About Over 50 Articles Library
Content: Services - Computer
Computer Security No 33: FBI gets power to hack millions of computers globally
Corporate - Private Computer Security
FBI gets power to hack millions of computers globally
The US Supreme Court approved amendments to Rule 41 which gives judges the authority to issue search warrants for computers located in their jurisdiction and also outside of their jurisdiction..
The changes have significant consequences for the American citizens' privacy and the power of the government to conduct remote surveillance and searches.
The changes were approved in April 2016, but started to take effect after the 1st of December 2016.
FBI can now legally hack TOR users (free software that enables anonymous communication; also called the Onion router). Tor is used by legitimate users, but also by criminals.
This comes after in 2015 the FBI investigation in the Playpen child pornography site was thrown out of court because it had breached Rule 41.
Read more:- http://thehackernews.com
After failed auction, Shadow Brothers open NSA hacking tools for direct sales
Back in August this year, the Shadow Brothers hacked the NSA (National Security Agency in US) and asked for 1 million Bitcoins ($568 million US) in an auction to release the "best cyber weapons and files".
Kaspersky Labs described them as the most sophisticated threat actor, surpassing anything known in complexity of tools; they had been active for about two decades.
They now moved to selling the hacking tools directly to buyers one by one on ZeroNet, a decentralized Internet-like network for hosting websites using blockchain cryptography and BitTorrent technology.
The prices per piece range from $780 US to $78,000 US. Anyone, including a state-sponsored actor could buy the exploits for $780,000 US.
Course on Cyber Security & Privacy for Directors and Senior Managers
Are you prepared for an attack?
Are you aware of your obligations and defence as a director or officer of the companyt?
Have you taken the necessary steps to mitigate the consequences of a cyber attack?
The topics include:
- Define and understand Cyber security
- Identify Directors Cyber obligations in the Corporate Governance context
- Discuss Cyber risk management
- What can you do as a Director and what questions to ask
- Steps required to create a Cyber Strategy (Board level)
Send your enquiries to: - email@example.com
Moderated by Monica Schlesinger: www.advisoryboardsgroup.com.au
© About Over 50s 2017 website by aml websites online