now browsing by tag


#childmolestor | Call for sex offender list to be made public | #parenting | #parenting | #kids

Nicole Mirkin and Ahren Posthumus of SA Women Fight Back demonstrate defensive Krav Maga techniques. Photo: Ashraf Hendricks Protest against gender-based violence in Cape Town. First Published by GroundUp  “I […] View full post on National Cyber Security

These Mumbai teenagers made Rs 4.5 lakh in a year with their customised gifting startup | #socialmedia | #children | #parenting | #parenting | #kids

Source: National Cyber Security – Produced By Gregory Evans

These Mumbai teenagers made Rs 4.5 lakh in a year with their customised gifting startup | #socialmedia | #children | Parent Security Online ✕ VIEW […]

The post These Mumbai teenagers made Rs 4.5 lakh in a year with their customised gifting startup | #socialmedia | #children | #parenting | #parenting | #kids appeared first on National Cyber Security.

View full post on National Cyber Security

#sextrafficking | Sex Trafficking Arrest Made in Daviess County, Kentucky | #tinder | #pof | #match | romancescams | #scams

The Kentucky State Police have arrested a Tennessee man on sex trafficking charges.  Authorities say 40-year-old Steven S. Hargrove, who is from LaVergne, TN, was arrested without incident in connection […] View full post on National Cyber Security

#childabductors | Arrest Made in Washington State Attempted Baby Abduction | #parenting | #parenting | #kids

Police in Washington state Wednesday announced an arrest in the case of a baby who was snatched out of his stroller by a shadowy figure who left the tot behind […] View full post on National Cyber Security

#hacking | Top Cybersecurity News That Made Headlines –

Source: National Cyber Security – Produced By Gregory Evans

India is no stranger to cybersecurity threats and attacks. The steady growth of the Indian tech sector has led to the massive growth of digital data inventory. This data accumulation has, in turn, spurred frequent cyberattacks across the country.

Companies across this sector have been launching new updates, innovating new technologies and propagating new changes in the year 2019.

In this article, we bring you a list of the key updates

1.Linking Aadhar Card with Social Media Profile

In July of 2018, Anthony Clement Rubin filed a PIL in Madras High Court in an attempt to solicit Aadhar Card linkage with social media platforms. The intent behind the PIL (Public Interest Litigation) was to demand conversion of encrypted data into simpler language, promoting traceability of malicious actors who are involved in/benefit from spreading incomplete, falsified information online. Linking Aadhar Card would greatly aid in tracking the offenders.


Facebook-owned Whatsapp would be the most to lose on this one. This messaging platform has resisted prior attempts by governmental agencies throughout the world who wanted access into Whatsapp’s databases to monitor the cyber-space for offences or wanted this feature (encrypted messaging) to be removed entirely. 

India is home to 400 million Whatsapp users, therefore, accountability should mean security – not entirely true. It can lead to a compromise in the security of all Indian users as their personal/private information will be made public; foreign governments and institutions gain easy, unrestricted access. 

Facebook filed for a transfer to the Supreme Court whose verdict rescued them. The Supreme Court said that linking social media accounts with Aadhar Card would be a breach of privacy policies, Facebook readily agrees.  

Madras High Court, which supported the PIL, said: “The linking of social media profiles of the users with the Aadhaar was needed to check fake news, defamatory articles, pornographic materials, anti-national and terror contents in the online media.”

2. Proxy Wars.

India has been shaping public opinion abroad through the use of proxy websites. They usually push forwards the narratives of the Indian Government. These websites, according to EU Disinfo Lab (Brussel-based NGO), are in operation in over 65 countries and under fake news titles or titles of old newspapers or publications which have long been out of commission. The content on these websites usually focuses on the minorities in Pakistan or on the Kashmir issue or on other issues along the same lines, mostly harming Pakistan unjustly. For instance, the ‘About Us’ (pertaining to the information about the website and their team members, etc.) section of Manchester Times is a replica of a Wikipedia entry for a newspaper with the same name (Manchester Times) which closed its door in 1922. Disinfo Lab’s findings established a connection between these fraudulent websites to Indian stakeholders, companies, networks, etc. mainly linked with Srivastava Group. The Indian Institute for Non-Allied Studies (IINS) and the New Delhi Times share the same IP address and can be linked back to the Srivastava Group. This ambiguous connection (should) peak curiosity, when visits for 27 officials from the EU is organised by the IINS after the incidents that took place in Kashmir. Indian agencies are engaged in lobbying efforts throughout Europe, influencing leaders and public opinions alike. A clear connection between these websites and the Indian government has not been established

3. Free movie downloaders, streamers, Star Wars fans beware!

According to Kaspersky, 30 websites and social media handles, claiming to be the official movie accounts of the latest Star Wars movie, are in fact mediums/vehicle for cybercriminals to infect systems with malware. People fall victim to ‘clickbait’ and in the process unknowingly download spyware that extracts user information. It comes highly recommended not opening accounts or entering personal details (credit/credit card details, name, address, phone number, etc.) on these websites because that is how the cyber-criminals steal data. Be wary of any and all websites that offer free downloads as they play host to these parasites. Efforts are made to empower the ‘Rebel Faction’ and send disruptive waves across the Star Wars community, which is huge and consists of people from all age groups.

4. Fears over Facial Recognition in China

According to a Chinese report and reported by Abacus, found that almost 80% of the population fears facial data leaks, 65% are fearful of ‘Deepfake’ and many more are afraid of cyber theft and fraud. Digital data is left unprotected or loosely guarded as the country (China) faces data theft quiet often. A local media reported the sale of 5,000 images of people for as low as $2 per image. Still, 44% or less feel the need for technological intervention but at the same time, 88% prefer to have more control over their facial data.  

China is digitising rapidly, payment companies prefer people using the facial recognition feature while making any sorts of payments like paying for subway tickets, groceries, etc. Chinese dating companies also encourage the use of facial recognition to avoid relaying misinformation. Some bathroom stalls even have facial recognition systems implemented, to monitor/prevent people from using excessive toilet paper. 

The government and other agencies have access to this data and there have been reported cases of misuse. Invasion of privacy is rampant except in one area – voting, as the country is yet to implement biometrics for the election/voting is state-controlled.

5. India and Japan to work together on Space and CyberSecurity programmes.

See Also

Prime Minister, after the success of Mission Shakti, where a DRDO missile launched off the coast of Odisha successfully hit a Low Earth Orbit (LEO) satellite, announced that India could now take down satellites in space. The US, China and Russia are the only other countries apart from India that is ASAT (Anti-Satellite Weapons tests) proficient. Though India possesses ASAT capabilities, Japan has a well-established and extensive space programme. External Affairs Minister S Jaisahankar and Taro Kono (minister from Japan of similar designation) met during the G20 (outside the meetings) to discuss further on Space and CyberSecurity collaboration. Japan’s primary objective is to keep pace with developments in China for which it has offered to enter into a joint venture with India on connectivity projects, infrastructural developmental projects in the North East and other projects in countries like Bhutan, Myanmar, Kenya and Bangladesh. The two ministers entered into further talks regarding cybersecurity and other related issues. The two countries together hope to work towards building better Indo-pacific relations and fostering peace in Asian countries. 

6.Juice Jacking

An alternate meaning of the word ‘Juice’ is used to refer to anyone who has power, influence, authority or sexual desirability. ‘Juice’ in this context means electric power. People who use charging ports or USB inlets at the airport or other public area are at risk of having their data stolen. The ports are infected with malware which allows hackers to infiltrate devices without anyone knowing and are able to extract personal/sensitive data including passwords and bank details; the hackers can also bar the person, to whom the device belongs to, from accessing it. It was observed that people disregard safety when their devices are about to run out of the said ‘juice’, plugging devices to any charging port available. Hackers lie in anticipation of such people, hackers replace the harmless charging ports with their personal malware-infested gadgets. “What they do is a very simple trick” and “They essentially disable the data pin on the USB charger”, said Prof Sekar of Carnegie Mellon University. Be mindful that this type of hacking is fairly complicated and very difficult to execute. People are advised to carry their own power bank, carry ac chargers and use ac power outlets.

7.High Profile Acquisitions

There were several big-money moves made in the CyberSecurity sphere in 2019. Insight Partners, an equity company, purchased a controlling stake in an internet technology company which specialises in simpler data generation to aid a thorough understanding of external cyber threats. Few customers of Recorded Future are The Gap, Verison, Morgon Stanley, etc. 

Sophos, British hardware and software company, announced that Thoma Bravo, another equity firm, offered $3.9 billion to purchase the company. Thoma Bravo is of the opinion that Sophos is – “a global leader in next-generation cybersecurity solutions spanning endpoint, next-generation firewall, cloud security, server security, managed threat response, and more.” TechCrunch journalist, Zack Whittaker reported the presence of a vulnerability in Sophos’ system allowing hackers to enter its “internal networks without needing a password.” Sophos is spread across 150 countries with over 100 million users and 400,000 customers. 

Palo Alto, the world foremost authority in CyberSecurity, announced the purchase of Demisto, in cash and equity, for $560 million. Demisto is another leading CyberSecurity company which specialise in Security Orchestration, Automation and Response (SOAR). CEO of Palo Alto Networks, Nikesh Arora said – “With the combination of Demisto and our existing threat prevention and response capabilities, we will be well-positioned to unlock the biggest challenges facing teams in security operations centres today,” and “…the integration of Demisto into Cortex will bring stronger automation and artificial intelligence capabilities to our platform, delivering greater protection across all environments.”FireEye, which discovered data theft of 68 million patients and doctor from an India-based company, paid $250 million to acquire Verodin. FireEye hopes that this acquisition will better the overall efficiency and security services that the company provides by adapting to the changes in the IT landscape and fixing the vulnerabilities within the system.

Enjoyed this story? Join our Telegram group. And be part of an engaging community.


Provide your comments below


Source link

The post #hacking | Top Cybersecurity News That Made Headlines – appeared first on National Cyber Security.

View full post on National Cyber Security

#iossecurity | #applesecurity | How Tim Draper’s first job picking apples made him a capitalist

Source: National Cyber Security – Produced By Gregory Evans

Tim Draper — the billionaire venture capitalist who built his fortune by making early investments in Twitter, Skype, Tesla and SpaceX (to name a few) — says his first job as an apple picker drove him to capitalism.

“When I was about 8 years old, my first job was picking apples. We had a couple of apple trees in our backyard and it was harvest time, so I picked a bunch of them and I would take them down to the end of the driveway and sell them,” Draper, 61, founding partner at Draper Associates, tells CNBC Make It.

His asking price: 5 cents an apple, which in 1966 was the same price as a U.S. postage stamp.

“I [sold apples] every day for a couple of months, and every once in a while one of my friends would come by in the neighborhood and stay with me for a little bit while I sold them,” Draper remembers.

At the end of the season, he says, he was wrapping up selling his last batch, when his friend’s mother approached him and asked him how much he made.

Draper says he told her $8, which meant he sold 160 apples that season. He says he was ecstatic over the accomplishment.

But his friend’s mother wasn’t. Draper says she took the $8 away from him and asked him who else had been there to help him sell apples. She then divided up the money and gave each kid a dollar who stopped by to help, leaving Draper with a dollar himself.

“It was my first exposure to socialism, and I decided at that point that there had to be a better system for sharing the wealth,” Draper says.

The experience, he says, led him to become a capitalist — just like his dad and grandfather were.

Draper’s grandfather, William Draper Jr., founded the first venture capital firm in Silicon Valley in 1959 called Draper, Gaither & Anderson, while his father William Draper III, founded Draper & Johnson Investment Company in 1962. Draper started his own early-stage venture capital firm in 1985.

While Draper does believe change is desperately needed to combat income inequality not only in the U.S. but globally, he doesn’t believe socialism or free-cash handouts (the idea of giving out a “no strings attached” cash handout to every citizen regardless of employment status) are the solutions.

“It all depends on how it’s done. I think that it is an interesting idea and a good safety net for people,” Draper says, “but I’m always a believer that you have to teach people to fish rather than handing them all the fish. And I would rather see that money go into improving education instead.”

Draper says what the government really needs is a “Steve Jobs type candidate,” meaning someone capable of completely revolutionizing the way something works, to get elected and reshape our government systems like Jobs did with the iPhone.

“The government is still operating like a mainframe computer while the rest of us all have smartphones.”

Like this story? Like CNBC Make It on Facebook.

Don’t miss: This self-made millionaire says the key to his success is eating only fruit until noon

Forget self-help: Some business execs are paying up to $1,000 an hour for hypnosis

This wellness clinic charges execs $8,000 and up for brain-boosting programs (despite doctors’ warnings)

Source link

The post #iossecurity | #applesecurity | How Tim Draper’s first job picking apples made him a capitalist appeared first on National Cyber Security.

View full post on National Cyber Security

Apple #HomeKit #bug made #smart locks #vulnerable to #hacking

Apple #HomeKit #bug made #smart locks #vulnerable to #hacking

The software bug in HomeKit can apparently allow bad actors to control accessories in smart homes.

Following the news of Apple’s recent security flaw in High Sierra OS for Macs, news has broken of a zero-day vulnerability in the firm’s HomeKit.

According to 9to5Mac, a flaw in the current version of iOS 11.2 could theoretically allow unauthorised individuals access to smart accessories such as smart locks and garage doors, using the home automation platform. 9to5Mac described the vulnerability as “difficult to reproduce” and said it also affected other smart accessories such as lights and thermostats.

The issue was not with the smart accessories, but with the HomeKit framework itself, which connects products from a broad range of companies together in a single interface. The details of the vulnerability itself are scant, but it required at least one iPhone or iPad running iOS 11.2 connected to the HomeKit user’s iCloud account.

Apple quick to remedy the HomeKit issue
Apple has released a temporary server-side fix that remedies the issue. On the user end, nothing needs to be done, but they will notice that the ‘remote access to shared users’ feature for HomeKit-connected devices has been disabled temporarily.

A full patch that completely solves the issue will arrive early next week along with the next iOS update.

The discovery of this vulnerability highlights existing concerns around smart home devices, and the general need for more robust protocols in terms of IoT, particularly in a domestic setting.

It also raises questions for Apple in terms of its own security-auditing process for its operating systems and products, especially considering its otherwise positive reputation as a technology vendor and innovator. Bugs are not uncommon in the development process but when it comes to home security, a certain level of trust is required in order to get customers on board.

More than 50 brands worldwide are compatible with HomeKit, including some models of Honeywell thermostats, the August smart lock and Chamberlain MyQ Home Bridge, a garage-door opener.

View full post on National Cyber Security Ventures

Copy-Pasting Malware Dev Made $63,000 From Mining Monero on IIS Servers

Source: National Cyber Security – Produced By Gregory Evans

A malware author (or authors) has made around $63,000 during the past five months by hacking unpatched IIS 6.0 servers and mining Monero. ESET researchers just recently uncovered the attacker’s operation. Experts say the malware author used CVE-2017-7269, a vulnerability in IIS 6.0 servers to take over vulnerable machines and…

The post Copy-Pasting Malware Dev Made $63,000 From Mining Monero on IIS Servers appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers made plans to send deleted Hilary emails to Michael Flynn

Source: National Cyber Security – Produced By Gregory Evans

Russia’s programmers talked about amid last year’s general election battle on if messages could be erased by Hillary Clinton as well as getting it unto Michael Flynn, a resigned military brass, an individual from the president’s crusade, a business magazine wrote last week. This daily paper ascribed this disclosure unto…

The post Hackers made plans to send deleted Hilary emails to Michael Flynn appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Hackers have made just 3.7 bitcoin – or less than $10,000 – with the latest cyberattack

Source: National Cyber Security – Produced By Gregory Evans

Those behind the recent cyberattack affecting businesses around Europe have successful received a total of nearly 4 bitcoins, worth around $9621 at today’s price. On Tuesday, reports emerged of a ransomware virus affecting businesses and governments throughout Eastern Europe. Ukraine and Russia have been particularly affected. The malware, which has…

The post Hackers have made just 3.7 bitcoin – or less than $10,000 – with the latest cyberattack appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures