Google has announced new settings for its two-step verification (2SV) functionality. If you have Google accounts it is recommended that you add this feature to protect yourself against the theft of personal information.
Digital currency Ethereum nose-dives after $50 million hack MarketWatch
Second Assailant Drains Ethereum Funds From The DAO NewsBTC
Detect, Disrupt, Deter: A Whole-of-Government Approach to National Security Cyber Threats – by John P. Carlin, Harvard Law School National Security Journal. Volume 7, Issue 2: “With increasing network intrusions affecting the U.S. government and American companies, and unsecured connectivity creating new vulnerabilities to cyber attacks, the United States is implementing a whole-of-government, all-tools approach to countering cyber threats.
*Tax convictions falling as technology traps criminals
Digital Disruption: What do governments need to do?
Intel Analyst at Tax Office on Covert operations against taxpayers exposed
Also in the Unfair Dismissal jurisdiction, the ATO have been criticised by the Fair Work Commission for dismissing someone for being a ‘square peg in a round hole’, in the case of Ron Shamir v Commonwealth of Australia (Australian Taxation Office) T/A Australian Taxation Office  FWC 1844. Commissioner Ryan held that despite the difficulties faced by the employee in achieving suitability for a new role that he was given, it was ‘harsh’ to dismiss someone for being a ‘square peg in a round hole’, especially when the employee was specifically hired to be a ‘square peg in a square hole.’ The employee was reinstated.
Corruption and crime syndicates threaten Australia's border security
A frustrated WA auditor general has warned he is seriously considering reversing his policy of not identifying the state government agencies with the weakest IT defences after they failed to improve their dismal cyber security postures. Last year, Murphy said his pentesters were able to break into two sensitive state government networks on their first go using the password ‘password’. In this year’s report, the results are even worse Password: WA Auditor General
Hackers Targeting Clinton Aides Struck Across U.S. Politics
- In re: Facebook Internet Tracking Litigation, case number 5:12-md-02314, in the U.S. District Court for the Northern District of California.
False Flags: The Kremlin’s Hidden Cyber Hand. “The Islamic State’s hacking army doesn’t actually work for ISIS—It’s part of the secret Russian online espionage effort against the West.”
NAB using Veda to track disloyal business customers going to rival banks
“Whether for emergency management and public health, reliable financial services or trusted access to education programs, the need for users to confirm the validity of official U.S. government digital platforms is critical. A challenge in embracing emerging startup and private sector platforms for public service is ensuring that citizens can trust the app used for official engagement is managed by the legitimate agency and not a unofficial source, phishing scam or malicious entity. The U.S. Digital Registry serves as the authoritative resource for agencies, citizens and developers to confirm the official status of social media and public-facing collaboration accounts, mobile apps and mobile websites. Data fields in the registry include the agency, platform, account, language, points of contact and collaborative tags.”
The BEC scam continues to grow, evolve, and target businesses of all sizes. Since January 2015, there has been a 1,300% increase in identified exposed losses.
The scam has been reported by victims in all 50 states and in 100 countries. Reports indicate that fraudulent transfers have been sent to 79 countries with the majority going to Asian banks located within China and Hong Kong…”
Kaspersky Lab, June 22, 2016: “Ransomware is a type of malware that, upon infecting a device, blocks access to it or to some or all of the information stored on it. In order to unlock either the device or the data, the user is required to pay a ransom, usually in bitcoins or another widely used e-currency. This report covers the evolution of the threat over the last two years…
- The total number of users who encountered ransomware between April 2015 and March 2016 rose by 17.7% compared to the previous 12 months (April 2014 to March 2015) – from 1,967,784 to 2,315,931 users around the world;
- The proportion of users who encountered ransomware at least once out of the total number of users who encountered malware rose 0.7 percentage points, from 3.63% in 2014-2015 to 4.34% in 2015-2016;
- Among those who encountered ransomware, the proportion who encountered cryptors rose dramatically – up 25 percentage points, from 6.6% in 2014-2015 to 31.6% in 2015-2016;
- The number of users attacked with cryptors rose 5.5 times, from 131,111 in 2014-2015to 718,536 in 2015-2016;
- The number of users attacked with Win-lockers decreased 13.03%, from 1,836,673 in 2014-2015 to 1,597,395 in 2015-2016…”
Hat tip: Catherine Rampell on twitter.
US Customs wants to collect social media account names at the border The Verge. Call or write your Congresscritter and object strenuously
How to protect the future web from its founders’ own frailty Boing Boing. Important for sites like NC
The Data Hoarders Motherboard
Exclusive: Google, Facebook quietly move toward automatic blocking of extremist videos | Reuters. Lambert: “It would be nice to have “extremist” defined