Internet Security – PJ Magic http://pjmagic.net/ Sun, 07 Aug 2022 08:42:55 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://pjmagic.net/wp-content/uploads/2021/06/icon-1-150x150.png Internet Security – PJ Magic http://pjmagic.net/ 32 32 Week in Review: Spot Deeply Faked Job Applicants, Data Exfiltration via Bookmarks, Patch Tuesday Predictions https://pjmagic.net/week-in-review-spot-deeply-faked-job-applicants-data-exfiltration-via-bookmarks-patch-tuesday-predictions/ Sun, 07 Aug 2022 08:42:55 +0000 https://pjmagic.net/week-in-review-spot-deeply-faked-job-applicants-data-exfiltration-via-bookmarks-patch-tuesday-predictions/ Here’s a look at some of the most interesting news, articles, interviews and videos from the past week: Browser synchronization abuse: bookmarks as a conduit for secret data exfiltrationTwo universal and seemingly innocuous browser features – the ability to create bookmarks (aka “favorites”) and browser synchronization – make life easier for users, but can also […]]]>

Here’s a look at some of the most interesting news, articles, interviews and videos from the past week:

Browser synchronization abuse: bookmarks as a conduit for secret data exfiltration
Two universal and seemingly innocuous browser features – the ability to create bookmarks (aka “favorites”) and browser synchronization – make life easier for users, but can also allow hackers to establish a secret channel of data exfiltration .

Ransomware gangs face obstacles, but don’t stop (yet)
Ransomware attacks are on the decline, according to reports from several cybersecurity companies. Why is that?

Preventing cyberattacks pays off, so why aren’t companies investing to protect themselves?
In this Help Net Security interview, former Pentagon Chief Strategy Officer Jonathan Reiber, Vice President of Cybersecurity Strategy and Policy, AttackIQ, offers CISO insight – from discussion to boardroom to the appropriate budget allocation.

August 2022 Patch Tuesday Predictions: Printers Again?
Ahead of next week we have a server end of life and even more updates that may impact printers.

How to minimize your exposure to supply chain attacks
Supply chain attacks are on the rise and many organizations seem unsure how to respond to the threat. Here are several steps you can take to minimize your risk of being involved in a supply chain breach.

The most impersonated brand in phishing attacks? Microsoft
Vade has announced its H1 2022 Phishers’ Favorites report, a ranking of the 25 most impersonated brands in phishing attacks.

6 Ways Your Cloud Data Security Policies Are Slowing Innovation — and How to Avoid It
As virtually every organization moves from managing their data in network-based data centers to storing it in the cloud, cloud data security policies are being created to secure that data in a cloud environment. With more and more data migrating to the cloud, these policies must adapt to a wide range of data stores, locations, uses, and environments.

Phishers use custom phishing kit to hijack MFA-protected corporate Microsoft accounts
An ongoing large-scale phishing campaign targets owners of business email accounts at companies in the fintech, lending, insurance, energy and manufacturing sectors in the US, UK, in New Zealand and Australia.

VMware: Fix this critical vulnerability immediately! (CVE-2022-31656)
The security researcher who reported CVE-2022-31656 plans to release a technical description and POC “soon.”

Organizations have grown to love Kubernetes: production usage is high
Kubernetes delivers business value and is poised to gain an increasing share of production workloads, with nearly all respondents to a Dimensional Research study saying they plan to scale and diversify their Kubernetes infrastructures in some way. or another in the coming year.

‘ParseThru’ Vulnerability Allows Unauthorized Access to Cloud-Native Applications
A new vulnerability found in GoLang-based applications allows a malicious actor to bypass validations under certain conditions and gain unauthorized access to cloud-native applications.

Burnout and attrition impact technical teams supporting modern digital systems
Across all industries, 54% of speakers are interrupted outside of normal working hours.

How to Spot Deeply Rigged Candidates in Interviews
The FBI recently issued a warning that malicious attackers are using deepfakes to apply for various remote jobs via virtual interviews over the internet. In this Help Net Security video, Sanjay Gupta, SVP and Managing Director of Mitek Systems, explains how combating this threat will require a multi-layered approach from HR and recruiting teams in addition to IT.

Astute Risk Leadership: Turning Intelligence into Actionable Controls
In this Help Net Security video, John deCraen, Associate Managing Director at Kroll, talks about leveraging threat intelligence to inform actionable controls.

MI-X: The open source project helps you understand if you are exploitable
In this Help Net Security video, Ofri Ouzan, Security Researcher at Rezilion, talks about MI-X (am I exploitable?), an open source tool aimed at efficiently determining whether a localhost or running container image execution is really vulnerable to a specific target. vulnerability taking into account all factors that affect actual exploitability.

Phishing campaign targets Coinbase wallet holders to steal cryptocurrency in real time
In this video for Help Net Security, Nick Ascoli, VP of Threat Research, PIXM, discusses a multi-layered phishing campaign targeting cryptocurrency exchange Coinbase.

How AI and cybersecurity complement each other
In this Help Net Security video, Taylor Hersom, CEO of Eden Data, explains why we need AI and how it helps minimize human error, as well as cybersecurity threats such as ransomware.

Now is the time to focus on software supply chain security improvements
In this Help Net Security video, Kevin Bocek, Vice President of Security Strategy and Threat Intelligence at Venafi, explains how CIOs are increasingly concerned about severe business disruptions, loss of revenue , data theft and damage to customers that can result from a successful software supply chain. attacks.

Machine learning creates a new attack surface requiring specialized defenses
In this interview for Help Net Security, Christopher Sestito, CEO of HiddenLayer, talks about machine learning security considerations and related threats that organizations should be concerned about.

eBook: Privileged Access Management for Dummies
This free 24-page book gives you a practical understanding of privileged access management and its security implications.

Test your security setup with a free assessment tool from CIS
CIS-CAT Lite is the free assessment tool developed by the Center for Internet Security (CIS), which helps users implement secure configurations for multiple technologies. With unlimited analyzes available through CIS-CAT Lite, your organization can download and begin implementing CIS Benchmarks in minutes.

SimpleRisk: Simplified Enterprise Risk Management
In this Help Net Security video, CEO/CISO Josh Sokol introduces SimpleRisk, a fully integrated GRC platform that can be used for all your governance, risk management, and compliance needs.

New infosec products of the week: August 5, 2022
Here’s a look at some of the hottest products from the past week, with releases from Claroty, Fortinet, Qualys, Scrut Automation, Sony, and VIPRE Security.

]]>
Happiest Minds Tech launches cybersecurity services for healthcare https://pjmagic.net/happiest-minds-tech-launches-cybersecurity-services-for-healthcare/ Fri, 05 Aug 2022 03:28:00 +0000 https://pjmagic.net/happiest-minds-tech-launches-cybersecurity-services-for-healthcare/ The IT solutions company announced Thursday, August 4, 2022 the launch of its cybersecurity services in the health sector. Cybersecurity for Healthcare provides end-to-end security services for the healthcare industry by applying a tailored framework to meet regulatory requirements, digital security best practices, and cutting-edge tools and technologies, said Happiest Minds Technologies […]]]>


The IT solutions company announced Thursday, August 4, 2022 the launch of its cybersecurity services in the health sector.

Cybersecurity for Healthcare provides end-to-end security services for the healthcare industry by applying a tailored framework to meet regulatory requirements, digital security best practices, and cutting-edge tools and technologies, said Happiest Minds Technologies in a statement.

These services will help customers stay informed of evolving governance policies and strengthen their healthcare security posture using advanced AI/Big Data/Behavioral and analytics technologies. The company ensures that your organization complies with regulatory requirements (HIPAA/HITRUST) and becomes a resilient healthcare provider, he added.

Vijay Bharti, SVP, Head of Security Practices and CISO of Happiest Minds Technologies, said, “We have provided cybersecurity services to major healthcare providers in all geographies, but with COVID there has been a sudden increase in cybersecurity demand for their digital transformation. I am very pleased to announce that we have launched a Center of Excellence (CoE) for security services in the healthcare sector. This focused initiative will help us deeply understand the pain points of healthcare providers and build actionable solutions and services around them.”

Srinivas Iyengar, Vice President, Head of Healthcare and Life Sciences, Happiest Minds Technologies, said, “With healthcare delivery extending beyond hospital walls, patient-generated healthcare data is becoming a integral to defining care pathways, the influx of connected devices, healthcare is experiencing a very high degree of disruption The speed at which the adoption of digital and emerging technologies is unprecedented and in these circumstances, one of the biggest challenges facing the healthcare industry is cyber threats that put patient security and privacy at risk.we have a strong center of excellence for cybersecurity and since last year we have also been helping the healthcare sector in this company. Our deep cybersecurity expertise and a decade of experience working with healthcare customers has allowed us to officially launch the ent our specialized cybersecurity services for healthcare customers.”

Happiest Minds Technologies enables the digital transformation of businesses and technology providers by leveraging an array of disruptive technologies such as artificial intelligence, blockchain, cloud, digital process automation, internet of things, robotics/ drones, security, virtual/augmented reality, etc.

Happiest Minds Technologies’ net profit increased by 8.1% to Rs 56.34 crore while net sales increased by 9.4% to Rs 328.92 crore in the first quarter of FY23 compared to the fourth quarter of FY22.

Shares of Happiest Minds Technologies fell 0.61% to Rs 968.85 on Thursday, August 4, 2022.

Powered by Capital Market – Live News

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

Dear reader,

Business Standard has always endeavored to provide up-to-date information and commentary on developments that matter to you and that have wider political and economic implications for the country and the world. Your constant encouragement and feedback on how to improve our offering has only strengthened our resolve and commitment to these ideals. Even in these challenging times stemming from Covid-19, we remain committed to keeping you informed and updated with credible news, authoritative opinions and incisive commentary on relevant topical issues.
However, we have a request.

As we battle the economic impact of the pandemic, we need your support even more so that we can continue to bring you more great content. Our subscription model has received an encouraging response from many of you who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of bringing you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practice the journalism we are committed to.

Support quality journalism and subscribe to Business Standard.

digital editor

]]>
The Engineer – Commentary: Quantum computing has a hype problem https://pjmagic.net/the-engineer-commentary-quantum-computing-has-a-hype-problem/ Wed, 03 Aug 2022 10:10:32 +0000 https://pjmagic.net/the-engineer-commentary-quantum-computing-has-a-hype-problem/ Peter Debenham, senior consultant at Plextek, looks behind the headlines and explores realistic future applications of quantum computing As a buzz phrase, quantum computing lives up to the likes of AI, IoT, and the Metaverse in hype. But ask people what quantum computing is and what it means to have quantum computers for the future, […]]]>

Peter Debenham, senior consultant at Plextek, looks behind the headlines and explores realistic future applications of quantum computing

As a buzz phrase, quantum computing lives up to the likes of AI, IoT, and the Metaverse in hype. But ask people what quantum computing is and what it means to have quantum computers for the future, and most will struggle. If you dig a little deeper, the only thing that sticks in people’s minds are the headlines about how quantum computers are threatening to destroy internet security. If quantum computers are fast enough to crack encryption algorithms, it’s game over. But is it a reality?

First, quantum computers are sufficiently in their infancy that, in most practical cases, they do not currently exist. It wasn’t until 1980 that physicist Paul Benioff proposed a quantum mechanical model of the Turing machine, and scientists and engineers are just beginning to develop the physics and engineering needed to build commercial quantum computers. Larger processors contain hundreds of qubits, the basic unit of a quantum computer, where tens of thousands or millions are needed. The problems of building quantum computers are not insurmountable but will take more time.

An article from 2021[1] suggests that with just over 13,000 qubits, a quantum computer could factor a 2048-bit RSA integer; the kind of operation needed to break much of the existing internet encryption. They wanted 177 days to do it, but that’s much faster than the “not before the universe heats up” answer for typical computers. Another article from 2021[2] suggests that 20 million qubits would only need 8 hours to do the same thing.


-Adobe Stock

Most of those working in cybersecurity have been aware of the outstanding issues for many years and have developed cryptography resistant to quantum computers. In 2015, the US National Security Agency (NSA), followed by the UK National Cyber ​​Security Council (NCSC), announced their intention to move to quantum-resistant cryptography and have standardized algorithms ready for 2022-2024. NIST, the US National Institute of Standards and Technology, announced four candidate algorithms on July 5, 2022[3].

What are they for?

Given that quantum computers suddenly won’t allow everyone to read the world’s encrypted internet traffic, what good are they? Quick search and machine learning problems, yes, but what else?

Two physicists, Manin in 1980[4] and Feynman in 1981[5], answered this question by pointing to simulating things you can’t simulate with classical computers, such as quantum mechanical systems. We can accurately model the quantum mechanics of simple systems like a single hydrogen atom using pen and paper and a few particles using existing computers. But larger quantum mechanical systems cannot be modeled accurately at all without incredible simplification.

Feynman imagined trying to use quantum mechanics in our current computers to accurately model a system with a larger number of elements. For a number of particles, N, at a similar number of positions in space, you need memory to store and processing to compute NNOT configurations, which quickly become too large. Even for 100 particles you have about 10200 configurations to store and calculate at each step. Compare that to estimates of 1080 atoms in the observable universe and that is impossible for classical computers. But this could be done with a quantum computer of the same order of magnitude of qubits, namely 100, because the qubits react in the same way as the modeled system.

Existing simplified quantum mechanical models underpin modern chemistry, materials design, and pharmaceuticals. Perfectly accurate models would allow much more. New drugs, more efficient chemical processes and new materials.

Fertilizer production using the Haber-Bosch process consumes around 1% of the world’s total energy production -Adobe Stock

For example, the first production of fertilizer using the Haber-Bosch process consumes about 1% of the world’s total energy production and generates 1.4% of the world’s CO.2 generation[6]. Fertilizer is needed to feed a world of 8 billion people, but better modeling gives the high possibility of a more efficient process by designing a better catalyst.

The second example is material design. To decarbonize, the world is moving from internal combustion to electric motors. A huge problem with motors is heat from electrical resistance. Heat is not only a loss of efficiency but worse, there is the problem of how to dissipate it. If it’s too hot, the engine fails or something catches fire. Less heat allows for smaller, more efficient motors that are quieter too. Replacing motor wiring with high temperature superconductors eliminates both problems, but applications are limited because for superconductors high temperature means above liquid nitrogen (77K or -196ohVS). Better material modeling would facilitate the search for useful room-temperature superconductors, moving superconducting motors from large industrial environments to normal everyday life.

So what will quantum computers do for us? It won’t break internet security, but it might give us better chemical processes and room temperature superconductors. Quantum computing could change the world, but right now its future remains uncertain.

Peter Debenham is a Senior Consultant at Plextek

[1] Gouzien, E. and Sangouard, N., 2021. Factorization of 2048-bit rsa integers in 177 days with 13,436 qubits and multimode memory. Physical examination letters, 127(14), p.140503.

[2] Gidney, C. and Ekerå, M., 2021. How to factor 2048-bit RSA integers in 8 hours using 20 million noisy qubits. Quantum, 5p.433.

[3] Alagic, G., Alperin-Sheriff, J., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Liu, YK, Lichtinger, J., Miller, C. , Moody, D., Peralta, R., Perlner, R., Robinson, A., & Smith-Tone, D., 2022. Progress Report on the Third Cycle of NIST’s Post-Quantum Cryptography Standards Process . US Department of Commerce, NIST.

[4] Manin, YI, 1980. Vychislimoe i nevychislimoe (computable and non-computable), Moscow: Sov.

[5] Feynman, RP, 1982. Physics simulation with computers. International Journal of Theoretical Physics, 21(6/7) (publication of a conference talk from May 7, 1981)

[6] https://phys.org/news/2022-04-haber-bosch-atomic-scale.html

]]>
Adani buys 400 MHz waves in the 26 GHz band for Rs 212 cr, only for captive use https://pjmagic.net/adani-buys-400-mhz-waves-in-the-26-ghz-band-for-rs-212-cr-only-for-captive-use/ Mon, 01 Aug 2022 18:18:00 +0000 https://pjmagic.net/adani-buys-400-mhz-waves-in-the-26-ghz-band-for-rs-212-cr-only-for-captive-use/ First entrant Adani Data Networks, a unit of Adani Group, bought 400 MHz of the 26 GHz (mmWave) band across six circles for Rs 212 crore in the latest spectrum auction, indicating it intends to use the waves for the captive networks in all the activities of the conglomerate. Adani Data Networks has purchased airwaves […]]]>
First entrant Adani Data Networks, a unit of Adani Group, bought 400 MHz of the 26 GHz (mmWave) band across six circles for Rs 212 crore in the latest spectrum auction, indicating it intends to use the waves for the captive networks in all the activities of the conglomerate.

Adani Data Networks has purchased airwaves in service areas of Gujarat, Mumbai, Andhra Pradesh, Karnataka, Tamil Nadu and Rajasthan, Telecoms Minister Ashiwni Vaishnaw told reporters on Monday.

The 26 GHz band attracted interest from all participants, given its usefulness for captive networks and the removal of spectrum usage fees from the ongoing auction. No less than 72% of the spectrum offered in this band received offers.

“The new entrant, Adani Data Networks, seems to have limited its bidding to certain circles, where the parent entity is present via airport, ports, etc., for captive use,” Japanese broker Nomura said in a statement. report.

Her participation in the auction was well below expectations, given that she put down an earnest money deposit (EMD) of Rs 100 crore. Although this was the lowest among the four participants in the auction, his likely expenditure in the auction was predicted to be Rs 900-1,000 crore based on the EMD amount.

A surprise auction participant, Adani Group, said it intended to participate in the sale of 5G spectrum to provide private network solutions as well as enhanced cybersecurity at airports, ports and logistics. , power generation, distribution and manufacturing operations. He also said he has no intention of playing for the consumer mobility business.

While he may not have been an aggressive bidder in the auction, Adani Data Network’s presence may have had some impact on the process. “Amazingly, telecom operators have offered almost Rs 128 billion of spectrum in legacy bands which we believe could be due to the threat of a new entrant entering the space in the longer term” , added Nomura analysts.

The company is in the process of acquiring a unified license for international and domestic long distance telephony and Internet services for the circle of Gujarat, which implies that it will focus on geography to deploy the waves acquired under the auction.

Shares of the group’s flagship company,

rose 3.48% to close at Rs 2,658.90 on BSE Wednesday.

]]>
Cryptojacking cases are increasing globally, why and should you be concerned? https://pjmagic.net/cryptojacking-cases-are-increasing-globally-why-and-should-you-be-concerned/ Sat, 30 Jul 2022 08:30:37 +0000 https://pjmagic.net/cryptojacking-cases-are-increasing-globally-why-and-should-you-be-concerned/ According to internet security company Kaspersky, cryptojacking is the act of mining cryptocurrency by hacking into someone else’s computer, smartphone, and other electronic devices. This is usually done by gaining unauthorized access to the host’s computer and using its resources to mine cryptocurrency without the host noticing or before it’s too late. Since the proof-of-work […]]]>

According to internet security company Kaspersky, cryptojacking is the act of mining cryptocurrency by hacking into someone else’s computer, smartphone, and other electronic devices. This is usually done by gaining unauthorized access to the host’s computer and using its resources to mine cryptocurrency without the host noticing or before it’s too late.

Since the proof-of-work consensus using coins like Bitcoin (BTC) requires significant computing power to generate new coins and mining rigs consume a lot of electricity on top of their high cost and maintenance expenses, hackers use cryptojacking method to mine bitcoin and other evidence. -Work with cryptocurrencies using host resources.

Kaspersky Labs researchers further explain that cryptojacking can infect even Android devices, even though phones have less processing power than computers. In this type of attack, hackers pool the processing power of large numbers of phones to mine Proof-of-Work cryptocurrencies.

Exponential increase in cryptojacking attacks in 2022

According to a report titled “2022 SonicWall Cyber ​​Threat Report” by cybersecurity firm SonicWall, cryptojacking attacks in the financial industry have increased 269% since the start of the year, about five times more than cyberattacks targeting the retail sector.

The report notes that the financial sector has experienced significantly higher incidences of cryptojacking than any other sector. Overall, cryptojacking cases rose 30% to 66.7 million in the first half of 2022, SonicWall said in the report.

“Despite a steep drop in the price of cryptocurrency, global cryptojacking volume rose to 66.7 million in the first half of 2022, up 30% from the first half of 2021. The number of attacks against the sector financial is five times higher than the second highest industry – retail, which was once at the very bottom of the list,” the report notes.

Why are cryptojacking cases increasing?

Cryptojacking cases have steadily increased, showing that such cases continue regardless of price fluctuations

SonicWall researchers noted that despite a steep drop in Bitcoin prices since January 2022, cases of cryptojacking have steadily increased, showing that such cases continue regardless of price fluctuations. Moreover, changing careers is difficult even for cybercriminals; therefore, they continue to illegally mine Proof-of-Work cryptocurrencies like Bitcoin. The researchers also attributed the increase to cracking down on ransomware attacks, making cryptojacking their preferred tool for illegal mining. Bitcoin prices have fallen 74% from their all-time high of $68,990 last year.

“After governments stepped up their ransomware awareness and enforcement efforts, and ransomware attacks such as those against Colonial Pipeline and Kaseya led to high-profile bankruptcies, some ransomware operators decided they were ready for a quieter life,” the researchers noted.

In a ransomware attack, they said, the attacker must announce their presence and demand a ransom by communicating with the victim. But in cryptojacking, the whole attack relies on stealth and “without the victim ever being aware of it. And for some cybercriminals feeling the heat, the lower risk is worth sacrificing potentially higher payoff,” they said.

Current trends in cryptojacking

Attack incidents: SonicWall researchers observed that cryptojacking incidents increased by 30% to 66.7 million attacks in the first half of 2022, compared to the same period in 2021. The researchers also spotted a a trend in which they observed that volumes of cryptojacking attacks were often higher. in the first quarter than in the second quarter, and this has been the case since SonicWall started tracking cryptojacking.

SonicWall researchers recorded 45.1 million cryptojacking attacks in the first quarter of 2022, but by April 2022 incidents were down to half “from their peak, and by May they were even lower, which led to a second-quarter attack volume of just 21.6 million, less than half the amount seen in the previous three months.

“While falling cryptocurrency prices may have a lot to do with it, keep in mind that what we’re seeing follows a well-established pattern,” the researchers said.

Bitcoin
Bitcoin (BTC) price was $47,219.03 and on July 30, 2022, it fell to $23,797.00, according to data from Coinmarketcap.

On January 1, 2022, the price of Bitcoin (BTC) was $47,219.03 and on July 30, 2022 it fell to $23,797.00, according to data from Coinmarketcap.

Most Attacked Industries: SonicWall researchers noted that while overall cryptojacking incidents were increasing, previously hardest-hit industries like government, healthcare, and education saw cryptojacking attack volumes drop in the first half of the year 2022.

“This represents a long-awaited reprieve for education customers, who have gone from seeing the most cryptojacking of any industry on our list, to seeing the least.”

While cryptojacking cases increased by 269% in the financial sector, the retail sector saw a 63% increase.

]]>
Orange Park man pleads guilty to receiving internet child sexual abuse images | USAO-MDFL https://pjmagic.net/orange-park-man-pleads-guilty-to-receiving-internet-child-sexual-abuse-images-usao-mdfl/ Thu, 28 Jul 2022 18:51:52 +0000 https://pjmagic.net/orange-park-man-pleads-guilty-to-receiving-internet-child-sexual-abuse-images-usao-mdfl/ Jacksonville, Fla. – U.S. Attorney Roger B. Handberg announces that Charles Lelande Boston (32, Orange Park) pleaded guilty today to receiving material on the Internet detailing child sexual abuse. Boston faces a mandatory minimum sentence of 5 years, and up to 20 years, in federal prison. Boston was arrested on August 12, 2021 and remains […]]]>

Jacksonville, Fla. – U.S. Attorney Roger B. Handberg announces that Charles Lelande Boston (32, Orange Park) pleaded guilty today to receiving material on the Internet detailing child sexual abuse. Boston faces a mandatory minimum sentence of 5 years, and up to 20 years, in federal prison. Boston was arrested on August 12, 2021 and remains in custody. A sentencing hearing has not yet been scheduled.

According to the plea agreement, the Clay County Sheriff’s Office (CCSO) conducted an online investigation of a file sharing network for files containing material depicting child sexual abuse. In January, March and April 2021, a CCSO detective logged into a computer that had files describing child sexual abuse available online for sharing. Homeland Security Investigations and CCSO subsequently executed a search warrant at the residence associated with this computer and Boston was determined to be the owner of the computer. An examination of the Boston computer revealed a folder of downloaded files containing approximately 80 files describing child sexual abuse.

This matter was investigated by the Clay County Sheriff’s Office and Homeland Security Investigations. He is being prosecuted by Assistant United States Attorney Ashley Washington.

This is another case brought under Project Safe Childhood, a national initiative launched in May 2006 by the Department of Justice to combat the growing epidemic of child sexual exploitation and abuse. Led by the United States Attorney’s Offices and the Criminal Division’s Child Exploitation and Obscenity Section, Project Safe Childhood brings together federal, state, and local resources to locate, apprehend, and prosecute individuals who exploit child sexual abuse, and to identify and rescue victims. For more information about the Safe Childhood Project, please visit www.justice.gov/psc.

]]>
Trellix Achieves AWS Security Competency Status | New https://pjmagic.net/trellix-achieves-aws-security-competency-status-new/ Tue, 26 Jul 2022 17:02:33 +0000 https://pjmagic.net/trellix-achieves-aws-security-competency-status-new/ SAN JOSE, Calif.–(BUSINESS WIRE)–July 26, 2022– Trellix, the cybersecurity company providing the future of extended detection and response (XDR), today announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Data Protection category. This designation recognizes Trellix’s deep technical expertise and proven success in helping customers improve their security in the […]]]>

SAN JOSE, Calif.–(BUSINESS WIRE)–July 26, 2022–

Trellix, the cybersecurity company providing the future of extended detection and response (XDR), today announced that it has achieved Amazon Web Services (AWS) Security Competency status in the Data Protection category. This designation recognizes Trellix’s deep technical expertise and proven success in helping customers improve their security in the cloud.

Achieving the AWS Security Competency differentiates Trellix as a member of the AWS Partner Network (APN), which provides specialized software services designed to help organizations, from startups and midsize businesses to the largest global enterprises, adopt, develop and deploy complex security projects on AWS. To receive the designation, APN members must possess deep AWS expertise and deliver solutions seamlessly on AWS.

“Trellix is ​​proud to become an AWS Security Competency Partner in the Data Protection Category,” said Aparna Rayasam, Product Manager, Trellix. “Our team has created a solution that identifies and responds to millions of malicious objects and URLs every day. We are excited to offer our detection capabilities to customers to help them achieve their security goals using our detection as a service on AWS.

“Customers trust our detection capabilities and benefit from a software-as-a-service (SaaS)-based solution that can grow with their business,” said Laura Nolan, executive vice president of TeamWorx Security. “With Trellix Detection as a Service, we can scale our Hive IQ platform as we grow, and it’s easier to manage. We don’t have to worry about updates: we know we’re running the latest version of the solution. It is a great value for us.

Trellix Detection as a Service is available on AWS Marketplace where customers can start a free trial immediately. Trellix’s service easily supports over 30 different security and productivity tools, including Amazon Simple Storage Service (Amazon S3) to help identify and prevent malicious files from entering storage.

“AWS plays a vital role in our efforts to drive premium threat detection into any security architecture because it allows our customers to seamlessly try our products and easily purchase them on AWS Marketplace,” said said Britt Norwood, senior vice president, Global Channels & Commercial. at Trellis. “As an AWS Security Competency Partner, we are able to offer our customers detection capabilities when migrating and servicing their workloads on AWS to help them deal with the dynamic threat landscape of ‘today.

About Trellix

Trellix is ​​a global company redefining the future of cybersecurity and moving work. The company’s open, native Extended Detection and Response (XDR) platform helps organizations facing today’s most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with a broad ecosystem of partners, accelerates technology innovation through machine learning and automation to enable more than 40,000 commercial and government customers to live safely. More at https://trellix.com.

See the source version on businesswire.com: https://www.businesswire.com/news/home/20220726005434/en/

CONTACT: Lisa Daly

media@trellix.com

KEYWORD: UNITED STATES NORTH AMERICA CALIFORNIA

INDUSTRY KEYWORD: INTERNET SECURITY DATA MANAGEMENT TECHNOLOGY SOFTWARE

SOURCE: Trellis

Copyright BusinessWire 2022.

PUBLISHED: 07/26/2022 1:00 PM / DISK: 07/26/2022 1:02 PM

http://www.businesswire.com/news/home/20220726005434/en

Copyright BusinessWire 2022.

]]>
Internet Security Basics, Part 6: Encryption, the Ultimate Protection | New https://pjmagic.net/internet-security-basics-part-6-encryption-the-ultimate-protection-new/ Sun, 24 Jul 2022 12:00:00 +0000 https://pjmagic.net/internet-security-basics-part-6-encryption-the-ultimate-protection-new/ Whether it’s financial and medical information stored on your computer or private data sent over the Internet in an email, encryption turns your personal information into a secret code that can only be unlocked if you have the key. . Don’t be put off by the unfamiliar terminology that may be involved. Use of encryption […]]]>

Whether it’s financial and medical information stored on your computer or private data sent over the Internet in an email, encryption turns your personal information into a secret code that can only be unlocked if you have the key. .

Don’t be put off by the unfamiliar terminology that may be involved. Use of encryption does not require a James Bond University degree or CIA clearance.

Many modern encryption products are so easy to use that, yes, even cave dwellers can use them.

When securing your data, there are two main areas where encryption should be used, called “data at rest” and “data in motion”.

“Data at rest” is information that is simply stored on hard drives, USB drives, etc. “Data in motion” is information that moves between devices, for example over a network or the Internet.

There are many good products that will encrypt data at rest and most of them work on the same set of principles, which are similar to installing a wall safe in your home.

The first step is to create an encrypted folder or “container”; it’s your safe. Then you give the folder a password or “encryption key;” it is the combination of your safe.

Finally, you put the items you want to protect in your vault, i.e. your encrypted folder.

Therefore, anyone wishing to access these files that you have protected will need to know your special encryption key, which you will of course keep secret. It’s that simple.

Although Windows PCs and Apple Macs may have built-in encryption features, they are often too restrictive in their hardware requirements and ease of use for many people, so I recommend third-party encryption products.

A product I like for data at rest is called Cryptainer LE, which can be found at cypherix.com/cryptainerle. Aimed at Windows users, Cryptainer LE, perfect for home users, is the free version of Cypherix’s more industrial encryption products and is easy to use.

Like most encryption products, Cryptainer LE will also let you protect files on removable flash drives, portable hard drives, and even CDs. Professionals will probably want to opt for the more powerful products from Cypherix which, starting at $30, are a bargain.

Mac (and Windows) users should check out Veracrypt at www.veracrypt.fr. Although Truecrypt is not as easy to use as Cryptainer, it is also not very difficult to use.

This is a very strong encryption and is an excellent choice for PC and Mac users. It is one of the few free encryption options approved for use by employees of many large companies.

Data in motion also needs attention, especially emails. Let’s face it, though, most emails sent by most email users don’t need strong encryption.

But when it does, the easiest way to deploy encrypted email has to come from a company in Switzerland called ProtonMail (protonmail.com).

All you need to do is create an account, get an email address and start using it. There are free accounts for personal use and paid accounts, starting at 4 euros per month (about US$4.08) for businesses.

Books can be (and have been) written about file encryption, and there are many encryption methods available; too many to mention here.

That should be enough to get you started and thinking about the topic though. For highly entertaining, informative, and educational reads on the subject, check out Steven Levy’s book “Crypto.”

Home users will want to protect their important QuickBooks and TurboTax files, as well as their financial and medical information.

Many businesses, such as those in the legal, financial and healthcare sectors, are now required by law to exercise due diligence in protecting sensitive personal and private information; encryption is how it’s done.

While I wouldn’t recommend storing anything on your phone that would require encryption-level protection, for people who just can’t seem to control themselves, you’ll want to enable encryption on your phone.

On iPhones, be sure to use at least a six-digit PIN; check the settings, FaceID and passcode, and make sure it says “Data protection is on” at the bottom. Android users, see Settings — Security — Encrypt device.

]]>
St. Marys, Ont. grappling with cyberattack as ransomware group threatens to release stolen data https://pjmagic.net/st-marys-ont-grappling-with-cyberattack-as-ransomware-group-threatens-to-release-stolen-data/ Fri, 22 Jul 2022 23:24:47 +0000 https://pjmagic.net/st-marys-ont-grappling-with-cyberattack-as-ransomware-group-threatens-to-release-stolen-data/ As the city of St. Marys, Ont., faced the aftermath of a cybersecurity incident Friday that locked down and encrypted its internal server, a notorious ransomware group threatened to release a tape of data allegedly belonging to the city. on the dark web. St. Marys officials first became aware of the attack around 11 a.m. […]]]>

As the city of St. Marys, Ont., faced the aftermath of a cybersecurity incident Friday that locked down and encrypted its internal server, a notorious ransomware group threatened to release a tape of data allegedly belonging to the city. on the dark web.

St. Marys officials first became aware of the attack around 11 a.m. Wednesday, prompting staff to lock down the city’s computer systems and isolate its network to prevent further damage, Mayor Al Strathdee said. .

“Since that time, we realized it was a malware attack. There was a message asking for a ransom,” he said.

“We have engaged a team of experts to help us through this and secure our network and we have been able to resume some operations. We also have the support of the Ontario Provincial Police and legal counsel who are guiding us through the instructions.

The story continues under the ad

Read more:

June 28: Canada’s electronic spy agency leads a “long-term” campaign against cybercriminals

Stratford Police and the Canadian Center for Cyber ​​Security (CCCS) have been notified of the incident, and city departments such as fire, police, transit, water and sewer systems have not been contacted. untouched and working as usual.

“We have the option to use email again to communicate, so that our operations from the outside, other than some access to certain files, seem normal. We are on the verge of being able to resume almost all operations” , Strathdee said.

In a news release on Friday, the city said “cyber incident response experts” were working with St. Marys to determine the source of the incident, back up data and assess any impact to its information.

“These experts are also assisting staff in their efforts to fully unlock and decrypt city systems, a process that could take days,” the statement said.

LockBit ransomware group involved

St. Marys spokesperson Brett O’Reilly confirmed to Global News that the incident was the result of the notorious LockBit ransomware group, which has been active since late 2019.

The group alleged on its dark web portal on Friday that it stole 67 gigabytes of data belonging to St. Marys, including confidential data and financial documents.

The story continues under the ad

A countdown clock on the post said the city had until the afternoon of July 30 to pay the ransom or the data would be released, a tactic known as double extortion.

Four screenshots are included in the message. Two claim to show sets of file trees and two claim to be documents taken during the breach. Global News has not independently verified their authenticity and does not publish the images.

A screenshot of LockBit’s dark web portal on Friday showing an active countdown to the July 30 deadline.

No ransom amount was listed on LockBit’s page, and Mayor Strathdee declined to say how much the group was being asked for. In ransomware cases, payment is often requested in the form of digital currency like Bitcoin.

To date, the municipality has not paid the ransom, he said. “We will act on our legal advice. Additionally, we are in contact with the Ontario Provincial Police and expect to follow their advice and we will follow legal advice at all stages.

The story continues under the ad

CCCS notes that paying a ransom does not guarantee access to encrypted data, or that stolen data will be deleted by the ransomware group.

“Ultimately, the decision to pay the ransom rests with your organization, but it’s important that your organization is fully aware of the risks associated with paying the ransom,” says an unclassified “ransomware playbook” published by the agency last year.

“For example, threat actors can use erasure malware, which permanently alters or deletes your files after you pay the ransom. The payment can also be used to fund and support other illicit activities.


Click to play the video:







Federal government introduces law requiring companies to report ransomware attacks or face penalties


Federal government introduces law requiring companies to report ransomware attacks or face penalties – June 14, 2022

The LockBit ransomware group operates on a ransomware-as-a-service model, which means the people carrying out the attacks aren’t necessarily the ones who created the ransomware, said island-based threat analyst Brett Callow. of Vancouver for cybersecurity firm Emsisoft.

The story continues under the ad

“They effectively rent the ransomware and share some of the profits with the people who created it. The people carrying out the attacks can and do work with multiple ransomware operations,” he said.

“They attempt to encrypt their target’s network and they also steal data, so even if the target is able to restore their system from backups, there remains the problem of what to do with the stolen data.”

It is not clear if the town was targeted for any particular reason. The majority of ransomware attacks are carried out randomly via malicious links in phishing emails, compromised credentials, or unpatched vulnerabilities on internet-connected networks.

Read more:

June 16: Ottawa’s cybersecurity bill has ‘good bones’ – but privacy rules need to be changed, experts say

Callow described the LockBit ransomware group as “prolific” and very active, having carried out a “significant number” of attacks in the last seven months alone against several public sector institutions south of the border.

“University of Detroit Mercy, National College University, Mercyhurst University in Pennsylvania, Val Verde Regional Medical Center in Texas,” Callow listed.

“The city of Plainview in Minnesota, Hercules in California, the Brownsville Public Utilities Board in March, Gordon County in Georgia in March, the city of Colona in Illinois. Public sector attacks by LockBit are very, very common.

The story continues under the ad

Emsisoft estimated last year that there had been more than 39,000 incidents involving LockBit since it first appeared in 2019, a figure that has only grown. In a blog post, the company said the target group “organizations of all sizes, from small businesses to large enterprises.”

“Industries most affected by LockBit include software and services, business and professional services, transportation, manufacturing, and consumer services,” the post reads.

The incident follows a cyberattack in Elgin County

The St. Marys ransomware attack is the second cyberattack in the immediate London area in recent months involving a local government body.

In late March, Elgin County was hit by a cybersecurity incident that left its website and email services offline throughout April.

Global News first reported in late April that data claiming to belong to the county had been published on the dark web portal of notorious Russian ransomware group Conti.

In May, county officials confirmed that thousands of county files, some containing highly sensitive personal information about 33 people, had been posted on the dark web.

The cause of the cybersecurity incident was not made public at the time, but county administrative manager Julie Gonyou said it was not, to their knowledge, an attack by ransomware.

The story continues under the ad

Conti ended his operations in June after sensitive chat logs that appeared to belong to the gang were leaked online, some of which appeared to show links between him and the Russian government.

Early in the invasion of Ukraine, some Conti members had pledged on the group’s dark web portal to “use all our resources possible to retaliate against an enemy’s critical infrastructure” if Russia were attacked.

Callow says that since the shutdown, Conti members have likely launched other ransomware operations and are still heavily involved in cybercrime, just under different names.

Read more:

Sensitive personal data among thousands of files exposed in Elgin cybersecurity incident: Gonyou

According to the Communications Security Establishment (CSE), Canada’s electronic intelligence agency, ransomware is a growing threat to Canadian individuals and institutions.

Last month, the agency’s deputy chief said in CSE’s annual report that the ransomware threat would be a “long-term problem, and something that’s going to affect Canadians for some time.”

In 2021, the agency reported that it was aware of 235 ransomware attacks in Canada between January and November of that year, half of which targeted critical infrastructure providers.

“I take it this is the new reality and it’s difficult for all of us, including municipalities large and small,” Strathdee said.

The story continues under the ad

“We have been informed that more than half of the municipalities in Ontario – there are 444 municipalities in Ontario – have experienced cyber incidents. So it’s something we all face.

— with files from The Canadian Press and Alex Boutilier of Global News


Click to play the video:







Ex-officials warn Canada unprepared for national security threats


Ex-officials warn Canada is unprepared for national security threats – May 24, 2022

© 2022 Global News, a division of Corus Entertainment Inc.

]]>
Pavan Duggal on India’s Strategy on VPNs and Cyber ​​Laws Enough? https://pjmagic.net/pavan-duggal-on-indias-strategy-on-vpns-and-cyber-laws-enough/ Thu, 21 Jul 2022 03:33:01 +0000 https://pjmagic.net/pavan-duggal-on-indias-strategy-on-vpns-and-cyber-laws-enough/ With cryptocurrency raising the bar for cyber fraud, the government seems to have taken cyber security quite seriously. It rolled out new virtual private network (VPN) rules. VPN is an online service, supposed to provide its users with more security while connected to the internet. In a conversation with FE Digital Currency, Pavan Duggal, Supreme […]]]>

With cryptocurrency raising the bar for cyber fraud, the government seems to have taken cyber security quite seriously. It rolled out new virtual private network (VPN) rules. VPN is an online service, supposed to provide its users with more security while connected to the internet. In a conversation with FE Digital Currency, Pavan Duggal, Supreme Court Attorney, Founder, Chairman of the International Commission on Cybersecurity Law, talks about the country’s security? (Edited excerpts)

What are the pros and cons of the new VPN rules?

The VPN Act effectively refers to a new set of legal provisions in which India has chosen to regulate service providers. This will make the space more cyber-secure and cyber-resilient. VPN providers have failed to cooperate with governments and law enforcement. Internet users practically provide a gateway to limitless cyber crime activities through VPN service providers. If someone violates the VPN Act, they are committing an offense under Section 70B of the Information Technology (IT) Act. All VPN providers serving consumers in India have been asked to comply with additional regulations by India’s Computer Emergency Response Team (CERT-In).

How can we consider creating a robust mechanism to combat cyber threats?

It is a practical problem that the nation does not have a robust defensive system. India lacks a robust cyber defense mechanism as the center has not prioritized it. Every 11 seconds, a business in the world falls victim to a ransomware attack. The government came up with the “National Cybersecurity Policy 2013”, but the Center was unable to implement it. But, if we compare the development with other nations, we are behind in the race. Countries like China, Singapore, and Australia have not only put in place dedicated cybersecurity laws, but also come up with broad provisions to activate the cybersecurity ecosystem. The center needs a dedicated ecosystem with legal frameworks.

For example, the Information Technology Act was passed in 2000. After 22 years, India managed to weld together said legislation once, in 2008, in a most incomprehensible way. India’s IT law is quite incapable of dealing with large parameters including blockchain, artificial intelligence (AI), quantum computing or even social media.

How will the new VPN guidelines impact user privacy?

India still lacks a cyber legal ecosystem to protect its critical legal infrastructure and has failed to provide adequate security to its users. Any breach in the cybersecurity ecosystem could potentially have a detrimental impact on India’s cybersovereignty. The government must actively involve the private sector. Public-private partnerships will help build a strong cyber defense infrastructure.

]]>