Tag Archive for: issues

Embassy of China in Canada Issues a Statement on U.S Cyber Espionage Campaigns Against Japan


I just came across to a statement issued by the Embassy of China in Canada on the U.S cyber espionage campaigns launched against Japan.

What’s so special about this statement? First it does quite Wikileaks which is a bit of an outdated approach including the actual source to shed more light into a bigger problem and issue for China that the press statement on the Web site of the Chinese Embassy in Canada mentions. In this specific case the statement implies the use of the so called “hunt-forward” missions which could really mean big trouble for China if the U.S somehow manages to secure a deal with a neighbouring country next to China which could really mean big trouble for China as the U.S will then attempt to establish the foundation for a successful cyber attacks and possibly information operations interception campaigns used managed and operated by China including its partners and allies where to ultimate goal would be to measure their true capabilities and set the foundation for a successful cyber situational awareness campaign in terms of cyber attacks and the true state of China’s true cyberspace operations and cyber attack capabilities including the capabilities of some of its neighbouring countries.

The so called Hunt Forward Operations also known as (HFOs) are an early warning system for cyber situational awareness that could improve the true state of the visibility of the actual country that’s doing these missions in this specific case the U.S could really learn a lot about new tactics and techniques courtesy of the attackers based in the specific country where it’s hosting its mission which could be really bad news for China in terms of having the U.S deploy hunt forward missions in its neighbouring countries where the U.S could really get a better picture of China’s understanding and actual applicability of basic cyber warfare principles and concepts in action including the “know-how” of its neighbouring countries.

Despite the fact that the U.S is willing to share its knowledge and understanding of cyber attacks “know-how” with the host country of a hunt forward mission it could also learn a lot about the cyber attacks that originate from the…

Source…

Edge computing security issues attract attention amid AI application development boom


ChatGPT has taken the world by storm, bringing unprecedented AI experiences to numerous consumers. This highlights the continuous development of AI technology and its rapid proliferation in people’s daily lives. Meanwhile, with the vigorous development of technologies such as 5G, IoT, and cloud native computing, the concept of edge computing has also emerged to provide the best online experience for Internet users.

Traditional AI applications involve using the Internet to upload raw data to large cloud servers for analysis. However, with the increasing number of IoT devices, this often leads to issues such as raw data leakage, insufficient network bandwidth, and communication delays. Therefore, when cloud AI is deployed in smart manufacturing, smart transportation, and other scenarios, there may be a significant degradation in service quality as devices may not work together properly, potentially causing traffic accidents, industrial safety hazards, and other problems. For this reason, using edge computing servers to analyze data locally to mitigate such problems is a popular option in the market today. However, with the rapid proliferation of AI services, the issue of potential information security risks has also come to the fore. Hacker groups have begun launching attacks on AI applications such as ChatGPT to steal large amounts of sensitive data. Edge computing security has therefore become a major challenge that needs to be addressed in the development of AI services.

Dr. John K. Zao, the founder and chairman of FiduciaEdge Technologies, pointed out that existing information security solutions can be roughly divided into three categories. The first category includes the use of virtual private networks (VPNs), firewalls, and other mechanisms to protect data in transit. The second category deals with security mechanisms for websites and databases to ensure the security of data in storage. The third category aims to implement appropriate information isolation in the trusted edge computing environments to protect those data in use. Trusted edge computing is becoming increasingly important as more manufacturers are now running AI applications on their sites to…

Source…

‘Whatsapp Pink’ Scam Can Steal Your Sensitive Data: Police Issues Alert & Warning (How To Stop This Scam?) – Trak.in


A circulating WhatsApp message offers a link to download a pink-themed version of the app, known as ‘WhatsApp Pink.’ However, it has been discovered that ‘WhatsApp Pink’ is a harmful app designed to steal sensitive data, including banking information, OTPs, photos, and contacts.

'Whatsapp Pink' Scam Can Steal Your Sensitive Data: Police Issues Alert & Warning (How To Stop This Scam?)

WhatsApp Pink Scam

The ‘WhatsApp Pink Scam,’ a deceptive scheme, was initially exposed by internet security researcher Rajshekhar Rajaharia in April 2021. Subsequently, the Mumbai Police Cyber Crime Wing issued a Twitter alert, offering guidance on how to defend against these scams. 

To shield oneself from such fraudulent activities, it is essential to exclusively obtain and install applications from reliable sources like the Google Play Store. Apple users, in particular, benefit from added protection as Apple limits installations to trusted sources.

Protect Yourself from WhatsApp Pink Scam and Uninstall the Malicious App

Furthermore, it is important to refrain from installing apps from unfamiliar websites or APKs sent by unknown individuals. The ‘Forwarded’ label on WhatsApp messages can be useful in determining whether the message originated from a trusted source.

To remove WhatsApp Pink from your device, start by disconnecting any suspicious devices from the ‘Linked devices’ section in WhatsApp. The security researcher mentioned that WhatsApp Pink may conceal itself from the list of installed apps. If you encounter this issue, navigate to the ‘Apps’ section in your phone’s settings, locate ‘WhatsApp Pink’ with the pink logo, and select the uninstall option. It is worth noting that some malicious apps may not have a visible name in the app list, so be sure to remove any unidentified apps as well.

Source


Source…

Mumbai Police Issues Advisory On Email Bombing For Citizens To Stay Safe From Online Threat


The Mumbai police on Friday issued an advisory for citizens on a lurking email bomb cyber attack. An email bomb is a form of net abuse that sends large volumes of email to an address, making the mailbox overflow and overwhelm the server. This smoke screen distracts the attention from important email messages, indicating a security breach.

Methods Of Email Bomb Attack

There are three ways of carrying out an email bomb attack, including mass mailing, linking lists, and zip bombing, according to the advisory.

‘‘Mass mailing consists of sending numerous duplicate emails to the same email address. These types of mail bombs are simple to design but their extreme simplicity means they can be easily detected by spam filters. Email-bombing using mass mailing is also commonly performed as a Distributed Denial-of-Service attack by employing the use of botnets, hierarchical networks of computers compromised by malware and under the attacker’s control,” the advisory states.

The advisory further reads, “As in spamming, the attacker instructs the botnet to send out millions of emails, but unlike normal botnet spamming, the emails are all addressed to only one or a few addresses the attacker wishes to flood,” it said.

“This type of attack is more difficult to defend against than a simple mass-mailing bomb because of the multiple source addresses and the possibility of each infected computer sending a different message or employing stealth techniques to defeat spam filters,” it said, adding that “a zip bomb is a variant of mail-bombing”.

Details On Email Cluster Bomb Attack

“List linking, also known as ‘email cluster bomb’, means signing a particular email address up to several email list subscriptions. The victim then has to unsubscribe from these unwanted services manually. The attack can be carried out automatically with simple scripts,” said the advisory.

“This is easy, almost impossible to trace back to the perpetrator, and potentially very destructive. To prevent this type of bombing, most email subscription services send a confirmation email to a person’s inbox,” it said.

“It is generally advisable not to click…

Source…