1. Net neutrality supported by telecom regulator TRAI for open internet
TRAI, India’s telecom regulator, has supported open and free internet by stating that internet service providers cannot discriminate on how people access web content. The TRAI authority upheld the concept of net neutrality and said no Internet Service Provider (ISP) can grant preferential data speeds or treatment to any web content.
2. Google Detects and Boots TIZI Spyware off Google play
The protection team of Google Play confirmed that it identified a new Android spyware called TIZI which affected several apps previously available in the Google Play marketplace. This discovery triggered a detailed investigation by Google who assured that the apps infected by TIZI malware are dated back in 2015. Recent samples of TIZI allowed an attacker to root a targeted device and steal sensitive data from apps such as Facebook, Twitter, WhatsApp, Viber, Skype, LinkedIn and Telegram. Specific geographies targeted were Kenya, Nigeria and Tanzania, Google said.
3. Newly Published Exploit Code used to spread Mirai variant
A research report from Qihoo 360 Netlab said that they are tracking a botnet activity associated with a different variant of Mirai botnet. 23 and 2323 ports are targeted on internet-connected devices made by ZyXEL Communications that are using default admin/ CentryL1nk and admin/ QwestM0dem telnet credentials. Post investigation, the researchers also confirmed that almost 100k unique scanner IPs came from Argentina.
4. Facebook might seek Photo Identity to confirm authenticity
To ensure account security of two billion users, Facebook might soon ask the users to upload their photos that clearly show their face to prove the authenticity. Facebook is testing a new type of captcha test that can recognize faces to check the actual users who are accessing their accounts. This latest development has been confirmed by the company already.
5. Risky Scripts Pose Threat to Web Surfers
A popular technique used by website operators to observe the keystrokes, mouse movements and scrolling behavior of visitors on Web pages is fraught with risk, according to researchers at Princeton’s Center for Information Technology Policy. The technique offered by a number of service providers uses scripts to capture the activity of a visitor on a Web page, store it on the provider’s servers, and play it back on demand for a website’s operators.
6. CaaS, IoT, Unmanaged Supply Chain Top ISF 2018 Global Security Threat Outlook
ISF (Information Security Forum) has recently announced their opinion for the top five global security threats that corporates might face in 2018. These include –
• Crime-As-A-Service (CaaS) Expands Tools and Services
• The Internet of Things (IoT) Adds Unmanaged Risks
• Supply Chain Remains the Weakest Link in Risk Management
• Regulation Adds to Complexity of Critical Asset Management
• Unmet Board Expectations Exposed by Major Incidents