atans1

Posts Tagged ‘Cyber Security’

Why is China flooding S’pore with its “GPS” devices?

In Public Administration on 29/08/2019 at 10:40 am

The Chinese version of the Global Positioning System, better known as GPS, has overtaken the US original round the world. But kook at the number it has here: why?

Is it because unlike GPS, which only sends signals and cannot identify the location of receivers, BeiDou’s communications with the ground are two-way?

The Chinese version of the Global Positioning System (GPS) has overtaken GPS and the Nikkei Asian Review says

The growth of BeiDou has profound implications and is raising alarm in the US national security establishment. Unlike GPS, which only sends signals and cannot identify the location of receivers, BeiDou’s communications with the ground are two-way. According to Dean Cheng of the Heritage Foundation, the Chinese satellites can jam signals in specific areas and raise capabilities in cyber attacks.

S’poreans should be asking why the PAP govt is allowing this probable threat to national security. Don’t believe me? Mamaland and Japan, both rivals of China, also got a lot of these devices?

But maybe it all has to do with the use of Chinese-made smartphone handsets?

What do you think?

Related posts on how cock is our cyber security:

Memo to Paper General heading Computer Security Agency

MAS gives finger to CSA’s CEO

Infocomm Dysfunctional Authority

Cybersecurity: “Ownself hack ownself”

Why ang moh, Asean telcos love Huawei

And govt wants to encourage fintech?/ PAP is never wrong

 

Cybersecurity: “Ownself hack ownself”

In Public Administration on 13/02/2019 at 11:01 am

Given the cybersecurity problems at the Ministry of Health and Singhealth, time to “Ownself hack ownself”?

The Japanese are planning to do this (Remember Goh Cock Chok Tong’s exhortation to learn from the Japanese: Learn from Japanese — set example leh elites):

Japan gears up for mega hack of its own citizens
Unprecedented cyber attack on 200m internet enabled devices is designed to test the nation’s vulnerability

FT headline

FT reports that the experiment, which will run for five years and will be supervised by the Ministry of Internal Affairs and Communications. It is intended to focus on devices that fall into the broadly-defined category of “internet of things” (IoT). FT says, “anything from a yoga mat that informs a smartphone of your contortions, to remotely controlled factory robots” will be tested.

Well we could have our very own “Ownsef hack ownself”: the Computer Security Agency should try to hack the IT systems of govt and its agencies’ systems.

Had been tried yrs ago, sort of.

At the dawn of the internet age here, when one Lee Hsien Yang was CEO, Singtel tried, “without permission”, to access our PCs etc: “Testing if users got proper security leh”. There was public row and SingTel apologised.

And now Lee Hsien Yang is a hero of the cybernuts who wish the PAP and 70% of the voters ill. Juz because he and his tai kor no longer have pa to supervise them. They forgot he tried to do surveillance of S’poreans all those yrs ago.

Btw, when I saw u/m video of a much henpecked otter, I tot of Lee Hsien Yang. It’s alleged he got fierce sister and wife.

 

Why ang moh, Asean telcos love Huawei

In China, Telecoms on 13/02/2019 at 5:31 am

Cheap, good, great tech service. Also bespoke.

[European telcos] want to keep using the Chinese firm’s equipment because they like what it offers, not only in price but quality.

“They’ve two unique advantages,” says one technology chief. “They have significantly more engineers working on R&D than other suppliers and they are prepared to innovate for a specific customer. ”

Huawei’s main competitors are Nokia and Ericsson, but another telecoms operator says “they are seen universally as being well ahead of European vendors”.

The operators also believe that the Chinese competition is forcing the European rivals to up their game …

https://www.bbc.com/news/technology-47160725

Huawei is so good for them that they don’t really care about security?

They say they are fully aware of the security issues around Huawei. They have consulted the experts at the government’s National Cyber Security Centre (NCSC) during the procurement process.

Not only ang mohs prepared to sell out their countries to the Chinese:

Huawei is among the main providers of telecoms equipment for operators conducting 5G trials in the Philippines, Singapore, Malaysia and Thailand.

Industry sources say competitors can’t match Huawei on cost and technological capability.

[…]

One of Singapore’s major telcos M1 has partnered with Huawei to trial 5G services in the country.

Singapore’s telecoms regulator says operators should “ensure vendor diversity to mitigate risks from dependency on any one vendor”, again not banning Huawei outright.

https://www.bbc.com/news/business-47166921

Given the recent cybersecurity problems that we have been having, why are we doing biz with Huawei? So cheap and so gd that the PAP govt can ignore the links between Huawei and China? Is that the reason why the PAP govt refuses to name the country it thinks is behind the SingHealth hack?

Wonder if SingHealth used any Huawei eqpt?

 

Memo to Paper General heading Computer Security Agency

In Internet, S'pore Inc on 17/08/2018 at 11:19 am

From a Mr Happy

I avoid Intel and use AMD in my systems. I have found that the Ryzen processor family offers great performance with out the power consumption or heat output of its predecessors.

Putting my CTO hat on for a moment, in reality there are always holes in the security of both software and  hardware or exploits previously not considered. So keep things patched, keep security layers tight, stay on top the available information and do not get complacent because at that point you assume you are secure then you become vulnerable. It comes under two headings, security and managing your IT estate, if you fail to maintain your investment you will fall behind and be vulnerable. If you or your organisation does not have the knowledge get a professional in to conduct an audit and security sweep. Organisations are facing far more security vulnerabilities and threats than at any previous point in the technology revolution and many organisations are not managing it correctly.

Comment on FT article about latest Intel problem

Paper BG can cut and paste and pass off as his own genius at work. Like SMRT Neo juz cutting and pasting ang moh practice

Related post:

Is Computer Security Agency CEO talking thru his ass about stolen info?

Why Lim Tean should sit down and shut up

In Uncategorized on 03/08/2018 at 10:08 am

Lim Tean is now KPKBing about the Singhealth cyber breach, as are other cybernuts.

They should stop adding to climate change.

S’poreans are pragmatic. They know

The painful truth is that hacking is the price society pays for online convenience. It can be minimised, but never eliminated. Like stock theft, it will be normalised as a cost of business, because that is what it is.

Concluding para of Lex column in FT on why a bigger than initially reported breach of data from a UK listco has not affected its share price

Short of finding out that a senior SingHealth officer installed the malware (“An honest mistake”) or SingHealth used made-in China servers, the public accepts

that hacking is the price society pays for online convenience

And it’s a bit rich of Lim Tean to KPKB. He claims to have successfully raised money from the public for three projects. But then no picture, no sound: No, Lim Tean hasn’t absconded.

Which reminds me, one of the projects he raised money for was a video explaining how to avoid getting sued for defamation: S’poreans need this video. While he’s been making videos of himself KPKBing, the defamationvideo hasn’t appeared. He promised it for September and then November 2017.

It’s now August 2018. And he’s saying that the PAP is not delivering on anything. Pot calling kettke black.

MAS gives finger to CSA’s CEO

In Internet, Public Administration on 25/07/2018 at 11:00 am

Remember CSA’s CEO downplaying the loss of NRIC numbers etc (Is Computer Security Agency CEO talking thru his ass about stolen info?)?

Should you be worried?

In short, not really, said the authorities. CSA chief executive David Koh said the stolen information are “basic demographic data”.

Constructive, nation-building CNA

Well it’s now clear that the central bank for one thinks he’s talking cock

“With immediate effect, all financial institutions should not rely solely on the types of information stolen (name, NRIC number, address, gender, race, and date of birth) for customer verification,” MAS said in a statement.

“Additional information must be used for verification before undertaking transactions for the customer. This may include, for instance, One-Time Password, PIN, biometrics, last transaction date or amount, etc.”

 

 

Is Computer Security Agency CEO talking thru his ass about stolen info?

In Internet, Media, Public Administration on 22/07/2018 at 10:32 am

I went WTF when I read this from the constructive, nation-building CNA:

Should you be worried?

In short, not really, said the authorities. CSA chief executive David Koh said the stolen information are “basic demographic data”.

“We are watching to see if anything appears on the Internet both in the open and in some of the less well-known websites,” he added, noting that this has occasionally happened in past data breaches.

“But considering the type of data that’s been exfiltrated, it is – from our professional experience – unlikely that these will appear, because there is no strong commercial value to these types of data.”

Read more at https://www.channelnewsasia.com/news/singapore/singhealth-cyberattack-what-you-need-to-know-10549096

I repeat WTF. NRIC numbers were stolen as were names and addresses. Before this loss of info, we had been told by the PAP govt and private sector cyber security experts that the NRIC number is very important personal data and that when a criminal has access to our i/c number, address and name, lialat: could be vulnerable to all kinds of online crime. So this not true isit?

I had also read in an earlier CNA report

[C]ybersecurity expert, Mr Leonard Kleinman, pointed out that medical data contains a trove of information – from personally identifiable data to financial details – “that can be used to create a highly sought-after composite of an individual”.

Such pilfered data can fetch a high price on the dark Web, with each entry potentially selling for US$50 to US$100 more than stolen credit card data, said Mr Kleinman, who is the chief Cyber Security Advisor at RSA Asia Pacific and Japan.

“As it could contain any amount and level of information, healthcare institutions are among the most sought-after industries by criminals who can be motivated by a multitude of possible reasons,” he said.

The executive also cautioned that the fallout of such a hack may not be immediately felt either, as it could “take months” for the data to be first sold, then used.

“Given the nature of this attack, it is hard to say exactly what the end game is, especially when the attackers haven’t identified themselves,” Mr Kleinman added.

Darktrace Asia Pacific managing director Sanjay Aurora told Channel NewsAsia in an email that it can only speculate on the hacker’s motives, but medical information, like other kinds of personal data, can be easily monetised.

That said, beyond making a quick buck, Mr Aurora said a more “sinister reason” could be to cause widespread disruption and systemic damage to the healthcare service or to undermine trust in a nation’s competency to keep personal data safe.

Read more at https://www.channelnewsasia.com/news/singapore/singhealth-cyberattack-likely-nation-state-medical-data-price-10549372

So is the PAP govt downplaying the importance of the loss of info?

And if it is, why isn’t the constructive, nation-building media not signing from the same sheet?

Experiment that failed in Japan, being tried here

In Internet, Public Administration on 28/08/2016 at 4:24 am

It’s really hard to believe that Yaacob is an RI boy, I mean RI boys are supposed to be smart, not stupid. OK, OK I know he’s Minister for Communications and Information, Minister-incharge of Muslim Affairs and Minister in charge of Cyber Security. But Minister in charge of Cyber Security, ne’s trying out something here that failed in Japan.

William Saito, a special cyber security adviser to the Japanese government, said some Japanese companies had cut internet access in the past year, usually after a breach. “They cut themselves off because they thought it was a good idea,” he said, “but then they realised they were pretty dependent on this internet thing.”

https://www.theguardian.com/technology/2016/aug/24/singapore-to-cut-off-public-servants-from-the-internet

Let’s see if the PAP administration can succeed where the Japanese cos failed.