Cybersecurity

Sponsored
by

Cybersecurity / Most Viewed

What’s in Your DNS Query?

Privacy problems are an area of wide concern for individual users of the Internet -- but what about network operators? Geoff Huston wrote an article earlier this year concerning privacy in DNS and the various attempts to make DNS private on the part of the IETF -- the result can be summarized with this long, but entertaining, quote. more

Ailing ETO-2002 and the Demise of PKI

The only Cyber law passed in Pakistan till date is the famous ETO-2002 (Electronic Transaction Ordinance - 2002). It required Ministry of IT&T to set up a Central Repository for all digital certificates and in addition to set up a body to be named as Electronic Certification Accreditation Council (ECAC) to accredit Electronic Certification Authorities to be established in the country... In this regard, government has not only closed its eyes and has blindly trusted the only certificate authority (CA) in the country operated by a private business group, it has also mandated the citizens and business to trust it. Case in point is Central Board of Revenue (CBR) that has told all taxpayers to digitally sign the emails using the certificates issued by this private party... more

U.S. National Security Agency Announces AI Security Center

U.S. National Security Agency Director, Army Gen. Paul M. Nakasone, has announced the formation of the AI Security Center, a new entity designed to oversee the development and integration of artificial intelligence within the nation's security systems. more

Researchers Demonstrate Serious Privacy Attacks on 4G and 5G Protocols

A group of academic researchers have revealed a design weakness in the 4G/5G protocol which can be exploited by an attacker to identify the victim's presence in a particular cell area just from the victim's soft-identity such as phone number and Twitter handle. more

DNSChanger Trojan Still Running on Half of Fortune 500s, US Govt

More than two months after authorities shut down a massive Internet traffic hijacking scheme, the malicious software that powered the criminal network is still running on computers at half of the Fortune 500 companies, and on PCs at nearly 50 percent of all federal government agencies, new research shows," reports Brian Krebs. more

China’s New Cybersecurity Law Will Be in Effect Starting Thursday

According to the official news agency, Xinhua, implementation of China's controversial Cybersecurity Law will begin on June 1, requiring strict data surveillance and storage for companies operating in the county. more

Widespread Cyberattack Paralyzes US Hospital Systems, Interrupting Critical Healthcare Services

US hospitals have been severely affected by a substantial cyberattack, leading to the closure of emergency rooms in multiple states and the redirection of ambulances.  more

FBI Takes Down China-Backed Botnet, Facilitates Ransomware Negotiations

The FBI and international partners dismantled a China-backed botnet run by the Integrity Technology Group, a company linked to Chinese government espionage. more

Spam Peaked at 200 Billion per Day in 2008, Botnets Nexus of Criminal Activity, Says Cisco

In a 52 page security report released by Cisco, the company has confirmed what has been consistently been observed through out this year: "the Internet-based attacks are becoming increasingly sophisticated and specialized as profit-driven criminals continue to hone their approach to stealing data from businesses, employees and consumers." The 2008 edition of the report has specified the year's top security threats and offers recommendations for protecting networks against attacks that are propagating more rapidly, becoming increasingly difficult to detect, and exploiting technological and human vulnerabilities. more

Senate Urges Domain Registrars to Combat Russian Election Interference

The United States Senate Intelligence Committee Chair, Mark Warner, has called on several domain name registrars, including Namecheap, GoDaddy, and Cloudflare, to address the misuse of their services by Russian actors attempting to influence the 2024 U.S. presidential election. more

The Life Cycle of Digital Certificates Reduces Again

Recently, there were news articles about a large software provider who experienced a global outage due to an expired digital certificate - and this is not the first time this kind of issue has hit the news. Digital certificate outages, when an organization forgets to replace an expiring certificate for a business-critical domain name, continues to cause business disruption and security risks. more

Spin Doctoring from FBI in the Apple Case

It is rather amazing to follow the reporting on the FBI vs Apple case in relation to the FBI's order to Apple to provide them with software that would allow them to crack the security code on all Apple phones. In some of those reports spin doctoring from the FBI -- especially through the public media -- led you to believe that Apple is not willing to assist the FBI in the San Bernardino murder case. This is, however, blatantly false. more

Google Credits USB-Based Security Keys for Successfully Protecting Its 85000 Employees from Phishing

According to multiple sources, Google this week reported that since early 2017, it has not had any of its 85,000 plus employees phished on their work accounts. more

Internet Week Guyana Advances Caribbean Tech Development Agenda

Around the world, the growing sophistication of cyber criminals is challenging the capacity of governments, businesses and individuals to defend themselves. In the Caribbean, governments are forging strategic partnerships with regional actors like the Caribbean Telecommunications Union (CTU) and the Caribbean Network Operators Group (CaribNOG), the region's largest volunteer-based community of network engineers, computer security experts and tech aficionados. more

It Is All About Trust

Trust is the lifeblood of the Internet and central to everything that is done here. In order for the current 3.5 billion users to continue using the Internet and its services, and for the next billion users to connect to the Internet, trust is required. The importance of trust is seen even more in Africa where, though there is a high growth of Internet users, the e-commerce uptake rate is very low. Users are very reluctant to carry out financial transactions over the Internet because of fear of being attacked by cybercriminals. more