Data Privacy

Chinese Man to be Imprisoned 9 Months for Selling VPNs

Chinese Man to be Imprisoned 9 Months for Selling VPNs

A Chinese man by the name of Deng Jiewei was arrested August of last year and has recently been sentenced 9 months imprisonment for selling VPN software that can bypass China’s Great Firewall. Authorities revealed that Deng and his partner Jiang Zhifeng set up two websites to sell their VPN products which had the translated name “Flying Over SS”, later changed to “Shadow Shuttle Cloud”. The two made a total of $2,150 from selling the software. Their domain, yingsuoyun.com, now redirects to the court’s verdict on the case. Zhifeng is still currently at large. The case is one of the […]

Hackers May Be Able to Manipulate AI Training Algorithms

Hackers May Be Able to Manipulate AI Training Algorithms

Earlier this week, a paper by researchers from New York University showed that an attacker may be able to manipulate deep learning-based artificial intelligence (AI) algorithms. The researchers said that small equations that can be used as a backdoor can be hidden in deep learning algorithms due to their vast complexity. The backdoor cannot be removed by feeding the AI with more sample data as it will only decrease its accuracy. They add that the attack scenario is very possible, a hacker can simply use social engineering to gain access to the cloud service and then insert the backdoored model […]

WikiLeaks Says CIA Spied on FBI & NSA

WikiLeaks Says CIA Spied on FBI & NSA

The latest Wikileaks Vault 7 revealed a project called ExpressLane where the CIA used a trojan to get biometric information from its security service partners. It was said that the CIA installed the trojan on the systems of partners that did not voluntarily give them the biometric data. The trojan would even have a splash screen with a progress bar to look like a legitimate installation so it can be installed in the presence of partner agents. The trojan would then save the data to a hidden partition in a thumb drive that OTS agents would use on ‘maintenance’ visits. […]

Google to Fully Unveil Titan Security Chip This Week

Google to Fully Unveil Titan Security Chip This Week

Search giant Google is scheduled to disclose the technical specs of its Titan computer chip this week, which will be used to bolster its cloud computing network’s security features. Neal Mueller, head of infrastructure product marketing for Google Cloud Platform, revealed that Titan scans the hardware for any tampering, and prevents the machine from booting due to changes.   Hoping to capture a bigger piece of the cloud services market from Amazon and Microsoft, Google will be installing the stud earring-sized chip on network cards and servers in its data centers. Representatives from the top two companies in terms of […]

Android Oreo Introduces Per-App Permissions Feature for Better Security

Android Oreo Introduces Per-App Permissions Feature for Better Security

The latest version of the Android OS now uses a more secure procedure when installing third-party apps, thus protecting the device from possible malicious app activity.   In the previous Android versions, users were given an option to ‘Install from unknown sources’. However, this feature did not protect the device from malicious installations even when activated. Google has opted to drop the procedure in Android 8.0, where users will now need to grant permissions to apps individually. Experts say that the new feature should help prevent an ‘all or nothing’ permission scenario that increases the likelihood of hostile takeovers. Source: […]

Hackers Target Companies and Security Researchers in Extortion Campaign

Hackers Target Companies and Security Researchers in Extortion Campaign

Last week, around 33,500 extortion emails asking for payment in Bitcoin were sent out to targets including a security researchers and a French company.      Roland Dela Paz, the Forcepoint researcher who identified one of the schemes used in the campaign, said that the attempts looked fake. The email threatened to release sexually explicit images of the user if a ransom of $320 isn’t paid to their Bitcoin address. However, the hackers failed to include specific elements such as names, addresses, or dates of birth, which led Paz to believe that the threats were empty. Paz adds that the campaign […]

Spanish Researchers Develop Technology That Can Spot Pirated, Forged Images

Spanish Researchers Develop Technology That Can Spot Pirated, Forged Images

Researchers from the Barcelona’s Universitat Oberta de Catalunya are currently developing a watermarking system that can help identify doctored video and images. Mehdi Fallahpour and David Megías of the Kriptography and Information Security for Open Networks (KISON) group has revealed that their method can embed more information per second compared to similar existing technologies. However, what makes it groundbreaking is its reversibility, which allows the media to be restored to its original state. Yolanda Pena, a digital-rights lawyer says that while the technology will be a big help in determining fraudulent use of digital content should copyright owners want to […]

Onavo App Gives Facebook Early Insight on Competitors

Onavo App Gives Facebook Early Insight on Competitors

Earlier this week, the Wall Street Journal reported on how Facebook’s Onavo app gives the social media giant its competitive edge. Onavo Protect, a data security app developed by an Israeli mobile analytics company, has already been downloaded by millions of users worldwide and was critical in providing Facebook insights on Snap and its flagship app Snapchat. Snapchat has a feature which is a directly competes with Instagram’s Stories. Onavo provides the user a free encryption and data security service through its app. However, he app it is also able to collect data from user’s phones that other Facebook apps […]

Mimecast Report Revenue Increase of 40%

Mimecast Report Revenue Increase of 40%

Mimecast, an information security and email archiving company revealed a revenue increase of 40 per cent for Q1 2018. The acceleration in revenue growth and declining losses is attributed to the recent global issues regarding cloud security and ransomware. The company’s CEO and CFO say that the impressive performance is delivered by strong retention and upsell. They also relayed that the company’s response to the evolving threat landscape with services such as Sync and Recover, which enables organizations to quickly recover in the event of an cyberattack greatly helped in boosting earnings. Source: The Register UK

HBO Offers Ransom Money, Asks Hackers to Extend Deadline

HBO Offers Ransom Money, Asks Hackers to Extend Deadline

HBO is offering its hackers $250,000 to extend the deadline for one more week. In an email interview with Reuters, the cable company’s tech team said that they were doing this “in the spirit of professional cooperation”. The network, owned by Time Warner Inc., said that they needed more time to obtain a Bitcoin ransom fund, or sort out account details to wire the funds through a bank. However, an expert said that this is conventional “stall tactic”, and there was never any intention to pay the sum of $250,000, or $6 million as the hackers originally demanded. Observers believe […]

Read more about the Data Privacy practice at Disini & Disini Law Office