The cyber deliquency improves at the same time as technology does, even further. The attacks are in the fifth generation. From the 90th viruses it went to the network interferences, to the interruption of applications, data robbery and in the last years, to the big global attacks.
But this year, the main experts in security reunited in the Cybertech of Tel Aviv (Israel), the biggest international encounter of this sector where El Pais was invited by the Outter Matter Minister from Israel. They espect a fortification of the criminal ofensive: the sixth generation.
The gates for the cyber attacks have multiplied, explained Oded Vanunu, boss of vulnerability investigation in Check Point, who consider that is happening a similar phenomenon as a weapon race.
“They will be stronger, faster and sophisticated. They will use the world connected, from the information clouds, cars or social networks, games, drones, or elements that looks harmless like videogames or robotized vacuum cleaners.
Udi Mokadi, general director of Cyberark, one of the biggest sector’s company and present in 70 different countries, share this vision. “The world is changing in a very drastic way. Its no longer worth to protect one organization, but it is also needed to control the suppliers.”
“An attacker seeks the easiest way and the most exposed one. They are professionals, not rookies. The security is a need and we have to go ahead, switch to the offensive. The cost of an error is high”, said.
The management director of blumberg Capital, Ehud Schneorson, points that “the global solution goes by machines replacing men” in the prevention, detection and resolution of attacks. It’s the aplication of artificial intelligence with “superpowers” explains.
The problem, which has been spoken in the last encounter of the highest international leaders in Davos, “ it has been located at the same level as global warming or natural disasters”, pointed Gil Shwed, one of the founders of Check Point. “ If we only work on the detection, we are doomed”, warned.
The numbers confirm the global worry. Every day are registered a million of alerts of any kind of attacks. 10 years ago, the ways of attacking were only around 50 and the threats registered only around 1000. The laboratories of Check Point carry out four million of simulations every day to analyse attacks that come from the cloud from any kind of device.
“The cloud is essential because it adds security before arriving to the devices”, pointed Udi Mokadi. This strategy based in offensive and quick action has been a success. Israel presented last year a balance of “zero damage by attacks”, according to Yigal Unna, israeli general director of cybersecurity. Microsoft achieved to abort the infection of Bad Rabbit in 14 minutes, explained by the security chief of this company, Diana Kelly.
The obsession of the israeli Government for covering all vulnerable fronts against the cyberattacks, that ensure them to become the second country that is more threatened behind the EE.UU., brought the responsibles of security to create a free technician phone for emergencies similar to 112.
The service, that counts with the phone number 119, receives around 540 calls per day and register around 40 cases of phising, 12 pormlaware infections, 20 vulnerability alert and 40 international warnings.
Any citizen that suspects being victim of a security breach in their systems or devices can ask for the intervention of a technology team, formed by students in their majority, to solve the threat or intrusion. Yigal Unna defends the service. “It works as a pandemic prevention. Like this, we can identify the zero patient”, explains.