Archive for June, 2014

Focus on Security in New Dell Products, Upgrades

From: TopTechNews

Dell rolled out new security tools and enhancements Thursday aimed at enabling businesses of all sizes to protect their sensitive corporate data while still allowing employees to access that data whenever they want, wherever they are, using any device.

These include enhanced security features for Dell’s Data Protection Cloud Edition with Dropbox for Business, new products within its commercial PC portfolio, and what the company claims is the first commercially available product to achieve the U.S. government’s FIPS-140 Level 3 certified commercial PCs with Hardware Crypto Accelerator.

Hedge-Fund Hack Is Part of Bigger Siege, Cyber-Experts Warn

From: Bloomberg

By Chris Strohm

The attack on a U.S. hedge fund’s network, which a cybersecurity contractor said last week disrupted the firm’s high-speed trading and stole its data, is but one among many.

That is the assessment of more than a half-dozen computer security experts, who in recent interviews characterized the hedge-fund industry as the target of multiple attacks, many successful. Over the past two years, computer networks at dozens of banks, hedge funds, law firms and other Wall Street companies have been infiltrated by hackers mainly from Eastern European countries, these people said.

Read Complete Article

Nation State-sponsored Attackers Hacked Two Airports, Report Says

From: Nextgov

By Aliya Sternstein

A prolonged operation to spy on aviation systems at 75 U.S. airports was caught by the cooperation of the federal government, a state information-sharing organization and industry, but not before claiming at least two victims, according to a new report.

The campaign was discovered in 2013. The federal government notified the Center for Internet Security, a nonprofit group that works closely with state and local governments, about a so-called advanced persistent threat targeting four airports, CIS officials said.

Read Complete Article

Google’s War on Music

From: Slashdot

By: Soulskill

Google: Indie Musicians Must Join Streaming Service Or Be Removed

Sockatume writes: In a statement to the Financial Times and reported by the BBC, Google has confirmed that it will remove the music videos of independent artists unless they sign up to its upcoming subscription music service. Many independent musicians and labels have refused to do so, claiming that the contracts offer significantly worse deals than the likes of Spotify and Pandora, and that Google is unwilling to negotiate on the rates it offers artists. A Google spokesperson indicated that the company could start removing videos within days.

Russia ‘secretly working with environmentalists to oppose fracking’

Editor’s Note: Over twenty years, this novel, explored Russian efforts to weaken American security by manipulating environmental regulations.

Nato chief, Anders Fogh Rasmussen, says Moscow mounting disinformation campaign to maintain reliance on Russian gas

The head of one of the world’s leading groups of democratic nations has accused Russia of undermining projects using hydraulic fracturing technology in Europe.

Anders Fogh Rasmussen, secretary-general of the North Atlantic Treaty Organisation (Nato), and former premier of Denmark, told the Chatham House thinktank in London on Thursday that Vladimir Putin’s government was behind attempts to discredit fracking, according to reports.

Chinese smartphone on sale on Amazon and eBay contains built-in malware

From: The Guardian

Chinese clone of Samsung smartphone steals personal data using a virus disguised as Google Play, researchers warn

Singapore releases TV white space regulatory framework

From: ZDNet

Summary: A year after gathering industry feedback on the technology, ICT regulator IDA finalizes the country’s regulatory framework for TV white space in a bid to drive commercial deployments and ease demand for more bandwidth.

By for By The Way

Singapore has released its regulatory framework for TV white space (TVWS), effective from November, to facilitate the deployment of the technology and ease demand for more bandwidth amid a growing number of mobile and online users. 

Chinese Cyber Espionage: We Still Don’t Know What To Do About It

From: Forbes

Adam Segal

Three documents this week lay out the who, how, why, and why it matters of Chinese cyber espionage. Unfortunately, we still lack the what to do.

The who and how is contained in a new report, Putter Panda, by the cybersecurity company CrowdStrike [Full disclosure: CrowdStrike helps fund a speaker series at the Council on Foreign Relations]. The report, like the Department of Justice’s indictment of five hackers alleged to be part of the People’s Liberation Army and Mandiant’s APT1 report, uses IP addresses, email accounts, and other forensic details to describe attacks on European and U.S. businesses and government agencies, with a particular focus on the satellite, aerospace, and communications sectors. CrowdStrike identifies a hacker using the handle “cppy,” and through images posted on a picture sharing website and other clues links the individual to the PLA 3rd Department 12th Bureau Unit 61486 in Shanghai.

Cyber security centre established in Dubai

From: GulfNews.com

Mohammad issues decree naming Al Qamzi as chairman of the organisation’s board

Dubai: A cyber security centre has been set up in Dubai to protect government information systems and the telecom network.

His Highness Shaikh Mohammad Bin Rashid Al Maktoum, Vice-President and Prime Minister of the UAE, in his capacity as Ruler of Dubai, issued Law No 11 of 2014 establishing the centre.

The centre aims to develop the necessary cybersecurity methods, increase the efficiency of ways of protecting information and the exchange of information among all government bodies in Dubai.

The coming digital anarchy

From: The Telegraph

Bitcoin is giving banks a run for their money. Now the same technology threatens to eradicate social networks, stock markets, even national governments. Are we heading towards an anarchic future where centralised power of any kind will dissolve?

By , Deputy Head of Technology

The rise and rise of Bitcoin has grabbed the world’s attention, yet its devastating potential still isn’t widely understood. Yes, we all know it’s a digital currency. But the developers who worked on Bitcoin believe that it represents a technological breakthrough that could sweep into obsolescence everything from social networks to stock markets… and even governments.