Tag Archive for: Signs

This WeeΚ In Security: Hackerman, Twitter’s Best, And Signs To Watch Out For


[Editor’s note: There is a second, fake iteration of this column out today. This is obviously the real column.]

First off, there’s an amazing video tutorial from [Hackerman], embedded below the break. It’s a beginners guide to temporal displacement through GPU accelerated, cellular-connected partition board. The central flaw that makes this possible is a segmentation violation, accessible through a mode 6 cursor address reset. Watch out, though, because many mainframes actually have a core terminal capable of shutting such an attempt out of the grid altogether.

It’s a great guide, and definitely worth a watch if temporal security tickles your fancy. Watch out, though, because everyday objects can apparently act as bridges, infecting even users with temporal effects.

Twitter’s Tips (#5 Will Shock You)

Twitter’s best and brightest have come together to give us some of their best tips. The stellar advice ranges from classic goodies, like “change your passwords often”, to more modern truisms, like “[it’s] only critical if it’s covered by the media. Refrain from publishing any details to keep severity low.” My personal favorite is the truism that vulnerability mitigation is a wasted expense, and that money is better spent on a Web Application Firewall, which is sure to keep you out of trouble.

Other hot takes include the advice to use Stackoverflow for all your security remediation problems. Another user suggested keeping business hours on your website, so it can only be attacked while you’re at work. Perhaps the best was the advice that you name your dog something minimum 16 characters, using a mix of characters, since you’ll inevitably use the pet’s name as your password. Check out the #cisotips tag for more of these awesome tips!

How to Know When to Report Your Family for Computer Crimes

This is an old-but-good one. A quick guide to how to know when your kids have crossed the line, and you should call the police to curb their computer hacking ways. Some of the red flags to watch for are use of Tor, VM technology, or the dreaded Kali Linux. Also worrying are dedicated hacker hardware,…

Source…

New security tech monitors power use for warning signs of cyberattacks


'We can protect anything that consumes power'
A small box collects data on power use for analysis by AI software. Credit: University of Waterloo

Researchers have developed new technology to protect governments, businesses and other organizations from cyberattacks by monitoring for unusual power consumption.

The technology combines a small piece of hardware to collect data with artificial intelligence (AI) software that can determine if power usage in a system is inconsistent with known, predictable patterns. If so, the AI sends an alert to security officials within the organization that its infrastructure might be under attack by hackers or malicious ransomware stealing or locking crucial information.

“If suddenly, for instance, several machines exhibit a similar pattern of high-power usage in specific patterns, we would raise an alert that there might be spreading crypto-ransomware in the network,” said Sebastian Fischmeister, an engineering and computer science professor at the University of Waterloo.

The research team and spinoff company Palitronica Inc. are now testing the technology—which is designed to complement, not replace, existing security controls such as network intrusion detection—in several Ontario municipalities, with a dozen more interested in participating.

“Ransomware and malware are serious threats to municipal governments,” said Jamie McGarvey, the mayor of Parry Sound and president of the Association of Municipalities Ontario. “We have seen an alarming increase in attacks and are encouraged that the University of Waterloo, the security company Palitronica, and the federal government are working with municipalities to improve municipal IT infrastructure systems.”

Fischmeister said the concept at the core of the technology, which is far less vulnerable to tampering since it sits outside the monitored system, means it has a wide variety of potential applications.

“It could be used to protect network equipment and computers, but also water supply, 5G infrastructure, trains and airplanes—we can protect anything that…

Source…

UK signs series of international digital agreements at first Future Tech Forum


  • UK and Singapore sign deals to speed up trade, on digital identity and on cyber security
  • Comes as UK also endorses Prague Proposals on telecommunications supplier diversity

A series of agreements have been signed during the first Future Tech Forum in London to help create new digital trade opportunities, remove barriers to cross-border trade and reduce costs for businesses.

Three Memoranda of Understanding (MoUs) were signed by UK Digital Secretary Nadine Dorries and her Singaporean counterpart, Minister for Communications and Information Josephine Teo.

The agreements will underpin the UK-Singapore Digital Economy Agreement (DEA), currently being negotiated, which seeks to enhance the trade relationship and boost digital trade for businesses and benefits for consumers.

An agreement on ‘digital trade facilitation’ aims to reduce barriers to digitally led trade by encouraging businesses to use electronic invoicing. It will establish a pilot project for the transfer of electronic bills of lading – the main commercial document of the shipment of goods – between the UK and Singapore.

By removing expensive and antiquated paper record keeping, the move will not only help reduce costs for businesses and help drive more competitive pricing for consumers, but it will also reduce the carbon footprint of trade.

A further agreement marks an important step in achieving the smooth operation of digital identity systems between different jurisdictions. It will help reduce barriers in cross-border trade and enable businesses and individuals to use the international digital economy with more confidence and security.

An agreement on cyber security acknowledges the common interest between the UK and Singapore in addressing the international challenges of protecting the countries’ interests online, and a shared vision of maintaining the economic and social benefits of a free, open, peaceful and secure cyberspace.

Digital Secretary Nadine Dorries said:

The Future Tech Forum is bringing global leaders together to discuss how we can use tech to create a greener, healthier and safer world.

The deals signed today will reduce costs for businesses and make it easier for our thriving…

Source…

Indian Army signs MOU with Rashtriya Raksha University for research, higher education


During a brief ceremony conducted at Rashtriya Raksha University (RRU), Gandhinagar on Tuesday, the Indian Army entered into a Memorandum of Understanding with Rashtriya Raksha University (RRU) to synergise innovations, research, technology incubation, joint projects, publication and patents, training, higher learning and distance education in the Army. Rashtriya Raksha University (RRU) is an institute of national importance established under the Ministry of Home Affairs, Govt of India. RRU is committed to identify, prepare and sustain statecraft of national, strategic and security culture through continuous enhancement and development of innovation, education, research and training cadres from the security, military and civilian society.

COAS General MM Naravane addressed the gathering through virtual platform in which he emphasised that signing of this MoU is a pathbreaking initiative towards enhancing the interaction of Indian Army with academia. Army Chief highlighted that the demands of future warfare mandates Indian Army officers and men to be educated in niche domains of warfare to include Artificial Intelligence, Machine Learning, Data Science, Cyberwarfare, robotics, and aerospace that have potential military applications and a disruptive impact on modern-day warfare. The event was presided over by Lt Gen Raj Shukla, GOC-in-C Army Training Command. He stressed that this is a step towards strengthening the linkages between academia and the Indian Military. He laid specific emphasis on ‘Civil-Military Relations’, and expounded multifaceted aspects pertaining to mutual cooperation.

Prof. Bimal N. Patel, Vice-Chancellor, RRU underlined that RRU is a model for security of India and an institute of national importance. The university will focus on meeting specific requirements of Indian Army in emerging and contemporary technologies in the field of Artificial Intelligence, disruptive military technologies, cyber and information warfare, aerospace capabilities and will provide certification for the institutionalized training undertaken at this institute. ‘Chanakya’ a biannual publication of RRU on National Security was also launched during the event. The landmark MoU will…

Source…