Twitter Blocks Intelligence Agencies
May 17, 2016 by admin
Filed under Around The Net
Comments Off on Twitter Blocks Intelligence Agencies
Twitter has prohibited a data-mining firm from providing analytics of real-time tweets to U.S. intelligence agencies, according to a Wall Street Journal report, quoting a person familiar with the matter.
Twitter, which provides Dataminr with real-time access to public tweets, seems to be trying to distance itself from appearing to aid government surveillance, a controversial issue after former National Security Agency contractor Edward Snowden revealed that the government was collecting information on users through Internet and telecommunications companies.
Executives of Dataminr told intelligence agencies recently that Twitter, which holds around 5 percent of the equity in the startup and provides the data feed, did not want the company to continue providing the service to the agencies.
Twitter’s move appears to be in line with its policy on the use of its tweet data by external companies.
“Dataminr uses public Tweets to sell breaking news alerts to companies such as Wall Street Journal parent Dow Jones and government agencies such as the World Health Organization, for non-surveillance purposes,” Twitter said in a statement Sunday. “We have never authorized Dataminr or any third party to sell data to a government or intelligence agency for surveillance purposes.”
U.S. intelligence agencies gained access to Dataminr’s service after In-Q-Tel, aventure capital organization backed by U.S. intelligence agencies, put money in the firm, the WSJ said, quoting a person familiar with the matter. Twitter is said to have conveyed to Dataminr that it didn’t want to continue the relationship with intelligence agencies at the end of a pilot by the data analysis firm arranged by In-Q-Tel. Dataminr does not figure in the list of In-Q-Tel portfolio companies on its website.
Source-http://www.thegurureview.net/uncategorized/twitter-blocks-intelligence-agencies-access-to-tweet-analytics.html
Is Russia Behind Recent US Malware Attacks?
Comments Off on Is Russia Behind Recent US Malware Attacks?
It would appear that while the US has been blaming China for all its cyber break-ins it appears to be ignoring Tsar Putin’s elite hacking team for the last seven years.
For the past seven years, a cyberespionage group operating out of Russia on the orders of Tsar Putin have been conducting a series of malware campaigns targeting governments, political think tanks and other organizations.
Researchers at F-Secure have been looking into the antics of an outfit called “the Dukes” which has been active since at least 2008. The group has evolved into a methodical developer of “zero-day” attacks, pulling together their own research with the published work of other security firms to provide a more detailed picture of the people behind a long-running family of malware.
The Dukes specialize in “smash and grab” attacks on networks, but have also used subtle, long-term intrusions that harvested massive amounts of data from their targets.
The group’s targets do include criminal organisations operating in the Russian Federation, which suggest there is some form of policing element to it. But they are mostly interested in Western governments and related organisations, such as government ministries and agencies, political think tanks and governmental subcontractors.
F-Secure team wrote. “Their targets have also included the governments of members of the Commonwealth of Independent States; Asian, African, and Middle Eastern governments; organisations associated with Chechen terrorism; and Russian speakers engaged in the illicit trade of controlled substances and drugs.”
The group was named after its earliest-detected malware, known as PinchDuke. Its targets were associated with the Chechen separatist movement. Later that year they were going after Western governments and organisations in search of information about the diplomatic activities of the United States and the NATO.
Most of the attacks used spear phishing emails as the means of injecting malware onto targeted systems, one of their attacks have spread malware through a malicious Tor exit node in Russia, targeting users of the anonymising network with malware injections into their downloads.
The targets have always followed Russian government interests. There are a number of Russian-language artifacts in some of the malware, including an error message in PinchDuke. GeminiDuke also used timestamps that were adjusted to match Moscow Standard time.
Before the beginning of the Ukraine crisis, the group began using a number of decoy documents in spear phishing attacks that were related to Ukraine. They included a letter undersigned by the First Deputy Minister for Foreign Affairs of Ukraine.
However, after the crisis happened the attacks dropped off suggesting that it was an intelligence gathering operation. It is also a big operation, which, if operating in Russia would most likely require state acknowledgement, if not outright support.
Source-http://www.thegurureview.net/computing-category/is-russia-behind-us-malware-attacks.html
Good Technology Updates Security
July 25, 2012 by admin
Filed under Uncategorized
Comments Off on Good Technology Updates Security
Good Technology today announced two updates to its mobile security software products across IOS, Android and Windows Phone devices.
Powering mobile security for major enterprises such as Barclays, Sainsbury’s and LOCOG, Good Technology claims the releases are the first of a kind for the industry and address security threats linked to the bring your own device (BYOD) procedures being used in most big companies.
The first update announced by the firm is the addition of what it calls “Appkinetics” to its Good Dynamics line, which aims to solve the problem of secure private corporate data leakage.
“Good’s patented AppKinetics technology builds on the company’s proven ‘containerization’ security model to enable business apps from Good, its Good Dynamics partner independent software vendors (ISV), and internal enterprise developers,” the firm said in a statement.
“This is to securely exchange information within and between applications and create seamless multi-app workflows without compromising security or employees’ privacy and personal experience.”
The firm’s second update is the addition of eight new partnered apps to its Good Dynamics ecosystem covering the areas of business intelligence, collaboration, document editing, document printing, file storage/content management, remote desktop management and mobile application development platforms (MADPs).
This update allows developers to integrate the Good Dynamics technology into apps so that companies can create secure end-to-end workflows of protected, mobile applications to drive business processes.
Good Technology’s EMEA GM Andy Jacques explained, “If you download the standard consumer document editing application you can copy and paste from that from that app into another app.”
He continued, “If you were to open a piece of corporate mission critical data you can copy and paste that and put it onto Hotmail for example.”
India Wants To Monitor Twitter & Facebook
August 13, 2011 by admin
Filed under Around The Net
Comments Off on India Wants To Monitor Twitter & Facebook
India’s Communications Ministry has received a request from the Home Ministry to monitor social networking websites such as Twitter and Facebook amid fears that the services are being used by terrorists to organize attacks.
The request suggests that the Indian government is trying to expand the scope of its online surveillance for national security purposes.
Telecommunications service providers in India provide facilities for lawful interception and monitoring of communications on their network, including communications from social networking websites such as Facebook and Twitter, in accordance with their license agreements, Milind Deora, the minister of state for communications and IT, told Parliament, according to the country’s Press Information Bureau.
But there are certain communications which are encrypted, Deora said Friday.
The government did not provide details of what encrypted data they would like to have access to. A spokesman for the home ministry said on Monday that additional
information can only be provided in Parliament while it is in session.
Under new rules to the country’s IT Act that came into force earlier this year, websites and service providers are required to provide government security agencies with information on private accounts, including passwords, on request without a court order.
Most companies, however, are not willing to share information with law enforcement agencies unless they have a court order.
Twitter states in its guidelines for law enforcement that “non-public information about Twitter users is not released unless we have received a subpoena, court order, or other valid legal process document.”
Terror Alerts To Be Issued Via Facebook, Twitter
April 10, 2011 by admin
Filed under Around The Net
Comments Off on Terror Alerts To Be Issued Via Facebook, Twitter
The U.S. government may start issuing terror alerts via Facebook and Twitter, according to a news service report.
The Associated Press reported Thursday that the U.S. Department of Homeland Security is working to re-design the current color-coded terror alert system. The new system, according to the report, would have only two levels of alerts — elevated and imminent.
Those alerts would be conveyed out to the public in part via social networking sites Facebook and Twitter . The AP article is based on a 19-page draft of the plan that the news service obtained.
“The new terror alerts would also be published online using Facebook and Twitter ‘when appropriate,’” the news agency reported, “but only after federal, state and local government leaders have already been notified.”
The new system is expected to be in place by April 27.
Zeus Kerravala, an analyst at Yankee Group Research, said the fact that the U.S. government is entrusting something as critical as terrorist alerts to Facebook and Twitter shows how important social networking sites have become to people’s lives.