Site news

APPOINT CHIEF CYBER SECURITY OFFICER “TO CONTROL CYBERCRIME RISKS”AND USE “KALI LINUX” 2017.1 AND FEDORA 25 SECURITY LAB “FOR SECURITY AUDITING”

 
 
Picture of System Administrator
APPOINT CHIEF CYBER SECURITY OFFICER “TO CONTROL CYBERCRIME RISKS”AND USE “KALI LINUX” 2017.1 AND FEDORA 25 SECURITY LAB “FOR SECURITY AUDITING”
by System Administrator - Tuesday, 1 August 2017, 1:28 PM
 

By : M.S.Yatnatti: Editor and Video Journalist Bengaluru : New police chief and commissioer of Bengaluru Police T Suneel Kumar conceded on reportedly speaking to reporters that the police force is illequipped to deal with increasing cybercrimes, but said the problem was not unique to the country's IT capital alone ."Cybercrime is increasing across the world and in the country too. The police department is establishing a separate cyber cell in each police station across the state to tackle these cases. There needs to be renewed focus on training," Kumar said soon after taking charge.He said: "Special attention will be given to cyber security and we''ll train our personnel.We'll rope in experts from various fields to help us."

Demonetisation and the subsequent push for digitisation has reportedly escalated risks relating to cybercrime and reportedly India needs to urgently upgrade its defenses by setting up a cyber security commission on the lines of the Atomic Energy and Space Commissions, according to an IIT-Kanpur study shared with Parliament's committee on finance.Noting that the government has initiated a number of programmes to enhance the participation of citizens in the fully digitalised economy , the study said cyberse curity centres set up by the Reserve Bank of India (RBI) would be insufficient. "While RBI centres often come to IITs such as IIT-Kanpur for expert opinion, IITs do not engage in relevant research on cybersecurity," the study said. Incidents of cybercrime in India are rising sharply, recording an increase of over 100% in 2015 from 2014. The number grew from 71,780 in 2013 to 1.49 lakh in 2014 to 3 lakh in 2015. The study said attacks from the `Equation group' -which WikiLeaks reports said was a clandes tine CIA and NSA programme -infected India's telecom and military sectors and research institutes.The committee was briefed by Profs Manindra Agrawal and Sandeep Shukla from IIT-Kanpur (IIT-K). The study pointed out that since the government was pushing Aadhaar-based financial transactions, securing the Aadhaar database against unauthorised usage must be looked at carefully .It has come to light that certain banks were making hundreds of transactions on the Aadhaar numbers of unsuspecting citizens.

The experts said companies must have a chief cybersecurity officer and data systems should function on a need to know basis. Recent revelations about leakage of Aadhaar da ta and corresponding transaction data are serious concerns as government is integrating Aadhaar number to various services," the study said.Pointing out that post-demonetisation, digital wallets such as PayTM and BHIM gained prominence, last year also saw cyber attacks that compromised more than 3 million ATM and debit cards through Hitachi-engineered ATM machine hacking.The experts said a wider net needed to be cast by the Indian banking system and the government to engage cyber security experts from top institutes as advanced layer of protection was missing in most financial institutions. Quoting a report, the IIT-K experts said India may need $4 billion investment in the private-public model.In its recommendations, the experts said companies must have a chief cyber security officer and data systems should function on a need to know basis. The experts felt that existing cyber security frameworks like CERT-IN was inadequate as there were insufficient inter-disciplinary connections and the governmentprivate sector partnership was neither deep enough nor did it provide the required expertise.

Reportedly The Fedora Project is pleased to announce the immediate availability of Fedora 25, the next big step our journey into the containerized, modular future.Fedora is a global community that works together to lead the advancement of free and open source software. As part of the community's mission the project delivers three editions, each one a free, Linux-based operating system tailored to meet specific use cases: Fedora 25 Atomic Host, Fedora 25 Server, and Fedora 25 Workstation. Each edition is built from a common set of base packages, which form the foundation of the Fedora operating system. As with all new versions of Fedora, Fedora 25 provides many bug fixes and tweaks to these underlying components, as well as new and enhanced packages, including:Docker 1.12 for building and running containerized applications.Node.js 6.9.1, the latest version of the popular server-side JavaScript engine. Support for Rust, a faster and more stable system programming language.PHP 7, offering improved performance and reduced memory usage.Multiple Python versions -- 2.6, 2.7, 3.3, 3.4 and 3.5 -- to help run test suites across several Python configurations, as well as PyPy, PyPy3, and Jython.Reportedly Open source is making things easier for security professionals. But choosing software to check vulnerabilities still seems difficult for many developers.

Fedora Security Lab is an RPM-based distro. Kali Linux is Debian based Linux distribution.The Fedora Security Lab provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies in universities and other organizations.The spin is maintained by a community of security testers and developers. It comes with the clean and fast Xfce Desktop Environment and a customized menu that provides all the instruments needed to follow a proper test path for security testing or to rescue a broken system. The Live image has been crafted to make it possible to install software while running, and if you are running it from a USB stick created with LiveUSB Creator using the overlay feature, you can install and update software and save your test results permanently.

Kali Linux rolling distribution(2017.1) is a Debian based Linux distribution aimed at advanced penetration testing and security auditing including forensic and reverse engineering. Kali contains several hundred tools which are geared towards for various information security tasks such as penetration testing ,security research ,computer forensic and reverse engineering.Security of networks is very important .offensive security is best for defense. The latest release comes with updated packages and updated kernel that provide better hardware support .You can find complete documentation and the user guide at http://docs.kali.org The Kali Linux rolling distributionreleased. Kali switched to a rolling release model back when they hit version 2.0 (codename "sana”), however the rolling release was only available via an upgrade from 2.0 to kali-rolling for a select brave group. After 5 months of testing theirrolling distribution (and its supporting infrastructure), they were confident in its reliability - givingusers the best of all worlds - the stability of Debian, together with the latest versions of the many outstanding penetration testing tools created and shared by the information security community.The automated notification system of updated penetration testing tool releases has been working well over the past 5 months and has ensured that the kali-rolling repository always holds the latest stable releases of monitored tools. This usually leaves a gap of around 24-48 hours from notification of a new tool update, to its packaging, testing, and pushing into thier repositories. Theywould also like to introduce our new Kali Linux Package Tracker which allows you to follow the evolution of Kali Linux both with email updates and a comprehensive web interface.Kali Linux rolling distribution (2016.1) is a Debian based Linux distribution aimed at advanced penetration testing and security auditing including forensic and reverse engineering.Kali contains several hundred tools for various information security tasks including forensic and reverse engineering .Security of networks is very important .offensive security is best for defense .