Page 3,981«..1020..3,9803,9813,9823,983..3,9904,000..»

Staying Out Of Trouble In 2020 With New Security Practices And Human Firewalls – Forbes

Getty

As of January 1, 2020, Californias new Consumer Privacy Act goes into effect, and with it a series of new requirements about how your company protects information. Those protection requirements include, among other things, something called reasonable security when handling that information. Fail to provide that reasonable security, and you could find your company hit with significant fines.

You need to make a data driven decision that having a human firewall is a really good idea.

Whats reasonable security, and how do you achieve it? The California Attorney General lists compliance with the Center for Internet Security list of 20 controls and resources as recommendations as being reasonable security. Whats notable about the CIS list is that theres no specific technology solution. Instead, the means of complying with the CIS Controls is primarily a management process.

Human Firewalls

The danger is thinking that theres going to be a silver bullet, but it never arrives, said Stu Sjouwerman, CEO of KnowBe4, a security training company. As a community in IT, you need to make a data driven decision that having a human firewall is a really good idea.

Getty

The idea of a human firewall is that a company thats properly managed will have employees that wont fall for the social engineering that precedes most data breaches. This means that your employees must be instilled with what Sjouwerman calls a security culture. With a proper security culture, your employees will know not to open phishing emails, theyll know not to send out the company phone book or the CEOs contact information. Theyll also know when to report suspected intrusion attempts to the CISO staff.

Security Culture

Getting a security into your company isnt necessarily the easiest thing in the world, because it requires that your employees not take the easy way out when it comes to protecting your organization. It means they must choose long complex passwords, they must not let people follow them into secure areas and they must not answer questions over the phone unless their role in the organization is that they communicate with the public.

Youre better off hiring the right people and training them, Sjouwerman said. Youre hiring for a security culture. They have a security awareness level so that they can be trained.

Getty

To accomplish this, you need to have buy-in from your board so that you can have the boards backing when you institute security controls and limit your hiring to people who understand why security is important, even if they have to be trained.

Getting your employees motivated to be part of the security culture will take some effort. Youll need an internal sales and marketing campaign, but everyone needs to be sold on the fact that security is important. Sjouwerman said.

Sjouwerman noted that having data breaches covered in the media on a near daily basis helps drive home the need to prevent them. A boatload of those data breaches are caused by human error, he said.

The Management Approach

But if you look at the 20 CIS Controls, youll see that they are management tasks, not technological solutions. A few of the tasks can use technology to implement part of the solution, but in most of the cases there is no hardware or software solution available.

Getty

For example, the requirement for malware protection can use anti-malware software or devices, but the requirement for controlled access based on need to know is purely a management task. Likewise, the task to implement a security awareness and training program requires management desire and the appropriate funding.

No doubt youre aware of the many companies selling products that they claim will solve all of your security problems if only you put them to work in your organization. The problem with these products is that theyre not totally effective. Even the best of the appliances or software packages will let miss some threats, if only because the attackers are very good at finding ways to get past those products you bought.

This doesnt mean that you shouldnt buy these products, because you should. Even though they may miss 5 to 10 percent of the bad stuff thats trying to breach your network, Thats still a lot less than youd have otherwise.

But for your security to be effective, your employees helped by your management approach, need to discover and block the rest.

Employee Focus

To make all of this work, your employees need to see that their management encourages their security awareness. This could mean a bonus for finding and reporting a threat. It could mean the backing of management for reporting a poor security practice in the workplace. It could even mean praise for finding a new and better security practice.

Whats key is that your employees are willingly and even enthusiastically part of the security solution. This should not appear to them to be a burden or to require unreasonable difficulties. The bottom line is that they should want to be part of the security solution.

See the rest here:
Staying Out Of Trouble In 2020 With New Security Practices And Human Firewalls - Forbes

Read More..

Expansion of the Internet Security Software Market is Forecasted to Reach at Very High Rate By 2026 – Market Research Sheets

Coherent Market Insights announced that its published an exclusive report namely Global Internet Security Software Market 2019 by Manufacturers, Regions, Type and Application, Forecast to 2023 in its research database with report summary, table of content, research methodologies and data sources. The research study offers 1a substantial knowledge platform for entrants and investors as well as veteran companies/manufacturers functioning in theGlobalInternet Security Software Market. This is an informative study covering the market with in-depth analysis and portraying the current state of affairs in the industry.

The Report presents an overview of Internet Security Software Market consist of objectives study and definition of Internet Security Software Market. The next section focuses on market size, region-wise Internet Security Software production value ($) and growth rate estimation from 2019-2026. Manufacturers are taking innovative strategies to increase the market share of their products. The success of new product launches is expected to speedup players for business growth.

Internet Security Software Market Key Players And Regional analysis:

The top manufacturers, exporters, and retailers (if applicable) around the world are analyzed for this research report with respect to their company profile, product portfolio, capacity, price, cost, and revenue. For competitor segment, the report covers the following key players and regional analysis covers

Get Free Sample PDF(including full TOC, Tables and Figures)of This Report

The report can answer the following questions:

Internet Security Software Market Taxonomy:

By Software:

By Technologies:

By Applications:

Do You Have Any Query Or Specific Requirement? Ask to Our IndustryExpert

Report Covers:

At the end, Internet Security Software Market reports deliver insight and expert analysis into key consumer trends and behaviour in marketplace, in addition to an overview of the market data and key brands. Internet Security Software Market reports provides all data with easily digestible information to guide every businessmans future innovation and move business forward.

Contact:

Mr. Raj ShahCoherent Market Insights1001 4th Ave,#3200Seattle, WA 98154Tel:+1-206-701-6702Email:[emailprotected]

Visit Our Blog:https://bit.ly/Sumit

See the original post here:
Expansion of the Internet Security Software Market is Forecasted to Reach at Very High Rate By 2026 - Market Research Sheets

Read More..

Bangladesh shuts down internet along India’s border ‘for the sake of the countrys security in the current cir – Business Insider India

The Bangladesh Telecommunication Regulatory Commission has ordered a shutdown of mobile networks along the borders with India citing security reasons, an order estimated to affect around 10 million users, it was reported.

The operators suspended networks within one kilometre of the borders with India on Monday after receiving the order, reports bdnews24.

The four operators -- Grameenphone, Teletalk, Robi and Banglalink --closed around 2,000 base transceiver stations, an official of an operator told bdnews24.

In the order, the BTRC said network coverage in the border areas will have to be suspended until further notice "for the sake of the country's security in the current circumstances".

"A high-level meeting of the government took this decision, following which the instructions were issued," BTRC Chairman Jahurul Haque told bdnews24, declining to give further details.

See also:Indian government shut off the Internet over a 100 times in 2019 and China is lovin' it

Indian data laws have an uncanny resemblance to Russias 'new' internet and Chinas 'Great Firewall'

Internet shutdowns in India have skyrocketed but now the Indian government wants that to stop

Here is the original post:
Bangladesh shuts down internet along India's border 'for the sake of the countrys security in the current cir - Business Insider India

Read More..

The year in #StupidSecurity 2019’s biggest security and privacy blunders – The Daily Swig

Flagrant tales of epic (security) fails

Stupid criminals, careless politicians, inept bug handling, and more slapdash or just plain stupid behavior were abundant in the arena of cybersecurity over the past 12 months.

Everyone involved in this year's #StupidSecurity run-down ought to resolve to do better in 2020, perhaps by starting to cast an eye over examples of the people and organizations whove handled infosec problems with a bit more grace, preparation, and better passwords. Sounds familiar..

Bug bounties and ethical hacking particularly in the field of web security are a major topic of interest for The Daily Swig.

Vendor missteps are legion but sometimes its the bug hunters who get it wrong.

Back in July, developers of the VLC media player were able to debunk widely covered reports of a critical security issue in their popular open source software.

Jean-Baptiste Kempf, president of VLC owner VideoLAN,told The Daily Swig that the exploit did not work on the latest VLC build. In fact, it turned out that any potential issues related to the vulnerability were patched more than a year ago.

CERT-Bund which initially flagged the issue as critical - downgraded the vulnerability to low impact after we challenged the organization on its originally published classification, which was based largely on a public ticket.

Missteps in bug handling are more common on the vendor rather than researcher side, of course.

July brought the discovery of a Zoom client bug that allowed any site to force Mac users into video chat.

Security researcher Jonathan Leitschuh went public with a vulnerability in the Mac version of the Zoom video conferencing app that could allow a malicious site to auto-join Mac users to a video call and enable their webcam without permission.

Security researchers faulted Zoom for its initially dismissive response to the issue.

Check out the latest bug bounty and security news

Capital One grabbed news headlines in July when the US financial services company announced that some information of approximately 106 million people residing in the US and Canada had been exposed.

The criminal breach also compromised more sensitive information on a smaller number of customers: 140,000 Social Security numbers, 1 million Canadian Social Insurance numbers, and 80,000 bank account numbers.

Capital One tried to deflect attention from this aspect of the problem, much to the derision of the security community.

The alleged perpetrator, Paige A. Thompson, gained access through a misconfiguration of a cloud-hosted web application, according to prosecutors.

On a much smaller scale, the Dutch Data Protection Authority was left red-faced back in May after it failed to report itself on time over a minor data breach, caused by one of its own employees.

Oops.

DNS-over-HTTPS (DoH) an emerging web protocol that aims to protect online privacy online became the arena for policy controversies this year.

The technology is supported by browser makers including Google and Mozilla but criticized by some because of its reliance on third-party DNS providers, among other reasons.

The Internet Service Providers Association (ISPA) controversially argued that DoH impedes web blocking programs going as far as nominating Mozilla as an internet villain over its support of the technology.

The ISPA trade association was obliged to backtrack and pull the nomination after a backlash from sections of the internet security community.

What could be a more awkward if not plain ridiculous situation than to be arrested while doing your job?

But thats what happened to two staff at US security consultancy Coalfire, who were arrested during late night physical pen tests at a courthouse in Dallas County, Iowa, back in September.

Dallas County Iowa Sheriff Chad Leonard told The Daily Swig that he acted properly in arresting the two infosec workers who went outside the scope of their contract.

In August, digital bank Monzo told hundreds of thousands of customers to change their PINs after it realized it was accidentally storing sensitive customer data in log files.

Monzo isnt alone when it comes to slip ups in this area.

For example, back in March it was revealed that Facebook had been logging web requests containing clear-text passwords for years.

Facebook came under fire once again months later, in September, over a data leak that exposed the phone numbers of hundreds of millions of its users.

Having had its share of privacy scandals, Facebook's all-caps rebrand in November to FACEBOOK was also widely mocked as tone deaf. A design that said reflective repentance may have been viewed as more appropriate.

Check out the latest data breach and security news

Last year in Stupid Security, Kanye West infamously exposed the PIN code of his phone in front of the spectating press corps during an Oval Office meeting with President Trump. The rapper was captured tapping in 000000 to unlock his iPhone.

But 2019 showed us that it's not only rappers who fall victim to easy to guess PIN codes.

In October Congressman Lance Gooden made much the same security slip up in revealing his phone password was 111111 by entering the code during a filmed Congressional session.

Gooden made light of his faux pas, choosing to disregard the part that hacking played in the 2016 US presidential election cycle or the sensitivity of the communications the first-term congressman handles.

The Republican congressman isnt alone in being captured by cameras in making a questionable security trade-offs.

Back in March, a video surfaced on Twitter that appeared to show Hashim Thai, the President of Kosovo, logging into his computer using an all-too-simple password.

Passwords remain a necessary evil despite predictions that were moving towards a passwordless future, a warm future thats perennially two or three years away..

One online resource, a Dumb Password Rules tool, spotlights firms that take an idiosyncratic approach to password policy.

Examples of curious policies include those of the BMO (Bank of Montreal), where users passwords must be exactly six characters long and include no special characters..

Entropy, theyve heard of it. Or perhaps they havent?!

LISTEN NOW SwigCast, Episode 4: MAGECART

John McAfee who we sense will become a fixture of this annual list backed up his support for a much criticised crypto-currency wallet last year with a stand-out performance in a different category, OpSec fail.

In July, McAfee posted pictures on Twitter that revealed that he was holed up in Vilnius, Lithuania, in a tin-foil lined room. The disclosure followed days after McAfee and his entourage were arrested after his yacht docked in the Dominican Republic over concerns that Army-grade weapons were on board.

The group were released without charge four days later before resurfacing in eastern Europe.

Criminals and police alike served up a steady diet of WTF moments in infosec over the last 12 months.

In January, a Microsoft employee chided the Chicago Police Department over claims the police forces Windows 7 machines were at the cutting edge of technology.

In July somebody hijacked the Met Polices official newsfeed and Twitter account, a small example of a wide field of slapdash security that involves what might loosely be described social media shenanigans.

Staying with police-related security missteps, Chinese citizen Yujing Zhang was arrested at Trumps Mar-a-Lago club in Florida with suspect items including multiple phones, two passports, and a USB stick that it turned out was stuffed full of malware.

It emerged that the US Secret Service trained security professionals, lest we forget plugged the suspect USB into one of their computers.

Not so much Bodyguard as the booby-trapped guards.

YOU MIGHT ALSO LIKE Swig Security Review 2019: Part II

Continued here:
The year in #StupidSecurity 2019's biggest security and privacy blunders - The Daily Swig

Read More..

Together with the community, weve given away more than 100,000 for important causes – Security Boulevard

Were happy to announce that the 2019 Lifetime account auction has raised over 30,000. Proton will match these contributions for a total donation of over 60,000 to three organizations working to build a more equitable, free, and sustainable world: NetBlocks, 350.org, and the Web Foundations Womens Rights Online project.

This is the second year of our charity auction. Between this years fundraiser, the 2018 Proton Lifetime auction, and our matching contributions, we have now contributed over 100,000 for important causes that align with our mission. The three causes we are supporting this year will receive 20,000 each in the coming weeks.

Each year, we put three Proton Lifetime accounts up for auction. The successful bidders win our most exclusive account, which entitles owners to Visionary status on all Proton products forever. Lifetime Accounts are transferable, and over the years their value has increased as the Proton suite of products continues to expand.

This year, we asked our community to nominate organizations worthy of our support. We received dozens of great suggestions and narrowed them down to three final beneficiaries.

We are thankful to all the members of the Proton community who placed bids in this years auction. One hundred percent of the money we raised in each of the three auctions will be contributed to the organization identified as a beneficiary on the eBay page where the bidding took place. Proton will also contribute an additional 10,000 to each organization.

If youre a Proton subscriber, youre already helping to build a better world, including by enabling us to support these organizations. But if youd like to give more, you can follow the links below to donate.

NetBlocks is an independent, non-partisan watchdog group that monitors the status of the Internet in countries all around the world and reports any shutdowns or blackouts. Their efforts align with Protons mission to promote Internet freedom, and their work is an invaluable resource for our team. The NetBlocks auction raised US$13,600.

Donate to NetBlocks

UPDATE: We received this note from NetBlocks to you:

Dear ProtonMail community! Your support for the NetBlocks Internet observatory comes at a critical moment: Reliable and secure Internet connectivity has been shown to shorten conflict and alleviate crisis, giving people around the world a voice when it is most needed. Yet preserving our right to stay connected and informed demands solidarity and vigilance at the watchtower. Together were better set than ever to ensure that the Internets open architecture remains a force for good, a public interest resource worth fighting for and extending to every person.

The World Wide Web Foundation is an international nonprofit organization that fights for an Internet that is empowering for everyone. Studies have shown that in the developing world, women are 50% less likely to have access to the Internet than men in the same community. Weve chosen to support the Womens Rights Online project, which is working to close the digital gender gap by expanding Internet access to women in developing countries. The World Wide Web Foundation auction raised US$11,100.

Donate to the World Wide Web Foundation

350.org is a US-based international nonprofit that uses people power to support renewable energy solutions and turn away from fossil fuels. We are supporting 350.org because we believe a transition to renewable energy is the only way to keep our planet healthy for future generations. Our home country, Switzerland, is already a leader in this area. The 350.org auction raised US$11,100.

Donate to 350.org

We are also making separate contributions to two other organizations in the communities where we have offices. Were supporting children in Macedonia through SOS Childrens Villages and in Lithuania through Vaik svajons (Childrens Dreams). Contributions to these charities can also have a large impact on the lives of underprivileged children.

As another year draws to a close, we are again deeply grateful for the support of our community. Because of your support in 2019, we were able to achieve the following:

You can now start using ProtonCalendar and ProtonMail Version 4.0 in beta. These were two major milestones that we hoped to accomplish in 2019, and thanks to the intense and coordinated efforts of our developers and cryptographers, we achieved our goal. Much work remains, and we are excited to incorporate feedback from our community during the beta phase into the final Proton 4.0 release in 2020.

You can now inspect more of our code, and developers can now use more of our code in their own apps, expanding access to online privacy and security. From GopenPGP to the ProtonMail iOS app, were fulfilling our commitment to the open source developer community and providing transparency and accountability to our users.

ProtonVPN has also expanded to 45 countries globally, and we are now providing secure, uncensored, and safe Internet access to millions around the world across our network of over 600 servers.

Our team, our products, and our infrastructure are ready to scale up to meet the privacy needs of citizens around the world. We began 2019 with about 10 million users. We are entering 2020 with more than 20 million. Some of the most important accomplishments of the past year were invisible to most of our users because they involved internal adjustments that will lay the foundation for the years to come.

Business owners have more educational resources to keep their data secure and comply with privacy regulations. We launched GDPR.EU (a guide to GDPR compliance) and published the ProtonMail Guide to IT Security for Small Businesses. Today, more businesses than ever are using ProtonMail to keep their sensitive communications safe.

We have also stepped up our advocacy efforts. In November, we signed a letter to the European Parliament advocating changes to the controversial e-evidence proposal. We also submitted a letter to the Massachusetts legislature in support of a moratorium on the government use of face surveillance. Finally, we reaffirmed our support for defending the human rights of protesters around the world.

Thanks to your generosity, were not only building a more secure and private Internet, were supporting other organizations that are also helping to build a better future. From fighting censorship and expanding Internet access to protecting the environment, its clear that the Proton community cares deeply about building a better world. Thank you. And happy New Year!

Best Regards,The Proton Team

You can get afree secure email account from ProtonMail here.

We also provide afree VPN serviceto protect your privacy.

ProtonMail and ProtonVPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to apaid planordonate. Thank you for your support.

The post Together with the community, weve given away more than 100,000 for important causes appeared first on ProtonMail Blog.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from ProtonMail Blog authored by Ben Wolford. Read the original post at: https://protonmail.com/blog/lifetime-auction-2019-results/

Read more:
Together with the community, weve given away more than 100,000 for important causes - Security Boulevard

Read More..

The Most Dangerous People on the Internet This Decade – WIRED

In the meantime, Facebook has been used again and again to spread mass disinformation, from hate speech that fueled the massacre of Rohingya muslims in Myanmar to WhatsApp propaganda that helped elected far-right Jair Bolsonaro in Brazil, to troll armies tasked with attacking the enemies of Philippines president Rodrigo Duterte and Donald Trump. In almost every instance, Zuckerberg has been slow to react, or even initially dismissive of concerns. The result has been a decade of disastrous effects, for both privacy and politics, across the globe. As Facebook has claimed a near-monopoly on social media, there's little sign that Zuckerberg is willing to slow his company's rapacious growth to prevent the next catastrophe.

Julian Assange

Julian Assange first came on the general public's radar in a 2010 WikiLeaks video called Collateral Murder. It represented a radical new model of secret-spilling that empowered whistleblowers by offering them a digital dead drop, one that protected with their anonymity with strong encryption. WikiLeaks would follow up with one blockbuster leak after another, with hundreds of thousands of classified files from the war in Afghanistan and then Iraq, followed by a quarter million secret cables from the State Department. With those megaleaks from his tiny group, Assange successfully upended parts of the global order, hastening the US pullout from Iraq and helping to touch off the Arab Spring with its revelations about the Tunisian dictator Ben Alieven as WikiLeaks was accused of also endangering innocents like State Department sources whose names were included in the files. But Assange would have another, unexpected second act in 2016, when Russian agents would exploit WikiLeaks to launder documents stolen from the Democratic National Committee and the Clinton campaign. After all, Assange never cared much for distinctions between whistleblowers and hackers. Throughout those years, Assange always maintained that the US intended to imprison himthat US hegemony considered him too dangerous to be left free. When Assange was pulled out of the Ecuadorean embassy in April and put in a British prison awaiting extradition to face US hacking and espionage charges, he was proven right.

ISIS

Violent Islamist group ISIS integrated terrorism with the internet like no one else in history. From its initial takeover of Mosul in 2014, ISIS both horrified the world with its acts of barbarism and also carried out a deeply effective online recruiting campaign. With grisly propaganda videos and lies about the Islamist paradise it sought to create posted to YouTube and other social media, it convinced many young Muslims across the globe to rally to its cause, turning Iraq and Syria into magnets for juvenile, misguided bloodletting and forcing every tech company to consider how the most violent humans in the world might misuse their services. But ISIS also successfully turned the internet into a means of distributing its violence physically, persuading lone wolves to carry out unspeakable attacks from Paris to Nice to London to New York. Even as ISIS's caliphate has been dismantled and its founder killed by US forces, that placeless call to violence still rings out across the internet, and may yet pull more troubled young men under its sway.

Lazarus

North Korea may have largely cut off its populace from the internet. But it makes a few very notable exceptions, including for the North Korean hackers broadly known as Lazarus, which has carried out some of the most aggressive hacking operations ever seen online. Lazarus first shocked the world with its attack on Sony Pictures in retaliation for its Kim Jong-un assassination comedy, The Interview. Under the cover story of a hacktivist group known as "Guardians of Peace," they breached the company, spilled thousands of its emails online, extorted the it for cash, and destroyed hundreds of its computers. Since then, Lazarus has shifted its tactics in part to purely profit-motivated cybercrime, stealing billions of dollars around the world in bank fraud operations and cryptocurrency thefts. Those cybercriminal operations hit a new low in May of 2017, when Lazarus released WannaCry, a ransomware worm that exploited the leaked NSA hacking tool EternalBlue to automatically spread to as many computers as possible before encrypting them and demanding a ransom. Thanks to errors in its code, WannaCry didn't make much money for its creators. But it had a far larger effect on its victims: It cost somewhere between $4 and $8 billion globally to repair the damage.

NSO Group

At the beginning of this decade, hacking contractor firms and sellers of techniques known as "exploits" were barely heard of. The few known cybermercenaries were subjects of scandal and accused of digital arms dealing. Today, the Israeli firm NSO Group has made them all look tame by comparison. The company has sold techniques for remotely breaking into iPhones and Android phones with little or no interaction from the victim. In some cases, the company and its customers were able to plant malware on a target phone simply by calling it on WhatsApp. And despite the company's repeated insistence that it doesn't sell its hacking services to human rights abusers, the targets of its hacking have shown otherwise: Activist Ahmed Mansour, one of the first high-profile victims of NSO's exploits, is now serving a 10-year prison sentence in the United Arab Emirates. NSO malware targets in Mexico have included activists who have lobbied for a soda tax and the wife of a slain journalist. When WhatsApp sued NSO in October, it accused the firm of helping to hack 1,400 victims across the globe, including dissidents, diplomats, lawyers, and government officials. All of that makes NSO's spying-for-hire operation just as dangerous as many of the world's most brazen state-sponsored hackers.

Xenotime

In August of 2017, a piece of malware known as Triton or Trisis shut down an oil refinery owned by petrochemical firm Petro Rabigh, on the Red Sea coast of Saudi Arabia. That was, in fact, a lucky outcome. The malware had actually been intended not to stop the plant's operations, but to disable so-called safety-instrumented systems in the plant designed to prevent dangerous conditions like leaks and explosions. The malware, planted by a mysterious hacker group known as Xenotime, could have easily been the first cyberattack to have cost a human life. Xenotime's motivations aren't clear, nor are its origins. Though the usual suspect for any attack on Saudi Arabia is Iran, FireEye in 2018 found links between its Triton/Trisis malware and a Russian university. Since the Petro Rabigh incident, Xenotime's target list has grown to include North American oil and gas operations, and even the US power grid. By all appearances, the group has only displayed a fraction of its destructive potential.

Cody Wilson

Over the last 10 years, Cody Wilson has developed a talent for incubating nightmares in the space between new technologies and the laws that control their most dangerous applications. In 2013, he released blueprints online for the world's first fully 3-D printable gun, allowing anyone with a 3-D printer to create a deadly, unregulated weapon in the privacy of their home. But Wilson soon traded the sci-fi shock value of that idea for practical lethality: He sold thousands of Ghost Gunner machines capable of carving away aluminum to finish fully metal AR-15s and Glocks from fully unregulated parts. In the meantime, Wilson's side projects have been just as controversial. He founded Hatreon, a Patreon-type donations site that funded extremists and white nationalists, as well as a bitcoin wallet designed for perfectly untraceable transactions, unlocking powerful new forms of money laundering. (That cryptocurrency project was halted only when his partner, Amir Taaki, unexpectedly smuggled himself into Syria to fight ISIS alongside the Kurds.)

Last year, Wilson was arrested and charged with sexual assault of a minor. But by September 2019, he was already released on probation. Given how Wilson has thrived on controversy and negative press, don't expect his bomb-throwing career to be over just yet.

Peter Thiel

Once, Peter Thiel was simply a rich libertarian eccentric, dreaming of seasteading, advocating against college education, and watching the fortune he made cofounding PayPal multiply as a major investment in Facebook. This decade, however, it's the politics of his businesses, not their profit-making, that has raised the most eyebrows. Palantir, another company he cofounded, has become the world's most active embodiment of Silicon Valley's partnership with surveillance agencies, controversially offering up its data-mining software and services for undocumented immigrant-hunting at ICE, and reportedly stepping in for the Pentagon's controversial Project Maven after Google bowed out under employee pressure. Anduril, founded by Palmer Luckey with an investment from Thiel, sells surveillance technologies designed for the southern border to Customs and Border Protection. Even earlier, starting in 2012, Thiel notoriously bankrolled a series of lawsuits designed to destroy Gawker as an apparent act of vengeance, although Thiel himself described it as "deterrence." Regardless, his libertarian ideals seem to find their limits at press freedom, surveillance, and rights for US immigrants.

Anonymous

The faceless hacker collective known as Anonymous came into being in the late 2000s. But it hit its peak in the first years of the 2010s, with hacking operations that hit Visa, Mastercard, and Paypal with waves of junk traffic as vengeance for their financial blockade of WikiLeaks, as well as waves of hacking that tormented Sony for suing George Hotz for reverse engineering the Playstation. Anonymous' anarchistic hacktivism peaked in the summer of 2011, when an offshoot of the group known as LulzSec went on a months-long rampage, hacking security firms, defense contractors, media, government, and police organizations. It turns out, however, that young hackers without the backing of a government nor a comfortable geographic remove from their victims isn't exactly a sustainable form of protest. Virtually all of the most active Anonymous hackers were arrested. Some, like Jeremy Hammond, received lengthy prison sentences, while others like Hector Monsegur became informants against their former colleagues. Since then, Anonymous has largely petered out as a movement, and hacktivism has faded from the headlines, more often used as a cover story for state-sponsored hackers than a tool for idealistic agents of chaos.

More Great WIRED Stories

Go here to read the rest:
The Most Dangerous People on the Internet This Decade - WIRED

Read More..

The Top Security Stories of 2019, Part Two – Foreign Policy

Welcome toForeign Policys Security Brief. For the holidays, were bringing you a special edition: a roundup of the top 10 stories from 2019. Below are the final five. (Find the first five here.) Well return to our twice weekly schedule next week.

6. Protests Sweep the Middle East

A wave of protests swept across Iran, Iraq, and Lebanon this year, presenting the biggest challenge to governments in years and throwing off balance the influence of Iranian proxies in Lebanon and Iraq. In Lebanon, simmering disenchantment with the political elite erupted into widespread protests that forced Prime Minister Saad Hariri to resign and prompted almost immediate calls for his successor to step down, too.

Protests in Iraq also forced Prime Minister Adel Abdul-Mahdi to resign after a deadly crackdown. And in Iran, the regime responded to widespread anti-government protests with brute force, shutting down the countrys internet for a week and killing hundreds of protesters.

7. Afghan Peace Talks Start, Stop, and Restart

U.S. President Donald Trumps Afghanistan envoy Zalmay Khalilzad has led a frantic behind-the-scenes push to finally end the war in Afghanistan. But when Khalilzad and the Taliban seemed close to reaching a deal in September, Trump called the negotiations off after violence in Kabul led to the death of a U.S. soldier.

Now negotiations are back on again, as the Talibans ruling council declared it would agree to a temporary cease-fire for negotiations. A peace agreement would finally end U.S. military operations in Afghanistan, with nearly 12,000 troops deployed. Even after nearly two decades, the path to peace is anything but certain.

8. U.S.-China Rivalry Goes High-Tech

The United States and China have fought for years over leadership in technology and communications infrastructure. This year saw those fights come to a head with Chinese tech giant Huawei rolling out 5G networks around the world. Senior U.S. leaders have issued urgent warnings to allies not to play ball with Beijing, fearing China would use the networks for espionage.

Huawei has become ensnared in the power struggle, with U.S. officials warning no major Chinese company can be independent from the government. The battle isnt over, and the stakes couldnt be higher in the minds of senior U.S. officials, with 5G is considered to be the central nervous system of the 21st century economy.

9. The War in Yemen Drags On

Five years into its brutal civil war, Yemen remains the worlds worst humanitarian crisis, with a majority of the population in need of humanitarian assistance and millions at risk of starvation. U.S. support for the Saudi-backed coalition in Yemen sparked fierce debates in Washington over the presidents war powers authorities and damaged Saudi Arabias stature within Congressif not in the Trump administration.

Saudi Arabia seems eager to extricate itself from the costly conflict against Iran-backed Houthi rebels, and at the end of the year it embarked on a quiet push to negotiate peace. But until that happensif it happensYemens embattled civilian population is caught in the crossfire.

10. Extremist Groups Gain Ground in West Africa

As the U.S.-led coalition in Syria destroyed the last remnants of the Islamic States physical caliphate, its affiliates in west Africa were gaining ground. Extremist groups, including those waving the ISIS flag, have expanded in Mali, Niger, and parts of Burkina Faso this year, leaving regional and Western leaders scrambling to respond.

We say we have wiped out the Islamic State in Iraq, in Syria. Do people ask the question where these people are going? Mahamat Saleh Annadif, a senior U.N. envoy to the Sahel region, said in an interview earlier this year. There is a breeze going towards the Sahel.

Thats it for today.

For more from FP, subscribehereorsign upfor our other newsletters. Send your tips, comments, questions, or typos tosecuritybrief@foreignpolicy.com.

Original post:
The Top Security Stories of 2019, Part Two - Foreign Policy

Read More..

About That IoT Device You Received as a Holiday Gift… – Security Intelligence

It is quite possible that you received an internet of things (IoT) device as a holiday gift, and its very likely that you will find this holiday gift useful. But its also possible you received an additional gift you have no use for at all: security vulnerabilities. This is the inconvenient truth about the average IoT device like all technologies, it has flaws and it can add to your risk profile.

Whether youre an individual concerned about someone hacking your home security system and eavesdropping on your private space or youre part of an enterprise that could have all its sensors turned into a distributed denial-of-service (DDoS) support army, IoT security vulnerabilities are a fact of life, and we can expect to see more of them as more technological advancements emerge. One such advancement, 5G, is already hitting the streets and will fuel increased ubiquity of IoT devices.

How we manage IoT cybersecurity in the coming months and years will play an increasingly important role in how we manage all types of security risks.

What makes an IoT device vulnerable? There are a few issues that are specific to IoT devices, but in principle, they do not differ all that much from the issues we see in other devices we use regularly. In 2014, the Open Web Application Security Project (OWASP) started compiling a list of IoT vulnerabilities to help developers, manufacturers, enterprises and consumers make better decisions regarding IoT systems. Their 2018 top 10 IoT security vulnerabilities were:

If youre a nefarious actor, these types of security vulnerabilities could make you feel like a kid in a candy store.

How do we deal with some or all of these challenges? There are some interesting thoughts out there, but one from Dan Geer is particularly eye-catching, even though it was offered some time ago. Namely, he stated that IoT devices should be made to be ephemeral in nature. In other words, the devices should have a short life span. The thinking behind this idea is that, because there is a lack of updates for these devices, they should be offboarded before they can become an unmanageable threat.

It is certainly an approach to consider, as there are economies of scale that can be utilized, especially since the manufacturing costs of these devices continue to drop. Perhaps its time to reconsider the feasibility of that approach. Think of these IoT devices as disposable. Once they have been used to capacity, theres no point in fixing them rather, you could just recycle them and obtain replacement devices.

There are, of course, drawbacks to this approach, at least for now. One is that good code is still not cheap. In fact, good code is expensive. Until we can get some type of economies of scale for code, this approach may be an uphill battle, but it is one worth revisiting from time to time.

Another interesting approach could be the increased use of threat modeling. With advances in data gathering and monitoring systems, along with artificial intelligence (AI), an enterprise can begin to prioritize threats. An area where we could see some very creative methods would be in the development and application of visualization platforms.

Just like social media visualization can offer benefits around understanding relationships, the same can be said of IoT devices, whether theyre stationary, mobile or, even more importantly, serving as sensors or actuators or both, in some cases. But even with threat modeling, there will still be a level of reactivity to your planning. Naturally, you will often have to predict what might happen to put a stop to it but wouldnt it be nice if you could end the running around altogether?

Just as the internet is inherently vulnerable, so is an IoT device. But rather than rebuilding a few decades worth of telecommunications infrastructure and communications protocols, there is something more immediate we can do to reduce security vulnerabilities in these gadgets: certify them.

Certification isnt a simple issue, though. The industry needs to get together and create standards, such as security by design principles, but those standards and their implementation in products will come with costs. It should not surprise anybody that there are only so many costs that can be passed on to the consumer before people start looking elsewhere.

Despite these conditions, coming to some sort of agreement on common security and safety standards for IoT devices still looks like the best long-term bet. Certification establishes a baseline, and that baseline is important because you can provision your network not to accept certain devices unless they have met the standards. Remember, these devices may seem peripheral and could just be endpoints, but in the coming years, theyll also make up more and more of the business supply chain, feeding information constantly into some decision-making authority that will rely on their accuracy and reliability.

Lets make sure our vision is 20/20 on IoT security vulnerabilities as we head into the new year. To reference a holiday movie, remember that Gizmo was a cute and fun gift up until the moment a little improper care resulted in a bunch of gremlins. Dont let your IoT device turn into a gremlin!

Original post:
About That IoT Device You Received as a Holiday Gift... - Security Intelligence

Read More..

China nears completion of its GPS competitor, increasing the potential for Internet balkanization – TechCrunch

On Friday, China announced that it would complete its competitor to the U.S.-operated global positioning system network by the first half of next year, increasing the pace of its decoupling from U.S. technologies.

Chinas Beidou network of satellites named after the Big Dipper constellation will be the first service to compete with the U.S. Air Forces global positioning system and already has a potentially massive user base as more than 70% of Chinese smartphones are now ready to use its positioning services, according to a report in the Nikkei Asian Review.

The Beidou network is integral to Chinas long-term plans to dominate the next generation of telecommunications services and coupled with Chinas advances in fifth-generation wireless communications technology represents a significant challenge to the U.S. hegemony over telecommunications infrastructure.

China plans to launch by June 2020 the final two satellites needed to make the Beidou system operational, according to a statement from the projects director, Ran Chengqi quoted by The Associated Press.

Envisioning a system where Chinas global positioning system and fifth-generation wireless networking technologies work in tandem, China could command a lions share of the market for new telecommunications services.

A test of how these technologies could work in tandem is being developed in Wuhan, where both 5G and Beidous mapping technologies will be used to create an autonomous vehicle testbed on a 28-kilometer stretch of road.

Beidou already has 120 partners signed up to work with the service all linked to agreements made under Chinas expanding Belt and Road infrastructure initiative, according to Nikkei.

Chinese smartphone manufacturers accounted for more than 40% of sales worldwide as of the second quarter of 2019, the latest data from Counterpoint Research shows.

Chinas GPS rolled out in phases, beginning with a domestic service launched in 2000 and a regional service for Asia Pacific coming online in 2012.

By 2020, the nations network of 35 satellites will exceed the U.S. system thats currently in place.

There is certainly an aspect of this that is about expanding influence, but part of it is likely also about economic security, Alexandra Stickings, from the Royal United Services Institute for Defense and Security Studies, told the BBClast year. The main advantage of having your own system is security of access, in the sense that you are not relying on another country to provide it. The US could deny users access over certain areas, for example in times of conflict.

Space is an area of strategic importance for the Chinese government. The country has already achieved significant milestones, including quantum communications powered by its space capabilities and the first exploration of the far side of the Moon. And current plans are in place for China to send a probe to Mars in 2020 as it prepares to complete a space station by 2022.

Its against this backdrop of increasing activity in space even as tensions mount terrestrially that the U.S. created the latest branch of its armed forces under the moniker of the Space Force.

Citing Chinese state media, the Nikkei Times reported that the value of goods and services tied to Beidou will reach $57 billion by 2020. The figure itself is nebulous, but points to the kind of economic power Beijing hopes to yield through the new satellite positioning service.

The development of these alternative internet realities matters a great deal.

As Eric Schmidt, the former chief executive officer of Google and no stranger to the operations of Chinese technology companies noted last year at a private dinner (first reported by CNBC):

[The] Chinese Internet is a greater percentage of the GDP of China, which is a big number, than the same percentage of the US, which is also a big number. If you think of China as like Oh yeah, theyre good with the Internet, youre missing the point. Globalization means that they get to play too. I think youre going to see fantastic leadership in products and services from China. Theres a real danger that along with those products and services comes a different leadership regime from government, with censorship, controls, etc. Look at the way BRI works their Belt and Road Initiative, which involves 60-ish countries its perfectly possible those countries will begin to take on the infrastructure that China has with some loss of freedom.

Link:
China nears completion of its GPS competitor, increasing the potential for Internet balkanization - TechCrunch

Read More..

Best Android antivirus? The top 11 tools – CIO East Africa

The following are the nine best business-class antivirus tools for Android, according to AV-TESTs November 2019 evaluations of 21 Android security apps. (The AV-TEST Institute is a Germany-based independent service provider of IT security and antivirus research.)

AV-TEST rates each tool for three areas: protection (six points max), performance (six points max), and usability (six points max). The products listed here all had perfect scores of 18.

The average real-time malware detection rate for all apps tested was 97.2%. For real-time detection of Android malware discovered in the past four weeks the average rate was 97.5%.

Keep in mind that these tests were done in a lab environment. Different enterprise systems with different threat models will see different results for each of the products listed below. In other words, dont expect that a 100% detection rate in the lab means that a product will detect all antivirus threats on your network. One reason is that it can take days for a newly submitted malware sample to make it into any given antivirus products database.

What the AV-TEST results show is which Android antivirus products are consistently the best at the fundamentals of malware detection and have minimal impact on system performance. That makes a good starting point as you evaluate which products work best for your environment.

The apps below are in alphabetical order.

AVL had perfect scores across the board for protection, performance and usability. It is a little light on features, offering only call blocking of unknown numbers.

Avira Antivirus Security wasnt quite perfect on protection, detecting 99.6% of malware attacks in real time. It did check all the boxes on performance and gave no false warnings. Untested features include application control, privacy advisor, and safe browsing.

Bitdefender Mobile Securitys Android malware detection in real-time is 100%, and it discovered the newest Android threats discovered in the last four weeks 100% of the time as well. For usability, the app gets big check marks for not dragging down battery life or device speeds. AV-TEST found zero false warnings during installation/usage of legitimate apps from Google Play or during installation and use of apps from third-party stores.

Unlike some Android malware protection apps, Bitdefenders Mobile Security offers anti-theft features, including remote lock, wipe, and locate, as well as safe web browsing and phishing protection. Like many other Android security tools, it doesnt include message filtering or call blocking and doesnt support all types of encryption. Additional features not evaluated include app lock and a privacy advisor.

Security Master had perfect 100% scores in both protection tests, checked all the boxes for performance, and gave no false warnings. It has a reasonably good suite of features including anti-theft, application control, VPN, a wi-fi advisor/check, and safe browsing.

G Datas Internet Security has more features than many of its other top-rated competitors. AV-TEST checked the boxes for remote lock, wipe, and locate; call blocking; message filtering; safe browsing; and parental control. The app does not enable personal data to be saved to an SD card or cloud storage or provide a VPN feature.

Internet Securitys real-time Android malware detection rate was 100%, and it detected threats discovered in the past four weeks 100% of the time as well. The app issued zero false warnings during installation and use of legitimate apps from third-party app stores.

Although Kaspersky Internet Security executed the protection tests perfectly and checked all the performance boxes, its feature set is not as big as some of the other options on this list. It offers application control, call blocking, and safe browsing, but does not have features like backup to an SD card or a privacy advisor.

McAfee Mobile Security Android malware scanner detected bugs in real-time 99.9% of the time, and caught malware discovered in the last four weeks 100% of the time. Usability was stellar. The apps feature set is strong, including a full set of anti-theft tools, call blocking, safe browsing and phishing protection, parental control, and the ability to save personal data to an SD card or the cloud. Mobile Security doesnt support call blocking, however.

Symantec Norton Mobile Security caught 100% of all Android malware, including those discovered recently and within four weeks, with no false warnings. It has a good set of usability features, including safe browsing, personal data backup, anti-theft, and call blocking. Features not reviewed include a system advisor.

A newcomer to the AV-TEST list, NoxSecuritys Antivirus, Clean Virus, Booster had a strong showing. It did not hinder the performance of Android and detected all malware tested. It has a reasonably good feature set including application control, call blocking, safe browsing, and Wi-Fi advisor.

Nearly perfect in the protection tests, Sophos Intercept Xcaught 99.9% of the malware samples in real time and all the Android malware discovered in the last four weeks. It offers application control, a privacy advisor, safe browsing, and a Wi-Fi advisor, but no VPN feature, call blocking or backup to an SD card.

Trend Micro Mobile Security had perfect scores for performance and usability, and nearly perfect protection scores, detecting 99.9% of malware attacks in real time. It also has a solid feature set, missing only backup of personal data and VPN capability. Features not tested include anti-theft, messenger protection, network protection, and parental control.

Research from the AV-TEST Institute shows that Android malware samples collected have increased sizeably every year. In 2014, the total was more than 326 million. The next year, the malware tally reached more than 470 million. In 2016, AV-TEST recorded nearly 597.5 million samplesnearly double the amount from two years earlier. And in 2018, were looking at 838.14 million.

See original here:
Best Android antivirus? The top 11 tools - CIO East Africa

Read More..