Monday, 20 February 2017

Trump’s Cybersecurity Plan is a Big No-Show at Key Event

TENS OF THOUSANDS of cyber professionals, academics, and a handful of public servants have swarmed downtown San Francisco for the annual RSA Conference — one of the largest digital and cybersecurity events of its kind.


But trying to find a representative from the 3-week-old White House in the convention halls is like playing a game of Where’s Waldo. None appeared to attend, and panels discussing cybersecurity policy worked off of leaked drafts of an executive order abandoned by President Donald Trump’s administration.

Thursday, 5 January 2017

Canada not afraid of Trump-induced US investor flight

Canada's international trade minister said Thursday that pressure by US President-elect Donald Trump would not keep American firms from investing in Canada or prompt them to withdraw any investments already made.

"The fact that Canada is now one of the countries in the world that supports an open society and open trade is a good reason to invest in Canada," Chrystia Freeland told a press conference.

"US businesses that have already made investments in Canada understand the intelligence and the quality of Canadian workers," she added.

Ford "Go Future". Announced to produce high-tech electrified and autonomous vehicles.

The minister's comments follow Trump's threats to slap General Motors, Ford and Toyota with import taxes for building automobiles in Mexico intended for the US market.

Tuesday, 27 December 2016

South African Fintech Firm to Launch Blockchain-based Identity Verification in 2017


South African fintech organization ThisIsMe (TIM), which concentrates on identity check, has reported that it will add blockchain innovation to help its administrations and is relied upon to go live in 2017. 

More organizations are turning their regard for bitcoin's hidden circulated record, the blockchain, as they understand the possibilities it can convey. 

Just as of late, the significant Spanish vitality organization Endesa uncovered that it is anticipating opening a blockchain research center in an offer to support improvement of blockchain-based answers for the vitality business. 

It's additionally being utilized as a part of different zones, for example, the social insurance industry and the land business while Richard Branson trusts that the blockchain innovation could deliver a 'financial transformation'. 

Presently, however, trying to give better administrations to its actual personality confirmation, KYC (know-your-client), AML (hostile to government evasion), and individual verifications highlights, TIM have chosen to dispatch the blockchain innovation, reports IT Online.

Earlier this year, the Norton Cybersecurity Insights Report revealed that 76 percent of South Africans believe that identity theft has increased while 67 percent think that because of the popularity of smartphones and the Internet it is now more difficult to control where their personal information goes to.

Monday, 12 December 2016

Hack of Saudi Arabia Exposes Middle East Cyber Security Flaws

More than a year after a drowned Syrian toddler washed up on a beach in Turkey, the tiny refugee’s body, captured in a photograph that shocked the world, reappeared on computer screens across Saudi Arabia -- this time as a prelude to a cyber attack.

The strike last month disabled thousands of computers across multiple government ministries in Saudi Arabia, a rare use of offensive cyberweapons aimed at destroying computers and erasing data. The attackers, who haven’t claimed responsibility, used the same malware that was employed in a 2012 assault against Saudi Arabian Oil Co., known as Saudi Aramco, and which destroyed 35,000 computers within hours.

The Middle East, home to almost half of global oil reserves and much of its natural gas, is also a magnet for some of the world’s costliest cyberattacks, PricewaterhouseCoopers LLP said in a March 2016 report. The threat is set to grow as online activity mushrooms amid the region’s myriad geopolitical conflicts and tensions.

“For the last couple of years the U.S. Department of Defense has been trying to get the Gulf states to harden their defenses,” said James Lewis, senior vice president at the Center for Strategic and International Studies in Washington, D.C. “Some of them are in OK shape. Saudi Arabia is not.”

Damage Unclear


The extent of the damage isn’t clear, though two people informed of the security breach said it targeted the Saudi central bank, the transportation ministry and the agency that runs the country’s airports. One bright spot is that the Saudis have been able to restore some lost data via back-ups, recovering faster than they did after the 2012 strike, said one person familiar with the clean-up. 

The central bank, known as the Saudi Arabian Monetary Authority, denied that its systems were breached. The country’s General Authority of Civil Aviation said damage to its networks was limited to some office systems and employee e-mails.

While the assault was similar to the one that hit Saudi Aramco four years ago, the impact was “much smaller” and didn’t disrupt transportation or aviation services, said Abbad Al Abbad, executive director for Strategic Development and Communication at the Riyadh-based National Cyber Security Center.

Online Market


Cyberattacks in the Middle East threaten more than governments and public facilities -- they put economic development at risk. A unified regional online market could expand to include 160 million users by 2025 and add about $95 billion to gross domestic product, according to consultant McKinsey & Co. Saudi Arabia, the United Arab Emirates and other Arab states in the Gulf are leading this growth.

“The rapid adoption of digitization in the U.A.E. and Gulf Cooperation Council countries has made the region an attractive target for a wide array of security breaches, perpetrated by hackers with advanced cyber exploitation technologies,” Mohit Shrivastava, a senior analyst for information security at consultant MarketsandMarkets, said in a Dec. 5 e-mail.

Six months ago, FireEye Inc. detected cybercriminal strikes on Middle Eastern banks that were launched through e-mail attachments. The California-based cybersecurity company said the attackers appeared to be probing for targets. 

U.S. officials have said Iran was behind the 2012 attack against Saudi Aramco, and investigators also suspect Iranian hackers of involvement in the November blitz on Saudi government bodies. Media officials at Iran’s Foreign Ministry weren’t immediately available for comment.  

Iran too has been a victim of cybersabotage. A computer worm known as Stuxnet derailed work at the country’s main uranium-enrichment facilities in 2010, and the Flame virus crippled the Iranian energy industry two years later. Iran suggested that both incidents involved Israel, which doesn’t comment on its reported involvement in cyberattacks.

Tuesday, 13 September 2016

How Cybercriminals Breathe Life into Laptops : Webcam Blackmail DELIAH

Stories of spiritless articles springing up are well known to us. Films, for example, Toy Story demonstrate the thought's social weight, and Greek mythology on people being transformed into items demonstrate its history. However, in today's day and age, innovation can make tall tales appear to be genuine. Consider the possibility that the portable workstation, that recognizable apparatus we use for pretty much everything, woke up.

Without a doubt, the portable PC isn't really an aware being, however another cybersecurity danger makes it feel that way. The PC malware named "Delilah" permits crooks to take advantage of clients' most touchy data and catch photographs of their lives—through the casualties' own PCs.

Here's the manner by which it works: the principal contact happens accidentally on grown-up and gaming sites, where the danger is unconsciously downloaded through malevolent pop-ups and different techniques. From that point, the malware filters the PC for touchy data. It chases for family subtle elements, learning about work environments, and humiliating privileged insights. Cybercriminals then view this information joined in a solitary spot. When they uncover enough earth, they continue to coerce the casualty. There's no speculative chemistry here: it's malware that changes PCs into a Pandora's case.

Be that as it may, this danger can make portable PCs genuinely seem to have their very own existence. That is on the grounds that Delilah can seize webcams to record a man's life—as though the machine were viewing the client. The malware takes normal screenshots of a client's portable workstation, archiving sites, messages, receipts, and client accounts.

Presently, this all sounds like a device from a spy film—that is really not far-removed the imprint. The malware is implied for enrolling insiders inside associations or blackmailing compelling individuals. That is a high-review, specialty reason. All things considered, the infection is just being passed around in tight-sew illicit gatherings. So it's really impossible you'd encountered this danger as a person. Regular law breakers don't have their hands on it, and the vast majority aren't prone to be targets.

In the meantime, everybody ought to know about these techniques. Information is critical and there are comparative, less progressed cybercriminal strategies being utilized out there.


This is what you can do to stay secured each day, when interfacing with your gadgets: 



  • Try not to download new records. For malware to do harm, it must be introduced onto your PC first. Keep the issue at the beginning. Try not to tap on suspicious pop-ups or new connections. 


  • Keep an eye out for odd PC conduct. A few dangers are perceptible. For this situation, the Delilah malware frequently crashes the casualty's portable PC because of the enormous measure of screenshots it takes. Blunder messages are additionally basic when webcam capturing is empowered. Whenever your PC begins acting bizarre, see an expert to check for malware. 


  • Be cautious with private data. Minimize the advanced trail you leave on your PC. Try not to record delicate data on your gadget on the off chance that you can maintain a strategic distance from it, and occasionally examine your gadgets as a component of an information tidy up—consider it like an advanced spring cleaning, that you can do throughout the entire year. 


  • Spread your webcam when not being used. This tip doesn't take much—only a bit of tape. However, this basic activity can be vital in light of the fact that, other than the Delilah malware, there are numerous camera-hacking strategies out there cybercriminals are utilizing. Stay safe and square out the peeping toms.

Friday, 2 September 2016

Hermine heads to Dorchester, Berkeley counties: schools, government offices announce closings

Tornado

Data from a hurricane hunter aircraft indicate its winds had increased to 75 mph, the center said.
At 8 p.m., the National Hurricane Center said Hermine was expected to cross the coast of Florida tonight or early Friday.

Thursday, 1 September 2016

New Windows Zero-day Exploit via Cyberespionage Group Sandworm Discovered

On Tuesday October fourteenth, another defenselessness was found in Microsoft Windows Operating Systems, influencing every upheld adaptation of Windows, from Windows Vista Service Pack 2 up to Windows 8.1. As indicated by the security firm, iSIGHT, this defenselessness has been misused by a cyberespionage bunch known as Sandworm, to convey malware to focused associations. Known targets incorporate NATO, Ukrainian government associations, Western European government associations, Polish vitality division firms, European media communications firms, and United States scholarly associations. 

As of now, these digital lawbreakers are sending PowerPoint reports containing malevolent connections by means of different phishing tricks; however there is a probability that these may manifest in different sorts of Microsoft Office records, so clients ought to be careful about all Office connections from obscure senders. 

Windows exploit cyberespionage sandworm

Symantec considers this powerlessness basic since it permits assailants remote access to the influenced PC. Since we are seeing two unique payloads being utilized, it is conceivable that more than one gathering is utilizing this helplessness other than Sandworm. Symantec had distinguished two PowerPoint archives written in Chinese that contain this endeavor.