More stories

  • in

    Former Vocus chair charged with insider trading related to cancelled 2019 sale

    The Australian Securities and Investments Commission has charged former Vocus chair Vaughan Garfield Bowen for allegedly performing insider trading after he sold millions of the company’s shares just prior to the announcement it had failed to be acquired for the third time in as many years.Bowen has been charged with two counts of insider trading for disposing of over 5.6 million shares. Bowen allegedly had inside knowledge of EQT Infrastructure withdrawing its proposal to acquire Vocus in June 2019.Bowen is currently an executive director for Uniti Group and was the founder of M2 Group, which merged with Vocus in 2016. Following the merger, Bowen had a stint as Vocus’ chairman in early 2018 [PDF]. EQT Infrastructure had offered to acquire Vocus at AU$5.25 per share in May 2019, but the deal fell through a few weeks later during the deal’s due diligence process.At the time, Vocus had received interest from various potential suitors, but it repeatedly could not seal the deal. In 2017, private equity firms Kohlberg Kravis Roberts & Co and Affinity Equity Partners both submitted separate offers to acquire Vocus, but both of those offers were eventually terminated due to the network provider missing its FY17 net profit guidance.Two years later, EQT Infrastructure put out its offer before quickly rescinding it. Energy provider AGL then presented an offer shortly after, but that was also dropped due to there not being “sufficient certainty of creating value”.Vocus was finally acquired in June of this year after a consortium consisting of Macquarie Infrastructure and Real Assets (MIRA) and superannuation fund Aware Super bought the network provider for around AU$3.5 billion, or AU$5.50 per share.

    MIRA started its chase of Vocus at the start of February, while Aware Super joined the fray later that month after it was spurned by greenfields fibre company Opticomm last year.If found guilty, Bowen could face up to 30 years of imprisonment.Bowen will face a committal mention hearing in the Magistrates’ Court of Victoria in December. RELATED COVERAGE More

  • in

    Singapore, India to link national payment systems for cross-border transfers

    Singapore and India are working to link their country’s respective real-time payment system, enabling funds to be transferred via mobile numbers and virtual payment addresses. The move aims to support growing remittance traffic and drive cross-border interoperability. Work to connect Singapore’s PayNow and India’s Unified Payments Interface (UPI) infrastructures were targeted for completion by July 2022, according to a statement released Tuesday by the Monetary Authority of Singapore (MAS). It added that the initiative was established in partnership with the Reserve Bank of India.The linkage would enable residents in both countries to make real-time, low-cost fund transfers directly between their respective local bank account. Funds from India could be transferred to Singapore via mobile numbers, while funds from Singapore could be transferred to India using UPI virtual payment addresses. These addresses are used by non-bank financial institutions to connect directly to PayNow and Fast and Secure Transfers (FAST), and enable users to send and receive payments through e-wallets or mobile banking apps. User experience will be similar to how each payment system operates in its domestic market, MAS said.The Singapore central bank added that the interoperability between PayNow and UPI would better facilitate growing remittance traffic and allow more organisations to join the payment ecosystem. It would also help drive automation of capital control rules and establish standardised formats to support future services between participants, it said.Describing the partnership as a milestone in the development of next-generation cross-border payment infrastructures between both countries, MAS said such connectivity was in line with the G20’s financial inclusion priorities of driving “faster, cheaper, and more transparent” cross-border payments. 

    MAS’ chief fintech officer Sopnendu Mohanty said: “By reducing the cost and inefficiencies of remittances between Singapore and India, the PayNow-UPI linkage will directly benefit individuals and businesses in Singapore and India that greatly rely on this mode of payment. “Given that PayNow and UPI are integral components of their respective national digital infrastructures, the link between the two systems also paves the way for establishing more comprehensive digital connectivity and interoperability between the two countries,” Mohanty said. Singapore in April 2021 inked a similar pact with Thailand to enable users in both nations to transfer funds using the recipient’s mobile number. The collaboration tapped the respective country’s peer-to-peer payment systems, PayNow and Thailand’s PromptPay, and was part of a regional payment initiative to ease cross-border payments. Singapore earlier this month also announced it was working with the central banks of Australia, Malaysia, and South Africa to develop and test a common platform on which to process cross-border digital payments. The initiative to pilot the use of central bank digital currencies (CBDCs) for international transactions aimed to bypass the need for intermediaries and, hence, slash the time and cost of such transactions. RELATED COVERAGE More

  • in

    ExpressVPN sells to Kape Technologies for $936 million

    Image: Shutterstock / Berk Can
    Kape Technologies has announced it will pick up ExpressVPN for $936 million, consisting of $237 million in Kape shares to ExpressVPN co-founders Peter Burchhardt and Dan Pomerantz, which will hand them a 14% stake in the combined entity, with the remainder to be paid in cash over the next two years. ExpressVPN said it would remain a separate service, and its team would continue to grow. Of its approximately 290 employees, ExpressVPN has 48% involved in research and development. Kape called out ExpressVPN’s OEM arrangements with HP, HMD Global, Acer, Dynabook, and Philips. The VPN service has over 3 million customers, with over 40% in North America. During the 2020 fiscal year, ExpressVPN posted revenue of $279 million, up 37%, and adjusted EBITDA of $75 million, up 35%, Kape said in its regulatory filing. “Significant cross sell and revenue opportunities across the platform; top line and operational synergies greatly improve [customer lifetime value to acquisition cost] ratios and are anticipated to generate cost savings of $19 million in 2022 and $30 million on an annualised cost basis from 2023,” Kape said.See also: Best VPN 2021: Top VPN services reviewed Cross-selling aside, ExpressVPN claimed it would be able to provide better protection from a “wider range of threats”. “We’ve been impressed by Kape’s clear commitment to protecting the privacy of users,” ExpressVPN said in a blog post.

    “Their track record with upholding the exacting privacy practices and policies of other privacy protection services under the Kape umbrella is a strong testament to how seriously they take their responsibility to respect user privacy and rights.” In total, the combined company will have around 6 million paying subscribers. This is not Kape’s first VPN purchase — it previously bought VPN companies ZenMate and Cyberghost, and used to specialise in scareware under the Crossrider name. Related Coverage More

  • in

    Google patches two Chrome zero-days

    Google announced fixes for 11 different bugs in Chrome on Monday, including two zero-days currently being exploited in the wild. Google listed all 11 of the fixes as well as the researchers who discovered them and the bounties handed out. But the two that caused the most stir were CVE-2021-30632 and CVE-2021-30633. “Google is aware that exploits for CVE-2021-30632 and CVE-2021-30633 exist in the wild,” Google explained. The two vulnerabilities were the only ones that were listed as being submitted anonymously on September 8.Google added that CVE-2021-30632 related to an “out of bounds write in V8” and CVE-2021-30633 concerned a “use after free in Indexed DB API.”All of the updates will roll out over the coming days and weeks as part of the Stable channel update to 93.0.4577.82 for Windows, Mac and Linux, Google said.

    m

    Best Google Chrome extensions

    If you are a Google Chrome user and you’re not making use of extensions, then you are really missing out. Here is a selection of extensions aimed specifically at boosting your productivity and privacy.
    (Updated April 4, 2017)

    Read More

    Kevin Dunne, president at Pathlock, said this was the 10th zero-day exploit that Google had patched this year. “This milestone highlights the emphasis that bad actors are putting on browser exploits, with Chrome becoming a clear favorite, allowing a streamlined way to gain access to millions of devices regardless of OS,” Dunne said. 

    “Google’s commitment to patching these exploits quickly is commendable, as they operate Google Chrome as freeware and therefore are the sole entity who can provide these updates. We expect to see continued zero-day exploits in the wild, but we are confident Google will continue to place effort on security and providing timely patches to these exploits.”Browser bugs discovered from exploitation in the wild are among the most significant security threats, added John Bambenek, principal threat hunter at Netenrich”Now that they are patched, exploitation will ramp up. That said, almost 20 years on and we haven’t made web browsing safe shows that the rapid embrace of technology continues to leave users exposed to criminals and nation-state actors,” Bambenek said. “Everyone wants to learn how to hack, too few people are working on defense.” More

  • in

    Japanese telco KDDI to use SpaceX Starlink for mobile backhaul

    Image: Getty Images
    Japanese telco KDDI said on Monday it planned to use SpaceX Starlink as a backhaul provider for connecting 1,200 remote towers. Due to the low-Earth orbit of the satellite, KDDI claimed it would offer “an urban mobile connectivity experience” to those in the country. The backhaul is set to be operational some time in 2022. Starlink currently has an experimental licence in Japan for its ground station installed at KDDI’s Yamaguchi Satellite Communication Center, with both companies involved in conducting tests on the solution. Last month, Elon Musk announced that Starlink had shipped 100,000 terminals to customers. Under the project, beta services are currently operating in 11 different countries. SpaceX outlined as part of beta services that users can expect to see data speeds vary from 50Mbps to 150Mbps and latency from 20ms to 40ms in “most locations over the next several months” while the Starlink system continues to be enhanced. There will also be brief periods of no connectivity at all, the company added. Starlink previously said it expected its global satellite broadband service to be live this month. In May, it was announced that Google and SpaceX signed a deal to put Starlink ground stations in Google data centres. Related Coverage More

  • in

    What's the fastest Windows 10 web browser in 2021?

    The most important program on your PC is your web browser. Oh sure, your bread and butter work may be on QuickBooks, Photoshop, or Premiere Pro, but where do you find information or exchange emails? Answer: Your web browser. Heck, Google has proven that all you really need to do most work is the Chrome web browser on a Chromebook.  And, Microsoft wants you to move to the web-based Windows 365 Cloud PC. And, what do you need to get the most from your web browser? Speed, speed, and still more speed. 

    Web browser developers know this, so lately there’s been a lot of effort behind making them ever faster. So, who’s the fastest now?  I put the most popular Windows 10 browsers to the test. Here are our contenders in order of popularity. First comes Google Chrome 93. It’s easily the most popular web browser. Next up is Microsoft Edge 93, which recently switched to using Google’s open-source Chromium web browser. Today, except for Mozilla Firefox, all the web browsers that matter, such as Opera, Vivaldi and Brave, run on top of Chrome’s open-source base Chromium. Firefox, while declining in popularity, is the third-most popular Windows web browser.Believe it or not, Internet Explorer (IE) 11 is still hanging in there, coming in as the next-most popular Windows 10 web browser. However, even on my 2018 browser benchmarks, it was just awful. I took a quick look at it, and I decided that between Microsoft getting ready to retire it and its dreadful performance, I wouldn’t waste time benchmarking it. If you’re still using IE, just stop already. You’ll be better with anything else.Firefox was followed by Opera 78. This was originally a Norwegian-based browser, but it was acquired by a Chinese private-equity company in 2016. Next is Brave 1.29. This open-source browser’s owners claim to do the best job of protecting your privacy. Still, in 2020 they admitted to sharing default autocomplete answers with an affiliate cryptocurrency exchange. Finally, there’s Vivaldi 4.1. This was started by Opera expatriates, who missed the original Opera’s community and look-and-feel. Although all of these browsers, except Firefox, are clone brothers, they do not have the same performance. Each vendor has changed the Chromium code to make them quite different from each other. I benchmarked these browsers on my Windows 10 Beelink GTR7 Mini test PC. This runs Window 10 Pro May 2021 Update, version 21H1. It’s powered by a 4GHz AMD Ryzen 7 3750H processor. The CPU is backed by 16GB DDR4 RAM. For storage, it comes equipped with a 512GB NVMe SSD. It’s connected to the internet via my NETGEAR 8-Port Gigabit Ethernet Unmanaged Switch (GS108) and a Spectrum Gigabit cable connection, which really delivers just over 900 Megabits per second (Mbps) speeds. 

    With everything ready and the PC cleaned up of all non-essential software, it was time for testing.JetSteam 2First up was JetSteam 2.0, which is made up of 64 smaller tests. This JavaScript and WebAssembly benchmark suite focuses on advanced web applications. It rewards browsers that start up quickly, execute code quickly and run smoothly. Higher scores are better on this benchmark.Chrome won this competition easily with a score of 114.132. Opera, somewhat to my surprise, came in second with 105.95. Behind it was Edge with 103.774. Next was Vivaldi with 100.437, with a small lead over Brave’s 99.231. The real surprise, though, was Firefox with a dismal 73.208.Speedometer 2.0Speedometer is a newish web browser benchmark. Created by Apple’s WebKit team, it measures the responsiveness of JavaScript-based Web applications. To do this, it uses demo web applications to simulate user actions such as adding to-do items. Once more, higher scores are better on this test. Once more, Chrome comes out comfortably on top with a score of 124. Only Edge came relatively close to Chrome by scoring 109.1. Dropping way back, Chrome and Edge were followed by Opera at 99.3, and Firefox at 90.3. Then, there’s another considerable dropoff in performance to Vivaldi at 80.4 and Brave at 79.3.Kraken 1.1Next up: Kraken 1.1. This benchmark, which is based on the long-obsolete SunSpider, measures JavaScript performance. To this basic JavaScript testing, it added typical use-case scenarios. Mozilla, Firefox’s parent organization, created Kraken. With this benchmark, the lower the score in milliseconds (ms), the better the result.You would think that Firefox should ace this benchmark. It doesn’t. Chrome took first place here with 891.9 ms. Opera came in a distant second with 974.1 ms. Behind it came Edge at 1016.8ms Vivaldi at 1043.8 ms and Brave at 1059.2 ms in a logjam. Then, and only then, does Firefox make a last-place appearance with a pathetic 1279 ms.Octane 2.0Octane 2.0, Google’s JavaScript benchmark, is no longer supported, but it’s still a useful benchmark thanks to its scenario testing for interactive web applications. Octane is not Chrome-specific. For example, it tests how fast Microsoft’s TypeScript compiles itself. In this benchmark, the higher the score, the better.On this Google benchmark, Chrome took the blue ribbon with a score of 39,828. Behind it there’s a pile-up for second place with Opera at 37,789, Vivaldi at 36,417,  Brave with 37,072 and Edge with 37,019. Way, way back in last place, you’ll find Firefox with 20,014.WebXPRT 3.0The latest version of WebXPRT is the best browser benchmark available today. It’s produced by the benchmark professionals at Principled Technology This company’s senior staff were the founders of the Ziff Davis Benchmark Operation, the gold standard of PC benchmarking.WebXPRT uses scenarios created to mirror everyday tasks. These include Photo Enhancement, Organize Album, Stock Option Pricing, Local Notes, Sales Graphs, and DNA Sequencing. Here, the higher the score, the better the browser.On this benchmark, Firefox shines. It was an easy winner with a score of 213. Chrome took second place with 187. Then, there’s a pile-up from third through fifth place: Edge and Opera are in a dead tie for third with 178. They’re followed by Vivaldi at 170 and Brave at 165.HTML 5 web standardYou’d think by 2021, every browser would comply with the HTML 5 web standard, which became a standard in 2014. You’d be wrong. This “test” isn’t a benchmark. It just shows how close each browser comes to being in sync with the HTML 5 standard. A perfect score, which none got, would have been 550.For a real change of pace with web HTML compatibility, four of the browsers — Brave, Chrome, Vivaldi and Edge — scored 528. Opera, with 526, scored just below the quartet.  In last place was Firefox with 513.Final ResultsSo, which is really the fastest? It used to be a real mixed bag in my earlier browser tests, but these days Google Chrome has a solid lead over everyone else. The one exception was Firefox, which usually scored dead last, but did manage to snag a surprise win on the WebXPRT benchmark.I have other problems with Firefox, including both its management and its developers’ indifference to what Firefox users want from the browser. So for me, it’s an easy choice. The best, and largely the fastest, web browser is Chrome. If privacy is your top priority, however, keep looking.  Related Stories: More

  • in

    Apple releases update fixing NSO spyware vulnerability affecting Macs, iPhones, iPads and Watches

    Apple has released an urgent security update for Mac, iPhone, iPad and Watch users after researchers with Citizen Lab discovered a zero-day, zero-click exploit from mercenary spyware company NSO Group that gives attackers full access to a device’s camera, microphone, messages, texts, emails, calls and more.Citizen Lab said in a report that the vulnerability — tagged as CVE-2021-30860 — affects all iPhones with iOS versions prior to 14.8, all Mac computers with operating system versions prior to OSX Big Sur 11.6, Security Update 2021-005 Catalina and all Apple Watches prior to watchOS 7.6.2.

    ZDNet Recommends

    Apple added that it affects all iPad Pro models, iPad Air 2 and later, iPad 5th generation and later, iPad mini 4 and later, and iPod touch 7th generation. CVE-2021-30860 allows commands to be executed when files are opened on certain devices. Citizen Lab noted that the vulnerability would give hackers access without the victim even clicking anything. Citizen Lab previously showed that repressive governments in Bahrain, Saudi Arabia and more had used NSO Group tools to track government critics, activists and political opponents. Ivan Krstić, head of Apple Security Engineering and Architecture, told ZDNet that after identifying the vulnerability used by this exploit for iMessage, Apple “rapidly developed and deployed a fix in iOS 14.8 to protect our users.” “We’d like to commend Citizen Lab for successfully completing the very difficult work of obtaining a sample of this exploit so we could develop this fix quickly. Attacks like the ones described are highly sophisticated, cost millions of dollars to develop, often have a short shelf life, and are used to target specific individuals,” Krstić said. “While that means they are not a threat to the overwhelming majority of our users, we continue to work tirelessly to defend all our customers, and we are constantly adding new protections for their devices and data.”

    John Scott-Railton, a senior researcher at Citizen Lab, spoke out on Twitter to explain what he and Citizen Lab senior research fellow Bill Marczak found and reported to Apple. They found that the vulnerability has been in use since at least February. Apple credited them with discovering it. “Back in March my colleague Bill Marczak was examining the phone of a Saudi activist infected with Pegasus spyware. Bill did a backup at the time. A recent a re-analysis yielded something interesting: weird looking ‘.gif’ files. Thing is, the ‘.gif’ files…were actually Adobe PSD & PDF files…and exploited Apple’s image rendering library. Result? Silent exploit via iMessage. Victim sees *nothing,* meanwhile Pegasus is silently installed and their device becomes a spy in their pocket,” Scott-Railton explained.”NSO Group says that their spyware is only for targeting criminals and terrorists. But here we are…again: their exploits got discovered by us because they were used against an activist. Discovery is inevitable byproduct of selling spyware to reckless despots. Popular chat apps are the soft underbelly of device security. They are on every device and some have a needlessly large attack surface. Their security needs to be a *top* priority.”In a longer report about the vulnerability, Citizen Lab researchers said that it is the “latest in a string of zero-click exploits linked to NSO Group.” NSO Group has faced significant backlash globally after researchers discovered that governments, criminals and others were using its Pegasus spyware to tacitly track thousands of journalists, researchers, dissidents and even world leaders. “In 2019, WhatsApp fixed CVE-2019-3568, a zero-click vulnerability in WhatsApp calling that NSO Group used against more than 1,400 phones in a two-week period during which it was observed, and in 2020, NSO Group employed the KISMET zero-click iMessage exploit,” the researchers said.They said their latest discovery “further illustrates that companies like NSO Group are facilitating ‘despotism-as-a-service’ for unaccountable government security agencies.” “Regulation of this growing, highly profitable, and harmful marketplace is desperately needed,” they added. Reuters reported that since the concerns about NSO Group were raised publicly earlier this year, the FBI and other government agencies across the world have opened investigations into their operations. NSO Group is based in Israel, prompting the government there to kickstart its own investigation into the company. The company designed tools to specifically get around Apple’s BlastDoor defense that was implemented in iMessage to protect users. Ryan Polk, senior policy advisor with the Internet Society, told ZDNet that the Pegasus-NSO case is a proof point for the dire consequences posed by encryption backdoors. “The tools built to break encrypted communications inherently run the risk of falling into the wrong hands — placing all who rely on encryption in greater danger. Imagine a world where tools like Pegasus come built in every app or device — however, unlike now, companies have no option to remove them and all users are targeted,” Polk said. “End-to-end encryption keeps everyone safe, especially those from vulnerable communities — like journalists, activists, and LGBTQ+ community members in more conservative countries.”In 2016, cybersecurity company Lookout worked with Citizen Lab to discover Pegasus. Hank Schless, senior manager of security solutions at Lookout, said the tool has continued to evolve and take on new capabilities. It can now be deployed as a zero-click exploit, which means that the target user doesn’t even have to tap a malicious link for the surveillanceware to be installed, Schless explained, adding that while the malware has adjusted its delivery methods, the basic exploit chain remains the same. “Pegasus is delivered via a malicious link that’s been socially engineered to the target, the vulnerability is exploited and the device is compromised, then the malware communicated back to a command-and-control (C2) server that gives the attacker free reign over the device. Many apps will automatically create a preview or cache of links in order to improve the user experience,” Schless said. “Pegasus takes advantage of this functionality to silently infect the device.” He added that NSO has continued to claim that the spyware is only sold to a handful of intelligence communities within countries that have been vetted for human rights violations. But the recent exposure of 50,000 phone numbers linked to targets of NSO Group customers was all people needed to see right through what NSO claims, he added. “This exemplifies how important it is for both individuals and enterprise organizations to have visibility into the risks their mobile devices present. Pegasus is an extreme, but easily understandable example. There are countless pieces of malware out there that can easily exploit known device and software vulnerabilities to gain access to your most sensitive data,” Schless told ZDNet.  More

  • in

    Brazil debates creation of national strategy to tackle cybercrime

    Amid growing concerns about increasing threats in the cybersecurity space, the Brazilian government and the banking sector are discussing the creation of a strategy to address crime in digital environments. The president at the Brazilian Federation of Banks (FEBRABAN), Isaac Sidney, and the Minister of Justice and Public Security, Anderson Torres, have started negotiations for the creation of the National Cybercrime Strategy. The topic was discussed at a meeting at the association’s headquarters in São Paulo on Friday (6). According to FEBRABAN, the discussions around the new plan to tackle cybercrime will be informed by the experiences of the National Strategy Against Corruption and Money Laundering, which is led by the Ministry of Justice and has been in place since 2003.Under the new strategy, the idea will be to “expand the identification and repression” of the actors responsible for cybercrimes, the association said. Another goal is to expand the technical knowledge of the Brazilian security forces and “promote permanent cooperation between public and private agents.”The vision outlined by the banking association also includes the joint development of platforms for sharing fraud data by digital means, as well as supporting the training of security forces in cybersecurity and digital fraud issues and using the association’s cybersecurity laboratory. IThe plan would also include public awareness campaigns on cyber risks and fraud.

    According to German consultancy Roland Berger, Brazil currently ranks fifth in a ranking of the world’s main cybercrime targets. A survey carried out by the company shows that the country has exceeded the total number of ransomware attacks seen in 2020 in the first half of 2021, with 9.1 million occurrences. In the private sector, the level of preparedness to deal with cybercrime has been impaired by lack of investment: security teams are in place in less than a third of Brazilian organizations, even though most businesses frequently suffer attacks, recent research has found. Another study, published in February, suggests that most Brazilian companies have not increased their investments in information and cyber security since the Covid-19 pandemic emerged despite an increase in threats.

    Attacks targeted at Brazilian public sector organisations have also become increasingly common. Last November, a major cyberattack against the Brazilian Superior Electoral Court brought the Court’s systems to a standstill for over two weeks. More recently, the Brazilian National Treasury was the target of a ransomware attack.Brazil published its first National Information Security Policy, in 2018. The National Security Strategies for Cyber Security and Critical Infrastructure Security were published in 2020. In July, the Brazilian government created a cyberattack response network aimed at promoting faster response to cyber threats and vulnerabilities through coordination between federal government bodies. The Federal Cyber Incident Management Network will encompass the Institutional Security Office of the presidency as well as all bodies and entities under the federal governing administration. Public companies, mixed capital companies and their subsidiaries may become members of the network voluntarily. More