Page 4,313«..1020..4,3124,3134,3144,315..4,3204,330..»

Internet security upgrade on course – Business Daily (press release) (blog)

Corporate Wednesday, May 31, 2017 21:08

By MUTHOKI MUMO

Every time you type an address into your browser you are essentially asking a question to the Internet. The answer is the website that loads seconds later.

Internet users want to trust that the answers they get, the sites that load on their screens, are correct. This may not always be the case, because Internet infrastructure was not designed with security as a primary concern, it is possible for a hacker to intercept your question and give you an answer that may look correct but is essentially wrong.

So, for instance, an Internet user looking for her banks online portal might be redirected to a malicious site where her password or even credit card details might be stolen. The Internet has evolved over time. It used to be a much safer neighbourhood. Now more and more bad guys are coming up with interesting ways to take advantage, said Mr David Conrad, the Chief Technology Officer (CTO) of the International Corporation for Assigned Names and Numbers (ICANN).

Come October 11 and ICANN will carry out a major overhaul of this system. For the first time since the inception of the Domain Name System Security Extension (DNSSEC), a new cryptographic key pair will be put in place to help ensure the integrity of Internet traffic.

ICANN says that this is simply part of good security practice in the same manner an email user changes their passwords to guard against hackers.

The general best practice for managing passwords is that you dont want to not change your password for a while because the longer you leave your password, the more likely it is that someone can guess it, Mr Conrad told Digital Business.

The stakes are high. About 750 million Internet users could be affected. However, Mr Conrad says if everything goes smoothly then Internet end-users should notice no difference.

On the other hand, if Internet service providers (ISPs) and network operators who have enabled DNSSEC are running old software, their clients may be left in an Internet blackout. ICANN is now on a campaign, urging ISPs and network operators to update their systems and trial their ability to run on the new system using a test bed on the corporations website.

Although ICANN says there have been no breaches, it is adamant that the October exercise is essential for continued security of the Internet.

Mr Conrad is concerned not about your average hacker, but bigger actors, up to nation-states, getting their hands on the key pair. Therefore, the corporation sees this exercise almost like a drill for a worst-case scenario.

There has been no hint of compromise, no hint that there is any risk but we want to ensure that the infrastructure allows us to change the key should we ever need to in sort of panic mode, says Mr Conrad.

How much of the Internet ecosystem will be left out in the cold come October remains to be seen.

To be truly secure, we need everyone to be on board with DNSSEC. But there are people out there for whom this is not a priority. Raising awareness of the roll over and mobilising everyone is also an expensive undertaking, said Mr William Makatiani, chief executive of cyber security firm, Serianu.

Of particular concern are smaller enterprises that often rely on outside consultants to set up their IT infrastructure. These businesses may be caught unawares come October. ICANN is a non-profit organisation tasked with coordination and maintenance of various forms of Internet infrastructure.

In 2010, ICANN came up with a solution to resolve this problem by setting up a system to provide a chain of trust for Internet users. At the very top of this chain is a cryptographic key pair which essentially makes sure that Internet users get the correct answers to their questions.

Read more:
Internet security upgrade on course - Business Daily (press release) (blog)

Read More..

China to Implement Its First Law on Internet Security After Ransomware Attack – Sputnik International

Asia & Pacific

03:47 01.06.2017(updated 03:51 01.06.2017) Get short URL

The ransomware attacked inmore than100 countries, including China, byencrypting data and demanding ransom payments inBitcoin cryptocurrency starting fromMay 12. The IP addresses ofat least 29,372 agencies inChina were attacked, mainly inthe energy, transportation, medical, education, and science and technology sectors.

REUTERS/ Kacper Pempel/Illustration

Although the fallout ofthe WannaCry ransomware has subsided, we cannot take lightly other new cyber worms, said an official atthe National Research Center forInformation Technology Security.

Experts disclosed that almost all sectors and enterprises unaffected inthis incident adopted risk control ahead oftime. A critical patch was issued byMicrosoft toremove underlying vulnerabilities forsupported systems nearly two months beforethe attack, though many organizations failed toapply it.

In addition, the concept ofnetwork isolation asthe most effective method tomaintain internet security should be revisited, asintranet withoutany protective measures would be more vulnerable, experts said.

This article was originally published inthe Global Times.

Read more from the original source:
China to Implement Its First Law on Internet Security After Ransomware Attack - Sputnik International

Read More..

Cyber security: Africa gets Internet security guidelines – TheNewsGuru

The Internet Society and the African Union Commission on Wednesday unveiled a new Internet Infrastructure Security Guidelines for Africa.

According to a statement by Mr Michelle Anekeya, the societys Communications Officer, the guideline was launched at the ongoing African Internet Summit, taking place in Nairobi.

He said the 3-day summit, which started on Wednesday, May 31 will end on Friday, June 2.

Anekeya said the guidelines would help Africa to create a more secure Internet infrastructure, saying it sets to change the way African Union States approach cyber security preparedness.

He said the guidelines, the first of their kind in Africa, were developed by a multi-stakeholder group of African and global internet infrastructure security experts, as the first step towards building a more secure Internet in Africa.

He said the guidelines would help AU member states strengthen the security of their local Internet infrastructure through actions at a regional, national, ISP/operator and organisational level.

He added that Africas cyber security environment was facing a unique combination of challenges, including a lack of awareness of the risks involved in using technology.

Kenya was ranked the 69th most vulnerable country out of 127 in the 2015 Deloitte Global Threat Index.

Some of the main reasons are: low awareness, underinvestment, talent shortage and overload of data. Deloitte further estimates that Kenya lost $171 million to cybercrime in 2016.

Africa has achieved major strides in developing its Internet Infrastructure in the past decade.

However, the Internet wont provide the aspired benefits unless we can trust it.

We have seen from recent experiences that Africa is not immune from cyber-attacks and other security threats.

These guidelines, developed in collaboration with the African Union Commission, will help African countries put in place the necessary measures to increase the security of their Internet infrastructure, Anekeya said.

According to him, the guidelines offer actions that are tailored to the African cyber security environment and solutions for an ever changing online landscape.

He quoted Dawit Bekele, Africa Regional Bureau Director for the Internet Society, as saying that the document was launched at a time when the world felt the real and urgent need to build and reinforce structures aimed at tackling the growing cyber threat to the global digital economy.

He added that Governments, companies, network operators, universities and organisations across African Union member states are encouraged to take action to implement the Internet

The Commission of the African Union will continue its partnership with the Internet Society on a second set of guidelines addressing personal data protection in Africa, he added.

Anekeya said according to ITU ICT Facts and Figures 2016, it was estimated that 25.1 percent of Africans were now online.

He said despite lower Internet access rates compared to other regions in the world, there had been a sustained double-digit growth in Internet penetration over the past 10 years in the continent.

He said this was partly due to an increase of mobile Internet and in more affordable smart phones in the market and Africas young, technology-savvy population.

He said to continue to improve access and connect the unconnected, people needed to trust the Internet.

Symantec, a global leader in cyber security, observed that 24 million malware incidents were targeted at Africa in 2016.

The rest is here:
Cyber security: Africa gets Internet security guidelines - TheNewsGuru

Read More..

Internet Security Alliance: NIST framework metrics should focus on threats – Inside Cybersecurity (subscription)

Internet Security Alliance: NIST framework metrics should focus on threats
Inside Cybersecurity (subscription)
The National Institute of Standards and Technology should focus on developing an analytical tool enabling entities to assess cyber threats on a monetized basis, according to the president of the Internet Security Alliance, as NIST continues probing ...

Go here to read the rest:
Internet Security Alliance: NIST framework metrics should focus on threats - Inside Cybersecurity (subscription)

Read More..

Whistic Partners with the Center for Internet Security to Extend the … – PR Web (press release)

Our ability to offer the CIS Controls as a questionnaire in a collaborative, online user experience will benefit our customers and their vendors as they seamlessly complete and securely share their responses.

SILICON SLOPES, UTAH (PRWEB) June 01, 2017

Whistic, a leading third-party security assessment platform, today announced that it has partnered with the Center for Internet Security (CIS), a leading global provider of cybersecurity services, to extend the reach of the Critical Security Controls for Effective Cyber Defense (CIS Controls).

As cyber threats continue to increase at a rapid rate and at global scale, Whistic remains dedicated to enhancing the ability of organizations to improve their internal security posture and assess the security risks of their third parties, said Josh Mortensen, CEO of Whistic. The CIS Controls and CIS Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. Our ability to offer the CIS Controls as a questionnaire in a collaborative, online user experience will benefit our customers and their vendors as they seamlessly complete and securely share their responses.

Serving information security teams in the United States and Europe, the Whistic security assessment platform simplifies the end-to-end assessment process and delivers visibility into third-party security risk that has historically been trapped in static questionnaires. Whistic simplifies and automates the sending, receiving and scoring of security profiles against widely adopted standards at scale as a part of the growing trend toward greater scrutiny of third-party security. Whistics partnership with the CIS, as well as its support of other leading standards and widely accepted frameworks, reinforces the companys focus on enhancing the tools that companies already trust in order to understand the security posture of their third-party relationships.

About the Center for Internet Security CIS is a forward-thinking nonprofit entity that harnesses the power of the global IT community to safeguard private and public organizations against cyber threats. Our CIS Controls and CIS Benchmarks are the global standard and recognized best practices for securing IT systems and data against the most pervasive attacks. These proven guidelines are continually refined and verified by a volunteer global community of experienced IT professionals. CIS is home to the Multi-State Information Sharing & Analysis Center (MS-ISAC), the go-to resource for cyber threat prevention, protection, response, and recovery for state, local, tribal, and territorial governments.

For more information, visit http://www.cisecurity.org, read the latest on the CIS Blog (https://www.cisecurity.org/resources/blog/) or follow CIS on Twitter @CIsecurity (https://twitter.com/CISecurity).

About Whistic Located in the heart of the Silicon Slopes in Utah, Whistic is a leading third-party security assessment platform. Built for information security teams looking to improve the effectiveness, efficiency and scope of their third-party security assessment program, Whistic enhances productivity and unlocks insights traditionally trapped in static security questionnaires. Using the platforms intelligent and automated recurring assessments, Whistic customers eliminate the administrative burdens of back-and-forth third-party requests and free up time to focus on security. The Whistic platform is designed for an intuitive and collaborative user experience and harnesses the wisdom of hundreds of security professionals to deliver risk insights through its proprietary CrowdConfidence scoring algorithm.

For more information, visit https://www.whistic.com, read the latest on the Whistic blog (https://blog.whistic.com) or follow Whistic on Twitter @Whistic_inc (https://twitter.com/whistic_inc).

Share article on social media or email:

Go here to see the original:
Whistic Partners with the Center for Internet Security to Extend the ... - PR Web (press release)

Read More..

China cyber-security law will keep citizens’ data within the Great Firewall – The Register

China's new cyber-security laws, which come into effect on Thursday, may make it harder for foreign businesses to trade in the country.

Under the regulations, data on Chinese citizens including personal information, salary details and more can only be kept within China. The law would also prevent the transmission of any economic, scientific or technological data overseas on either national security or public interest grounds, as defined by the Chinese government.

The rules apply to any "network operator" a term that encompasses social media companies and large internet firms and mean that they need users' permission before transferring any data on them outside the country. The consequences for businesses that fail to comply with this new law are dire: a refused or revoked licence can never be reversed. This means if companies that fail to comply with the so-called Bei'an licence laws are liable to get blacklisted.

Bill Hagestad, a former US Marine Corps lieutenant colonel turned cyber conflict author and researcher, told El Reg that the new rules reflect heightened concern in Beijing about foreign influence mediated through the internet.

"The new Chinese internet security law is designed to protect the cyber borders of China against foreign negative influences," Hagestad said. "[It is] also designed to ensure the Communist Party ideals are not directly or indirectly challenged by impure thoughts.

"Given the release of the Shadow Brokers' NSA tools, the Chinese are now more certain than ever before that any foreign technology brought into the Middle Kingdom must be inspected and deemed pure/free from any vulnerabilities that could challenge China's internet security."

Alex Nam, EMEA managing director of content delivery network CDNetworks, warned that foreign internet companies will now find it harder to trade in China.

"The new cybersecurity law on 1 June will make it harder for non-Chinese businesses to trade in the country," Nam said. "All businesses that host websites and web content (such as applications) in China will be affected. Yet many don't know what impact the law has on them or whether their business is in jeopardy.

"Thousands of government officials, as well as intelligent algorithms, are currently investigating whether non-Chinese companies meet all of the requirements of the new legislation. The new law has a huge impact on network operators and critical information infrastructure operators because they host websites in China on behalf of other companies. As a result, checks are being carried out to determine whether hosting providers and content delivery network (CDN) providers have the necessary licences, and are being asked by government officials to make the necessary changes in the shortest possible time."

CDNetworks says it's seeing "uncertainty from companies as to whether they are affected by the legislation".

"Without support and guidance, UK businesses are putting themselves at risk," Nam added. "Especially the UK businesses operating in China, who are completely unaware that this new law even impacts them."

Continue reading here:
China cyber-security law will keep citizens' data within the Great Firewall - The Register

Read More..

Keybase adds end-to-end encryption to messages on the web – Naked Security

Is Keybase the public key encryption platform that security mavens have been waiting for?

Its been kicking around in slow-burning development for three years, during which time it has released a website, desktop app (Windows, Mac, Linux), mobile (Android, iOS) and chat apps. Last week came an extension to embed Keybase in the Chrome browser.

If this sounds like a standard messaging app mashup, what underpins Keybase is actually far more daring and, potentially, important which is why were writing about it.

Keybase can be described as a system for users to generate a public encryption key (or upload their own existing ones) to verify their online identity with a high degree of certainty.

If this sounds a bit arcane, identity is the fundamental problem that lies at the root of many of securitys woes: nobody has any way of knowing someone is who they say they are and so must proceed based on risky assumptions.

Public key cryptography has tried to solve this by using either a hierarchy of trust (ie, certificates verified by an authority) or a web of trust (ie a network of users who vouch for each other), the latter a concept made famous PGP, Phil Zimmermanns encryption software.

Web of trust sounds intriguing but turned out to be complex, which is why Keybase wants to reprise the idea minus the hard corners.

Users verify their public key in Keybase through Twitter, Facebook, GitHub, Reddit, or Hacker News, each one boosting verification, the more the merrier. A hacker wanting to impersonate someone using a fake key would come up against a wall. In a sense, Keybase is a database of these proofs that verify a public identity.

Keybase wants to build security applications on top of this. With the new Chrome extension loaded, a blue button appears on the profiles of each registered service (such as Twitter) that allows Keybase users to DM each another with end-to-end security.

It also functions as a sort of social network that tells people how to communicate with someone using public keys, including initiating secure file exchanges. Users can follow one another and use keys to communicate securely.

For now, Keybase remains a work in progress. Marketing and documentation isnt great for a company that had a $10.8m funding round in 2015, perhaps because it doesnt want an influx at this stage.

Keybase might simply be trying to build a set of security capabilities that popularise public key encryption, or it might be trying to create a bigger platform that could be used in a number of ways by third parties. Its not yet clear.

The biggest challenge will be to get users engaged in a world where some of what Keybase does is already covered, albeit imperfectly, by apps such as WhatsApp. Verification, identify and public-private keys are all very well but most users dont understand their significance or dont care. Two decades ago, PGP struggled to break out for similar reasons. Security cant afford history to repeat itself.

Read the original post:
Keybase adds end-to-end encryption to messages on the web - Naked Security

Read More..

Britain’s largest broker offers bitcoin investment – Telegraph.co.uk

Hargreaves customers can hold the bitcoin investment in their self-invested personal pension(Sipp) or a normal broking account.

Mr Cox added that Hargreaves already allowed investors to access the Bitcoin Investment Trust. The$389m fund isrun by Grayscale Investments, which specialises in "crypto-currencies".

"By adding self-service, online dealing, the team at Hargreaves Lansdown is providing UK investors with professional and quick access to bitcoin in the UK and greater Europe," saidRyan Radloff, XBT's head of investor relations.

Crypto-currencies came to noticefollowing the launch of bitcoinby a developer under the pseudonym ofSatoshi Nakamotoin 2009. Online currencies are beyond the control of the worlds central banks and allow anonymous transactions. They operate using a digital ledger of transactions known as a blockchain.

The price of bitcoin has surged since the start of the year.Its price indollar terms has more than doubledfrom less than $900 to more than $2,400 today. Currently one bitcoin equals 1,902, 2,145or $2,422, according to CryptoCompare.com.

The currency also hit the headlines last monthwhen the hackers behind the WannaCry cyber attack that took down parts of theNHS IT system demanded ransom payments in bitcoin. The currency has long been linked to the online underworld.

Go here to read the rest:
Britain's largest broker offers bitcoin investment - Telegraph.co.uk

Read More..

A Bitcoin Beginner’s Guide to Surviving the BIP 148 UASF – Bitcoin Magazine


Bitcoin Magazine
A Bitcoin Beginner's Guide to Surviving the BIP 148 UASF
Bitcoin Magazine
There is a chance Bitcoin will experience a chain-split on August 1st. A segment of all Bitcoin users is committed to activate a user activated soft fork (UASF) as described in Bitcoin Improvement Proposal 148 (BIP 148). Specifically, they will reject ...

and more »

Read the original post:
A Bitcoin Beginner's Guide to Surviving the BIP 148 UASF - Bitcoin Magazine

Read More..

Beginners buying bitcoins should do these three things – Stansberry Churchouse Research (registration) (blog)

Asia Wealth Investment Daily

Investment Education

Weve received a lot of feedback from our last few write-ups on the bitcoin and cryptocurrency market.

And because a many readers have said they are going to roll up their sleeves and enter the market themselves, we thought wed offer three simple pieces of advice to bitcoin beginners.

Speaking from personal experience, I highly recommend that folks looking to buy some bitcoin start with an extremely small amount no more than a bitcoins worth, which today is the equivalent of a couple thousand U.S. dollars. (You can use less money and buy a fraction of a bitcoin also if you prefer).The process of buying, moving and storing bitcoin is not like traditional online banking or investing. If you send bitcoin to the wrong location, for example, you cant just call up your bank and cancel your transaction. So its critical to familiarise yourself with the mechanics of buying and moving bitcoin around first with a relatively small sum, before moving on to larger dollar amounts.

The process of buying, moving and storing bitcoin is not like traditional online banking or investing. If you send bitcoin to the wrong location, for example, you cant just call up your bank and cancel your transaction. So its critical to familiarise yourself with the mechanics of buying and moving bitcoin around first with a relatively small sum, before moving on to larger dollar amounts.

Its ironic that whilst bitcoin is a highly modern technology, you must make sure you keep offline records of all your bitcoin information. That means a pen and paper, or at least using a Microsoft word document and printing it out as a back up.

Storing and sending/receiving bitcoin involves setting up a digital wallet. This is a where you keep your bitcoin.

Your wallet has a public key (which might look a bit like this: 1GwV7fPX97hmavc6iNrUZUogmjpLPrPFoE) which is where the bitcoin gets sent to. This is like an account name.

Recommended Link

How one of Japans wealthiest families could double your money They started out as one of Japans wealthiest and most prestigious merchant families. Now, theyre on the verge of making early investors 100% or more in just 12 months. Go here to see why.

Your wallet also has a private key. This will either be an alpha-numeric sequence that looks like the public key above, or a long sequence of random words generated by the wallet. This is the password you use to access your wallet.

Either way, secure wallets do not have an I forgot my password option.

If you lose or forget your private key, you lose access to your wallet. And you lose your investment. Period.

I write everything down, and I print out screen grabs (that is, printouts of what is shown on the screen).

In order to convert your cash into bitcoin, you need to open an account with an exchange.

This process will typically take a few days as the exchange will need to conduct KYC (know your customer) diligence on you. This means theyll do a standard identity verification so the exchange knows who you are, and that youre not a wanted criminal.

Once youve opened the account, youll be able to fund it with a bank transfer or by credit card in some cases before you buy bitcoin.

If the exchange where you bought bitcoin (and left it there) gets hacked ,then you can lose your money. This has happened in a couple of high-profile cases.

For example, in 2014 bitcoin exchange Mt. Gox, which at the tie was handling up to 70 percent of all bitcoin volume, filed for bankruptcy, saying that 750,000 of customer bitcoin was missing. Thats US$1.5 billion-worth at todays prices.

The safest place to store your bitcoin is in a wallet. Theres a good selection to choose from here.

Good investing,

Tama

P.S. I know weve been banging on about a particular stock recommendation from The Churchouse Letter for a few weeks now, but thats what we do when we find great ideas for our subscribers. Our recommendation is now up 32 percent since we recommended it at the end of April. Click here for your subscriptionand the full story.

Tama Churchouse spent nearly a decade creating and selling financial derivatives for a global investment bank in Hong Kong. As Lead Analyst he brings technical expertise across the entire asset class spectrum, from equities and index products, to interest rates and credit.

Visit link:
Beginners buying bitcoins should do these three things - Stansberry Churchouse Research (registration) (blog)

Read More..