This memorandum sets forth requirements for National Security Systems (NSS) that are equivalent to or exceed the cybersecurity requirements for Federal Information Systems set forth within Executive Order 14028 of May 12, 2021 (Improving the Nation’s Cybersecurity), and establishes methods to secure exceptions for circumstances necessitated by unique mission needs. Executive Order 14028 establishes that the Federal Government must improve its efforts to identify, deter, protect against, detect, and respond to malicious cyber campaigns and their actors through bold changes and significant investments in cybersecurity.
Category: Cyber Security
Statement by NATO Council in solidarity with those affected by recent malicious cyber activities including Microsoft Exchange Server compromise-19/07/2021
We observe with increasing concern that cyber threats to the security of the Alliance are complex, destructive, coercive, and becoming ever more frequent. This has been recently illustrated by ransomware incidents and other malicious cyber activity, targeting our critical infrastructure and democratic institutions, as well as exploiting weaknesses in hardware and software supply chains.
Government has established Indian Cyber Crime Coordination Centre to provide a framework and eco-system to deal with cyber crimes
r. The Government has launched the National Cyber Crime Reporting Portal (www.cybercrime.gov.in), to enable public to report incidents pertaining to all types of cyber crimes, with a special focus on cyber crimes against women and children.
Cyber Threats to Elections: a Lexicon (2018)
This reference aid draws on CTIIC’s experience promoting interagency situational awareness and information sharing during previous significant cyber events—including cyber threats to elections. It provides a guide to cyber threat terms and related terminology issues likely to arise when describing cyber activity. The document includes a range of cyber-specific terms that may be required to accurately convey intelligence on a cyber threat event and terms that have been established by relevant authorities regarding technical infrastructure for conducting elections.
FBI and Private Sector: Battling the Cyber Threat Together-Christopher Wray-28/01/2021
At the FBI, we’ve been fighting the cyber threat for many years now. We began our early high-tech crime effort in the mid-1990s, and created our Cyber Division almost 20 years ago, in 2002. We’ve become known for our efforts to call out destabilizing and damaging cyber activity by nation-state actors, like the indictment last summer of two hackers working on behalf of the Chinese Ministry of State Security, stealing intellectual property from companies in the U.S. and around the world while also targeting dissidents who spoke out against the Communist Party.
Sec 69A of IT Act: Power to block data generation, transmission, stored or hosted in any computer.
Power to issue directions for blocking for public access of any information through any computer resource.
Govt Blocks 118 Mobile Apps to protect sovereignty, integrity and security of India
Government of India invoking it’s power under section 69A of the Information Technology Act read with the relevant provisions of the Information Technology (Procedure and Safeguards for Blocking of Access of Information by Public) Rules 2009 and in view of the emergent nature of threats has decided to block 118 mobile apps (see Appendix) since in view of information available they are engaged in activities which is prejudicial to sovereignty and integrity of India, defence of India, security of state and public order.
India`s power grid could be attacked by Chinese cyber-hijackers: The Sunday Guardian
India’s power grids are “highly” susceptible to cyber attacks from China, as the Sunday Guardian reported on Sunday. It stated that urgent action was required to be taken to isolate the critical part of the control rooms so that they were kept out of the reach of the hackers. The Indian power system, for planning and operational purposes, is divided into five regional grids, namely, Northern, Eastern, Western, North Eastern and Southern grids.
Avoid deception in online shopping
Tips to put into practice when making purchases: In case of need to buy a product, it is advisable to take a look at the product that is being promoted in the previous days and thus confirm that the discounts…
Sexual extortion via Net
Sexual extortion via Net The Police Department reports that new scams have been detected again, all linked to the same type of crime, linked to the sexual privacy of the complainants . Basically, extortion is that through the contact generated…
Alert of scams through web pages
Alert of scams through web pages On the Internet there are several platforms that contain advertisements of individuals, in which they offer the sale of a vehicle at an excessively low price, attaching photographs of a virtually new vehicle to…
Alert of kidnapping and encryption of computer data (Ransomware)
Alert of kidnapping and encryption of computer data Ransomware One has to remember the danger of the propagation of malicious software that once executed, encrypts the content of the computer and connected peripherals. Offenders demand payment in exchange for obtaining…
Read More Alert of kidnapping and encryption of computer data (Ransomware)
Basic Internet Security
Internet Security Introduction, types of attacks The universalization of the Internet and networks, and the great boom it has experienced thanks to the proliferation of broadband, poses a great challenge for home users who want to keep their computers safe.…
Banking phishing
The victim is redirected to a fake website similar to the impersonated service, where the user thinking he is on the official site, ends up filling out a form where he provides the same data he would have used on the actual website.
Indian Computer emergency response team
Cybersecurity wings under the government of India Cybersecurity in India affects both the public and the private sector and spans a broad range of issues related to Indian national security, whether through terrorism, crime or state and industrial espionage. E-crime,…