Tag Archive for: Key.

From the archive: computer security, and a key experiment by Pascal



There cannot be many people whose names are not recorded on the peripheral equipment of some computer or other. Even Mr Howard Hughes, who values his privacy highly … has more to fear from the …

Source…

Multilateral cooperation is key to success in securing nations from emerging cyber security threats, says Amit Shah


Union Home Minister Amit Shah on Thursday raised concern regarding terrorists using the dark net to hide their identity and spread radical material, and find solutions by understanding the pattern of these activities.

Addressing the inaugural session of the ‘G 20 Conference on Crime and Security in the Age of NFTs, AI & Metaverse’, the home minister said that India has taken giant strides in empowering digital security systems.

“The conference will play a transformative role in building a global cooperation network to strengthen the capabilities of nations and international organizations to combat cyber threats, including terrorism, terror financing, radicalization, narco-terror, and misinformation in an effective way,” he added.

The brainstorming in this congregation will help all the participant nations to achieve remarkable feats in security, he said.

The minister also warned of cyber-attack threat which he said is hovering over all the major economies of the world and “many countries of the world have become victims of it”.

To create a “robust and efficient operational system”, Shah said, “Terrorists are using the dark net to hide their identity and spread radical material, and we have to understand the pattern of these activities running on the dark net and find solutions for the same.”

The Home Minister also specified the need to think coherently to crack down on the use of various virtual assets.

Speaking at the G20 Conference on Crime and Security in the age of the Non-Fungible Token (NFT), Artificial Intelligence (Al) and Metaverse’, Shah further said “The Metaverse, once a science fiction idea, has now stepped into the real world.”

He said the metaverse may create new opportunities for terrorist organizations primarily for propaganda, recruitment, and training.

“This will make it easier for terrorist organizations to select and target…

Source…

China curbs exports of key computer chip materials


Gloved hand holding a microchip.

Gloved hand holding a microchip.

The Chinese government is tightening controls over exports of two key materials used to make computer chips.

From next month, special licenses will be needed to export gallium and germanium from China, which is the world’s biggest producer of the metals.

It comes after Washington’s efforts to curb Chinese access to some advanced microprocessors.

The announcement comes just days before a high-stakes trip to Beijing by US Treasury Secretary Janet Yellen.

On Monday, China’s Ministry of Commerce said the restrictions were needed to “safeguard national security and interests”.

The silvery metals are used in semiconductor, communications and military equipment. They are also key materials in products like solar panels.

Semiconductors, which power everything from mobile phones to military hardware, are at the centre of a bitter dispute between the world’s two largest economies.

The US has taken steps to restrict China’s access to technology it fears could be put to military use, such as chips used for supercomputing and artificial intelligence.

In October, Washington announced that it would require licences for companies exporting chips to China using US tools or software, no matter where they are made in the world.

The efforts have been joined by countries including the Netherlands and Japan.

Last week, the Netherlands announced that it would restrict exports of certain semiconductor manufacturing equipment.

This followed plans to restrict its “most advanced” microchip technology exports, which the Netherlands announced earlier this year.

The controls are expected to affect Dutch chip equipment maker ASML, a key player in the global microchip supply chain.

Meanwhile, Japan plans to restrict some of its computer-chip making exports.

The measures, which were announced in March, will affect 23 types of semiconductor manufacturing equipment.

China has frequently called the US a “tech hegemony” in response to export controls imposed by Washington.

In recent months, Beijing has imposed restrictions on US firms linked to the American military, such as aerospace company Lockheed Martin.

US Treasury Secretary Janet Yellen, who is due to make a four-day visit to…

Source…

CRITICALSTART® Unveils Mid-Year Cyber Threat Intelligence Report Highlighting Key Threats Disrupting Businesses


Report finds two-step phishing attacks increasing; Beep malware top of mind for organizations; state-sponsored cyber-espionage on the rise

PLANO, Texas, June 13, 2023 /PRNewswire/ — Today, Critical Start, a leading provider of Managed Detection and Response (MDR) cybersecurity solutions, released its biannual Cyber Threat Intelligence Report, featuring the top threats observed in the first half of 2023, and emerging cybersecurity trends impacting the healthcare, financial services, and state and local government (SLED) industries. The report also includes actionable insights to help organizations strengthen their security posture and proactively mitigate potential risk.

The cyber threat landscape is constantly evolving, and threat intelligence is essential for identifying and responding in real-time. Cybercrime has become the world’s third largest economy, and estimated to generate $8 trillion (about $25,000 per person in the US) by the end of 2023. The Critical Start Cyber Threat Intelligence (CTI) team analyzed a range of intelligence sources, such as customer data, open-source intelligence, vulnerability research, social media monitoring, and dark web monitoring to identify the most pressing cybersecurity threats of the first half of 2023.

Key report findings include:

  • The Critical Start Security Operations Center (SOC), which monitors millions of endpoints with over 80,000 investigations a week, saw increases overall in the number of investigated alerts, alerts escalated to customers, and alerts that were of high or critical priority. In the first quarter of 2023, the SOC saw a 38.88% increase in the number of high or critical priority alerts escalated to customers over the previous quarter.
  • Two-step phishing attacks are on the rise, with attackers using convincing emails that resemble legitimate vendor communications, often related to electronic signatures, orders, invoices, or tracking information.
  • The new Beep malware is top of mind for organizations and individuals. This pervasive threat is delivered via email attachments, Discord, and OneDrive URLs.
  • State-sponsored cyber espionage is becoming increasingly common, with threat actors operating out of Russia,

Source…