Tag Archive for: Pulled

Draft Data Anonymisation Guidelines Pulled Down a Week After Being Put Up For Public Comments


Last week, the draft document that listed guidelines for data anonymisation was removed from the information technology ministry’s website. The draft had been put up for public feedback just a week prior to being withdrawn. This is not the first instance of sudden retraction of draft Bills. In the past two years alone, major changes have been made to data-related Bills – the draft Indian Data Accessibility & Use Policy, 2022, was updated without any notification, and in 2021, the draft amendments to the IT Rules, 2021, were unceremoniously taken down during public consultations.

MeitY was in the news in August when it withdrew the Personal Data Protection Bill after facing much pushback from several quarters. The ministry said a new legal framework incorporating several changes and amendments would replace it. 

Data anonymisation draft pulled down

Two drafts – the Guidelines for Anonymisation of Data (AoD) and Mobile Security Guidelines (MSG) – listing guidelines on data anonymisation were put up on the IT ministry’s website for public consultation. The website had announced that all the public comments made until September 21 would be considered. It may be noted that the documents were released on a new website, instead of the official website of MeitY. Interestingly, no press release accompanied these documents at the time of uploading. 

A government official told ET that data anonymisation is a complex issue that needs wider consultation. “We will talk to experts again, look at global examples, examine them, and then put up the draft for public consultation in a few days,” the source said.

The data anonymisation draft included guidelines for all stakeholders involved in personal data processing and its subtypes through the e-governance projects. The draft aimed to lay down the recommendations for processing of the data collected through…

Source…

Crazy cryptomining Cooking Mama rumours spread as game pulled from Nintendo Switch online store

This weekend rumours circulated that the Nintendo Switch video game “Cooking Mama: Cookstar” contained code that would secretly hijack the game console’s processing power to mine for cryptocurrency.

Probably not the kind of think you expect as you attempt to conjour up everything from burritos to Baked Alaska.

Graham Cluley

How Chinese military hackers allegedly pulled off the Equifax data breach, stealing data from 145 million Americans – USA TODAY

How Chinese military hackers allegedly pulled off the Equifax data breach, stealing data from 145 million Americans  USA TODAY
“data breach” – read more

How hackers pulled off a $20 million bank heist

How hackers pulled off a $  20 million bank heist

Enlarge (credit: Buyenlarge | Getty Images)

In January 2018 a group of hackers, now thought to be working for the North Korean state-sponsored group Lazarus, attempted to steal $ 110 million from the Mexican commercial bank Bancomext. That effort failed. But just a few months later, a smaller yet still elaborate series of attacks allowed hackers to siphon off 300 to 400 million pesos, or roughly $ 15 to $ 20 million from Mexican banks. Here’s how they did it.

At the RSA security conference in San Francisco last Friday, penetration tester and security advisor Josu Loza, who was an incident responder in the wake of the April attacks, presented findings on how hackers executed the heists both digitally and on the ground around Mexico. The hackers’ affiliation remains publicly unknown. Loza emphasizes that while the attacks likely required extensive expertise and planning over months, or even years, they were enabled by sloppy and insecure network architecture within the Mexican financial system, and security oversights in SPEI, Mexico’s domestic money transfer platform run by central bank Banco de México, also known as Banxico.

Easy pickings

Thanks to security holes in the targeted bank systems, attackers could have accessed internal servers from the public Internet, or launched phishing attacks to compromise executives—or even regular employees—to gain a foothold. Many networks didn’t have strong access controls, so hackers could get a lot of mileage out of compromised employee credentials. The networks also weren’t well segmented, meaning intruders could use that initial access to penetrate deep into banks’s connections to SPEI, and eventually SPEI’s transaction servers, or even its underlying code base.

Read 9 remaining paragraphs | Comments

Biz & IT – Ars Technica