Filed under: cyber security
January 27, 2017 • 09:20 0
Cyber Security – Chinese Net Users Top 731 Million In 2016: Report
China has 731 million Internet users as of December 2016, roughly the size of Europe’s population, according to a report released by the China Internet Network Information Center (CNNIC) on Sunday.
The number of Web users grew by 42.99 million in 2016, or 6.2 percent from the previous year, accounting for 53.2 percent of China’s total population, the report said.
Li Yi, a Shanghai-based independent IT expert, told the Global Times the surge in the number of smartphones was the primary reason for the growth in Net users. Some 695 million netizens used mobile phones to access the Internet in 2016, with a growth rate exceeding 10 percent for the third straight year, the report said. Smartphone-based Internet use accounted for 95.1 percent of all Internet users, up from 90.1 percent in 2015.
The report noted that 201 million people or 27 percent of Internet users were from rural areas…
View original post 344 more words
Filed under: cyber security
January 27, 2017 • 09:19 0
3 Unavoidable Reasons to Consider Cyber Training Professionals
Cyber technology is evolving at a faster pace, but so does the cyber threats. Canberra cyber training becomes a must as you can’t afford to lose your critical business information into the hands of hackers. Security challenges lie on every sphere of business, be it hardware or software. You solve one and another one pops-up. Securing the privacy and integrity of your business information has become tougher and tougher day by day. Switching to cyber security professionals is the best thing that you could do to secure your business from the unauthorized access.
Let’s reveal you why cyber security professionals could be the best bet for your business to handle security challenges. Let’s get started below:
1. Save Losing Your Critical Information:
Does your company engage in use and transfer of financial records? You might be holding a critical information pertaining to individuals or corporate accounts. Imagine the consequences if…
View original post 280 more words
Filed under: cyber security
January 27, 2017 • 09:18 0
Cyber Threats Posed To the Middle East after the Rebirth Of Shamoon
Rebirth of Shamoon:
A computer virus can be so dangerous that it can flush away all your data and clean up all your disk spaces. One example of it is the newest and latest Shamoon virus which is reported to be active in Saudi Arabia. Its Shamoon’s rebirth! First it attacked Gulf and mainly KSA to espionage the energy sector in 2012. The attack was so severe that it infected and destroyed the data of 35000 computers only in Saudi Aramco.
Shamoon 2:
It is believed that the rebirth of Shamoon named as Shamoon 2 can be more vigorous now and it can destruct ten times more what it did in 2012. Already in the very initial stages it has started dismantling the networks of big governmental and private sectors.
According to the labor ministry of KSA it has been attacked and a chemical firm named Sadara co. has experienced…
View original post 384 more words
Filed under: cyber security
January 27, 2017 • 09:16 0
Moving towards a secure digital economy

Even as incessant political bickering is polarizing opinion on demonetisation, India is making a significant transition to a digital payments ecosystem. This project endeavours to breach the urban-rural divide, geographical exclusions of the real world, and income criteria that privileged only a few with access to certain private and public services. This new digital payments ecosystem is brutal in its attempt to alter the way India transacts, trades and is taxed.
A wider adoption of digital payments will invariably change the dimensions of risks, crime and security as well. If pickpockets were a common menace some decades ago, cybercriminals may dominate conversations in the days ahead as they eye digital and online transactions. While the “pickpocket” had to select a relatively “fat target” to make the effort and risk worthwhile, the cyber thief will have a low-risk environment (lack of forensic…
View original post 784 more words
Filed under: cyber security
January 27, 2017 • 09:15 0
DevSecOps Putting Security at the Heart of DevOps
DevSecOps RSA Conference 2017 in San Francisco and DevSecCon in Singapore will both take place in February, and point to the trend toward merging DevOps and security, a combination called DevSecOps.
DevSecOps – the combination of DevOps and Security (or SecOps) – is a new trend making its presence known across the internet, industry and conferences. With DevSecOps RSA Conference 2017 in San Francisco and DevSecCon in Singapore coming up in February 2017 we take a closer look at this new trend.
DevSecOps puts security squarely in the middle of DevOps. No longer treating security as an afterthought, or as a one time review in a traditional or waterfall project context. So what is DevSecOps?
DevSecOps.org says that “The mindset established by DevSecOps lends itself to a cooperative system whereby business operators are supplied with tools and processes that help with security decision making along with security staff that…
View original post 719 more words
Filed under: cyber security
January 27, 2017 • 09:14 0
Hong Kong securities brokers hit by cyber attacks, may face more
Filed under: cyber security
January 27, 2017 • 09:12 0
POTUS Password Problems…Epic Security Fail!
Life Bytes: Thoughts of a Digital Forensic Analyst
So following the inauguration of the now President Trump, there was a lot of talk of Cyber Security being a priority for the new US Government. Whether you support Trump or not, putting financial backing into improving Cyber Security can only be a good thing for the global population, not just the US, so fair play to that!
However, several security blunders recently from major US officials, including the POTUS himself, have cast doubt over the awareness of good security practices within the administration, and also how serious they actually are about cyber security (or are they more concerned about posting copious amounts of controversial Twitter posts…?!).
Today I was ready several different articles, all detailing several blunders. Firstly, it turns out that Trump is still not only using his insecure Android device to Tweet from the Whitehouse, but the @POTUS twitter account has actually been linked to a private…
View original post 155 more words
Filed under: cyber security
January 27, 2017 • 09:10 0
Cyber Terrorism? Kontrol Magazine’s (@kontrolmag) Website Hacked By Turk Hack Team!
Cyber terrorism is a very real thing and it looks like Kontrol Magazine may be the latest victim of it! Apparently, the sprawling Atlanta based publication had its website, www.Kontrolmag.com, hacked today by the notorious Turk Hack Team! As you may recall, back in 2013 this organization single-handedly immobilized over 400 American websites. It all went down early this afternoon when one of Kontrol’s writers’, Ronda Brooks, tried to log on to the site and received the following notification.
View original post 168 more words
Filed under: cyber security
January 26, 2017 • 18:23 0
Respect the Hackers! Or: Why we all should care more about IT Security
Filed under: cyber security
January 26, 2017 • 18:22 0
How To Avoid Hackers And Stay Safe Online.
Gone are the days when hackers faced a mountainous problem to gain access to your phone, computer system, blog, website and network.
If you’re among the lucky ones who have survived such attacks, don’t celebrate until you read this.
Anyone’s security information can be compromised. That’s true.
However, some careless mistakes go a long way in deciding how long we can fight off these ruthless hackers and stay safe online.
You must have read about the US-Russia cyber fallout. It’s not a joke. Governments are fighting dirty with whatever tools they have, breaching trusts and putting citizens at risks.
21st century hackers no longer need days or weeks to gain access to your private information although their success greatly depends on your ignorance. Technological development has made it possible that any data, including encrypted ones, can be easily stolen from miles away with just one click.
How do they do…
View original post 759 more words
Filed under: cyber security
January 26, 2017 • 18:20 0
The Death of the Password & the Future of Consumer Protection
There’s a revolution happening and we don’t even know it. And, I’m not talking about the Women’s March, because we are all well aware of that revolution.
I’m talking about a revolution of passwords. How many passwords do you have written down in a notebook somewhere? Bank passwords, WiFi passwords, Spotify passwords and about a hundred more passwords for various things we sign up for.
What if I told you, that in the near future, we won’t be using a single password to sign into anything? You would call me crazy, especially for online banking, right? Wrong.
Who has the time, memory, or even an abundance of notepad paper to keep all these passwords? Companies like Gigya are ridding the world of passwords. You will have noticed that anything you sign up for, you have the option to create an account with a single push of a button – “Sign in…
View original post 626 more words
Filed under: cyber security
January 26, 2017 • 18:16 0
Data Breaches: An Employer’s Duty to Protect Employees’ Personal Information
By Aaron Wais
Recently, there has been much discussion about the Superior Court of Pennsylvania’s ruling in Dittman v. UPMC, which affirmed a lower court’s order dismissing an employee class action against their employer over a data breach. While this was a significant victory for employers, non-Pennsylvania employers should temper their enthusiasm. As one recent federal court decision in California makes clear, the reasoning of Dittman may not extend far beyond, if at all, the borders of Pennsylvania. Moreover, regardless of their outcomes, both cases also reinforce the need for employers to maintain legally compliant, written policies for safeguarding private information and responding to data breaches.
In Dittman, a data breach resulted in the theft of the personal information (e.g., names, birth dates, social security numbers, banking information) of approximately 62,000 UMPC current and former employees. The information was used to file fraudulent tax returns and steal tax…
View original post 994 more words
Filed under: cyber security
January 26, 2017 • 18:13 0
Russian Computer Experts Arrested for Treason
Two men were arrested on Wednesday, January 25 in December by Russia’s FSB on charges of treason. The men are Sergei Mikhailov, a senior officer of the Federal Security Service, or FSB, and Ruslan Stoyanov, the head of computer incident response investigations at Kaspersky Lab, which makes antivirus programs. [Update: The arrest was just announced; it appears the men were arrested in December.] Earlier, the firing of the director of the Center for Information Security, Andrei Gerasimov, was announced, reportedly related to an investigation into the agency’s cooperation with Kaspersky on criminal hacking cases. Moscow Times is now reporting that two more men have been arrested: Dmitry Dokuchaev, who worked in the same FSB unit as Mikhailov, and another whose name has not been released.
View original post 308 more words
Filed under: cyber security
January 26, 2017 • 18:12 0
Ransomware app hosted in Google Play infects unsuspecting Android user
Google Play, the official market for Android apps, was caught hosting a ransomware app that infected at least one real-world handset, security researchers said Tuesday.
The ransomware was dubbed Charger and was hidden inside an app called EnergyRescue, according to a blog post published by security firm Check Point Software. Once installed, Charger stole SMS contacts and prompted unsuspecting users to grant it all-powerful administrator rights. If users clicked OK, the malicious app locked the device and displayed the following message:
You need to pay for us, otherwise we will sell portion of your personal information on black market every 30 minutes. WE GIVE 100% GUARANTEE THAT ALL FILES WILL RESTORE AFTER WE RECEIVE PAYMENT. WE WILL UNLOCK THE MOBILE DEVICE AND DELETE ALL YOUR DATA FROM OUR SERVER! TURNING OFF YOUR PHONE IS MEANINGLESS, ALL YOUR DATA IS ALREADY STORED ON OUR SERVERS! WE STILL CAN SELLING IT FOR…
View original post 461 more words
Filed under: cyber security
January 26, 2017 • 18:10 0
Private Email Addesses: Trump, Clinton and Bush
Filed under: cyber security
January 26, 2017 • 17:45 0
NIST Releases Update to Cybersecurity Framework
Jan 09, 2017
The National Institute of Standards and Technology (NIST) has issued a draft update to the Framework for Improving Critical Infrastructure Cybersecurity—also known as the Cybersecurity Framework. Providing new details on managing cyber supply chain risks, clarifying key terms, and introducing measurement methods for cybersecurity, the updated framework aims to further develop NIST’s voluntary guidance to organizations on reducing cybersecurity risks.
The Cybersecurity Framework was published in February 2014 following a collaborative process involving industry, academia and government agencies, as directed by a presidential executive order(link is external). The original goal was to develop a voluntary framework to help organizations manage cybersecurity risk in the nation’s critical infrastructure, such as bridges and the electric power grid, but the framework has been widely adopted by many types of organizations across the country and around the world. The Cybersecurity Enhancement Act of 2014(link is external)
View original post 276 more words
Filed under: cyber security
January 26, 2017 • 17:44 0
Cybersecurity 360 – It’s more than technology: A different approach to prepare against cyber-attacks
Filed under: cyber security
January 26, 2017 • 17:43 0
The Key to Internet – ”Nyckeln till internet”
Filed under: cyber security
January 26, 2017 • 17:41 0
Microsoft to continue to invest over US$1b a year on cyber security
Filed under: cyber security
January 25, 2017 • 17:17 0
Top Hacker Shows Us How It’s Done
Filed under: cyber security, credit cards, cyber, cyber security, Cybersecurity, hackers, hacking, rfid, Technology
January 25, 2017 • 17:11 0
Ever wondered where INCOGNITO Mode came from or where all HACKERS hang out?
Blog has been shifted to uncommonindians.com
Ever wondered how these terrorist groups work so easily on Internet even with so much vigilance? How they conduct business without using Google listings and adwords? How they get hide so easily with all this cyber crime cells and whatnot? Well although Technology has been human’s biggest gift to the world but just like everything, it also have its side effects.
Individuals, Companies and even Governments operates on cloud internet and computes their data on the what we call World Wide Web(WWW). But you will be surprised to know that comprise of just 2-3% of the whole internet. At present, the most easily indexed material from the web is text.If you add all the matter(or what is called Indexed websites) which you can find on search engines like Google,Bing, Yahoo, Yandex,etc., that still make it to just 5-6% of all the internet, what is referred as Surface Web. But…
View original post 387 more words
Filed under: cyber security
January 25, 2017 • 17:10 0
CSA Issues Cybersecurity Disclosure Expectations
By: Imran Ahmad, Peter Dunne & Pierre Soulard
Increasingly, cybersecurity is a top of mind issue for most organizations. Senior management, board members and investors are particularly concerned given the potential
negative impact a major cyber-attack can have on organization from a financial, legal, reputational and operational standpoint.
It is therefore no surprise that the Canadian Securities Administrators (the “CSA”) has been active in the area of cybersecurity in recent months. Last week, it issued Staff Notice 51-347 (the “Notice”), an updated notice on cybersecurity expectations for issuers regarding the disclosure of cybersecurity risks and incidents. The Notice also includes a summary of the CSA’s review of the most recent annual filings of 240 constituents of the S&P/TSX Composite Index, focusing on whether and how issuers addressed cybersecurity
issues in their risk factor disclosure.
Disclosure Trends
The CSA’s review of issuers’ cybersecurity disclosure found that nearly 40% of issuers failed to address cybersecurity issues in their risk factor disclosure. Those…
View original post 594 more words
Filed under: cyber security
January 25, 2017 • 17:05 0
Ransomware – Quick Tips
One of the growing cyber threats that got a lot of attention last year was ransomware with a variety of high profile victims.
What is it?
Ransomware is a computer malware that installs itself covertly on a computer, carries out an attack that encrypts the files on that computer and then demands a ransom payment to decrypt the files for the user to regain access to them.
Typically, the ransomware could be bundled with legitimate software much like a Trojan horse. Often times the Trojan installs some form of scareware that claims the victim’s machine is at risk or has been found hosting illegal content.
The end result is eventually to coerce the victim into paying for the decryption key in order to gain access to his files.
How would I get infected?
There are 2 main ways ransomware spreads itself. A compromised website that contains the payload or a…
View original post 200 more words
Filed under: cyber security
January 25, 2017 • 16:44 0
Internet of Things (IoT) & Issues
Welcome to the World of Cyber Security
What Is the Internet of Things (IoT).
In the past, technology was relatively simple; you just connected your computer to the Internet and used it for your daily activities. However, technology became more advanced when mobile devices came into our lives, devices such as smartphones and tablets. These devices put the power of desktop computers into our pockets. While far more mobile, these devices also brought their own, unique security challenges. The next big technical advancement is the Internet of Things. The Internet of Things, often shortened to IoT, is all about connecting everyday devices to the Internet, devices from doorbells and light bulbs to toy dolls and thermostats. These connected devices can make our lives much simpler; for example, having your lights automatically activate as your phone recognizes when you get close to home. The IoT market is moving at an amazing pace, with new devices appearing every week…
View original post 665 more words
Filed under: cyber security
Recent Comments