Discount Offers

Farb Gel UK Legal Self Defence Spray Personal Security Protection, Legal CS alt

£8.99
End Date: Monday Jun-26-2017 12:07:14 BST
Buy It Now for only: £8.99
Buy It Now | Add to watch list

Armband ID SIA License Holder Bulk Buy x 100

£144.00
End Date: Sunday Jul-2-2017 21:52:54 BST
Buy It Now for only: £144.00
Buy It Now | Add to watch list

Personal Self Defence Spray UK's No1 Spray Legal Pepper Spray Clone UK Sale Only

£19.99
End Date: Friday Jul-21-2017 10:46:38 BST
Buy It Now for only: £19.99
Buy It Now | Add to watch list

Tactical ID Arm Band Security ID Badge Card Holder Doorman Armband SIA New

£2.49
End Date: Friday Jun-30-2017 11:47:24 BST
Buy It Now for only: £2.49
Buy It Now | Add to watch list
0024264
Visit Today : 1
Visit Yesterday : 1
This Month : 24
This Year : 175
Total Visit : 24264
Hits Today : 6333
Total Hits : 2342270
Who's Online : 1

china

Kromek’s DS3-ID security devices used on Trump’s visit to Brussels

Kromek Group PLC1 (LON:KMK2) has picked up some useful publicity with the news its radiation technology has been used at high profile political events.

Kromek s next generation standalone radiation detector, D3S-ID, was deployed by the European Commission s Counter Terrorism Unit of Directorate General for Home Affairs in Brussels.

The D3S-ID was part of security operations deployed during the NATO Security Summit and the US President, Donald Trump’s visit to Brussels last month, Kromek revealed.

Kromek was informed that the deployment was successful and its radiation detection systems performed well and met the desired high standards for accuracy and efficiency.

“We were pleased that the deployment was successful and that our detectors achieved the necessary high standards .

We look forward to continuing our work with the European Commission, DARPA and other national law enforcement agencies to deploy our best-of-breed radiation detectors to protect people and property,” said Dr Arnab Basu, chief executive officer of Kromek.

READ Kromek predicts ‘step-change’ in revenue growth as demand for detectors builds3

References

  1. ^ Kromek Group PLC (www.proactiveinvestors.co.uk)
  2. ^ LON:KMK (www.proactiveinvestors.co.uk)
  3. ^ Kromek predicts ‘step-change’ in revenue growth as demand for detectors builds (www.proactiveinvestors.co.uk)

China cyber-security law will keep citizens’ data within the Great Firewall

China’s new cyber-security laws, which come into effect on Thursday, may make it harder for foreign businesses to trade in the country. Under the regulations1, data on Chinese citizens including personal information, salary details and more can only be kept within China . The law would also prevent the transmission of any economic, scientific or technological data overseas on either national security or public interest grounds, as defined by the Chinese government. The rules apply to any “network operator” a term that encompasses social media companies and large internet firms and mean that they need users’ permission before transferring any data on them outside the country . The consequences for businesses that fail to comply with this new law are dire: a refused or revoked licence can never be reversed .

This means if companies that fail to comply with the so-called Bei’an licence laws2 are liable to get blacklisted. Bill Hagestad, a former US Marine Corps lieutenant colonel turned cyber conflict author and researcher, told El Reg that the new rules reflect heightened concern in Beijing about foreign influence mediated through the internet.

“The new Chinese internet security law is designed to protect the cyber borders of China against foreign negative influences,” Hagestad said. “It is also designed to ensure the Communist Party ideals are not directly or indirectly challenged by impure thoughts.

“Given the release of the Shadow Brokers’ NSA tools, the Chinese are now more certain than ever before that any foreign technology brought into the Middle Kingdom must be inspected and deemed pure/free from any vulnerabilities that could challenge China’s internet security.”

Alex Nam, EMEA managing director of content delivery network CDNetworks, warned that foreign internet companies will now find it harder to trade in China.

“The new cybersecurity law on 1 June will make it harder for non-Chinese businesses to trade in the country,” Nam said. “All businesses that host websites and web content (such as applications) in China will be affected . Yet many don’t know what impact the law has on them or whether their business is in jeopardy.

“Thousands of government officials, as well as intelligent algorithms, are currently investigating whether non-Chinese companies meet all of the requirements of the new legislation . The new law has a huge impact on network operators and critical information infrastructure operators because they host websites in China on behalf of other companies . As a result, checks are being carried out to determine whether hosting providers and content delivery network (CDN) providers have the necessary licences, and are being asked by government officials to make the necessary changes in the shortest possible time.”

CDNetworks says it’s seeing “uncertainty from companies as to whether they are affected by the legislation”.

“Without support and guidance, UK businesses are putting themselves at risk,” Nam added. “Especially the UK businesses operating in China, who are completely unaware that this new law even impacts them.”

Sponsored: State of Malware Report 20173

References

  1. ^ regulations (www.reddragon1949.com)
  2. ^ Bei’an licence laws (www.cdnetworks.com)
  3. ^ State of Malware Report 2017 (go.theregister.com)

Cyber attack’s spread slows; security stocks gain

By Guy Faulconbridge and Dustin Volz12 | LONDON/WASHINGTON

LONDON/WASHINGTON The global WannaCry “ransomware” cyber attack spread more slowly on Monday with no major infections reported, as attention shifted to investment and government policy implications of lax cyber security.

There were 213,000 infected machines in 112 countries as of 1000 GMT on Monday, according to Czech security firm Avast, making it one of the largest coordinated attacks to hit computers across the world.

The countries most affected by WannaCry were the same as Friday: Russia, Taiwan, Ukraine and India, Avast’s data showed.

The number of infections has fallen dramatically since Friday s peak when more than 9,000 computers were being hit per hour . By afternoon on the U.S East Coast, new infections had fallen to the low hundreds of machines and continue to decline, Avast said.

Earlier on Monday, Chinese traffic police and schools reported they had been targeted as the attack rolled into Asia for the new work week, but no there were no major disruptions.

Authorities in Europe and the United States turned their attention to preventing hackers from spreading new versions of the virus.

Tom Bossert, U.S . President Donald Trump’s homeland security adviser, said people “should be thinking about this as an attack that for right now we have under control, but as an attack that represents an extremely serious threat,” speaking on ABC’s “Good Morning America” show.

Shares in firms that provide cyber security services jumped on the prospect of companies and governments spending more money on defenses, led by Israel’s Cyren Ltd (CYRN.O) and U.S . firm FireEye Inc (FEYE.O)..

Cisco Systems (CSCO.O) rose 2.8 percent, making it the leading gainer in the Dow Jones Industrial Average, which was up more than 100 points in afternoon trading, as investors focused more on opportunities the attack presented rather than the risk it posed to corporations.

The perpetrators of the attack are still not known . Bossert said that while U.S . officials had not ruled out the possibility that it was a “state action,” he said it appeared to be criminal, given the ransom requests.

Some victims were ignoring official advice and paying the $300 ransom demanded by the cyber criminals to unlock their computers, which was due to double to $600 on Monday for computers hit by Friday’s first wave.

So far only a few victims of the attack appeared to have paid, based on publicly available bitcoin accounts on the web, where victims have been instructed to pay.

The initial ransom demand was $300 per machine . Three days after becoming infected the demand doubles . Starting on Monday, the first victims began facing demands of $600 to unlock their machines.

This coming Friday, victims face being locked out of their computers permanently if they fail to pay the $600 ransom, said Tom Robinson, co-founder of Elliptic, a London-based private security company that investigates ransomware attacks.

As of 1400 GMT, the total value of funds paid into anonymous bitcoin wallets the hackers are using stood at just $55,169, from 209 payments, according to calculations made by Reuters using publicly available data.

Brian Lord, managing director of cyber and technology at cyber security firm PGI, said victims had told him “the customer service provided by the criminals is second-to-none,” with helpful advice on how to pay: “One customer said they actually forgot they were being robbed.”

Companies and governments spent the weekend upgrading software to limit the spread of the virus . Monday was the first big test for Asia, where offices had already mostly been closed for the weekend before the attack first arrived.

Renault-Nissan (RENA.PA) (7201.T) said output had returned to normal at nearly all its plants . PSA Group (PEUP.PA), Fiat Chrysler (FCHA.MI), Volkswagen (VOWG_p.DE), Daimler (DAIGn.DE), Toyota (7203.T) and Honda (7267.T) said their plants were unaffected.

British media were hailing as a hero a 22-year-old computer security whiz who appeared to have helped stop the attack from spreading by discovering a “kill switch” – an internet address which halted the virus when activated.

Individual European countries and the United States saw infections at a rate of only 10 percent to 20 percent of the most affected countries, according to the researcher who stumbled on the kill switch.

The virus hit computers running older versions of Microsoft Corp (MSFT.O) software that had not been recently updated . Microsoft released patches last month and on Friday to fix a vulnerability that allowed the worm to spread across networks . The company’s shares were down about 1 percent on Monday, in a slightly higher broad market.

Infected computers appear to be largely out-of-date devices . Some have also been machines involved in manufacturing or hospital functions, difficult to patch without disrupting operations.

Graphic on cyber attack tmsnrt.rs/2qIUckv3

POLITICAL TOPIC

The U.S . Senate Intelligence Committee is monitoring the attack and expects to receive a briefing in the coming days from the Trump administration, a panel aide said.

In a blog post on Sunday, Microsoft President Brad Smith confirmed what researchers had already widely concluded: the attack made use of a hacking tool built by the U.S . National Security Agency that had leaked online in April.

He poured fuel on a long-running debate over how government intelligence services should balance their desire to keep software flaws secret – in order to conduct espionage and cyber warfare – against sharing those flaws with technology companies to better secure the internet.

Russian President Vladimir Putin, noting the technology’s link to the U.S . spy service, said it should be “discussed immediately on a serious political level.”

“Once they’re let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators,” he said.

In Britain, where the virus first raised global alarm when it caused hospitals to divert ambulances on Friday, it gained traction as a political issue just weeks before a general election . The opposition Labour Party accused the Conservative government of leaving the National Health Service (NHS) vulnerable.

“The government’s response has been chaotic,” the British Labour Party’s health spokesman Jon Ashworth said. “If you’re not going to allow the NHS to invest in upgrading its IT, then you are going to leave hospitals wide open to this sort of attack.”

Britain’s NHS is the world’s fifth-largest employer after the U.S . and Chinese militaries, Wal-Mart Stores and McDonald’s . The government says that under a previous Labour administration the trusts that run local hospitals were given responsibility to manage their own computer systems.

Asked if the government had ignored warnings over the NHS being at risk from cyber attack, Prime Minister Theresa May told Sky News: “No . It was clear (that) warnings were given to hospital trusts.”

British health minister Jeremy Hunt said on Monday it was “encouraging” that a predicted second spike of attacks had not occurred, but the ransomware was a warning to public and private organizations.

ASIA IMPACT

China appeared over the weekend to have been particularly vulnerable, raising worries about how well the world’s second-largest economy would cope . However, officials and security firms said the spread was starting to slow.

“The growth rate of infected institutions on Monday has slowed significantly compared to the previous two days,” said Chinese Internet security company Qihoo 360.

An official from Cybersecurity Administration China (CAC) told local media on Monday the ransomware had affected industry and government computer systems but the spread was slowing.

Energy giant PetroChina (601857.SS) said payment systems at some petrol stations were hit although it had restored most of the systems.

Elsewhere in Asia, Conglomerate Hitachi Ltd (6501.T) said the attack had affected its systems over the weekend, leaving them unable to receive and send emails or open attachments in some cases.

At Indonesia s biggest cancer hospital, Dharmais Hospital in Jakarta, attacks affected scores of computers . By late morning, some people were still manually filling out forms, but 70 percent of systems were online.

India’s government said it received only a few reports of attacks and urged those hit not to pay any ransom . No major Indian corporations reported disrupted operations.

(Additional reporting by Cate Cadell, Jemima Kelly, Eric Auchard and Tim Ahmann; Writing by Peter Graff and Nick Zieminski; Editing by Peter Millership and Bill Rigby)


References

  1. ^ Guy Faulconbridge (uk.reuters.com)
  2. ^ Dustin Volz (uk.reuters.com)
  3. ^ tmsnrt.rs/2qIUckv (tmsnrt.rs)