Australia's second-largest city is set to receive the first satellite office of Oxford University's Global Cyber Security Capacity Centre (GCSCC). This opening was confirmed by signature thanks to the Victorian Minister for Small Business, Innovation, and Trade on Tuesday.
Signed by Phillip Dalidakis, he believes that the opening of this site will strengthen Victoria's commitment towards cybersecurity. At TweakTown we reported some weeks ago that security experts have long seen Australia as an easy target for hackers, explaining that a small team could take down important infrastructure such as power and water without too much effort. While Dalidakis explained that Victoria has cemented "the state's reputation as a hub for cybersecurity," as seen in a report by ZDNet, this move could also very much be one to help ensure safety should a hacker attack commence.
Further addressing this opening, Dalidakis stated that "Their [Oxford's] decision to locate their first Global Cyber Security Capacity Centre international office in Melbourne is a huge vote of confidence for Victoria's tech sector," with this office set to complete audits on national cybersecurity risks and discuss strategies in order to heighten security.
Some Twitter members have been issued official warning notices from Twitter due to possible "state-sponsored hackers" gaining access to information without approval, as reported by Gizmodo and Coldhak.
With the email being published on Twitter by Coldhak, it warned users that "Your Twitter account is one of a small group of accounts that may have been targeted by state-sponsored actors." Twitter assured everyone that they are "actively investigating the matter," in what is beleived to be the first name-and-shame hacker attack by a Government.
While also suggesting that some user accounts may have not been intended targets, Twitter warned that this hack may have been completed by people associated with the Government, stating "We believe that these actors (possibly associated with a government) may have been trying to obtain information such as email addresses, IP addresses, and/or phone numbers."
While members of the media and public are nicknaming these self-balancing skateboards (or E Boards) as hoverboards, we've seen the first recorded incident of what you could call 'new-age crime', spotted on Gizmodo.
This screenshot of a since-removed video shows a south-west London youngster stealing a package of Lucozade energy drink from a supermarket, smoothly riding his way out through the door without a care in the world.
Riding his LED board in and out of the frame is just about all that this video contained, apparently. Due to it being taken down we can't show you the whole thing, but above you will see a snap that Gizmodo was able to take before the London Metropolitan Police took it down.
A Twitter account with no profile photo and just over 2,000 followers called 'Cturt' has confirmed a Sony PlayStation 4 jailbreak success recently, telling the public that the "PS4 kernel exploit [is] finally working! Thanks to everyone involved!"
This jailbreak is said to enable a few interesting and helpful features, with CTurt explaining that this new breakthrough will enable users to "successfully dump RAM from other processes (like SceShellUI) using ptrace," further explaining that he will next be working on patching RAM.
While there is no posted guide, links or information as to how users can complete the same process on their consoles, there is a GitHub page of the same name, linked in the Twitter, where this information may surface in the near future. This news is exciting for developers looking at making custom firmware for the PlayStation 4, further opening up many other coding possibilities for community advancement of this device.
A recent hack and theft of Government files sent a US Government department into a frenzy in recent past, with further developments urging a spokesperson to inform the public that not every victim has or will be notified of this data breach just yet.
While the Government is meant to be notifying each victim of this breach from May 2014, around 7 percent of the 1.5 million people in danger are currently unable to be contacted. This is said to be due to them moving house or being without a Government-recorded address. Confirmed by the Office of Personnel Management, being the place that was hacked, this notification system is obviously not flawless.
The original hack was traced back to China but wasn't discovered or announced until one year after its occurrence, with the names, addresses, social security numbers and various other pieces of information about employees, contractors and job applicants being now in the hands of an unverified source.
Appointed as a representative for six major Hollywood studios, The Motion Picture Association of America (The MPAA) has published new anti-piracy guidelines, addressing how they are slightly loosening the noose on cinemas and more.
Set to target those who film movies while at the cinema, The MPAA is now telling these facilities that calling the cops on recorders is now an optional endeavor, previously ordering workers to call law enforcement immediately. While this policy is targeted mostly at handy cam users looking to leak movies on torrent websites, The MPAA has included recording devices of any kind, including Google Glass.
The MPAA previously implemented a $500 'bounty' to workers who caught and apprehended pirates looking to steal content, with this also being removed in the latest update. While a bounty was a good token in the first place, the removal of a 'bonus' will possibly breed a negative culture within the cinema employees.
VTech Holdings is a technology toy maker specializing in fun and educational wares for kids, and it's Learning Lodge app store was raided recently by hackers, stealing account information from the database within.
Although there hasn't been official confirmation from this company just yet, reports claim that 4.8 million accounts have been compromised, including some made by, for, or about children.
VTech was not aware of these attacks, with the breach happening on November 14, this company didn't know anything until asked by a reporter on November 23. While VTech states that it has put measures in place to stop this from happening again, the accounts compromised are encrypted with an outdated algorithm, leaving little hope of safety for those already hacked. In addition, the database contains information on 200,000 children, including first names, genders and birthdays.
Kaspersky Lab has reported that a group of approximately 20 Russian hackers has stolen $790 million recently. Around 70 percent of this money has come from individuals and businesses within USA and Europe since 2012, supplementing this income with the further 30 percent coming from Russian bank accounts.
Describing them as a highly organized and sophisticated syndicate, Intel Security's Mike Sentonas told News.com.au that "We've been tracking a lot of these groups for years now and they have such strong architecture it's hard to shut it down."
While hackers can be placed around the globe, Deakin University's Professor Mathew Warren claims that a major concentration of these criminals are located within Russia and the surrounding countries of Ukraine and Bulgaria.
While Dell recently admitted that a dangerous vulnerability was pre-installed on their systems, they refused to believe that it was created by them but still pledged to remove it.
In a great move my Microsoft, its Windows Defender security system has now begun locating and removing the certificate itself, as long as you've updated your Windows OS. Discovered by ZDNet in a routine action just this morning, Windows Defender identified a threat named "Win32/CompromisedCert.D" and removed it from the system.
Dell has reportedly started issuing updates to its maintenance utility to also rid this issue for all concerned, but it doesn't hurt to update Windows Defender to be safe.
"Malicious hackers already know us to be weaker than the rest of the world," the director of Hacklabs, Chris Gatford, told News.com.au in an interview. He believes that without much effort, Australia's water and electricity supply lines could become a complete shambles with a single hacker attack.
Gatford went on to draw the comparison between Australia's national infrastructure and your mothers Microsoft Surface, stating: "It would only take a skilled individual to breach these computer systems, because more often than not they are not patched as frequently as corporate or home systems which have automated updates." While he did comment mainly on security concerns within Australia, Gatford also made mention of other technical mishaps around the world, touching on "historical examples of traffic lights being overtaken, denial-of-service attacks at airports and organisations in Wall Street coming under attack to see its 100 per cent possible."
The whole situation isn't quite as dire as it may initially seem though, the Hacklabs director did reassure us that these necessary utilities would recover quickly from attack, rather than send Australia into a Fallout 4-like existence.