out what is real and not, place doubt on any real information they might already have, and run illicit fraud campaigns against people who do not exist.
For example, the Boeing aircraft manufacturing company would leak synthetic highly confidential wing design databases that would be indistinguishable from the real ones without extensive analysis or access to other information for verification. Other examples would be Equifax leaking bogus credit reports or VISA fake personnel financial information. The confusion and harmful effects on the adversarial community is tremendous.
ExactData would recommend implementing an offensive misinformation campaigns working with a threat intelligence company that has a deep understanding of the Dark Web. The TOR Network is an anonymous internet protocol which allows users to conceal their identity when browsing the internet and allows users to access the Dark Web. The Dark Web contains some of the most illicit marketplaces, advanced hacking groups, and a common method to leak sensitive information anonymously such as SSN’s, trade secrets, and military/government documents.
As all the users within using TOR are anonymous. It is not possible to know if the person or website you are interacting with is trustworthy. Trust is instead developed through the interactions with the community such as product and vendor feedback for listings on the popular illegal marketplace
“Empire” or dark web community forums such as “Dread”.
The threat intelligence company will be able to access this community and leak the realistic synthetic data into this illegal marketplace in a credible fashion through deception techniques. The realistic synthetic data not only aids in building the trust of the adversary for direct counter measures, but also once the synthetic data is transferred into the community the desired confusion and harmful effects.
Learn more at www.exactdata.net
Happy Independence Day!
We at ExactData wish you the best for any upcoming Fourth of July celebrations, as well as any recent or upcoming celebrations for Canada Day! For fireworks lovers, we have a bit of information that may interest you! The creation of fireworks is evolving so that they can be modeled and engineered synthetically; using previous data and predictive analytics based on how well other products work, new fireworks can be created and tested virtually. Talk about a could be boom in the industry!