News & Trends
2018-10-12  

Title:  WhatsApp spyware under development can get access to conversation and personal files
 

Author: BGR

 

Date: 28.09.18

 

Abstract: WhatsApp is currently the most popular messaging app used around the world. It has more than 1 billion active users that use it as their primary source for chatting with friends, sharing information, pictures, videos and even location. This also makes it quite the medium for hackers to spread spyware and other malicious apps, and now a new one that can go through your WhatsApp conversation is expected to join the list soon.

 

Source: https://www.bgr.in/news/whatsapp-spyware-under-development-can-get-access-to-conversation-and-personal-files/

2018-10-12  

Title: California just became the first state with an Internet of Things cybersecurity law
 

Author: Adi Robertson

 

Date: 28.09.18

 

Abstract: California Governor Jerry Brown has signed a cybersecurity law covering “smart” devices, making California the first state with such a law. The bill, SB-327, was introduced last year and passed the state senate in late August.

 

Starting on January 1st, 2020, any manufacturer of a device that connects “directly or indirectly” to the internet must equip it with “reasonable” security features, designed to prevent unauthorized access, modification, or information disclosure. If it can be accessed outside a local area network with a password, it needs to either come with a unique password for each device, or force users to set their own password the first time they connect. That means no more generic default credentials for a hacker to guess.

 

Source: https://www.theverge.com/2018/9/28/17874768/california-iot-smart-device-cybersecurity-bill-sb-327-signed-law

2018-10-12  

Title: Monero Launches Initiative to Combat Cryptocurrency Mining Malware

 

Author: Jack Mathis

 

Date: 30.09.18

 

Abstract: Earlier this week, the Monero (XMR) community announced the launch of a new website that aims to educate users on cleaning up crypto-jacking malware and ransomware.The ease of mining and privacy of Monero are standout features for the coin. However, the features attract bad actors who use the coin in malware.

 

Source: https://www.ccn.com/monero-launches-initiative-to-combat-cryptocurrency-mining-malware/

2018-10-12  

Title: Cyberattacks Are Becoming A Greater Challenge For The Energy Industry

 

Author: Jean-Marc Ollagnier, Forbes

 

Date: 01.10.2018

 

Abstract: In a world increasingly connected by technology, we’re seeing more reports of cyberattacks on oil and gas and other energy-related industries as the number of entry points for hackers increases. Indeed, the U.S. Department of Homeland Security recently reported that Russian hackers had made it into the control rooms of U.S. electric utilities, gaining access to potentially cause harm to U.S. critical infrastructure.

 

Source: https://www.forbes.com/sites/jeanmarcollagnier/2018/10/01/the-next-cyberattack-staying-ahead-of-hackers-is-becoming-a-greater-challenge/#50a133a74f0f

 

more
VFAC Review
no image
2017-01-24
 
The VFAC Review is a bimonthly multi-disciplinary review of the issues and trends in cybercrime.

Issue 12 contains information on:

  • Conferences and Events
  • News & Trends
  • Recent Publications


Articles on:

  • A Geneva Convention or Declaration for Cyberspace
  • Cyber Conflict and Retribution: Uncertainties in the Dark


more
Book Review
no image
2018-09-07

Title: A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism
 

Authors: Maurice Dawson

 

Date: June 2018

 

Abstract: Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the world. This chapter discusses emerging laws, policies, processes, and tools that are changing the landscape of cyber security. This chapter provides an overview of the research to follow which will provide an in depth review of mobile security, mobile networks, insider threats, and various special topics in cyber security.

 

DOI: 10.4018/978-1-5225-5634-3.ch010

more