The number of fingerprint sensor suppliers has risen to above 40 companies, intensifying competition in the market, according to sources at Taiwan-based IC design firms. A price war will likely be triggered in 2015 and bring pressure on less-competitive players, which may be squeezed out of the market as early as the third quarter, the sources indicated.
BEIJING: Huawei, the Chinese communication company accused by the United States Congress of posing a security risk, said on Tuesday (Jan 13) it needed to learn from the “great country” as it tries to grow its US business. Washington has long seen Huawei as a security threat due to perceived close links to the Chinese government, which it denies, while the United States and Australia have barred it from involvement in broadband projects over espionage fears. Huawei denies such allegations vigorously.
Australian and New Zealand businesses and individuals are being targeted by extortionists using a new strain of ransomware, Deakin University researchers working with security vendor TrendMicro have discovered. Called TorrentLocker, the malware is spread by social engineering emails with penalty notices that ask users to visit bogus Australia Post and NSW Office of State Revenue websites for payment.
Palo Alto Networks has advised Australian government agencies to evolve their IT networks in the wake of the Islamic State hijacking The US Central Command Twitter site. The hackers put a black-and-white banner with the image of a hooded fighter and the words “CyberCaliphate” and “I love you ISIS” in place of the usual Central Command Twitter banner. The warning follows the Australian Communications and Media Authority’s (ACMA) online alert advising Australians to be cautious about opening any emails received that refer to an ISIS threat.
NEC Corporation launched a solution this week that offers comprehensive protection of confidential information and could help government agencies and organizations defend against cyber attacks. The new “File Security Solution” protects files by encryption from the time of their creation to the time of their deletion, thereby preventing unauthorized individuals from viewing a file’s content.
Internet security was one of the biggest stories of 2014. The year ended with a bang as hackers leaked an astonishing amount of confidential data from Sony Pictures, implicating executives and celebrities, and creating a media firestorm. It’s a stunning embarrassment for the company, and a wake-up call for other firms to shore up their defenses. With hackers on the prowl, internet security companies stand to benefit. That’s the case for Banff Cyber Technologies, a Singapore-based startup which focuses on mitigating the damage caused by cyberattacks.
NEW DELHI: Rising at an alarming rate, the number of cyber crimes in the country may double to 3 lakh in 2015 and could pose serious economic and national security challenges, an Assocham-Mahindra SSG study has warned. The increasing use of smartphones and tablets for online banking and other financial transactions have increased risks.
Another batch of internal documents from the operator of South Korea’s nuclear power plants leaked to the Internet Tuesday. The leaks are a “serious situation” and a matter of national security, President Park Geun-hye said during a cabinet meeting. In a message posted at 3 p.m. Korea Time under Twitter ID @John_kdfifj1029, the anonymous attacker warned Korean citizens to stay away from nuclear reactors, and mocked a cybersecurity drill organized Monday by Korea Hydro and Nuclear Power Co., the power plant operator.
NEW DELHI: Hacking, publication of obscene contents, credit card and banking frauds among other cyber crimes have registered an annual increase of more than 40 per cent in the country in the past two years. According to Home Ministry statistics, as many as 71,780 cyber frauds were reported in 2013, while 22,060 such cases were reported in 2012. There have been 62,189 incidents of cyber frauds till June this year.
People across Asia Pacific are working in new ways, at varying times and from different locations. They can work from home or semi-permanent locations including project sites, customer event sites or even on-the-go. The era of connectivity and technological speed has improved internal and external collaboration while enhancing employee engagement within and between organizations that transcends geographies.
This is only a portion of the more than 12 million devices suffering from vulnerability as reported by Checkpoint. The hole lies in the RomPager web server, developed by AllegroSoft, often embedded in firmware for routers, modems and gateway devices of most of the leading manufacturers in the world. The HTTP server provides a friendly web-based interface for users to configure the devices.
China is planning to rate the trustworthiness of cloud computing vendors, allowing only those with full security clearance to partake in government projects. The move could leave foreign companies out of government procurement contracts, according to a report by China Daily. Zuo Xiaodong, vice-president of industry group China Information Security Research Institute, said: “The basic idea of the security rating mechanism is to find trustworthy hardware, software, and service providers to ensure the government has total control of the entire ecosystem.”
Coolpad, the world’s sixth largest smartphone manufacturer, installed a back door that allows the company to install applications, send alerts, and monitor communications without user knowledge or approval. According to Palo Alto Networks, which discovered the security flaw, the “CoolReaper” backdoor has been found on 24 Coolpad phone models sold in China, adding up to over 10 million devices.
SEOUL: South Korea’s nuclear operator and the energy ministry will keep emergency teams on stand-by to the end of this year in case of any cyber attacks on nuclear plants as threatened by a hacker. Korea Hydro & Nuclear Power, part of state-run utility Korea Electric Power Corp, said that its computer systems had been hacked but only non-critical data had been stolen, and operations were not at risk.
Australia and Malaysia are the best prepared to tackle cyber security issues in Asia Pacific, according to the Global Cyber Security Index published by the International Telecommunication Union (ITU) and ABI Research last week. Both Australia and Malaysia ranked third globally, in the survey spanning 193 countries. Countries were judged on legal and technical capabilities, strength of institutions, availability of resources, and cooperation between countries and within governments.
Apple can have access to China, as long as it protects users’ privacy, a top Chinese official told the company’s CEO last week. The head of the country’s Cyberspace Administration, Lu Wei, met with Apple’s Tim Cook on Saturday as part of a visit to the company, China’s state-run Xinhua News Agency said in a Monday report.
BEIJING, Dec. 10, 2014 /PRNewswire/ — Huawei today signed a Memorandum of Understanding (MoU) with Black Lotus, a leading Distributed Denial of Service (DDoS) protection service provider to provide enterprises with professional and efficient anti-DDoS products and services that address the challenges of new DDoS attack types. The partnership will focus on research and development (R&D) in cyber defense technology and marketing.
The warning was given after Bkav Security conducted a survey from August to November 2014 in large cities where wifi is provided for free, such as Da Nang, Hai Phong, Hoi An and Ha Long. The experts pointed out that there could be three forms of attacks, including Man in the Middle (cyber attacks where a malicious actor goes between two parties & gains access to private information), Phishing (when internet fraudsters impersonate a business to trick users into giving out their personal information) and SSID Spoofing (criminals use spoofed service set identifiers (SSIDs) to lure wireless users).
The Government has appointed a former NSW Supreme Court judge to be Australia’s new overseer of national security and terror legislation. The Coalition has been under increasing pressure to permanently fill the role of Independent National Security Monitor, which has been sitting vacant since former monitor Bret Walker came to the end of his three-year tenure in April.
A new report, ‘Mobile Security that Helps Enable the Business’, reveals that 60 per cent of large organisations have an enterprise-wide mobility strategy or will within the next year. Moreover, 63 per cent of respondents rated mobile apps for customers or staff as their top concern. As your agency rolls out more apps, how can you ensure that your enterprise data and citizens’ privacy are protected?