Millennials and Cybercrime


Good day everyone, today we are sharing an article from, we hope you enjoy it.

Image Source

Cybercrime has cost victims $126 billion worldwide and it has indeed established itself as a criminal enterprise. Every day, we see headlines on security and data breaches, invasion of privacy, and hacking. Cybercriminals continue to innovate new ways to attack and both private and public sectors remain vulnerable.

Studies have shown that millennials – those who are born between 1982 and 2004 – are among the top victims of cybercrimes. According to a 2016 report by Norton Cyber Security, 40% of millennials have fallen victim to cybercrime in the past year. Eighty-six percent of those surveyed said that they might have experienced a phishing incident, with 30 percent unable to detect a phishing attack.

Millennials are digital natives, and they are undeniably more tech-savvy than the previous generations, so why would they be the most vulnerable to cybercrimes? Despite being the more tech-savvy set, it is worth noting that millennials experienced two different eras of technological developments. Witnessing the internet from its early stages – the slow connection and the huge computers – to the accelerated rise of social media, smart phones, and wireless connection must have made them a bit cavalier when it comes to their online activities.

True enough, reports blame unsafe online practices for this problem.  Millennials can be promiscuous when it comes to their login credentials; they tend to share their passwords to friends and family members. This lack of caution, paired with the use of vulnerable media online, spells security trouble. Another reason is their use of public and unsecured wi-fi networks for online transactions, resulting in sensitive information and credentials to become vulnerable. Most millennials are also lax in terms of using third-party applications, answering online surveys, and providing access to files and documents in online platforms.

How do you protect yourself from cybercrimes?

  • Make it very difficult for attackers to access your accounts by using strong and unique passwords. Make sure to use lower and upper case letters, symbols, and numbers. Change your passwords every three months, and do not use just one password for all your accounts.
  • When installing new network-connected devices at home, do not forget to change the default password. Disable or protect remote access when not necessary.
  • Be cautious and think twice before clicking links and opening messages and attachments. Be suspicious of the sender and the subject line. Most phishing emails come from compromised email accounts of friends. Surveys show that 4 in 10 millennials cannot distinguish between a phishing email from a legitimate one.
  • Limit your online activities when using public wi-fi networks. When you access your personal information using an unsecured public wi-fi, you risk exposing them. Avoid accessing your social media accounts, paying bills and purchasing anything using your credit card while on a public wi-fi network.
  • Be diligent in managing the settings of your social media sites. Make sure that you are not exposing personal and private information. The less you share, the better.
  • Stay updated on news about security breaches. If your bank or a site you have an account on falls victim to cybercriminals, change your password immediately.
  • If you have become a victim of a cyber attack, alert your local police. In some cases, the FBI and the Federal Trade Commission need to be looped in, too. By reporting the crime, however minor it may seem, you are helping prevent criminals from proliferating.

Contextual Security: Proceeding to a Realistic Approach

Every corporation in the U.S. is under attack daily between one and three times on average, and in many cases this fact is unknown with malware spreading unchecked inside the internal network for days, weeks and even years.


Cyber-criminals are getting increasingly sophisticated, polymorphic malware bits are running amok in many corporations’ networks, hitting the various departments every day.

Nowadays, in such a hostile context is no longer enough to detect and stop known threats, we now are searching for multiple signals to reveal many sneaky attempts in progress.

Initially it can seem pretty discouraging to stand up to the unknown, but in the case of cybernetic attacks there’s a common point, one alert among thousands in front of a personnel that’s already stuck trying to solve thousands of red lights in their systems. Alert weary is one of the main allies of cybercrime nowadays.

Attacks are not hundred percent surreptitious, they leave an indelible track that we can follow to bring order to chaos and separate real from fake.

Network activity brings a huge amount of the clues needed to gather information and identify attacks under way, but to be effective in identifying we need to really understand what happens in the network and have a clear understanding of what’s being used.

To take advantage of the network activity in an effective manner we need to create a network model that gives us a relevant context for security and in that identify potential threats.

This concrete scheme – that can be implemented on Hadoop- must be based not only in the link between devices: it must also allow a contextual analysis of what happens in the network, to be able to deploy actions in a preventive method instead of a reactive one.

Moving Target Defense: Deceit as a Strategy

Digital protections lose effectiveness when an email appears to be from someone you know, or an exploits package is hidden in a publicity banner from a legitimate website.

Traditional antivirus solutions have proven to be pretty ineffective, as they are incapable of analyzing user behavioral patterns, unlike Hadoop. Many victims of ransomware are running exploits even when they have totally up-to-date antivirus
These solutions based on signatures, compare one archive with the signatures of a known virus in their database to determine if it’s dangerous. The signature can be a byte chain in the archive or a cryptographic hash. Only the ransomware that has an audited signature and is in the database can be stopped. Modern attackers know this and create variants of their ransomware, sometimes in a daily manner.

The best alternative to prevent this situation is Hadoop, which allows behavior base detection, and operates under the premise that unknown variants of the same malware behave in similar manner to known threats and that behavior can be detected.
Hadoop is most effective against new variants of malware, but still the exposed area to threats must be either reduce or obscured to reduce the targets vulnerability and reduce the chance of exploits to be detected.
Moving Target Defense (MTD) technology use deceit techniques in favor of the user, to change continuously and in a persistent manner the threat area, hiding application and web browsers vulnerability’s.
This means the useful load of the ransomware can’t activate and becomes useless to cyber criminals, affecting their assertiveness and neutralize the opportunity’s that social engineering brings them to gain the confidence of the user.

SIEM: empowering security strategy

The SIEM was born as a security market necessity which couldn’t administrate multiple alerts in critical situations.


We all can remember cases like Target, Neiman Marcus or Home Depot who were affected by the Black POS virus.

These companies and others were bombarded by dozens of vectors which caused the number of alerts to grow at an exponential rate. This was the ideal environment for the SIEM to be born.


Distributed data as process accelerator.

The fact that big companies can analyze systematically an unlimited number of security alerts in real time means that the teams at the security operation centers (SOC) can do a better job.

This new knowledge society is creating more data than ever and Hadoops relevance is increasing fast.

We only need to imagine that the sum of all human knowledge doubles monthly to have an idea of the data growth, and to this we have a need to add the fact that cyber pirates keep getting more sophisticated to cross the security perimeter.

We can confidently state that hiring in the security market is a strategic move, as everyone need a SIEM who will protect them in conjunction with Hadoop.

The contingency move of hiring additional personnel is usually limited. As of today more than 400,000 cyber security vacancies in the US can’t be filled due to the lack of qualified candidates, exposing the education problem.

It’s imperative to promote collaboration between digital security professionals and data scientists, each group has to learn how to better identify in advance tendencies that lead into threats.

The importance of user behavior analysis can seem daunting at first, but with a new approach and adding the value of data analytics, systems can be applied as a sustainable threat detection method, and in that sense, Hadoop provides a paradigm shift in the traditional cyber security team.

Cybercriminal Intelligence.

The cybercriminals gain sophistication experience with each step, when Hadoop doesn’t check.

Behind all these, there’s a real motivational impulse that refines and deepens .


In the Cybercriminal intelligence world much in known about the motivations behind the cybercriminal attacks, which in recent years have multiplied with extortions, vandalism, ideological “hacktivism”, data theft and even bank fraud.

From a technical perspective of things, cybercrime tool kits are rather low cost and are easily available inside the cybercrime ecosystem.

But to these we have to add new government’s actors who have powerful resources backing them to develop and deploy new tools and exploits which sadly further evolve cybercrime.

The protection of our companies from these threats requires, in most cases, that we take advantage from the experience and visibility from our organizations to obtain intelligence information about the enemy we face.


Digital Intelligence Units.

Digital Intelligence Units “are in style” in the security industry, and although there are multiple tools and products we can use to create a professional data defense, what is really important is knowing what we are doing and how we can identify the Digital Intelligence Units that start a threat.

Threat Intelligence Unit, at least, must approve analyzing some of the detection capacities from many of our preventing controls (for example, intruder detection system)

Without a fast and fluid (real time) data administration, security efficiency decrease exponentially for every second added.

Reducing false positives in artificial intelligence solutions, and providing context in regards to detected events in real time will allow us to maximize our security resources efficiency, which will allow us to determine the most appropriate threat levels from said events.

Threat intelligence is very important in the fight against real intimidations, such as the attacks made against DYN, and from Hadoop they are trying to stop the evolution of cybercrime in an efficient and professional way.

Era de los algoritmos: marca la muerte de la era del social media

Muchas de las cosas a las que nos enfrentamos a diario, no están reguladas por la voluntad humana, estamos regidos bajo el diseño de algoritmos matemáticos que toman decisiones sin intervención humana.

La industria y la innovación nos empujan de manera poco convincente a un escenario regulado por algoritmos opacos, no regulados y en muchos casos, de dudosa eficiencia.

Algunos destellos de discriminación racial, de género, edad o salud comienzan a tomar fuerza en procesos de selección para ocupar posiciones de relevancia en puestos claves de las diferentes industrias.

La equidad que todos nos prometimos en la era del social media, la esperada inclusión digital y financiera universal, hoy perece frente a los pies de un mercado que deja ver la parte más oscura del Big Data.

Estamos frente a una gran transformación social, en dónde cada aspecto de la vida será tomado en cuenta y va a marcar la suerte de las personas.

Un mundo totalmente conectado irradia la muerte de la privacidad y manifiesta un modelo de selección arbitrario que obedece a las premisas establecidas por un modelo matemático fríamente calculado, que debe ser tamizado bajo un nuevo esquema ético, que nos aleje de cualquier atisbo de neonazismo digital.

Armas Matemáticas

Los algoritmos son armas inteligentes que, utilizados contra la gente convertirán en letales las amenazas de Kim Jong-un al occidente moderno.

Los modelos matemáticos aplicados a la opinión pública nos demuestran que son la mayor amenaza a nuestro sistema de vida, y conforman un peligroso coctel para el juego democrático de las naciones.

No quiero vivir en un mundo que determine nivel de humanismo que pueda tener mi vejez en base al análisis de probabilidades que el estudio de los grandes datos de mi vida determine.

El sistema político latinoamericano, debe decidir que tipo de camino tomaremos para ser parte activa de la economía del conocimiento.

Si queremos tomar un modelo que utilice la tecnología para bajar costos oscuros de la administración, generando un ámbito de equidad que garantice la libertad de pensamiento y de oportunidades, debemos amalgamar la política, la ciencia y la tecnología para trazar un camino ético que nos aleje de las amenazas.


Por Ing. Pablo Abdian – CEO de MOTOTECH


Data Distribution: The Way to Stop Cybercrime

The informatics industry is being affected by the potential of the distributed data administration tools and the cybercrime division is being fundamentally affected by the irruption of said tool.


A recent White Paper from Marketsand Markets predicts that the digital security analysis market may experience a growth from $4.5 billion to almost $6 billion in the U.S alone, and predict it will surpass the $ 9.38 billion by 2021, with an annual growth percentage in the double digits.


The reason for this growth is rather easy to understand.

In this age where the attacks are ever more sophisticated and better funded, many of the biggest and dangerous threats require a rather deep understanding of the organization, data and network, and their detection analysis.

Our experience indicates that some organizations are equipped with systems that inform them when something deviates from the normal business patterns, and many hackers search for escape ways for this challenge.


Data overload, multiple alerts

Certain tradition security solution generates a “potentially suspicious activity” alert if they identify a number of failed login attempts in the same account and from the same IP.

Alternatively, it can send an alert if it identifies excessive Access to data outside normal working hours from a specific account.

Hackers, fully aware that these patterns are monitored by these solutions, have begun adapting their approach to avoid said methods.

Introduce security analysis

With distributed data administration tools we can perform a security analysis to capture, filter and analyze millions of network event every second.

This solution, from which we have gained a vast experience, Works with data from a wide variety of sources, like audit and registration files, but also from un-structured data, including email, social media, images, videos, news and many more.

With these tools, we balance the opportunities and reduce the attack area from cybercriminals.

Mototech Group opens new office in Scottsdale AZ


Mototech Group, a Technology Services and Consulting firm with more than 20 years of experience, announced today progress in their global strategy with the opening of their new office located at 7702 E Doubletree Ranch Rd Suite 300, Scottsdale Arizona.

“The knowledge economy has brought about many changes to both the commercial world and the scientific community. In the next few years these changes will occur at an accelerated pace as more companies and organizations subscribe to utilizing business intelligence and predictive analytics, and we focus on providing accurate solutions and answers in the main hubs of global innovation” said Pablo Abdian CEO and Co-founder of Mototech Group.

The ever increasing demand of high value technology, the need of increased efficiency in the traditional data centers to bring security backing in compliance with current laws and the increasing requests for faster response time to support the growth and digital transformation of enterprises, place Mototech as a vital player of importance in the west coast technology arena.

“Our innovative nature place us at the vanguard of technology, born as a company with strong scientific vocation to solve complex problems, we cover every aspect of research and development and adapt to change with ease. Without a doubt our scientific rigor and professional DNA being flexible to change, are clear strengths that give weight to our territorial expansion” added Abdian.

About Mototech Group

A Technology Services and Consulting firm with a talent rich team and experienced leadership with more than 20 years of deep industry knowledge.

The Mototech Group with our highly successful global partners, provide leading edge Big Data Analytics (BDA) and OnDemand Technology Services and Solutions, enabling public and private sectors wishing to grow sales and improve operational efficiencies via multiple IT improvements.

From our HQ in the Washington DC area we are actively involved across the United States, Canada and South America, currently positioned as a market leader in complex IT solutions.

Press Release

Mototech Group announced their expansion plans today with the launch of their new OnDemand IT Services and Solutions, enabling public, private and governmental organizations to overcome gaps in their IT departments primarily due to lack of human capital and/or advanced tech infrastructure assets and solutions. Continue reading “Press Release”