Page 1,498«..1020..1,4971,4981,4991,500..1,5101,520..»

VirnetX Partners with WeSecure – PR Newswire

Canadian Security Company will Sell VirnetX Products in the Middle East

ZEPHYR COVE, Nev., April 5, 2023 /PRNewswire/ -- VirnetX Holding Corporation (NYSE: VHC) ("VirnetX"), a leading Internet security software and technology company, and WeSecure Inc., a Canadian Security Solutions Integrator, are proud to announce a non-exclusive commercial agreement for WeSecure to sell VirnetX cybersecurity products in the U.S., Canada and the Middle East. The partnership aims to implement VirnetX's advanced security technologies into WeSecure's Physical and CyberSecure products and services.

"WeSecure has successfully integrated the VirnetX One family of products, War Room and VirnetX Matrix into our existing cybersecurity infrastructure," said Darren Olson, WeSecure CTO. 'These products significantly boost the level of security and are unrivaled in the industry. Testing and implementing VirnetX's patented technologies allows WeSecure to implement a Zero Trust Security Model for 18 open-source software and applications on our Secure Gateway appliance, offering another layer of unparalleled protection and security.

"As cyber threats continue to grow in complexity and frequency, the need for advanced security solutions has never been more crucial," said Kendall Larsen, VirnetX CEO and President. "The partnership between VirnetX and WeSecure marks a significant step forward in providing organizations with the WeSecure Gateway, locally within the company, or in the cloud to defend against the ever-present risk of cyberattacks."

"The unique features of VirnetX's Secure Domains, Secure DNS, Dynamic VPN, and Military grade encryption create a robust and impenetrable security framework," said Mac Mokatren, WeSecure CEO. "We're extremely thrilled to join forces with VirnetX and their team to help organizations worldwide enhance their cybersecurity posture. WeSecureoperates in Canada, the US and is opening a branchin the Middle East."

About WeSecure

WeSecure unifies Cyber and Physical Security technologies, including Zero Trust, Secure Domains, Dynamic VPN, Secure IP Video, and Access Control systems to create WeSecure Security as a Service (SECaaS). Our Security Applications and Secure Appliancesprovide another layer of Advanced Security unrivaled in the industry.

About VirnetX

VirnetX Holding Corporationis an Internet security software and technology company with patented technology for Zero Trust Network Access ("ZTNA") based secure network communications.VirnetX'ssoftware and technology solutions, including its Secure Domain Name Registry and Technology, VirnetX One, War Room, VirnetX Matrix, and Gabriel Connection Technology, are designed to be device- and location-independent, and enable a secure real-time communication environment for all types of enterprise applications, services, and critical infrastructures. The Company's patent portfolio includes over 200 U.S. and foreign granted patents, validations and pending applications. For more information, please visitwww.virnetx.com.

VirnetX One is a security-as-a-service platform that protects enterprise applications, services, and infrastructure from cyber-attacks using ZTNA. VirnetX One products address a significant need across enterprises of all sizes, as hackers have become more sophisticated, ransomware and malware more costly and disruptive, and the use of corporate and other applications by contemporary remote workforces has continued to rise.

VirnetX MatrixTMprovides superior security for internet-enabled enterprise applications and their connected devices, and for control systems currently deployed by those enterprises (e.g., file servers, data back-up systems, VPN/firewalls). VirnetX MatrixTM provides ZTNA protection, "single-click" ease of use, and is designed to be a highly effective "security umbrella": its added layer of protection is deployed simply, without the need for changes to an enterprise's existing, in-place infrastructure.

War Room provides an industry leading, safe, and secure video conferencing meeting environment where sensitive communications and data is invisible to those unauthorized to view it.

SPECIAL NOTE REGARDING FORWARD LOOKING STATEMENTS

Statements herein may constitute "forward-looking statements" within the meaning of Section 27A of the Securities Act of 1933, as amended (the "Securities Act"), and Section 21E of the Securities Exchange Act of 1934, as amended (the "Exchange Act").These forward-looking statements are based upon our current expectations, estimates, assumptions and beliefs concerning future events and conditions, and may discuss, among other things, expectations about products and product performance, effectiveness of the partnership with WeSecure and the ability to implement VirnetX's technology into WeSecure's products and services and to help organizations worldwide enhance their cybersecurity posture. Any statement that is not historical in nature is a forward-looking statement and may be identified by the use of words and phrases such as "anticipates," "believes," "estimates," "expects," "intends," "plans," "predicts," "projects," "will be," "will continue," "will likely result in" and similar expressions. Readers are cautioned not to place undue reliance on forward-looking statements. Forward-looking statements are necessarily subject to risks, uncertainties, and other factors, many of which are outside our control, and could cause actual results to differ materially from such statements and from our historical results and experience. These risks, uncertainties and other factors include, but are not limited to risks detailed in our filings with the Securities and Exchange Commission (the "SEC"), including in our Annual Report on Form 10-K for the year ended December 31, 2022, and other filings and reports that we may file from time to time with the SEC. Readers are cautioned that it is not possible to predict or identify all the risks, uncertainties and other factors that may affect future results and that the risks described herein should not be considered a complete list. Any forward-looking statement speaks only as of the date on which such statement is made. Except as required by law, we undertake no obligation to update or revise any forward-looking statement as a result of new information, future events or otherwise.

Contact:VirnetX Holding Corporation415.505.0456[emailprotected]

SOURCE VirnetX Holding Corporation

See the article here:
VirnetX Partners with WeSecure - PR Newswire

Read More..

Noname Security Announces the Industry’s First – GlobeNewswire

SAN JOSE, Calif., April 05, 2023 (GLOBE NEWSWIRE) -- Noname Security, the leading provider of complete and proactive API security, today announced Noname Public Sectors Hardened Virtual Appliance making the API security platform available to the U.S. Federal Government, highly regulated industry customers, and FedRAMP-authorized vendors. The appliance is the first of its kind in the comprehensive API security space and is designed to deliver a drop-in, secure, and scalable system for discovering, monitoring, and protecting mission-critical APIs and data.

Governments and highly regulated industries have unique security needs. Having worked closely with many Federal agencies during my career, I know how impactful it will be to provide this level of security and insight into APIs and provide options that make it easy to meet government standards, said Dean Phillips, Executive Director of Public Sector Programs at Noname Security. The government and regulated industries are not immune from cyber criminals, they are targeted as much if not more than most organizations. Were excited to arm them with the tools they need to protect their assets.

Federal agencies can use the Noname API Security Platform to protect their APIs in real-time and detect vulnerabilities before they are exploited. Noname Securitys Hardened Virtual Appliance makes the API security platform available completely offline with no reliance on internet connectivity, perfect for isolated and controlled environments. It is a finely tuned package of advanced software and premium support built and secured to Federal Government specifications, enabling customers to comply with the most rigorous standards, including Federal Information Processing Standards (FIPS)1 and Defense Information Systems Agency (DISA) Secure Technical Implementation Guides (STIGs)2. Noname collaborated with a FedRAMP 3PAO, The MindPoint Group, on the development of the Noname Hardened Virtual Appliance.

Noname Securitys Hardened Virtual Appliance enables access to a powerful, complete, and easy-to-use API security platform that helps:

Noname Public Sector LLC has made it easier to deploy, configure and manage the platform via the new Noshell() interface. The shell offers innovative features such as the ability to perform on-demand STIG audits of the internal system itself, while aiming to reduce the overall attack surface of the system.

To learn more about Noname Securitys hardened platform, please contact publicsector@nonamesecurity.com.

Supporting Resources

About Noname Security & Noname Public Sector LLCNoname Public Sector LLC empowers the worlds most critical organizations to protect their most important data. With decades of military and civilian public sector experience, Noname Public Sector combines a deep understanding of government agency requirements with leading expertise on their unique API security considerations. Government agencies using Nonames complete, proactive API security solutions can securely harness their data to serve the public and stay ahead of adversaries. Noname Public Sector LLC is privately-held and based in Herndon, VA.

Noname Security is the leading provider of complete, proactive API Security. Noname works with 20% of the Fortune 500 and covers the entire API security scope Discovery, Posture Management, Runtime Security, and API Security Testing. Noname Security is privately held, remote-first with headquarters in Silicon Valley, California, and offices in Tel Aviv and Amsterdam.

Media ContactStephanie SchlegelOffleash for Nonamenoname@offleashpr.com

1 FIPS 140-2, titled Security Requirements for Cryptographic Modules, is a U.S. government computer security standard used to accredit cryptographic modules. Compliance with the standard is required for equipment used in federal facilities and has become a common stipulation in other public and private IT deployments.

2 Security Technical Implementation Guides (STIGs) are configuration standards developed by the Defense Information Systems Agency (DISA). They are designed to make device hardware and software as secure as possible, safeguarding the Department of Defense (DoD) IT network and systems.

Compliance with STIGs is a requirement for DoD agencies, or any organization that is a part of the DoD information networks (DoDIN). This includes defense contractors that connect to the DoD network or system.

STIGs are also aligned with the Centre for Internet Security (CIS) benchmarks - Level 3.

Read more from the original source:
Noname Security Announces the Industry's First - GlobeNewswire

Read More..

I accidentally hacked into someone else’s TikTok account. It’s more … – Euronews

After avoiding the TikTok craze for the last five years, I finally cavedtwo months ago and set up an account for work purposes to follow Euronews' recently launched profile.

I used my phone number to sign up as it was new and barely used for anything else, and it was pretty much the personal information I cared the least about.

The platform sent me a login code via SMS, I gave Euronews a follow, scrolled a couple of videos on the "for you" page, and then forgot about my account for a month or so.

The sign-up and login process was very easy. Perhaps a little too easy.

A couple of weeks later, when I next logged into my account, my profile name was different, I had posted five cat videos, and was friends with someone called "Cookies Galaxy".

How was that possible? I appeared to be logged into someone elses account.

According to TJ Sayers, Cyber Threat Intelligence Manager at CIS Center for Internet Security, this is a fairly common problem.

"It's kind of a circumstantial thing where someone will get a new number and move on from an old phone number, and the cellular provider relocates that number to somebody," he told Euronews Next.

I had access to the personal information of the account holder (who appeared to have been inactive since 2020), including a list of comments they had made, every single one of their likes, their direct messages, and their email address.

"It sounds like what happened to you is maybe the persons account you got into didn't have any other additional step for authentication (besides their phone number) when they created their account," he further explained, "so you were able to use the number and log into the account".

While my switch happened unintentionally, malicious attempts to take over phone numbers have boomed with the rise in popularity of cryptocurrencies in 2019, according to the cyber expert. Hackers have increasingly tried to gain access to and lock users out of their phones to take control of important banking accounts, including digital wallets.

"Some people are actively trying to compromise phone numbers and email addresses in order to gain access to accounts for other nefarious purposes," said Sayers.

There are two ways of taking over someone elses number, or "SIM swapping". Hard swapping entails taking control of a persons physical SIM card, while the soft version implies calling the phone provider and impersonating the owner of the number by using information, such as the persons date of birth or address, openly available on the Internet.

"People don't even think that when they post social media stuff, it could be used by an attacker," said Sayers, adding, "what [scammers] will do is socially engineer that customer service agent into transferring your number to their device".

While a pin code is enough to avoid hard SIM swapping, preventing soft swapping takes more effort.

Asking your provider to set up a two-step code with a passphrase or a specific number is one way to do that. To avoid having your social media taken over, you can also use an apps registration lock, which can link your account to non-phone number-based identifiers.

For TikTok, the most straightforward solution is to avoid signing up with your phone number. In addition, you can also set up two-factor authentication (2FA), an extra pin generated on the spot, on top of your regular password. TikTok is still trialing this, but 2FA is already in use at other social media companies, such as Instagram.

Still, experts recommend refraining from using 2FA with text messages, as inadvertent swapping can still occur. "Once that happens, (scammers) can go and reset all of your accounts, because theyll get all of your two-factor authentication codes," said Sayers.

"Back when 2FA or multifactor came around, the predominant venue was to either get the code via text message or to get it via e-mail. Unfortunately, the threat landscape has evolved quite substantially and text messages are no longer the best practice for receiving authentication codes," he added.

"Email is a good option, but even better than that is to have some form of an app on your phone. So like Google Authenticator, Microsoft Authenticator, or Authy".

While authenticators are easily available and companies such as Twitter are moving away from texts, according to Sayers, industry buy-in is still behind.

"It's not really a technological next step that we need. It's more of an adoption next step. We're still pretty behind the curve with trying to get people away from text messages," he said.

Meanwhile, physical security keys such as Yubikey, which need to be plugged into a computer to authenticate and are deemed the most secure authentication technology right now, are becoming more widespread.

"Of course, we're going to see threat actors evolve and they'll start trying to attack those other new methods and then new technology will come out," warned Sayers, adding that the damage a person can suffer will depend on the use they make of social media accounts.

Reputational damage could be huge, according to the expert, but "spear phishing" - gaining access to sensitive data by impersonating the person for nefarious reasons - is also likely.

We live in a virtual world and a lot of times, especially post-COVID, a lot of people are working remotely. So if you can take over a social media account, people may not even second guess that you're contacting them through that account because it looks like you're them. So they can use that to try to gain access to more sensitive information, he explained.

As a bottom line, the expert is pretty clear. "Generally, for social media security, you can't go wrong with a unique long password, and I really emphasise unique and long," he said.

Read more:
I accidentally hacked into someone else's TikTok account. It's more ... - Euronews

Read More..

The 10 Coolest IoT Security Companies: The 2023 Internet Of … – CRN

Security News Dylan Martin April 04, 2023, 09:00 AM EDT

As part of CRNs 2023 Internet of Things 50 list, heres a look at the tools and vendors leading the way in IoT security.

The need for better IoT security capabilities is greater than ever before, and that isnt expected to change any time soon.

This ongoing necessity to monitor and protect against threats to a wide range of connected devices was recently underlined by the U.S. Government Accountability Office, which said in December that the countrys 16 critical infrastructure sectors face increasing cybersecurity threats.

Its not just individual agencies that see the problem. In early March, the Biden administration called for a greater focus on developing secure IoT devices as part of its new National Cybersecurity Strategy, building on previous legislation and other government efforts addressing the issue.

Too often they have been deployed with inadequate default settings, can be difficult or impossible to patch or upgrade, or come equipped with advancedand sometimes unnecessarycapabilities that enable malicious cyber activities on critical physical and digital systems, the White House said in its strategy outline. Recent IoT vulnerabilities have shown just how easily bad actors can exploit these devices to construct botnets and conduct surveillance.

As part of CRNs 2023 Internet of Things 50 list, heres a look at the tools and vendors leading the way in IoT security.

Dylan Martin is a senior editor at CRN covering the semiconductor, PC, mobile device, and IoT beats. He has distinguished his coverage of the semiconductor industry thanks to insightful interviews with CEOs and top executives; scoops and exclusives about product, strategy and personnel changes; and analyses that dig into the why behind the news. He can be reached at dmartin@thechannelcompany.com.

Read more here:
The 10 Coolest IoT Security Companies: The 2023 Internet Of ... - CRN

Read More..

ICS kill chain: Adapting the cyber kill chain to ICS environments – TechTarget

A cybersecurity kill chain is a framework that helps security teams understand the sequence of events during an external attack. Derived from the military concept that identifies the steps in a military attack, a cyber kill chain breaks a cyber attack into steps to help security analysts understand the behaviors and tactics of threat actors.

SANS Institute released the Industrial Control System Kill Chain in 2015 to help analysts understand attackers' behaviors and tactics specifically in ICS attacks. Based on Lockheed Martin's IT Cyber Kill Chain, the ICS Cyber Kill Chain accounts for specific ICS security threats and the layered nature of ICS environments today.

The ICS Kill Chain is especially useful when conducting risk assessments and pen tests against ICS environments. In Chapter 17, "Penetration Testing ICS Environments," of Industrial Cybersecurity, Second Edition, author Pascal Ackerman describes the ICS Kill Chain, including its evolution from the cyber kill chain, steps and phases, as well as how to base pen tests on the ICS Kill Chain. Download a PDF of Chapter 17 for more on ICS pen tests.

Due to its unique features and deployment, the ICS requires considerable knowledge about the target's industry -- the ICS environment -- to be able to carry out a successful attack. These unique challenges of an industrial control system require the attacker to avoid interfering with the multitude of sensors and controls and automation devices while performing the attack, as well as being able to pivot through multiple layers of networks that are usually found in such environments (the internet to enterprise networks, to the industrial network to enclaves, and so on).

To put these unique challenges into perspective, the SANS Institute (https://www.sans.org/about/) published a report in 2015 that adapts the Cyber Kill Chain to industrial control system environments. This report expands upon the original Intrusion Kill Chain stages by, among other things, dividing the stages into two distinct phases, with the purpose of articulating the ICS characteristics. The following diagram shows the first phase of the ICS Kill Chain:

This first phase is quite similar to the original Kill Chain model and corresponds to what was traditionally called espionage or intelligence operations. Phase 1 reflects the activities and processes of a structured and targeted attack campaign aimed at obtaining the initial foothold into an organization's enterprise/business network. Within this model, the following stages take place:

When the attacker has successfully compromised the target, phase 1 of the ICS cyberattack is considered complete. The attack will continue with the second phase. Note that in some cases, phase 1 of an attack is not implemented. This can be the case where access to the industrial network is gained some other way, such as through an internet exposed ICS system or device or if the attacker comes in through a supply chain compromise, such as a breached vendor or engineering/support company.

The following diagram shows the second phase of a typical ICS cyberattack:

In the second phase, knowledge that was collected during the first phase of the attack is used to prepare the attack on the ICS environment. This phase could follow directly after successfully completing phase 1, but a delay between phases is possible.

Typically, the following stages are part of the second phase of the Cyber Kill Chain:

With that, we've explained the ICS Cyber Kill Chain, detailing how attackers go through distinct attack phases and stages to reach a certain objective. Next, we will learn how to use this model while performing penetration testing engagements.

So, how does this fit into the task at hand; that is, performing ICS penetration test engagements? Let's look at a high-level overview of the ICS Cyber Kill Chain:

Here, we can see that there are four main steps:

To make our penetration test engagement as accurate as possible to the real-world attack approach, we shall tailor the engagement around these four main steps. The specific implementation (tools, techniques, and procedures used) of the engagement should be tailored to the target organization and environment and take into account aspects such as rules of engagement (what is off limits, when, what, how, and so on), the target's ICS environment, and other unique characteristics.

About the authorPascal Ackerman is a seasoned industrial security professional with a degree in electrical engineering and more than 20 years of experience in industrial network design and support, information and network security, risk assessments, pen testing, threat hunting and forensics. His passion lies in analyzing new and existing threats to ICS environments, and he fights cyber adversaries both from his home base and while traveling the world with his family as a digital nomad. Ackerman wrote the previous edition of this book and has been a reviewer and technical consultant of many security books.

The rest is here:
ICS kill chain: Adapting the cyber kill chain to ICS environments - TechTarget

Read More..

Why you should spring clean your home network and audit your … – We Live Security

Do you know how many devices are connected to your home network? You dont? This is precisely why its time for a network audit.

The rite of spring cleaning is clearly good for your home and your mind and well-being, but trust me, your home network and all the devices connected to it could use it, too.

Yesterday, we looked at a few simple ways to breathe new life into your computers, smartphones and tablets. But as wireless connectivity in particular makes it easy to lose track of all the devices connected to your home network, lets now pick up where we left off and see how you can get an overview of all the devices connected to your network and how to deep-clean it to help keep your personal information safe and secure.

In addition, the tradition of spring cleaning is also a great opportunity to ensure you have complete backups of all your (important) files should a data disaster strike. With this in mind, well look at why you should check your backups and ensure you use a solid backup routine all year round.

Security software such as ESET Internet Security or ESET Smart Security Premium lets you easily see and review a list of all devices connected to your home network. If, however, you dont use such reputable multi-layered security software (big mistake!), you need to audit your network-connected devices using other methods. These include dedicated network scanning tools, but lets face it, its easier simply to log into your routers browser-based control panel.

To do this, enter your routers IP address into your web browsers URL bar (most commonly, the default IP address for routers is 192.168.0.1 or 192.168.1.1) and enter your administrator name and password. If, heaven forbid, you have never set up any and use the default and easy-to-guess login credentials (more on this in a minute), look at the back of the router, check the devices documentation or search for the credentials online.

Once youre logged in, look for Connected Devices, Attached Devices or similar to see a list of all computers, smartphones, tablets, streaming sticks, kettles, webcams, gaming consoles, network storage devices, digital assistants or other gizmos connected to your network.

If you spot your old devices that you no longer use or you dont recognize some devices, boot them out of your network.

While youre at it, make sure you use a strong and unique password for your admin account and your wireless connectivity, ideally together with an SSID (i.e., the name of your wireless network) that doesnt identify you and your network.

Also, turn on a strong encryption standard, ideally the WPA2 protocol or, even better, the newer WPA3 as long as your router supports it. Disable all sorts of features you dont need or that pose a risk, such as Wi-Fi Protected Setup (WPS) or Universal Plug and Play (UPnP). For a deeper dive into how to secure your router, head over to this article.

Usually, most users will keep all devices on a single network. However, this involves the risk that attackers can use vulnerabilities in your smart kettle or other devices to gain access not only to the device, but also to the data or cameras and microphones stored in the network.

The remedy here is a strict separation of the devices. A good, inexpensive and easy-to-implement option is to use a guest Wi-Fi. Devices that only require an internet connection for correct operation can be treated as guests and assigned to the corresponding, second network. Should one of the devices be taken over or compromised by cybercriminals, your private data and images remain safe.

Also check whether all devices and especially the router are supplied with the latest updates. Vulnerabilities in the firmware are repeatedly exploited by cybercriminals.

Nothing is as valuable as a secure home. This also applies to the digital side of the home. Why use the most secure doors and windows if criminals from all over the world can still access your camera or private data?

Speaking of which, if any private information doesnt really need to be accessible from your network, why not move it offline?

Backups, i.e. the regular storage of files, photos, videos, etc. on external storage media, can be done quite inexpensively, whether via cloud storage offers from Google Drive, Microsoft One Drive, Apple iCloud, Dropbox or via your own network-attached storage (NAS) devices .

NAS and cloud storage have the advantage over USB sticks and DVDs that the data is stored almost fail-safe. If your thumb drives or DVDs are stolen or suffer physical damage, the data on it is lost. If a disk in the NAS fails, the contents are often mirrored on a second drive (RAID) check whether your NAS has a RAID functionality.

Meanwhile, data stored in the cloud is mirrored multiple times and is only lost in an extremely unlikely event. Also, in most cases, the data can be conveniently accessed from anywhere in the world and from outside of your home network.

But thats exactly where the problem lies for security- and privacy-conscious people: the data is outside of your network, and as a user you have to trust your service provider for the protection and confidentiality of your data. If using cloud storage, take things into your own hands and encrypt the data before uploading it to the cloud.

Local backup options include all visible media, such as USB sticks, USB hard drives, CD/DVD, NAS devices, etc. These are easy to control and hide if necessary, but they also have disadvantages. Except for the NAS, we have no or hardly any (automatic) redundancies, such as RAID functionalities, i.e. fail-safety.

Also, you should be wary of having the backup media constantly connected to the computer or smartphone (via the network). Ransomware that attacks your system may also try to compromise your connected storage media as well.

To counter that, create a ritual: After you have finished your work (creating/editing photos, writing texts, etc.), connect the storage medium to the computer or smartphone and back up the new data. Then disconnect the backup medium again.

If the storage contents are updates of already existing files, replace them in the target medium. Also, force yourself to back up only relevant content. This will not only save you storage space, but also saves time when cleaning up and sifting through at a later time.

Storage options in the cloud may be free of charge, virtually fail-safe and, thanks to cross-platform apps, can be accessed from just about anywhere. However, the stored content is also outside your control. If criminals gain access to the storage servers anywhere in the world, your data could be on display in the worst case scenario. Since you are only backing up important, privately valuable data, this may be a big problem.

With this in mind, deactivate any automatic backups of your smartphone pictures or documents. Control the upload to cloud storage services beyond that. Be deliberate when it comes to creating backups in the cloud. This includes making sure that the corresponding data is reliably encrypted so that only you and people and apps authorized by you can read it.

A classic hard disk failure is painful if there is no corresponding backup. However, if ransomware attacks your machine(s), the damage is considerably limited if the valuable images and documents are backed up and can be restored without paying a ransom.

Read the original here:
Why you should spring clean your home network and audit your ... - We Live Security

Read More..

Warning out on Holy Week cyber hackers – Philstar.com

MANILA, Philippines If Filipinos love long weekends, cyber criminals do, too, according to multinational cybersecurity giant Kaspersky.

As the country goes into its annual long Lenten holidays this week, Kaspersky reminded cyber and social media-savvy Filipino netizens to be wary of the mischief that cyber hackers will be up to as they ramp up their activities during the extended break.

Kapersky noted that the $81-million Bangladesh Bank heist perpetrated by hackers in 2016 was done during a long weekend.

Unfortunately, cyber criminals get excited about holidays, too. To refresh everyones memory, the $81-million Bangladesh Bank heist back in 2016 is an example of a successful cyber attack, which happened on the first day of the Lunar New Year, a national holiday in the Philippines and the rest of Asia, Kaspersky said.

There are 18 official public holidays in the Philippines and this 2023, there are 12 long weekends resulting from the 18 official public holidays and the holiday economics policy enforced by the government, according to the company.

Now that the world has reopened, travel is back with a vengeance this year, hence the term revenge travel. Whether Filipinos are scheduling holiday trips or just staycationing during long weekends, its important to observe simple digital security practices so you can get to sit back and relax as you take your well-deserved vacation, Chris Connell, Kaspersky managing director for Asia Pacific, said.

Advertising

Scroll to continue

Security-first thinking opens doors for a more enjoyable holiday break, especially for Filipinos who are amongst the worlds most active online users, Connell added.

He stressed that both individuals and companies should be extra mindful of personal cyber security best practices and internet hygiene during the long holidays.

For companies, Kaspersky said they should conduct drills to remind vacationing employees on the need to ensure data encryption, two-factor authentication, keeping strong passwords and locking devices when not in use.

These drills should reinforce the need to remember the steps to take if their device ends up getting stolen, about the hazards of charging smartphones through a wall socket and not through USBs at airports and other public places, as these can be used to steal data from a device and infect it with malicious software, such as spyware.

Kaspersky said companies should also urge employees to log out and terminate unnecessary virtual private network or VPN connections to the corporate infrastructure; end unnecessary sessions that employees have left on any device for an extended period of time and check that the list of employees with access to the corporate network via VPN or remote desktop protocol include only authorized users.

For individuals, Kaspersky advised them to only browse trusted apps and websites and avoid clicking on links or opening email attachments from travel sites when receiving confirmations.

Trusted companies include such letters in the bodies of their emails. Malware is often disguised as an attached confirmation letter, it said.

Kaspersky gave these other tips:

Bring two or three or more credit or debit cards to have a backup plan in case of loss or need to cancel one.

Never leave valuables unattended. Put large amounts of cash and mobile devices or laptops in the hotel safe.

Use a credit card as most have built-in protections against fraud. There is no protection against a scammer if you send them cash or even check or debit card payment in some cases. A money transfer service is not advisable.

Ensure their devices have security software installed, ideally with anti-theft technology.

Kaspersky is a global cyber security and digital privacy company founded in 1997.

TheCybercrime Investigation and Coordinating Center (CICC) is launching its digital assistant the CYRIchatbot to ensure the continued gathering ofcybercrime complaints round-the-clock, any day of the week, in time for this long Lenten break.

The CICC said the CYRI chatbot would be open even onHoly Thursday and Good Friday.

CYRI is a combination of the syllables CY, derived from the word cyber,and RI, taken from the wordcrime. In Greek, the name CYRI means powerful, perfectionist and capable.

CICC executivedirector Alexander Ramos expressed hope that CYRI willhelp boost the agencys capability in fightingcybercrimes.

ThroughCYRI, wecan immediately get complaints and concerns relatedto cybercrimes, dataprivacy and SIM registration, Ramos said.

Our agentson duty can immediately advise or act on a complaint 24/7, he added.

Complainants can chat with CYRI either in English or Filipino. Other regional languages such as Cebuano and Ilocano will be introduced soon.

People cansoonchoose the languagethat they understandandthey can relate with and feel more confident in answering questions, Ramos said.

The CICC assured thae public there is no danger of case or identity leaks of complainants as the CYRI chatbot is covered by the agencys privacy policy.

To chatwithCYRI, the CICC said that complainants shouldvisithttps://www.facebook.com/CICCgovph.

Thosewho preferto talkdirectly to agents can call theInter-Agency Response Centerhotline 1326which is open 24 hours daily, even during the Holy Week.

People who are going on a long vacation during the Holy Week break should refrain from posting their travel tickets on their social media accounts, the Philippine National Police (PNP) said yesterday.

PNP spokesperson Col. Jean Fajardo urged travelers not to post their travel tickets and their whereabouts online so as not to alert criminals that their houses are unattended.

Lets not post our plane tickets, our bus tickets, and we keep doing this to remind the public against criminals who monitor on cyberscape, Fajardo said in Filipino at the Laging Handa briefing.

Unlike in the past three years, when the country was under stricter quarantine protocols due to the COVID-19 pandemic, people can move without restrictions this year.

With activities now on pre-pandemic levels, criminals have returned to their nefarious activities.

On the part of the PNP, expect our maximum visibility in areas of convergence to remain until the end of the Holy Week and for the duration of the summer season, Fajardo said.

The PNP went on heightened alert over the weekend, whichmeans that 80 percent of the 227,000-strong police force are available for deployment.

With nearly 78,000 police officers on deck, Fajardo assured the public that all security measures are in place to ensure the publics safety during Holy Week.

Fajardo urged travelers to arrive early at transport terminals to avoid the influx of people.

Do not bring large baggage anymore because expect that traveling will be crowded these days, she said.

Meanwhile, the Taguig City government recently opened The Life of Christ in TLC Village in Barangay Lower Bicutan to give residents a place and time to reflect during the Lenten season.

Taguig City Mayor Lani Cayetano said constituents can reflect on Jesus Christs passion, death and resurrection on various corners of the park, which features the Stations of the Cross, prayer corner and prayer boxes and art installations.

Cayetano expressed hope that regardless of spiritual affiliations and ways of celebrating the Holy Week, people will focus on being grateful for the greatest sacrifice of Jesus Christ who saved us from our sins.

I also encourage the younger generation to study and experience the passion of the Christ, especially at this time, when our youth are going through so many trials, she said in a statement. Emmanuel Tupas

Read more:
Warning out on Holy Week cyber hackers - Philstar.com

Read More..

TikTok is to be banned from government devices over security fears. How big is the threat and could it soon be banned for everyone? – ABC News

For months, governments across the world have rattled their cyber sabres, threatening to cut TikTok off at the knees.

The reach and influence of the popular app, harnessed by everyone from porn stars to politicians, is undeniable, with more than 1 billion monthly users when measured in 2021.

But yesterday, the Albanese government finally swung its own sword, announcing thatpublic servants would soon be banned from having the popular app on their work-issued devices, over fears it could be a secret Chinese tool.

The move made Australia the last nation in the Five Eyes intelligence network which includes the United States, Canada, United Kingdom and New Zealand to forbid officials from using the app, over concerns that it could be used by the Chinese Communist Party (CCP) for political interference.

But while TikTok will soon be wiped from the public service's phones, it raises three key questions for everyday Australian who use TikTok on the train or in front of the TV:

It depends on who you ask.

There's no doubt that TikTok has become a powerful platform which is being used to directly reach new and younger audiences, who have long been untethered to traditional broadcasting because of age, interest or, more likely, both.

The ban has, predictably, infuriated TikTok which is owned by ByteDance, a multi-billion dollar Chinese internet giant, that fiercely denies it poses any risk to national security.

TikTok's Australian boss, Lee Hunter, said there was no evidence the app was a security risk to Australians.

"We're extremely disappointed with this decision. In our view, this is driven by politics and not by fact," Mr Hunter said.

But Fergus Ryan, a China analyst at the Australian Strategic Policy Institute, said that's not true.

"We've known for years now that TikTok user data is accessible in China, and because of the suite of national security laws that are in place in China, it means that there's effectively no barrier between user data and the Chinese party state," he said.

Mr Ryan said that type of data was incredibly valuable to a foreign government.

He said the greater risk facing Australians was political interference because of the "enormous leverage" that China's government has over ByteDance, due to Beijing's national security laws.

"It would be trivially easy for ByteDance, having been compelled to by the CCP, to either promote or demote certain political messages, and the effect that has is to distort the political discussions that Australians are having on that app," he said.

The Australian ban follows months of pressure on the Chinese-owned app which has faced bruising congressional hearings with angry American politicians, and been the target of a scathing submission to Australia's select committee on foreign interference.

Alastair MacGibbon, the chief strategy officer at cybersecurity firm CyberCX, said Chinese national security laws were a key concern for politicians with a ban in the forefront of their minds.

Mr MacGibbon is a former national cybersecurity adviser, the former head of the Australian Cyber Security Centre, and was the nation's first eSafety Commissioner.

"The laws in China compel organisations to do what they say," he said

"Now, if you're a Chinese company, why wouldn't you do that? It's literally a matter of whether you keep your freedom and your company so of course, they will comply.

Mr MacGibbon said TikTok had a poor track record.

"If you're a contractor doing work for the government then your device might be targeted for the purposes of finding out about that work," Mr MacGibbon said.

"It might be that you're a journalist and TikTok is upset at the articles that you're writing, and actually uses that data to track you and find out who your sources are.

"All of those things are real and happen and we have to wake up as a country and ask ourselves not whether a normal government would do this, the question is whether or not the Beijing government would do this.

"The answer, sadly, is yes."

Influencers rejoice, probably not.

"I doubt it. I don't see the Australian government banning TikTok in Australia," Mr MacGibbon said.

"I can see why you would makea decision about Huawei sitting inside 5G networks because ultimately that was down to the ability for essentially China to turn off our telephone systems.

"There's a big difference between that and an app on the telephone."

But Mr MacGibbon said there needed to be a greater conversation about the use of critical technologies in Australia.

"If we're ripping cameras out of Parliament House and we're banning politicians from being able to use TikTok, then we need to start asking why we're allowing these technologies much more broadly in the economy," he said.

View original post here:
TikTok is to be banned from government devices over security fears. How big is the threat and could it soon be banned for everyone? - ABC News

Read More..

Chinese Tech Tycoon’s Ex-Wife Becomes Billionaire In Divorce … – Forbes

Zhou Hongyi delivers a speech during the China Internet Security Conference 2017 (ISC) at China National Convention Centre on September 12, 2017 in Beijing, China.

Zhou Hongyi has reached an agreement with his former wife, Hu Huan, to transfer $1.3 billion worth of shares in Qihoo 360 Technology to her as part of their divorce settlement. The couples separation will turn Hu into a billionaire, thanks to an almost 200% surge in the companys Shanghai-listed shares this year.

The 52-year-old chairman and chief executive of the Beijing-based internet security and search company has agreed to give Hu 446.6 million shares in the tech firm, according to a late Tuesday stock exchange filing. Zhou will continue to be the controlling shareholder of the company he founded more than three decades ago after relinquishing the 6.25% stake in Qihoo 360, the filing says.

Investors have been snapping up Qihoo 360s stock after it announced in February that it plans to develop its own version of a conversational ChatGPT bot. The tech firm unveiled its product in March, although the bot was subsequently featured in video clips by local media giving an incorrect answer when asked how many goals Argentine football player Lionel Messi had scored.

The company said in Tuesdays stock exchange filings that Hu isnt involved in its management, and doesnt hold any positions at Qihoo 360 nor its subsidiaries. Hu is said to be a permanent resident of Singapore, and does not intend to reduce her shareholding in Qihoo 360 within the next 6 months, while Zhou has pledged not to reduce his stake in the next 12 months.

Zhou saw his wealth peak at $11.3 billion in 2018, when the tech mogul relisted Qihoo 360 in Shanghai, after completing a $9.3 billion buyout and privatization from the New York Stock Exchange in 2016. Investors at home gave the antivirus software developer a richer valuation initially, but shares took a tumble in the years that followed as Chinas crackdown on the broader internet industry weighed on investor sentiment.

In 2019, Zhou made headlines for publicly sharing his view on the working culture of Chinese technology companies. He said during a media briefing at the time that its impossible to strike the right balance between spending time with family while working long hours. Chinas tech giants have been known to adopt a so-called 996 schedulewhere people are expected to work from 9 a.m. to 9 p.m., six days a week.

The couples divorce will rank as one of the costliest separations in China. Gaming tycoon Zhou Yahui gave his ex-wife a stake worth $1.1 billion in Beijing Kunlun Tech as part of their divorce agreement in 2016. And real estate mogul Wu Yajun transferred in 2012 a 30% stake in Longfor Propertiesworth almost $3 billion thento ex-husband Cai Kui after reaching their divorce settlement.

Continue reading here:
Chinese Tech Tycoon's Ex-Wife Becomes Billionaire In Divorce ... - Forbes

Read More..

Antiwar officer from Putins elite security team defects – Boston Herald

In this image from video provided by the Dossier Center, a London-based investigative group funded by Russian opposition figure Mikhail Khodorkovsky, Gleb Karakulov speaks during an interview in Turkey in December 2022. Karakulov, who was responsible for setting up secure communications for Russian President Vladimir Putin, said moral opposition to Russias invasion of Ukraine and his fear of dying there drove him to speak out, despite the risks to himself and his family. He said he hoped to inspire other Russians to speak out also. Our President has become a war criminal, he said. It is time to end this war and stop being silent. (Dossier Center via AP)

By ERIKA KINETZ (Associated Press)

LONDON (AP) On Oct. 14, a Russian engineer named Gleb Karakulov boarded a flight from Kazakhstan to Turkey with his wife and daughter. He switched off his phone to shut out the crescendo of urgent, enraged messages, said goodbye to his life in Russia and tried to calm his fast-beating heart.

But this was no ordinary Russian defector. Karakulov was an officer in President Vladimir Putins secretive elite personal security service one of the few Russians to flee and go public who have rank, as well as knowledge of intimate details of Putins life and potentially classified information.

Karakulov, who was responsible for secure communications, said moral opposition to Russias invasion of Ukraine and his fear of dying there drove him to speak out, despite the risks to himself and his family.

Our president has become a war criminal, he said. Its time to end this war and stop being silent.

Karakulovs account generally conforms with others that paint the Russian president as a once charismatic but increasingly isolated leader, who doesnt use a cellphone or the internet and insists on access to Russian state television wherever he goes.

He also offered new details about how Putins paranoia appears to have deepened since his decision to invade Ukraine in February 2022. Putin now prefers to avoid airplanes and travel on a special armored train, he said, and he ordered a bunker at the Russian Embassy in Kazakhstan outfitted with a secure communications line in October the first time Karakulov had ever fielded such a request.

A defection like Karakulovs has a very great level of interest, said an official with a security background from a NATO country, who spoke on condition of anonymity to discuss sensitive political matters.

That would be seen as a very serious blow to the president himself because he is extremely keen on his security, and his security is compromised, he said.

The Kremlin did not respond to requests for comment. Neither did Karakulovs father or brother.

As an engineer in a field unit of the presidential communications department of the Federal Protective Service, or FSO, Karakulov was responsible for setting up secure communications for the Russian president and prime minister wherever they went. While he was not a confidant of Putins, Karakulov spent years in his service, observing him from unusually close quarters from 2009 through late 2022.

Karakulov, his wife and his child have gone underground, and it was impossible to speak with them directly due to security constraints.

The Dossier Center, a London-based investigative group funded by Russian opposition figure Mikhail Khodorkovsky, interviewed Karakulov multiple times and shared video and transcripts of more than six hours of those interviews with The Associated Press, as well as the Danish Broadcasting Corporation DR, Swedish Television SVT, and the Norwegian Broadcasting Corporation NRK.

The Dossier Center confirmed the authenticity of Karakulovs passport and FSO work identity card, and cross-checked details of his biography against Russian government records, leaked personal data and social media postings, all of which the AP reviewed.

The AP also independently confirmed Karakulovs identity with three sources in the U.S. and Europe and corroborated his personal details, including passport numbers, date and place of birth, two registered addresses, and the names and ages of family members. The AP was unable to verify all details of his defection.

The AP also confirmed that Karakulov is listed as a wanted man in the Russian Interior Ministrys public database of criminal suspects. The ministry initiated a criminal investigation against Karakulov on Oct. 26 for desertion during a time of military mobilization, according to documents obtained by the Dossier Center and seen by the AP.

The FSO is one of the most secretive branches of Russias security services.

Even when they quit, they never talk, but they know a lot of details of the private life of the president and the prime minister, said Katya Hakim, a senior researcher at the Dossier Center.

Karakulov moved as part of an advance team, often with enough specialized communications equipment to fill a KAMAZ truck. He said he has taken more than 180 trips with the Russian president, and contrary to widespread speculation, Putin appears to be in better shape than most people his age. Putin has only canceled a few trips due to illness, he said.

Unlike the prime minister, Putin does not require secure internet access on his trips, Karakulov said.

I have never seen him with a mobile phone, he said. All the information he receives is only from people close to him. That is, he lives in a kind of information vacuum.

Karakulovs work brought him to luxury hotels for summits, beach resorts in Cuba, yachts and aboard a special armored train outfitted for the Russian president.

Putins train looks like any other, painted gray with a red stripe to blend in with other railway carriages in Russia. Putin didnt like the fact that airplanes can be tracked, preferring the stealth of a nondescript train car, Karakulov said.

I understand that hes simply afraid, he said.

Putin began to use the train regularly in the run-up to the February 2022 invasion of Ukraine, Karakulov said. Even last year, Putin continued to insist on strict anti-COVID-19 measures, and FSO employees took shifts in two-week quarantine so there would always be a pool of people cleared to travel with Putin on the train, he said.

Putin has set up identical offices in multiple locations, with matching details down to the desk and wall hangings, and official reports sometimes say hes one place when he is actually in another, according to Karakulov and prior reporting by a Russian media outlet.

When Putin was in Sochi, security officials would deliberately pretend he was leaving, bringing in a plane and sending off a motorcade, when he was in fact staying, Karakulov said.

I think that this is an attempt to confuse, first, intelligence, and second, so that there are no assassination attempts, he said.

Karakulovs defection was a surprising turn for a family steeped in patriotic military tradition. Karakulovs father is a former military man, and his brother is a local government official.

Karakulov said he couldnt tell his parents about his disillusionment, because their minds had been molded by years of watching Russian state television. So he never told them he was leaving.

But he denies that he is unpatriotic and urged others to break their silence to stop the war.

Patriotism is when you love your country, he said. In this case, our homeland needs to be saved because something crazy and terrible is happening.

___

Associated Press reporters Jamey Keaten in Geneva, Aamer Madhani in Washington and Joanna Kozlowska in London contributed to this report.

Read more from the original source:
Antiwar officer from Putins elite security team defects - Boston Herald

Read More..