Australian Prime Minister Malcolm Turnbull declared that cyber security was “the new frontier of warfare” and espionage while announcing new measures to protect Australian democracy from foreign interference :: Read the full article »»»»
As Google, Apple and Microsoft scramble to patch a long missed security flaw it might be timely to remember how we got here. Way back at the latter end of the last century – the 1990s, when Netscape browser was all the rage and – SSL (Secure Socket Layer) encryption was brand-spanking-new, the U.S. government wanted control over export of “weapons grade” encryption.
Its theory was that domestic communications could benefit from stronger, 128-bit encryption, but ‘backdoors’ should be available to U.S. intelligence and law enforcement when it came to foreign communications, the concept of weaker, “export grade” encryption was born.
Turns out that this theory and it’s legacy backdoor, a vulnerability that we’ve come to know in recent days as ‘FREAK’ still exists in up to 30 percent of U.S. web servers. It’s a sad example of how zombie-security from the era that gave us grunge can come back and bite us on the posterior.
Meanwhile, Apple and Google are saying they’ve developed fixes/patches – though we note Apple has yet to deploy – to mitigate the ‘Freak’ security flaw. Initially thought to be immune, Microsoft released an advisory which warned hundreds of millions of Windows PC users are also vulnerable to the security vulnerability :: Read the full article »»»»
Telstra said an unintended consequence of the plan would be the creation of many highly attractive targets for hackers.
The Federal Government has cited national security as one of the reasons for its plan to force telcos and internet companies to store customer metadata for two years.
A parliamentary committee investigating the bills also heard concerns from Australia’s intelligence agency watchdog that ASIO could keep metadata indefinitely.
Under the metadata retention scheme, Telstra, and all other national telcos and internet companies, would be forced to store customer metadata for two years.
Telstra said the data would be kept in a database, ready to be given to law enforcement on request :: Read the full article »»»»
In our online lives, nothing sends a shiver quite as quickly as a bluescreen, going down via bad hard-drives, corrupt installs or withering hardware is one thing, going blue via a virus is another story entirely, data is more often than not lost forever.
Many of the most potent viruses last year were transmitted via links to corrupted sites or email attachments, often hitting as a disguised news story. From government agencies to electronics giants, hackers and attackers fought their way into personal information systems and websites, often just to show it could be done, but more often nefariously stealing valuable personal information.