[ZDNet] Canberra asks big tech to introduce detection capabilities in encrypted communication

A set of rules has been drafted by the Australian government that cover safety expectations of platforms, and include the requirement for providers to take reasonable steps to develop and implement processes to detect and address material or activity in an encrypted environment that is or may be unlawful or harmful.

Source: Read More (Latest topics for ZDNet in Security)

You might be interested in …

Daily NCSC-FI news followup 2019-09-12

1B Mobile Users Vulnerable to Ongoing SimJacker Surveillance Attack threatpost.com/1b-mobile-users-vulnerable-to-ongoing-simjacker-surveillance-attack/148277/ More than one billion mobile users are at risk from a SIM card flaw being currently exploited by threat actors, researchers warn.. Also: www.zdnet.com/article/new-simjacker-attack-exploited-in-the-wild-to-track-users-for-at-least-two-years/. Report: simjacker.com/ New Clues Show How Russias Grid Hackers Aimed for Physical Destruction www.wired.com/story/russia-ukraine-cyberattack-power-grid-blackout-destruction/ A fresh look at the 2016 blackout […]

Read More

[HackerNews] Microsoft Urges Azure Users to Update PowerShell to Patch RCE Flaw

All posts, HackerNews

Microsoft is urging Azure users to update the PowerShell command-line tool as soon as possible to protect against a critical remote code execution vulnerability impacting .NET Core. The issue, tracked as CVE-2021-26701 (CVSS score: 8.1), affects PowerShell versions 7.0 and 7.1 and have been remediated in versions 7.0.6 and 7.1.3, respectively. Windows PowerShell 5.1 isn’t impacted by the flaw. […]

Read More

[ThreatPost] Linux Variant of REvil Ransomware Targets VMware’s ESXi, NAS Devices

All posts, ThreatPost

Criminals behind the potent REvil ransomware have ported the malware to Linux for targeted attacks. Source: Read More (Threatpost)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.