NCSC-FI News followup

Daily NCSC-FI news followup 2019-07-28

Who’s Behind the Syrian Electronic Army? – An OSINT Analysis Continuing the “FBI Most Wanted Cybercriminals” series I’ve decided to continue providing actionable threat intelligence on some of the most prolific and wanted cybercriminals in the World through the distribution and dissemination of actionable intelligence regarding some of the most prolific and wanted cybercriminals.. Following a series of high-profile Web site defacement and social media attack campaigns largely relying on the utilization of good-old-fashioned social engineering attack campaigns – it appears that the individuals behind the Syrian Electronic Army are now part of FBI’s Most Wanted Cyber Watch List

Teenage hackers are offered a second chance under European experiment Police in the U.K. and the Netherlands have created a legal intervention campaign for first-time offenders accused of committing cybercrimes, officials explained Tuesday at the International Conference on Cybersecurity at Fordham University. The effort, called “Hack_Right,” is aimed at people between 12 and 23 years old who may be skirting the law from behind their keyboard and not even realize it.

All Three iPhones Coming in 2020 Will Support 5G The three iPhones expected to launch in 2020 will feature support for 5G, according to a new note to investors shared today by Apple analyst Ming-Chi Kuo and obtained by MacRumors.

Mozilla debuts implementation of WebThings Gateway open source router firmware For the better part of two years, the folks at Mozilla have been diligently chipping away at Mozilla WebThings, an open implementation of the World Wide Web Consortiums (W3C) Web of Things standard for monitoring and controlling connected devices. . In April, it gained a number of powerful logging, alarm, and networking features, and today, a revamped component of WebThings WebThings Gateway, a privacy- and security-focused software distribution for smart home gateways formally debuted.

The Encryption Debate Is Over – Dead At The Hands Of Facebook Facebook announced earlier this year preliminary results from its efforts to move a global mass surveillance infrastructure directly onto users devices where it can bypass the protections of end-to-end encryption.. In Facebooks vision, the actual end-to-end encryption client itself such as WhatsApp will include embedded content moderation and blacklist filtering algorithms. These algorithms will be continually updated from a central cloud service, but will run locally on the users device, scanning each cleartext message before it is sent and each encrypted message after it is decrypted.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.