now browsing by tag


#hacking | Scott Morrison says drought the Coalition’s ‘first call’ – but makes no mention of climate | Australia news

Source: National Cyber Security – Produced By Gregory Evans

Scott Morrison has indicated the federal government might be prepared to commit extra relief funding to drought-stricken communities, reaffirming the drought is the government’s top priority.

In a triumphal speech to the Liberal party’s federal council in Canberra on Saturday, Morrison again said the drought was “the most pressing and biggest call on our budget”.

“It is the first cab off the rank, the first thing we sit together and say, ‘Once we have done everything we can in this area, then we can consider other priorities’.

“It is the biggest call on the budget because it is the most pressing, the rock I’m going to put in the jar first. It is the first call because that is what is needed in our rural and regional communities. They know we cannot make it rain and they know we cannot make it like it was before the drought.”

The prime minister did not mention the climate crisis while detailing the government’s three-phase drought response package thus far: the farm household allowance for eligible farming families; the drought communities program dedicating $100m to councils affected by the drought; and long-term drought resilience plans, including money for new dams and the drought future fund.

“That is what we are doing on drought and we will keep responding,” Morrison said. “We will keep going and delivering. That is why you need resilient and strong budget. That is why we will not walk away.”

But the budget is coming under significant pressure, with a sharp downturn in the economic outlook. The IMF this week forecast a global “synchronised slowdown” of world economies, and a “precarious outlook” for recovery. Australia is forecast to grow more slowly than Greece, with 1.7% growth in 2019, a full percentage point below 2018’s 2.7%.

But the treasurer, Josh Frydenberg – currently at the G20 – has said additional drought support would not sacrifice the surplus, saying natural disasters had been taken into account when the Coalition made its pre-election pledge to return the budget to balance and then surplus next year. The midyear economic and fiscal outlook (MYEFO) will come out before Christmas. Any additional drought spending is likely to be detailed there.

The government has been criticised by Labor for moving too slowly on the drought. Accusing the government of “six years of inaction”, Labor’s Joel Fitzgibbon has called for a bipartisan drought war cabinet to be established.

“What began as crisis for our farmers fast moved to a crisis for our rural townships, which are literally running out of water,” he said. “And I fear that we now are fast approaching a threat to our food security … We need to sit the major parties down together and to start making some pretty significant decisions.”

The drought response has also been questioned by some councils, including Moyne shire in south-west Victoria, which was given $100m despite not being in drought and whose mayor said he wanted to refuse it.

“Our council has never applied for funding under this drought package or any other similar program of drought-assistance funding,” Moyne shire council mayor Mick Wolfe said.

Morrison’s speech to the party faithful in Canberra was a triumphal affair, given the occasion of the 75th anniversary of the party’s founding by Robert Menzies, the Coalition’s unexpected election win in May and his own rise to unchallenged authority within the party.

He condemned the Labor party for what he described as its “panic in a crisis” and “politics of envy”, in particular highlighting the party’s current corruption issues in NSW.

The Liberal party federal council will also debate a series of motions from various branches of the party.

The Young Liberals called on the party to “reaffirm its strong support for freedom of speech and the rule of law around the world and supports the right of the people of Hong Kong to protests peacefully in defence of those freedoms”.

The Morrison government’s rhetoric towards China has become increasingly bellicose in recent weeks: the home affairs minister, Peter Dutton, accused the Chinese Communist Party of political repression, intellectual property theft and cyber hacking; the foreign affairs minister, Marise Payne, has been forthright in her demands over detained Australian writer Yang Hengjun; while Morrison has taken an uncompromising position on China’s “developing nation” status at the WTO.

However, it’s unclear whether an overtly political motion such as the Young Liberals’ support for Hong Kong will win broader party support.

The ACT branch of the Liberal party has called on the government to “prioritise a free trade agreement with the UK over the European Union” and also wants the government to reject European demands for “geographic indicators” on food products in Australia, such as on feta, gruyere and gorgonzola cheeses.

The ACT Liberals also want investigation of “innovative financing options” for a high-speed rail linking Australia’s east-coast capitals.

And the West Australian branch want legislation mandating that public funding for both “yes” and “no” campaigns be equal at all future constitutional referenda, a legacy of the marriage equality campaign.

Source link

The post #hacking | Scott Morrison says drought the Coalition’s ‘first call’ – but makes no mention of climate | Australia news appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | 2 fake call centres busted | Kolkata News

Source: National Cyber Security – Produced By Gregory Evans

Kolkata: The cyber cell of Kolkata Police busted two fake call centres that had been cheating US nationals in the name of IT major, Microsoft.
Cops conducted twin raids following a complaint lodged by the legal counsel of Microsoft Corporation who alleged that such fraudulent activity was causing loss of clients and prestige for them. This is for the first time Microsoft approached Kolkata Police, urging for an action against fraud.
“Two separate complaints were received from Bhupinder Singh Bindra, attorneys of Microsoft Corporation India against some illegal activities of technical support scams, run in the name of Microsoft. The first complaint was against a call centre at Topsia. The second complaint was against another call centre on Rafi Ahmed Kidwai Road,” said joint CP (crime) Murlidhar Sharma.

Source link

The post #cyberfraud | #cybercriminals | 2 fake call centres busted | Kolkata News appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | Panorays Unveils Dark Web Insights Security Intelligence Solution | Security News

Source: National Cyber Security – Produced By Gregory Evans

Opportunities For Security Integrators In The Healthcare Vertical

The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.”
The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.”  Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says.
One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity.
Data capture form to appear here!
IP based networked video systems
A facility’s IT folks must be convinced an IP solution will function seamlessly on their network
Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analog with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time.
Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network.
Compatible with the network
They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cybersecurity requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls.
Healthcare security professionals are early adopters of technology, implementing the best technology available”“We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency.
Upgrade cost-effectively
Historically, three factors have prevented many organizations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. “Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organizations to upgrade cost-effectively,” he says.
Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding.”
Missed part one of our healthcare mini series? Click here.

Source link

The post #deepweb | <p> Panorays Unveils Dark Web Insights Security Intelligence Solution | Security News <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#hacking | Phone-hacking: Journalists ‘escaped scrutiny’ – BBC News

Source: National Cyber Security – Produced By Gregory Evans

Image copyright
PA Media

Image caption

Dan Evans received a 10-month suspended sentence for phone-hacking

A former News of the World journalist convicted for phone-hacking said others may have been allowed to “escape scrutiny”.

Dan Evans received a 10-month suspended sentence for phone-hacking, making illegal payments to officials and perverting the course of justice.

He believes evidence to the Leveson public inquiry may have been misleading and said police were not investigating.

The UK government said the inquiry and three police probes were comprehensive.

Last week it emerged the Duke of Sussex is suing Mirror Group Newspapers and News Group Newspapers for alleged phone-hacking.

The revelation in 2011 that Glenn Mulcaire, a private investigator used by the News of the World, hacked the phone of murdered teenager Milly Dowler caused national outrage.

It led to a public inquiry into the behaviour of the press, the police and politicians, chaired by Lord Justice Sir Brian Leveson.

Image caption

(L-R) Kevin Keegan, Patsy Kensit, Lord Archer, Michelle Collins, Joe Swash, and Denise Van Outen settled claims with the Mirror group in 2017

The inquiry was split into two parts, with the second part deferred until after criminal prosecutions concluded in 2016.

But the government closed down the second part, meaning many of the claims of the victims were never heard in an open forum.

It also meant the Leveson Inquiry did not hear from many of the individuals, like Mr Evans, who were most directly involved in phone-hacking.

Mr Evans, originally from Denbighshire, said: “There are questions to answer over the evidence that was previously offered at Leveson, the stuff that would have been covered by Leveson Two but just hasn’t been.”

But Mr Evans did give evidence against another of his former employers, Mirror Group Newspapers, in a civil High Court case in 2015 on behalf of claimants.

In his judgement in May 2015, Mr Justice Mann said the evidence of the former editor of the Daily Mirror, Richard Wallace, to the Leveson Inquiry had been inaccurate.

He also described the evidence given to the same inquiry by the former editor of the Sunday Mirror, Tina Weaver, as “wrong”.

Although he acknowledged neither had given evidence before the court, he found: “The practice of phone-hacking was indeed widespread, institutionalised and long standing.

“Editorial staff not only knew about the practice, but are also likely to have conducted it themselves.”

Image copyright

Image caption

The Duke of Sussex has begun legal action against the owners of the Sun, the defunct News of the World, and the Daily Mirror

However, in December 2015, the Crown Prosecution Service (CPS) announced it was concluding its investigations into Mirror Group Newspapers and News Group Newspapers over allegations of phone-hacking and no further action would be taken, citing “insufficient evidence”.

The CPS also decided not to put Mr Evans forward as a prosecution witness, despite using him successfully in a previous trial.

‘No effect’

BBC Wales approached Tina Weaver and tried to make contact with Richard Wallace for a statement, but did not receive a response.

Neither of them were ever accused of any offence in relation to phone-hacking.

Mirror Group Newspapers, owned by Reach plc, declined to comment.

Mr Evans said he and others have referred Mr Justice Mann’s conclusions to the Metropolitan Police, but they “haven’t had any effect”.

Wrexham MP Ian Lucas, a member of the Westminster culture committee, said he expected the police to investigate.

“I can’t understand why there wouldn’t be a proper investigation,” he said.

“It’s vital that people who give evidence are straightforward and give a full account of themselves.

“If people did not do that then it undermines the strength of the inquiry, it undermines the process and we cannot really accept fully the content of the conclusions of Lord Justice Leveson.”

Image copyright
Press Association Archive

Image caption

Lord Justice Sir Brian Leveson (pictured in 2012) led the inquiry

The Metropolitan Police Service did not respond to Mr Lucas’ comments but confirmed they had received a letter in January 2019, drawing their attention to Mr Justice Mann’s statements but an “error” had meant they had not replied until July 2019.

They would “neither confirm nor deny” whether an investigation had begun.

Mr Evans believes the second part of the Leveson Inquiry should go ahead and in the mean time has started a research project called Alt Lev.

He denies it is just an attempt to point the finger at others.

“It would be so much easier to walk away and get on with one’s life,” he said.

“This is in no way about getting one’s own back or anything like this.

“People really need to bear in mind that for every one celebrity, usually in order to get to their private information, usually a group of five or 10 or 15 people around them will have been affected.

“What price would you place on a press that the public can genuinely trust and have faith in?”

Image caption

Dan Evans’ evidence resulted in the conviction of former News of the World editor Andy Coulson

Former News UK employee, Guto Harri, is opposed to the idea of a further publicly funded inquiry along the lines of Leveson.

“I struggle to see why it is that we as taxpayers want to fund a judge and an army of barristers to sit in court for many months, covered by TV as the first Leveson Inquiry was, revisiting something that the court system has proved capable of dealing with, either through the criminal process or civil process.”

In total, nine people were convicted of offences related to phone-hacking following the police’s Operation Weeting investigation. Three people were acquitted.

News UK, previously News Group Newspapers, said they had nothing to add to the government’s statement.

News UK have consistently denied any wrongdoing at The Sun.

Source link

The post #hacking | Phone-hacking: Journalists ‘escaped scrutiny’ – BBC News appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | More women needed in cyber security to meet high industry demand: Sim Ann, Singapore News & Top Stories

Source: National Cyber Security – Produced By Gregory Evans

SINGAPORE – The Republic needs more women to take up positions in cyber security, a sector that is facing a shortfall of talent.

On Thursday (Oct 3), Senior Minister of State for Communications and Information Sim Ann said more women can be encouraged to join the cyber-security industry and thrive in it.

“Given the high demand for cyber security talent, it would be a pity to draw from only half the population,” she said, noting that estimates of the proportion of women in cyber security globally range from as low as 10 per cent to about 25 per cent.

“Effective strategies to tackle cyber security… must integrate the perspectives of all people – both men and women – so that the technologies deployed and the process implemented are practical and inclusive.”

In her opening address to audience members at the Women in Cyber event during the Singapore International Cyber Week (SICW), Ms Sim outlined three ways to get more women to join the cyber-security industry and thrive in it.

First, by engaging young people to raise awareness of the opportunities in cyber security. She said this is important as people often make career choices early in life.

One such initiative is the Singapore Cyber Youth Programme, which reaches out to secondary school-level students for boot camps and career mentoring sessions.

The other two ways are for women to constantly update and deepen their skills to take advantage of emerging trends in a fast-paced sector, and to have a strong community network, she added.

“Women support networks shed light on women role models who can inspire young aspiring professionals. They also serve as a comfortable launch pad for women to plug into broader industry and community networks,” Ms Sim said.

Ms Sim’s call for more women to join the industry follows a warning by the Cyber Security Agency of Singapore (CSA) in July that the industry potentially faces a shortage of up to 3,400 professionals by 2020.

Ms Alina Tan, 26, was among the many female cyber-security professionals in the audience for the Women in Cyber event.

Combining her twin interests in cyber security and car modifications led Ms Tan to specialise in automotive cyber security.

She started working in the Land Transport Authority’s Cyber Division last month, after spending about two years in cyber-security consulting.

“What I enjoy most about working in cyber security is that I’m always learning something new,” said Ms Tan, who in her free time organises weekly meet-ups for like-minded individuals in the local community to conduct their own research in car cyber security.

“I get a sense of satisfaction from discovering vulnerabilities in a system and then finding ways to secure it. You never know what you’re going to find in there and that’s very interesting for me.”

Held at Suntec City and Convention Centre from Oct 1 to Oct 3, SICW 2019 is the fourth edition of the annual event organised by CSA.

Source link

The post #cybersecurity | More women needed in cyber security to meet high industry demand: Sim Ann, Singapore News & Top Stories appeared first on National Cyber Security.

View full post on National Cyber Security

Intel didn’t #tell US #cyber security officials about the #Meltdown and #Spectre flaws until after it #leaked in news #reports

Source: National Cyber Security News

Intel did not inform U.S. cyber security officials of the so-called Meltdown and Spectre chip security flaws until they leaked to the public, six months after Alphabet Inc notified the chipmaker of the problems, according to letters sent by tech companies to lawmakers on Thursday.

Current and former U.S. government officials have raised concerns that the government was not informed of the flaws before they became public because the flaws potentially held national security implications. Intel said it did not think the flaws needed to be shared with U.S. authorities as hackers had not exploited the vulnerabilities.

Intel did not tell the United States Computer Emergency Readiness Team, better known as US-CERT, about Meltdown and Spectre until Jan. 3, after reports on them in online technology site The Register had begun to circulate.

US-CERT, which issues warnings about cyber security problems to the public and private sector, did not respond to a request for comment.

Details of when the chip flaws were disclosed were detailed in letters sent by Intel, Alphabet and Apple Inc on Thursday in response to questions from Representative Greg Walden, an Oregon Republican who chairs the House Energy and Commerce Committee.

Read More….


View full post on National Cyber Security Ventures

Hacker #tricks official #Vatican News site into #declaring #God an #onion

Source: National Cyber Security News

A Belgian security researcher has discovered a vulnerability on the website of Vatican News — the official news publication of the Holy See — that could allow anyone to publish their own fake news.

The vulnerability was discovered by independent researcher Inti De Ceukelaire. Proving his work, he tweeted a picture of Vatican News falsely stating that Pope Francis had declared God to be an onion.

De Ceukelaire (who we’ve previously profiled) has been behind some high profile discoveries. In September, he disclosed ways to access corporate messaging apps like Slack and Yammer by exploiting publicly-accessible help-desks and bug trackers.

Last February, De Ceukelaire earned notoriety after he redirected several links in Donald Trump’s old tweets to content that would otherwise be embarrassing for the now-occupant of 1600 Pennsylvania Avenue. He did this by identifying websites Trump had tweeted out whose domain names had been allowed to expire. He then re-registered them under his own name.

Keeping with the Trump theme, he used publicly accessible online information to find the contact details of Melania Trump. He used this to invite FLOTUS to his home town.

In the case of Vatican News, De Ceukelaire encountered an unpatched cross site scripting (XSS) vulnerability, and exploited it to inject the blatantly fake news.

Read More….


View full post on National Cyber Security Ventures

Iranian #Hackers Have Set Up a #News Outlet to #Court Possible #Targets, #Security Firm Says

Iranian #Hackers Have Set Up a #News Outlet to #Court Possible #Targets, #Security Firm SaysAn Iranian cyber espionage group known as Charming Kitten is believed to be behind a campaign targeting academic researchers, human rights activists, media outlets and political advisors focusing on Iran, according to a report published earlier this week by Israel-based threat intelligence company ClearSky Cyber Security. The group has also set up a news outlet […] View full post on | Can You Be Hacked?

Hacking and fake news cast shadows over German election

Source: National Cyber Security – Produced By Gregory Evans

The Bundestag break-in occurred in May 2015, without a window being smashed. The intruders to the German parliament were not looking for anything tangible, nor were they even in Berlin. They wanted data and they got it: an estimated 16 gigabytes worth. This was no random smash-and-grab: the hackers sorted…

The post Hacking and fake news cast shadows over German election appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

PayPal Phishing Scam News: Fraudulent Scheme Redirects Users to Obtain Personal Information, Photo

Source: National Cyber Security – Produced By Gregory Evans

PayPal Phishing Scam News: Fraudulent Scheme Redirects Users to Obtain Personal Information, Photo

This phishing scam reportedly involves the redirection of PayPal users to a different website (hxxps://hellopc[.]co[.]nz/wp-includes/random_compat/error_polyfil.php) that will present a false login page. According to PhishMe, the page will only appear legitimate but is actually a fraudulent scheme. Once PayPal users input their details, the hackers are able to obtain their…

The post PayPal Phishing Scam News: Fraudulent Scheme Redirects Users to Obtain Personal Information, Photo appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures