Categories
NCSC-FI News followup

Daily NCSC-FI news followup 2020-03-01

Switzerland files criminal complaint over Crypto spying scandal

www.reuters.com/article/us-swiss-spying-crypto/switzerland-files-criminal-complaint-over-crypto-spying-scandal-idUSKBN20O1VD The Swiss government has filed a criminal complaint over the U.S. Central Intelligence Agencys alleged use of a cryptography company as a front to spy on various governments secret communications, the Swiss attorney generals office said on Sunday.. The complaint against persons unknown for alleged breaches of the law governing export controls follows recent reports on Operation Rubicon, which for decades involved the CIA and German BND spy services covertly reading other nations secret messages encoded with technology sold by Swiss firm Crypto AG.

Kiinan kätyri vai isänmaan asialla? Huawein maajohtaja Mika Aarnikka sanoo johtavansa Suomessa yhteiskunnallista operaatiota: En halua olla väärässä tässä

www.kauppalehti.fi/uutiset/kiinan-katyri-vai-isanmaan-asialla-huawein-maajohtaja-mika-aarnikka-sanoo-johtavansa-suomessa-yhteiskunnallista-operaatiota-en-halua-olla-vaarassa-tassa/c0435ef1-a3ac-4ee… Huawein suomalaiset työntekijät ovat saaneet osansa kansainvälisistä kohuista. Kriisiviestintää ei kirjoista opi, sanoo yhteiskuntasuhde- ja viestintäjohtaja Hennariikka Andersson.

New Evasion Encyclopedia Shows How Malware Detects Virtual Machines

www.bleepingcomputer.com/news/security/new-evasion-encyclopedia-shows-how-malware-detects-virtual-machines/ A new Malware Evasion Encyclopedia has been launched that offers insight into the various methods malware uses to detect if it is running under a virtual environment.

Deciphering The SWIFT-DRIDEX Relationship In Bank

packetstormsecurity.com/files/156575/Deciphering-The-SWIFT-DRIDEX-Relationship-In-Bank.html This whitepaper is a study that gives an overview about what methodology a hacker uses to hack into a system, discusses a theft of millions from the central bank of Bangladesh, and more.. PDF:

dl.packetstormsecurity.net/papers/general/Deciphering-SWIFT-DRIDEX.pdf

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.