Tag Archive for: securing

A Wake-Up Call for Securing Remote Employees’ Hardware


Update: Multiple U.S. and international government agencies released an advisory Feb. 7 detailing the Volt Typhoon attacks. The threat actors targeted and compromised the IT environments of U.S. communications, energy, transportation and water infrastructure in the continental U.S. as well as non-continental areas and territories, such as Guam.

Original article: State-sponsored hackers affiliated with China have targeted small office/home office routers in the U.S. in a wide-ranging botnet attack, Federal Bureau of Investigation Director Christopher Wray announced on Wednesday, Jan. 31. Most of the affected routers were manufactured by Cisco and NetGear and had reached end-of-life status.

Department of Justice investigators said on Jan. 31, 2024, that the malware has been deleted from affected routers. The investigators also cut the routers off from other devices used in the botnet.

IT teams need to know how to reduce cybersecurity risks that could stem from remote workers using outdated technology.

What is the Volt Typhoon botnet attack?

The cybersecurity threat in this case is a botnet created by Volt Typhoon, a group of attackers sponsored by the Chinese government.

Starting in May 2023, the FBI looked into a cyberattack campaign against critical infrastructure organizations. On Jan. 31, 2024, the FBI revealed that an investigation into the same group of threat actors in December 2023 showed attackers sponsored by the government of China had created a botnet using hundreds of privately-owned routers across the U.S.

The attack was an attempt to create inroads into “communications, energy, transportation, and water sectors” in order to disrupt critical U.S. functions in the event of conflict between the countries, said Wray in the press release.

SEE: Multiple security companies and U.S. agencies have their eyes on Androxgh0st, a botnet targeting cloud credentials. (TechRepublic) 

The attackers used a “living off the land” technique to blend in with the normal operation of the affected devices.

The FBI is contacting anyone whose equipment was affected by this specific attack. It hasn’t been confirmed whether…

Source…

Securing Android in 2024: An 8-Step Security Checklist


Securing Android in 2024: An 8-Step Security Checklist

In an age where our digital identities are as real as our physical selves, safeguarding our personal information has become crucial. As we enter 2024, Android users are faced with the challenge of not only enjoying the vast capabilities of their devices but also ensuring their security in an increasingly hostile digital landscape. This article presents an 8-step security checklist designed to help you bolster the safety of your Android device.

Staying Ahead in the Security Race

Every technology user is part of an ongoing security race. On one side are the tech giants like Google, Microsoft, and Apple, tirelessly patching up vulnerabilities in their systems. In December 2023, Google addressed nearly 100 security issues in Android, including two critical flaws in the Framework. Microsoft patched over 30 vulnerabilities, including several risks of remote code execution. On the other side are potential attackers, always on the lookout for new ways to exploit these systems.

Armed with Awareness: Your Personal Security Checklist

To stay one step ahead, here is an 8-step security checklist for Android users:

1. Update Your OS: Keep your Android operating system up-to-date with the latest security patches. This move can protect your device against new threats and vulnerabilities.

2. Trust Your Sources: Install apps only from trusted sources like the Google Play Store to fend off malicious software.

3. Be Unique: Use strong, unique passwords for device access and online accounts. A password manager can help manage these securely.

4. Double Up on Security: Activate two-factor authentication (2FA) wherever possible. It adds an extra layer of security, making it harder for unauthorized individuals to gain access to your accounts.

5. Review Permissions: Regularly review app permissions to ensure apps only have access to necessary data. Minimize privacy risks by limiting what personal data each app can access.

6. Back It Up: Keep a backup of important data in a secure location. This way, you can recover your data even if your device is stolen or damaged.

7. Add Extra Protection: Install a reputable security app for additional…

Source…

Multilateral cooperation is key to success in securing nations from emerging cyber security threats, says Amit Shah


Union Home Minister Amit Shah on Thursday raised concern regarding terrorists using the dark net to hide their identity and spread radical material, and find solutions by understanding the pattern of these activities.

Addressing the inaugural session of the ‘G 20 Conference on Crime and Security in the Age of NFTs, AI & Metaverse’, the home minister said that India has taken giant strides in empowering digital security systems.

“The conference will play a transformative role in building a global cooperation network to strengthen the capabilities of nations and international organizations to combat cyber threats, including terrorism, terror financing, radicalization, narco-terror, and misinformation in an effective way,” he added.

The brainstorming in this congregation will help all the participant nations to achieve remarkable feats in security, he said.

The minister also warned of cyber-attack threat which he said is hovering over all the major economies of the world and “many countries of the world have become victims of it”.

To create a “robust and efficient operational system”, Shah said, “Terrorists are using the dark net to hide their identity and spread radical material, and we have to understand the pattern of these activities running on the dark net and find solutions for the same.”

The Home Minister also specified the need to think coherently to crack down on the use of various virtual assets.

Speaking at the G20 Conference on Crime and Security in the age of the Non-Fungible Token (NFT), Artificial Intelligence (Al) and Metaverse’, Shah further said “The Metaverse, once a science fiction idea, has now stepped into the real world.”

He said the metaverse may create new opportunities for terrorist organizations primarily for propaganda, recruitment, and training.

“This will make it easier for terrorist organizations to select and target…

Source…

7 Aerospace and Defense Leaders: Leading the Skies and Securing the Nation


Aerospace and defense leaders are indispensable in bolstering national security and safeguarding the well-being of United States citizens. They are at the forefront of supplying cutting-edge equipment, advanced weaponry, and sophisticated systems to maintain aerial supremacy and assert dominance in the face of imminent threats. Their unwavering commitment to innovation and expertise empowers the nation’s military forces and reinforces the defense capabilities of one of the world’s foremost military powers.

Let’s delve into the profiles of seven exceptional individuals who have emerged as vanguards in these critical industries. Learn about their remarkable contributions, groundbreaking achievements, and the indelible impact they have made in leading the skies and securing the nation.

1. John Albers, President & Chief Executive Officer at Albers Aerospace

John Albers, President & Chief Executive Officer at Albers Aerospace; aerospace and defense leaders

Photo from Albers Aerospace Official Website

John Albers is an accomplished industry veteran with over two decades of senior leadership and operational experience in the aerospace and defense markets. He serves as the President and Chief Executive Officer at Albers Aerospace.

Before serving in private aerospace and defense sectors, Albers has been with the military for most of his career. He served in increasing responsibilities for different U.S. Navy and Marine Corps divisions. Ultimately, he retired in July 2014 as the military team leads for the CH-53K PM program of the Marine Corps.

After serving in the military, he was assigned the Senior Manager position in Systems Engineering at Raytheon and Business Development Executive at Camtech LLC. In 2014, he assumed the responsibility of President and Chief Executive Officer at Albers Aerospace.

Albers Aerospace’s President & Chief Executive Officer Roles and Responsibilities

As the President and Chief Executive Officer at Albers Aerospace, John Albers leads the company’s portfolio for three business units: (1) manufacturing; (2) engineering, aviation, and MRO (maintenance, repair, and operations); and (3) innovative technologies. He’s also the company’s founder and majority owner.

About Albers Aerospace

Albers Aerospace offers broad capabilities and solutions…

Source…