Author: Disini & Disini Law Office

Tencent Shares Fall After Chinese Regulators Block Sales of “Monster Hunter”

Tencent Shares Fall After Chinese Regulators Block Sales of “Monster Hunter”

Tencent shares fell more than 3% last Tuesday after it was announced that the tech giant will not be able to sell a hugely popular game called “Monster Hunter: World” on its WeGame distribution platform. Chinese regulators reportedly banned the game for not meeting regulatory requirements. However, a source close to the matter said that the removal was due to bureaucratic infighting with the country’s new regulator. The tech giant’s gaming business has become a significant source of revenue, with titles like “Honor of Kings” boosting smartphone gaming revenues up by as much as 68%. Source: CNBC

Bitcoin Drops to $6000, Lowest Level of 2018

Bitcoin Drops to $6000, Lowest Level of 2018

Bitcoin fell to $5900 last Monday for the first time since June, taking the majority of other cryptocurrencies along with it. According to CoinDesk’s index data, the world’s biggest virtual currency by value went down by 4% before recovering to $6112. Meanwhile, Ethereum fell to its lowest level since September to $267.61, while Ripple retreated to 27 cents. CryptoCompare CEO Charles Hayter says that the downtrend was due to the postponement of a bitcoin exchange-traded fund (ETF) proposed by VanEck and Solid X.   Source: CNBC

Malaysia Places Fourth in AI Adoption in Southeast Asia

Malaysia Places Fourth in AI Adoption in Southeast Asia

According to a recent survey by IT market research and advisory firm IDC titled IDC Asia/Pacific Enterprise Cognitive/AI says that AI adoption in Southeast Asia is on the rise, with 34% of organisations in Malaysia revealing plans to adopt AI in the next two years. Malaysia also placed fourth with 8.1% of all companies being open to the adoption and integration of artificial intelligence into their operations. It is said that Malaysia’s increasing focus on AI is brought by its smart cities initiatives and applications in public safety and intelligent transportation. However, a these initiatives would need more time to […]

Indian Gov’t Asks Amazon to Set Up Local Servers for Protection of Customer Data

Indian Gov’t Asks Amazon to Set Up Local Servers for Protection of Customer Data

India’s Electronics and Information Technology Minister Ravi Shankar Prasad recently asked Amazon India head Amit Agarwal to set up servers within the country to prevent the unregulated migration of customers’ personal data. Prasad said that while big foreign companies are welcome in India, it is important that they keep the data of Indian customers in onshore servers and the consent of the subject is obtained. Amazon India has not yet made an official reply, but government officials said that the company is already making efforts towards the data protection of Indians. Source: Business Standard

Australian Encryption Bill Promises No Backdoors, but Still Full of Loopholes

Australian Encryption Bill Promises No Backdoors, but Still Full of Loopholes

It was recently reported that Australia’s Telecommunications and Other Legislation Amendment (Assistance and Access) Bill 2018, which was released on Tuesday, promises not to weaken encryption and will not compel providers to implement vulnerabilities into forms of electronic protections. However, it was pointed out that the Bill creates a framework for providing access to endpoint devices which means that messages can be intercepted before they are encrypted. It will also require providers to use software given by the government, which could include spyware. It was also pointed out that there was a possibility that providers may substitute a service they […]

Security Expert Reveals MacOS Malware Capable of Synthetic Mouse Clicks

Security Expert Reveals MacOS Malware Capable of Synthetic Mouse Clicks

Patrick Wardle of Digita Security revealed at the recently-held DefCon in Las Vegas a malware that can perform synthetic clicks on MacOS, which can allow attackers to bypass permission prompts and compromise the user’s system. Wardle said that such a malware, which synthetically interacts with the user interface, can be used to bypass layers of security so the attacker can access the user’s location, steal their contacts or even take over the computer’s kernel core system to fully control the computer. Wardle added that he came across the “synthetic clicks“ bypass technique by incorrectly pasting code.   Source: Wired

Firmware Vulnerabilities Found in Big Brand Android Models

Firmware Vulnerabilities Found in Big Brand Android Models

Security researchers revealed at DefCon last week around 47 vulnerabilities in the firmware and apps of 25 Android smartphone models, some even belonging to big brands including ZTE, Sony, Nokia, LG, Asus, and Alcatel. Some of the flaws can permit the attacker to access or send text messages from the user’s phone, take screenshots, record videos of the device’s screen, access the user’s contacts list, force installation of third-party arbitrary apps without the user’s knowledge or consent, and even wipe user data. Angelos Stavrou, CEO of Kryptowire, said that the sheer number of phone models and firmware makes it very […]

11-Year Old Gives Hacking Demonstration of US Voting System  

11-Year Old Gives Hacking Demonstration of US Voting System  

In a recent hacking competition sponsored by non-profit R00tz Asylum, 11 year old Bianca Lewis showed how easy it was for hackers to compromise the infrastructure of the US voting system. The contest was part of the recently held Def Con conference in Las Vegas which was attended by more than 300 young hackers. By attacking a replica website, Lewis showed that it was possible to change the number of votes or even delete candidates off the system. It was noted that Congress last month rejected an amendment that would have allotted $380m for boosting electoral security for 2019. Source: […]

All-in-one Printers, Fax Machines Can be Used to Hack Company Networks, Researchers Warn

All-in-one Printers, Fax Machines Can be Used to Hack Company Networks, Researchers Warn

Check Point Software researchers warned this week that hackers can now take over company networks by exploiting a bug in fax machines and all-in-one printers. The researchers said that it is possible to steal company secrets just by faxing over lines of malicious code disguised as an image file. The file is then decoded and stored in the fax’s memory which the attacker can use to take over the machine. While HP said that they had already addressed the vulnerability, the researchers added that the new attack vector can still be used on faxes from other brands. Source: CNBC

Google Boosts Local Partnership for Return to China

Google Boosts Local Partnership for Return to China

A new report from the Wall Street Journal revealed that Google had been increasing its partnership with local companies in China for years in preparation for its re-entry into the market. It was revealed that CEO Sundar Pichai had been cultivating partnerships with developers who had been using Google’s infrastructure, as well as companies using Google Ads to reach customers outside of China. The search giant had also been engaging in talks with Tencent on jointly offering cloud computing services. The WSJ also pointed out that the partnerships should show the ruling Communist Party that Google is contributing to local […]