Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

From:Reply-To:To:Date:Message-ID:List-ID:List-Unsubscribe:Sender:Content-Type:MIME-Version; i=mail=3Dpaulgdavis.com@mail172.suw14.mcdlv.net;

Posted on September 11, 2016December 30, 2021 by admini

[From the desk of Paul Davis – his opinions and no-one else’s]
Apart from the reporter’s opinions 😉
So onto the news:

Evading cyber legislation: Jurisprudence cloaking is the future of cyber warfare
Now hackers have come up with virtual ways to be transparent – at least to the law: cyber cloaks.
Cyber cloaks are most powerful for those engaged in criminal cyber activity, as it offers the freedom from consequence of persecution.
In general, the cloak consists of one or more of five core ingredients, and there are almost immeasurable ‘flavors’ that can be combined with great care and precision.
I will not go into great detail as not to promote specific attacks, however the notion of how these techniques work is most important to help protect your organization against their use.
Each of the five techniques listed above carry the ability to cloak a perpetrator’s real identity from a legal perspective.
Yes, it’s true that there are ways to find out who perpetrated the act beyond legal methods and mitigating the perpetrators, but these techniques are generally only available for national self-defense, and even those are highly restrictive.
It’s high time that the legal and security community understand that the IP address is dead for legal purposes and begin to work on rational ways to uncover malicious folks through the fog of technology and regional borders.
The answer to this cloaking malaise is to leverage enterprising technologies, such as fingerprinting and other fraud-like enumerations, which expose the perpetrator and provide an indelible mark from which to arrest them.
Legal teams and security professionals alike must get beyond the lay of security technology and reach into the next generation to find answers.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=1ddd80516e&e=20056c7556

Cyber attacks threatening national security double in past year, GCHQ reveals
Cyber attacks that threaten national security have doubled in a year with the UK now facing up to seven serious assaults every day, GCHQ has warned.
The intelligence agency is identifying 200 cyber attacks every month that either target critical organisations and networks or come from significant sources, such as hostile states.
That compares to 100 a month just last summer.
The intelligence agency is identifying 200 cyber attacks every month that either target critical organisations and networks or come from significant sources, such as hostile states.
That compares to 100 a month just last summer.
Officials also warned that advanced hacking technology is increasingly available “off the shelf” online meaning more and more offenders will be able to launch more sophisticated attacks.
Simply technology for denial of service attacks can be bought for a few pounds, while more sophisticated technology can be up to ÂŁ100,000.
GCHQ and the Government on Monday launched a ÂŁ6.5 million Cyber Invest programme, which will work with academic experts and the private sector to support research in to cyber attacks and how best to protect against them.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=d04c1b31ee&e=20056c7556

JPMorgan Chase CSO reportedly reassigned following data breach
JPMorgan Chase & Co’s CSO Jim Cummings was reportedly reassigned to a new position within the bank following the company’s major data breach this past year.
Bloomberg reported that it obtained a memo indicating that Cummings would be moving to Texas to “work on military and veterans housing initiatives for the bank.” During his CSO tenure, Cummings supervised more than 1,000 people.
He formerly served as the head of the US Air Force’s cyber-combat unit.
Greg Rattray formerly served as CISO at the bank and was reassigned in June to become the head of global cyber partnerships and government strategy.
Bloomberg reported that company insiders said both Cummings and Rattray brought military culture to the bank, which didn’t always mesh with JPMorgan’s Wall Street ways.
Link: http://paulgdavis.us3.list-manage1.com/track/click?u=45bf3caf699abf9904ddc00e3&id=3849377f34&e=20056c7556

DDoS attack only the tip of the iceberg: study
In the survey, 28% of the respondents in Saudi Arabia most often cited malware and 36% cited hacking as the number one threats to their companies, while DDoS was chosen as the most dangerous threat by only 10%.
Globally, DDoS attacks often coincide with malware incidents (in 45% of all cases), and corporate network intrusions (in 32% of all cases).
Data leaks were also detected simultaneously with an attack in 26% of cases.
Construction and engineering companies encountered this problem more often than others: according to respondents worldwide, 89% of DDoS attacks on these companies coincided with other types of attacks.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=0573183c94&e=20056c7556

Connectivity and Cybercrime
Legal measures play a key role in the prevention and combating of cybercrime
Increasing levels of cybercrime, as both individuals and organized criminal groups exploit new criminal opportunities.
Law enforcement cybercrime investigations require an amalgamation of traditional and
new policing techniques.
While high-level consensus exists regarding broad areas of criminalization, detailed analysis of the provisions in source legislation reveals divergent approaches.
A comprehensive study on Cybercrime was conducted by the UNODC (United Nations Office on Drugs and Crime).
Reviewed here is the Executive Summary of this excellent report which covers all the aspects of Cybercrime in almost 300 pages.
In 2011, at least 2.3 billion people, the equivalent of more than one third of the world’s total population, had access to the internet.
Over 60 per cent of all internet users are in developing countries, with 45 per cent of all internet users below the age of 25 years.
By the year 2017, it is estimated that mobile broadband subscriptions will approach 70 per cent of the world’s total population.
By the year 2020, the number of networked devices (the ‘internet of things’) will outnumber people by six to one, transforming current conceptions of the internet.
In the hyperconnected world of tomorrow, it will become hard to imagine a ‘computer crime’, and perhaps any crime, that does not involve electronic evidence linked with internet protocol (IP) connectivity. ‘Definitions’ of cybercrime mostly depend upon the purpose of using the term.
A limited number of acts against the confidentiality, integrity and availability of computer data or systems represent the core of cybercrime.
Beyond this, however, computer-related acts for personal or financial gain or harm, including forms of identity-related crime, and computer content-related acts (all of which fall within a wider meaning of the term ‘cybercrime’) do not lend themselves easily to efforts to arrive at legal definitions of the aggregate term.
Certain definitions are required for the core of cybercrime acts.
However, a ‘definition’ of cybercrime is not as relevant for other purposes, such as defining the scope of specialized investigative and international cooperation powers, which are better focused on electronic evidence for any crime, rather than a broad, artificial ‘cybercrime’ construct.
Legal measures play a key role in the prevention and combating of cybercrime.
These are required in all areas, including criminalization, procedural powers, jurisdiction, international cooperation, and internet service provider responsibility and liability.
At the national level, both existing and new (or planned), cybercrime laws most often concern criminalization, indicating a predominant focus on establishing specialized offences for core cybercrime acts.
Countries increasingly recognize, however, the need for legislation in other areas.
Compared to existing laws, new or planned cybercrime laws more frequently address investigative measures, jurisdiction, electronic evidence and international cooperation.
Globally, less than half of responding countries perceive their criminal and procedural law frameworks to be sufficient, although this masks large regional differences.
While more than two-thirds of countries in Europe report sufficient legislation, the picture is reversed in Africa, the Americas, Asia and Oceania, where more than two-thirds of countries view laws as only partly sufficient, or not sufficient at all.
Only one half of the countries, which reported that laws were insufficient, also indicated new or planned laws, thus highlighting an urgent need for legislative strengthening in these regions.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=317ab9d089&e=20056c7556

8 of top 10 vulnerabilities used by exploit kits target Adobe Flash Player
According to a new report by Recorded Future, eight of the top 10 vulnerabilities used by exploit kits target Adobe Flash Player.
The remaining two non-Flash flaws favored in the crimeware as a service (CaaS) ecosystem were in Microsoft Internet Explorer versions 10 and 11 and other “Microsoft products including Silverlight.”
After conducting threat intelligence analysis of 108 exploit kits, Recorded Future found that Adobe Flash Player had thousands of references and dominated the list of top vulnerabilities. “Understanding what vulnerabilities are targeted by exploit kits can better inform patch management functions within organizations,” explained the company.
For this research, Recorded Future did not reverse engineer any malware; instead it focused on “meta-analysis of available information from information security blogs, forum postings, etc.” from Jan. 1 to Sept. 30, 2015.
Exploit kits may use “dozens of other vulnerabilities,” but Adobe Flash is the top target of popular exploit kits.
Link: http://paulgdavis.us3.list-manage.com/track/click?u=45bf3caf699abf9904ddc00e3&id=cc551de5f1&e=20056c7556

Japan fights its own corporate pride, opaqueness in push to improve cybersecurity
Improving cybersecurity practices has emerged as a top national priority for Japan, stung in recent years by embarrassing leaks at Sony Pictures, the national pension fund and its biggest defense contractor, Mitsubishi Heavy Industries, which possibly suffered the theft of submarine and missile designs.
To be sure, the cybersecurity industry around the world, not just in Japan, frequently echoes the call for greater transparency within and among organizations.
The U.S.
Senate last month passed the Cybersecurity Information Sharing Act to ease data sharing between private companies and the government for security purposes, although civil liberties advocates warned it posed a threat to privacy.
But the problem may be particularly acute for Japan’s private sector behemoths and government ministries.
These sprawling bureaucracies are wrapped in a “negative culture that cuts against wanting to communicate quickly,” said William H.
Saito, the top cybersecurity adviser to Prime Minister Shinzo Abe.
In 2013, the latest year of available data, the Japanese government network faced an eightfold increase in cyberattacks from two years prior, with attacks spreading into civil infrastructure, as well as the telecommunications and energy sectors.
A Cabinet-level cybersecurity agency in September published a strategy paper that proposed, among other things, extending government-run cybersecurity classes to companies, awarding financial incentives for firms that demonstrate improved security capabilities and requiring companies to fill a chief cybersecurity officer role.
Link: http://paulgdavis.us3.list-manage2.com/track/click?u=45bf3caf699abf9904ddc00e3&id=b6edd66960&e=20056c7556

============================================================
Feedback, questions? Our mailing address is: ** dailynews@paulgdavis.com (mailto:dailynews@paulgdavis.com)

If you know someone else who would be interested in this Newsalert, please forwarded this email.
If you want to be added to the distribution list, please click this: ** Subscribe to this list (http://paulgdavis.us3.list-manage.com/subscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a)

** Unsubscribe from this list (http://paulgdavis.us3.list-manage2.com/unsubscribe?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556&c=c3e63a1baa)

** Update subscription preferences (http://paulgdavis.us3.list-manage1.com/profile?u=45bf3caf699abf9904ddc00e3&id=e09452545a&e=20056c7556)

Leave a Reply

You must be logged in to post a comment.

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme