There's a New Superhero in Town: Cyber Avenger

11 Oct 2015 | Michael Waksman

What would the world be like without superheroes?
Superheroes make kids dream. Like any other kid, I dreamt of being one and saving the world from doom.

Yes, dream! Because superheroes fuel our fantasies. But what if they really did exist? And what if you could become one yourself?

Now get ready for this…I am about to unveil a new real-life superhero: Cyber Avenger.

Cyberuser, Cyberspace & Cyber Avenger 

Every time you use a computer and access the Internet, you turn into a Cyberuser. As a Cyberuser, you create, change and share loads of personal data in Cyberspace. 

Where or what is that? Cyberspace is the world you enter every time you are a Cyberuser. This is a world populated by good citizens like you but also by villains. Did you hear about the diabolical Dr. Malware and his ruthless passion for collecting sensitive data? Or how about the insidious Keylogger with a sneaky obsession for stealing passwords? Despite different interests, these villains share the same goal – to access your data and use it in nasty ways in Cyberspace. Precious things are at risk – your identity, your money, the safety of your family and friends… But fear not! Cyber Avenger is here to save us!

Who is this mysterious Cyber Avenger? This superhero of Cyberspace is driven by the honorable mission to keep our data from falling into wicked hands.

How does Cyber Avenger protect us? To save our data and privacy, Cyber Avenger uses three Cyberpowers:

#1 - The Cybershield

Cyberspace doesn’t have a natural defense system. Without protections, the villains can attack us any time they want. When activated, the Cybershield has the ability to block evil attacks and keep us safe.

#2 - The Cybercrypt language

While the Cybershield is an effective way to protect your data, some villains possess the power of mimicry. By pretending to act as good decent citizens, they can pass through the Cybershield. So for an added layer of protection, Cyber Avenger uses the Cybercrypt – a language that appears to be nonsense. How does it work? Easy. The nonsense becomes clear only with the right password! Otherwise, this is what the villains will see:

-----BEGIN ENCODED MESSAGE-----
Version: BCTextEncoder Utility v. 1.00.2

wy4ECQMCbHZe8m87oJFgbAH9jjCa9AhZ9h1gg4nONwcuzLjYeHHAA+uto+WaF9Z+
0qwBl0t6h8batQ468qzI/xh2V251zrneGWCrkA0cW9C7NlS+DnPkHB8gbBUeNn9I
4zq1T5Bej3ox7lxj2TZqvsAtaTdChUDgAernxKYcgJ2iN59IM/W7eYIFMpRNHt3A
2drU905CGs8LyHjkaxs6aMIIFKWg0Ev0JkfVoAOuFXXTv7v1VAQcucF3jl+HTj/p
JJeiMsPsZKAURPszmXTWvqjeRmNV40GKUoADHIZJ
-----END ENCODED MESSAGE-----

#3 - The Cybercleaner

When no longer needed, data is left behind and forgotten. By doing so, we often stop protecting it. Yet someone else – perhaps the villains – might want it. To keep Cyberspace clean, Cyber Avenger uses the Cybercleaner. By automatically catching and cleaning all that data remanence and residue, the villains are left empty-handed.

Are You the Next Cyber Avenger?

Unlike other superheroes, Cyber Avenger doesn’t need to be bitten by a spider or come from another planet. To fight the villains and help Cyberusers to live in a safer Cyberspace, Cyber Avenger uses a very common tool: a computer. Yes, just like the one you are using right now to read this blog.

With the right enthusiasm and determination, anyone can take up a career in Cybersecurity and become the next Cyber Avenger – man or woman. That’s right. Cyberspace is not only a man’s world and our fearless defender can be any gender. I have two small children, a son and a daughter, and I wish for both of them to dream freely of being superheroes in Cyberspace.

To help boost gender diversity in cybersecurity, Jetico is supporting events organized by Rails Girls – a nonprofit operation started in Finland aiming to open up technology and make it more approachable for girls and women all over the world.

Rails Girls is not alone. For example, Sit With Me is another nonprofit organization whose mission is to increase the meaningful participation of women and girls in computing, operating in the United States. To learn more, visit sitwithme.org.

This post originally appeared as part of a guest blog on StaySafeOnline.org, the website of the National Cyber Security Alliance, and is republished here with permission of NCSA.

Michael Waksman Jetico CEO bio image
Michael Waksman

Michael Waksman has been serving as CEO of Jetico since 2011, more than doubling the size of the company during his tenure. He brings more than 20 years of communications, technology and leadership experience.

At Jetico, Waksman has lead creation of the corporate identity, raising global brand awareness, building a more commercially-driven team and initiating enterprise customer relations. Jetico has maintained a wide user base throughout the U.S. Defense community, in the global compliance market and for personal privacy.

Waksman served as vice-chairman of the Cyber Group for the Association of Finnish Defense and Aerospace Industries. Recognized as a security and privacy advocate, he is a frequent speaker at international events, occasionally on behalf of the Finnish cyber security industry. In 2012, Waksman was honored with The Security Network's Chairman's Award for fostering collaboration between the United States and Finland. As dual citizen, he is a native New Yorker and has been living in the Helsinki region for over 15 years.

View all blog posts

Thank you for contacting Jetico!
We will respond to you as soon as possible.

Send us a message - we'll reply within 24 business hours.

Need help now? Call Us
US: 202 742 2901 EU: +358 50 339 6388