Category Archives: Internet Security

First Malware Running on AWS Lambda Discovered The New Stack – thenewstack.io

Amazon Web Services (AWS) Lambda, serverless computings poster child, is over seven years old. So, perhaps whats amazing isnt that the first malware specifically targeting Lambda, Denonia is here, its that it took so long for one to arrive.

Oh well. It had to happen eventually.

Its important to note, though, that while Denonia runs on Lambda, its not a Lambda-specific program. Instead, its a Linux 64-bit ELF executable, which uses several third-party libraries, including one that enables it to run inside AWS Lambda environments.

According to Matt Muir, a security researcher with Cado Security, a cloud-security company, who discovered it, while the program has the filename python, its actually written in Go. This nasty bit of software contains a customized variant of the open source XMRig mining software.

Denonia, Muir said, is clearly designed to execute inside of Lambda environments we havent yet identified how it is deployed. It may simply be a matter of compromising AWS Access and Secret Keys then manually deploying into compromised Lambda environments, as weve seen before with more simple Python scripts.

It appears that this is how Denonia is spread. It cant spread itself. It requires an already compromised user account.

As AWS pointed out in a statement, Denonia does not exploit any weakness in Lambda or any other AWS service. It gets through AWSs doors by relying on fraudulently obtained account credentials. Therefore, AWS concludes, Denonia isnt really malware since it lacks the ability to gain unauthorized access to any system by itself.

Actually, while malware that spreads itself is far more dangerous than malware that doesnt, most security experts would agree that its still malware. Still, AWS asserts that Calling Denonia a Lambda-focused malware is a distortion of fact, as it doesnt use any vulnerability in the Lambda service. That last part is certainly true. But you still dont want it running on your Lambda services.

Denonia can also run outside of Lambda. It will run on generic 64-bit Linux, as well.

Another factor that makes Denonia dangerous is that instead of using DNS to contact its controller, it uses DNS over HTTPS (DoH). DoH encrypts DNS queries and sends the requests out as regular HTTPS traffic to DoH resolvers. For attackers, Muir comments it provides two advantages:

There have long been serious security concerns with DoH. As Paul Vixie, DNSs creator tweeted in 2018, RFC 8484 (The Request for Comment that defined DoH) is a cluster duck for internet security. Sorry to rain on your parade. The inmates have taken over the asylum.

Vixies far from the only one. The SANS Institute, one of the worlds largest cybersecurity training organizations, said that the unmitigated usage of encrypted DNS, particularly DNS over HTTPS, could allow attackers and insiders to bypass organizational controls. Denonias use of DoH underlines that theres a real danger in what has heretofore been theoretical concerns.

Still, while Lambda itself is safer than other compute environments, keep in mind that as Amazon warns under the AWS Shared Responsibility Model, AWS secures the underlying Lambda execution environment but it is up to the customer to secure functions themselves. In other words, if you open the door to a program like Denonia, its your security problem, not AWSs.

So, as always, be careful out there people! AWS has an excellent white paper on securing Lambda environments, youd be well advised to use its recommendations. Lambda may well be safer than most compute platforms, but, as ever, security is a process, not a product. You must do your part as well.

Continue reading here:
First Malware Running on AWS Lambda Discovered The New Stack - thenewstack.io

The security conversation on connected medical devices is far from over – Digital Health

Our cyber security columnist, Davey Winder, explains why security conversations surrounding connected medical devices are not over yet.

Ive been warning about the Internet of Medical Things (IoT) from the threat-mapping perspective since I first started writing on cybersecurity for Digital Health six years ago.

A lot has changed since 2016 and, sadly, much has stayed the same. On the positive side of the connected-device security landscape fence sits the Product Security and Telecommunications Infrastructure (PSTI) Bill which, as of 23 March 2022, according to the parliamentary bills status site remains at the report stage. Assuming this passes into law before the end of the year, this would prohibit the use of factory set weak default passwords for IoT devices. Thats a really good move. Hop to the other side of the fence and you quickly learn that the PSTI Bill is consumer legislation and wont cover medical devices. OK, lets try and find some positives in that.

Is existing legislation enough?

At the end of last year, I interviewed David Rogers MBE for a Forbes article about the PSTI Bill. Rogers, as well as being CEO of IoT security outfit Copper Horse is also chair of the GSM Association (GSMA) Fraud and Security Group as well as sitting on the executive board of the Internet of Things Security Foundation. Most notably, however, he drafted a set of technical requirements that eventually became what is now the UK Code of Practice for Consumer IoT Security. In other words, hes an IoT security expert of the highest calibre. So, why was he not too concerned about medical devices not being included in the proposed legislation? Rogers spoke to the clear sectoral differences and already existing regulation, particularly in the medical sector, which cover safety aspects and go above and beyond where we are here, and it doesnt seem to make sense to land grab those spaces.

Indeed, the Medicines and Medical Devices Act 2021 was granted Royal Assent last year and built upon the Medical Devices Regulations 2002 to update the regulatory system for medical devices as and when required, according to the Department of Health and Social Care. Whether this actually does ensure an effective system for regulating medical devices remains to be seen. Im skeptical not least because while the Medicines and Healthcare products Regulatory Agency (MHRA) has oversight when it comes to the safety, quality and performance of medical devices, theres a world of difference between measuring clinical effectiveness and potential cybersecurity vulnerability. Im inclined to think that excluding these devices from the PSTI Bill is, actually, regrettable.

Research found 75% of medical IoT devices had known security gaps

As we all know how vulnerable medial IoT devices can be. If you want some examples of what happens when they are, look no further (although this particular research was US-based so it is admittedly a fair way) than a recent study by Unit 42 researchers with Palo Alto Networks of data from 200,000 healthcare network-connected medical infusion pumps that found:

As the NHS urges hospitals to reinforce cybersecurity amid the current international conflict, many in healthcare will remember the devastating effects of the WannaCry ransomware attacks, says Keiron Holyome, VP UK, Ireland, and Middle East, at BlackBerry.

Poorly protected endpoints are a major red flag when it comes to ransomware, a threat that most certainly has not gone away although efforts by NHS Digital and individual trusts have certainly reduced the risk.

To prevent attacks, healthcare organisations must ensure that every device is safe, reliable, secure and safety certifiable, Holyome continues, and that includes IoT-connected medical devices such as ventilators or robotic surgery arms. T

he problem there being, amongst others, that much of this medical device footprint will be legacy-based and cost-issues will prohibit replacement, and patching isnt even doable for many bits of IoT kit.

Are we shouting loudly enough?

This is a very complex conversation, theres no doubt about it, and one that NHS Digital is absolutely engaged in. The latest security guidance for healthcare providers when it comes to procuring and deploying connected medical devices (CMDs) includes legacy devices with inadequate support.

Top of the list of resources is the Data Security and Protection Toolkit (DSPT). At the end of last year this was updated to include a requirement for up-to-date records of such CMDs. While this doesnt solve the problem, there are no silver bullets, it does mean the conversation is being had loud and clear at trusts and providers who understand what DSPT compliance really means. Anything that helps focus attention on this particular piece of an overall security posture gets two thumbs up from me. Is it enough? No, no way.

Allow me to finish where I began, straddling that connected-device security landscape fence. The NHS Digital guidance makes it very clear that the guidance is more applicable to large devices and this represents a gap in the guidance currently available.

The kind of CMD referred to include low-cost and legacy ones where risk-reduction measures are not viable as well as those devices with inflexible supporting network architecture. I have the feeling that both the threats and the conversation will be continuing for some time to come.

Read the original post:
The security conversation on connected medical devices is far from over - Digital Health

New Windows 11 Security Requires Reinstallation Of The System – KHTS Radio

An upcoming Windows 11 s feature will require the re-installation of the system for all PC users that have already upgraded to Windows 11. The underlying factor that prompted the invention of Windows 11 is security. Windows 11 will bring in more security features in the future that will add even more security from chip to the secure cloud by merging current hardware plus software.

One unique security feature that is a significant improvement of the Windows 11 is the Smart App Control. The smart App Control is akin to a smart screen as they operate using similar techniques. It is embedded in Windows 11 Operating System to protect by sounding an alarm when you are about to download malicious software into your device, not aware of its safety status. Thus, every application that runs through Windows 11 is put through the Smart App Control to ascertain their potential harm or safety.

Novel computers with already installed Windows 11, the smart app control gets automatically installed. However, old devices with the previous form of Windows 11 must be reset and a new Windows 11 reinstalled to benefit from the Smart App Control.

Another critical security measure against the invasion of privacy is the WireGuard VPN. It is a remarkable internet security feature, with a quicker communication procedure than an open VPN. Also, WireGuard is an extremely simple yet fast and modern VPN that utilizes 15% less internet data. It ensures zero data leaks and protection from cyberattacks.

In addition to the Smart App Control and WireGuard VPN, Windows 11 has other very unique security features, which are as follows.

The number of features that will be on by default has increased, which is an improvement from windows10 security, which incorporated options for security features such as VBS. Businesses were forced to set them on operation physically.

However, with windows 11, the manually turned on features in Windows 10 will be automatically turned on, which explains the heightened CPU requirement. Making security features on by default makes security somewhat less optional for all PC users.

Some of the windows 11 security features that will be automatically turned on include Virtual Based Security (VBS), windows sandbox, Kernel Data Protection (KDP), secure boot, Trusted Platform Module (TPM) encryption, and Mode-based execution control.

Microsoft has advertised windows 11 as being a zero-trust set. That means that cybersecurity incidences are bound to reduce significantly, hence improving response time by cyber security professionals.

Also, zero trust ready implies windows 11 affords the ability to ascertain whether a device has security structures enabled or not. Hence, a device must show it is safe before access to data. Windows 11 affords zero trust security to both the hardware and software thanks to the Microsoft Azure Attestation (MAA). MAA can remotely sanction the honesty of hardware and software wanting to access delicate cloud resources.

Virtualization is a significant security feature that enables Windows 11 developers to try out application features from their computers prior to rollout to the public. VBS utilizes virtualization to layer up more protection to security aspects and protect them from malware infection.

Windows sandboxing provides PC users with a secure environment distinct from their PC for running applications. Everything within the sandbox gets erased once the PC user closes the application. This layer of protection ensures that any malware within an application does not find its way to the files plus other applications within the computer.

Microsoft has witnessed a significant uptake of the sandboxing security feature by personal users and is currently still accessing the balance between usability and security.

Windows 11 provides passwordless right of entry for your devices, using only the PIN, fingerprint, or facial recognition. Passwordless access is by default for consumers, whereas businesses will have the ability to set up simple passwordless models.

The passwordless access heightens security and diminishes operating expenditures for IT operators since the time for helping with password set-up reduces.

Windows 11 uses at least 8th generation intel CPU to enable default security elements it wants to include. The 8th generation devices support the default features and optimize performance such that users do not trade in usability for security.

Windows 11 certified devices are equipped with TPM 2.0 chips, which guard credentials plus credential keys to the back of the hardware. Such protection is not hackable.

Windows 11 promises heightened security in todays world, where hacking, phishing, and ransomware are rampant. However, if you are using a previously installed Windows 11 and want to take advantage of new Windows 11 features, you will have to reinstall your system to benefit.

See the original post:
New Windows 11 Security Requires Reinstallation Of The System - KHTS Radio

Australian cyber: What’s Redspice for? | The Interpreter – The Interpreter

Canberra is significantly boosting the cyber capabilities of the Australian Signals Directorate (ASD) the government agency responsible for signals intelligence, support to military operations, cyber warfare and information security. Project Redspice, announced in March, will increase ASDs budget by almost $10 billion over 10 years.

Unfortunately, ASDs 21-page Blueprint offers few insights into how the new money will be spent. In essence, we know only that the organisations staffing will almost double, its persistent cyber hunt activities will expand at the same rate, and its offensive cyber capability will grow even faster; tripling over the same period.

Hardly shy of criticising China, the government remains peculiarly leery of identifying Beijing as the source of constant cyber operations against Australia.

Prime Minister Scott Morrison has explained this move as necessary in order to be prepared for war: the first shot fired in any conflict that Australia might be involved in won't be in a metal casing, it'll be in bits and bytes. According to Defence Minister Peter Dutton, that was most recently demonstrated by offensive cyber activity against Ukraine.

Thats all true, but the cyber threat is more immediate and its coming from China. Hardly shy of criticising China, the government remains peculiarly leery of identifying Beijing as the source of constant cyber operations against Australia. Canberra joined allies to name China as the perpetrator of a Microsoft Exchange hack identified in January 2021, but still generally prefers euphemisms such as state-based actor (or allusions like Redspice).

Canberras focus on a future war is also misleading. Chinas aggressive actions in cyberspace are part of a growing competition short of war in what is often, if unhelpfully, described as the grey zone. Australias goal in this contest is not simply to win cyber battles by having superior offensive capabilities but to prevent cyberspace being transformed into a battlespace.

Australia wants an open and secure global internet in which states behave according to accepted rules. So Canberra must use its growing offensive cyber capability strategically to avoid undermining this greater goal.

Public messaging is an essential part of this strategic approach, not least because the opacity of cyberspace can foster misunderstanding. Clear communication is essential to both deter adversaries and reassure international partners.

There are, of course, limits on what the government can say about the activities its intelligence organisations perform. But in 2016, Australia was among the first countries to reveal its offensive cyber capability. In doing so, then Prime Minister Malcolm Turnbull said this would add a level of deterrence [and] adds to our credibility as we promote norms of good behaviour on the international stage.

ASDs leaders have since then slowly added to the picture. Theyve explained that offensive cyber (which doesnt include reconnaissance or espionage) encompasses anything from sabotage of critical infrastructure down to subtle manipulation of data. ASDs former Director-General Mike Burgess has emphasised that most of the agencys operations are low key: our targets may find their communications dont work at a critical moment rather than being destroyed completely. Burgess and his successor Rachel Noble have described ASDs operations against non-state actors (terrorists and criminals), but not other states.

Still, its clear that ASD is legally able to undertake offensive cyber activity against other states in situations short of war. ASD may conduct offensive cyber operations to disrupt criminal activity. Cybercrime is defined broadly enough to include other states cyber intrusions. ASD Director-General Rachel Noble last year underscored that we consider both state actors and serious and organised criminals to be undertaking criminal activity when going after Australian networks.

Canberra often emphasises that its offensive cyber operations accord with international and domestic law. The bigger question is whether Australia should use its offensive cyber capabilities against other states and, if so, how?

US public discussion of these issues has evolved faster than Australias in recent years. When Turnbull revealed Australias capability, President Barack Obama was still keeping tight control over US cyber operations. President Donald Trump reversed this approach in 2018, partly because that was his modus operandi and partly because cyber security agencies argued for a new approach.

Advocates argue that America can only counter its adversaries continual cyberattacks by operating in their networks.

President Joe Biden appears to have maintained the policy of defend forward, articulated in Trumps2018 Department of Defense Cyber Strategy. Washingtons current approach to competition in cyberspace is described as persistent engagement by Paul Nakasone, the dual-hatted head of the National Security Agency (NSA) and Cyber Command (both of which are ASDs close American counterparts.)

Still, the US debate about persistent engagement continues. Advocates argue that America can only counter its adversaries continual cyberattacks by operating in their networks. Opponents maintain that the risks of unintended consequences and escalation are too great. But most of them would acknowledge that those risks are at least mitigated by Washingtons relatively transparent discussion of cyber strategy.

Australias offensive cyber capability is now growing faster than its public discussion about why these tools are needed and how they should be used. Because Australian cyber competition with China will almost inevitably intensify, so too will the need to publicly air the complex questions of strategy and values that this raises. At minimum, Canberra should say whether ASD has also adopted persistent engagement.

Read more:
Australian cyber: What's Redspice for? | The Interpreter - The Interpreter

Healthcare Internet of Things Security Market Scope and overview, To Develop with Increased Global Emphasis on Industrialization 2029 | Cisco Systems…

California (United States), April 13 The Healthcare Internet of Things Security Market Research Report is a professional asset that provides dynamic and statistical insights into regional and global markets. It includes a comprehensive study of the current scenario to safeguard the trends and prospects of the market. Healthcare Internet of Things Security Research reports also track future technologies and developments. Thorough information on new products, and regional and market investments is provided in the report. This Healthcare Internet of Things Security research report also scrutinizes all the elements businesses need to get unbiased data to help them understand the threats and challenges ahead of their business. The Service industry report further includes market shortcomings, stability, growth drivers, restraining factors, and opportunities over the forecast period.

Get Sample Report with Table and Graphs:

https://www.a2zmarketresearch.com/sample-request/551752

Healthcare Internet of Things Security is growing at a goodCAGR over the forecast period. Increasing individual interest in Service industry is a major reason for the expansion of this market.

Top Companies in this report are:

Cisco Systems Inc., Oracle Corporation, Intel Corporation, Trend Micro Inc., Kaspersky Lab, Deutsche Telekom AG, Dell Corporation, Inside Secure SA, Agile Cyber Security Solutions, LLC., Symantec Corporation.

Report overview:

* The report analyses regional growth trends and future opportunities.

* Detailed analysis of each segment provides relevant information.

* The data collected in the report is investigated and verified by analysts.

* This report provides realistic information on supply, demand and future forecasts.

Healthcare Internet of Things Security Market Overview:

This systematic research study provides an inside-out assessment of the Healthcare Internet of Things Security market while proposing significant fragments of knowledge, chronic insights and industry-approved and measurably maintained Service market conjectures. Furthermore, a controlled and formal collection of assumptions and strategies was used to construct this in-depth examination.

During the development of this Healthcare Internet of Things Security research report, the driving factors of the market are investigated. It also provides information on market constraints to help clients build successful businesses. The report also addresses key opportunities.

Get Special Discount:

https://www.a2zmarketresearch.com/discount/551752

This report provides an in-depth and broad understanding of Healthcare Internet of Things Security. With accurate data covering all the key features of the current market, the report offers extensive data from key players. An audit of the state of the market is mentioned as accurate historical data for each segment is available during the forecast period. Driving forces, restraints, and opportunities are provided to help provide an improved picture of this market investment during the forecast period 2022-2029.

Some essential purposes of the Healthcare Internet of Things Security market research report:

oVital Developments: Custom investigation provides the critical improvements of the Healthcare Internet of Things Security market, including R&D, new item shipment, coordinated efforts, development rate, partnerships, joint efforts, and local development of rivals working in the market on a global scale and regional.

oMarket Characteristics:The report contains Healthcare Internet of Things Security market highlights, income, limit, limit utilization rate, value, net, creation rate, generation, utilization, import, trade, supply, demand, cost, part of the industry in general, CAGR and gross margin. Likewise, the market report offers an exhaustive investigation of the elements and their most recent patterns, along with Service market fragments and subsections.

oInvestigative Tools:This market report incorporates the accurately considered and evaluated information of the major established players and their extension into the Healthcare Internet of Things Security market by methods. Systematic tools and methodologies, for example, Porters Five Powers Investigation, Possibilities Study, and numerous other statistical investigation methods have been used to analyze the development of the key players working in the Healthcare Internet of Things Security market.

oConvincingly, the Healthcare Internet of Things Security report will give you an unmistakable perspective on every single market reality without the need to allude to some other research report or source of information. This report will provide all of you with the realities about the past, present, and eventual fate of the Service market.

Buy Exclusive Report: https://www.a2zmarketresearch.com/checkout

Contact Us:

Roger Smith

1887 WHITNEY MESA DR HENDERSON, NV 89014

sales@a2zmarketresearch.com

+1 775 237 4147

Read the original post:
Healthcare Internet of Things Security Market Scope and overview, To Develop with Increased Global Emphasis on Industrialization 2029 | Cisco Systems...

Why legal intervention is the way forward for safe digital public infrastructure – Hindustan Times

India ranks third in global data breaches in 2021, a 356% increase from the previous year. Since we do not currently have a national data protection or data privacy law, such cybersecurity failures pose massive threats of financial fraud and identity thefts on citizens. There needs to be a better mechanism that incentivises organisations that are collecting and storing citizen data to maintain stronger internet security measures.

Neither the proposed Data Protection Bill nor the amendment to the Information Technology Act, speaks about the responsibility of cybersecurity compromises. The Data Protection Bill mandates that companies need to report breaches within 72 hours of the occurrence, but there is no requirement for companies to secure citizen data. India had also introduced the National Cybersecurity Policy in 2013 which suggested several broad strategies including the provision of fiscal schemes and incentives to encourage entities to install, strengthen and upgrade information infrastructure for cybersecurity. As the government changed in 2014, not much has been done to implement the policy or to extend it to legal accountability and enforcement.

Indias e-commerce sector has witnessed tremendous growth in recent years. It is expected to grow to $188 billion by 2025. The Fintech market in the country is estimated to be the third-largest in the world. India is also the worlds second-largest telecommunication market.

This rapid and accelerated digitisation over the past few years has meant personal data collection at an equally rapid, yet unregulated, pace. The data collected online ranges from basic information (such as name, address, age, gender and phone number) to sensitive details (such as bank account numbers, credit/debit card numbers, government ID numbers, and so on). Added to this information that is directly collected and stored, there is metadata that can reveal deeper insights about customers (such as personality types, spending patterns, personal interests, political inclinations, food preferences, schedules, physical and mental health). However, other than the informal trust that the customer puts into these companies, there is no legal or policy promise requiring these companies to ensure customer data is safe, secure, and only used for purposes informed to the customer.

For a solution, we can look to banking regulation. There, policies of zero liability and limited liability for cards and online financial frauds made the banks responsible for unauthorised financial transactions. Similarly, we need to push accountability for data security on all companies collecting and storing citizen data.

The need for economic growth, and hopes for foreign investments, should not deter us from enforcing internet security. All companies, public and private, should be required to report to the government the measures taken by them to ensure data security and information regarding potential threats and targets. There needs to be a channel to facilitate information exchange between companies facing similar threats. For companies that fail to show serious efforts for internet security or lack compliance with standards set by the government, customers should be actively notified of the risks while sharing their data with them. The required standards of internet security measures can also vary basis the sensitivity of the data being collected.

This added accountability is often seen as an additional cost, especially for small and medium enterprises. But this can also be an opportunity where the government guides and assists SMEs to choose cloud services wisely, safeguard their websites and portals, and ensure that they are protected from ransomware attackers as well as other threats over the internet.

Over the last decade, many countries have established agencies to focus on cybersecurity and a safe national digital infrastructure: Singapore, the United States, and Israel are examples. India does have the National Cyber Coordination Centre, but this agency is an internet scanning agency for real-time assessments of cyber threats and report generation. It lacks real-time partnerships with domestic and international private and government agencies. It also does not act as a mentor on matters of cybersecurity or enforce guidelines around data protection and overreach. Without proactive measures, partnership with private enterprises, collaborative efforts and legal accountability, effective execution and results may prove difficult.

Government guidance and support are not interchangeable with government surveillance or government overreach. The Indian government needs to put in place standards to protect citizen privacy and digital security, from all domestic and international malicious players online, and itself.

Data is the new oil, the new weapon of war, and the new gold. 54% of Indias 1.2 billion population is estimated to have access to the internet. A large push to Indias growth has been from its accelerated development and adoption of digital public infrastructure and digital public goods. Internet security has been an elephant in the room and it's time it is seen as urgent and crucial for continued growth propelled by digitisation, internet penetration, and innovation.

Avni Sinha is at the Harvard Kennedy School of Government

The views expressed are personal

More:
Why legal intervention is the way forward for safe digital public infrastructure - Hindustan Times

infected PC (not able to see FRST after download) – Virus, Trojan, Spyware, and Malware Removal Help – BleepingComputer

Hello, I was using Chrome. I able to get it downloaded thru Edge. Here is the logs

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 12-04-2022

Ran by Toshiba (administrator) on SNOUKS (TOSHIBA Satellite A505) (11-04-2022 07:18:44)

Running from C:UsersToshibaDesktop

Loaded Profiles: Toshiba

Platform: Microsoft Windows 10 Home Version 21H2 19044.1586 (X64) Language: English (United States)

Default browser: Chrome

Boot Mode: Normal

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(Adobe Inc. -> Adobe Systems Incorporated) C:Program FilesAdobeAdobe Creative Cloud ExperienceCCXProcess.exe

(C:Program FilesAdobeAdobe Creative Cloud ExperienceCCXProcess.exe ->) (Node.js Foundation -> Node.js) C:Program FilesAdobeAdobe Creative Cloud Experiencelibsnode.exe

(C:Program FilesAdobeAdobe Creative Cloud Experiencelibsnode.exe ->) (Adobe Inc. -> Adobe Inc) C:Program Files (x86)Common FilesAdobeAdobe Desktop CommonIPCBoxAdobeIPCBroker.exe

(C:ProgramDataMicrosoftWindows DefenderPlatform4.18.2203.5-0MsMpEng.exe ->) (Microsoft Windows Publisher -> Microsoft Corporation) C:ProgramDataMicrosoftWindows DefenderPlatform4.18.2203.5-0MpCopyAccelerator.exe

(Comodo Security Solutions, Inc. -> COMODO) C:Program Files (x86)COMODOInternet Security Essentialsvkise.exe

(explorer.exe ->) (Comodo Security Solutions, Inc. -> COMODO) C:Program FilesCOMODOCOMODO Internet Securitycis.exe <2>

(explorer.exe ->) (Intel Corporation - pGFX -> Intel Corporation) C:WindowsSystem32hkcmd.exe

(explorer.exe ->) (Intel Corporation - pGFX -> Intel Corporation) C:WindowsSystem32igfxpers.exe

(explorer.exe ->) (SEIKO EPSON CORPORATION -> Seiko Epson Corporation) C:WindowsSystem32spooldriversx643E_YATIS2E.EXE

(Google LLC -> Google LLC) C:Program Files (x86)GoogleUpdate1.3.36.122GoogleCrashHandler.exe

(Google LLC -> Google LLC) C:Program Files (x86)GoogleUpdate1.3.36.122GoogleCrashHandler64.exe

(Microsoft Corporation -> Microsoft Corporation) C:Program Files (x86)MicrosoftEdgeUpdateMicrosoftEdgeUpdate.exe

(SEIKO EPSON CORPORATION -> Seiko Epson Corporation) C:Program Files (x86)EPSON SoftwareEvent ManagerEEventManager.exe

(services.exe ->) (Comodo Security Solutions, Inc. -> COMODO) C:Program Files (x86)COMODOInternet Security Essentialsisesrv.exe

(services.exe ->) (Comodo Security Solutions, Inc. -> COMODO) C:Program FilesCOMODOCOMODO Internet Securitycmdagent.exe <2>

(services.exe ->) (Dynabook Inc. -> Dynabook Inc.) C:WindowsSystem32DriverStoreFileRepositorythpevm.inf_amd64_975290a9f28c9a50dynabookHDDProtection.exe

(services.exe ->) (Dynabook Inc. -> Dynabook Inc.) C:WindowsSystem32DriverStoreFileRepositorytossrvctl.inf_amd64_5be63eebe47f1577DSDFunctionKeyCtlService.exe <2>

(services.exe ->) (Dynabook Inc. -> Dynabook Inc.) C:WindowsSystem32DriverStoreFileRepositorytossrvctl.inf_amd64_5be63eebe47f1577dynabookSystemService.exe

(services.exe ->) (Dynabook Inc. -> Dynabook Inc.) C:WindowsSystem32DriverStoreFileRepositorytossrvctl.inf_amd64_5be63eebe47f1577RMService.exe

(services.exe ->) (GeoComply USA, Inc. -> GeoComply) C:Program Files (x86)GeoComplyPlayerLocationCheckApplicationservice.exe

(services.exe ->) (Microsoft Windows Publisher -> Microsoft Corporation) C:ProgramDataMicrosoftWindows DefenderPlatform4.18.2203.5-0MsMpEng.exe

(services.exe ->) (Microsoft Windows Publisher -> Microsoft Corporation) C:ProgramDataMicrosoftWindows DefenderPlatform4.18.2203.5-0NisSrv.exe

(services.exe ->) (Realtek Semiconductor Corp. -> Realtek Semiconductor Corp.) C:WindowsRtkBtManServ.exe

(services.exe ->) (SEIKO EPSON CORPORATION -> Seiko Epson Corporation) C:WindowsSystem32escsvc64.exe

(svchost.exe ->) (Comodo Security Solutions, Inc. -> COMODO) C:Program FilesCOMODOCOMODO Internet Securitycavwp.exe

(svchost.exe ->) (Microsoft Corporation) C:Program FilesWindowsAppsMicrosoft.549981C3F5F10_4.2203.4603.0_x64__8wekyb3d8bbweCortana.exe

(svchost.exe ->) (Microsoft Windows -> Microsoft Corporation) C:WindowsSystem32dllhost.exe <2>

(svchost.exe ->) (Microsoft Windows -> Microsoft Corporation) C:WindowsSystem32MoUsoCoreWorker.exe

(svchost.exe ->) (Microsoft Windows -> Microsoft Corporation) C:WindowsSystem32smartscreen.exe

(svchost.exe ->) (Synaptics Incorporated -> Synaptics Incorporated) C:Program FilesSynapticsSynTPSynTPEnh.exe

(Synaptics Incorporated -> Synaptics Incorporated) C:Program FilesSynapticsSynTPSynTPHelper.exe

Failed to access process -> chrome.exe

==================== Registry (Whitelisted) ===================

(If an entry is included in the fixlist, the registry item will be restored to default or removed. The file will not be moved.)

HKLM...Run: [COMODO Autostart {D5EFF3B3-E126-4AF6-BCE9-852A72129E10}] => C:Program FilesCOMODOCOMODO Internet Securitycis.exe [13190952 2021-01-22] (Comodo Security Solutions, Inc. -> COMODO)

HKLM...Run: [CL-26-8DE75AE7-0A63-4F8F-BF5A-8EB5D7E6C12D] => "C:Program FilesCommon FilesBitdefenderSetupInformationCL-26-8DE75AE7-0A63-4F8F-BF5A-8EB5D7E6C12Dsetuplauncher.exe" /run:Installer.exe /args:"/setup-folder:"CL-26-8DE75AE7-0A63-4F8F-BF5A-8EB5D7E (the data entry has 7 more characters). (No File)

HKLM-x32...Run: [IseUI] => C:Program Files (x86)COMODOInternet Security Essentialsvkise.exe [4187856 2019-01-29] (Comodo Security Solutions, Inc. -> COMODO)

HKLM-x32...Run: [Adobe CCXProcess] => C:Program Files (x86)AdobeAdobe Creative Cloud ExperienceCCXProcess.exe [129288 2022-01-23] (Adobe Inc. -> )

HKLM-x32...Run: [EEventManager] => C:Program Files (x86)Epson SoftwareEvent ManagerEEventManager.exe [1318024 2021-04-15] (SEIKO EPSON CORPORATION -> Seiko Epson Corporation)

HKUS-1-5-21-3293821250-204164366-3368483834-1000...Run: [LBRY] => C:Program FilesLBRYLBRY.exe [111104048 2021-08-20] (LBRY, Inc -> LBRY Inc.)

HKUS-1-5-21-3293821250-204164366-3368483834-1000...Run: [EPLTargetP0000000000000000] => C:WINDOWSsystem32spoolDRIVERSx643E_YATIS2E.EXE [418736 2019-08-21] (SEIKO EPSON CORPORATION -> Seiko Epson Corporation)

HKLM...PrintMonitorsEPSON ET-3760 Series 64MonitorBE: C:WINDOWSsystem32E_YLMBS2E.DLL [184832 2017-07-13] (Microsoft Windows Hardware Compatibility Publisher -> Seiko Epson Corporation)

HKLM...PrintMonitorsEpsonNet Print Port: C:WINDOWSsystem32enppmon.dll [500736 2016-09-14] (SEIKO EPSON CORPORATION) [File not signed]

HKLMSoftwareMicrosoftActive SetupInstalled Components: [{8A69D345-D564-463c-AFF1-A69D9E530F96}] -> C:Program Files (x86)GoogleChromeApplication100.0.4896.75Installerchrmstp.exe [2022-04-07] (Google LLC -> Google LLC)

HKLMSoftwareMicrosoftActive SetupInstalled Components: [{AFE6A462-C574-4B8A-AF43-4CC60DF4563B}] -> C:Program FilesBraveSoftwareBrave-BrowserApplication100.1.37.111Installerchrmstp.exe [2022-04-06] (Brave Software, Inc. -> Brave Software, Inc.)

HKLMSoftware...AuthenticationCredential Providers: [{503739d0-4c5e-4cfd-b3ba-d881334f0df2}] ->

GroupPolicy: Restriction ? <==== ATTENTION

Policies: C:ProgramDataNTUSER.pol: Restriction <==== ATTENTION

==================== Scheduled Tasks (Whitelisted) ============

(If an entry is included in the fixlist, it will be removed from the registry. The file will not be moved unless listed separately.)

Task: {0C8C80A4-8186-43AB-ABCB-FB19150048EA} - System32TasksCOMODOCOMODO Signature Update {B9D5C6F9-17D2-4917-8BD0-614BAA1C6A59} => C:Program FilesCOMODOCOMODO Internet Securitycfpconfg.exe [5758488 2021-01-22] (Comodo Security Solutions, Inc. -> COMODO)

Task: {11ADD8D4-2C3F-43A7-A469-AB4F335C96CC} - System32TasksEOSv3 Scheduler onLogOn => C:UsersToshibaAppDataLocalESETESETOnlineScannerESETOnlineScanner.exe LOGON (No File)

Task: {14F4F9E0-7B8F-423B-ADCE-9670F5566470} - System32TasksMicrosoftWindowsWindows DefenderWindows Defender Verification => C:ProgramDataMicrosoftWindows DefenderPlatform4.18.2203.5-0MpCmdRun.exe [993000 2022-04-06] (Microsoft Windows Publisher -> Microsoft Corporation)

Task: {1E2777D0-6312-4876-A92D-85CAFF7D1A08} - System32TasksMicrosoftWindowsSideShowAutoWake => {E51DFD48-AA36-4B45-BB52-E831F02E8316}

Task: {1E57E23A-A33B-4592-8563-A162DE50B662} - System32TasksCOMODOCOMODO Update {A6D52E4F-569B-4756-B3D8-DF217313DA85} => C:Program FilesCOMODOCOMODO Internet Securitycfpconfg.exe [5758488 2021-01-22] (Comodo Security Solutions, Inc. -> COMODO)

Task: {1FE76875-5331-4DB2-9206-23489D18EC13} - System32TasksGeoComply Update Task => C:Program Files (x86)GeoComply\PlayerLocationCheckUpdateGeoComplyUpdate.exe [3191272 2021-09-17] (GeoComply USA, Inc. -> GeoComply) -> /config=C:Program Files (x86)GeoComply\PlayerLocationCheckUpdateGeoComplyUpdate.xml

Task: {20775F62-C6B5-4A14-B4E0-6E207C75FC3B} - System32TasksMicrosoftWindowsMobilePCHotStart => {06DA0625-9701-43DA-BFD7-FBEEA2180A1E}

Task: {256433D9-5BB3-44A8-8253-8896C7080A48} - System32TasksBraveSoftwareUpdateTaskMachineCore => C:Program Files (x86)BraveSoftwareUpdateBraveUpdate.exe [165120 2022-04-06] (Brave Software, Inc. -> BraveSoftware Inc.)

Task: {2A3B5A74-5B4E-4802-B033-9F30D291F1CE} - System32TasksGoogleUpdateTaskMachineUA => C:Program Files (x86)GoogleUpdateGoogleUpdate.exe [156104 2020-03-22] (Google LLC -> Google LLC)

Task: {2F0AB328-1581-471C-BDE4-379327C75294} - System32TasksMicrosoftWindowsWindows DefenderWindows Defender Scheduled Scan => C:ProgramDataMicrosoftWindows DefenderPlatform4.18.2203.5-0MpCmdRun.exe [993000 2022-04-06] (Microsoft Windows Publisher -> Microsoft Corporation)

Task: {392BDD38-DFE8-4C8F-94F0-E8DA8357DD4F} - System32TasksCOMODOCOMODO Maintenance {947247B5-026A-4437-9371-770782BE839D} => C:Program FilesCOMODOCOMODO Internet Securitycfpconfg.exe [5758488 2021-01-22] (Comodo Security Solutions, Inc. -> COMODO)

Task: {48199BF7-F028-4A12-B674-5EAAE696143D} - System32TasksGeoComply Service Check => "C:Program Files (x86)GeoComply\PlayerLocationCheckApplicationPlayerLocationCheckTask.cmd" (No File)

Task: {486D715E-6AA2-44CF-BC48-B6990CBB53C6} - System32TasksMicrosoftWindowsShellWindowsParentalControlsMigration => {343D770D-7788-47C2-B62A-B7C4CED925CB}

Task: {5B42DD9C-5A26-4F27-BB95-34603F0997E5} - System32TasksMicrosoftWindowsShellWindowsParentalControls => {DFA14C43-F385-4170-99CC-1B7765FA0E4A}

Task: {5D7D040C-1486-489D-8C7D-D470A32043CA} - System32TasksCOMODOCOMODO Autostart {D5EFF3B3-E126-4AF6-BCE9-852A72129E10} => C:Program FilesCOMODOCOMODO Internet Securitycis.exe [13190952 2021-01-22] (Comodo Security Solutions, Inc. -> COMODO)

Task: {5E7765BB-58E5-4FBB-B21D-D9328885D900} - System32TasksCreateExplorerShellUnelevatedTask => C:WINDOWSExplorer.exe /NoUACCheck

Task: {6897767A-9A7A-4102-83A8-6824BFD63089} - System32TasksMicrosoftWindowsSideShowGadgetManager => {FF87090D-4A9A-4F47-879B-29A80C355D61}

Task: {7940B4A3-5CEF-4685-B822-76329CBBF6B1} - System32TasksSynaptics TouchPad Enhancements => C:Program FilesSynapticsSynTPSynTPEnh.exe [2778864 2014-08-06] (Synaptics Incorporated -> Synaptics Incorporated)

Task: {801E4A59-78E6-48C6-8713-FDB5981DCB7A} - System32TasksGoogleUpdateTaskMachineCore => C:Program Files (x86)GoogleUpdateGoogleUpdate.exe [156104 2020-03-22] (Google LLC -> Google LLC)

Task: {81510D8C-F5C1-44E2-BBFD-139EA1BE54E3} - System32TasksCOMODOCOMODO Telemetry {18AD3DFA-30C0-4B5F-84F7-F1870B1A4921} => C:Program FilesCOMODOCOMODO Internet Securitycis.exe [13190952 2021-01-22] (Comodo Security Solutions, Inc. -> COMODO)

Task: {81D0715D-E0DF-4C36-ADF7-80B01D80EA39} - System32TasksMicrosoftWindowsWindows DefenderWindows Defender Cache Maintenance => C:ProgramDataMicrosoftWindows DefenderPlatform4.18.2203.5-0MpCmdRun.exe [993000 2022-04-06] (Microsoft Windows Publisher -> Microsoft Corporation)

Task: {8F4054D0-8577-40F0-BE62-D52DD5AB9D91} - System32TasksBraveSoftwareUpdateTaskMachineUA => C:Program Files (x86)BraveSoftwareUpdateBraveUpdate.exe [165120 2022-04-06] (Brave Software, Inc. -> BraveSoftware Inc.)

Task: {AD6A7E32-968D-4AFD-878D-866CBD6A2368} - System32TasksExtended Service Plan_EPSON ET-3760 Series_1 => C:ProgramDataEpsonService Planepsvcp.exe [5543304 2021-04-02] (Epson America, Inc. -> Epson America)

Task: {B0CBAB43-44FC-469B-A4CE-87426761FDCE} - System32TasksMicrosoftWindowsPerfTrackBackgroundConfigSurveyor => {EA9155A3-8A39-40B4-8963-D3C761B18371}

Task: {DA543B29-64AD-4123-8E79-7223A4CE8784} - System32TasksMicrosoftWindowsWindows DefenderWindows Defender Cleanup => C:ProgramDataMicrosoftWindows DefenderPlatform4.18.2203.5-0MpCmdRun.exe [993000 2022-04-06] (Microsoft Windows Publisher -> Microsoft Corporation)

Task: {E48173C0-59B2-4596-9189-6FA6C8CAC54C} - System32TasksMicrosoftWindowsSideShowSessionAgent => {45F26E9E-6199-477F-85DA-AF1EDFE067B1}

Task: {E802A6CE-1F5C-498F-9F28-37AD7C9233D6} - System32TasksMicrosoftWindowsSideShowSystemDataProviders => {7CCA6768-8373-4D28-8876-83E8B4E3A969}

Task: {F8E9C0DC-B8EF-40F6-A087-F70E49D83267} - System32TasksEOSv3 Scheduler onTime => C:UsersToshibaAppDataLocalESETESETOnlineScannerESETOnlineScanner.exe SCHED (No File)

Task: {F927DB16-D1FD-4035-BFCC-466782E6826D} - System32TasksEPSON ET-3760 Series Update {CD590E99-8CC2-4E9E-B9AA-309553F63484} => C:WINDOWSsystem32spoolDRIVERSx643E_YTSS2E.EXE [680440 2017-06-06] (SEIKO EPSON CORPORATION -> Seiko Epson Corporation)

Task: {F9E61B39-4C97-45AA-B07D-95FD683565E0} - System32TasksCOMODOCOMODO CMC {06A09C0F-DD9C-4191-A670-71115CD78627} => C:Program FilesCOMODOCOMODO Internet Securitycfpconfg.exe [5758488 2021-01-22] (Comodo Security Solutions, Inc. -> COMODO)

Read more here:
infected PC (not able to see FRST after download) - Virus, Trojan, Spyware, and Malware Removal Help - BleepingComputer

Security experts fear the DMA will break WhatsApp encryption – The Verge

On March 24th, EU governing bodies announced that they had reached a deal on the most sweeping legislation to target Big Tech in Europe, known as the Digital Markets Act (DMA). Seen as an ambitious law with far-reaching implications, the most eye-catching measure in the bill would require that every large tech company defined as having a market capitalization of more than 75 billion and a user base of more than 45 million people in the EU create products that are interoperable with smaller platforms. For messaging apps, that would mean letting end-to-end encrypted services like WhatsApp mingle with less secure protocols like SMS which security experts worry will undermine hard-won gains in the field of message encryption.

The main focus of the DMA is a class of large tech companies termed gatekeepers, defined by the size of their audience or revenue and, by extension, the structural power they are able to wield against smaller competitors. Through the new regulations, the government is hoping to break open some of the services provided by such companies to allow smaller businesses to compete. That could mean letting users install third-party apps outside of the App Store, letting outside sellers rank higher in Amazon searches, or requiring messaging apps to send texts across multiple protocols.

But this could pose a real problem for services promising end-to-end encryption: the consensus among cryptographers is that it will be difficult, if not impossible, to maintain encryption between apps, with potentially enormous implications for users. Signal is small enough that it wouldnt be affected by the DMA provisions, but WhatsApp which uses the Signal protocol and is owned by Meta certainly would be. The result could be that some, if not all, of WhatsApps end-to-end messaging encryption is weakened or removed, robbing a billion users of the protections of private messaging.

Given the need for precise implementation of cryptographic standards, experts say that theres no simple fix that can reconcile security and interoperability for encrypted messaging services. Effectively, there would be no way to fuse together different forms of encryption across apps with different design features, said Steven Bellovin, an acclaimed internet security researcher and professor of computer science at Columbia University.

Trying to reconcile two different cryptographic architectures simply cant be done; one side or the other will have to make major changes, Bellovin said. A design that works only when both parties are online will look very different than one that works with stored messages .... How do you make those two systems interoperate?

Making different messaging services compatible can lead to a lowest common denominator approach to design, Bellovin says, in which the unique features that made certain apps valuable to users are stripped back until a shared level of compatibility is reached. For example, if one app supports encrypted multi-party communication and another does not, maintaining communications between them would usually require that the encryption be dropped.

Alternatively, the DMA suggests another approach equally unsatisfactory to privacy advocates in which messages sent between two platforms with incompatible encryption schemes are decrypted and re-encrypted when passed between them, breaking the chain of end-to-end encryption and creating a point of vulnerability for interception by a bad actor.

Alec Muffett, an internet security expert and former Facebook engineer who recently helped Twitter launch an encrypted Tor service, told The Verge that it would be a mistake to think that Apple, Google, Facebook, and other tech companies were making identical and interchangeable products that could easily be combined.

If you went into a McDonalds and said, In the interest of breaking corporate monopolies, I demand that you include a sushi platter from some other restaurant with my order, they would rightly just stare at you, Muffett said. What happens when the requested sushi arrives by courier at McDonalds from the ostensibly requested sushi restaurant? Can and should McDonalds serve that sushi to the customer? Was the courier legitimate? Was it prepared safely?

Currently, every messaging service takes responsibility for its own security and Muffett and others have argued that by demanding interoperability, users of one service are exposed to vulnerabilities that may have been introduced by another. In the end, overall security is only as strong as the weakest link.

Another point of concern raised by security experts is the problem of maintaining a coherent namespace, the set of identifiers that are used to designate different devices in any networked system. A basic principle of encryption is that messages are encoded in a way that is unique to a known cryptographic identity, so doing a good job of identity management is fundamental to maintaining security.

How do you tell your phone who you want to talk to, and how does the phone find that person? said Alex Stamos, director of the Stanford Internet Observatory and former chief security officer at Facebook. There is no way to allow for end-to-end encryption without trusting every provider to handle the identity management... If the goal is for all of the messaging systems to treat each others users exactly the same, then this is a privacy and security nightmare.

Not all security experts have responded so negatively to the DMA. Some of the objections shared previously by Muffett and Stamos have been addressed in a blog post from Matrix, a project geared around the development of an open-source, secure communications standard.

The post, written by Matrix co-founder Matthew Hodgson, acknowledges the challenges that come with mandated interoperability but argues that they are outweighed by benefits that will come from challenging the tech giants insistence on closed messaging ecosystems.

In the past, gatekeepers dismissed the effort of [interoperability] as not being worthwhile, Hodgson told The Verge. After all, the default course of action is to build a walled garden, and having built one, the temptation is to try to trap as many users as possible.

But with users generally happy to centralize trust and a social graph in one app, its unclear whether the top-down imposition of cross-platform messaging is mirrored by demand from below.

iMessage already has interop: its called SMS, and users really dislike it, said Alex Stamos. And it has really bad security properties that arent explained by green bubbles.

More here:
Security experts fear the DMA will break WhatsApp encryption - The Verge

Nearly $6M will help UArizona grow national cybersecurity workforce – University of Arizona News

By Kyle Mittan, University Communications

Today

Daily life is happening increasingly online, and there aren't enough cybersecurity professionals in the U.S. to keep everyone safe online.

That's the basic problem that nearly $6 million in new funding will help the University of Arizona's nationally renowned cyber operations program to address in the coming years.

The UArizona College of Applied Science and Technology, where the program is based, received the funding in the fall from Arizona's Technology and Research Initiative Fund. The voter-supported fund helps the state's three public universities address issues critical to the state or larger society, including workforce development.

In a world held together by information delivered over the internet, cyber operations or cybersecurity professionals are charged with protecting their employers' online networks, said Jason Denno, director of cyber, intelligence and information operations at the College of Applied Science and Technology.

Students in the college's cyber operations program learn to do that from both an offensive and defensive position. In addition to learning how to defend against cybersecurity adversaries known as "bad actors," Denno said, students also learn to act like the bad actors to better understand and defend against attacks.

But the outlook for the nation's cybersecurity workforce shows a significant gap between how many jobs need filled and the number of people qualified for them, Denno said. From 2019 to 2020, the number of unfilled cybersecurity jobs increased from more than 350,000 to more than 521,000, Denno said. Current estimates place the gap at more than 600,000 unfilled jobs.

To fix that, the college aims to drastically increase the number of students its cyber operations program can accommodate.

"We're trying to make a fundamental impact on the security posture of the U.S. that's what our graduates are going to do," Denno said.

The cyber operations program, which features both online components and in-person opportunities at the college's campus in Sierra Vista, began in 2016 with three students, Denno said. At the beginning of this semester, the program had about 900 students. About 250 students have graduated from the program since 2016.

The new funding, Denno said, will allow the program to hire more faculty and staff, with the goal of boosting its enrollment to 2,000 students by the end of 2025, and to 5,000 students by the end of 2030. It will also provide for IT infrastructure upgrades, Denno said.

"The COVID-19 pandemic has only underscored our reliance on the internet, and therefore our reliance on cyber operations professionals," said University of Arizona President Robert C. Robbins. "I am proud that our nationally recognized cyber operations program is equipped to help solve the shortage of these professionals, and I am thankful the state is partnering with us in that effort through this funding."

'Reverse-engineered' to be among the best

With the new funding, the college hopes to build on the successes its cyber operations program has already seen in the short time since it began. In 2018, less than two years after the program launched, it was designated a Center of Academic Excellence in Cyber Operations by the National Security Agency. Only 24 institutions nationwide have that designation.

The reasons for that recognition go back to the founding of the program, Denno said.

"We reverse-engineered the cyber degree from the NSA's most technical standards," he said. "We created this program from the ground up to be the most technical set of knowledge, skills and abilities for our students."

To that end, the college has built a suite of tools and programs that deliver real-world lessons to cyber operations students.

Those programs include CyberApolis, a virtual online world with more than 15,000 online personas that use artificial intelligence to write emails, post to social media, browse the web, buy goods in online stores and more. CyberApolis replicates the real internet, providing students with a lifelike cyber operations training environment and a safe place to run offensive cyber operations drills. Doing so on the open internet, Denno said, could amount to a federal crime.

"We needed this synthetic, live environment that mimicked the internet, that felt completely real as a student and that was a safe environment where they couldn't do anything wrong that they would get in trouble for," Denno said, adding that CyberApolis will undergo upgrades as a result of the new funding.

Denno also pointed to the college's partnership with the city of Sierra Vista, which allows cyber operations students to behave like nefarious hackers and "attack" the city's networks to determine vulnerabilities. The students then compile a report to show where the city can improve its cyber defenses.

"The security awareness of the city has risen dramatically," Denno said.

University Information Technology Services at UArizona has also taken on cyber operations students as interns, so they can get hands-on experience helping to defend the university's networks.

"Our students' hands-on experience is embedded in our AI-driven virtual environment, from their first class through their required capstone project," said Gary Packard, dean of the College of Applied Science and Technology. "This ensures we meet the NSA's highest technical standards to develop graduates with real-world cyber security capability on day one for the government and corporate cybersecurity workforce."

Here is the original post:
Nearly $6M will help UArizona grow national cybersecurity workforce - University of Arizona News

For the Kremlin, the Internet is a Western Plot – Center for European Policy Analysis

In 2017, Russia vowed to make its Internet sustainable and self-sufficient. In reality, the Kremlin undertook its first systematic effort to control its cyberspace.

As Russia sends tanks and soldiers to take over Ukraine, it is also dispatching censors and regulators to strangle the Internet. In this special series by the Center for European Policy Analysis, The New Iron Curtain, Senior Fellows Andrei Soldatov and Irina Borogan argue that both invasions are linked and represent the culmination of a more than a decade-long trend to throttle the free and open flow of information in Russia.

For years, former KGB generals watched the growth of the Internet with suspicion, believing it was a threat to Russias national security. They vowed to disable it.

Their leader was Vladislav Sherstyuk, a career KGB officer. In 1998, he became director of FAPSI, the division of the intelligence service in charge of spying on foreign communications and the protection of the governments most sensitive networks. The next year, President Putin promoted Sherstyuk to the powerful Security Council, where he supervised the information security department. In 2000, his team composed the Information Security Doctrine of the Russian Federation, a plan for the future of the Russian internet.

Its doctrine reflects the KGB mindset: the free flow of information, coming from the West, poses a threat to Russias national security. Threats ranged from a devaluation of spiritual values to a reduction of the spiritual, moral and creative potential of the Russian population, as well as the manipulation of information (disinformation, concealment or misrepresentation). Putin signed the document, and the Security Council became the ideological center of operations to curb Russian Internet freedom and the force behind the nascent Sovereign Internet.

In November 2017, the Security Council instructed the Ministry of Communications to submit proposals for the creation and implementation of a state information system to ensure the integrity, stability, and security of the Russian segment of the Internet, as well as replacement root servers for national top-level domain names." The Security Council warned: A serious threat to the security of the Russian Federation is the increased capabilities of Western countries to conduct offensive operations in the information space and readiness to use them.

Officially, the Security Council aimed to make the Russian Internet sustainable end self-sufficient. In fact, the Kremlin wanted to build an effective system of control. The Kremlin identified six challenges to overcome:

During the Cold War, the Kremlin saw the most dangerous content coming from Western media. This content could be found on the Internet, but Russians preferred and trusted domestic content.

Opposition leader Alexei Navalnys documentaries about Kremlin corruption attracted record YouTube audiences. In 2017, Navalnys YouTube video about Russian Prime Minister Dmitri Medvedevs alleged corruption was viewed more than 22 million times. Since then, Navalnys organization has produced anti-corruption videos on YouTube on an industrial scale. These videos are more popular than content created by Radio Free Europe, Voice of America, or the BBC.

The Kremlin began to pressure both local and Western technology companies to take down opposition content critical to authorities.

When ordinary people witness a natural disaster, a technical catastrophe, or police brutality and share the evidence through video or photos -- the posts go viral. The information spreads too quickly for the censorship system to address.

The Kremlin began to set up a Moscow control center, giving it the ability to oversee access to the entire Russian Internet.

Censors understand that activists use apps such as Signal or software such as Tor to obscure their communications, but ordinary Russians depend on mainstream consumer apps such as WhatsApp, Viber (a communications app owned by the Japanese company Rakuten), Telegram, and TikTok.

The Kremlin aimed to change reliance on Western apps to local ones that the security services could control and suppress.

YouTube and TikToks explosive growth took Russian authorities by surprise. In 2017, Navalny's documentary about Medvedevs corruption encouraged Russian YouTubers to spread videos showing police brutality used to crack down on protests. Russian schoolchildren filmed their teachers raging about enemies of the state and posted the videos.

The Kremlin concentrated its censorship efforts on video posts, filing numerous complaints to YouTube about the Navalny videos, and arresting the editor of Navalny Live.

In August 2018, tensions rose in the majority Muslim region of Ingushetia over a Kremlin-supported border-swap agreement with neighboring Chechnya. On the day of the agreements signing, about a hundred people gathered to protest in the Ingush capital, Magas.

Ingushetia's Internet was cut. Authorities suppressed live streaming. In the following weeks, the Ingush kept going to the streets to protest, and the FSB secret service enforced web shutdowns.

Despite the efforts, information about protests kept leaking. The Kremlins new system, controlled through a single center in Moscow, was built to shut down the Internet to entire regions, allowing it to act without relying on regional enforcers.

Starting in the 1990s, Russian telecom companies were required to buy and update equipment for online surveillance. Starting in 2018, Russians were obliged to store the complete data of all users for six months, and their metadata for three years.

Telecom companies protested. Sometimes, their resistance became public company officials expressed their concerns at conferences and to journalists. In most cases, the resistance stayed private. Companies attempted to find a way around the legislation, for instance, by renting surveillance equipment from large operators. This resistance undermined the effectiveness of the Russian nationwide surveillance and filtering.

Kremlin censors realized that they needed to pay companies to install censorship and surveillance tools. They began providing Internet service providers with special equipment which gave the government the means to suppress and redirect the traffic to the control center in Moscow.

The Sovereign Internet was born. It would be built out over the next few years, in advance of the decision to invade Ukraine.

Andrei Soldatov is a nonresident senior fellow with the Center for European Policy Analysis. Andrei is a Russian investigative journalist, co-founder, and editor of Agentura.ru, a watchdog of the Russian secret services activities. He has been covering security services and terrorism issues since 1999.

Irina Borogan is a nonresident senior fellow with the Center for European Policy Analysis. Irina is a Russian investigative journalist, co-founder, and deputy editor of Agentura.ru, a watchdog of the Russian secret services activities.

Visit link:
For the Kremlin, the Internet is a Western Plot - Center for European Policy Analysis