JudulBeritaDiposting
LA judge forces woman to unlock iPhone with fingerprint

Ever since Apple introduced Touch ID, privacy and legal experts have
been saying that biometric information such as fingerprints are like our
DNA samples or our voice imprints: they’re simply a part of us. They
don’t reveal anything that we know, meaning that they do

Selasa, 31 May 2016
Yahoo Releases Second Wave of Unsealed FISC Documents

In 2007, the U.S. government threatened to fine Yahoo $250,000 a day if
it failed to cooperate with a court request to hand over records of
extensive online communications by its users. Yahoo eventually complied,
but not before it fought hard in court not to do so, calling the r

Selasa, 31 May 2016
WhatsApp vs Telegram

The competition for the most secure instant messaging tool has been
running for years. It re-surfaced this month when WhatsApp announced it
has completed implementing end-to-end encryption. Curiously, in security
research circles, this has resulted in endless debates between Wha

Selasa, 31 May 2016
IT threat evolution in Q1 2016

Top 20 countries with the highest levels of computer infection

Country*    % of unique users**
1    Somalia    66.88%
2    Yemen    66.82%
3    Armenia    65.17%

Selasa, 31 May 2016
DARPA wants someone to build the DoD a new secure Blockchain based messaging platform

The United States Defense Advanced Research Projects Agency (DARPA) is
advertising for a business to assist it in building a secure messaging
app using distributed ledger (Blockchain) technology for the Department
of Defense (DoD).

An advertisement for the role appeared

Selasa, 31 May 2016
New Locky Ransomware Variant Implementing Changes in Communication Patterns

Recently, Check Point published a detailed report describing Locky, an
emerging new ransomware threat, which was first reported on February 16,
2016. New characteristics related to its communication have now been
observed in the wild.

In the past two weeks we have witnes

Kamis, 26 May 2016
China says tech firms pledge to counter online terror activities

Twenty-five Chinese technology companies have signed a pledge to
counter images and information online that promote terrorism, the
internet regulator said on Tuesday, months after China passed a
controversial new anti-terrorism law.

The Cyberspace Administration of China

Kamis, 26 May 2016
How Russia Works on Intercepting Messaging Apps

A few months ago, I wrote a post on SMS logins following a wave of
attacks attempting to take over Iranian Telegram accounts. Recently,
there have been new confirmed cases of attacks in both Iran and Russia.
...
Given the political activities of both targets, the most prob

Kamis, 26 May 2016
Hacking for ISIS: The Emergent Cyber Threat Landscape.

In the wake of the aforementioned Twitter takeover, which was claimed
by an ISIS-supportive hacking collective called the “Cyber Caliphate,”
two implications that would prove to further change an already evolving
jihadi landscape unfolded. Firstly, the hacking attack

Kamis, 26 May 2016
Twitter blocks US spy agencies from getting key terror alerts

In a pilot programme, Dataminr gave the US intelligence services an API
enabling them to download the data in real-time and do mass analysis.
But while it will continue offering this service to the corporate
security, financial and other industries, it has now turned away the sp

Kamis, 26 May 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: