Pivot Cloud Solutions

An AI Company

How AI is helping us fight even Apple’s data theft!

If you still think AI is not for public use, you have to read this and then go being anti-ai lobbyist, if you can!

We have been using our AI to defend cyber attacks, malware attacks and ad-ware (thank god, haven’t been subjected to so called you might like this ‘shit’ ads all over the pages for a long time now).

Here is surprising thing happened even baffled me. We use Pivot Security with full protection enabled (available for customer who are willing to spend some time on customizing their AI offering). Last while week every morning my internet connection was down, I had to enable manually.

I had to engage our internal staff to figure out whether our AI is broken or I am being attacked! It turned out AI detected unusual communication patterns after the system goes sleep. Something is walking the system up and sending data. First we thought it was a malware or even NSA (they don’t respect anyone’s privacy, right!). but it was apple and google! they are communicating with their servers. Why are they doing it? We can’t answer that, only they can answer it.

Our AI learned something a miss, it stared to take defensive action, It shut down the network access, waiting for me to manually enable the network access. It is what we programed to do, in case of emergency take evasive action, it shut down network.

 

Do you still think AI is not ready for public? Ofcourse there are bad people who are using AI for bad things, but you have to support the good AI development. By helping companies who are committed to good AI development, you are promoting positive things happen in the world.

 

Continue Reading

Adware posing as a private network client secretly takes screenshots

Do you think free software is FREE? here the evidence reported by digital trends,

But that client is just a decoy. When the Windows 10 device owner runs the fake VPN client for the first time, it downloads the actual adware components along with a rootkit: Malware that resides at the root of your PC before loading Windows 10. There is also another component called an “updater” that receives instructions and makes updates to the adware and rootkit when needed. 

Only Pivot Security, looks after clients https://www.pivotsecurity.com.

Continue Reading

Android Performance Tips

One of the biggest strengths of Android is the way it allows apps to continue running in the background, just like a normal computer does.

It gives Android a massive advantage over the likes of iOS and Windows Phone, which both have only limited support for multitasking. These operating systems constantly close apps when you switch away from them, then reopen them when you need them again. It makes these systems far less flexible in terms of what apps can do on them, and far less powerful for the user.

But Android’s strength in this area also gives rise to one of the most common questions: how do you close apps?

We’ll get to that in a moment. But first, the sideways answer: you don’t need to close apps on Android at all.

Why closing Android apps is worse than leaving them running

In fact, constantly closing apps can have a detrimental effect on your phone’s performance, and on its battery life.

Android is very good at managing its resources. It has a certain amount of memory (RAM) to work with, and it’ll happily allow apps to use as much as they need for best performance.

If RAM starts to get a bit short, and other apps and tasks need some, then the OS will quietly close one of the apps running in the background that you haven’t used for a while, and assign that app’s RAM to the new task.

As a result, apps can stay in memory for hours, days or potentially even weeks since you last used them. And this is fine. They’re not draining the battery or using other resources so there’s no downside; the upside is they will load much quicker when you need them, and load them right back to the place where you left off too.

(It’s also worth noting at this point that there’s really no benefit in keeping RAM free. RAM exists to be used, and using all of it at any given time—or virtually all of it at least—will ensure your phone or tablet runs smoother than if you try and keep some RAM free.)

With all this in mind, it becomes clear why closing apps can have a worse effect on Android than leaving them open.

Task killers are bad for Android

We’ve known for some time that task killers should not be used. Apps like Advanced Task Killer continue to rack up millions of downloads, despite being worthless or even harmful.

Task killers will frequently close down apps and services that are designed to be left running in the background. When these are closed, they open up again straight away, and the cumulative effect of this constant stopping and starting is that your phone gets slower and the battery drains quicker—the exact opposite of what these task killers are designed to achieve.

The same principle applies to manually closing apps too.

As Oasis Feng, the developer of the excellent power management app Greenify, explained recently:

Swiping away apps from recent tasks kills the process of those apps, thus prevent them from being cached in memory. When you launch them later, it takes longer time and much more CPU cycles to create the process and re-initialize the app run-time.

In short: don’t worry about closing apps as a matter of course. Android will take care of it.

How to close apps

All that said, there are occasions when you do need to close apps.

Maybe it has frozen; maybe it is using too many of your device’s resources (loading a large desktop webpage on a device with limited memory can do this); or maybe you want to “reset’ it back to the home screen rather than have it launch at the point where you last left it.

In these cases, and a few more, you should close the app manually.

The process differs slightly from one device to the next. In all cases it involves accessing the ‘recent apps’ menu.

On most recent devices this is a dedicated button. The HTC One M8 has one (on the original HTC One you need to double-tap the home button).

On recent Samsung Galaxy devices like the Galaxy S5, you tap the recent apps button to the left of the home button. On the Galaxy S4 or older, long press either the menu button or the home button.

To close apps on the LG G3 tap the recent apps button to the right of the home button at the bottom of the screen. This is the same as on Nexus devices, Sony Xperia phones and Motorola handsets such as the Moto X and Moto G.

On tapping (double-tapping or long-pressing as needed) the recent apps menu will open showing little thumbnail images of all the apps you’ve used recently and are in memory.

To close them, simply swipe them away—hold your finger down on the thumbnail image and swipe it off the screen, either left or right, or up or down, depending on the device.

The app will now be closed, and will free up the memory it was using.

 

Continue Reading

No Google, how we did it (So can you, if you want)

Since we detected the Google’s massive data piracy using our AI tools last year, our board decided we have to have our company privacy restored without someone snooping on you all the time. Here is how we achieved it.

 

Step 1: Move email hosting off Google (Ok they made it as hard as they can, but thanks to some great guys in Norway and our DevOps guys, we managed to come out victorious). Norway is one of the countries strictly respects privacy.

Step 2: Stop using  google searches, Seriously? Yes, with duckduckgo.com and increased tech advances, do you really need google searches, if the other-sites like duckduckgo.com, who indexes at same level and not track you?

Step 3: Using https://www.pivotsecurity.com to protect privacy, we even developed a service that make you ‘invisible’ to Google and Facebook as long as you choose!. Do you know, 9 out 10 websites use google analytics, which sets a cookie on your browser to track you? Facebook is worse, they even track button / image level.

So long until next tech advancement for better living!

Continue Reading

Slow Hacking (new form of threat that conventional systems can’t stop)

If you don’t know what is slow hacking and have a web based business to protect, you are exposed!

Since we started using AI assisted security tools, we noticed peculiar behavior, which goes undetected by using any conventional tools in existence.  Traditionally, hackers try to compromise hosts using scripts and once they have some or all access, they use the compromised hosts as source to launch an attack. However this method becoming ineffective as security companies and ISPs cracking on the less secure hosts and either restricting them or blocking them all together. However RUDY (stands for Are You Dead Yet)  is becoming buzz word of the darknet. Here is how the new technique is being deployed.

First hacker does the sanity check on the target host. Once they know what technologies they are using(ex Angular, NodeJS etc.), which might give clues to API end points and URLs to access.

Attack is composed of targeting known username and password (taken from numerous dumps available on the open net), but triggering not more than 1 -2 requests per min and try to understand what is the target reaction is. AI tools comes handy here! By slowing down but persisting attack over several days and weeks with spoofed IPs, none of the conventional security systems are effective.

How can you stop, You can’t using conventional tools provided by older companies like Cisco or in-house network expert. You have upgrade your knowledge and start using AI to defend.

 

Continue Reading

Digital Transformation (A case study)

Digital Transformation is a new buzz word but in reality it is made up of dozens of small processes in the organization that are automated.

We are quite thrilled to stat Phase II of our Digital Transformation Tool – Phoenix. On the eve of the event, we ran through no of projects we worked achieving the same but in manual consulting capacity. It is time to share one of them that could highlight the productivity gained and the cost savings which drove Insurance company into hyper growth.

The company (like many) have online presence but does not have full end-to-end process automation, most of the processes are manual and proven to errors. When we took-up the task, the company was already brought IBM workflow manager which is back-bone for agent work flow automation. Besides a numerous micro-upgrades, one particular activity we took-up and saved the company 80%-85% time. By automating one such process not only saved the company money but also true digital transformation as the system is not longer dependent on  9-5 employees.

In every organization, There are processes and workflows that can be automated, only if the team know how and what is going on with-in the system. That is where our Phoenix (https://pivotcloudsolutions.com) comes to help you. Phoenix not only analyses using innovative AI core but also can automate tasks.

What are you waiting for? ask for a demo.

 

Continue Reading

Can two factor authentication be compromised?

As per this article (below) it is possible. But only when you visit Socially engineered site.  So, isn’t it the time to start using ‘real-time’ protection systems like www.pivotsecurity.com?

 

A new exploit allows hackers to spoof two-factor authentication requests by sending a user to a fake login page and then stealing the username, password, and session cookie.

KnowBe4 Chief Hacking Officer Kevin Mitnick showed the hack in a public video. By convincing a victim to visit a typo-squatting domain liked “LunkedIn.com” and capturing the login, password, and authentication code, the hacker can pass the credentials to the actual site and capture the session cookie. Once this is done the hacker can login indefinitely. This essentially uses the one time 2FA code as a way to spoof a login and grab data.

“A white hat hacker friend of Kevin’s developed a tool to bypass two-factor authentication using social engineering tactics – and it can be weaponized for any site,” said Stu Sjouwerman, KnowBe4 CEO. “Two-factor authentication is intended to be an extra layer of security, but in this instance, we clearly see that you can’t rely on it alone to protect your organization.”

White hat hacker Kuba Gretzky created the system, called evilginx, and describes its implementation in a wonderfully thorough post on his site.

Sjouwerman notes that anti-phishing education is deeply important and that a hack like this is impossible to complete if the victim is savvy about security and the dangers of clicking links that come into your email box. To demonstrate this, Sjouwerman sent me an email seemingly addressed to me from Matt Burns (matt@techcrunch.com) talking about a typo in a post. When I clicked on it I was transferred to a SendGrid redirect site and dumped into TechCrunch – but the payload could have been more nefarious.

Continue Reading

Ransomware and Legacy systems (How Atlanta fell victim)

Welcome to 21st century, a playing field for any one with a computer and internet access.

Are you prepared for the new world? If not, this is a must read.

Recent high profile Ransomware attach on Atlanta, USA, highlighted the dangers of the cyber space, it would have been much harder without Social Engineering (an unacknowledged culprit).

What really happened in Atlanta? A ransomware attacked all government department systems and  locked them out, then showed a message to pay in bitcoins to an account which was closed shortly afterwords. It indicates it might have been a state sponsored activity.

Someone figured out, Atlanta Government access providers are using outdated Java Server (The one’s who are responsible for the  initial deployments are probably gone, the ones who are currently overseeing probably have no idea who they work), socially engineered emails/websites to target individuals who are more likely fall victim by downloading malicious software. Now the trap set, the culprits waited till the malware taken into action.

Real questions here,

1. Why are the Java servers not updated?

2. Who are responsible for social engineering? Why are the virus scanners and firewalls didn’t stop them?

We have seen many many weaknesses and organizations who think they “NOT GOING TO BE AFFECTED”. There was a old saying “No one is going to be fired for buying IBM”, in other words if the company is big enough, I am not going to be blamed for anything that goes wrong!

We have seen several fall victim to “Consultants” who are taking short-cuts but talk their way through. In one occasion, a big consulting company was working working with us in a big banking project, one of their consultant’s wanted to use ‘Rest-Get” methods for logins. We said NO, they made a big deal and we had to fight for it. Twitter had egg on their faces probably because they used these kinds of cow-boys.  If Twitter used us, we would have AVOIDED.

Best Solutions are the one you never has to face problems because they worked.

Phoenix and Pivot Security are the only trusted AI solutions not only the team implemented are the best in the industry but also we are happy to share the code with our customers.

 

 

Continue Reading

I read on internet, therefore I know, syndrome

I was interviewing a potential candidate to support our new product launch, he was interviewed and selected by our team and I was vetting to see if he can be a good fit for now and future (learned from a good old friend, who said to me a long time ago, always know the person you are bringing on-board as you can’t undo the damage).

After formalities, asked few questions, he is quite knowledgeable, then came the surprise, I casually asked practical question, only a person did it, know that it is not possible. i.e internet articles may say things that are now quite real-life problems but not practical in real-life.i.e Will not work in tandem with other things.

Suddenly all facade fell apart, Still, I wouldn’t like to loose a good guy simply didn’t know difference between practical and theoretical knowledge. So, I give some time to come-up with an answer and learn from mistakes. It is opportunity for both of us see how we each value other!

Anyway, the point is, In the modern connected world, you will get answers to what you are looking for, not necessarily right answers. I remember someone telling me about a prominent university research. They divided class into two groups and give each a task. First group was told, the beach is a sandy beach, they have to prove it beyond doubt. Second group was told, the same beach is a coral beach, they have to prove beyond doubt. Results were astonishing, each group proved what they believed is right. i.e first group proved the beach is a sandy-beach and second group proved it is a coral-beach.

I challenge you today, search for a topic, that you believe is right and you will only come across what you want to see, not the opposite or any indication that it might be fake or false!

In this modern era, you not only need to have knowledge but also need experienced professionals to tell you that is NOT possible

If you are struggling with old legacy systems and want to know why, I think you might have guessed it by now. That is the reason, we only depend on AI to give us ABSOLUTE truth about the system you have what ever you tech/support/it personal tell you about that system. Phoenix can give you full report on what is you old and aging system ACTUALLY does.

Come and join us in the workshop that would transform your knowledge and capabilities of AI

Continue Reading

AI & Your Business in 2018

As we approach the end of January we are well and truly into the new year. Sales and Marketing strategies have been finalised and signed off and budgets allocated at a departmental level. But have you given any consideration to Artificial Intelligence (AI) and the part that it could play in your overall business plan for 2018?

On some level I am sure that you are fed up listening on social media and more traditional media outlets, to mentions of AI, Machine Learning (ML) and Data Analythics (DA) and the complex arguments that seemingly only techies can understand. Then there is all the scare mongering about robots taking over our jobs.

But isn’t it about time that you came to terms with something that is truly worthy of the tag “game changer”? Put AI capabilities with BigData and the Cloud and you have at your fingertips the capacity to make much more informed decisions in terms of marketing campaigns, targeted sales, automating customer service processes to name just the tip of the iceberg.

It reminds me of the early 2000’s when the first smart phones came out. Many people said that they preferred the old basic phones and were not in any hurry to change over. Now while friends and family were willing to wait while their loved one played catchup the business world was a different story and those who didn’t adapt found themselves left behind. Smartphone have revolutionised how we work, play, buy and sell.

AI is and will bring even more fundamental changes. You don’t have to be a techie to begin the process of assessing the possibilities of this revolutionary technology, to ensure your business success in 2018 and into the future.

To find out more about what you can do today to become informed for your business future, check out our upcoming seminars read more

Continue Reading