Online Security – PJ Magic http://pjmagic.net/ Thu, 23 Sep 2021 06:45:02 +0000 en-US hourly 1 https://wordpress.org/?v=5.8 https://pjmagic.net/wp-content/uploads/2021/06/icon-1-150x150.png Online Security – PJ Magic http://pjmagic.net/ 32 32 Are cybersecurity risks increased by our new work culture? https://pjmagic.net/are-cybersecurity-risks-increased-by-our-new-work-culture/ https://pjmagic.net/are-cybersecurity-risks-increased-by-our-new-work-culture/#respond Thu, 23 Sep 2021 05:05:14 +0000 https://pjmagic.net/are-cybersecurity-risks-increased-by-our-new-work-culture/ Much has been written recently on the cybersecurity risk of remote working; larger attack surfaces, a more informal environment and increased threats were all contributing factors This is an edited version of an article originally appeared on Robert Demi While some people think our work environments are now more vulnerable, others point out that companies […]]]>

Much has been written recently on the cybersecurity risk of remote working; larger attack surfaces, a more informal environment and increased threats were all contributing factors

This is an edited version of an article originally appeared on Robert Demi

While some people think our work environments are now more vulnerable, others point out that companies are improving at preventing attacks. The truth is probably somewhere in the middle, but it’s clear that the inherent cyber risk has increased.

According to an Interpol study in August 2020, “a further increase in cybercrime is very likely in the near future”. The influential law enforcement body also suggested that remote working vulnerabilities would be exploited by cybercriminals. Businesses are responding quickly to this perceived threat. A recent survey of Robert Demi revealed that 44% of CTOs believe “maintaining IT security” and “protecting company information” will be a priority in the first half of 2021.

This rapidly changing situation presents challenges for everyone. On the one hand, security officials are able to tackle these issues with a growing list of technologies at their disposal, but on the other hand, the threats they face are evolving and changing all the time. This means that it is increasingly difficult for them to understand how well their businesses are protected; filling in the gaps and fighting fires will not get them far.

Facilitate understanding of cybersecurity

The key to helping everyone move forward is to phrase these challenges in language that makes sense to business leaders, not just tech professionals. The industry is very good at talking about cybersecurity in terms of products and solutions, but assessing risk through the eyes of people or, more specifically, ‘threat actor characters’, can help everyone understand better. risks in a more human-centered way. .

Internally, it is common for well-meaning users to bypass controls in order to be able to do their jobs; for example, if someone wants to send a large document to a client, they will likely find a file transfer service to do the job, but it might not be secure. In addition, opportunistic insiders are sometimes too happy to undermine security, but are not so criminal that they would bypass established controls. In situations where these controls are missing, however, they will see a green light. An opportunistic insider wouldn’t take ten pounds out of someone’s wallet, but he could keep the money if he was lying on the sidewalk.

External threat actors range from the more sophisticated, such as organized crime syndicates, to the unsophisticated, who use well understood but easily detectable methods. Most managers expect to be attacked by sophisticated attacks because they are highly coordinated and more difficult to protect, but lower-level phishing scams and malicious URLs can also create a lot of noise for businesses if they are not. not processed quickly.

Our experience shows that businessmen, the real owners of risk, engage much better with these personas than technical executives, like the “kill chain”. Once these players are understood, defining risk scenarios and acting on them becomes much easier.

From understanding to action

At this point, a company’s risk assessment becomes a framework to help it move forward; by discovering and defining the problems, it is possible to develop and provide the right solutions. This could include providing new technology to help remove noise from external threats, but it could also include new controls that also help change the behavior of people within companies.

Once business leaders understand how threat actors work and how they impact real issues like confidentiality, integrity, availability, and confidentiality, it’s easier to think about security differently. When they explore these challenges in different teams, it can be engaging and productive for everyone; it also means that the case for change is made with the whole business in mind.

As businesses navigate the changing cybersecurity landscape, it’s important for them to frame their challenges in language business leaders can understand. Threatening actor characters and storylines shatter the perception of security as a specialist subject and build team buy-in. Business leaders can bring in people to help them do this and work with security professionals to help transfer the knowledge and improve the skills of others, creating an opportunity for shared understanding and mutual understanding. greater awareness in the future.

In a world where cybersecurity threats evolve rapidly and professionals are in high demand, this people-centered approach is helping more people understand the risks businesses face – and ultimately enables them to move forward together.

Don’t forget to follow us on
Twitter
like us on Facebook or connect with us on LinkedIn!

]]>
https://pjmagic.net/are-cybersecurity-risks-increased-by-our-new-work-culture/feed/ 0
The digital essential for individuals https://pjmagic.net/the-digital-essential-for-individuals/ https://pjmagic.net/the-digital-essential-for-individuals/#respond Wed, 22 Sep 2021 14:00:00 +0000 https://pjmagic.net/the-digital-essential-for-individuals/ Digital advancements have reinvented the way most of us work, organize our lives, and communicate with our friends. As individuals, we are more dependent on data than at any time in history, which means protecting the data, applications and systems we rely on is a major concern. The potential for data loss, corruption, theft and […]]]>

Digital advancements have reinvented the way most of us work, organize our lives, and communicate with our friends. As individuals, we are more dependent on data than at any time in history, which means protecting the data, applications and systems we rely on is a major concern.

The potential for data loss, corruption, theft and manipulation has never been greater:

  • Over 450,000 new malware samples are identified every day, as cybercriminals use advanced technologies like automation to increase the frequency and ferocity of their attacks.
  • Data volumes double every two years, increasing the complexity of accessing and storing data.
  • The costs and complexities associated with protecting and storing data make traditional backup and cybersecurity solutions obsolete.

A new holistic approach is needed, one specifically designed to respond to these realities. This is where the emerging field of cyber protection comes in.

Overcome today’s threats with cyber protection

Comprehensive cyber protection addresses these challenges by unifying backup and cybersecurity capabilities into one. Initiated by Acronis, this unique approach is designed to address the IT protection challenges we all face today.

Security: Make sure that a reliable copy of your data is always available

Accessibility: Make your data easily accessible from anywhere, anytime

Privacy: Control who has visibility and access to your data

Authenticity: Have undeniable proof that a copy of your data is an exact replica of the original

Security: Protect your data, applications and systems against malicious threats

The challenge is to balance these five vectors of cyber protection, which can often compete with each other. Locking a hard drive inside a safe, for example, guarantees data security and confidentiality, but makes the data inaccessible and therefore useless from a practical point of view.

Balancing competing needs

There are serious drawbacks to using multiple solutions, each designed to cover a particular vector. No matter how good an individual tool is, DIYing a patchwork of them creates gaps in your defenses. It’s easy to miss an alert or recommendation if you need to switch between dashboards.

Integrated solutions, on the other hand, balance these competing priorities without creating dangerous security holes. A single solution like Acronis Cyber ​​Protect Home Office (formerly Acronis True Image) simplifies data protection and cybersecurity management, since everything is managed through a unified dashboard.

Acronis Cyber ​​Protect Home Office
Acronis Cyber ​​Protect Home Office

Integration also lowers the total cost of protection. Instead of buying two or three different solutions and learning how to use them all, you only need one.

More importantly, since backup and cybersecurity capabilities are designed to work together from the start, a true cyber protection solution can do things that stand-alone solutions cannot, such as automatically restoring corrupted files during recovery. a ransomware attack.

Final thought

Whether at home or on the go, the modern world demands that we pay more attention to protecting our data and devices. Given the shortcomings of traditional approaches, adopting cyber protection strategies and solutions ensures security against the ever-evolving cyber attacks that threaten us now and in the future.

]]>
https://pjmagic.net/the-digital-essential-for-individuals/feed/ 0
World Class Cyber ​​Protection Available to Rocky Linux Users | https://pjmagic.net/world-class-cyber-%e2%80%8b%e2%80%8bprotection-available-to-rocky-linux-users/ https://pjmagic.net/world-class-cyber-%e2%80%8b%e2%80%8bprotection-available-to-rocky-linux-users/#respond Tue, 21 Sep 2021 18:36:00 +0000 https://pjmagic.net/world-class-cyber-%e2%80%8b%e2%80%8bprotection-available-to-rocky-linux-users/ MCLEAN, Virginia, September 21, 2021 / PRNewswire / – RunSafe Safety, in partnership with CIQ, now provides the most advanced cybersecurity protection tools available to Rocky Linux users. RunSafe Security’s patented Alkemist technology gives users the tools to defeat cyber attacks using cyber hardening technologies and is now integrated into CIQ’s platform, developed to offer […]]]>

MCLEAN, Virginia, September 21, 2021 / PRNewswire / – RunSafe Safety, in partnership with CIQ, now provides the most advanced cybersecurity protection tools available to Rocky Linux users. RunSafe Security’s patented Alkemist technology gives users the tools to defeat cyber attacks using cyber hardening technologies and is now integrated into CIQ’s platform, developed to offer dedicated support options to businesses and organizations using Rocky Linux.

“RunSafe’s partnership with CIQ provides Rocky Linux users with high protection against vulnerabilities, as our Alkemist software was created specifically to protect open source users,” said Joseph saunders, CEO of RunSafe. “It is the only automated cyber hardening tool that protects open source, internally developed code and third-party binaries, while leaving each system functionally identical and logically unique.

RunSafe is now integrated with the Rocky Linux operating system and can be deployed remotely, using patented Runtime Application Self-Protection (RASP) and Moving Target Defense (MTD) techniques for a complete cyber defense transformation. Rocky Linux’s cyber hardening with RunSafe’s Alkemist platform prevents bad actors from taking control of software, prevents existing vulnerabilities from spreading to multiple devices, and keeps developers focused on what they do best: developing new software.

“The Rocky Linux community deserves built-in, world-class protections, so developers and operators can focus on new features and avoid downtime,” said Greg kurtzer, CEO and founder of CIQ. “Our customers will benefit from the ultimate supply chain protection, as easily as downloading protected packages and ISOs from our distribution. It will be a game-changer for our customers in the future.”

The CIQ and RunSafe partnership will make RunSafe Alkemist: Code technology readily available to Rocky Linux users, helping to prevent attackers from gaining control of their software. This virtually unbreakable code integrates seamlessly into the “build” stage of the pipeline without slowing the development cycle or slowing down execution speeds. This is the first step in leaving attackers with nowhere to hide.

RunSafe’s Alkemist program also offers two other technologies to strengthen software protection efforts:

  • Alkemist: Flare. Current scanning technology misses 50% of vulnerabilities, and runtime application monitoring technology misses precise indicators of hidden threats. This leaves software vulnerable to unexpected attacks and downtime. Alkemist: Flare continuously monitors the health of the system while running. It provides indicators of stability, reliability and vulnerability while instantly reporting failures and potential attacks.
  • Alkemist: Repo. This technology allows users to download pre-hardened open source packages where security protections are already applied. Alkemist: Repo facilitates patching and updating processes and protects open source software even when a patch or patch is not available.

About the CIQ

CIQ started with the goal of empowering people and communities on the basis of a single but important principle: people matter. We know what it’s like to build networks from scratch – we’re programmers and engineers too. So we understand what is needed to provide smart support with enterprise software that empowers people to do great things. CIQ has already been favorably rated by Forbes, TechRepublic, TechRadar and ZDNet; while Rocky Linux is fully supported and backed by some of the world’s biggest retail and tech titans including Amazon, Google, and Microsoft. Learn more about CIQ at: https://ctrliq.com/.

About RunSafe Security, Inc.

Situated at McLean, Virginia, RunSafe Security’s mission is to immunize software from cyberattacks and disrupt the hacker economy without friction of developers. RunSafe’s patented technology inoculates customer systems against a whole class of cyberattacks by stopping the infection at its source. RunSafe Security’s clients span critical infrastructure, IIoT, automotive, medical, DevSecOps, cloud workloads, and national security use cases. Learn more about: https://runsafesecurity.com/.

Media contact: Staci Cretu

RunSafe Security, Inc.

717-219-8284

[email protected]

View original content to download multimedia: https://www.prnewswire.com/news-releases/world-class-cyber-protection-available-for-rocky-linux-users-301381908.html

SOURCE RunSafe Safety

]]>
https://pjmagic.net/world-class-cyber-%e2%80%8b%e2%80%8bprotection-available-to-rocky-linux-users/feed/ 0
Safety and security are most important when shopping online – Tech Wire Asia https://pjmagic.net/safety-and-security-are-most-important-when-shopping-online-tech-wire-asia/ https://pjmagic.net/safety-and-security-are-most-important-when-shopping-online-tech-wire-asia/#respond Tue, 21 Sep 2021 04:52:30 +0000 https://pjmagic.net/safety-and-security-are-most-important-when-shopping-online-tech-wire-asia/ Shopping online – a necessity for most during this pandemic, a hobby for many. But what do customers really appreciate when it comes to shopping online? Booming e-commerce and m-commerce (mobile commerce) markets, such as Singapore, Indonesia, and the Philippines, are seeing huge increases in online sales. However, a survey by fraud prevention provider Vesta […]]]>

Shopping online – a necessity for most during this pandemic, a hobby for many. But what do customers really appreciate when it comes to shopping online?

Booming e-commerce and m-commerce (mobile commerce) markets, such as Singapore, Indonesia, and the Philippines, are seeing huge increases in online sales.

However, a survey by fraud prevention provider Vesta found that merchants and customers are increasingly vulnerable to false denials, fraud and bad payment experiences.

“Our investigation found that safety and security remains a top concern for online shoppers and merchants tacitly expect them to put the right solutions in place,” said Shabab Muhaddes, Vesta, Managing Director, Asia Pacific.

“Not surprisingly, buyers also see multiple verification and authentication issues as a major payment issue. Overall, the results of this survey indicate a clear and urgent need for sophisticated solutions that provide better protection against fraud, generate higher approvals while enabling a seamless consumer payment experience, ”added Muhaddes.

Buying online is only a pleasure when the payment experience is smooth

The Vesta Online Payment Sentiments survey found that almost half (47%) of those surveyed had experienced payment issues in the past 12 months.

Regardless of payment methods, multiple verification and authentication is a major payment problem encountered by one in three respondents (33%); followed by refusals of payment without a valid reason, experienced by one in five online shoppers (22%) surveyed.

Payment frictions can frustrate customers who already buy from multiple brands – and they won’t hesitate to buy from another site that provides a smoother online shopping experience.

Additionally, when businesses show that they can deliver data safety, privacy, security, and ethics with their online programs or devices, consumers will have great digital trust in that brand or business.

Digital trust is important because it separates the wheat from the chaff – that is, reliable services from corrupt or unreliable services.

Almost six in 10 online shoppers (57%) in all three countries would stop shopping from the e-commerce site if they encountered a problem with a purchase.

Over half (54%) of those who encountered a payment issue while shopping online would also notify their family or friends of the merchant or e-commerce site, leading to further potential loss of income for the merchant.

With an increasingly tech savvy population where people seek security in positive reviews, the survey also found that 69% of online shoppers rely on reviews from previous buyers to determine if a site is safe to buy. .

This highlights the impact that a negative payment experience can have on the merchant’s business in a competitive e-commerce industry.

Urgent need for mobile-centric protection must be addressed

Southeast Asia is the fastest growing mobile wallet market in the world, with Indonesia and the Philippines poised to experience continued growth in mobile payments over the next five years.

Six in 10 (60%) of those surveyed in these two countries indicated that they preferred to pay with e-wallets, which is attributed to a large unbanked population and low credit card penetration.

However, among those who have encountered payment problems with e-wallets in the past 12 months, one in 10 (11%) of the two countries has faced a payment refusal without a valid reason, which has loss of income for traders.

While the latest security practices have pointed to MFA (Multi-Factor Authentication) to improve security, ironically, this has been identified as a major issue among online shoppers. One in five (20%) experienced payment issues because of multiple checks and authentications.

Balancing identity verification and the frictionless shopping experience is key

Notably, three in five (57%) online shoppers in Indonesia share retail accounts with friends or family, putting them at higher risk of fraud methods, such as account takeover. .

This is of concern given that Indonesia is the largest e-commerce market in Southeast Asia, estimated at US $ 83 billion in 2025.

In Southeast Asia alone, one in three people was a victim of online fraud last year, 71% of whom were victims of identity theft; 66% of phishing activity and 63% of account fraud.

Fighting fraud is complex and expensive, which is why it is crucial for e-commerce merchants to use sophisticated solutions backed by machine learning to provide protection against fraudulent cases. As such, it would be important for merchants to adopt a payment platform that addresses these issues for a smoother customer payment experience.





]]>
https://pjmagic.net/safety-and-security-are-most-important-when-shopping-online-tech-wire-asia/feed/ 0
How Tech Companies Can Boost Cyber ​​Defenses: Creating a Culture of Cyber ​​Security https://pjmagic.net/how-tech-companies-can-boost-cyber-%e2%80%8b%e2%80%8bdefenses-creating-a-culture-of-cyber-%e2%80%8b%e2%80%8bsecurity/ https://pjmagic.net/how-tech-companies-can-boost-cyber-%e2%80%8b%e2%80%8bdefenses-creating-a-culture-of-cyber-%e2%80%8b%e2%80%8bsecurity/#respond Mon, 20 Sep 2021 16:57:57 +0000 https://pjmagic.net/how-tech-companies-can-boost-cyber-%e2%80%8b%e2%80%8bdefenses-creating-a-culture-of-cyber-%e2%80%8b%e2%80%8bsecurity/ Today’s accelerated pace of digital transformation offers companies significant opportunities for growth and creation of shareholder value. At the same time, the rise of connected businesses, remote workforce, and digital payments, among others, has increased the risk of cyber attacks, ransomware, and malware attacks. For tech companies that are at the peak of this accelerating […]]]>

Today’s accelerated pace of digital transformation offers companies significant opportunities for growth and creation of shareholder value. At the same time, the rise of connected businesses, remote workforce, and digital payments, among others, has increased the risk of cyber attacks, ransomware, and malware attacks.

For tech companies that are at the peak of this accelerating pace of change, cybersecurity is increasingly becoming a top priority. According to the outlook from the CEO of KPMG 2021:

  • 31% of global tech CEOs see cybersecurity as the biggest threat to their organization’s growth over the next three years
  • 39% indicated cybersecurity resilience as their top operational priority
  • Yet only 19% say they are very well prepared for a future cyberattack

No matter how prepared a business is to deal with cyber risk, this is an area that requires continued investment and vigilance. Below are three ways to further increase cyber defenses.

Work together

In today’s increasingly interconnected environment, it is clear that businesses can no longer go it alone. In fact, 81% of tech CEOs surveyed believe it will take an industry-wide approach to properly address the ransomware problem.

Recently, that was validated when executives from America’s biggest tech companies joined with members of the Biden administration to discuss ways to collectively strengthen our nation’s cybersecurity. Together, the companies have pledged more than $ 31 billion for this effort, including 250,000 new jobs.

Think differently about talent

Competition for talent in high-demand fields like cybersecurity and artificial intelligence is fierce, but tech companies can already have a head start. Leaders of these organizations should seek out professionals with the right skills within their walls and retrain or develop existing workers to cope with the evolving security ecosystem.

Alternatively, technology leaders who are not already capitalizing on the industry’s trending M&A market should consider whether a strategic acquisition that would quickly add cyber talent to the organization is viable.

Building a cyber-first culture

It is no longer enough to have the right security protocols in place from a technological point of view; It is more important than ever to strengthen governance around operational resilience, enabling businesses to recover from any incident. The establishment of a strong culture of digital and cyber risk, championed by senior executives, with shared responsibility between employees, is also crucial.

In the face of escalating cyberattacks, ransomware and other attacks, business leaders must take continuous action to defend their organizations against bad actors whose methods are constantly evolving. To continue to meet the needs of customers, employees, vendors, and society, cybersecurity is clearly a priority for CEOs of tech companies. Those who stay permanently focused on this area will build confidence and create a competitive advantage.

About the authors:

Mark Gibson, Head of Technology, Media and Telecommunications at KPMG in the United States

Alex Holt, KPMG Global Head of Technology, Media and Telecommunications

]]>
https://pjmagic.net/how-tech-companies-can-boost-cyber-%e2%80%8b%e2%80%8bdefenses-creating-a-culture-of-cyber-%e2%80%8b%e2%80%8bsecurity/feed/ 0
Boris Johnson “too relaxed” on national security, says joint committee https://pjmagic.net/boris-johnson-too-relaxed-on-national-security-says-joint-committee/ https://pjmagic.net/boris-johnson-too-relaxed-on-national-security-says-joint-committee/#respond Sat, 18 Sep 2021 23:01:00 +0000 https://pjmagic.net/boris-johnson-too-relaxed-on-national-security-says-joint-committee/ Boris Johnson has been accused of taking a ‘more relaxed’ approach to British national security, with MPs warning the Whitehall machine was unable to cope with more than one major crisis at a time. The Joint Committee on National Security Strategy – made up of high-ranking MPs and peers – said the fall of Afghanistan […]]]>

Boris Johnson has been accused of taking a ‘more relaxed’ approach to British national security, with MPs warning the Whitehall machine was unable to cope with more than one major crisis at a time.

The Joint Committee on National Security Strategy – made up of high-ranking MPs and peers – said the fall of Afghanistan had shown that the current system was “unsuited to the task.”

However, he said reforms to the National Security Council (NSC) meant the prime minister would cut by about two-thirds the time he spent leading meetings.

In a very critical report, the commission said that the lack of preparation for the withdrawal of international forces from Afghanistan could “only be described as a systemic failure”.

The NSC was originally established in 2010 by David Cameron with weekly meetings bringing together senior ministers and defense and intelligence chiefs chaired by the Prime Minister.

However, the committee said that a review by National Security Advisor Sir Stephen Lovegrove of its operation in the future would result in Mr Johnson chairing only around half of its meetings.

“More worryingly, the new model of the NSC risks becoming a halfway house: it is not a slower-paced forum to address the most fundamental issues facing UK national security,” nor a weekly meeting of senior ministers – convened and negotiated by the prime minister. – to tackle the most pressing problems, ”the report says.

“It is the Prime Minister’s personal investment of time and authority that gives credibility to the NSC and its intergovernmental structures.

“Yet under the new system, the Prime Minister will spend around 65% less time in NSC meetings than under the previous practice of weekly meetings when Parliament is in session.

“In our initial assessment, therefore, this is a retrograde step that suggests a more relaxed approach to national security.”

When the Covid crisis erupted, its structures were quickly abandoned in favor of “ad hoc and improvisational arrangements” – a decision the committee called a “serious mistake”.

He said that when the Afghan crisis erupted over the summer, it showed the government was “unable to prepare for and respond to two national security crises simultaneously”.

With an expert witness warning a one in six chance of an “existential catastrophe” over the next 100 years – from extreme climate change scenarios to nuclear conflict – the committee said there was an urgent need for reform.

The chairman of the committee, former Foreign Minister Dame Margaret Beckett, said: “The interest of the National Security Council is that it is supposed to prepare and act according to a long-term view of our risks. for national security. He should be above the hustle and bustle of daily concerns.

“But when two events – the Covid-19 pandemic and Afghanistan – once again demonstrated what a dangerous world we live in now, the weaknesses in the structures of the National Security Council were exposed.

“I pay tribute to the medical and military personnel and government officials who have worked so hard to respond to these two most recent crises.

“But their courageous efforts cannot mask the fundamental need for the center of government to master national security planning. “

A government spokesperson said the national security mechanism was being strengthened following the government’s integrated foreign and defense policy review earlier this year.

For more stories of where you live, visit InYourZone.

]]>
https://pjmagic.net/boris-johnson-too-relaxed-on-national-security-says-joint-committee/feed/ 0
Indonesia’s most wanted activist killed in jungle shootout: NPR https://pjmagic.net/indonesias-most-wanted-activist-killed-in-jungle-shootout-npr/ https://pjmagic.net/indonesias-most-wanted-activist-killed-in-jungle-shootout-npr/#respond Sat, 18 Sep 2021 16:20:26 +0000 https://pjmagic.net/indonesias-most-wanted-activist-killed-in-jungle-shootout-npr/ PALU, Indonesia – Indonesia’s most wanted activist linked to the Islamic State group was killed on Saturday in a shootout with security forces, the Indonesian military said, as part of a massive counterterrorism campaign against extremists in the remote mountain jungles. Ali Kalora was one of two militants killed in the raid, the Central Sulawesi […]]]>

PALU, Indonesia – Indonesia’s most wanted activist linked to the Islamic State group was killed on Saturday in a shootout with security forces, the Indonesian military said, as part of a massive counterterrorism campaign against extremists in the remote mountain jungles.

Ali Kalora was one of two militants killed in the raid, the Central Sulawesi regional military leader, the brigadier, said. General Farid Makruf. He identified the other alleged extremist as Jaka Ramadan.

The two men were shot dead on Saturday evening by a joint team of military and police in the mountainous Parigi Moutong district of central Sulawesi province, Makruf said. It borders the district of Poso, considered an extremist hotbed in the province.

“Ali Kalora was the most wanted terrorist and the head of MIT,” Makruf said, referring to the Indonesian acronym for the East Indonesia Mujahideen Network, a militant group that pledged allegiance to the Islamic State in 2014.

He said security forces were looking for four other suspected members of the group.

Saturday’s shooting came two months after security forces killed two suspected members of the group in a pre-dawn raid in the same mountainous district.

The Mujahedin in eastern Indonesia have claimed responsibility for several killings of police officers and minority Christians.

Security operations in the area have intensified in recent months in an attempt to capture members of the network, targeting Ali Kalora, the group’s leader.

Dozens of activists have been killed or captured

Kalora had escaped capture for over a decade. He succeeded Abu Wardah Santoso, who was killed by security forces in July 2016. Dozens of other leaders and members of the group have been killed or captured since then.

In May, militants killed four Christians in a village in Poso district, one of whom was beheaded. Authorities said the attack was revenge for the March murder of two activists, including Santoso’s son.

Makruf said the rugged terrain and darkness hampered efforts to evacuate the two bodies from the shooting scene in the wooded village of Astina. He said the bodies of Kalora and her disciple will be transported by helicopter on Sunday morning for further investigation and identification.

Indonesia, the world’s most populous Muslim-majority nation, has maintained a crackdown on militants since the 2002 bombings on the tourist island of Bali killed 202 people, most of them foreigners.

Militant attacks on foreigners in Indonesia have largely been replaced in recent years by smaller, less deadly strikes targeting the government, primarily the police and counterterrorism forces, and people the militants see as infidels, inspired by the ISIS’s tactics abroad.

]]>
https://pjmagic.net/indonesias-most-wanted-activist-killed-in-jungle-shootout-npr/feed/ 0
Americans support government-backed measures to increase online security https://pjmagic.net/americans-support-government-backed-measures-to-increase-online-security/ https://pjmagic.net/americans-support-government-backed-measures-to-increase-online-security/#respond Sat, 18 Sep 2021 13:41:15 +0000 https://pjmagic.net/americans-support-government-backed-measures-to-increase-online-security/ Most Americans don’t believe their personal information is secure online and are unhappy with the federal government’s efforts to protect it, a survey found. The poll by the Associated Press-NORC Center for Public Affairs Research and MeriTalk shows that 64% of Americans say their social media activity is not very or not at all secure. […]]]>

Most Americans don’t believe their personal information is secure online and are unhappy with the federal government’s efforts to protect it, a survey found.

The poll by the Associated Press-NORC Center for Public Affairs Research and MeriTalk shows that 64% of Americans say their social media activity is not very or not at all secure. Just about as many have the same doubts about the security of online information revealing their physical location. Half of Americans believe their private text conversations are insecure.

And they’re not just concerned. They want something to be done. Nearly three-quarters of Americans say they support the establishment of national standards for how businesses can collect, process and share personal data.

“What amazes me is that there is a lot of support for more government action to protect data privacy,” said Jennifer Benz, deputy director of the AP-NORC Center. “And that’s bipartisan support.”

But after years of stalled efforts towards tougher data privacy laws that could hold large companies accountable for all the personal data they collect and share, the poll also says Americans have failed. much confidence in the government to fix it.

A majority, 56%, trust the private sector more than the federal government to manage security and privacy improvements, despite years of high-profile privacy scandals and hacks of US companies from Target to Equifax which have exposed the personal information of millions of people around the world.

Indeed, companies like Apple have gone to great lengths to present themselves as listening to and committed to protecting consumers’ privacy preferences.

“I think there is little to no security at all,” said Sarah Blick, professor of medieval art history at Kenyon College in Ohio. The college’s human resources department told Blick earlier this year that someone had fraudulently applied for unemployment insurance benefits on his behalf.

Such fraud has increased since the pandemic, as perpetrators buy stolen personal credentials from the dark web and use them to flood state unemployment systems with bogus claims.

“I think my information was stolen when one of the credit bureaus was hacked, but it could also have been when Target was hacked or one of the many successful hacks at large companies,” Blick said.

About 71% of Americans believe the privacy of individuals’ data should be treated as a national security issue, with a similar level of support among Democrats and Republicans. But only 23% are very or somewhat satisfied with the federal government’s current efforts to protect the privacy of Americans and secure their personal data online.

“This is not a partisan issue,” said Colorado State Representative Terri Carver, a Republican who co-sponsored a consumer data privacy bill signed by Democratic Governor Jared Polis in July. . It takes effect in 2023.

The legislation, which has met opposition from Facebook and other companies, follows similar measures passed in California and Virginia that give people the right to access and delete personal information. Colorado’s also allows people to opt out of having their data tracked, profiled and sold.

“It was definitely one of the pieces where we had the biggest setback, but we felt it was so important,” Carver said. “Individuals are very frustrated that they do not have the tools and the legal support to establish effective control over their personal data.”

Carver said it took several years to get the law through and advocates have had to give up some priorities, such as the idea of ​​allowing people to register if they want to allow the processing of their personal data – instead of forcing them to withdraw. She hopes the efforts of Colorado and other states will push Congress to put in place protections nationwide.

“We need a strong federal data privacy bill,” she said. “It would make sense, given interstate commerce.”

The poll also found broad agreement on how Americans view technology: 81% of Democrats and 78% of Republicans say they see technology as playing a major role in the country’s ability to be competitive at home. global scale. Seventy-nine percent of Democrats and 56% of Republicans see value in the government’s technology investments.

At least 6 in 10 adults are supporting the federal government by taking actions like spending more on technology, expanding broadband Internet access, and strengthening copyright protections to improve the competitiveness of the United States.

There are some generational variations in support for government policies to protect data privacy and security, although majorities across all age groups are in favor. While 85% of adults 40 and over support tougher penalties for cybercriminals, 70% of young adults say the same.

“The undercurrent is that this is an area where people see a direct role in government,” Benz said. “It’s something pretty tangible for people.”

The AP-NORC survey of 1,004 adults was conducted June 24-28 using a sample drawn from the AmeriSpeak probability-based NORC panel, which is designed to be representative of the U.S. population. The margin of sampling error for all respondents is plus or minus 4.3 percentage points.

]]>
https://pjmagic.net/americans-support-government-backed-measures-to-increase-online-security/feed/ 0
Americans have little confidence in online security: AP-NORC poll | https://pjmagic.net/americans-have-little-confidence-in-online-security-ap-norc-poll-2/ https://pjmagic.net/americans-have-little-confidence-in-online-security-ap-norc-poll-2/#respond Sat, 18 Sep 2021 10:15:00 +0000 https://pjmagic.net/americans-have-little-confidence-in-online-security-ap-norc-poll-2/ Most Americans don’t believe their personal information is secure online and are unhappy with the federal government’s efforts to protect it, according to a survey. The poll by the Associated Press-NORC Center for Public Affairs Research and MeriTalk shows that 64% of Americans say their social media activity is not very or not at all […]]]>

Most Americans don’t believe their personal information is secure online and are unhappy with the federal government’s efforts to protect it, according to a survey.

The poll by the Associated Press-NORC Center for Public Affairs Research and MeriTalk shows that 64% of Americans say their social media activity is not very or not at all secure. Just about as many have the same doubts about the security of online information revealing their physical location. Half of Americans believe their private text conversations are insecure.

How secure is your personal information online?

A recent survey shows that 64% of Americans say their social media activity is not very or not at all secure. How online do you think your personal information is?

You voted:

And they’re not just concerned. They want something to be done. Almost three-quarters of Americans say they support the establishment of national standards for how businesses can collect, process and share personal data.

“What amazes me is that there is a lot of support for more government action to protect data privacy,” said Jennifer Benz, deputy director of the AP-NORC Center. “And that’s bipartisan support.”

But after years of stalled efforts towards tougher data privacy laws that could hold large companies accountable for all the personal data they collect and share, the poll also says Americans have failed. much confidence in the government to fix it.

A majority, 56%, trust the private sector more than the federal government to manage security and privacy improvements, despite years of high-profile privacy scandals and hacks of US companies from Target to Equifax which have exposed the personal information of millions of people around the world.

Indeed, companies like Apple have gone to great lengths to present themselves as listening to and committed to protecting consumers’ privacy preferences.

“I think there’s little to no security at all,” said Sarah Blick, professor of medieval art history at Kenyon College in Ohio. The college’s human resources department told Blick earlier this year that someone had fraudulently applied for unemployment insurance benefits on his behalf.

Such fraud has increased since the pandemic, as perpetrators buy stolen personal credentials from the dark web and use them to flood state unemployment systems with bogus claims.

“I think my information was stolen when one of the credit bureaus was hacked, but it could also have been when Target was hacked or one of the many successful hacks at large companies,” Blick said.

About 71% of Americans believe the privacy of individuals’ data should be treated as a national security issue, with a similar level of support among Democrats and Republicans. But only 23% are very or somewhat satisfied with the federal government’s current efforts to protect the privacy of Americans and secure their personal data online.

“This is not a partisan issue,” said Colorado State Representative Terri Carver, a Republican who co-sponsored a consumer data privacy bill signed by Democratic Governor Jared Polis in July. . It takes effect in 2023.

The legislation, which has met opposition from Facebook and other companies, follows similar measures passed in California and Virginia that give people the right to access and delete personal information. Colorado’s also allows people to opt out of having their data tracked, profiled and sold.

“It was definitely one of the pieces where we had the biggest setback, but we felt it was so important,” Carver said. “Individuals are very frustrated that they do not have the tools and legal support to establish effective control over their personal data. “

Carver said it took several years to get the law through and advocates have had to give up some priorities, such as the idea of ​​allowing people to register if they want to allow the processing of their personal data – instead of forcing them to withdraw. She hopes the efforts of Colorado and other states will push Congress to put in place protections nationwide.

“We need a strong federal data privacy bill,” she said. “It would make sense, given interstate commerce.”

The poll also found broad agreement on how Americans view technology: 81% of Democrats and 78% of Republicans say they see technology as playing a major role in the country’s ability to be competitive at home. global scale. Seventy-nine percent of Democrats and 56% of Republicans see value in the government’s technology investments.

At least 6 in 10 adults are supporting the federal government by taking actions like spending more on technology, expanding broadband Internet access, and strengthening copyright protections to improve the competitiveness of the United States.

There are some generational variations in support for government policies to protect data privacy and security, although majorities across all age groups are in favor. While 85% of adults 40 and over support tougher penalties for cybercriminals, 70% of young adults say the same.

“The undercurrent is that this is an area where people see a direct role in government,” Benz said. “It’s something pretty tangible for people.”

————

The AP-NORC survey of 1,004 adults was conducted June 24-28 using a sample drawn from the AmeriSpeak probability-based NORC panel, which is designed to be representative of the U.S. population. The margin of sampling error for all respondents is plus or minus 4.3 percentage points.

Copyright 2021 The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed without permission.

]]>
https://pjmagic.net/americans-have-little-confidence-in-online-security-ap-norc-poll-2/feed/ 0
Apple and Google remove ‘Navalny’ voting app in Russia https://pjmagic.net/apple-and-google-remove-navalny-voting-app-in-russia/ https://pjmagic.net/apple-and-google-remove-navalny-voting-app-in-russia/#respond Fri, 17 Sep 2021 19:14:28 +0000 https://pjmagic.net/apple-and-google-remove-navalny-voting-app-in-russia/ MOSCOW – Apple and Google have removed an app to coordinate the protest vote in this weekend’s Russian elections in the country on Friday, a blow to opponents of President Vladimir V. Putin and a demonstration of the limits of Silicon Valley when it comes to resisting the crackdown on dissent around the world. The […]]]>

MOSCOW – Apple and Google have removed an app to coordinate the protest vote in this weekend’s Russian elections in the country on Friday, a blow to opponents of President Vladimir V. Putin and a demonstration of the limits of Silicon Valley when it comes to resisting the crackdown on dissent around the world.

The decisions came after Russian authorities, who claim the app is illegal, threatened to sue local Apple and Google employees – a sharp escalation in the Kremlin’s campaign to curb the largely unsuccessful internet censored nationwide. A person familiar with Google’s decision said authorities had named specific people who would face prosecution, prompting them to remove the app.

The person declined to be identified for fear of angering the Russian government. Google has over 100 employees nationwide.

Apple did not respond to phone calls, emails, or text messages asking for comment.

The app was created and promoted by allies of opposition leader Alexei A. Navalny, who hoped to use it to consolidate the protest vote in each of Russia’s 225 constituencies. He disappeared from both tech platforms by the time voting began in the three-day parliamentary elections, in which Mr Putin’s United Russia party – in a carefully managed staged system – holds a huge advantage.

Mr Navalny’s team reacted indignantly to the decision, suggesting that the companies had made a damaging concession to the Russians. “Removing the Navalny app from stores is a shameful act of political censorship,” Navalny collaborator Ivan Zhdanov, said on twitter. “Russia’s authoritarian government and propaganda will be delighted. “

The decisions have also drawn criticism from free speech activists in the West. “Businesses are in a really difficult position, but they’ve got into it”, David Kaye, a former United Nations official charged with investigating freedom of expression issues, said in an interview. “They are de facto leading an element of Russian repression. Whether this is justifiable or not, it is complicity and companies must explain it.

The extraordinary pressure on Google and Apple is an indication of the threat the Kremlin sees Mr. Navalny’s “smart voting” effort and the growing role that technology is playing as an instrument of political power. United Russia’s approval ratings in state polls have fallen to around 30% from 40% before the last parliamentary elections in 2016. A consolidation of the opposition vote could defeat United Russia candidates in the elections. competitive constituencies, since only a simple majority is needed to win.

Putin’s spokesman Dmitry S. Peskov claimed the app was illegal in Russia when asked about it on Friday during his regular call with reporters; Mr Navalny’s movement was banned as an extremist this summer. “Both platforms have been notified and according to the law they have taken these decisions, it seems,” he said.

Maintaining open and uncensored access to their services, especially in authoritarian countries, is becoming one of the toughest challenges for US tech companies like Apple, Google, Facebook, and Twitter. In countries like India, Myanmar or Turkey, authorities are increasingly pressuring companies to censor certain political speeches, or order Internet shutdowns to block access to the web.

Civil society groups have warned that forcing companies to comply with a patchwork of laws and regulations risks creating a more fractured internet, where access to information and products will depend on where they are the people. Businesses need to weigh the value of the availability of their services in a country like Russia, where they are seen as more independent than local technology platforms, against the costs of a full start, as Google has done. in China.

The pressure exerted on Silicon Valley to block certain content on their platforms does not come only from more authoritarian governments. Policymakers in the United States and Europe want businesses to do more to tackle hate speech, disinformation and other toxic content. Republicans in the United States claim they are censored online.

In Russia, the national Internet regulator, Roskomnadzor, has repeatedly asked companies to remove certain content, on pain of fines or restrictions on access to their products. The government claims that American internet companies are interfering in Russia’s internal affairs by allowing anti-Kremlin activists to freely use their platforms.

The Russian government has been increasingly blunt in recent days about its willingness to use threats of arrest to prevent use of the app. “With the participation of Apple and Google, specific crimes are committed, the scale of which can only increase in the coming days”, declared Thursday Vladimir Dzhabarov, member of the upper house of the Russian Parliament. “Those who contribute to the evasion of liability of their parent companies in the territory of the Russian Federation will be punished. “

It remains to be seen whether Friday’s concession by Apple and Google will turn into a watershed moment as America’s tech giants stand ready to withstand pressure from the Kremlin. Amid Russia’s crackdown on dissent this year, Silicon Valley’s most popular platforms have remained freely accessible, allowing journalists and activists to continue to get their message out. On YouTube, for example, Team Navalny’s investigations into the corruption of the Russian elite regularly garner millions of views.

But Friday’s move could encourage the Kremlin as well as governments elsewhere to use the threat of suing employees to leverage companies. It presents a test of Silicon Valley ideals around free speech and an open Internet, balanced not only against profit but against the safety of their workers.

Deletions of Facebook and Twitter posts, YouTube videos, and other internet content happen quite regularly as businesses seek to comply with local laws around the world. In China, Apple has removed apps that counter government censors, including software that would allow Chinese users to access the open global Internet. A 2016 court ruling in Russia led Apple and Google to remove LinkedIn from their app stores after LinkedIn failed to comply with a law requiring data on Russian users to be stored within the country’s borders. country.

But Friday’s deletions by Google and Apple have little precedent given election issues and Mr Navalny’s high-profile campaign against the Kremlin, said Natalia Krapiva, legal adviser to Access Now, a civil society group. tracking down internet censorship. “It’s really a new phenomenon to attack app stores,” Ms. Krapiva said.

While companies would prefer to be seen as impartial platforms, Ms. Krapiva said industry leaders should speak out more forcefully to defend free speech and an open internet, especially if employees across the Internet company were threatened with criminal prosecution.

Otherwise, “it looks like they’re on the side of the government,” Ms. Krapiva said.

Governments have used the prospect of prosecution in the past, although incidents rarely become public. In 2016, a Facebook executive was arrested in Brazil after the company refused to release WhatsApp data related to a drug trafficking investigation. Indian and Thai authorities are among those who have also threatened jail time to pressure social media companies.

Russian authorities have been pressuring Apple and Google for weeks to remove Team Navalny’s voting app. With Mr Navalny’s websites blocked in Russia, the app has become a loophole allowing the jailed politician’s exiled allies to continue to reach a large audience. Almost all smartphones run Apple’s iOS or Google’s Android operating system, which makes their app stores the key artery for making any product to the public.

The Russian Foreign Ministry summoned US Ambassador to Moscow John J. Sullivan last week and announced that “America’s” digital giants “” had broken Russian law “in connection with the preparation and the conduct of elections ”.

Bailiffs visited Google offices earlier this week to enforce court-ordered measures against the protest voting campaign, state media reported.

The Navalny app continued to work on Apple and Android phones for those who had previously downloaded the software.

The app is at the heart of the protest strategy that the Leader of the Opposition calls “smart voting”. The goal is to defeat as many candidates representing the ruling United Russia party as possible by having all opposition voters in each constituency choose the same challenger, whether or not they agree with their point of view. seen.

The “Navalny” application coordinates the process, asks for a user’s address and responds with the name of the candidate for whom they must vote.

The Navalny team on Friday sought to obtain the names of their “smart voting” picks through other methods, such as automated responses in the Telegram messaging app. But they expressed their anger at Apple and Google for what they saw as bending to pressure from the Kremlin.

“That shameful day will go down in history for a long time,” Leonid Volkov, Mr Navalny’s longtime chief of staff, wrote on his Telegram account.

Anton Troianovsky brought back from Moscow, and Adam satariano from London. Oleg Matsnev and Ivan Nechepurenko contributed to reporting from Moscow.

]]>
https://pjmagic.net/apple-and-google-remove-navalny-voting-app-in-russia/feed/ 0