Category Archives: Internet Security

FMW Media, Inc.’s New to The Street TV Announces its 5 TV – GlobeNewswire

NEW YORK, Aug. 02, 2021 (GLOBE NEWSWIRE) -- FMW Medias New to The Street TV broadcasting its national syndicated show, TONIGHT, Monday, August 02, 2021 at 10:30 PM PT and Tuesday, Night, August 02, 2021 at 10:30PM PT on Fox Business Network.

New To The Streets Monday night TV line-up features the following 5 Companies and their businesses representatives:

1) First Graphene Ltd.s (OTCQB: FGPHF) interview with Mr. Michael Bell, CEO.

2) RushNet, Inc.;s (a.k.a heliosDX) (OTCPink: RSHN) interview with Ashley Sweat, Chief Executive Officer / Chairman.

3). GlobeX Data Ltds. (OTCQB:SWISF) (CSE:SWIS) (FRA:GDT) interview with Mr. Alain Ghiai, CEO.

4) Smokefree Innotec, Inc.s (OTCPink:SFIO)interview with Mr. Jeths D. Lacson, CEO.

5). Cryptocurrency, Nobility's(Crypto:NBL) ($NBL) interview with Mr. KyleMcDougal, CEO.

Michael Bell, CEO, First Graphene Ltd (OTCQB:FGPHF) talks to New to The Street TV, Tonight, Monday, August 2, 2021 about their Company being recognized as a world leading graphene supplier sold under is PureGRAPH product brand, and he provides further discussion about their graphene production, tonnage projections, and the newly adoption of graphene in a variety of products used worldwide.

Ashely Sweat, CEO at RushNet, Inc.s (a.k.a heliosDX) (OTCPink: RSHN) joins the New to The Street Monday nights, August 02, 2021 show. Mr. Sweat explains RushNet, Inc.s. (heliosDX) very sophisticated and technological advanced clinical laboratory, which can provide highly accurate test for a variety of different medical and clinical needs. Further, he outlines RSHNs business model and the expected growth associated with their lab platforms and its uniqueness in the clinical lab industry sector.

Once again on Monday nights New to The Street TV show, Mr. Alain Ghiai, CEO,GlobeX Data, Ltd(OTCQB:SWISF) (CSE:SWIS) (FRA:GDT) who again, gives more pivotal information to viewers about theirbusiness and their plansto grow the Company. He provides in-depth discussion of the Companys successful growth of its secure and encrypted software solutions, SekurSafe and Sekur. Mr. Ghiai provides a number of reasons and examples why the current and the mostly widely used internet apps and platforms are NOT SAFE. And, he further talks about keeping business communications and data safe while utilizing Swiss Privacy Laws.

Mr. Jeths D. Lacson, CEO at Smokefree Innotec, Inc. (OTCPink:SFIO) arrives on tonights show giving viewers the opportunity to understand the Company recent real-estate dealings in New Zealand. Mr. Lacson provides details about the operational structure and vertical integrated businesses that operate in franchising, food manufacturing and distribution, coffee business, property development, technology and software development.

On Monday nights show, New to the Street, welcomes Mr. KyleMcDougal, CEO, at Nobility (Crypto:NBL) ($NBL), a cryptocurrency token enterprise. Mr, McDougal gives TV viewers an informative interview with a discussion about this cryptocurrency token that looks to revolutionize the e-sports landscape by injecting the industry with high quality offerings, prize pools, and tournaments. ==================================================================

New To The Streets Tomorrow, Tuesday, August 03, 2021 TV show line-up on Fox Business Network features the following 5 Companies and their businesses representatives:

1). Artifical Intelligence Technology Solutions, Incs (OTCPink:AITX) interview with Steven Reinharz, CEO.

2). GlobeX Data Ltds. (OTCQB:SWISF) (CSE:SWIS) (FRA:GDT) interview with Mr. Alain Ghiai, CEO.

3) RushNet, Inc.;s (a.k.a heliosDX) (OTCPink: RSHN) interview with Ashley Sweat, Chief Executive Officer / Chairman.

4). Ehave, Inc.s (OTCPink:EHVVF) interview with Benjamin Kaplan, Chairman & CEO.

5) StrikeForceTechnologies, Inc.s (OTCQB:SFOR) interviews with both Mr. Mark Kay, CEO and Mr. George Waller Executive Vice-President.

New to the Street TV, tomorrow, Tuesday nights, August 03, 2021, show provides Mr. Steven Reinharz, CEO at Artifical Intelligence Technology Solutions, Inc. (OTCPink: AITX) the opportunity to talk to viewers about the Company and its wholly-owned subsidiary, Robotic Assitance Devices, Inc. (RAD). He gives very detailed description of its AI-driven security analytical product, ROSA 180 (Responsive Observation Security Agent). Mr. Reinharz provides numerous real use application and its successful roll-outs as a less expensive and efficient security solution for a number of industries.

On Tuesday Nights New to The Street TV, Mr. Alain Ghiai, CEO,GlobeX Data, Ltd(OTCQB:SWISF) (CSE:SWIS) (FRA:GDT) again, gives more pivotal information to viewers about theirbusiness and their plansto grow the Company. As an expert in internet security and privacy, he provides in-depth discussion of the Companys successful growth of its secure and encrypted software solutions,SekurSafe and Sekur. He gives very specific and interesting dialog about keeping their clients business communications and data safe while utilizing Swiss Privacy Laws.

Ashely Sweat, CEO at RushNet, Inc.s (a.k.a heliosDX) (OTCPink: RSHN) joins the New to The Street on Tuesday nights, August 03,2021 show. Mr. Sweat explains RushNet, Inc.s. (heliosDX) very sophisticated and technological advanced clinical laboratory, which can provide highly accurate test for a variety of different medical and clinical needs. Further, he outlines RSHNs business model and the expected growth associated with their lab platforms and its uniqueness in the clinical lab industry sector.

Another interview on Tuesday nights show, an interview with Mr. Benjamin Kaplan, CEO and Chairman at Ehave, Inc. (OTCPink:EHVVF), who tonight talks about the Companys unique healthcare blockchain technology. Benjamin explains the strategies involved at EHVVF, creating partnerships and technologies which leverages the Company in becoming a leader in compiling data around mental illnesses and leading to the understanding of PTSD, stress, depression and other medical alternatives.

Also on Tuesday Night, August 3, 2021, New to The Street interviews StrikeForceTechnologies, Inc.s (OTCQB:SFOR) Mr. George Waller, Executive Vice-President. Mr. Waller talks to New to The Street TV about their Companys cyber security products and services that provides next-gen cyber, privacy and data protection solutions for business and home users. He gives an overall description of their suite of cyber protection products: ProtectID, GuardedID, and MobileTrust. Mr. Waller talks about the Companys recently launched v2.1 for secure video conferencing which combines the reliability and scalability of their secure SafeVchat Meetings product.

New to The Street interviews Mr. Benjamin Kaplan, CEO and Chairman at Ehave, Inc. (OTCPink:EHVVF), who on Tuesday Night, August 3, 2021, talks about the Companys unique healthcare blockchain technology. Benjamin explains the strategies involved at EHVVF, creating partnerships and technologies which leverages the Company in becoming a leader in compiling data around mental illnesses and leading to the understanding of PTSD, stress, depression and other medical alternatives.

About First Graphene Ltd (OTCQB: FGPHF) (ASX: FGR):

First Graphene Ltd (OTCQB: FGPHF) (ASX: FGR) is the leading supplier of high-performing, graphene products. The company has a robust manufacturing platform based upon captive supply of high-purity raw materials and an established 100 tonne/year graphene production capacity. Commercial applications are now being progressed in composites, elastomers, fire retardancy, construction and energy storage. PureGRAPH Range of Products PureGRAPH graphene powders are available in tonnage volumes with lateral platelet sizes of 50m, 20m, 10m and 5m. The products are high performing additives, characterised by their high quality and ease of use. First Graphene Ltd. is publicly listed on the OTC MARKETS (OTCQB: FGPHF) and on the Australia Stock Exchange (ASX:FGR).

About HeliosDx (RushNet, Inc) (OTCPink: RSHN):

heliosDX (OTCPink: RSHN) is a National Clinical Reference Laboratory offering High-Complexity Urine Drug Testing (UDT), Behavioral Drug Testing, Allergy Droplet Cards, Oral Fluids, Infectious Disease (PCR), and NGS Genetic Testing. The Company is contracted in 44 of the lower 48 states, and looking to expand its reach and capabilities. The Company continually invests in its infrastructure with the most efficient scientific proven instruments, and latest cutting-edge software for patient and physician satisfaction. This allows heliosDX to provide physicians fast and accurate reporting meeting and exceeding industry benchmarks. heliosDX excels in patient and client care through physician designed panels that aid in testing compliance and reporting education- https://heliosdx.com/.

About GlobeX Data Ltd. (OTCQB:SWISF) (CSE:SWIS) (FRA:GDT):

GlobeX Data Ltd. (OTCQB:SWISF) (CSE:SWIS) (FRA:GDT)is a Cybersecurity and Internet Privacy provider of Swiss hosted solutions for secure communications and secure data management. The Company distributes a suite of secure messaging applications, encrypted e-mails, secure communications and secure data management tools, using Swiss privacy laws, proprietary technology and its own independent platform, away from big techs hosting platforms. GlobeX Data Ltd. sells its products through its approved wholesalers and distributors, and telecommunications companies worldwide. GlobeX Data Ltd. serves consumers, businesses and governments worldwide -https://globexdata.com. Sekur is a Swiss secure communications application offering secure and private messaging, emails, voice messages, self-deleting messages, and file transfers from any mobile device, tablet, or desktop. Sekur users can communicate with Sekur and with non-Sekur users, through its unique Chat-By-Invites feature and SekurSend email system. All data traffic stay in GlobeX Data's Swiss hosted servers, using its proprietary HeliX technology, military grade encryption and benefiting from Swiss Privacy Laws https://sekur.com.Twitter: @globexdata.

About Smokefree Innotech, Inc (OTCPink:SFIO):

Smokefree Innotec, Inc. (OTCPink:SFIO) is an Asset Management Company and is a conglomerate of several companies with five strategic business divisions, namely: franchising, food manufacturing and distribution, coffee business, property development, as well as technology and software development - all of which currently have a strong presence in New Zealand and Australia. Its wholly-owned subsidiary, Agrokings, Inc, owns and operates of Epiphany Cafe Franchise Group, Ardent Bakers, Gorgeous Coffee Co., A+ Electrical and Accord Investment Group.

About Nobility Token (Crypto:NBL) ($NBL): Nobility aims to solve the problems involving the current limitations of the esports gaming industry by innovating onto the industry the use of blockchain technology combined with the advantages of decentralized finance to create a fair, balanced and sustainable model for all market participants. Sighting in the global gaming industry, a multi-billion dollar revenue stream, the Nobility token will be offered as a scalable solution to be adopted globally. Nobility users will inherently benefit from holding Nobility tokens for extended amounts of time. The token itself is specifically engineered to provide an incentive for adoption and use cases. The more adoption/use-cases are we create; the more volume we'll have which will amplify our tokenomics: reflection, LP acquisition, and inherent burn- https://nobilitytoken.com/

About Artificial Intelligence Technology Solutions (OTCPink:AITX):

AITX is an innovator in the delivery of artificial intelligence-based solutions that empower organizations to gain new insight, solve complex challenges and fuel new business ideas. Through its next-generation robotic product offerings, AITXs RAD and RAD-M companies help organizations streamline operations, increase ROI and strengthen business. AITX technology improves the simplicity and economics of patrolling and guard services, and allows experienced personnel to focus on more strategic tasks. Customers augment the capabilities of existing staffs and gain higher levels of situational awareness, all at drastically reduced cost. AITX solutions are well suited for use in multiple industries such as enterprises, government, transportation, critical infrastructure, education and healthcare. To learn more, visitwww.aitx.aiandwww.roboticassistancedevices.com, or follow Steve Reinharz on Twitter@SteveReinharz.

About Ehave, Inc. (OTCPink:EHVVF):

Ehave, Inc. (OTCPink:EHVVF) is a leader of digital therapeutics delivering evidence-based therapeutic interventions to patients. Its primary focus is on improving the standard care in therapeutics to prevent or treat brain disorders or diseases through the use of digital therapeutics, independently or together, with medications, devices, and other therapies to optimize patient care and health outcomes. The main product is the Ehave Telemetry Portal which is a mental health informatics platform that allows clinicians to make objective and intelligent decisions through data insights. The Ehave Infinity Portal offers a powerful machine learning and artificial intelligence platform with a growing set of advanced tools and applications developed by Ehave and its leading partners. This empowers patients, healthcare providers, and payers to address a wide range of conditions through high quality, safe, and effective data-driven involvement with intelligent and accessible tools- https://www.ehave.com.

About Strike Force Technologies, Inc. (OTCQB:SFOR):

StrikeForce Technologies, Inc. (OTCQB:SFOR) provides a suite of online products that helps prevent cyber theft and data breaches by protecting customers, employees and partners in real time at every vulnerable point. Our Products are: ProtectID: offers 2-factor "Out-of-Band" authentication across many methods and devices for protection. Methods that is preferable and low cost for delivering One Time Passwords (OTP). This approach leverages a 2nd network for entering or receiving passwords, which locks out hackers even if they have your username and password. Service is available for in-house, Cloud Service or hybrid. (Patent Nos.: 7870599 & 8,484,698 & 8,713,701). GuardedID: a keyboard encryption and anti-keylogger that functions at the keyboard level, preventing keyloggers (viruses like Zeus, etc.) from stealing login and confidential information. This has become the #1 Consumer Threat noted by the FBI and the 2010-2013 Verizon Data Breach Reports. Three Patents for keystroke encryption, US Patents 8,566,608; 8,732,483; and 8,973,107 and two pending patents. MobileTrust is an iPhone/iPad and Android all devices password vault that includes a strong password generator. MobileTrust also includes a Mobile Multi-Factor OTP authenticator and keystroke encryption between its virtual keyboard and secured browser, which is critical to all confidential online transactions and other features (One International Patent Pending). Our new product secure SafeVchat is a video conferencing product -https://www.strikeforcetech.com/.

About FMW Media:

FMW Media operates one of the longest-running U.S and International sponsored and Syndicated Nielsen Rated programming T.V. brands "New to the Street," and its blockchain show "Exploring The Block." Since 2009, these brands run biographical interview segment shows across major U.S. Television networks. The TV platforms reach over 540 million homes both in the US and international markets. FMW recently added Newsmax to its broadcasting platform with its first show broadcasted Sunday, December 27th. The NEWSMAX New to The Street show is syndicated on Sundays at 10 AM EST. FMW is also one of the nation's largest buyers of linear Television long and short form- https://www.newsmaxtv.com/Shows/New-to-the-Street https://www.newtothestreet.com/.

Forward-Looking Statements Disclaimer:

This press release contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended, and Section 21E of the Securities Exchange Act of 1934, as amended. In some cases, you can identify forward-looking statements by the following words: "anticipate," "believe," "continue," "could," "estimate," "expect," "intend," "may," "ongoing," "plan," "potential," "predict," "project," "should," "will," "would," or the negative of these terms or other comparable terminology, although not all forward-looking statements contain these words. Forward-looking statements are not a guarantee of future performance or results, and will not necessarily be accurate indications of the times at, or by, which such performance or results achieved. This press release should be considered in light of all filings of the Company contained in the Edgar Archives of the Securities and Exchange Commission at http://www.sec.gov.

FMW Media Contact: Bryan Johnson +1 (631) 766-7462 Bryan@NewToTheStreet.com

And

New to The Street Business Development office Support@NewtoTheStreet.com 1-516-696-5900

A photo accompanying this announcement is available at https://www.globenewswire.com/NewsRoom/AttachmentNg/faaa97ac-f3e0-444d-a394-b90fcf222457

See the original post here:
FMW Media, Inc.'s New to The Street TV Announces its 5 TV - GlobeNewswire

Here’s a list of the flaws Russia, China, Iran and pals exploit most often, say Five Eyes infosec agencies – The Register

Western cybersecurity agencies have published a list of 30 of the most exploited vulnerabilities abused by hostile foreign states in 2020, urging infosec bods to ensure their networks and deployments are fully patched against them.

Number one on the US, UK, and Australia's jointly published [PDF] list was the well-known Citrix arbitrary code execution vuln in Application Delivery Controller, aka Netscaler load-balancer. Tracked as CVE-2019-19781, the vuln has been the subject of repeated patch-it-now warnings ever since.

"In 2021, malicious cyber actors continued to target vulnerabilities in perimeter-type devices. Among those highly exploited in 2021 are vulnerabilities in Microsoft, Pulse, Accellion, VMware, and Fortinet," said the US's CISA and FBI, Britain's NCSC, and Australia's ACSC, three of the Five Eyes alliance.

Second, third, and fourth on the agencies' list were, you guessed it, the Pulse Secure VPN, Fortinet, and F5 Big IP vulns. Regular readers of El Reg's security pages can't have failed to notice that these are really quite bad and ought to have been patched months (or even years) ago.

Paul Chichester, NCSC Director for Operations, said: "We are committed to working with allies to raise awareness of global cyber weaknesses and present easily actionable solutions to mitigate them. The advisory published today puts the power in every organisations hands to fix the most common vulnerabilities, such as unpatched VPN gateway devices."

Aside from the well-known VPN vulns are other common entry methods, such as exploitation of the Netlogon escalation-of-privilege flaw, an RCE hole in software development framework Telerik that was abused by the Chinese for attacks on Australia, and more.

This year the picture is just as rosy. Enemies of the West gleefully bashed the button over the Microsoft Exchange vulns exploited by China's Ministry of State Security.

Second to that were the aforementioned Pulse Secure VPN flaws, and vulns in Accellion file-transfer appliances that became a popular target for ransomware gangs with their victims even including infosec firm Qualys.

Along with that are critical RCE holes in VMware's vCenter product, as we reported in May.

ACSC chief Abigail Bradshaw said in a canned comment: "This guidance will be valuable for enabling network defenders and organisations to lift collective defences against cyber threats. This advisory complements our advice available through cyber.gov.au and underscores the determination of the ACSC and our partner agencies to collaboratively combat malicious cyber activity."

The four agencies also gave some pragmatic advice for overworked sysadmins unable to immediately patch every single thing, perhaps for fear of KO'ing production networks through unforeseen side effects:

"If an organization is unable to update all software shortly after a patch is released, prioritize implementing patches for CVEs that are already known to be exploited or that would be accessible to the largest number of potential attackers (such as internet-facing systems)."

The full advisory, including detailed notes on each of the highlighted vulns, can be read on the Australian Cyber Security Centre's website.

View original post here:
Here's a list of the flaws Russia, China, Iran and pals exploit most often, say Five Eyes infosec agencies - The Register

Semi-Annual Sale: Save an extra 30% on these great VPN deals – AndroidGuys

How secure is your data connection at home? Do you trust the Wi-Fi at your local coffee shop or library to keep your laptop safe? Have you ever worried about malware, injections, or other issues for your browsing experience? If you arent fully certain that youre protected and safeguarded against hacking and malicious websites, its time consider a VPN service.

Fortunately for you, were in the middle of a semi-annual sale at the AG Deals Store which lets you save an additional 30% on the already-low prices. Thats right, an extra 30% just because you came around at the right moment!

Weve gathered up ten of the most popular VPN services and solutions in the store with short descriptions and prices. To save that extra money, simply enter coupon code ANNUAL30 at checkout. Use that money to thank yourself for taking the right steps today.

For a limited time you can use that coupon code on all apps and software in the AG Deals Store.

Enhance your browsing, content viewing, and gaming experience with BulletVPN. BulletVPN servers provide a reliable and secure service to protect your traffic from eavesdroppers at home or while on the move.

With industry-standard encryption protocols, they offer high-quality connections and use premium grade carrier lines to provide the fastest possible speeds online. BulletVPN is compatible with Windows, Mac, Android, and iOS. $38.99 $27.29

The internet is crawling with trackers designed to harvest your personal information sometimes for things as innocent as understanding what ads to display on the web for you, sometimes for far more nefarious purposes. Regardless, web tracking ranges from innocuous to deeply serious, and its more important than ever to take precautions to ensure your internet security.

Disconnect blocks trackers and malware across your entire device, allowing you to browse up to 44% faster, using up to 39% less bandwidth, and greatly improve battery life. $19.99 $13.99

In todays age of hackers and spies, its absolutely essential to protect your browsing activity by using a VPN. FastestVPN offers a smart, easy-to-use service for all devices including Windows, Mac, iOS, Android, Smart TV, and your router. As the name implies, this high-powered VPN operates with 99.9% uptime and gives you access to more than 200 high-speed servers around the globe. Plus, with a NAT firewall, ad blocker, anti-malware software, and a strict no logging policy, FastestVPN is extremely committed to your online security. $24.99 $17.49

These days, we keep so much of our personal information stored in accounts we log into on our computers. While quick and convenient, this luxury also brings with it vulnerability. Keeping your bank accounts, credit card numbers, photos and videos, and so much more sensitive information safe should be a top priority.

Cybersecurity has never been more important than it is now in our digital world. How do we make sure all of our information is secure? With a solid VPN. Ivacy VPN allows you to browse with ease and without the stress of worrying about a cyber attack. $39.99 $27.99

Offering HYDRA protection, SlickVPN provides you the most secure connection possible, completely masking your traffic from anyone, anywhere who might try to observe your online activities. Youll go anonymous and nobody will see your real IP address.

In addition to encrypted connection and privacy, SlickVPN gives you unthrottled speed so you can enjoy your online freedom in the smoothest and most reliable level possible. SlickVPN has gateways in over 45 countries, with over 125 gateways available. No matter where you are, SlickVPN is nearby to keep you safe. $19.99 $13.99

Originally posted here:
Semi-Annual Sale: Save an extra 30% on these great VPN deals - AndroidGuys

Police computer systems ill-prepared to cope with ransomware attack – New Zealand Herald

By Phil Pennington of RNZ

Police computer systems have been ill-prepared to cope with a disaster like a major hack.

This has been at the same time they have been pushing for more powers to gather people's data to keep in the systems.

An audit shows police did not know how much data they could afford to lose if their IT systems were hit. Read the first two pages of the audit here.

They needed a "disaster recovery" strategy to gauge "the acceptable amount of data loss NZ Police can handle after a disruption has occurred", the audit said.

The 2019 audit identified a raft of deficiencies.

It found they had not done an assessment of the major threats to their cyber resilience.

There had been "insufficient investment" in cyber resilience for years, and confusion between two teams over who was in charge of IT disaster recovery.

Police say they have been addressing these gaps - this was "in flight", they said.

'Very high risk'

1 Aug, 2021 06:35 PMQuick Read

1 Aug, 2021 09:01 AMQuick Read

1 Aug, 2021 08:28 PMQuick Read

1 Aug, 2021 07:44 PMQuick Read

The ransomware attack that crippled Waikato District Health Board has prompted questions about the public sector's ability to defend public data from online criminals.

Police held back from RNZ all but the first two pages of the 2019 audit by consultant KPMG of its information communication technology (ICT) resilience.

Police had mentioned to MPs about this audit in its latest annual review, prompting RNZ to ask for it.

Police said releasing more pages might dissuade staff from providing free and frank opinions in future; and that the first two pages fairly reflect what was in the rest of it.

The two pages show police regarded IT business continuity and disaster recovery as a "very high risk" area.

But KPMG concluded police were largely relying on staff to cope with disruptions.

Staff had proved capable and experienced so far, but this could not make up for the lack of:

Plans for backup and "failover" in a disaster Recovery strategies A business continuity plan An assurance plan to test IT vendors and partners are up to scratch Regular disaster recovery testing An overall framework for addressing cyber resilience requirements was also missing.

"Without a framework there is a high likelihood that key business processes may have ICT requirements that are not clearly understood or planned for in a disruption," the report warned.

RNZ asked for details of which of these gaps have been fixed since 2019.

Police have not provided any, instead saying some had been fixed, while others had now been included in its Cyber Security Resilience Programme or CRSP that was aiming to come up with an operating model.

'Significant uplift'

Other documents paint a very mixed picture.

Police's own annual assessment of how they keep people's personal information secure says in 2016 police controls were at the second-lowest rung, and now are close to the second highest rung on a five-rung quality ladder.

At the same time it says that all personal information is "robustly secured both physically and technically".

It shows they are updating how they handle data breaches to match privacy law changes last year.

A 2020 internal review says police are within reach of a big step up in data quality, helped by "reviews of problematic business and ICT processes".

But a 2020 internal review of intelligence capability says information handling "requires significant uplift", yet is hampered by the need for annual bids for enough funding just to keep the fragmented storage and other systems maintained.

At the same time there is this push for greater powers to gather data, worldwide and in this country.

A separate OIA response shows police expect to develop policies to give them more access to evidence held anywhere in the world online.

In the late 2020 briefing to the police minister, police said: "There are important cyber policy gaps that need to be addressed".

It shows police were working on a deal with Europol - the European Union's law enforcement agency - to share data more easily.

They also aim to boost data sharing within this country with the likes of Immigration, Internal Affairs that runs passports, and the Waka Kotahi, the Transport Agency that runs driver licensing.

Immigration has its own information-gathering powers, but some are secret. For instance, it is understood to use a social media scanning tool from Cobwebs Technologies, a firm set up by ex-Israeli Defence Force tech experts.

Immigration has refused to release to RNZ any business case or privacy impact assessment it has had done on the Cobwebs tool, arguing this was "likely to prejudice the maintenance of the law".

RNZ asked for details of what cyber policies are being developed to fill the "gaps", but police have not provided this.

Instead, in a statement it said: "The cyber security environment is constantly changing, and changes significantly over time.

"Our Cyber Security and Resilience Programme addresses the rate of change to the global internet environment, in terms of keeping police systems safe."

Management and governance included frequent auditing and reviewing of plans and capability, "and enhancing our response and recovery to cyber events", they said.

Under the OIA, police totally withheld an assurance review into its use of contractors and consultants.

Read this article:
Police computer systems ill-prepared to cope with ransomware attack - New Zealand Herald

Opinion | The Cyber Apocalypse Never Came. Heres What We Got Instead. – POLITICO

What we got was neither the unbridled promise of digital cooperation nor a fiery cyber apocalypse. Instead, todays cyber reality seems simultaneously less scary and more of a hot messa series of more frequent, less consequential attacks that add up not to a massive Hollywood disaster but rather to a vaguer sense of vulnerability. This can make it hard to understand whats going on and how bad it really is. Are all these high-visibility cyber events more of the same, or are we living through a new era of cyber warfare?

In some ways, the events of the past few months arent that surprising given the trajectory of cyber activity over the last decade. Theyre the evolution of a steady, somewhat inevitable shift toward using digital tools as a means of international statecraft and political contestation. However, what we are seeing is also subtly different from the way experts had previously thought cyber would affect the international landscape. Over the last decade, authoritarian governments have embraced digital tools and leaned on shadowy gangs of cyber criminals to do some of their dirty work, while the pandemic has made the world reliant on the internet and created a rich world of targets for those seeking money and leverage. As a result, cyberspace may be less apocalyptic than predicted, and more like a termite infestation, eating at the very foundations of our increasingly digital societies. The good news, though, is that the long-sought international consensus on appropriate uses of cyber means within foreign policy may be finally coming togetherwhich means theres hope that todays cyber disorder may eventually abate.

Its true that Russian cyber espionage, cyber criminals, Chinese intellectual property theft and private actors in cyberspace have been with us for years. Hackers affiliated with the Russian government have long used Ukraine as a testbed for hacks on critical infrastructure and governance and military capabilities, all while the Kremlin looked aside at burgeoning cyber criminal activity. Over the past few years, Xi Jinpings China has also built up its cyber capabilities, embarking on large-scale espionage hacks (like the 2015 Office of Personnel Management data exfiltration) and courting widespread economic sanctions for its illicit efforts to steal intellectual property via cyberspace.

At the same time that Russia and China became more capable and more audacious in their cyber campaigns, non-state actorswho have always played an outsize role in cyberspacewere changing the balance of power in the cyber spyware competition. Companies like the Emirati-based DarkMatter recruited talent from across the globe (including former NSA employees) to develop cutting-edge software that can track targeted users phones, monitor their communications and even geolocate them. These commercially created spyware applications were then provided to governmentsmany authoritarianto track dissidents, journalists and international leaders. Most notably, claims have been made that the assassination of Jamal Khashoggi was linked to spyware that the Israel-based NSO group provided to Saudi security officials, who purportedly used it to monitor Khashoggis movements and influence the investigation after the murder (both the Saudi government and NSO deny their involvement).

So, to an extent, Russian-linked ransomware attacks, the collective callout of China for the Microsoft hack and the revelations about the NSO group are more of the same. But theres also something new going on.

First, the geopolitical context in which cyber battles are fought has changed fundamentally. The early Obama administration was relatively restrained in cyberspace, relying on deterrence, limited sanctions and efforts to establish cyber norms through the United Nations. This approach changed under Trump, whose foreign policy adopted a zero-sum view of the world, characterized by great power competition, trade wars and transactional relationships with allies. Accordingly, the Trump administrations cyber efforts put more focus on defending forwarda more aggressive strategy that emphasizes preemptively entering adversaries networks before they launch cyber attackswhile sidelining efforts to create international consensus on cyber warfare. Meanwhile, the simultaneous rise of personalist regimes across the world ushered in a golden age for digital authoritarianism, with dictators embracing artificial intelligence, disinformation, deep fakes and hack and reveal campaigns to cement their power both domestically and in the fracturing international order.

Add to this digital tinderbox a pandemic that not only drove countries apart (physically and ideologically), but also forced them to become more digitally dependent as they turned to automation, remote work and digital bubbles to protect from the physical threat of Covid-19. As court systems, physicians, classrooms and local governance all went virtual, societies struggling with the pandemic became rich targets for cyber criminals. Ransomware attacks increased exponentially, both in scope and in economic cost.

Pandemic-induced vulnerabilities werent just lucrative cyber targets for criminals. They also created new access points for states looking to add more vulnerabilities to their cyber arsenals. Many of the critical infrastructure companies that went fully digital in response to the pandemic are also potential targets for states like North Korea or Iran that want to coerce the more militarily capable United States. The concern is that these states may use cyber vulnerabilities to attack power supplies, data centers or health and human services as the first salvo in a broader geopolitical crisis. This idea of using cyber attacks against critical infrastructure as signals to deter further escalation has been a major concern for onlookers worried that the uptick in cyber intrusions could not only create economic costs, but inadvertently escalate into violent conflictthus creating exactly the situation these cyber attacks were meant to avoid.

A more competitive geopolitical landscape, the rise of digital authoritarians and Covid-induced vulnerability have helped create a final trend: the blurred line between state and non-state actions in cyberspace. Authoritarian governments have looked aside (sometimes purposefully) as groups of cyber criminals with loose or unclear ties to the state became cyber headliners. North Korea has always used cyber criminal campaigns to generate revenue for the regime. Russia has pursued strategic and willful ignorance about criminal cyber activity originating within its borders, and used cyber criminals as a patsy to avoid retribution for state-sanctioned hacking activities. Even China, which a few years ago made a concerted effort to clamp down on its cyber militia of patriotic hackers, seems to have rediscovered the value of state-sanctioned cyber side hustles. The White Houses recent statement on the Microsoft hack accuses China not just of ignoring cyber criminal activity, but actually contracting such criminals to pursue official foreign policy goals.

Governments are now using cyber criminals the way they use other non-state actorslike maritime militias or un-uniformed special operations forcesto achieve foreign policy objectives without engaging in outright conflict. This murky middle is what international relations scholars call the grey zone. Most directly, states can sanction cyber criminal activity to bring in revenue, use non-affiliated organizations to propagate disinformation, or lean on civilian companies and criminals to create technologies and exploits that states can then buy to use against adversaries. More indirectly, non-state actors can generate chaos, confusion and cost all while introducing enough uncertainty about whos really responsible to dissuade states from retaliating. Scholars have frequently viewed these more shadowy cyber actions as less dangerous than traditional war, but they come with the risk of accidentally pushing too far and escalating into conflict.

So the post-pandemic cyber world has more vulnerabilities, more opportunities for economic and political exploitation, and more actors that blur the line between state and non-state involvement. The convergence of these bad-news trends certainly helps explain the battery of recent cyber headlines. However, there is some reason for optimism. The Biden administrations announcement accusing China of the Microsoft hack noted that an unprecedented group of allies and partners including the European Union, the United Kingdom, and NATO are joining the United States in exposing and criticizing the PRCs malicious cyber activities. This is a remarkable achievement given the difficulty of creating international consensus on what states should and should not do in cyberspace. Outside observers might be surprised to learn just how tough it is for states to agree on something even as basic as what a cyber attack is.

The joint callout of China comes a few months after a UN report signed by 25 countries (including China, Russia, and the US) emphasized the need to prevent cyber attacks on critical infrastructure. While this might seem like an obscure report, it was a diplomatic coup, reflecting a hard-fought, multi-year effort to create consensus among countries about how responsible states should behave in cyberspace. This agreement (and the recent US-NATO-EU statement against Chinese hacking) would not have been possible had pandemic-induced cyber vulnerabilities not galvanized international action. The succession of high-visibility cyber events in recent months, paired with a U.S. administration that is prioritizing cyber threats within its foreign policy, may have provided the impetus for the international community to slowly start agreeing on ways to punish problematic cyber activity.

Cyber attacks on hot dog plants or virtual elementary school classrooms may not look like the dystopian end times Panetta and Clapper warned about. But they insidiously eat away at the foundations of digital economies, societies and, ultimately, state power. Today, with these foundations crumbling, we may not need cyber Pearl Harbor analogies to understand the danger of cyber attacks. But can the U.S. and its now-energized allies build on this momentum to reverse the shifts wrought by authoritarian governments, the pandemic and the rise of non-state cyber criminals? Fingers crossed.

CLARIFICATION: This story has been updated to include a more recent estimate for the number of companies hackers were able to access through the Solarwinds breach.

See the original post here:
Opinion | The Cyber Apocalypse Never Came. Heres What We Got Instead. - POLITICO

AU Deals: Get Protected Online Without Breaking The Bank – PCMag AU

While the adage of Common Sense + Windows Defender being a viable strategy for internet security is a pervasive one, the reality is that cyber attacks happen every single day and cause real lasting damage, even to the more technological literate of us.

Even if you personally feel that your internet browsing habits are totally above board, you know what a dodgy link looks like, and you havent had to pirate anything in a long time, there are still risks to consider. If your PC (or Mac) is used by someone other than yourself, those risks increase tenfold.

Right now, you can start up a subscription of Norton AntiVirus Plus for only A$39.99 for the first year (save $30).

Offering more than just virus and threat protection, these days Norton AntiVirus Plus also provides a password manager, a smart firewall between devices, and 2GB of encrypted cloud storage (incredibly useful for sensitive documents and scans, in particular for protecting against ransomware).

AntiVirus Plus is just an entrypoint as well, with Norton 360 Standard, Deluxe and Premium offerings adding a tonne of new features, VPN access and massively expanding that cloud storage up to 250GB.

Check out the options available here and save up to $95 on your first year of Norton protection.

Link:
AU Deals: Get Protected Online Without Breaking The Bank - PCMag AU

Our Testimony to Congress on Efforts to Secure Oil and Gas Pipelines Against Cyberattacks (video) – Government Accountability Office

In May, Colonial Pipeline Companyannouncedthat it was the victim of a ransomware attack that led to temporary disruption in the delivery of gasoline and other petroleum products across much of the southeast U.S. This cyberattack exemplifies the cybersecurity threats to critical infrastructure that we at GAO have reported on and testified about for many years.

Yesterday, GAOs Leslie Gordonan acting director in our Homeland Security and Justice Teamtestified before the Senate about steps the federal government has taken to address pipeline security, including since the May attack, and what weaknesses remain.

View video clips from her testimony and read on to learn more:

Weaknesses in TSAs efforts

The Transportation Security Administration (TSA) has primary oversight responsibility for the physical security and cybersecurity of pipeline systems. Prior to the cyberattack in May, TSAs efforts included issuing voluntary security guidelines and performing security reviews of privately owned and operated pipelines.

In 2018 and 2019, we identified some weaknesses in TSAs oversight and guidance, and made recommendations, most of which TSA addressed. TSA clarified its pipeline security guidelines, improved performance monitoring, assessed staffing needs, and updated guidance on federal roles and responsibilities. However, as of June, TSA had not fully addressed 2 key weaknesses:

Weaknesses in government-wide efforts

The attack on Colonial Pipeline highlights the urgent need to address long-standing cybersecurity challenges facing the nation. Most systems and networks used today, including those that are part of our nations critical infrastructure, are interconnected with other systems and the internet, and because of this they are vulnerable to cyberattacks.

The federal government must take immediate steps to prevent, more quickly detect, and mitigate the damage of future cyberattacks. In particular, our testimony yesterday highlighted the need for the government to develop and execute a more comprehensive federal strategy for national cybersecurity and global cyberspace. Since 2010, we have made nearly 3700 recommendations to agencies aimed at remedying cybersecurity shortcomings. As of July 2021, more than 950 of those recommendations are not yet implemented. We will continue to assess and report on critical infrastructure cybersecurity protection.

Read more:
Our Testimony to Congress on Efforts to Secure Oil and Gas Pipelines Against Cyberattacks (video) - Government Accountability Office

A DNS outage just took down a large chunk of the internet – TechCrunch

A large chunk of the internet dropped offline on Thursday. Some of the most popular sites, apps and services on the internet were down, including UPS and FedEx (which have since come back online), Airbnb, Fidelity, and others are reporting Steam, LastPass, and the PlayStation Network are all experiencing downtime.

Many other websites around the world are also affected, including media outlets in Europe.

What appears to be the cause is an outage at Akamai, an internet security giant that provides networking and content delivery services to companies. At around 11 a.m. ET, Akamai reported an issue with its Edge DNS, a service thats designed to keep websites, apps and services running smoothly and securely.

DNS services are critically important to how the internet works, but are known to have bugs and can be easily manipulated by malicious actors. Companies like Akamai have built their own DNS services that are meant to solve some of these problems for their customers. But when things go wrong or theres an outage, it can cause a knock-on effect to all of the customer websites and services that rely on it.

Akamai said it was actively investigating the issue, but when reached a spokesperson would not say if its outage was the cause of the disruption to other sites and services that are currently offline. A spokesperson for ThousandEyes, an internet monitoring company bought by Cisco in 2020, attributed the outage to Akamai.

Akamai would not say what caused the issue but that it was already in recovery.

We have implemented a fix for this issue, and based on current observations, the service is resuming normal operations. We will continue to monitor to ensure that the impact has been fully mitigated, Akamai told TechCrunch.

In a follow-up tweet, the company said it was not a result of a cyberattack.

Its not the first time weve seen an outage this big. Last year Cloudflare, which also provides networking services to companies around the world, had a similar outage following a bug that caused major sites to stop loading, including Shopify, Discord and Politico. In November, Amazons cloud service also stumbled, which prevented it from updating its own status page during the incident. Online workspace startup Notion also had a high-profile outage this year, forcing the company to turn to Twitter to ask for help.

Read more here:
A DNS outage just took down a large chunk of the internet - TechCrunch

Meet the UAB students training to stop ransomware and other digital threats – UAB News

UABs cybersecurity masters program is preparing a new workforce for a booming field with ever-increasing demand and a shortage of skills. The program has a unique focus on both cyber defense and cyber investigations.

Lindsey Sandlin Photo by: Andrea MabryJust weeks before Colonial Pipeline was devastated by the most high-profile infrastructure cyberattack in United States history in May, the company posted an ad on LinkedIn for Manager, Cyber Security. Colonial was searching for a masters-trained professional who could create and maintain an incident response plan and processes to address potential threats, according to Bloomberg News.

Colonials position, like many others in the hot cybersecurity job market, went unfilled, resulting in a catastrophic shutdown, global headlines and long lines at pumps across the eastern United States.

The stakes are not always this high; but according to the 2021 State of the CIO survey from the publication CIO, cybersecurity jobs are the most challenging IT jobs to fill right now, surpassing AI/machine learning and data science/analytics. The U.S. Bureau of Labor Statistics projects that jobs in the information security analyst category will grow 31 percent (adding more than 40,000 jobs) by 2029, much faster than the average. The pay is attractive as well; the median salary in 2020 was $103,590 per year.

All of this is not news to Nitesh Saxena, Ph.D., professor in the Department of Computer Science and co-director of the Master of Science in Cyber-Security program at the University of Alabama at Birmingham, a joint program of the computer science department and the Department of Criminal Justice.

This is a very popular area with ever-increasing demand and a shortage of skilled applicants, Saxena said. Most of our students go straight into jobs in industry with private companies and government organizations.

Ransomware is clearly an important threat, Saxena said. But our program actually focuses on much broader issues. Our goal is for our students to have holistic experience in cyberattack prevention, detection, forensics and recovery. We graduate lifelong learners who can adapt to address the new challenges that will always appear in this ever-changing area.

Despite the soaring media coverage, ransomware is one of the lower entries on the FBIs 2020 Internet Crime Report. Business Email Compromise, the leading category, totaled $1.8 billion in reported losses in 2020. (Ransomware totaled just over $29 million, although the FBI notes that this number does not include estimate of lost business, time, wages, files or equipment.) More than 30 separate categories of attack are detailed in the Internet Crime Report, from confidence fraud and identity theft to credit card fraud, extortion and corporate data breaches. Overall, internet crime complaints rose 70 percent in 2020 over 2019, with reported losses exceeding $4.2 billion.

Graduates of UABs masters program are trained to make an impact on these staggering figures. One key differentiating factor of UABs program is that it is run jointly with the criminal justice department, Saxena said. It has a typical Cyber Defense track, but also a Cyber Crime Investigations track, which is unique across the entire nation and worldwide.

The Cyber Crime Investigations track enables students to move beyond simply responding to an attack and into determining where it came from and who was behind it, says Jeffery Walker, Ph.D., professor and chair of the Department of Criminal Justice and co-director of the Cyber-Security masters program. This can aid in stopping the attackers before they strike again. Students in the program also have the opportunity to work in the Computer Forensic Research lab at UAB, Walker said: Here they work directly on large-scale cybersecurity projects for financial institutions, corporations and the federal government. This gives them an added advantage when they graduate because they have real-world experience.

Students in the program also have the opportunity to work in the Computer Forensic Research lab at UAB: Here they work directly on large-scale cybersecurity projects for financial institutions, corporations and the federal government. This gives them an added advantage when they graduate because they have real-world experience.

The Cyber Crime Investigations track was particularly appealing to current student Lindsey Sandlin, who has an undergraduate degree in criminal justice with a minor in cyber criminology. The masters program at UAB is ideal for a student like me who wants a combination of both specialties, she said. Sandlin has taken a special interest in digital forensics courses that have trained her in everything from investigating email spam to learning how to examine encrypted phones.

Sandlin also was attracted by UABs designation as a site for the National Science Foundation Cybercorps Scholarship for Service program, which offers stipends of $34,000 per year, covers expenses including education-related fees, professional development and books, and even includes a health insurance reimbursement allowance. In return, students complete an internship with a federal, state, local or tribal government organization in a position related to cybersecurity and work in such an organization after graduation for a period equal to the length of their scholarship.

The NSF pays scholarships for bright students to pursue degrees in cybersecurity, and these students then work for the government in cybersecurity fields, Saxena said. It is a win-win for both students and the government.

Sandlin has already received a job offer and will be moving to Washington, D.C., after graduation in August 2021. I plan on continuing employment within the government working in digital forensics for the long term, she said.

Payton Walker, who earned his masters degree at UAB in 2019, is now pursuing a doctoral degree with Saxena as his mentor. When I started reading about the cybersecurity field, I immediately became interested, Walker said. The idea of working to improve national security was very appealing.

Walker researched UABs masters program and thought it was a good fit. He also was intrigued by the studies going on in Saxenas SPIES (Security and Privacy in Emerging computing and networking Systems) research group. They were working on some very interesting projects that sparked my curiosity about conducting research, including an analysis of how smartphone motion sensors can be used to eavesdrop on private conversations, Walker said. I was able to shadow and work under the lead student on this project, Abhishek Anand, and later expanded on this research area for my Ph.D. work.

Walker, like Sandlin, has earned an NSF CyberCorps scholarship. I chose to pursue a Ph.D. mainly for additional training for the workforce, he said. I would like to work for a federal agency or federally funded research center as a research scientist. Walkers one-year work commitment is deferred while he is finishing his doctorate, but afterward I will be expected to work for a federal agency or other institute that is federally funded, he said. But this is exactly what he wanted, Walker explains. I am most interested in working for the federal government and conducting research to aid national security, he said. Ideally, I would like to work for a federal agency like the Department of Energy in one of their cybersecurity research laboratories and participate in the cutting-edge research that they do.

Walker already has considerable experience in groundbreaking cybersecurity investigations and is a co-author on four publications so far thanks to his work with the SPIES lab. My research focuses on side-channel speech attacks in the vibration domain as well as speech attacks against modern voice-controllable Internet of Things systems, such as smart speakers from companies such as Google and Amazon, he said.

Our students get the chance to contribute to research that is pushing the boundaries of cybersecurity, and they present their work at major conferences and meetings, Saxena said. This is invaluable experience, no matter where they choose to work, whether in industry or in government.

Read more from the original source:
Meet the UAB students training to stop ransomware and other digital threats - UAB News

DesignRush Reveals the Best Technology Experts to Hire in 2021 [Q2 Rankings] – Yahoo Finance

DesignRush issued the second quarterly list of top technology companies specialized in various fields ranging from software development, internet security and artificial intelligence, among others.

NEW YORK, July 23, 2021 /PRNewswire-PRWeb/ -- Experts predict that there will be 75 billion interconnected devices worldwide by 2025. From productivity to entertainment, software and hardware solutions are evolving to support the growing market needs and demand.

Whether looking to build custom solutions or leverage a portfolio of commercial software, businesses need reliable technology partners.

DesignRush, a B2B marketplace that connects brands with agencies, has released the second quarterly (Q2) list of the top technology experts to hire. The list features experts in:

The top technology expert companies in Q2, according to DesignRush's Q2 list, are:

Apiumhub - apiumhub.com

Archer Software - archer-soft.co

BiharApps - biharapps.com

CodeStringers - codestringers.com

Codete - codete.com

CrustLab - crustlab.com

Daxx - daxx.com

Digilite - digilite.ca

Digimid - digimid.com

Digital Skynet - digitalskynet.com

Dividato - sf.dividato.com

EDISON Software Development Centre - edsd.com

Emergent Software - emergentsoftware.net

Emorphis Technologies - emorphis.com

Enlab Software - enlabsoftware.com

Exposit - exposit.com

fram^ - wearefram.com

4ire Labs - 4irelabs.com

iFour Technolab Pvt Ltd - ifourtechnolab.com

ISHIR - ishir.com

KindGeek - kindgeek.com

Leobit - leobit.com

mindworks GmbH - mindworks.de

Moblers - moblers.com

Noltic - noltic.com

Onex Software - onexyazilim.com

PanonIT - panonit.com

Prompt Softech - promptsoftech.com

Semaphore Mobile - semaphoremobile.com

SF AppWorks - sfappworks.com

Smazee - smazee.com

Spire Digital - spiredigital.com

Sunrise Software Solutions Corporation - s3corp.com.vn

Synebo - synebo.io

System Logic Solution - systemlogicsolution.com

The Custom Packaging - thecustompackaging.com

The Gnar Company - thegnar.co

Unmetered Technologies - unmeteredtechnologies.com

WaveAccess - wave-access.com

Webspaceteam - webspaceteam.com

Wirefox Design Agency - wirefox.co.uk

Zesium - zesium.com

Zfort Group - zfort.com

Brands can explore the top technology companies by location, size, average hourly rate and portfolio on DesignRush.

Story continues

About DesignRush:

DesignRush.com is a B2B marketplace connecting brands with agencies. DesignRush features the top agencies around the world, including the best Digital Agencies, Logo Design, Branding, Digital Marketing, Website Design, eCommerce Web Design Companies, and more.

Media Contact

Srdjan Rokvic, DesignRush, 8008565417, srdjan@designrush.com

Twitter

SOURCE DesignRush

View original post here:
DesignRush Reveals the Best Technology Experts to Hire in 2021 [Q2 Rankings] - Yahoo Finance