News. Some true
US NSA and UK GCHQ ‘can spy on smartphones’. The US National Security Agency (NSA) is reported have cracked the security codes which protect data on iPhones, Blackberries and Android devices. German news weekly Der Spiegel says documents suggest the NSA and the British GCHQ made joint efforts to gather intelligence. Teams looked at each phone to crack its privacy codes, Der Spiegel said. Saturday saw thousands of demonstrators in Berlin demand that the NSA stop monitoring internet users. Apple’s iPhone privacy protection codes are reported to have been compromised Codes unlocked. The documents Spiegel has seen do not show whether or not there has been mass surveillance of phone use. Once the intelligence teams had unlocked the codes, agencies could read a user’s contacts and lists of who had been called. The BBC’s Steve Evans in Berlin says the reports do seem to indicate that the British and American security agencies have the ability to read private communications beyond what might have previously been thought possible – or desirable by those who fear the intrusion of the state.
No 10 denies David Cameron red box security breach. A Passenger photographed red box briefly left unattended as prime minister travelled by train. David Cameron: allegedly left red box unattended. Downing Street has rejected suggestions that David Cameron might have caused a security breach by briefly leaving his official ministerial red box unaccompanied on the table of a train carriage. A train passenger took a photograph of the red box, which was published by the Daily Mirror. The passenger told the paper: “It was just sitting there. I could probably have run off with it if I’d wanted to.” However, Downing Street insisted the box was not left unattended and that the security detail protecting the prime minister was there at all times. The photograph was taken on Saturday on a train from King’s Cross station in London to York, where Cameron attended his sister-in-law’s wedding. Guidance was issued in 1999 by junior minister Peter Kilfoyle that red boxes should be “effectively disguised” if it was necessary to carry them on public transport.
Grumman Corporation has been retained by the Defence Science and Technology Laboratory (Dstl) to carry out a further phase of development of the N.Guru Cyber Situational Awareness System, the software application for the visualisation of cyber events for decision makers. The research project awarded by Dstl will be carried out by Northrop Grumman in partnership with the Universities of Oxford and South Wales. This work is part of the MOD’s Cyber Research Programme and is developing concepts, tools and techniques to provide cyber situational awareness for users. “The ability to visualise cyber events in new ways will help create greater situational awareness and enable users to improve the speed and effectiveness of network defence decision making,” said Danny Milligan, sector managing director, Northrop Grumman Information Systems Europe. “This research and the resulting capability it produces will be a key enabler in helping the MOD to defend its digital assets intelligently and maintain its core business processes.” The N.Guru project will develop techniques for the monitoring and mitigation of detected risks through the use of visualisations that enhance situational awareness and facilitate decision support for cyber defence. It will also explore the impact that a cyber-threat could have on business processes, look for more widespread anomalies and known threat patterns, and provide information that enables operators to develop mitigation actions. Northrop Grumman in the U.K. has successfully supported a number of cyber research programmes following the commissioning of the Federated Cyber Range at its Fareham site in 2010. The company is also teamed with Finmeccanica for the NATO Computer Incident Response Capability, which is currently being rolled out to multiple NATO sites in Europe and North America.
Massive spike of Tor users caused by Mevade botnet. Researchers at Fox-IT found evidence that a recent spike in users of The Onion Router (TOR) anonymity network was due to a botnet known as Mevade.A, which may also go by the names “Sefnit” or “SBC.”
Obad Android trojan distributed via mobile botnets. The operators of the Obad mobile botnet have begun using four distribution methods to spread malware to mobile devices, including through a new method, dissemination via mobile botnet created by using another form of malware.