Vimarsana.com

Latest Breaking News On - Security loopholes - Page 1 : vimarsana.com

Transcripts For DW Made In Germany 20190410 15:30:00

think the roof's. whitfield and stephanie strong. party in chat with musicians from around the world. make grooves every week. now these guys might try to look scary but honestly they're so nine hundred ninety today's criminals don't need massed stroll bars or guns to get their hands on your cash the requirements for brazen burglars nowadays include a computer a solid wife i connection and preferably some coding skills welcome to made where our topic this week is cyber crime a first report takes us to the philippines where a ring of online fraudsters was busted last year and a massive operation the perpetrators exploited people's hopes dreams and greed and sweet talk them into handing over shoot sums of cash. on june sixth twenty eighteen a special police unit raided a call center near manila and detained almost five hundred people working there. the outfit was allegedly involved in a scam that cost unwitting people around the world hundreds of millions of dollars . they'd all received a phone call campaign where you get. a small amount of the from. the other. an elevator or the brick wall they get. there. and that is that the whole make model. a former member of staff turned whistleblower and told the philippine national police and the cyber crime group how the scheme operated. the police then spent months gathering evidence before moving in and shutting the operation down. they money for people who are showing interest to invest so they receive emails that if they want the best they can they they can provide assistance such first day we offer. minimum of two hundred fifty dollars us dollars us as the start of the investment they will see their money growing from day to day and when they show interest on investing more does the find that they will for that's. the people accused of running the scam come from israel and twenty sixteen they set up the call center in the philippines called marketing the operators allegedly persuaded elderly people in south africa new zealand and australia to invest in nonexistent assets and in the process gained access to their bank details money from the scam ended up in a bank account in denmark none of it has been returned. in a moment it took time for some of the cole center operators to realise they were involved in a scheme to rip people off. but i mean that in order reselling it we weren't selling anything that. the agents were selling dreams that's what the company said. we were supposed to encourage clients to make a deposit to invest. in manila alone around five thousand cyber crimes are reported to the police every year. it's hard for even the specialist unit to keep up with what the scammers are doing their tricks are evolving all the time. so it's really a difficult case not only this case but most of most of the cyber crime cases it's something new from the law enforcement do to the judge just the to the prosecutors it's something new. according to one estimate and twenty seventeen close to a billion people worldwide were cheated out of around one hundred forty six billion europe's common tricks include stealing passwords by means of phishing emails setting up fake online investment platforms where potential targets leave their names and phone numbers direct tacking into computers and networks and online romance scams which in the u.s. cost victims some one hundred twenty seven million euros last year the thing is are you buying into the right people are you investing to the right people are you investing for the right company is or the company you're only having your concessions on like you don't see these people you don't see them in person you don't know where they are that's the characteristic of. you know. so i think it's the reason why there's a lot of big names of cyber crime in investment. the dark depths of the internet that's for cyber criminals usually hide sometimes they break into your computer directly that requires a fair bit of know how and that's where the hacker comes that the stereotype is the skilled computer whiz kid for whom a fire wall is just another hurdle to hop over but who are hackers really and what motivates them we broke it down for you take a look. hackers are they good or bad in one thousand nine hundred two in the us a group of six teenagers calling themselves the four one force broke into some of the country's classified computer systems including one that a nuclear weapons research lab. public was alarmed the f.b.i. investigators and the perpetrators were identified. some of them went on trial for the intrusions and the term hacking began to be associated with crime. but hackers are not all inherently bad the computer security scene differentiates between good hackers and bad ones white hats have a legitimate agenda for instance they look for security flaws in computer systems to reveal all correct them. gray hat hackers haven't quite made their minds up they search for vulnerabilities and systems and occasionally exploit them. the black cats are bad they're often motivated by greed to damage computer systems or steal data. like in the two thousand and eight cyber attack on one of the world's biggest payment processors the hackers in that case wrote their own software smuggled it into the payment firm's computer system and made off with up to one hundred thirty million credit card numbers. but distinguishing the color of a hackers hat isn't always easy when it comes to hacking what's right and what's legal is not always clear cut. sometimes illegal behavior can end up revealing other illegal behavior. a good example of this is the panama paper scandal in it gray hat hackers accessed millions of documents illegally then they used them to expose tax evasion and fraud by well known and influential people. back in one thousand nine hundred two with the four one for hacking was in its infancy now it's become a massive it's you in a digital networked world. and in a virtual world just as in the real one the dividing line between good and bad sometimes very hard to define. now when companies get hacked it can cost them dearly not only if sensitive data gets stolen but also because huge amounts of share value can be wiped out estimates say that the global cost of cyber crime related incidents currently amounts to some five trillion euros a year access to sensitive corporate information can occur through spongy fire walls or outdated operating systems however more often than not it's employees and they're easy to remember twelve thirty four fifty six password that provide a crucial gateway. the weakest link in every computer system is the people that work with it. and employees are much easier to trick them technology they can help you break through a company's security shield nearly hard for all hacking cases are linked to mistakes made by employees. in most books spoof emails are a classic where hackers pose of someone else or leaving a u.s.b. stick lying around that someone sticks in a company computer or a compressed p.d.f. file sent in an email disguised as a drawback occasion it gets printed on the back against control of the printer to. try as an employee can become a gateway to my employer's network. unlocking peyton's and business ideas hacking is big business bigger than ever in fact computer security for mcafee as the maids it may have amounted to six hundred billion dollars in damages last year that figure includes companies liability risk and damage to their reputation my passwords and no match for cyber criminals. a leopard is passionate about online security back in the nine hundred ninety s. he kept stumbling on the data of unsuspecting users who didn't take enough care so he went into business advising firms on how to protect their data. it's like taking all the money out of your company's bank account and piling up the cash in the yard for all to see it's basically the same thing everything's at stake because no company today works without computers and phones and you and cyber attacks can be costly last month alone million giant norsk hydro was attacked its share price plummeted wiping forty million dollars off the company's value hotel chain marriott also had it systems breached exposing the data of millions of guests including credit card details and passport numbers. paper can even rarely hear about the most spectacular cyber attacks because they're spectacularly good ideally the victim will never even know about it that's the mark of a successful hacking so you don't read much about it in the media from in. one's head cars are in they have two key objectives industrial espionage aimed at quietly stealing as much information as possible without being noticed or extortion malware is used to shut down an entire system which can be reactivated only in exchange for money refused to pay up and you lose your data that's what aims to prevent materials kozlovsky is a member of his team and his best headcount today he's testing corney coming alters cloud services on behalf of the company if hackers were able to break into the cloud they could quickly access sensitive documents and customer data. to first we analyze their web site. we want to test out all the standard weak points. and i can then use those results to find other errors or security loopholes that could be used to carry out further attacks on the system. kuntar. corney coming alters i t security chief of staff are now wants to acquire additional external security for the company and that's needed. we have tens of thousands of attacks every day some of them dangerous so far we've averted the more and we want to keep it that way. so is the firm's clout foolproof after all. we found nothing that could have been directly exploited. the biggest risk here too is posed by the employee news. and that's not our social engineering is skyrocketing with hackers seeking to. see the employees in suits divulging their passwords so they can penetrate the system and with him on something. this kind of social engineering or human hacking works well in the age of social media where we all tend to give away more information and we should. once we've been hacked we become accessories whether we like it or not. now as we've learned there are the black hats who do a shady business at the white hats who might use their skills by working for an i.t. company or for the government like for germany's foreign intelligence service for example where master hackers are urgently needed a license to hack that's how the agency is trying to recruit a new generation of computer whizzes but seeing that young hackers usually don't have the most approving attitude towards the concept of nation states and governments who would have a resume here well we found one hacker that was willing to talk. spending hours days weeks trying to get into a system and getting nowhere can be very frustrating but when you finally succeed it's an amazing kick. interviewing lucas is an amazing kick for me to look at this isn't his real name and we can show his face the work he does is highly sensitive. he works in cyber espionage at germany's foreign intelligence agency the b.m.d. but no one is supposed to know that. we hardly allowed to film anything including handing in our cellphones and passing through a number of security checks. we need lucas in a distant corner of the building the press box person and the safety officer i present throughout the entire interview. what exactly do you do you know obviously i can't go into detail about what exactly it is i do basically i'm a hacker that i intrude into i t. systems to gain information that it's true that the typical cases involve figuring out what's happening abroad. you might want to know what's going on in country x. or y. . for example you want to find out about weapons and defense technology somewhere organized crime or of course terrorism these are all areas in which there's a serious demand for hacking. he makes this sound very normal lucas is about thirty that says much as he's willing to say. hacking skills by himself and sent it on spec application to the b. indeed a few years ago. now he has a job he can't tell anyone anything about. i usually tell people i have an office job in i.t. and then people usually don't bother asking any more questions it sounds like all i do is install printers and so on and no one's interested in that. so you know. the b.m.d. is an urgent need of people like lucas and i t experts with an unconventional approach. a glossy p.r. campaign is designed to improve its image and the service is deliberately targeting job fairs and university students the trouble is potential candidates know their skills are in demand and that they can earn more in the private sector. at first glance that is at a competitive disadvantage we do try to be an attractive employer. that is what the spokesperson says what does lucas say. i get to do things that aren't legal in the outside world i also get to feel i've done something useful my contribution ends up in a report and makes a difference that it's not just the standard security tests that companies carry out. but actually has consequences in terms of foreign policy. which are consequent i enjoy that out and it's worth getting paid less for a low in fact the pay is pretty decent. look at can't imagine working anywhere else he's a civil servant so doesn't need to worry about getting fired but anonymity is everything. a few people know what i do know my immediate family and some close friends know it too. but in general the responses ok you work for the foreign intelligence agency this time obviously you can talk about it and that's it. sharing nothing of my life i'm not sure that would work for me it's not talking about your work when you get home can be hard but i knew what i was letting myself in for. but doesn't make it any easier but i can live with it. and i'm good friends with two or three of my colleagues so if i really need to i can always drop by their offices and let off some steam scots. it must be strange leading a double life knowing things the general public will never be aware of i feel like i got a sense of what it's probably like but have i learnt anything not really the india is a secret service is very good at making sure that what it does stay secret. many of us have gotten used to digital solutions to our real world problems missing the right shoes to outfit order them on amazon don't want to bike to work in the rain just open your car sharing up well our next report is also about finding digital support but for a serious situation despite recent pushes for empowerment women in india still face a great deal of harassment and abuse in dark alleys villages. and entrepreneurs hope sir found a way to help. there was more. i did boy very very and i'll get him to get out from a life. it was the one kind of clothes. these women a speaking out about a subject that's often brushed out of sight india is one of the world's most dangerous countries for women. elza marie desilva knows how it feels for years she didn't like going on business trips by herself. when she was fourteen a stranger groped her on a train. sexual harassment and assault are part of everyday life a many girls and women in india. in twenty twelve a brutal gang rape on a bus in delhi shocked the nation and triggered protests suddenly the vast problem of sexual violence took center stage. to silver discovered that there was no reliable data on the extent of the problem she resolved to change that and to devote herself to helping women she gave up her business career to do so. school for social entrepreneurship in berlin she wanted to meet to silva and learn about her organization before i started doing this work i have not shared my story and once i started doing this i said to myself if i'm expecting some. story then i should be ready and i think that's also what you want to achieve on the big scale with your organization. the power to what has happened and through share their stories absolutely because you know we are talking about young girls who feel they can achieve anything and. you know they don't see the differences between them and the boy but as they are growing up you know society put those. you. go out in the night except. fear can constrain women's lives parents keep their daughters at home men don't want their wives to take public transport to work professional opportunities amassed this is the kind of thing aims to combat with the online platform she established safe city it crowd sources personal stories of sexual harassment and abuse and aggregates the data on a map it works worldwide but has so far called sean in about fifty cities not only in india but also in kenya cameroon and then pull for example. the aim is to raise the pressure on authorities to take action as well as to encourage girls and women to speak out and stand up for their rights. i did open the doors did happen to me. did not mean. it never. and you still always be. no matter how much it haunts me. no matter how. good i am even now. i still have the guts to face the world and tell them that this happened to me and yet be unfazed because now we know it was not very forward. these young women are really confident because the big can stand up for themselves then nor their rights it makes me feel really proud that i've been part of creating the space for dialogue on this issue and bringing confidence to these women so that they don't feel afraid to access their rights or access opportunities and these young women are going to change the world because of their confidence. india has a long tradition of wrestling one of many activities reserved for men throughout the century but according to. society is slowly changing many younger people simply do not accept the constraints women have to endure it's normal that. it's a new normal. money and for other young engineers have developed a device worn on a respond that transmits location details to emergency contacts and also records. that start up has won prizes for the device which is called safe approach for the team has secured funding and is now manufacturing it. first this as soon as you put it it gives me a friends and family people ok. one major problem really know what though. the sport. has a lot of safety security got these three thousand companies and they've got it. and there are seven million people employed in that so that's made up everything they do where we are building a sporting goods their group of people who can actually come in and see people out . he says the police alone cannot guarantee women's safety he wants to set up a platform to transform the security market first in india then worldwide this illusion that tech they are crucial intelligent and. i think however we can let's use those technologies to create influence and change at a level where we can but let's not think that those are the only solutions we also have to think about other ways much more grassroots ways of how we can change mindsets too and violence against women. changing attitudes is also central to elsa married to silver's agenda also need to ploys high tech to make city safer for women she also wants to empower women at home because danger does not only lurk in public spaces most finance against women occurs within that families. so new technology can not only be used to clean our bank accounts it's also there to help and support people around the world and that's a positive note on which to end this edition of made for me and the entire team here thanks for watching. the be. the be. the be. subject. to the be. small cuts in smaller the changing the people making it possible to go to africa. fantastic right. as they set out to save the environment. that i learned from one another the book and work together for the butcher. cooking up for. w. . and. i think it's everything first i'm a muslim. school much different culture between here and the. so challenging for everything. from the syllabus i think it was worth it for me to come to germany. shop and got my license to work as a swimming instructor here to share knowledge to children nothing to it's just one of us to just assume. that's your story take part share it on info migrants dot this. this is a fifteen year old girl. being gang raped. this teacher is beating a boy for talking back and class. for the rest of the class once as. i'm sure a toddler is being hit by his mother. breaking up lots. of child sleeps in the streets because her family through her. fear. online bullying. pushes a teenager over the edge. just because you can see violence against children doesn't mean it isn't there make the invisible visible of us might violence against children disappear.

People
Operation
Us-
Perpetrators
Greed
Fraudsters
Ring
Hopes
Philippines
Near-manila
Cash
Shoot

Google Kubernetes Clusters Suffer Widespread Exposure to External Attackers

Misunderstanding the permissions of an authentication group in Google Kubernetes Engine (GKE) opens millions of containers to anyone with a Google account.

Google
Amazon-web-services
Orca-research-pod
Google-kubernetes-engine
Orca-security
Security-loopholes
Google-cloud

– Setting rules for cybersecurity. The Regulations on the Security and Protection of Computer Information Systems was released in 1994, designed to safeguard and supervise computer information system security.

Kazakhstan
Qinglang
Hunan
China
Kyrgyzstan
Shanghai
United-kingdom
Uzbekistan
Brazil
Cuba
Beijing
United-arab-emirates

Transcripts for BBCNEWS BBC World News 20240604 04:11:00

let's get some of the day's other news. steve bannon, donald trump's former strategist, says he's now willing to testify to the select committee investigating the january 6th riots. he's previously insisted he was protected by executive privilege. bannon was due to go on trial next week charged with criminal contempt for refusing to cooperate. japan's chief cabinet secretary says he expects security loopholes in the killing of former prime minister shinzo abe to be discussed and investigated. he says the government has received a report suggesting there was a problem with the security guard system. mr abe was shot dead on friday while speaking at a political campaign rally. two children of angola's former president eduardo dos santos have refused to have their father's funeral in angola. the 79—year—old, who died in spain on friday, saw his reputation undermined after he left office by allegations of corruption. his son has beenjailed and the assets of his daughter, isabel, have been frozen.

Some
Steve-bannon
January-6th-riots
News
Criminal-contempt
Committee
Executive-privilege
Trial
Donald-trump
6
January-6th
Government

Transcripts for CNN CNN Newsroom Live 20220130 09:42:00

full prescription-strength? reduces inflammation? thank the gods. don't thank them too soon. kick pain in the aspercreme. china is requiring that anyone attending the upcoming winter olympics download a smartphone app. it's called my 2022. beijing says it's meant to monitor people's health and help prevent the spread of covid, but it's raising concern among several security experts and athletes attending to plan the games. citizen lab is a cybersecurity watchdog group. earlier this month, it reported finding that the app had several flaws linked to weak encryption technology. now chinese olympic officials say that the app's latest version has patched several of those security gaps. >> reporter: in fact, the security loopholes have already

Don-t
Inflammation
Kick-pain
Strength
Gods
Aspercreme-arthritis
Chinese
Smartphone-app
Anyone
Winter-olympics
2022-beijing
2022

Alibaba Cloud in trouble with Beijing for Log4J annoucement

Alibaba Cloud in trouble with Beijing for Log4J annoucement
theregister.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from theregister.com Daily Mail and Mail on Sunday newspapers.

China
Beijing
Chinese
Talosand-cloudflare
Cisco-talos
Chen-zhaojunfor
Apache-software-foundation
Apache-foundation
Apache-foundation-on
Information-technology
China-ministry-of-industry
Provisions-on-security-loopholes-of-network-products

Sicherheitsproblem: Router wird mit anfälliger Firmware ausgeliefert

Sicherheitsproblem: Router wird mit anfälliger Firmware ausgeliefert
winfuture.de - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from winfuture.de Daily Mail and Mail on Sunday newspapers.

Germany
Wifispot-wlan
Router-firmware-over
Security-loopholes
Online-magazins-betanews
Risk-of-exposure
July-tp-link-has-been
Sitzungs-token-will
Protocols-are

Sicherheitsupdates: Root-Kernel-Lücke bedroht IBMs Betriebssystem AIX

Sicherheitsupdates: Root-Kernel-Lücke bedroht IBMs Betriebssystem AIX
heise.de - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from heise.de Daily Mail and Mail on Sunday newspapers.

Versions-of-the-developers
Ibms-operating
Ibms-aix-operating-system
Security-loopholes

Cybersicherheit: FDP legt Verfassungsbeschwerde gegen Staatstrojaner ein

Cybersicherheit: FDP legt Verfassungsbeschwerde gegen Staatstrojaner ein
msn.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from msn.com Daily Mail and Mail on Sunday newspapers.

Germany
Karlsruhe
Baden-wüberg
German
Computers-of-citizens
Constitutional-court
Fdp-sets
Thursdays-complaint
Constitutional-court-in-karlsruhe
Security-loopholes
Social-democratic

vimarsana © 2020. All Rights Reserved.