Archive for June, 2014
Dell rolled out new security tools and enhancements Thursday aimed at enabling businesses of all sizes to protect their sensitive corporate data while still allowing employees to access that data whenever they want, wherever they are, using any device.
These include enhanced security features for Dell’s Data Protection Cloud Edition with Dropbox for Business, new products within its commercial PC portfolio, and what the company claims is the first commercially available product to achieve the U.S. government’s FIPS-140 Level 3 certified commercial PCs with Hardware Crypto Accelerator.
By Chris Strohm
The attack on a U.S. hedge fund’s network, which a cybersecurity contractor said last week disrupted the firm’s high-speed trading and stole its data, is but one among many.
That is the assessment of more than a half-dozen computer security experts, who in recent interviews characterized the hedge-fund industry as the target of multiple attacks, many successful. Over the past two years, computer networks at dozens of banks, hedge funds, law firms and other Wall Street companies have been infiltrated by hackers mainly from Eastern European countries, these people said.
A prolonged operation to spy on aviation systems at 75 U.S. airports was caught by the cooperation of the federal government, a state information-sharing organization and industry, but not before claiming at least two victims, according to a new report.
The campaign was discovered in 2013. The federal government notified the Center for Internet Security, a nonprofit group that works closely with state and local governments, about a so-called advanced persistent threat targeting four airports, CIS officials said.
Sockatume writes: In a statement to the Financial Times and reported by the BBC, Google has confirmed that it will remove the music videos of independent artists unless they sign up to its upcoming subscription music service. Many independent musicians and labels have refused to do so, claiming that the contracts offer significantly worse deals than the likes of Spotify and Pandora, and that Google is unwilling to negotiate on the rates it offers artists. A Google spokesperson indicated that the company could start removing videos within days.
Editor’s Note: Over twenty years, this novel, explored Russian efforts to weaken American security by manipulating environmental regulations.
Nato chief, Anders Fogh Rasmussen, says Moscow mounting disinformation campaign to maintain reliance on Russian gas
The head of one of the world’s leading groups of democratic nations has accused Russia of undermining projects using hydraulic fracturing technology in Europe.
Anders Fogh Rasmussen, secretary-general of the North Atlantic Treaty Organisation (Nato), and former premier of Denmark, told the Chatham House thinktank in London on Thursday that Vladimir Putin’s government was behind attempts to discredit fracking, according to reports.
From: The Guardian
Chinese clone of Samsung smartphone steals personal data using a virus disguised as Google Play, researchers warn
A Chinese Android smartphone on sale on Amazon, eBay and other online stores has been found to contain a virus that pretends to be the Google Play Store but steals user data.
The Star N9500, which closely resembles Samsung’s Galaxy S4 smartphone in appearance, is manufactured in China but sold online through resellers based in Belfast and Hong Kong.
Summary: A year after gathering industry feedback on the technology, ICT regulator IDA finalizes the country’s regulatory framework for TV white space in a bid to drive commercial deployments and ease demand for more bandwidth.
Singapore has released its regulatory framework for TV white space (TVWS), effective from November, to facilitate the deployment of the technology and ease demand for more bandwidth amid a growing number of mobile and online users.
Three documents this week lay out the who, how, why, and why it matters of Chinese cyber espionage. Unfortunately, we still lack the what to do.
The who and how is contained in a new report, Putter Panda, by the cybersecurity company CrowdStrike [Full disclosure: CrowdStrike helps fund a speaker series at the Council on Foreign Relations]. The report, like the Department of Justice’s indictment of five hackers alleged to be part of the People’s Liberation Army and Mandiant’s APT1 report, uses IP addresses, email accounts, and other forensic details to describe attacks on European and U.S. businesses and government agencies, with a particular focus on the satellite, aerospace, and communications sectors. CrowdStrike identifies a hacker using the handle “cppy,” and through images posted on a picture sharing website and other clues links the individual to the PLA 3rd Department 12th Bureau Unit 61486 in Shanghai.
Mohammad issues decree naming Al Qamzi as chairman of the organisation’s board
Dubai: A cyber security centre has been set up in Dubai to protect government information systems and the telecom network.
His Highness Shaikh Mohammad Bin Rashid Al Maktoum, Vice-President and Prime Minister of the UAE, in his capacity as Ruler of Dubai, issued Law No 11 of 2014 establishing the centre.
The centre aims to develop the necessary cybersecurity methods, increase the efficiency of ways of protecting information and the exchange of information among all government bodies in Dubai.
From: The Telegraph
Bitcoin is giving banks a run for their money. Now the same technology threatens to eradicate social networks, stock markets, even national governments. Are we heading towards an anarchic future where centralised power of any kind will dissolve?
By Matthew Sparkes, Deputy Head of Technology
The rise and rise of Bitcoin has grabbed the world’s attention, yet its devastating potential still isn’t widely understood. Yes, we all know it’s a digital currency. But the developers who worked on Bitcoin believe that it represents a technological breakthrough that could sweep into obsolescence everything from social networks to stock markets… and even governments.