GOOGLE SHOWED ERROR IN EXCHANGE RATES FEB 1, 2025
In Saturdat, February 1st, 2025, Google search showed the rupiah exchange rate at IDR 8,170.65 per US dollar on Saturday (2/1) afternoon. . It is suspected that this figure appeared due to a system error.
As clarified By Google Indonesia, addressed the misinformation regarding the rupiah-to-US dollar exchange rate displayed on Google Search, which falsely showed IDR8,170.65 per USD. The incorrect data, widely discussed by netizens on Saturday (2/1), originated from a third-party currency conversion provider. [https://news.seatoday.com/id/dhita-ariiqoh-putri/12367/google-indonesia-clarifies-misinformation-on-rupiah-exchange-rate-in-search-results]
William Hartanto, founder of WH Project, attributed the incorrect rates to a technical error in Google’s system, adding that similar issues had been reported with US stock data on the platform. “This is clearly a technical error. The actual exchange rate data from other reliable sources remains consistent,” William said. [https://jakartaglobe.id/tech/google-glitch-shows-rupiah-at-rp-8170-per-dollar-half-the-official-rate]
COULD THIS ERROR BE CATEGORIZED ONE OF CYBER RISKS ATTACKS?
AS THE DYNAMIC METHID HAS DELIVERED THE IoT TO THE BLOBAL INTERNATIONAL BUSINESS?
How do You Understand IoT? And What Alert of Cyber Attacks you should know?
IoT – Internet of Things (Internet Untuk Segala)
The Internet of Things (IoT) is a network of physical devices that can transfer data to one another without human intervention. The term was first coined by computer scientist Kevin Ashton in 1999.
IoT devices are not limited to computers or machinery. The Internet of Things can include anything with a sensor that is assigned a unique identifier (UID). The primary goal of the IoT is to create self-reporting devices that can communicate with each other (and users) in real time.
Internet of Things examples
• Smart home devices. Smart devices are interactive electronics that use wireless connections to understand user instructions. To an extent, smart home devices like thermostats and home security systems can work autonomously to assist with daily tasks.
• Wearable technologies. One of the most common Internet of Things examples is smartwatches. Wearable IoT technology like Fitbits and Apple Watches connect to other devices (like your smartphone) to share data. They typically also connect to the internet to track GPS locations.
• Personal medical devices. Personal medical devices like pacemakers are also IoT devices. Remote medical devices can help monitor and share a patient's vital signs or detect early signs of health issues for fast intervention.
• Autonomous vehicles. Self-driving cars and other connected vehicles rely on the internet to share real-time information. Sensors throughout the vehicle help map its surroundings, transmit camera footage, and respond to traffic signals.
CYBER RISKS ALERT
We should aware of this Cyber Risks alert, to highlight recent Internet of Things (IoT)1-based denial of service (DoS) attacks.
[A denial of service attack is when an attacker attempts to prevent legitimate users from accessing information or services. By targeting your computer and its network connection, or the computers and network of the sites you are trying to use, an attacker may be able to prevent you from accessing email, websites, online accounts (banking, etc.), or other services that rely on the affected computer.]
In In October 2016, a massive distributed DoS attack was launched against Dyn, a large DNS provider, denying internet users on the U.S. East Coast access to a number of popular websites including Twitter, Amazon, PayPal, Spotify, Reddit, Netflix, and more.
Just a month prior in September, Brian Krebs (a popular cybersecurity journalist) suffered on his website what some are saying to be one of the largest DoS attack attempts ever seen. After analyzing the botnet powering this attack, it was determined that it specifically targeted IoT devices by logging in using default credentials that were never updated and then spreading to other connected devices. Having gained access to over 400,000 IoT devices, the botnet was able to launch the high volume denial of service attack as a result.
Why is such an attack possible?
What makes an environment vulnerable? One prevalent issue is that many organizations do not continuously update IoT devices after installing them. In addition, some IoT devices do not have the ability to receive patches to update security settings. Given that there are other known competing botnets targeting IoT devices, we suspect that additional high-volume attacks like the ones described are possible.
In fact, there is at least one other known IoT botnet that has compromised approximately one million devices!3 A business must be proactive in ensuring an IoT device is installed correctly and is updated appropriately to help decrease its vulnerability to be compromised.
What Can Organizations Do?
• Make an inventory of all IoT usage to help you better understand the scope of vulnerability.
• If the IoT platform comes with a default ID and password, change them. Attackers know these platforms and their defaults.
• When changing the password, consider using what is considered a “strong” password, which includes:
– Eight characters minimum;
– At least one number, one letter, and one capital letter; and
– If allowed, at least one punctuation characte
• Passwords should be rotated regularly and should remain complex, e.g. not a location, name, or other easily guessable user information.
• Practice a regular timely patch schedule and/or enable automatic updates and patching to occur if the IoT platform allows.
• Disable unnecessary remote administration and features.
• Do not allow unfiltered access to the device from the Internet; only allow whitelisted (trusted) connections via IP filtering or other security controls.
• Do not enable universal plug and play on IoT devices.
• Us Include IoT devices in regular vulnerability management programse secure protocols where possible, like HTTPS and SSH for device communications.
• Include IoT devices in regular vulnerability management programs.
When your organization or employees suffer a cyber-attack, there’s more than data at stake. In a rapidly changing landscape, a cyber breach or attack may cause property damage, broad business interruption, or harm to customers.
Bak to the title of this Article,Was google suffered a Cyber Attacks? The answer leave it to Google who will technically esure the cause of wht it was happens.
No comments:
Post a Comment