Category Archives: Internet Security
Cyberattacks to critical infrastructure threaten our safety and well-being – The Conversation CA
What would happen if you could no longer use the technological systems that you rely on every day? Im not talking about your smart phone or laptop computer, but all those systems many of us often take for granted and dont think about.
What if you could not turn on the lights or power your refrigerator? What if you could not get through to emergency services when you dial 911? What if you could not access your bank account, get safe drinking water or even flush your toilet?
According to Canadas National Strategy for Critical Infrastructure, critical infrastructure refers to the processes, systems, facilities, technologies, networks, assets and services essential to the health, safety, security or economic well-being of the public and the effective functioning of government.
Disruptions to these kinds of systems, especially those caused by cyberattacks, can have devastating consequences. Thats why these systems are called critical infrastructure.
Over the past six months, the fragility of critical infrastructure has been given plenty of attention. This has been driven by a string of notable cyberattacks on several critical infrastructure sectors.
It was revealed that in late March 2021, CNA Financial Corp., one of the largest insurance companies in the United States was victim to a ransomware attack. As a result, the company faced disruptions of their systems and networks.
In May 2021, a ransomware attack on Colonial Pipeline halted plant operations for six days. The attack led to a fuel crisis and increased prices in the eastern U.S.
Weeks later, in June 2021, a ransomware attack hit JBS USA Holdings, Inc., one of the worlds largest meat producers. This attack brought about supply chain turmoil in Canada, the U.S. and Australia.
Also in June 2021, the Marthas Vineyard and Nantucket Steamship Authority was victim of a ransomware attack that disrupted ferry services and caused service delays.
On Oct. 14, 2021, hot on the heels of cyberattacks targeting the financial, gas, food and transportation sectors, the U.S. Cybersecurity and Infrastructure Security Agency released Alert AA21-287.
The alert turns attention to the fragility of yet another critical infrastructure sector. It warns of ongoing malicious cyberactivity targeting water and wastewater facilities. These activities include exploits of internet-connected services and outdated operating systems and software, as well as spear phishing and ransomware attacks something we have seen a lot in recent cyberattacks.
According to the alert, these cyberthreats could impact the ability of water and wastewater facilities to provide clean, potable water to, and effectively manage the wastewater of, their communities.
The need for combating cyberthreats to critical infrastructure is well recognized. However, the infrastructure today is far from secure. This is due to a many interrelated factors that create a perfect storm of exposures.
First, many of our most critical systems are extremely complex. This complexity is rapidly increasing as the number of devices and connections in these systems continues to grow.
Second, many of these systems involve a mix of insecure, outdated legacy systems and new technologies. These new technologies promise features like advanced analytics and automation. However, they are sometimes connected and used in insecure ways that the original designers of the legacy systems could not have imagined.
Taken together, these factors mean that these systems are too complex to be completely understood by a person, a team of people or even a computer model. This makes it very difficult to identify weak spots that if exploited accidentally or intentionally could lead to system failures.
In the Cyber Security Evaluation and Assurance (CyberSEA) Research Lab at Carleton University, we are developing solutions to address the fragility of critical infrastructure. The goal is to improve security and resilience of these important systems.
The complexities of critical infrastructure can lead to unexpected or unplanned interactions among system components, known as implicit interactions.
Exploitation of implicit interactions has the potential to impact the safety, security and reliability of a system and its operations. For example, implicit interactions can enable system components to interact in unintended and often undesirable ways. This leads to unpredictable system behaviours that can allow attackers to damage or disrupt the system and its operations.
We recently conducted a cybersecurity analysis at CyberSEA on a real-world municipal wastewater treatment system, where we identified and measured characteristics of implicit interactions in the system. This was part of our ongoing research, conducted in partnership with the Critical Infrastructure Resilience Institute at the University of Illinois at Urbana-Champaign.
Our analysis found a significant proportion of implicit interactions present in the system, and approximately 28 per cent of these identified vulnerabilities showed signs of being ripe for attackers to exploit and cause damage or disruption in the system.
Our study showed that implicit interactions exist in real-world critical infrastructure systems. Feedback from the operators of the wastewater system in our case study stated that our approaches and tools are useful for identifying potential security issues and informing mitigation efforts when designing critical systems.
This may be a glimmer of hope in the fight against cyberthreats to critical infrastructure. Continued development of rigorous and practical approaches to address increasingly critical issues in designing, implementing, evaluating and assuring the safe, secure and reliable operation of these systems is needed.
A more robust infrastructure will lead to fewer threats to our security and access to services, ensuring our well-being and the effective functioning of our governments and society.
More:
Cyberattacks to critical infrastructure threaten our safety and well-being - The Conversation CA
Cybersecurity Awareness Month: Soon-to-be grad loves the ‘whole picture’ of cyber operations – Jagwire Augusta
Justin Henry, a senior pursuing a Bachelor of Science in Cyber Operations in the School of Computer and Cyber Sciences, loves looking at the big picture when it comes to cybersecurity.
Henry, an Augusta native, enrolled at Augusta University in 2018, following his service in the U.S. Marine Corps. He was first intrigued by the field of cyber operations, thanks to his fellow Marines showing him the ropes of what they did during their service.
While Augusta University didnt have a cyber operations program when he initially enrolled since it wasnt created until 2019, Henry started his time at Augusta University as a computer science major.
With my security background, Ive definitely been interested in the whole picture, he said.
To Henry, cyber operations is the best of both worlds of computer science and cybersecurity. Contrary to popular belief, computer science and cybersecurity are two different disciplines. The cyber operations degree program blends both disciplines into one program. Thats what Henry loves the most about it.
With computer science, the focus is what can I make a computer do? When it comes to cybersecurity, the focus is what can I make a network do? said Henry. Cyber operations is a perfect blend of both disciplines.
October is Cybersecurity Awareness Month, and the theme this year is Do Your Part. #BeCyberSmart. The 2021 theme is meant to empower individuals and organizations to own their role in protecting their part of cyberspace.
To be cyber smart this month and beyond Henry advises to never assume a website youre on is safe. Always approach a website with a bit of skepticism.
Back in 2004, the National Cyber Security Alliance and the U.S. Department of Homeland Security launched National Cybersecurity Awareness Month in an effort to help all Americans become more secure online.
As we get more and more connected to the internet, this field is only going to become more relevant, Henry said. Its not going away at all, probably ever.
Henry is working with Dr. Hoda Maleki on a medical information research project this semester. The researchers are analyzing how to facilitate the sharing of medical information with providers who need it, while simultaneously coming up with a way to identify if there is a breach in the system. Maleki said she appreciates how Henry fully invests himself into his work.
Justin consistently meets and often exceeds my expectations for him, said Maleki. He invests himself in the work, which resulted in significant progress on our research.
In his spare time outside of school, Henry loves to spend time with his family.
While Henry has put his name out there for some job opportunities, he said life post-graduation is likely going to include going back to school. Down the road, he is interested in a masters program, if not a doctorate as well likely at Augusta University.
LikeLoveHahaWowSadAngry
11
See the original post here:
Cybersecurity Awareness Month: Soon-to-be grad loves the 'whole picture' of cyber operations - Jagwire Augusta
List: The 10 most invasive sites on the internet – Komando
We all know that our online browsing habits are being tracked. Unless you take steps to prevent it, most websites see where you come from, what you are searching for and what you like. Tap or click here for 8 hidden maps and trackers you need to switch off.
All this data is valuable to sites and services, as they use it to serve targeted advertising. Ever searched for something on Amazon and then seen an ad for a similar product on Facebook? That is targeted advertising at work.
Thankfully, not all websites treat you as a treasure trove of information. You might be pleasantly surprised to find out which sites have the least amount of trackers. But on the other end of the spectrum, the biggest culprits shamefully stuff their sites with hundreds of trackers.
There are plenty of ways for a website to track you. Some might be subtle, like an invisible pixel or cookies, while others access your devices GPS to locate you on the globe. But who are the biggest offenders?
VPN provider SurfShark launched an investigation to find out, and some of the results are somewhat surprising. Its findings revealed that some of the most commonly-used websites hide up to 100 trackers, all designed to collect as much information on you as possible.
Learn the tech tips and tricks only the pros know.
SurfShark analyzed a typical browsing session over the course of a weekend and noted which trackers were activated, who the trackers belonged to and where the information goes once collected.
Heres the good news. Websites with the least amount of trackers:
SurfShark explained: Wikipedias privacy summary notes that that some of these [tracking] technologies do not have the best reputation in town and can be used for less-than-noble purposes and that the company uses automatically-received data to administer the sites, provide greater security, and fight vandalism.
SurfShark found 143 trackers on the most invasive website, 92 of which are used for advertising purposes. Tracker counts also vary by category, with Mens & Womens Lifestyle websites having the most trackers (59) on average than other categories.
The most invasive sites are:
If you dont want websites or services to track you, there are ways to stop them. Here are some suggestions:
Privacy warning: Researchers find location trackers in 450 apps
X
Learn the tech tips and tricks only the pros know.
Hidden iPhone trackers harvest data while you sleep
Read the rest here:
List: The 10 most invasive sites on the internet - Komando
Honeywells Anthem System Connects The Cockpit To The Cloud For Returns That Come With Risk – Forbes
Honeywell's cloud-connected Anthem cockpit system offers "always on" connectivity and a smart-phone ... [+] like user interface.
Honeywell Aerospace is touting the benefits of its new Anthem flight deck system, an always-on cloud connectivity platform that it claims will improve flight efficiency, operations, safety and comfort. But whether connecting the cockpit of a bizjet or Urban Air Mobility vehicle to the internet 24/7 provides sufficient benefit to outweigh its risk is a daunting question.
The cabins of modern business jets already connect to the internet via the cloud on a routine basis. But with their relatively newfound ability to interact with the cloud/internet for extended windows, bringing busy VIPs live-streaming or videoconference calls, has come the recognition that such convenience comes with vulnerability.
In fact the International Civil Aviation Organization designated 2020/2021 as the Year of Security Culture, calling for a cybersecurity action plan for all sectors of aviation (including business and air transport) in response to the many cyber threats.
These have arisen in a post-pandemic environment in which highly placed or high net-worth individuals are spending more time aboard corporate/private business aircraft to bypass the risks and individual liberty-inhibiting hassles of commercial air travel.
Combining the connectivity-enhanced properties of aircraft cabins with the more highly prized information of the individuals and enterprises which travel in them sets the motivational table for data breaches and other cyber malfeasance.
With Anthem, it could be argued that Honeywell is inadvertently setting another place at the table for unauthorized access to flight deck information, despite its best intentions.
Making Pilots Lives Easier All The Time
Honeywell says its Anthem cloud connected flight deck system will make life easier for pilots like ... [+] this pair striding from a Bombardier Challenger 350.
Vipul Gupta, vice president and general manager of avionics for Honeywell, is keen to stress that Anthem is the first comprehensive cloud-connected cockpit system on the market.
There are lots of [aircraft] systems which can connect to the cloud, he says. What were trying to drive differently with Anthem is being always connected, not just when youre on the ramp Its always connected and architected in a way to provide that capability in the future.
The near to mid-term future is key for Honeywell, eager to regain market share from Garmin International, which has come to dominate the general aviation and increasingly business aviation avionics markets in the past couple decades. Those old enough to remember when a Bendix/King avionics panel was the gold standard (Bendix/King is now a Honeywell brand) will understand the primacy to which the company would like to return.
Anthems always-connected quality and user friendliness theoretically pave a way for that return. Even when an aircraft so-equipped sits on a patch of tarmac, powered down, cold and dark, Honeywells Integrated Network Server Unit (INSU) is running on battery power, keeping the cloud connection active.
The INSU connects the Anthem flight deck to internet via WiFi or 4G LTE cellular connections on the ground. In the air it connects through high-speed Ka/Ku band satellite links.
In so doing, Anthem doesnt just bring internet into the forward display stack Gupta says. It provides unprecedented ease of access to information, including third-party applications, to the flight crew at any point in a mission.
When we say we have an always on cloud connected avionics or flight deck suite, it ultimately has a purpose of reducing pilot workload. It will make pilots lives easier and everyone associated with that flight, maintenance technicians, operations directors, Gupta affirms.
Anthems touch-and-swipe interface plays its part in easing information access. Though he admits he loves buttons and knobs, Gupta explains that Honeywell told Anthem developers they could use only the companys flat panel displays when designing the control interfaces for the system. The resulting smartphone-like UI can speed pilot tasks and minimize interruption in-flight, Gupta says.
Gupta relates an example wherein a bizjet flight from Phoenix to London has just reached cruise altitude. The pilot is making some flight plan changes via the instrument panel or a tablet in response to weather variations when air traffic control interrupts that task to warn of traffic with instructions to contact another Traffic Center on a different frequency.
The amount of time which the pilot devotes, from an interruption perspective, is quite high, Gupta maintains.
With Anthem, a pilot could simply type in a new frequency on the smart scratch pad window and then the system will prompt for selection into the correct field (COM1/COM2) while remaining in the flight planning page.
You dont have to go back to the radio tuning page, you dont have to get out of the flight panning page. Gupta says. You just put information into the smart scratch pad and the system will prompt you. Once you put it in the system automatically takes you back to the page you were in.
If this feature saves time and work in-flight, as Honeywell maintains, the savings are marginal. When its pointed out that such a cross-ocean flight would have a pilot and co-pilot, the latter of which typically copies radio traffic and adjusts comms, Gupta acknowledges the small advantage such a feature would yield.
For single-pilot operations it might be different. But autonomy is likely the main point. The companys press release notes that Anthem supports growing levels of aircraft autonomy, leading to complete autonomous capabilities in the future as regulations allow.
Future neutral pilot reviews should tell us if Anthem truly reduces workload or if its value-add is mostly marketing. Whether obviating the need for pilots entirely makes things easier is a conundrum those reviewers may want to take up as well.
In the shorter term, the benefits of its cockpit connectivity may best be seen in terms of remote flight planning, according to Honeywell.
Any Time, Every Time
Remote flight plan loading is a headline Anthem capability. Vipul Gupta asserts that its a precedent-setting feature. The ability to [remotely plan/load] any time, whenever you want, is not there today.
Indeed, the example Gupta gives would be precedent setting.
There is very deep integration with electronic flight bag applications, the capability to complete a flight plan and then upload that flight plan from the hotel room to straight into the airplane.
Honeywell asserts that this remote flight planning/uploading can dramatically reduce pilots preflight preparation time by up to 45 minutes per flight.
However when one considers that the vast majority of business aviation flight plans are known canned routes, the up to 45 minutes claim looks spurious. Gupta concedes the point as well as the fact that spur-of-the-moment flight plans are routinely crafted, sent and approved in 15 minutes or so.
Nevertheless, loading a flight plan while riding the WiFi from the Hilton or Embassy Suites certainly would be a step from transferring critical data like maintenance status and flight plans via wired connections or drives at the airplane. One noted cybersecurity expert we ran it past on background said it would also be a tremendous cyber risk.
That risk appears more pervasive than ever. Earlier this month, the heavily defended Reserve Bank of Australia characterized the possibility of a potentially destabilizing attack on Australias financial system as inevitable. The layered cybersecurity of Volkswagen AG was breached along with three other multinational firms in the same month this summer. Forbes recently reported that the cybercriminal group SnapMC is breaching corporate systems and issuing extortion threats in 30 minutes or less.
Honeywell seems undaunted by the possibility that Anthem could be a conduit to data theft, monitoring or aircraft disruption.
You can always say, no connectivity on the airplane. Thats an easy answer for anyone making a [digital] flight deck today, Gupta asserts. Weve chosen to have full connectivity with the flight deck with the full realization that cybersecurity is the number one concern for us.
As such, the company has created an internal organization which supports cyber security 24/7, Gupta says. Anthem has been designed with zero-trust architecture baked in, Honeywell adds, aligning with NISTs 800-207 cyber standard. It also carries the spirit of this standard within the Anthem gateway for internal communication.
The gateway provides hardware partitioning between avionics and communications. Its a logical, vital safeguard but one clouded by Guptas revelation that the third party applications which Anthem can host arent limited to weather, radar, maintenance or catering apps.
Honeywell is also working with airframers and their partners to provide OEM Autonomy as a capability. Anthem can host aircraft system management apps flaps controllers, battery management systems, fuel computers as software on its processing modules.
Whether such critical hosted applications could be accessed is up for argument as is the efficacy of cyber security in general. Another expert reminded us of a line from the movie Anchorman. Referring to the alluring cologne he uses, Ron Burgundys broadcast cohort, Brian Fantana, says 60% of the time it works every time.
A couple of aviation security insiders were willing to go on record about Anthem. Both contend that such systems are the way of the future and that Honeywells timing is appropriate.
Chris Bartlett, president of CCX Technologies, which makes cybersecurity-focused cabin routers, components, and security plans, cautioned, This new product deserves an immense amount of thought, research, and development around cyber security to ensure it functions in a highly secure way and does not become a vulnerability."
Britton Wanik is VP of marketing with the air-to-ground network provider SmartSky Networks, for which Honeywell is a value-added reseller. He observes that there are many landmines for the kind of remote flight planning examples Honeywell posits. Its a concept that goes back at least 20 years he adds and it does raise concerns.
But those are surmountable problems that can be solved with existing security tools.
Wanik sees a bigger challenge for Anthem security in the airborne environment where the latency and unreliability of connectivity yields an unstable, often unsecure connection to the aircraft. SmartSkys low latency, high bandwidth networks provide a solution, he says.
The human element poses just as much of a challenge. Vipul Guptas affirmation that Everyone who touches a flight is able to get information that matters to them when they need it via Anthem is also a reminder that individuals sometimes have malevolent intentions.
Anthem guards against these with internal processes and no single point of failure with respect to safety-of-flight and other information, Gupta says. His contention that human-enabled exploits are probably less than .01% of the threat might be weighed against a recent report from Verizon VZ which concluded that 85% of cyber security breaches involve the human element.
Theres also a question as to whether interested parties could build an electronic profile (as done in cyber circles) of Anthem-configured aircraft for the purpose of monitoring their movements and electronic activity.
Thanks to the FAA-required Automatic Dependent Surveillance-Broadcast (ADS-B) Out ATC feature, the public can freely see when a general aviation, business or air transport aircraft is airborne, read its altitude, N-number and departure/destination information.
But ADS-B allows GA and business aircraft to opt-out, rendering their tail numbers, origin/destination and flight information unreadable. The option was not lost on Honeywell and is where Anthems always on mantra takes a pause.
Connectivity can always be stopped if [the customer] chooses to do so, Gupta acknowledges. I fully expect that in a business aviation environment protecting the tail number and information on flying from where to where will probably be crucial. In an air transport environment it will be a different story.
Scheduled UAM
The seven-seater Lillium approaches New York City in this artist's rendering. If the scenario ... [+] becomes real, Honeywell's Anthem system may dominate the flight deck.
Air transport is another point of focus for Honeywell which sees Anthem in numerous cockpits of the UAM variety. One of the keys to Anthem seen both by outside observers and within Honeywell is its scalability. Its size, weight and power requirements can be scaled to fit a large bizjet, a GA piston-single, or a small 4-passenger UAM eVTOL aircraft.
Contrary to analysts who see the UAM market emerging as a high-cost, business oriented on-demand transport mode akin to chartered helicopter service, Honeywell sees the segment in scheduled-service airline terms.
Some of the early [UAM] segments which we see coming out are more like air transport operations rather than business aviation, Gupta maintains. Four to five regularly scheduled UAM flights per day between paired destinations exemplify an operational model that Honeywell believes will be a firm market for Anthem.
The company has already stood up a dedicated UAM organization and its work with would-be UAM provider and customer Lillium obviously informs its outlook. Gupta says Honeywell expects Lilliums eVTOL transport to be certified by late 2023 and operational in 2024.
If that comes to pass, Anthem will ride along and the challenges it will have to surmount in the dense RF environment of proposed UAM operations will require balancing the benefits of flight deck connectivity with the risks in an even more thorough-going way.
Read this article:
Honeywells Anthem System Connects The Cockpit To The Cloud For Returns That Come With Risk - Forbes
Comprehensive report of Internet Security Audit Market Projected to Gain Significant Value by 2026 – Northwest Diamond Notes
Growth Analysis Report on Internet Security Audit Market size | Market Segment by Applications (Government , Education , Enterprise , Financial , Medical , Aerospace, Defense and Intelligence , Telecommunication , Other , ,By Region , North America , U.S. , Canada , Europe , Germany , France , U.K. , Italy , Russia , Nordic , Rest of Europe , Asia-Pacific , China , Japan , South Korea and Southeast A), by Type (System Level Audit , Application Level Audit and User Level Audit), Regional Outlook Opportunity, Market Demand, Latest Trends, Internet Security Audit Market Growth & Revenue by Manufacturers, Company Profiles, Forecasts 2026. Analyzes current market size and upcoming Few years growth of this industry.
The Internet Security Audit market report in question is a detailed gist of this industry and encompasses myriad details pertaining to some of the vital ongoing and future trends of this market. Also included in the research document are details about the Internet Security Audit market size, share, as well as the present remuneration. The study projects that the Internet Security Audit market would procure substantial returns by the end of the forecast timeframe while recording a modest annual growth rate over the expected duration. The Internet Security Audit market summary also claims that the growth rate which the industry is expected to register will be propelled by specific driving parameters, and provides details pertaining to the same. Further, the report presents a gist of the numerous challenges, growth opportunities, and risks prevailing in the Internet Security Audit market.
This Internet Security Audit report begins with a basic overview of the market. The analysis highlights the opportunity and Internet Security Audit industry trends that are impacted the market that is global. Players around various regions and analysis of each industry dimensions are covered under this report. The analysis also contains a crucial Internet Security Audit insight regarding the things which are driving and affecting the earnings of the market. The Internet Security Audit report comprises sections together side landscape which clarifies actions such as venture and acquisitions and mergers.
Request Sample Copy of this Report @ https://www.nwdiamondnotes.com/request-sample/44784
Our best analysts have surveyed the market report with the reference of inventories and data given by the key players:
The Report offers SWOT examination and venture return investigation, and other aspects such as the principle locale, economic situations with benefit, generation, request, limit, supply, and market development rate and figure.
The Internet Security Audit market study report was prepared with the major objective of outlining the market sizes that include market segments and sub-segments. The Internet Security Audit market research report was compiled considering fix time period, that is known as forecast period for the study. The report consists of both qualitative and quantitative methods of study along with descriptive analysis related to various geographies and various market segmentations. Also, the Internet Security Audit market research report includes the detailed study of various elements of the Internet Security Audit market such as various market growth drivers and market challenges, these elements analyze the market from different angles. To analyze the growth prospects of the market from the future perspective, market opportunities, competitive landscape, product offerings, market investments and other market matrixes were studied in detail.
Market segment by Type, the product can be split into
Market segment by Application, split into
Market segment by Regions/Countries, this report covers
United States
Europe
China
Japan
Southeast Asia
India
Central & South America
Quantifiable Data: -
Market Data Breakdown by Key Geography, Type & Application / End-User
By type (past and forecast)
Internet Security Audit Market-Specific Applications Sales and Growth Rates (Historical & Forecast)
Internet Security Audit revenue and growth rate by the market (history and forecast)
Internet Security Audit market size and growth rate, application and type (past and forecast)
Research objectives and Reason to procure this report: -
To study and analyze the global consumption (value & volume) by key regions/countries, product type, and application, history data from 2020, and forecast to 2026.
To understand the structure of Internet Security Audit Market by identifying its various sub-segments.
To receive comprehensive information about the key factors influencing the market growth (opportunities, drivers, industry-specific challenges and risks).
To analyze competitive developments such as expansions, agreements, new product launches, and acquisitions, mergers in the market.
To strategically outline the key players in the market and extensively analyze their growth strategies.
Finally, the global Internet Security Audit market provides a total research decision and also sector feasibility of investment in new projects will be assessed. Internet Security Audit industry is a source of means and guidance for organizations and individuals interested in their market earnings.
Request Customization on This Report @ https://www.nwdiamondnotes.com/request-for-customization/44784
Billions of Google Chrome Users At Risk of New High-Level Hacks | Here’s What You Need To Do – Tech Times
Google Chrome users are currently at risk of new high-level hacks, as the search engine giant confirmed. Because of this, the tech developer issued a warning to a total of 2.65 billion consumers across the globe, saying that they discovered new malicious campaigns in the browser.
This is the third time that Google has issued a high alert level warning for its Chrome users. The company also published a new blog post that to specify the high-level and medium-level vulnerabilities.
(Photo : Photo credit should read FREDERIC J. BROWN/AFP via Getty Images)This photo taken on January 7, 2010 shows a woman typing on the keyboard of her laptop computer in Beijing. China declared its Internet "open" on January 14 but defended censorship that has prompted Web giant Google to threaten to pull out of the country, sparking a potential new irritant in China-US relations. China employs a vast system of Web censorship dubbed the "Great Firewall of China" that blocks content such as political dissent.
Also Read:Google Chat 'Mark as Unread' Feature Rolls Out To Spaces, Direct Messages | Mobile, Desktop Compatibility and More
The giant tech firm confirmed a total of five severe flaws in its popular Chrome browser:
According to Google's official blog post, the company's security team discovered a total of five high-level browser flaws, eight medium-level vulnerabilities, as well as two low-level issues.
(Photo : Photo by KIRILL KUDRYAVTSEV/AFP via Getty Images)A picture taken on October 17, 2016 shows an employee typing on a computer keyboard at the headquarters of Internet security giant Kaspersky in Moscow. (Photo by Kirill KUDRYAVTSEV / AFP) / TO GO WITH AFP STORY BY Thibault MARCHAND
On the other hand,Forbesreported that Chrome was also affected by UAF (Use-After-Free) exploits more than ten times back in September. Aside from this, Google also suffered from a zero-day UAF exploit during that period.
Google is just one of the companies that are currently targeted by cybercriminals. Recently, it was reported thatTwitch hackerstargeted the popular streaming platform for hours.
On the other hand, anSMS routing companywas also hacked. Experts said that the malicious campaign against Syniverse lasted for five years.
Since Chrome users are facing severe browser flaws, Google decided to release a critical update. The new Chrome version 95.0.4638.54 is expected to prevent and fix the mentioned vulnerabilities in the company's popular browser service.
To check the update, you need to visit your Chrome's Settings. After that, go to the Help section and choose the "About Google Chrome" option. More details will be provided once you are there.
For more news updates about Google Chrome and other popular browsing services, always keep your tabs open here at TechTimes.
Related Article:Global YouTube Crypto Livestream Scam Involves 1,000 Malicious Domains | Other Things Google Discovers
This article is owned by TechTimes
Written by:Griffin Davis
2021 TECHTIMES.com All rights reserved. Do not reproduce without permission.
The rest is here:
Billions of Google Chrome Users At Risk of New High-Level Hacks | Here's What You Need To Do - Tech Times
iPhone 13 Pro Running iOS 15 Hacked in Just 1 Second and Were Not Even Kidding! – Beebom
Apple is a company that has always touted privacy as one of the key selling point for its devices. If you have ever watched an Apple launch event, you might know how many times the Cupertino giant addresses its newest devices, be it iPhones, iPads, or Macs, as the most secure device ever. However, at a recent Hackathon competition, some Chinese white-hat hackers broke into Apples latest iPhone 13 Pro running iOS 15.0.2 in a mere second! It was an achievement, and for that, they bagged a $300,000 cash prize.
During the recent hacking championship in China known as Tiangfu Cup, not one but two hacking teams were able to break the iPhone 13 Pro in a matter of seconds. As per the competitions official website, participating teams had to break into the iPhone 13 Pro to gain control of the phone while it ran on the latest iOS 15.0.2 version.
There were three tiers of rewards for hacking the iPhone 13 Pro. For remote code execution (RCE), the prize was $120,000, for RCE plus a sandbox escape, the reward was $180,000, and for the remote jailbreak of the device, the prize money was $300,000.
Amongst the two winning teams, Team Pangu, which is a popular name in the iPhone jailbreak community, was able to remotely jailbreak the iPhone 13 Pro in a record time of 1 second. It is not a joke and pretty surprising that the hacking group was able to get into the iPhone 13 Pros system, which Apple calls the most secure, so quickly and effortlessly. However, it is evident that the team has been preparing for the competition for a generous amount of time.
Another team from Chinas Kunlun Lab was able to exploit a vulnerability in Safari for iOS 15 to get into the iPhone 13 Pro. The CEO of Kunlun Lab, who is also the former CTO of the internet security company Qihoo 360, broke into the device live in merely 15 seconds.
Both the teams won a big cash reward for their achievements. They are expected to contact Apple to inform them about the vulnerabilities, so the company could deploy a fix with a future update.
More here:
iPhone 13 Pro Running iOS 15 Hacked in Just 1 Second and Were Not Even Kidding! - Beebom
GITEX 2021: Investing in cyber protection with Acronis – ITP.net
Exhibiting their flagship product Acronis Cyber Protect Cloud at GITEX 2021, Mareva Koulamallah, Head of Marketing and Communication MEA spoke to ITP.net about future trends and the pressing need for online security.
The increased use of the internet, especially during the pandemic, has exposed organisations and individuals to a series of cyber threats. While some organisations have a cybersecurity strategy in place to protect their valuable data, others are still not quite there yet and pretty much lagging behind. GITEX gives us the perfect platform to amplify the conversation about the need for cyber protection. We shall be using this opportunity to educate IT teams on matters around cyber protection while at the same time highlighting our flagship product Acronis Cyber Protect Cloud and we will have a surprise with one of our sports partners too.
Some of the key discussions we are looking forward to exploring at this years GITEX event include conversations with Managed Service Providers (MSP) and Service Providers (SP). We want to understand their needs and how we can help them grow their business while protecting their assets and their customers.
Etisalat in Zabeel Hall 1 they are always at the forefront of innovation and amazing hosts for the latest in technology, as they always bring all sorts of incredible and futuristic prototypes to their booths. This year, we have partnered with Etisalat to bring, for the very first time in the Middle East, a breathtaking innovation that will bring joy to the sporting world and especially the racing fans. Acronis and Etisalat will be co-hosting Airspeeders prototype the first electric manned flying car, in a mission to show how technology and innovation can be used to develop interesting sporting activities for the future.
We were already present for the last few years and are always happy to be able to support the region and GITEX. We definitely see a lot of value in having in-person meetings back. Now, we can still continue with online meetings and events from time to time, as it allows us to manage costs, but any time we will have an opportunity where it is relevant for us to attend, we will. In-person meetings and events allow us to actively engage with our core audience. This way we are able to get instant feedback about our products and services. These insights, in turn, help us make our products and services better, as well as improve our customer experience.
We launched our solution around the beginning of the pandemic, in order to respond to an accrued critical need around the right cyber protection solution and an easily deployable tool that can be integrated to existing systems and used remotely with multiple teams. Due to the dynamic nature of consumer needs and preferences, we are constantly making upgrades to the tool. These upgrades are largely driven by the feedback we receive from our partners or customers.
We have been attending GITEX for several years and this year is no different. Despite the prevailing circumstances, economies across countries are bouncing back and the UAE is leading the way on the global scale around this trend. We know the organisers of GITEX quite well and the quality of support they provide in order for us to get the most out of the event, which made our participation this year a no-brainer.
The pandemic has definitely boosted and accelerated innovation and research across segments and industries; from technology to pharmaceuticals. For instance, we have even added new features to our own products such as the remote desk control option. Indeed, smaller organizations were seeking alternatives that could allow them to continue to operate within a heavily digitalized world.
Competition is good as long as it is healthy. Having people with various innovations can only push the next person or company to want to improve not just for themselves but for our society. Prototypes or solutions that are created for a particular project or market could end up being used by a larger audience a few years down the line. It happened to planes, cars, computers, phones, cameras, and more. So, lets continue to encourage innovation across all sectors.
It might not be directly innovation related but still have a great impact on it; I would say an accrued investment in diversity, of all sorts and all aspects. We need people that have different outlooks on life and various creative minds to continue to innovate. Otherwise, I would say to watch out for flying cars!
Read more from the original source:
GITEX 2021: Investing in cyber protection with Acronis - ITP.net
Norton Consumer Cyber Safety Pulse Report Finds Tech Support Scams are the No. 1 Phishing Threat – KY3
New Threat Insights Identified Across Gaming, Banking, Gift Cards and Religious Institutions
Published: Oct. 19, 2021 at 8:00 AM CDT
TEMPE, Ariz., Oct. 19, 2021 /PRNewswire/ -- NortonLifeLock's global research team, Norton Labs, today published its third quarterly Consumer Cyber Safety Pulse Report, detailing the top consumer cybersecurity insights and takeaways from July to September 2021. The latest findings show tech support scams, which often arrive as a pop-up alert convincingly disguised using the names and branding of major tech companies, have become the top phishing threat to consumers. Tech support scams are expected to proliferate in the upcoming holiday season, as well as shopping and charity-related phishing attacks1.
Norton blocked more than 12.3 million tech support URLs, which topped the list of phishing threats for 13 consecutive weeks between July and September. The effectiveness of this type of scam has escalated during the pandemic due to consumers' increased reliance on their devices to manage hybrid work schedules and family activities.
"Tech support scams are effective because they prey on consumers' fear, uncertainty and doubt to trick recipients into believing they face a dire cybersecurity threat," says Darren Shou, head of technology, NortonLifeLock. "Awareness is the best defense against these targeted attacks. Never call a number listed on a tech support pop-up, and instead reach out to the company directly through their official website to validate the situation and next steps."
Norton successfully blocked nearly 860 million Cyber Safety threats over the past quarter, including 41 million file-based malware, 309,666 mobile-malware files, nearly 15 million phishing attempts and 52,213 ransomware detections.
Additional findings from the Consumer Cyber Safety Pulse Report include:
For more information and Cyber Safety guidance, visit the Norton Internet Security Center.
About NortonLifeLock Inc.NortonLifeLock Inc. (NASDAQ: NLOK) is a global leader in consumer Cyber Safety, protecting and empowering people to live their digital lives safely. We are the consumer's trusted ally in an increasingly complex and connected world. Learn more about how we're transforming Cyber Safety at http://www.NortonLifeLock.com.
###
____________________
1No one can prevent all cybercrime or identity theft.
View original content to download multimedia:
SOURCE NortonLifeLock Inc.
The above press release was provided courtesy of PRNewswire. The views, opinions and statements in the press release are not endorsed by Gray Media Group nor do they necessarily state or reflect those of Gray Media Group, Inc.
Continued here:
Norton Consumer Cyber Safety Pulse Report Finds Tech Support Scams are the No. 1 Phishing Threat - KY3
How Small Businesses Can Fund Their Ransomware Protection – BizTech Magazine
Make Use of Cybersecurity Threat Feeds
With threat detection, its important to keep your ear to the ground to know whats coming, and publicly accessible threat feeds offer a way to do just that. Many of these feeds such as the Cybersecurity and Infrastructure Security Agencys Automated Indicator Sharing network, a program of the Department of Homeland Security are accessible to businesses as a way to understand potential risks. The AIS network is also available through information sharing and analysis centers (ISACs), which provide targeted information on threats to specific industries, as well as a way to privately share information about emerging threats.
The National Council of ISACs offers a starting point for specific fields; for those interested in signing up for more general feeds, the Center for Internet Security is a great place to start. These feeds, however, are often quite busy, making it difficult to know whether your business might be affected by a given threat. With that in mind, a security information and event management solution from a vendor such as RSA would make a good potential investment.
Ransomware has been a major area of focus for nonprofit organizations such as the National Cyber Security Alliance, which helps put on Cybersecurity Awareness Month and also publishes a variety of resources for businesses.
Organizations such as these offer digital resources that can help companies understand potential risks and how to avoid them. The Global Cyber Alliance, a nonprofit based in the United States and Europe, offers a toolkit targeted at small businesses that lays out basic recommendations for both employers and team members, including tips for data encryption, website security and integrating multifactor authentication using tools such as Okta.
EXPLORE:How smaller organizations can benefit from cloud security posture management.
As a part of its cybersecurity offerings, the Small Business Administration and its resource partners offer a variety of free and low-cost events, largely virtual, geared specifically to small businesses, as does NCSA.
Associations can also serve as an asset for small businesses. Some in the financial and retail sectors, for example, have helped to create security resources that offer basic frameworks to follow when approaching topics such as penetration testing, insider threats and protocols around COVID-19 all of which can help a business strengthen its position. Others, such as the National Retail Federation, offer cyber risk exchanges to members that can help keep them abreast of the latest risks within their sector.
Each of these offerings can point you in the right direction to improve your approach to cybersecurity, and can provide information about potential threats and effective strategies for arming your employees with the information they need to avoid unwittingly creating problems down the line.
Of course, if a security event happens, you want to be able to respond quickly, and it helps to have resources readily available. CDWs incident response program offers no-fee retainer agreements that make incident response available immediately in the event of an attack. This lets you focus on solving the problem immediately, not how much the solution is going to cost.
The best way to save money now is to have a solution in place when something happens.
This article is part ofBizTech'sAgilITy blog series. Please join the discussionon Twitterbyusing the#SmallBizIT hashtag.
Continued here:
How Small Businesses Can Fund Their Ransomware Protection - BizTech Magazine