Tag Archive for: Protocols

Resumption of all Kyivstar services in compliance with security protocols takes time – security service


Resumption of all Kyivstar services in compliance with security protocols takes time – security service

It is planned to resume the Kyivstar fixed-line Internet for households and begin the launch of mobile communications and the Internet on Wednesday, December 13, while the resumption of all services of the mobile operator in compliance with the necessary security protocols will take time, the Security Service of Ukraine has reported.

On Wednesday, Security Service of Ukraine said on its Telegram channel that its cyber specialists and Kyivstar experts, in collaboration with other government agencies, continue to work on restoring the network after the cyber attack.

“According to preliminary estimates, on December 13 it is planned to resume fixed-line Internet for households, and begin the launch of mobile communications and the Internet,” the security service said.

At the same time, the Security Service of Ukraine emphasizes that critical damage was inflicted on Kyivstar’s digital infrastructure, and therefore “the restoration of all services in compliance with the necessary security protocols will take time.”

“The responsibility for the attack has already been claimed by one of the Russian pseudo-hacking groups. It is a hacker unit of the main intelligence directorate of the General Staff of the Russian Armed Forces (more commonly known as GRU), which thus publicly legitimizes the results of its criminal activities in this way,” the Security Service of Ukraine said.

The Ukrainian service continues to document the Russian cyber attack on Ukraine’s civil infrastructure as another war crime committed by the occupiers.

Source…

Breaking Down the Code: Computer Scientists Untangle Internet’s Complex Protocols to Unveil Underlying Simplicity


Undergraduate students taking computer-networking courses often find themselves confronted with an avalanche of acronymic protocols that dictate how the internet works. But underlying the layers of complexity, there exists surprising simplicity in the design of the internet, as illustrated in the February cover feature for Communications of the ACM (Association for Computing Machinery) — a monthly magazine published by the world’s largest educational and scientific computing society.

Looking to cut through that seemingly tangled mess, UCLA computer science professor George Varghese, joined by his colleagues James McCauley of Mount Holyoke College in Massachusetts and Scott Shenker of UC Berkeley, set out to explain in this article that the internet’s fundamental design has remained unchanged since its adoption in 1983.

Titled “Extracting the Essential Simplicity of the Internet,” the predominantly non-technical article boils down the internet’s architecture to three key mechanisms: routing, reliability and resolution. They formed the foundation of the ubiquitous global system of interconnected computer networks despite evolving technologies built around the internet.

“Most people understand the power of the internet but few appreciate the brilliance of its design that has allowed the system to accommodate decades of growth, with billions of users and connected devices that process mountains of data in a blink of an eye,” said Varghese, who holds UCLA’s Jonathan B. Postel Endowed Chair in Networking. He has made landmark contributions to network algorithmics, which helped make the internet run faster. His current research emphasis is on network design automation, to help manage and debug computer networks.

The article originated from a guest lecture by Shenker on the internet’s basic routing simplicity in a UCLA undergraduate networking class taught by Varghese. The internet’s long-lasting success, the authors noted, can be attributed to its modest all-purpose design; its modularity that allows it to incorporate innovations at the applications end that are completely distinct from the connecting network layers; and its built-in layers of fail-safe…

Source…

CASINOenquirer Discusses Shared Security Protocols of the Safest Online Casinos in Canada in 2023


VANCOUVER, BC, Jan. 30, 2023 /PRNewswire/ — Online casino safety is currently the biggest concern for internet gamblers in Canada, with the latest security features often being the primary determinant of where punters end up wagering their money. As with any technology, online casino security features continue to evolve. Simultaneously, the safest online casinos in Canada keep abreast with the latest technological innovations to maintain their reputation and the integrity of their service offering.

Canadian online gambling portal, the CASINOenquirer, notes that the up-to-datedness of safety and security features can make or break an online casino.

Security Innovations Contributing to Online Casino Safety

All online casinos operating legally in Canada have several safety and security features in common. New players should identify these as signs of a legitimate operation.

Licences, Regulator Certificates, and Audits

All legitimate online casinos hold an operating licence issued by credible jurisdictions, such as Malta, Gibraltar, Isle of Man, and the United Kingdom. Moreover, independent audits by bodies such as eCOGRA should take place several times throughout the year to ensure the fairness and security of the games.

Random Number Generators

Random number generators (RNG) ensure that any game action, including chip passing, card dealing, dice rolling, or slot spinning, is arbitrary and that the games aren’t rigged or compromised in any way. Without an RNG in place, there are no guarantees that the games can be trusted, and the results haven’t been predetermined.

Security Protocols

Online casinos can’t function without the transfer of sensitive personal data between the user and the operator. This includes the personal and banking details of the players. New and innovative security protocols help casinos to keep player information safe.

Security Socket Layer (SSL) – SSL encrypts the connection between the user and the server and segments sensitive information, which can only be unlocked with unique keys. The URL’s lock icon or green bar indicates a safe webpage.

Security logo – Safe casinos display a security logo, like…

Source…

2022 set to break hacking records as DeFI protocols lose $760m in October


2022 is on course to be a record year for crypto hacking as a record amount of digital assets were stolen via crypto hacks in October.

According to data from blockchain security firm PeckShield released on Monday, about $760 million worth of crypto value was looted by hackers and cybercriminals in 44 incidents that affected 53 protocols in October.

However, some of the exploited protocols recovered $100 million, a fraction of that sum within the same period.

PeckShield reported that $2.98 billion of crypto assets had been stolen in 2022, almost double $1.55 billion, the total value of crypto stolen in 2021,  

The biggest exploit of this ‘Hacktober’ was the BNB Chain hack which resulted in a loss of $586 million alone. Earlier in October, the BNB chain executed a hard fork to restore security after an unknown hacker stole $100 million via a vulnerability in the platform’s cross-chain bridge.

Binance co-founder and CEO Changpeng Zhao (“CZ”) disclosed that hackers accessed a cross-chain bridge where users transfer digital assets from one blockchain to another. The hackers created 2 million BNB tokens out of thin air.

The PeckShield report listed the Mango Markets Defi protocol as the second biggest loser in October. However, the exploiter agreed to return some of the funds.

Related post: $117m stolen in Mango Market hack 

March had recorded the highest loss because oo crypto hacks before October, with around $710 million stolen. Most of this was due to the Ronin Bridge hack, which resulted in $625 million in crypto assets being pilfered.

Causes of the hacks 

There are several causes for the high volume of crypto hacks in October. The leading causes include wallets compromised by profanity hacks, Blockchain bridge vulnerabilities, insecure smart contract codes, the unaccounted-for game theory behind protocol functionality, exploited cross-chain bridges, and oracle price manipulation.

For the crypto lender, Mango Markets, the attacker, Avraham Eisenburg, claimed actions behind the exploit were legal after an oracle price manipulation. Following a community vote, an agreement was struck, and Eisenburg walked away with $47 million…

Source…