CyberSecurity Pulse 2017-09-04
|“If you want to be the best, you’ve got to work harder than anyone else.”|
|Sammy Davis Jr.|
The New China Measure Against Anonymity
The initiative is committed to exert greater pressure on the administrators of forums and Internet platforms so that these are assumed by their obligation to verify the real identity of their own users. Their obligations will include taking the appropriate measures to provide adequate protection to the data collected while ensuring at the same time the non-disclosure of any kind of data provided by users or their use for purposes other than the identification of users.
The initiative of the Chinese administration is the most recent but will not be the last. In late July, Russian President Vladimir Putin signed a law to ban the use of virtual private networks (VPNs), proxies and other technologies aimed at surfing the internet anonymously. Undoubtedly, bad times are running for those who want to remain anonymous on the network.
Hidden Cobra: North Korea's DDoS Botnet Infrastructure
The new Joint Technical Alert (TA) released by the Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) provides technical details of the tools and infrastructure used by cyberactors of the North Korean government to target the media, aerospace, financial, and critical infrastructure sectors in the United States and globally. DHS and FBI identified Internet Protocol (IP) addresses associated with a malware variant, known as DeltaCharlie, used to manage North Korea’s distributed denial-of-service (DDoS) botnet infrastructure.
Locating Suspect Via Stingray in United States Definitely Requires a Warrant
A federal judge in Oakland, California has ruled against the suppression of evidence derived from warrantless use of a cell-site simulator. The simulator, a device often referred to as a stingray, was used to locate the lead defendant in an ongoing attempted murder case. In the 39-page ruling, US District Judge Phyllis Hamilton notably found that the use of stingray to find a man named Purvis Ellis was a "search" under the Fourth Amendment and therefore required a warrant. However, in this case, the judge also agreed with the government's assertion that there were exigent circumstances, along with the "good faith exception" to the warrant requirement. In other words, use of the stingray was wholly justified.
Rest of the Week´s News
Chrome Adds Warning for When Extensions Take Over Your Internet Connection
Google engineers have added two neat features to the Chrome browser that will alert users of extensions that hijack proxy settings or the new tab page. The changes, spotted in Google Chrome Canary builds (v62.x), are in the form of popups that appear to the right side of the screen, near the Chrome dropdown menu.
CIA Used the AngelFire Implant Infect Systems Running Windows OS
A new batch of documents from Vault 7 leaks revealed details about a new implant, dubbed AngelFire that was used by CIA agents to infect systems running Windows OS. The documents describe the AngelFire framework implants as a persistent backdoor that infects the partition Boot Sector. According to the user manual leaked by WikiLeaks, AngelFire requires administrative privileges to compromise the target system.
Google Accidentally Shuts Down Internet in Japan
Google has introduced a security defence for it's over a billion users that will help users weed out phishing emails from their Gmail inbox. The company has rolled out new anti-phishing security checks for its Gmail app for iPhone users that will display a warning about potential phishing attempts when users click on a suspicious link from within the app on their iPhone or iPad.