More stories

  • in

    iPhone, Android users lose life savings to romance fraud, cryptocurrency operation

    iPhone and Android users are falling prey to new and even more extortionate tactics by romance and cryptocurrency scam artists. 

    Romance scams are nothing new, but their potential impact has expanded due to mobile technology and the connectivity of our smartphones to core financial services, banking, and investment opportunities. The US Federal Trade Commission (FTC) says that 2021 was a “goldmine” for scammers, and $770 million was lost due to social media scams alone during the year. Investment, cryptocurrency, and romance scams were the most common ways fraudsters cashed in.  In 2021, Sophos revealed “CryptoRom,” an international criminal ring conducting romance scams across Asia, the US, and Europe. At the time, Sophos said that CryptoRom primarily targeted Bumble and Tinder users, luring them into downloading fake cryptocurrency trading apps by abusing Apple’s Enterprise Signature platform.  The researchers have now provided an update on the scammers’ activities. On Wednesday, ESET said that victims have been contacting the company, providing their own stories and allowing the team to collect more threat information.  “Most also reported that they had lost thousands of dollars in personal savings to the crooks behind the scams, though some saw our previous reports and recognized the scam before being drawn into it too deeply,” ESET said. “In some cases, victims have lost their entire savings and even taken out loans with the hope that they will get their money back.” Also: Microsoft warns of emerging ‘ice phishing’ threat on blockchain, DeFi networksIt now appears that CryptoRom fraudsters are also soliciting victims through cold-call WhatsApp messages, offering them investment opportunities and trading tips — and, of course, “huge” financial returns are promised.  Victims are then redirected to fraudulent websites and third-party app repositories, where they are induced to download and install fake cryptocurrency and trading apps. However, this is when a change in tactics has been noticed.  Normally, scam artists will lure their targets into either submitting their sensitive financial information into an app or purchasing cryptocurrency through other services, which end up in the wallets of attackers.  In this case, however, CryptoRom scammers will allow victims to initially make withdrawals of their initial deposits from the fake apps — designed to mimic popular, legitimate services — after a ‘win’ on the market.  This may seem counter-productive, but the scam artist then will urge their target to invest even more, as it appears that the investment ‘opportunity’ has already resulted in profit — and there is more money to be made.  Keep in mind that the scam artist is masquerading as a friend or a romantic interest. Having laid the groundwork of a personal bond and a seemingly real investment opportunity, the crooks will try to squeeze more cash out of their victim. “To sweeten the pot, they even offer to ‘lend’ the target a huge sum to increase the investment; since they control the back-end of the app, they can inject fake deposits on accounts and create imaginary profits at will,” the researchers noted.  When ‘profit’ appears, and the user tries to make a withdrawal, the attackers’ strike. Profits have been artificially created to any sum they wish — and now, the victim having paid in further, the scam artist demands a “tax” of 20% on the imaginary figure via the app’s “customer service” team.  Some victims reported threats that tax authorities would take everything if they did not pay up. Naturally, they aren’t allowed to pay using the funds held in the app.  An individual reached out to ESET and said that all of their retirement money, and loans, had been deposited and was ‘frozen’ in the app, with over one million dollars held. The fraudsters demanded a ‘tax’ payment of $625,000.  This kind of double-dipping appears to be a successful tactic in romance & investment scams and one that we need to be more aware of. Fund recovery services targeting CryptoRom victims have also appeared on social media to make matters worse. It’s likely these fake services want to capitalize on those already taken in once by online criminals.  “Because of the nature of cryptocurrency and the fact that cross-border foreign transactions are involved, it is difficult at best to recover funds through law enforcement or other legal channels,” ESET says. “The vast majority of these services are fake, and it is highly unlikely that any service would be able to get victims’ money back.”See alsoHave a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    Best Wi-Fi router 2022: Fast, reliable Wi-Fi

    More and more, remote work and home offices are becoming common fixtures in our careers, with either permanent work-from-home options available or hybrid flextime models. What was once a rapid response to a global pandemic may lead to permanent, long-term changes in how we work and what we will expect our employers to offer in the future.  According to a Salesforce survey on the future of work, 64% of employees still want to spend some time in a traditional workplace environment, and 74% of Generation Z — soon to become the majority of the labor pool — is interested in hybrid work practices, splitting time between home and the office. However, such a change in the foundation of our workday will create a tradeoff: some of the resource requirements will move from employer to employee.  If you want to take advantage of the quality of service that any potential future hybrid work offers, companies may require you to show you have the equipment at home to work. While a comfortable desk, chair, Alexa smart speaker or other smart home devices, a camera and microphone for remote meetings, and simply the space to concentrate and knuckle down are necessary, hybrid and fully remote roles demand one critical component: connectivity.  While you might already have internet connectivity and a wireless router good enough to support mobile devices, smart home products, and content streaming services such as Netflix, you may need to add work-related systems, Wi-Fi extenders, and software to the mix to make a high-end network with minimal dead spots. If this sounds like what you are looking for, then think about getting a new router or modem to keep up with the square footage of your home. The more connections there are the greater the risk of bottlenecks and connectivity drops. Basic routers supplied by your ISP and older models may not be enough now we spend more time at home and connect to even more devices and services, and so without a quality Wi-Fi router, work productivity and performance can be impacted. Some of you at home may only need a Wi-Fi router able to generate a strong signal in one or two areas of your home to prevent dead zones, or you may want additional ports, security controls, and child locks. Others may opt for mesh Wi-Fi, which while often a more expensive option, can improve coverage over larger areas and extend connectivity to home offices located away from your main house.  ZDNet has listed our top picks for Wi-Fi routers suitable for different budgets and needs. Here are a few of the best Wi-Fi routers and best wireless routers on the market today.

    Google Nest Wifi

    Best for Google ecosystem users

    One of the most suitable devices on the market for Google ecosystem users is Google Nest Wifi. This router option aims to keep things easy to set up with “Network Assist,” a system that works in the background to automatically select the best channels for your connected devices. The Wi-Fi router offers coverage of up to 2,200 sq ft. However, as a mesh Wi-Fi device, the more access points you add to the router system, the better the blanket coverage on your home network. You can select a single pack that comes with one router and one additional Wi-Fi access point, or Google also offers a two-pack option, with an estimated coverage area of up to 4,400 sq ft. Google Nest Wifi is capable of managing roughly 200 connections per access point and also two Gigabit Ethernet ports are included with each router. Each point has an integrated smart speaker with Google Assistant. Pros:Blanket coverage for small and medium-sized homesScalable with additional routersBluetooth & voice compatibilityCons:The cost can add up in larger propertiesSome users report setup problems

    Asus ROG Rapture GT-AX11000

    Best for gamers

    Best Buy

    If Google’s Nest WiFi router does not provide enough streaming power for you — whether for gaming or online work systems that require quick and stable connectivity — the Asus ROG Rapture GT-AX11000 is a tri-band router for heavy use and gamers who require high levels of bandwidth.  The Asus ROG Rapture AX11000 is a 10-gigabit, Wi-Fi 6 router. It comes with a 1.8Ghz quad-core processor, 2.5G gaming port, port forwarding, 256MB NAND flash, 1GB RAM, and a range of up to 2,500 sq ft. It is possible to select an option to prioritize gaming traffic, which may be a useful feature for those employed in the gaming or review sector. Asus has also implemented dynamic frequency selection (DFS) to automatically select the least-congested 5GHz bands for streaming. A VPN and support for ASUS AiMesh are included for expanded home coverage.Pros:Automatic boosts for 2.4GHz and 5.0GHz connectionsUp to 11000 Mbps data transfer rates802.11ax WiFi standardCons:ExpensiveThe design won’t appeal to everyone

    Synology RT2600ac

    Best for remote workers who want a VPN option

    If your employer requires a Virtual Private Network (VPN) while you work remotely, the Synology RT2600 Wi-Fi router may be a suitable option. A VPN makes internet connections more secure by encrypting communication between browser sessions and servers — and can also be used to mask your original IP address — and so if workers are asked to connect to corporate resources, a VPN can keep access secure.To take the guesswork out, the Synology RT2600 is a dual-band, MU-MIMO router already equipped with a VPN option, VPN Plus, to act as a VPN server or client, and support is also available for Synology SSL VPN, PPTP, OpenVPN, and L2TP/IPSec. To facilitate the use of VPN servers and clients, the router is powered by a 1.7Ghz dual-core processor, as well as 4×4 802.11ac wave 2 radios.The router is capable of speeds of up to 2.53Gbps. In addition, this product has a useful feature for streaming: The option to connect SD cards or USB 3.0 attached storage to stream content to TVs and other devices.Pros:VPN option — VPN Plus — acts as a VPN server or clientUpgradable with mesh optionsUp to 3,000 sq ft coverageCons:Mesh upgrades for larger homes are expensive

    Netgear Orbi

    Best for those with larger homes and big families

    Mesh home Wi-Fi networks are increasing in popularity as we adopt smart, connected devices and streaming services in our homes. Mesh topologies can increase the stability and interconnections between IoT devices by working with ‘nodes’ placed around the home, reducing blind spots and buffering issues. While mesh Wi-Fi devices do not always offer the same advanced settings or features as some traditional routers, mesh devices can suit those who have a home office in an area with a weak Wi-Fi signal, for example, or who are competing for streaming capacity. The Orbi’s strength is its coverage — up to 5,000 sq ft, with support for up to 25 devices. The tri-band, MU-MIMO router offers decent Wi-Fi speeds on the 2.4GHz (400Mbps) + 5GHz (866Mbps) bands — and is powered by a quad-core ARM processor and comes with 512MB RAM on Wi-Fi 6. The included Ethernet port provides 1GB connectivity. The Netgear Orbi can be picked up with standard specifications or you can upgrade to the premium “Ultra Performance” range, which extends coverage and the number of devices connected via satellite bolt-ons; each of which expands coverage by up to 2,500 sq ft. See the review: Netgear Orbi Wi-Fi 6 AX4200 hands-onNetgear Orbi should be considered when more than one person is fighting for broadband resources, such as when multiple occupants are all working from home and children need stable connections for learning.Parental controls and the option to adopt Netgear Armor are included.Pros:An excellent option for home setupsScalableModern, clean designCons:Add-on satellites are costly Netgear Armor is a subscription service

    TP-Link Archer AX6000

    Best for those who want to future-proof their home

    The TP-Link Archer AX6000 is a high-performance router that shines as a Wi-Fi 6  model. Picking up a Wi-Fi 6 device now is an investment for future-proofing your home connectivity, as this standard provides the capacity for devices to send more data during transmissions, increasing speed.For those working from home for the foreseeable future, the TP-Link Archer AX6000 is a worthwhile option. The dual-band device supports 2.4GHz/5.0GHz frequency and is equipped with 128MB flash memory, 1GB RAM, and a 1.8GHz CPU. In speed tests conducted by CNET, it was top of the class, coming in at an average wireless network download speed of 1,523 Mbps at 5ft, with a strong performance recorded even at distances of up to 75ft.WPA2 encryption, Ethernet connectivity, and parental controls are also included. Pros:8 Ethernet ports, 1 WAN portWorks with Amazon AlexaSimple user interfaceCons:Bulky design

    How did we choose these Wi-Fi routers?

    ZDNet examined popular and new options on the market and selected our products with budgets and intended use in mind. With hybrid and remote working practices now becoming a permanent feature of day-to-day activities for many of us, dedicated and solid routers are now a necessity for both business use and home life.We also chose to include both traditional and mesh products, despite the recent changes in work environments, we can’t forget that family and friends also need stable connections for entertainment, education, and gaming.

    What is the difference between a traditional router and mesh Wi-Fi?

    Traditional Wi-Fi routers provide a single access point for your broadband/fiber connections. However, if there are too many connections made at the same time, this can cause bottlenecks and may impact the reliability of a connection. It is often the case that standard routers offer improved power and speed when the number of connections is manageable in comparison to mesh, but mesh offers extended, blanket coverage and more access points. As a result, wired and traditional routers are often better for gaming and streaming, whereas mesh is a solid option when you have multiple people and connections in a home. 

    Is it worth upgrading from Wi-Fi 5 (802.11ac) to Wi-Fi 6 (802.11ax)?

    In short, yes, if you can and you are willing to front the expense for a better connection. With our world now dominated by smartphones, IoT devices, and streaming services, an upgrade to Wi-Fi 6 gives you access to more streams and potentially faster services. 

    Which is the right Wi-Fi router for you?

    When you decide to either upgrade your existing router setup or replace the bog-standard device your ISP gave you — which are often poor and don’t allow consumers to enjoy the full potential of the speed they are paying for — you first need to decide what your connection priorities are. If you’re at home with multiple occupants and many devices, a mesh network is probably the best way to go, especially if you are on a large property. However, if it is more important to you to have speed and reliability over coverage potential, then a traditional router might be the best option. 

    ZDNet Recommends More

  • in

    Drone delivery nearer to take-off following latest FAA recommendations

    By Stanisic Vladimir — Shutterstock
    No seriously, drone delivery is coming. If you were skeptical before, an FAA committee just took a huge step with the compliance groundwork to make that a reality.The so-called Beyond Visual Line of Sight Aviation Rulemaking Committee (BVLOS ARC) of the FAA published its final report last week. The committee is charged with paving the way toward broader commercial use of drones in the U.S., and its findings are being widely applauded by many in the sector who have sought a broader scope for commercial drone operations, including in applications like search and rescue and delivery.

    “Around the world, commercial drones are saving lives, making jobs more efficient, inspecting infrastructure at scale, and growing the economy,” said Lisa Ellman, Executive Director of the Commercial Drone Alliance, an industry trade group. “But here in the U.S., existing regulations hold back the drone industry by unnecessarily applying incongruous standards and approaches designed for crewed aircraft. This ARC report outlines a common-sense, risk-based, performance-based approach that balances safety with innovation, and will enable drone-based operations to scale in the U.S. for the benefit of all Americans.”Also see: Watch these autonomous drones zip through the woodsIndustry advocates have argued that unlocking the BVLOS marketplace will advance progress across a number of areas, including sustainable transportation, carbon emission reduction, equitable access to medicines and vaccines, safer and more effective critical infrastructure inspection, emergency response, aerospace jobs, and domestic manufacturing.The chorus on the other end of the spectrum hasn’t been all that loud, perhaps a function of the relatively obscure rulemaking processes at work, to which the industry is paying close attention but average consumers may not be.A common industry argument is that the U.S. has lagged behind Europe in efforts to integrate drones into the National Airspace in large part due to the limitations of the regulatory framework and the federal bureaucracy’s struggle to move nimbly. The recent FAA report gives the clearest indications yet of what a coming BVLOS regulatory framework will look like. The committee gave recommendations on things like pilot training requirements, right of way, and rules for third-party providers, such as commercial delivery vendors. Groups like the Commercial Drone Alliance, a non-profit organization led by leaders in the commercial drone and advanced air mobility industries, have long advocated for such recommendations, an interesting case where industry leaders have felt hamstrung by a lack of government guidance.In January, Congress issued a directive to the FAA to finalize and disclose its BVLOS plans within 90 days, prioritizing rulemaking around the issue. More

  • in

    CISA and FBI warning: Hackers used these tricks to dodge multi-factor authentication and steal email from NGO

    Russian state-sponsored hackers have used a clever technique to disable multi-factor authentication (MFA) and exploit a Windows 10 printer spooler flaw to compromise networks and high-value domain accounts. The goal? Accessing the victim’s cloud and email.  The Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) issued an alert about Russian state-sponsored activity that pre-dates recent warnings over cyber activity related to Russia’s military invasion of Ukraine. 

    ZDNet Recommends

    As early as May 2021, the hackers combined a default configuration issue in a Duo MFA setup at a non-government organization (NGO) with the critical Windows 10 PrintNightmare flaw CVE-2021-34481 to compromise it. SEE: There’s a critical shortage of women in cybersecurity, and we need to do something about itMicrosoft patched that elevation of privilege issue in August. Once inside a network, the flaw allowed an attacker to create new accounts on Windows 10 machines. In the NGO’s case, the use of a weak password allowed the attackers to use a password-guessing attack to gain the credentials for initial access. The attackers also used the fact that Duo’s default configuration setting allows the enrollment of a new device for dormant accounts.  “Russian state-sponsored cyber actors gained initial access to the victim organization via compromised credentials and enrolling a new device in the organization’s Duo MFA. The actors gained the credentials via brute-force password guessing attack, allowing them access to a victim account with a simple, predictable password,” CISA said in an alert.   After compromising the account, PrintNightmare came into play, with the attackers using it to escalate privileges to a more powerful admin level and then “effectively” disabled MFA for the compromised account.”This change prevented the MFA service from contacting its server to validate MFA login – this effectively disabled MFA for active domain accounts because the default policy of Duo for Windows is to “Fail open” if the MFA server is unreachable,” CISA explains. It notes that the “fail open” issue is not specific to Duo. From there, the operation was repeated but applied to higher-value domain accounts. After disabling MFA, the attackers authenticated to the victim’s VPN as non-administrator users and made RDP connections to the Windows domain controllers. They nabbed credentials for additional domain accounts and went on to change the MFA configuration file, allowing them to bypass MFA for these newly compromised accounts. “Using these compromised accounts without MFA enforced, Russian state-sponsored cyber actors were able to move laterally to the victim’s cloud storage and email accounts and access desired content,” CISA explains.  CISA outlines several mitigations related to and beyond MFA implementations. The MFA-specific mitigations include: Before implementing, organizations should review configuration policies to protect against “fail open” and re-enrollment scenarios.Implement time-out and lock-out features in response to repeated failed login attempts.Ensure inactive accounts are disabled uniformly across the Active Directory and MFA systems.Updating software and prioritizing patching of known exploited vulnerabilities, especially critical and high-level vulnerabilities that allow for remote code execution or denial-of-service on internet-facing equipment.Require service accounts, admin accounts, and domain admin accounts to have strong, unique passwords.  More

  • in

    Australia's big four banks tackling cybersecurity with a team sport mentality

    The chief security officers of Australia’s big four banks have likened combating cybersecurity attacks to playing a team sport. “I think I’m not alone in saying that we see cyber as very much a team sport,” Commonwealth Bank of Australia CISO Keith Howard said during the virtual Cyber Live event on Wednesday.”The competitors, from my perspective, is not [the other banks], it’s the attackers … at the end of the day, we’re stronger when we work across industry, across education, and also work across government as well.”This joint security effort between the big four occurs regularly, according to National Australia Bank CSO Sandro Bucchianeri.”What we typically do is we would talk about indicators of compromise and share our threat intelligence so that we can better defend ourselves because something I see at NAB, Richard may not have seen it at Westpac, or Lynwen [at ANZ] may have also seen it, so we try to compare notes essentially — and that helps us protect the wider Australian community as a whole,” he said.

    Special feature

    Cyberwar and the Future of Cybersecurity

    Today’s security threats have expanded in scope and seriousness. There can now be millions — or even billions — of dollars at risk when information security isn’t handled properly.

    Read More

    Bucchianeri also emphasised the importance of having diverse skill sets to make up a strong cybersecurity team. “Just like soccer, where you have strikers, defenders, midfielders, goalkeepers, doctors, coaches, nutritionists, and the list goes on, we are looking for new diverse talent that will help us better defend the organisation. Something that I’m personally very excited about is training visually impaired students to become cybersecurity professionals,” he said.From ANZ CISO Lynwen Connick’s perspective, diversifying the cybersecurity sector is not only just about gender, but also bringing in people from other fields like psychology, media, and fashion. “People come from all different walks of life, and that’s really important from a diversity point of view as well because you get that diversity of thought,” she said. “People have had different training, different experiences coming into cybersecurity because cybersecurity is really part of everything we do, so we need all sorts of different people.”  The need to boost Australia’s cybersecurity skills comes at a time where cyber attacks are no longer synonymous with a specific sector or enterprise — rather it’s hurting all sectors. A prime example was when global meatpacker JBS last year paid $11 million in Bitcoin to cyber attackers that encrypted its files and disrupted operations in the US and Australia with ransomware.As BT Australasia cybersecurity head Luke Barker puts it, compared to a decade ago, there was nowhere near as many targeted activities towards organisations that run operational networks, such as manufacturing, mining, energy, and water, as there are today. “Ten years ago, I don’t think the adversaries were targeting those types of industries as much,” he said. “Whereas I look now and most of the organisations we work with, we’re seeing a significant rise in cybercrime against organisations that run those types of environments because the impact is so big.”If you’re having to take down an organisation’s manufacturing facility, that is the number one source of revenue, so the impact of their business and the likelihood of them potentially paying a ransom is going to be more so than say their website goes down, when their core business is manufacturing.”We’re seeing that shift towards what’s going to create the biggest impact and where are the crown jewels for that organisation.” Related Coverage More

  • in

    Australia's cyber laws potentially harmful to security: Critical Infrastructure community

    Image: Shutterstock
    A slew of Australia’s critical infrastructure service providers and union groups have lambasted the federal government’s critical infrastructure cyber laws due to it requiring organisations to install third-party software onto their systems if they are deemed to not be “technically capable” of managing cyberthreats. Roger Somerville, Amazon Web Services’ (AWS) ANZ public policy head, said the need for new cybersecurity laws was apparent and AWS supported the Bill, but he remained critical of the software installation scheme contained within it. The Security Legislation Amendment (Critical Infrastructure Protection) Bill 2022 contains outstanding elements of cyber laws passed by the Parliament last year, per recommendations from the parliamentary committee that is currently reviewing the laws. Among these outstanding elements are requirements for entities deemed “most important to the nation” to adhere to enhanced cybersecurity obligations, such as potentially installing third-party software. Addressing the parliamentary committee that is reviewing the Bill, Somerville said there is a lack of clarity on how the software installation scheme would operate, and that the federal government saying it would only be used as a “last resort” is not sufficient. “We do acknowledge that the Australian government has told us that those sorts of powers would be more relevant for less sophisticated cyber security entities than ourselves. But from our perspective, I think we’re very concerned that we still do need to see clear, practical guidance on how this would work,” Somerville said. Somerville added that if the federal government was adamant in pushing ahead with establishing the software installation scheme, a technical support body that exists as an independent statutory office holder should be created to oversee the scheme’s operation. “This body would also perhaps create an avenue for contestability of those decisions, particularly on the questions of technical feasibility,” he said. AWS was not alone in sharing its concerns, as Palo Alto Networks ANZ public policy head Sarah Sloan, who also appeared before the committee, said the software installation scheme introduces unnecessary security risks into critical infrastructure environments. This security concern was echoed by Communications Alliance CEO John Stanton, who provided an example of how the scheme could be dangerous. “The danger is probably more when information is combined with other information sources, so we don’t necessarily hold a list of the people’s names behind IP addresses, but other organisations do. So if you combine data [from critical infrastructure entities] with telecommunications service providers data, because they know who the service providers are of those IP addresses then you’re able to effectively put together personal information,” Stanton said. Software Alliance COO Jared Ragland, meanwhile, noted that the security issues with the scheme did not stop there as the installation of the software could lead to more issues across critical infrastructure supply chains. “In addition to concerns about what kind of information might have legitimate access to the software, a real concern is that if the software is installed at each stage along this chain and it operates improperly, then there could be accidental problems. Perhaps it could be data leakage, but it could also be operational interruptions of other sorts,” Ragland explained.For each of these organisations, trust appeared to be a core issue in their opposition to the software installation scheme. To address this lack of trust, not-for-profit advocacy group Internet Association of Australia (IAA) said the federal government should amend the proposed cyber laws to allow critical infrastructure entities to heavily test code. “It’s highly, highly important that we need to have to trust the type of software that goes on to manage this. And we need the opportunity to be able to read the code, assess the code, test the code against other things,” IAA CEO Narelle Clark said. The federal government’s critical infrastructure reforms sit alongside the ransomware action plan as being its primary regulatory efforts for bolstering Australia’s cybersecurity posture. Labelled by Home Affairs Secretary Mike Pezzullo last month as the government’s defence against cyber threats, the federal government is hoping the second trance of cyber laws will create a standardised critical infrastructure framework for Australia’s intelligence agencies. Related CoveragePezzullo frames Critical Infrastructure Bills as ‘defence’ and ransomware plan as ‘offence’Home Affairs believes the second critical infrastructure Bill would create a common framework for preventing cyber attacks.MacTel warns critical infrastructure reforms create gaps in government data protectionThe cloud and data provider also sees a potential future where critical infrastructure providers and their suppliers shift data stores and processing functions offshore to avoid being regulated.Home Affairs releases second Critical Infrastructure Bill with leftover obligationsThis new Bill contains obligations that were excluded from the Security Legislation Amendment (Critical Infrastructure) Act 2021. More

  • in

    Kaspersky complains about 'political' German advisory against it

    Logo: Kaspersky Lab // Composition: ZDNet
    Kaspersky has responded to an advisory issued against it by the German Federal Office for Information Security (BSI) saying users should replace its products by claiming the warning is politically motivated.”We believe this decision is not based on a technical assessment of Kaspersky products — that we continuously advocated for with the BSI and across Europe — but instead is being made on political grounds,” the security company said on Wednesday.”We believe that peaceful dialogue is the only possible instrument for resolving conflicts. War isn’t good for anyone.”One does not need to look much further than a classic Clausewitz quote to realise that war and politics are very much linked.As the BBC reported, the BSI said the advisory was made due to the Russian invasion of Ukraine.”A Russian IT manufacturer can carry out offensive operations itself, be forced against its will to attack target systems, or be spied on as a victim of a cyber operation without its knowledge or as a tool for attacks against its own customers,” BBC translated the warning as saying.Kaspersky said its data processing was shifted to Switzerland in 2018, and its customers can “run a free technical and comprehensive review” including source code reviewing and rebuilding.”Beyond our cyberthreat-related data processing facilities in Switzerland, statistics provided by users to Kaspersky can be processed on the Kaspersky Security Network’s services located in various countries around the world, including Canada and Germany,” the company added.

    Ukraine Crisis More

  • in

    No rational basis: Defamation law expert says Australia's anti-trolling Bill should be canned

    Image: Getty Images
    A defamation law expert has slammed the federal government’s so-called anti-trolling Bill, accusing it of changing Australia’s defamation laws for no adequate reason and through misleading means.”My colleagues and I think that this legislation is misconceived and should not proceed,” barrister Sue Chrysanthou SC said on behalf of some of Australia’s preeminent defamation law experts.”Not one person who supports this legislation has given an adequate reason, to my knowledge or the knowledge of my colleagues, as to why it should be changed … this Bill is a violent assault on the tort of defamation by the Commonwealth, for which no rational basis or reason has been provided.”Barrister Sue Chrysanthou SC made those comments before a Senate legal and constitutional affairs committee hearing on Tuesday afternoon, which is currently conducting an inquiry looking into the Bill. She added that the Bill does nothing to address online abuse or trolling.At its core, the Bill seeks to remove the liability held by owners of social media pages for any defamatory material posted on those pages. If passed, it would also create the requirement for social media companies to identify people if they post potentially defamatory material.  The Bill was established shortly after a High Court judgment ruled media outlets were considered publishers of third-party comments on their social media pages.The anti-trolling legislation has already received flak from senators, online abuse victims, and government agencies, with Australia’s eSafety commissioner having already criticised the legislation due to it containing no mention of the word “troll”. “One of our objections to this Bill is that it is piecemeal. It will increase legal costs and cause confusion because of its inconsistency with the state and territory laws,” Chrysanthou told the committee.Liberal Senator and committee chair Sarah Henderson, who has claimed she was defamed on Twitter, dismissed Chrysanthou’s arguments as the barrister has not run a case against Twitter before.”This Bill is all about Facebook. This Bill is all about Instagram. It’s all about Twitter. It’s about unmasking the anonymous abusers, about giving redress,” Henderson said. In response to Henderson’s comments, Chrysanthou said in her experience there has not been a need to sue Twitter or Facebook on defamatory grounds as yet. “Any client I’ve had that sued over a tweet or Facebook post, the persons who made those tweets or Facebook posts have been identifiable. It is large part of my practice — acting for people who sue over social media posts. So far there hasn’t been a need to deal with Twitter or Facebook,” she said.Earlier in the day, Twitter appeared before the committee to call out Australia’s anti-trolling laws as an extreme risk to the privacy of Australians, particularly minority communities. “We’ve seen a number of people both from a whistleblower space to even domestic violence situations, people that identify within the LGBTQIA community, utilising anonymous or synonymous accounts as ways and basically entry points into conversations about important matters,” Twitter director for public policy Australia Kara Hinesley said.”We do think that there are potential safety concerns which would be the opposite result of the stated intention of the Bill.”RELATED COVERAGE More