Skip to main content

Posts

Showing posts with the label cybersecurity

US Government Attempts to Force Facebook Into Building a Backdoor in Facebook Chat

Recently, in a shocking revelation, it has come to light that the FBI has allegedly tried to coax Facebook into providing a backdoor to its chat engine, Facebook chat. The request has been reportedly turned down by FaceBook, in a coveted court proceeding. If Facebook had succumbed to the pressure and decrypted the messages, it would have marred the rights of American citizens, which includes the right to privacy. According to reports, the FBI had been investigating the MS-13 Gang and had sought Facebook’s co-operation in the matter. This took another dimension when the authorities tried to hold the Social Media Titan to be in contempt of court for refusing to oblige to “the request”. For further clarity on the matter, the American Civil Liberties Union (ACLU) has requested for the unsealing of the court documents for the benefit of the public at large. According to ACLU, the right to privacy of the American citizens was endangered by this act and therefore calls for an answer

Australia Now Has an Encryption Bill, Labor Party Drops Suggestions

On Thursday, the Australian Parliament unanimously passed the most controversial Bill of the year, The Access and Assistance Bill, 2018, better known as The Encryption Bill. It may be recollected that the Australian President had put forth his request for ‘The Access and Assistance Bill, 2018’ to be considered by the Australian Parliament before it dissolved for the year. Meanwhile, the Labour Party had strongly opposed this Bill and put forward several recommendations, which it later dropped, allowing the Australian Parliament to pass the Bill. Need for this Bill This Bill was accorded prime importance by several Australian Authorities since it would help curb terrorism and other criminal activities by enabling the law enforcement agencies to access the communication of suspects. The Encryption Bill requires the IT companies to provide the law enforcement agencies with the necessary access.  This is likely to help curb terrorism and keep a tab on several other criminal act

Huawei CFO Arrested in Canada

Meng Wangzhou, Chief Financial Officer (CFO) of the world’s second largest Telecom giant Huawei, and the daughter of its Founder RenZhengfei was recently arrested in Vancouver, Canada and extradited to the US. Geng Shuang, a spokesman for China’s Foreign Ministry, demanded the immediate release of Miss Meng Wangzhou. The Spokesperson said  “To detain someonewithout giving clear reason is an obvious violation of Human Rights” Meanwhile, the US President Donald Trump and the Chinese President Xi Jinping were in the middle of a friendly rendezvous at The White House. Although the Justice Department had kept The White House in the loop about the extradition of Miss Meng Wangzhou, Mr.Trump was reportedly unaware of it. The Arrest While the two Presidents toasted, the Chinese company’s CFO was changing planes in Vancouver, where she was arrested, only to be deported to the US on charges of violating United States’ and Iran’s trade sanctions. The Publication Ban Miss Meng

Vidar and Gandcrab Malware Combined To Create An Even Greater Threat to Users

Many users could now be a victim of a two-fold cyber attack, one that combines the malicious abilities of Vidar with Gandcrab. This latest malvertising attack is designed to steal private and confidential data and then encrypt the victim system. After that, all that a victim sees is a ransom note, which flashes on the system, asking for the booty to be paid in Bitcoin or Dash. What does Vidar do? No, Vidar is not ‘The Silent One’ from Ragnarok, but an aptly named malware which the threat actors use to steal a victim’s confidential data. Vidar is a sly malware, designed to steal data from the browser, it doesn’t matter which one you are using, even the Tor browser can be vulnerable. After stealing the victims data, the operators attempt to steal money or cryptocurrency, then Gandcrab will take over. A victim is left without much evidence and only with the direction to pay more to retrieve the already compromised data on their systems. The Attack Those who are into online