Connect with us

Cybersecurity

China Aggressively Intercepts Didi’s Rising Shares Days After Major IPO

Tara Ragone

Published

on

We may earn a small commission when you click or purchase an item using a link on this website.


As a part of China’s efforts to improve monitoring of data controlled by tech giants in their vicinity, an investigation has been initiated against Didi Global Inc. (Didi). Exact details surrounding why Didi needed to be looked at in the first place remains unclear, but China did mention that it is being done to identify and prevent threats. National security, data security, and public interest were cited as the main concerns influencing the investigation. 

Didi was founded in 2012, but expanded tremendously  in 2018 on an international level, and now conducts business in numerous geographical locations throughout the world. Didi was only one out of 34 companies that China’s State Administration for Market Regulation had sent a warning to about anti-competitive behavior being prohibited.


The Cyberspace Administration of China (CAC) has dictated that Didi is not permitted to enroll new users while the investigative review is active. However, operations are otherwise functioning normally in the 14 countries it serves. Numerous areas were noted by Didi as potentially being in review for violations, including monopoly, unfair and deceptive practices, quality, and legal compliance.

Didi’s shares dropped an astonishing 10% after the investigation against them was announced by China’s cyberspace agency. Didi only started trading in the New York Stock Exchange two days prior to the review becoming effective. A research analyst implied that whether investing in Didi is a good idea or not will depend on the length of the investigation, but that it is too soon to know for sure.

Didi, which is based out of Beijing, pledges to meticulously analyze cybersecurity risks that may apply to their enterprise and to fully cooperate with the governmental oversight currently examining them. This instance of an immediate review by governing authorities regarding technical data regulations is an example of how China is aggressively stepping up their data protection mechanisms. 

Tara Ragone is a tech blog writer who focuses primarily in areas concerning cybersecurity and artificial intelligence. She holds a BA degree in legal studies and MA degree in homeland security, both awarded by Keiser University. Tara has been fulfilling her passion to learn and write about essential groundbreaking topics by researching, analyzing, and writing in academic and professional environments for over five years.

Continue Reading
Advertisement
Click to comment
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments

Cybersecurity

Securing Your VPN Server

Tara Ragone

Published

on

Virtual Private Networks (VPNs) offer a great sense of security for individuals who need to connect to a system remotely. By using a VPN, a person can access an encrypted internet gateway without using his/her own private connection. 

VPNs are known to be a secure method for entering databases from any desired location in alternative to traveling to the actual location where a computer is, like an office setting. Despite the positives though, VPN users still face security threats such as a personal device being accessed by a cybercriminal somehow. 


To combat the risks associated with VPN use, refer to the below tips:

  • Enforce Policies. Most data systems operating in a defined location have policies in place so that users can protect information. Transferring these policies to remote VPN users will remind them to take caution when using their devices. Developing and enforcing penalties for users who fail to abide by the policies will lead to increased compliance.  
  • Implement Strong Authentication. Authentication methods will vary for VPNs depending on its purpose, but using the strongest one available is the safest.
  • Add Encryption. Adding encryption to your VPN will strengthen its defense against cybercrimes. 
  • Set Access Limitations. Limiting access to only the individuals who have a legitimate need to see and use particular data will allow easier monitoring. This will also lower the chances of information being exploited through a personal device.
  • Include Other Features. If features are available that allow tasks to be done without connecting to the VPN, they should be utilized to reduce unnecessary access
  • Require Additional Protection. Require that VPN users install extra layers of protection to their devices such as firewall and antivirus software.

VPN servers can easily become the target of a cyberattack. Follow the tips listed above to avoid the consequences of having a vulnerable server.

Continue Reading

Cybersecurity

Has Your Information Been Breached in a Hack? Here’s What You Can Do

Tara Ragone

Published

on

Hackers often target email and social media accounts as part of their schemes to steal your information. Being victimized by a hack can have a major detrimental effect on your reputation or can even lead to something as severe as identity theft. 

Knowing what to do if you are impacted by a hack is extremely important in order to minimize the negative effects right away. Below are essential steps you should take immediately to protect yourself and others after suffering a hack:


  • Change your password – You should quickly change your password on the hacked account and any other accounts you have guarded with the same password. If there are any hints at all regarding what your passwords might be (name of your pet, job, birthdate, etc.) then that is reason enough to change your passwords too.
  • Notify your contacts – Any contacts that are linked to your account should be notified as soon as possible about the hacking incident. This will help ensure they do not click on links or respond to hackers and unknowingly fall into the trap of a phishing or malware scam.
  • Report the hack – Reach out to local authorities to alert them of an active hack happening on your account. You may also want to speak to someone at your bank if you believe financial data was accessed during the illicit act. If the hack is very serious and you are concerned your information has been stolen and maliciously used, then you can report it at www.identitytheft.gov to receive assistance creating a recovery plan.
  • Review your account – Log into your account and check everything thoroughly to make sure there are no new or unusual links posted anywhere. Review your list of contacts or friends to verify no strange people have been added who were not there before. 

Continue Reading

Apple

Keeping Your Apple iPhone Secure and Hack-Free

Tara Ragone

Published

on

Apple has publicly stated that their iPhones are designed with security of your information and privacy in mind. Your iPhone is said to have protections built into it that prevent anyone from accessing data contained in your device itself or the iCloud. While this sounds convincing, Apple recommends you take some of the extra cautions listed below to prevent a security incident such as hacking:

  • Set a strong password – Make sure you set a password that is required to be entered prior to gaining access to anything in your iPhone. Do not use common or obvious words or phrases and ensure it is very unique.
  • Utilize Face ID or Touch ID – Supported iPhone models allow you to add security features that only authorize access to content in your phone upon physically seeing your face or identifying your fingerprint.
  • Activate ‘Find My iPhone’ – By activating the ‘find my iPhone’ feature on your device you will be able to locate it in the unfortunate case that it is stolen or lost. This may allow you to find the phone before anyone is able to somehow gain access or report it to authorities if warranted. 
  • Secure your Apple ID – Your Apple ID is what permits you to gain access to your iCloud and apps so ensuring this is protected sufficiently is important.

Additional security methods in the iPhone that can fight against hacks include adequately controlling data and location, reviewing privacy notices of apps prior to downloading them, and gaining an understanding of your browsing privacy. Apple links are provided for further information on all of the security suggestions mentioned hereinabove.


vpnMentor has admitted that Apple sets high standards for their users’ privacy and that their iPhones are likely more challenging for hackers to break into. Despite this though, it is believed that hackers can find ways around the sophisticated security measures set forth by Apple and even have used their creativity to spy on users through iPhone cameras. This information reiterates the idea that being extremely careful and mindful about apps that are downloaded and what is shared during that event can make or break a hacker’s malicious goal. 

Continue Reading
Advertisement

Sign Up For The Latest Bite Sized Tech News


Trending

0
Would love your thoughts, please comment.x
()
x