now browsing by tag


Cybersecurity a #critical area for #closer #cooperation between #Asean and #Australia

Asean and Australia should work closer together on cybersecurity issues, which range from Internet crimes to fake news, Prime Minister Lee Hsien Loong said on Sunday (March 18).

In a speech to other Asean leaders and Australian Prime Minister Malcolm Turnbull during a plenary session at the Asean-Australia Special Summit, he noted that cybercrimes are a transboundary problem that is difficult to police.

“It can have a drastic impact on our populations, for example in terms of critical infrastructure; and it can be insidious – undermining the trust which holds our societies together, for example through fake news.”

The world is getting more vulnerable to cybersecurity threats, not less, he added, and so it is essential for governments to develop new rules and norms to cope with the challenge.

There is also potential for this region to play a role in the international discourse on cyber-security, Mr Lee said, noting that a proposed Asean-Australia Cyber Policy Dialogue can be a platform for greater policy exchange and capacity-building.

Another promising area for strategic cooperation is in developing smart cities, he said.

A new Asean-Australia Smart Cities Initiative, announced by Mr Turnbull on Saturday, complements the Asean Smart Cities Network initiative and Asean’s Masterplan on Asean Connectivity 2025, he added.

Read More….


The post Cybersecurity a #critical area for #closer #cooperation between #Asean and #Australia appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Cyber Security for Critical Assets (CS4CA) USA

Source: National Cyber Security – Produced By Gregory Evans

General Cybersecurity Conference

 March 6 – 8, 2018 | Houston, Texas, United States

Cybersecurity Conference Description 

The Annual Cyber Security for Critical Assets Summit (USA) boasts two dedicated streams for IT and OT, allowing delegates to hone in on their specialist areas of interest, as well as plenary sessions addressing the common issues that bind both groups of professionals. Each stream is curated by a group of industry-leading experts to be as relevant, as cutting-edge and as in-depth as possible over two days.

Expect to be challenged, learn new techniques from some of the world’s top cyber security innovators and network with your peers at Europe’s leading critical infrastructure security event. You’ll hear exclusive keynotes from leading industry execs, you’ll get the chance to take part in interactive panel debates to benchmark your approach with others, you’ll get in-depth case studies relevant to your sector with tangible, actionable insights and you’ll get platform presentations showcasing the best of tomorrow’s technology.

The post Cyber Security for Critical Assets (CS4CA) USA appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Why #Cybersecurity in the #Travel and #Hospitality #Sector is So #Critical?

Source: National Cyber Security – Produced By Gregory Evans

For many years now, cybersecurity has been a primary concern of government organisations and the banking sector, but the hospitality and travel industry is beginning to acknowledge the importance of online security in its day-to-day operations.

Each travel operator, hotel or transport company handles all kinds of sensitive data on their customers, as well as their own staff and suppliers. The consequences of organisations experiencing online data breaches are now higher than ever before. For instance, if a travel operator is hacked, leaking thousands of personal addresses of customers, they face significant financial, legal and reputational ramifications. The loss of customer confidence in the operator and the legal costs of any resulting identity theft would hit any travel operator big or small right where it hurts – the profit and loss sheet.

As businesses within the travel and hospitality sector grow, so too does their global footprint of sensitive data. There is an increasing need for these brands to maintain the privacy, integrity and security of all personal information that is in their care. A sure-fire data security 101 tip is to implement a robust user rights management hierarchy. This can help to control the level of sensitive data an individual can access in line with their seniority within the organisation as well as their job description. It requires travel companies – particularly those with global workforces – to keep a tight reign on their user rights systems to remove dormant users that may have left the company; mitigating the possibility of any revenge attacks. Organisations should also closely monitor and audit their employees’ data usage to pinpoint any signs of access abuse, which is not always malicious but can still have ramifications for the company when it’s not.

The major elephant in the room for travel and hospitality brands operating in and out of Europe is the new impending European regulations designed to safeguard customer data. The new General Data Protection Regulation (GDPR) has been devised by the European Union (EU) and will come into force next year. Although GDPR is aimed at giving the average consumer or holidaymaker greater control over how their personal data is used and stored, it also gives travel and hospitality organisations greater clarity about data protection law, creating one legislation across the entire single market.

Under the GDPR rules, travel and hospitality firms that fail to comply in time for 25th May 2018 could experience hugely damaging financial penalties which could plunge brands into difficult times; perhaps even closure. The upper limit penalty for non-compliance will be €20m or 4% of an organisation’s annual global turnover; whichever is greater. GDPR will affect all kinds of departments of travel firms; from legal and compliance teams to IT and marketing divisions. Those within the travel and hospitality industry must therefore take the protection of customer and employee data as seriously as their revenue.

Regular security audits, increased encryption of data and watertight password control are no longer something that can be ignored. So too are lawful marketing campaigns and privacy policies, while teams should be educated and briefed on how to handle a data breach if – and when – the time comes. Travel professionals handle more data than you realise and meeting those new obligations will not only keep brands on the right side of the law, it will increase consumer confidence and strengthen brand reputation overall.

The post Why #Cybersecurity in the #Travel and #Hospitality #Sector is So #Critical? appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures


THE INTERNATIONAL INTELLIGENCE agency always has a keen interest in Iran’s hacking activity. And new research published by the security firm FireEye on Thursday indicates the country’s efforts show no signs of slowing. In fact, a new network reconnaissance group— FireEye calls them Advanced Persistent Threat 34—has spent the last few years burrowing deep into critical infrastructure companies.

Given how aggressively Iran has pursued infrastructure hacking, previously targeting the financial sector and even a dam in upstate New York, the new findings serve as a warning, and highlight the evolving nature of the threat.

FireEye researchers tracked 34 of the group’s attacks on institutions in seven Middle Eastern countries between 2015 and mid-2017, but says APT 34 has been operational since at least 2014. The group appears to target financial, energy, telecommunications, and chemical companies, and FireEye says it has moderate confidence that its hackers are Iranians. They log into VPNs from Iranian IP addresses, adhere to normal Iranian business hours, their work has occasionally leaked Iranian addresses and phone numbers, and their efforts align with Iranian interests. Namely, targeting the country’s adversaries.

New APT in Town

There isn’t definitive evidence of a direct link between APT 34 and APT 33, an Iranian hacking group and malware distributor FireEye published findings on in September. But researchers have seen APT 34 operating concurrently inside many of the same target networks as other Iranian hackers.

“We have seen, and this is with a lot of the Iranian actors, a very disconcerting or aggressive posture towards critical infrastructure organizations,” says John Hultquist, director of intelligence analysis at FireEye. “APT 33 has targeted a lot of organizations in critical infrastructure in the Middle East and so has APT 34. They obviously represent opportunities for intelligence collection. But we always have to think about the alternative use of those intrusions or accesses as possible means for disruption and destruction, especially given the destructive incidents we’ve already seen with other Iranian actors.”

To establish what Hultquist describes as beachheads, APT 34 uses involved operations to move deeper and deeper into a network, or exploit a toehold within one organization to pivot into another. FireEye has observed the group compromising someone’s email account at a target company, rifling through their archive, and restarting threads as old as a year, to trick the recipient into clicking a malicious attachment. The hackers also use compromised email accounts to spearphish other companies, and leapfrog into their systems as well.

While the APT 34 Iranian hacking activity doesn’t appear to target the United States, any Iranian efforts in that space are noteworthy. The countries have a long history of cyber antagonism, which includes the deployment of Stuxnet, malware thought to be a product of the NSA and their Israeli counterparts, to cripple Iran’s uranium enrichment activities. Tensions between the countries have escalated recently as well, with President Donald Trump recently taking steps to decertify the nuclear agreement between the US and Iran.

‘A Multilayered Approach’
APT 34 uses malicious Excel macros and PowerShell-based exploits to move around networks. The group also has fairly extensive social media operations, deploying fake or compromised accounts to scope out high-profile targets, and using social engineering to get closer to particular organizations. FireEye researchers speculate that APT 34 may be a reconnaissance and persistence unit, focused on finding ways into new networks and broadening access within existing targets. Some evidence indicates that the group may work directly for the Iranian government, but it’s also possible that the hackers are effectively contractors, selling backdoors to the government as they find them.

“When you look at this, it’s a multilayered approach,” says Jeff Bardin, the chief intelligence officer of the threat-tracking firm Treadstone 71, which monitors Iranian hacking activity. “They get in and make a lot of modifications, download new malware, manipulate the memory, so it’s definitely pretty sophisticated. And the Powershell activity has been largely a hallmark of Iranian activity lately. They change their tactics constantly. The more we divulge things we know about them, the more they’ll shift and change.”

Though much remains unknown about APT 34, its capabilities and prowess make the group’s interest in critical infrastructure targets all the more noteworthy, whether it’s tasked with carrying out full operations itself, or charged with laying the groundwork for others to do so.

“This is yet another example of Iranian cyber capability, which only seems to grow every day,” FireEye’s Hultquist says. “It’s a challenge for people who are concerned with Iranian actors, and as geopolitics shifts, the number of people who should be concerned with Iranian actors will probably only increase.”

View full post on National Cyber Security Ventures


Water locks and pumping stations in the Netherlands are in danger of being hacked due to inadequate computer hardware and software, according to an investigation published by the Telegraaf. Security software is updated just about every five years, a sign of poor maintenance, and the computer systems that control the water operations date back as far as the mid-1980s, the newspaper said.

“Locks and pumping stations can always be operated manually. You can never be totally safe, you never know what might happen,” a spokesperson for the association of local water boards told the paper. Security is a top priority, but manual operation is always available in case the automated systems are hacked, the spokesperson added.

Business association Evofenedex called noted the urgency of maintaining critical infrastructure for the transportation of goods. “The hacking of a sea container terminal earlier this year at the Port of Rotterdam shows that importance. That hack cost Dutch businesses tens of millions of euros from delays and product damages,” an Evofenedex spokesman said.

Software and hardware updates are a key method of thwarting hackers searching for known vulnerabilities. By hacking a water lock or a pump, a hacker could control the gates that determine if water is blocked or released.

The newspaper also raised issue with the poor choice of passwords used to access remote operations of sewage pumps and locks.

View full post on National Cyber Security Ventures

‘Cybersecurity Is Critical To Future Prosperity’

Source: National Cyber Security – Produced By Gregory Evans

“Cybersecurity is critical to our future prosperity and security” as the “evolution of technology has fundamentally changed our security landscape, Minister of National Security Wayne Caines said today. Speaking during the opening of the Cybersecurity Framework Workshop at BUEI, Minister Caines said, “On behalf of the Government of Bermuda, it…

The post ‘Cybersecurity Is Critical To Future Prosperity’ appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Microsoft finds critical wormable bug lurking in every version of Windows

Source: National Cyber Security – Produced By Gregory Evans

The vulnerability in Windows Search service could let a hacker take complete control over a server or workstation and leverage worm-like spreading capabilities like those found with WannaCry. Microsoft released its August 2017 patches on Tuesday, which fixed 48 security flaws in six of the company’s main products. While 25…

The post Microsoft finds critical wormable bug lurking in every version of Windows appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Police insist they treat cyber crime seriously following critical national report

Police insist they treat cyber crime seriously following critical national reportSource: National Cyber Security – Produced By Gregory Evans Police have stressed how seriously they treat cyber crime following a new report criticising how the growing trend is tackled by forces nationally. The National Audit Office (NAO) said the issue was “not yet a priority” for all local police forces and the problem had been […] View full post on | Can You Be Hacked?

Task force tells Congress health IT security is in critical condition

To Purchase This Product/Services, Go To The Store Link Above Or Go To Source: National Cyber Security – Produced By Gregory Evans A congressionally mandated healthcare industry task force has published the findings of its investigation into the state of health information systems security, …

The post Task force tells Congress health IT security is in critical condition appeared first on

View full post on

Google: hackers still exploiting Windows ‘critical’ flaw


Source: National Cyber Security – Produced By Gregory Evans

Google: hackers still exploiting Windows ‘critical’ flaw

Although Adobe has worked to fix flaws found by Google, Microsoft has yet to act
Google has warned that a zero-day vulnerability still exists in Windows, despite it being almost a week since Microsoft was first notified of the problem.

The post Google: hackers still exploiting Windows ‘critical’ flaw appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures