China reminds Apple on need to support privacy, security in its products

Apple can have access to China, as long as it protects users’ privacy, a top Chinese official told the company’s CEO last week. The head of the country’s Cyberspace Administration, Lu Wei, met with Apple’s Tim Cook on Saturday as part of a visit to the company, China’s state-run Xinhua News Agency said in a Monday report.

Huawei Partners with Black Lotus to Provide Enhanced DDoS Protection for the Global Security Service Market

BEIJING, Dec. 10, 2014 /PRNewswire/ — Huawei today signed a Memorandum of Understanding (MoU) with Black Lotus, a leading Distributed Denial of Service (DDoS) protection service provider to provide enterprises with professional and efficient anti-DDoS products and services that address the challenges of new DDoS attack types. The partnership will focus on research and development (R&D) in cyber defense technology and marketing.

Free wifi service in Vietnam unsafe, experts warn

The warning was given after Bkav Security conducted a survey from August to November 2014 in large cities where wifi is provided for free, such as Da Nang, Hai Phong, Hoi An and Ha Long. The experts pointed out that there could be three forms of attacks, including Man in the Middle (cyber attacks where a malicious actor goes between two parties & gains access to private information), Phishing (when internet fraudsters impersonate a business to trick users into giving out their personal information) and SSID Spoofing (criminals use spoofed service set identifiers (SSIDs) to lure wireless users).–experts-warn.html

Govt names new national security law watchdog, from AU

The Government has appointed a former NSW Supreme Court judge to be Australia’s new overseer of national security and terror legislation. The Coalition has been under increasing pressure to permanently fill the role of Independent National Security Monitor, which has been sitting vacant since former monitor Bret Walker came to the end of his three-year tenure in April.,govt-names-new-national-security-law-watchdog.aspx

How to protect your government mobile apps

A new report, ‘Mobile Security that Helps Enable the Business’, reveals that 60 per cent of large organisations have an enterprise-wide mobility strategy or will within the next year. Moreover, 63 per cent of respondents rated mobile apps for customers or staff as their top concern. As your agency rolls out more apps, how can you ensure that your enterprise data and citizens’ privacy are protected?

Industry Transformation, SDN, IoT and Cybersecurity to offer greatest opportunities in APAC for 2015, says Frost & Sullivan

Digital disruption is set to be the norm across industries as they look to transform to keep their business relevant amidst the ever changing technological landscape. The implementation of enabling technologies such as low cost sensors, cloud computing, advanced data analytics and mobility are expected to drive this revolution.  Key examples of industries expected to undergo IT driven transformations include Energy (Smart Grids), Media (Content Streaming) and Manufacturing (3D Printing), all of which will be influenced by the Internet of Things.–sullivan/

45 fake social networking accounts cases reported till October: Ravi Shankar Prasad

NEW DELHI: The number of fake and duplicate social networking accounts is on the rise with 45 cases being registered till October this year, Parliament was informed today.  A total number of 3, 45, 37, 41 and 45 cases of fake/duplicate accounts/profiles on various social networking websites were reported to Indian Computer Emergency Response Team (CERT-In) in the year 2010, 2011, 2012, 2013 and 2014 (till October) respectively by various law enforcement agencies, Minister for Communications and IT Ravi Shankar Prasad said in a written reply to the Lok Sabha.

India, Japan can work together on cybercrime, ICT development: Ravi Shankar Prasad

NEW DELHI: India and Japan can leverage each other’s prowess in technology to jointly work in areas like green technologies, cyber security and ICT development, Communications and IT Minister Ravi Shankar Prasad said today.  Speaking at the second meeting of the India-Japan joint working group on ICT, Prasad said the Indian government has launched a massive programme to digitalise administrative functioning with the sole objective of improving efficiency and delivery of services.

Singapore Businesses Lose Over US$1 Billion from Data Loss and Downtime Per Year, According to Global IT Study

SINGAPORE, – EMC Corporation (NYSE: EMC) today announced the findings of a new global data protection study that reveals, data loss and downtime cost Singapore enterprises US$1 billion in the last twelve months, compared to the average of US$34 billion across the Asia-Pacific and Japan region. Global data loss is up by 400% since 2012 while, surprisingly, 70% of Singapore organizations are still not fully confident in their ability to recover after a disruption.

Sony hires Mandiant to clean up after cyber attack

Sony Pictures has hired FireEye’s Mandiant forensics unit to clean up a massive cyber attack that knocked out the studio’s computer network nearly a week ago. Internal systems at the Sony division went down last Monday after displaying a red skull and the phrase “Hacked By #GOP”. Technicians are making headway in repairing damage caused by the attack and expect to have the email systems back online today, a source close to the matter said.,sony-hires-mandiant-to-clean-up-after-cyber-attack.aspx

Singapore to introduce two-factor authentication following security breach

Singapore will introduce two-factor authentication for residents to conduct online transactions with the government. The security measure will be implemented in the second half of 2015. This comes after more than 1500 accounts used to access e-government services were found to be at risk in June.

Cybercriminals target telecom firms in India, other nations with Regin

NEW DELHI: Cyber criminals are using a new malware — Regin — to penetrate and monitor GSM networks in India and other countries including Pakistan, Brazil, Germany and Russia, security researchers have said. Regin is being used to target telecom operators, governments, financial institutions, research organisations, multinational political bodies and individuals involved in advanced mathematical/cryptographical research, they said.

Industry Transformation, Software Defined Everything, the Internet of Things and Cybersecurity to offer greatest opportunities in APAC for 2015, says Frost & Sullivan

SINGAPORE, Nov. 27,2014 /PRNewswire/ –Digital disruption is set to be the norm across industries as they look to transform to keep their business relevant amidst the ever changing technological landscape. The implementation of enabling technologies such as low cost sensors, cloud computing, advanced data analytics and mobility are expected to drive this revolution.–Sullivan-3633740

ASIC to lobby Govt for metadata access, from AU

The Australian Securities and Investments Commission has expressed concern at being excluded from the initial batch of approved agencies under the Government’s mandatory data retention scheme, and has promised to apply for access within six months of the scheme’s implementation. The Government’s Telecommunications (Interception and Access) Amendment (Data Retention) Bill 2014 will allow organisations classified as “criminal law enforcement agencies” to access metadata stored for two years under the regime without a warrant.,asic-to-lobby-govt-for-metadata-access.aspx

Many organisations still fall short on cyber security: EY Malaysia study

Tax and financial consultancy EY’s annual global survey shows that Malaysian organisations are as unprepared for cyber attacks as their global peers. EY Malaysia partner, IT risk and assurance, Jason Yuen said globally more than a third of organisations (67 percent) are facing rising threats in their information security risk environment, but over a third (37 percent) have no real-time insight on cyber risks necessary to combat these threats.

Australian Govt to rethink cyber security strategy

The Australian Government will soon seek advice from industry on a proposed update to the nation’s cyber security strategy, giving in to calls to review the ageing policy in light of a vastly different technological landscape. The existing cyber security strategy [pdf] was written in 2008 and introduced by the former Labor Government in late 2009. It aimed to increase the country’s awareness of and reaction to cybercrime incidents, and ensure government and local businesses used secure and resilient IT infrastructure.,australian-govt-to-rethink-cyber-security-strategy.aspx

Holaa! A new mobile app from India identifies callers and blocks spam. It’s a challenge to TrueCaller

India is a unique market for mobile phones in more respects than one. It has a massive base of feature phone users. Large numbers of them are shifting to smartphones as more and more affordable devices – like the just launched Xiaomi Redmi Note – become available. But the ways in which Indians use their affordable smartphones is very different from those in other regions. This creates opportunities for mobile app developers to address some unique pain points.

GMO GlobalSign Joins Kantara Initiative as Internet of Everything (IoE) Demands Trusted Identities

GMO GlobalSign, the security division of Tokyo-based GMO Internet Group and a leading provider of identity services for online transactions, announced it has joined the Kantara Initiative, a business acceleration group and independent non-profit organization addressing the need for digital identity solutions to support and simplify consumers’ connected lives. A program of the IEEE Industry Standards and Technology Organization (IEEE-ISTO), the Kantara Initiative works to address the most significant technical and policy interoperability challenges facing the computing industry, including those presented by the Internet of Everything (IoE) and the estimated 50 billion “things” that will be connected to the Internet by 2020(1).

Exclusive: Malaysia to pilot new mobile device policy

The Malaysian government is drafting a new policy to better protect information being accessed by officials through their mobile devices, the Government Chief Information Officer has told FutureGov. “The new policy will be about protecting information, regardless of what channel or endpoint device is accessing the information,” said Dr. Suhazimah Dzazali. It will tier access to information, acknowledging that access from both government and personal devices are likely.

Infosys BPO removes CFO Abraham Mathews for violating code of conduct

BENGALURU: The CEO and finance chief of Infosys BPO have left the company after the parent discovered what it termed as failure to comply with its “code of conduct”, the first such incident at India’s second-largest software firm.  Infosys, widely respected for its transparency and corporate governance standards, appointed veteran executive Anup Uppadhayay as new CEO replacing Gautam Thakkar who resigned on “moral grounds”.