SECURITY NEWS

On Snowden Anniversary, Microsoft Calls for Surveillance Reform

  • Selasa, 24 Jun 2014
  • Penulis: Michael Mimoso, ThreatPost

"On the anniversary of the first news reports on NSA surveillance, Microsoft general counsel Brad Smith seized the opportunity to draw a line in the sand with the U.S. government...

Selengkapnya

Man Fined $6,400 for XSS Attack on Singapore President's Website

  • Selasa, 24 Jun 2014
  • Penulis: Eduard Kovacs, Security Week

"A Singaporean man has been fined $6,400 for launching a cross-site scripting (XSS) attack on the official website of Istana, the residence and office of the President of Singapore, back in November 2013...

Selengkapnya

Vodafone puts out wide-ranging transparency report, hinting at secret surveillance programs

  • Senin, 23 Jun 2014
  • Penulis: David Meyer, Gigaom

"The carrier group has published a very lengthy and reasonably detailed breakdown of its interactions with law enforcement and spy agencies, covering 29 countries where its operators have faced metadata and wiretap requests...

Selengkapnya

Spammer sprung to run Russian national payment system

  • Selasa, 17 Jun 2014
  • Penulis: Darren Pauli, The Register

"Russia has reportedly hired a man to develop its national payments system, days after the alleged mastermind of one of the country's biggest pharmacy spam networks was granted early parole. The criminal allegations following Pavel Vrublevsky were prodigious but were largely denied or unconfirmed by the 35 year-old Moscow native...

Selengkapnya

Going Beyond PCI Compliance (interview with Ellen Richey, chief legal officer and enterprise risk officer at Visa)

  • Selasa, 17 Jun 2014
  • Penulis: Megan Goldschmidt, Bank Info Security

"Ellen Richey, chief legal officer and enterprise risk officer at Visa, says card issuers, retailers, payments processors and others handling card data must go beyond PCI compliance if they expect to effectively fight fraud. "There are already best practices out there that go beyond the technical side of PCI," Richey says in an interview with Information Security Media Group (transcript below). Those best practices include guidelines and recommendations related to the need for wider adoption of chip cards, such as those that conform to the Europay, MasterCard, Visa standard, tokenization and end-to-end encryption...

Selengkapnya

Navy Puzzle Challenge Blends Social Media, Cryptology

  • Selasa, 17 Jun 2014
  • Penulis: Kathleen Hickey, GCN via DFI News

"The Navy recently announced the winners of its cryptology puzzle game challenge: ?Project Architeuthis.? The puzzle, consisting of daily clues posted on Facebook, targets the cryptology technician community and was an attempt to raise awareness of the Information Dominance Corps. The challenge calls on Navy cryptology technicians to collect and analyze encrypted electronic communications, jam enemy radar signals, decipher information in foreign languages, maintain the state-of-the-art equipment, and defend and analyze networks...

Selengkapnya

Snowden: I Wasn’t a ‘Low-Level’ Employee at NSA

  • Selasa, 17 Jun 2014
  • Penulis: Marina Koren, National Journal via DefenseOne

"Snowden had more responsibility at the NSA than people may think, he said. “I was what’s called a systems administrator or a superuser, which means that I had more access than almost any other official in the intelligence community,” he said. “Because even the director of the National Security Agency or the Central Intelligence Agency or any of these things, when they want to see some documents, when they want to understand some program, they have to ask someone: ‘Show me this, tell me about this, brief this for me...

Selengkapnya

Probably the Best Free Security List in the World

  • Selasa, 17 Jun 2014
  • Penulis: Ako, Gizmo's Freeware

"This article contains a comprehensive list of free security-related programs or web applications for Windows XP and later Windows PC-based operating systems. The few non-free programs on this list are included because they are of high merit (in our opinion) and lack a comparable free alternative. This list also includes links to webpages that contain security-related information...

Selengkapnya

Firefox is going to implement Audio and Video calling feature between two Browsers

  • Senin, 16 Jun 2014
  • Penulis: Wagas, Hack Read

"Mozilla has announced that the company will soon launch its new version Firefox Nightly, which will have open source and Peer-to-peer communication protocol named WebRTC. This WebRTC will enable Real Time communication between two-web browsers with JavaScript APIs. ..."

Selengkapnya

List of Damage under #OpWorldCup and Anonymous’ target List of Sponsors

  • Senin, 16 Jun 2014
  • Penulis: Praveen Kashyap, Hackers News Bulletin

"Hackers dubbed this operation “#OpWorldCup,” you can also find many related tweets to the event through searching for the following Hash-tags: #tangodown, #Anonymous, #Brazil and #Worldcup..."

Selengkapnya

Pemantauan Trafik Internet Nasional

Laporan pemantauan trafik internet nasional dengan menampilkan laporan trafik mingguan, trafik bulanan dan trafik tahunan.

Peringatan Ancaman Keamanan & Kerentanan Sistem

Kumpulan arikel tentang peringatan dini ancaman keamanan dan kerentanan sistem.

Security News

Kumpulan berita tentang keamanan siber atau IT.

Laporan Insiden

Id-SIRTII/CC menerima pelaporan insiden dari publik untuk kemudian dilakukan koordinasi kepada pihak-pihak yang berkepentingan.