Tag Archive for: areas

Vijayasai expresses concern over rise in cybercrimes in rural areas


Update: 2023-07-22 08:31 IST

Vijayawada: Union Minister of Electronics and Information Technology Ashwini Vaishnaw said that State governments are responsible for the prevention, investigation of cyber crimes through police departments including in training the police personnel and upgrading their technical knowhow to investigate and crack such crimes.

Replying to a question raised by YSRCP MP V Vijayasai Reddy in Rajya Sabha on Friday on increasing cyber crimes in rural India and cyber attackers targeting rural population with less awareness, the Union Minister said a toll free number 1930 was set up by the Central government.

He said a Cyber Crime Coordination Centre under the Ministry of Home Affairs has been designated as the nodal point in the fight against cyber crime. In addition CY Train portal was developed by Cyber Coordination centre for the capacity building of police officers.

The Union Minister said Cyber Swachhta Kendra-Botnet cleaning and Malware analysis centre operated by Indian Computer Emergency Response Team (CERT-In) has been established. The centre works in coordination and collaboration with Internet service providers, academia and Industry.

The centre facilitates detection of malicious programmes and free tools to remove the same for common users.

Source…

VOSKER LAUNCHES NEW CAMERA TO MAXIMIZE SECURITY IN REMOTE AREAS


VICTORIAVILLE, QC, Oct. 18, 2022 /PRNewswire/ – VOSKER, a pioneer in remote area surveillance, announced the launch of its newest cellular-connected security camera, the VOSKER V300: an innovative product that integrates on-demand live video streaming and motion-activated video recording, all without wires or Wi-Fi.

VOSKER LAUNCHES NEW CAMERA TO MAXIMIZE SECURITY IN REMOTE (CNW Group/Vosker Canada)

VOSKER LAUNCHES NEW CAMERA TO MAXIMIZE SECURITY IN REMOTE (CNW Group/Vosker Canada)

Designed for Users’ Peace of Mind

“Our cameras are designed to ensure peace of mind and to allow users to know what is happening on their property at all times. Whether it’s a private property or a business seeking to protect its site, our objective is to provide our customers with innovative and reliable technologies,” shared Maurice Vaillancourt, Vice-President of Marketing and Sales at VOSKER.

State-of-the-Art Technology That Performs Well and is Accessible from Anywhere

The VOSKER V300 camera sets itself apart from other products on the market through its video surveillance of locations where access to electricity and Wi-Fi networks is limited. 100% wireless, the camera offers several weeks of battery life, thanks to its solar panel that supports the lithium battery. Its connectivity is provided by 4G/LTE network, making it the ideal solution for long-term outdoor surveillance in remote locations.

The V300 provides complete monitoring at any time of the day, year-round. It is certified to be weatherproof and can operate in temperatures ranging from -30°C to 50°C. The mobile security camera captures high-quality video and still images with impressive resolution capabilities during the day and infrared at night.

With its patented and protected technology, VOSKER cameras use artificial intelligence (AI) and the Internet of Things (IoT) to provide users with images and data in real-time. Comprehensive and easy to use, the VOSKER mobile application allows users to receive notifications and alerts when movement is detected. The activity captured by the camera can be viewed simply and easily on a smartphone.

An Internationally Renowned Company 

The Quebec-based company has already positioned itself among the world’s security giants for several years thanks to its surveillance cameras which…

Source…

Top three most critical areas of web security


Akamai Technologies revealed three research reports at the RSA Conference 2022, focusing on three of the most critical areas of web security: ransomware, web applications and APIs, and DNS traffic.

web security critical areas

Analyzing trillions of data points across its multiple platforms, the research team uncovered new findings on threat actor behavior via popular attack traffic and techniques. The three reports link the most prominent security trends and paint an accurate map of the modern attack landscape.

An up-to-date analysis of ransomware attack trends highlight the risks and suggest mitigation, while an analysis of Web app and API attack trends offers a fresh look at the infection vectors used by ransomware operators and others. An analysis of DNS complements the reports with a view of overall attacks analyzed via one of the internet’s most foundational technologies.

The analysis centers on attack trends and techniques as well as solutions to solve today’s most pressing cybersecurity issues.

Highlights from each report

Ransomware threat

With the rise of Ransomware-as-a-Service (RaaS) attacks, including from the Conti ransomware gang, Akamai analyzed and discovered the most recent and effective components of ransomware attackers’ methodologies, tools and techniques. Key findings include:

  • Sixty percent of successful Conti attacks were conducted on United States companies, while 30% occurred in the European Union.
  • An analysis of the industries attacked highlights the risk of supply chain disruption, critical infrastructure impact, and supply chain cyberattacks.
  • Most successful Conti attacks target businesses with $10-250 million in revenue, indicating a “goldilocks” range of successful attack targets among medium and small businesses.
  • The gang’s tactics, techniques, and procedures (TTPs) are well-known, but highly effective – a sobering reminder of the arsenal that is at the disposal of other hackers. But also that these attacks can be prevented with the right mitigation.
  • Conti’s emphasis in their documentation on hacking and hands-on propagation, rather than encryption, should drive network defenders to focus on those parts of the kill chain as well, instead of focusing…

Source…

Cabinet approves upgradation of 2G mobile sites to 4G at security sites in LWE areas


Cabinet approves upgradation of 2G mobile sites to 4G at security sites in LWE areas

Cabinet approves upgradation of 2G mobile sites to 4G at security sites in LWE areas

Photo : iStock

The Union Cabinet chaired by Prime Minister Narendra Modi has approved a Universal Service Obligation Fund (USOF) project for upgrading 2G mobile services to 4G at security sites in Left-Wing Extremism (LWE) hit areas.

The project envisages upgrading 2,343 LWE Phase-I sites from 2G to 4G mobile services at an estimated cost of Rs.1,884.59 crore (excluding taxes and levies). This includes O&M for five years. However, BSNL will maintain the sites for another five years at its own cost.

The work will be awarded to BSNL because these sites belong to BSNL. The Cabinet also approved funding of operations and maintenance cost of LWE Phase-I 2G sites by BSNL for an extended period beyond the contractual period of five years at an estimated cost of Rs 541.80 crore.

The extension will be up to 12 months from the date of approval by the Cabinet or commissioning of 4G sites, whichever is earlier. The government chose BSNL for a prestigious project to indigenous 4G telecom equipment so as to achieve self-reliance in the telecom gear segment to fulfil domestic market needs apart from exporting to other markets. This 4G equipment will be deployed in this project also. The upgradation will enable better internet and data services in these LSW areas.

It meets the requirements of the Ministry of Home Affairs and the state governments.It shall also fulfil the communication needs of the security personnel deployed in these areas. The proposal is in line with the goal of providing mobile connectivity in rural areas. In addition, delivery of various e-governance services, banking services, tele-medicine; tele-education etc. through mobile broadband shall be possible in these areas.

Source…