Archive for August, 2012
Surveillance spyware program spreading to smartphones
University of Toronto researchers say a commercial cyber-espionage program marketed as a way for governments to spy on criminals is being used for broader surveillance and can now take over a range of smartphones and other mobile computing devices.
“People are walking around with tools for surveillance in their pockets,” said researcher John Scott-Railton, a doctoral student at the University of California Los Angeles’ Luskin School of Public Affairs, and the founder of The Voices Feeds, which helped activists get around Internet blockages during the Arab Spring.
Public relations and information security
Too much and you can over-extend and it can go “pear shaped”. Too little and you can be branded as uncommunicative and unreasonable. For large corporations the linkage of a brand and any security issue can have a negative effect on share price and immediate financial repercussions.
A large vendor with great responsibility providing supporting infrastructure recently addressed a zero day vulnerability with no media release until the security patch was issued. This made security operations personnel and security aware individuals around the globe very nervous.
Here are some guidelines to consider for your organisation:
NIST: Mobile devices inherently insecure
By Molly Bernhart Walker
Smartphones and tablets lack the “strong roots of trust” that are baked into laptops and other technology, according to a report (.pdf) published by the National Institute of Standards and Technology Aug. 23.
“These roots of trust are hardware and software components that are secure by design and are trusted to perform one or more security-critical functions,” writes NIST.
The agency is working to identify what capabilities roots of trust need in order to secure next-generation mobile devices. Projects underway at the agency will examine boot firmware protections, secure storage, device authentication, and application and data isolation, among other topics, says NIST.
U.S. Intelligence Agencies Seek A Private Cloud OS
From: Information Week/Government
CIA’s investment arm has partnered with Adaptive Computing to develop a cloud OS for agencies’ use. OpenStack platform may be used.
By Patience Wait
In-Q-Tel, the investment arm of the CIA, has partnered with cloud management specialist Adaptive Computing to develop a “cloud operating system” for use by U.S. intelligence agencies.
Adaptive will integrate its Moab cloud management suite with an unspecified open source cloud platform–potentially OpenStack, CloudStack, or another alternative–to create the cloud OS.
Adaptive’s Moab Cloud Suite provides service provisioning, service catalogs, and policy management in cloud environments. The company holds patents in areas such as multi-tier applications, time-based policy enforcement, and hybrid and multi-tenant clouds.
State Agencies Need A Big Data Strategy
From: Information Week/Government
State CIO association urges states to make better use of big data, warns of challenges in implementing programs.
By Patience Wait
State governments should begin laying the groundwork to utilize big data in ways that will benefit the public, according to a national association of state IT leaders.
In a just released report on the role of big data in state government, the National Association of State Chief Information Officers (NASCIO) is advising its members to develop an enterprise architecture and data governance policies to maximize the potential of the information their state agencies generate.
Cyber Security Of Power Sector In India
From: CJNews India
Indian government is famous for its knee jerk reactions. It always tries to cure the problem rather than preventing it from happening. Even the cure part of India government is far from perfect. In short, Indian government is neither interested in preventive nor a curative situation.
One such area that has been ignored for more than a five years by Indian government pertains to cyber security that is still an ignored world. Surprisingly, Praveen Dalal, leading techno legal expert of Asia and managing partner of ICT law firm Perry4Law, warned about this situation in the year 2006/07 itself but it seems the Indian government is too slow to react.
Making Dollars And Sense Out of Data Center Consolidation
From: FederalNewsRadio.com 1500 AM
Every agency has reviewed their needs to consolidate data centers, and progress across the government is real. The Office of Management and Budget says agencies shut down 250 data centers and plans to close a total of 479 by the end of fiscal 2012.
The long-term goal is to close down 1,200 data centers out of more than 3,133 that existed as of June. The goal is more than just shutting down servers and buildings. OMB expects agencies to transform business operations and meet mission better by moving to technologies such as virtualization and cloud computing.
Data retention could cost over $500m: Comms Alliance, AMTA (Australia)
Editor’s Note: Australia apparently has no equivalent of the Paperwork Reduction Act.
Submissions for the inquiry into national security legislation have been publicly released.
A joint submission by the Australian Mobile Telecommunications Association (AMTA) and the Communications Alliance has detailed data retention reforms could cost the industry over half a billion dollars.
Its submission to a parliamentary inquiry into reforms into national security legislation states set-up costs for data retention would cost nearly $100 million.
Hackers vow ‘hellfire’ in latest major data leak
Team GhostShell says it published one million records, allegedly from banks, government agencies, consulting firms and others — and claims there’s more to come.
by Elinor Mills
A group of hackers has released a vast quantity of data from banks, government agencies, consulting firms and many others and promised more data leaks in the future.
Judge stops ex-Toyota worker from leaving country
by BRETT BARROUQUERE, Associated Press
LOUISVILLE, Ky. (AP) — A federal judge has ordered a former computer programmer for Toyota from leaving the United States while the company investigates the damage done by an alleged computer hacking incident.
U.S. District Judge Karen Caldwell in Lexington also ordered Ibrahimshah Shahulhameed of Georgetown, Ky., to forfeit any information and data he took from the computer system of Toyota Motor Engineering & Manufacturing North America.
In a lawsuit filed in federal court in Lexington, Toyota alleged that Shahulhameed illegally accessed the website www.toyotasupplier.com after being dismissed from his contract position on Thursday. The company claims Shahulhameed reset the website and computer system to automatically crash.