Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Tuesday, 28 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Daily News Digest – 8th October 2013

by The Gurus
October 8, 2013
in Opinions & Analysis
Share on FacebookShare on Twitter

Yesterday saw the “opening” of the National Crime Agency that will centralise crime investigation and fighting, and tackle all types of misdemeanours.

The concept was originally proposed as part of the government’s Cyber Security Strategy, announced in 2011, and with this latest move it is positive that the actions are still being completed. The plan then was for a cyber crime unit within the National Crime Agency that will build on the Metropolitan Police’s eCrime Unit, giving police forces across the country the necessary skills and experience to handle cyber crimes. As you would expect, this wasn’t universally welcomed, as the Labour Party called it a rebranding exercise from the Serious Organised Crime Agency (SOCA) that was in itself, a rebrand of the National Crime Squad that was opened by Labour in the late 1990s.
According to a report in the Telegraph, just a day after its public opening the agency has collared its first criminals, nabbing four men who were apparently involved with the dark web site Silk Road. Unless the capabilities are miraculous and this work was done in the last 24 hours, I think it is safe to say that this agency has been operational for some time, well either that or the work was done by SOCA and this is a rebranding exercise!
Staying with the Silk Road, the concept of The Onion Ring (TOR) has barely been out of the headlines in the past few days and according to a report (authored by some serious names) in the Guardian, the NSA and GCHQ are both targeting the Tor network to access data of users and bypass its seemingly impenetrable security.
Details of the “access”, revealed by Prism whistleblower Edward Snowden,
reveal that the agency’s current successes against Tor relies on identifying users and then attacking vulnerable software on their computers. Though the software is primarily funded and promoted by the US government itself, you would imagine that they know of its failings and vulnerabilities already and are not just taking their chances with surveillance and keystroke monitoring tactics.
A story that broke at the end of last week was the news that software giant Adobe had suffered a second attack in a year, with 2.9 million user details accessed, but the scarier news that source code had been illegally accessed. This has led to fears that the code for some its main products is in the wrong hands and is either being repackaged as malware, or scanned for vulnerabilities which will allow for new zero-days to be discovered.
I think it is a shame for Adobe as in my experience, they have begun to do a lot of things right in the last few years. As Microsoft mark 10 years of releasing regular patches, Adobe has become a lot clearer on its patching and in conversation with chief security officer Brad Arkin three years ago, he was very concise about its reasons for updating quarterly and I feel in that time it has removed itself from the bad books of vulnerabilities in plug-ins.
Finally if vulnerabilities are your thing, then it was very interesting to read that in just a month of online beta testing, flaws were found in Internet Explorer 11. According to Threatpost, Microsoft paid out $28,000 (£17,400) in bounty payments to a small group of researchers. While none of the researchers came close to the maximum reward of $11,000, the highest payment being $9,400 to James Forshaw for four vulnerabilities discovered in IE and a bonus for finding some IE design vulnerabilities, it does show that nothing is built perfectly and maybe IE11 will be the most secure yet. Maybe.
FacebookTweetLinkedIn
ShareTweetShare
Previous Post

How do you bring Europe together on cyber security, and educate them?

Next Post

Daily news digest – 10th October 2013

Recent News

Blue Logo OUTPOST24

New Research Examines Traffers and the Business of Stolen Credentials

March 28, 2023

How to Succeed As a New Chief Information Security Officer (CISO)

March 28, 2023

The Importance of Data Security and Privacy for Individuals and Businesses in the Digital Age

March 28, 2023
penetration testing

Cymulate’s 2022 Cybersecurity Effectiveness Report reveals that organizations are leaving common attack paths exposed

March 28, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information