Page 2,455«..1020..2,4542,4552,4562,457..2,4602,470..»

National Security Podcast: Minister Paul Fletcher on governing in the Internet age – Policy Forum

In this episode of the National Security Podcast, The Hon Paul Fletcher MP Minister for Communications, Urban Infrastructure, Cities, and the Arts, Member for Bradfield, and previously Director of Corporate and Regulatory Affairs at Optus joins Professor Rory Medcalf in conversation.

In the latest instalment of the Security Summit series on the National Security Podcast Professor Rory Medcalf and The Hon Paul Fletcher MP discuss the role of government in Internet regulation, challenges and threats posed by the internet to everyday citizens, and how the Australian Government is legislating an ever-evolving cyberspace. They explore the Morrison governments recent dealings with Facebook and Google, the eSafety Commissioners role in ensuring online safety, how disinformation and deepfakes may play a role in the future political landscape, and Minister Fletchers new book, Governing in the Internet Age. Listen here:https://bit.ly/3cZw8zS

The Hon Paul Fletcher MP is Minister for Communications, Urban Infrastructure, Cities and the Arts, and the Federal Member for Bradfield. His previous experience includes serving as Parliamentary Secretary to then-Minister for Communications Malcolm Turnbull, Minister for Major Projects, Territories, and Local Government, and Director of Corporate and Regulatory Affairs at Optus.

Professor Rory Medcalf is Head of the National Security College at The Australian National University. His professional experience spans more than two decades across diplomacy, intelligence analysis, think tanks, and journalism.

Wed love to hear your feedback for this podcast series! Send in your questions, comments, or suggestions for future episodes topodcast@policyforum.net. You can also Tweet us@APPSPolicyForumor find us onFacebook.The National Security Podcast and Policy Forum Podare available onSpotify,iTunes,Stitcher, and wherever you get your podcasts.

Here is the original post:
National Security Podcast: Minister Paul Fletcher on governing in the Internet age - Policy Forum

Read More..

A Hacking Spree Against Iran Spills Out Into the Physical World – Wired.co.uk

On July 9 and 10 of this year, hackers disrupted Iranian train services and posted fake delay notices on digital billboards. Long delays due to cyber attacks. More information: 64411, read a message displayed on railway station signs. The phone number is linked to the office of Irans supreme leader, Ayatollah Ali Khamenei.

The railway attacks, according to analysis by Check Point that has subsequently been confirmed by New Yorkbased threat intelligence company Intezer, was linked to a group of hackers dubbed Indra, after the Hindu god of war. The group has also conducted attacks in Syria, and is unlikely to be linked to a country, the analysis says. Check Point says that the little-known group appears to be focused on targeting entities that cooperate with the Iranian regime, and that it has also attacked a currency exchange and a Syria-based private airline, and threatened to attack a Syrian oil refinery in 2019 and 2020.

The office phone number was also briefly displayed on some gas station pumps in October, after a cyberattack paralyzed Irans 4,300 gasoline stations. Thousands of stations were offline for up to 12 days as the system behind government-issued smart cards, which allow people to buy subsidized fuel, was crippled. Motorists complained of chaos as they queued for hours waiting to refill their vehicles. The fuel attack happened around the second anniversary of the Iranian regime hiking fuel prices, then shutting down the internet after people protested the increases.

However, the gas station campaign appears to be separate from the attacks on the railway infrastructure. While an unknown group called Predatory Sparrow claimed responsibility, Iranian officials have said the attack was the work of a state actor. A New York Times report this weekend, citing unnamed US defense officials, linked the attack to Israel. Other recent targets include an Iranian airline, as well as the systems behind the countrys dams and water supplies, other reports say.

Traditionally, these kinds of attacks are reserved to nation states because we are dealing with very complicated infrastructure, Finkelstein says. Various groups have tried to claim responsibility for the attacks. However, multiple security experts point out that attribution lacks any published technical details from officials or the groups that claim to have conducted them.

Originally posted here:
A Hacking Spree Against Iran Spills Out Into the Physical World - Wired.co.uk

Read More..

Take 70% off these eLearning course libraries and a VPN this Black Friday – Boing Boing

We thank our sponsor for making this content possible; it is not written by the editorial staff nor does it necessarily reflect its views.

Have you wanted to learn more about internet security, but don't know where to begin? This online course bundle might be the perfect launch point to start. Each year, our lives rely more and more on the internet, and each year, having good internet hygiene and keeping yourself and your sensitive information safe becomes more important. With the threat of cybercrime playing a bigger role in our lives, understanding the dangers and taking steps to safeguard yourself is paramount.

The Black Friday Mega Lifetime Bundle: StackSkills + VPN Unlimited + Infosec4TC + Stone River is the ultimate online internet skill and security e-learning package. This mega bundle covers everything, from the basics of ethical hacking to useful skills such as coding foundations, and it includes an award-winning VPN to boot. The bundle is on sale for only $37.50 when you use Black Friday promo code BFSAVE70 at checkout.

This bundle includes access to StackSkills and Stone River, two eLearning course platforms that feature nearly 2,000 individual courses spanning thousands of hours of online instruction. The courses cover coding, design, 3D animation, and more, all taught by expert online educators. Dozens of classes are added each month, so you'll always find new skills to learn.

Meanwhile, Infosec4TC is an industry leader in understanding and teaching the fundamentals of the internet security concerns of today and tomorrow. This platinum membership gives you access to courses on hot security topics such as ethical hacking, GSEC, and CISSP.

Finally, this collection includes KeepSolid VPN (trusted by more than 10 million users worldwide) to keep maintain your online privacy. KeepSolid utilizes military-grade 256-bit encryption to deliver reliable security, and its 500+ servers in 80+ countries deliver a highly enhanced internet experience.

Set out to learn industry-leading skills in the tech arena, understand the fundamentals of internet security, and do it all while surfing the web safely and confidently with this Black Friday Mega Bundle, on sale now for $37.50 with code BFSAVE70.

Prices subject to change.

Read the original:
Take 70% off these eLearning course libraries and a VPN this Black Friday - Boing Boing

Read More..

Democratic countries need to think about creating safe, accountable internet: MoS IT – Financial Express

Speaking at the first ever India Internet Governance Forum (IIGF) organised by Ministry of Electronics and Information Technology and National Internet Exchange of India (NIXI), he said India is becoming one of the largest connected nations with 800 million people online.

Democratic countries need to join hands to think about creating safety, trust and accountability on the internet which has no boundaries, Minister of State for Electronics and IT Rajeev Chandrasekhar said on Saturday.

Speaking at the first ever India Internet Governance Forum (IIGF) organised by Ministry of Electronics and Information Technology and National Internet Exchange of India (NIXI), he said India is becoming one of the largest connected nations with 800 million people online.

With the worlds largest rural broadband programme, India would soon have more than 1 billion people on the internet, he noted.Given the size of the internet and cyberspace, which does not have boundaries, it needs cooperation. The world needs to think about it, especially democratic countries and societies, Chandrasekhar said.

He said Prime Minister Narendra Modi launched the Digital India Mission with 3 major objectives to transform lives of Indians, expand economic opportunities with digital entrepreneurship, and enhance strategic capabilities in certain technologies including the internet so that the future of internet is shepherded by countries that are open societies and share the same set of democratic values and respect citizen rights.

IIGF in a lot of ways was about talking and having more stakeholders around the big roundtable i.e. India about how do we keep the internet open? How do we make sure that the internet is safe and trusted by all those people who use it, and safety and trust being extremely important attributes because there are whole new demographics that were not foreseen many years ago which are children, women and the elderly, Chandrasekhar said.

He said the government is committed to connecting all Indians to the internet.

Cyber security expert and a lawyer in the Supreme Court, Pavan Duggal said the government made a comprehensive amendment in 2008 in the IT Act but made cosmetic provisions around security.

That was the time when cybersecurity was beginning to evolve. In 2021 we will have to have a dedicated legal framework for cybersecurity either in the form of dedicated provision under the IT Act or in the form of new legislation. Cybersecurity and cyber resilience need to be mandated, Duggal said.

Voyager Infosec Director Jiten Jain said India is in the dawn of the digital age with abundant skilled manpower but the legal provisions have been reactive in the country instead of being proactive.

We need a law which should be an evolving, agile, living document that deals with the problems of today. Any law which is passed related to IT Act, we need to get it reviewed by Parliament every two years, Jain said.

Get live Stock Prices from BSE, NSE, US Market and latest NAV, portfolio of Mutual Funds, Check out latest IPO News, Best Performing IPOs, calculate your tax by Income Tax Calculator, know markets Top Gainers, Top Losers & Best Equity Funds. Like us on Facebook and follow us on Twitter.

Financial Express is now on Telegram. Click here to join our channel and stay updated with the latest Biz news and updates.

Read more from the original source:
Democratic countries need to think about creating safe, accountable internet: MoS IT - Financial Express

Read More..

Orange Business Services: In 2021, we saw a significant increase in cyber attacks that could compromise systems and user data – The Diplomat Bucharest

Orange Business Services launches the fourth edition of the Business Internet Security 2021 report, which presents and analyzes the latest information in the field of cybersecurity, in the context of rapid digital transformation in all business sectors.

Cyber security challenges have increased significantly in the last year as many companies have migrated to hybrid or remote modes of operation and transformed their business model. The report reveals the main cyber security threats, risks and predictions identified locally by Orange Business Services experts.

According to Business Internet Security, if in 2019 ransomware attacks accounted for only 3 percent of all incidents detected, today, in 2021, are the most common attacks. They represent 31 percent of the total and target, in particular, the health sector and public institutions to compromise IT systems. In second place, totaling 29 percent, phishing attacks continued to be reported locally, especially through SMS, Whatsapp and email campaigns. The main victims of these incidents were customers of banking institutions and retailers.

Industry-level statistics show that this year, the retail industry was the most exposed to cyber attacks. The spectacular evolution of the e-commerce sector, amid the Covid-19 pandemic, has continued with an accelerated pace of online shopping, but also with a significant increase in the number of online stores, which has made cyber risks increasingly bigger for this sector. Thus, 29 percent of all incidents were detected in this industry, followed by the field of transport by 27 percent.

Regarding the cities most affected by cyber attacks in the last 12 months, Bucharest ranks first, with a monthly average of 600,000 incidents detected and prevented, followed by Iasi and Timisoara with 400,000 and 370,000, respectively.

In 2021, we have seen a significant increase in cyber attacks that can compromise user systems and data, both in volume and complexity, with the expansion of software solutions used by companies and individuals. Our security solutions for B2B customers have detected and blocked complex attacks, especially phishing attempts, ransomware and Distributed Denial of Service (DDoS) attacks. However, the most important challenge, among companies, but also among home users, remains the lack of awareness of risks and exposure in the online environment - Ioan Constantin, Cyber Security Expert Orange Romania

The Business Internet Security 2021 report is part of an ecosystem developed by Orange Business Services that aims to raise awareness of cyber security. Thus, through the Business Internet Security (BIS) service, a complete system for securing internet connections, over 8 million threats are identified and blocked monthly in the security infrastructure of Orange business customers.

Post Views: 3,159

Go here to see the original:
Orange Business Services: In 2021, we saw a significant increase in cyber attacks that could compromise systems and user data - The Diplomat Bucharest

Read More..

What is Encryption? Definition, Types & Benefits | Fortinet

Encryption is a form of data security in which information is converted to ciphertext. Only authorized people who have the key can decipher the code and access the original plaintext information.

In even simpler terms, encryption is a way to render data unreadable to an unauthorized party. This serves to thwart cybercriminals, who may have used quite sophisticated means to gain access to a corporate networkonly to find out that the data is unreadable and therefore useless.

Encryption not only ensures the confidentiality of data or messages but it also provides authentication and integrity, proving that the underlying data or messages have not been altered in any way from their original state.

Original information, or plain text, might be something as simple as "Hello, world!" As cipher text, this might appear as something confusing like 7*#0+gvU2xsomething seemingly random or unrelated to the original plaintext.

Encryption, however, is a logical process, whereby the party receiving the encrypted databut also in possession of the keycan simply decrypt the data and turn it back into plaintext.

For decades, attackers have tried by brute forceessentially, by trying over and over againto figure out such keys. Cybercriminals increasingly have access to stronger computing power such that sometimes, when vulnerabilities exist, they are able to gain access.

Data needs to be encrypted when it is in two different states: "at rest," when it is stored, such as in a database; or "in transit," while it is being accessed or transmitted between parties.

An encryption algorithm is a mathematical formula used to transform plaintext (data) into ciphertext. An algorithm will use the key to alter the data in a predictable way. Even though the encrypted data appears to be random, it can actually be turned back into plaintext by using the key again. Some commonly used encryption algorithms includeBlowfish, Advanced Encryption Standard (AES), Rivest Cipher 4 (RC4), RC5, RC6, Data Encryption Standard (DES), and Twofish.

Encryption has evolved over time, from a protocol that was used only by governments for top-secret operations to an everyday must-have for organizations to ensure the security and privacy of their data.

See original here:
What is Encryption? Definition, Types & Benefits | Fortinet

Read More..

Device encryption in Windows

What is device encryption?

Device encryptionhelps protect your data, and it'savailable on a wide range of Windows devices. If you turn on device encryption, the data on your device can only be accessed by people who've beenauthorized.If device encryption isn't available on your device, you may be able to turn on standard BitLocker encryption instead.

Note:BitLocker is not available on Windows 10 Home edition.

Normally when you access your data it's through Windows 10 and has the usual protections associated with signing into Windows 10. If somebody wants to bypass those Windows protections they could open the computer case and remove the physical hard drive. Then by adding your hard drive as a second drive on a machine they control, they may be able to access your data without needing your credentials.

If your drive is encrypted, however, when they try to use that method to access the drive they'll have to provide the decryption key (which they shouldn't have) in order to access anything on the drive. Without the decryption key the data on the drive will just look like gibberish to them.

Device encryption is available on supported devices running any Windows 10 edition. If you want to use standard BitLocker encryption instead, it'savailable on supported devices running Windows 10 Pro, Enterprise, or Education. Some devices have both types of encryption. For example, a Surface Prowhich runs Windows 10 Prohas both the simplified device encryption experience, and the full BitLocker management controls. Not sure which version of Windows you have? SeeWhich Windows operating system am I running?

In the search box on the taskbar, type System Information, right-click System Informationin the list of results, then selectRun as administrator. Or you can select theStartbutton, and then under Windows Administrative Tools, select System Information.

At the bottom of the System Information window, findDevice Encryption Support. If the value says Meets prerequisites, then device encryption is available on your device. If it isn't available, you may be able to use standard BitLocker encryption instead.

Sign in to Windows with an administrator account (you may have to sign out and back in to switch accounts). For more info, seeCreate a local or administrator account in Windows 10.

Select theStart button, then selectSettings > Update & Security > Device encryption. If Device encryption doesn't appear, it isn't available. You may be able toturn on standard BitLocker encryption instead.

If device encryption is turned off, select Turn on.

Sign in to your Windows device with an administrator account (you may have to sign out and back in to switch accounts). For more info, seeCreate a local or administrator account in Windows 10.

In the search box on the taskbar, type Manage BitLocker and then select it from the list of results. Or you can select theStartbutton, and then under Windows System, select Control Panel. In Control Panel, select System and Security, and then under BitLocker Drive Encryption, select Manage BitLocker.

Note:You'll only see this option if BitLocker is available for your device. Itisn't available on Windows 10 Home edition.

Select Turn on BitLocker and then follow the instructions. (If BitLocker is turned on and you want to turn it off, select Turn off BitLocker.)

If your device requires a recovery key to unlock, see Find your recovery key.

The rest is here:
Device encryption in Windows

Read More..

Decentralising end-to-end encryption with a new security protocol – The Hindu

Messaging services like WhatsApp and Telegram use end-to-end encryption (E2E) to secure messages sent and received. Their systems uses a single company's server to store encrypted information.

Complete dependence on a single firms server prevents users from being able to control how their private messages are being handled.

(Sign up to our Technology newsletter, Today's Cache, for insights on emerging themes at the intersection of technology, business and policy. Click here to subscribe for free.)

Researchers at Carnegie Mellon University have devised a new security protocol to decentralise E2E, enabling users to store their messages in a more flexible network.

The system is an extension of the steady group key settlement (GKA) a previously developed safety protocol that permits a group of people to send and receive messages without relaying on a message group supervisor. If your message is routed through one server and the company raises the prices or shuts down, you could switch to another server seamlessly, the team noted.

Also Read | Quantum computers pose security threats, report says

If users are using a central server run by a company to communicate, but it gets blocked or shut down, they could switch to a self hosted server that is physically in one of their homes, the team noted.

If thats blocked too, or if the whole Internet is shut down, they could switch to using a mesh network in which nearby devices connect over Bluetooth, the team said in a paper titled Key Agreement for Decentralized Secure Group Messaging with Strong Security Guarantees.

"Right now, messaging app companies are in charge of users, when really it should be the other way around," one of the researchers noted. "Users should have the freedom to choose how their messages are handled.

Link:
Decentralising end-to-end encryption with a new security protocol - The Hindu

Read More..

How to Enable end-to-end Encryption for one-to-one Calls in Microsoft Teams – BollyInside

This tutorial is about the How to Enable end-to-end Encryption for one-to-one Calls in Microsoft Teams. We will try our best so that you understand this guide. I hope you like this blog How to Enable end-to-end Encryption for one-to-one Calls in Microsoft Teams. If your answer is yes then please do share after reading this.

Earlier this year, end-to-end encryption (E2EE) support for Microsoft Teams Calls was announced. Once you get the latest update, your organizations IT administrators will have the option to make the feature accessible to you. Here is an overview of how E2E encryption works for Teams calls, details on how IT administrators and users can activate it and how it is applied.

IT administrators can add end-to-end encryption for users in their organization just like any other policy. You can make it a global policy (for the entire organization) or create custom policies and assign them to users.

Go to admin.teams.microsoft.com and log in with your administrator account. Then navigate to Other Settings from the navigation panel on the left.

Few options will expand below it. Click on Enhanced Encryption Policies in the options.

Then name your policy. Click the drop-down menu next to End-to-end encryption and select Users can enable it. Finally, click on the Save button.

Once youve created the policy, assign it to users, groups, or your entire tenant just like any other policy in Microsoft Teams.

After IT administrators have configured the E2EE policy for the organization, users (depending on the policy) can enable it for their accounts. By default, end-to-end encryption will need to be re-enabled at the account level. Otherwise, it will remain disabled even if administrators have allowed your account to use it.

To enable E2EE from the desktop, open the Microsoft Teams desktop app on your PC or Mac. Then go to the title bar and click on the More options icon (three dots) next to your profile icon.

Select Settings from the menu.

Then go to Privacy in the left navigation menu.

In the privacy settings, enable the option End-to-end encrypted calls.

Deactivate the switch for this setting when you want to use the functions that E2EE restricts on the call.

To enable E2EE from the Teams mobile app, open the latest version of the Teams Mobile app on iPhone or Android.

Tap on your profile icon in the upper left corner.

Then, tap on the Settings option.

From the settings screen, go to Calls.

There you can enable the option of End-to-end encryption in Encryption.

Whether you enable the option from the desktop or mobile app, the app is account-wide. So if you have enabled it from desktop app it will be on when you use mobile phone and vice versa.

I hope you understand this article How to Enable end-to-end Encryption for one-to-one Calls in Microsoft Teams, if your answer is no then you can ask anything via contact forum section related to this article. And if your answer is yes then please share this article with your family and friends.

Read more here:
How to Enable end-to-end Encryption for one-to-one Calls in Microsoft Teams - BollyInside

Read More..

How the 5G industrial IoT will change different verticals – IT Brief New Zealand

The industrial Internet of Things, protecting systems during the holiday season, and using encryption to help address cloud misconfiguration, are amongst the most recent insights from global technology firm Thales.

Industrial IoT

The industrial Internet of Things is coming and many believe it will be the catalyst for unprecedented productivity levels.

However, according to Thales Group, it cannot happen without fast and reliable connectivity extending to even the remotest locations.

"5G provides it. And it is already here," the company says.

5G networks are now rolling out across the world. According to the GSA, there were 180 commercial services in 72 countries in September 2021. Meanwhile, 465 operators in 139 markets are planning live deployments.

"So, the conditions are in place for the Industrial IoT to flourish," Thales says. "Indeed, the first pioneering services have been built."

How to protect your systems from unauthorised access this holiday Season

Many retailers and shipping services are planning to hire temporary workers for the upcoming holiday season. Retailers, shipping and logistics companies, and other organisations can take multiple steps to mitigate the risks posed by seasonal workers by ensuring they have the right access security in place.

How encryption can help address Cloud misconfiguration

Cloud service providers (CSPs) try to make it simple and easy for their users to comply with data privacy regulations and mandates. Still, as all of those who work in technology know, you reduce access to granular controls when you simplify a process. On the flip side, if you allow access to granular controls, the person setting the controls needs to be an expert to set them correctly. And, even experts make mistakes.

New partnership between Thales and VNPT to accelerate digital transformation in Vietnam

Thales and the Vietnam Posts and Telecommunications Group have signed a Memorandum of Understanding (MoU) to explore technical collaborations in telecommunications satellites, Smart and Safe cities, Digital Identity and Biometrics, 5G & Internet of Things and cybersecurity.

The MoU was signed between both organisations on 3 November 2021 in Paris, in the presence of Jean Castex, Prime Minister of France, and Pham Minh Chinh, Prime Minister of the Socialist Republic of Vietnam. The joint collaboration on these topics aligns with Vietnam's national digital transformation goals, including establishing a strong digital economy and driving towards a Smart Nation.

Thales is a global technology company investing in digital and "deep tech" innovations, including Big Data, AI, connectivity, cybersecurity and quantum technology.

"Thales's core purpose is to build a future we can all trust. It's the exact transcription of the DNA that has shaped the Group ever since it was founded more than a century ago," the company says.

It has more than 80,000 employees across five continents, and its corporate purpose revolves around three components: autonomy, resilience and sustainability.

The rest is here:
How the 5G industrial IoT will change different verticals - IT Brief New Zealand

Read More..