Site news

TO CONTROL CYBERCRIME USE “KALI LINUX” 2017.1 AND FEDORA 25 SECURITY LAB AND BACKBOX LINUX- 5 “FOR SECURITY AUDITING”

 
 
Picture of System Administrator
TO CONTROL CYBERCRIME USE “KALI LINUX” 2017.1 AND FEDORA 25 SECURITY LAB AND BACKBOX LINUX- 5 “FOR SECURITY AUDITING”
by System Administrator - Friday, 29 September 2017, 2:13 PM
 

By : M.S.Yatnatti: Editor and Video Journalist Bengaluru : Prevention is always better than cure. It is always better to take certain precaution while operating the net.Cyber crime refers to any criminal activity that takes place over the Internet. Examples include fraud, malware such as viruses, identity theft and cyber stalking. Never open suspicious documents. Don't give out personal information to people you don't know. And be wary when approached with a suspicious proposition. You can also configure your computer to stop potential cyber criminals from gaining access to sensitive information. Use strong passwords on your accounts that are difficult to guess. Include both letters and numerals in your passwords. Never use a word that is easy to guess -- like your wife's name. Precaution, Prevention, Protection, Preservation and Perseverance for online security. Website owners should watch traffic and check any irregularity on the site. Putting host-based intrusion detection devices on servers will serve the purpose. It is not possible to eliminate cyber crime from the cyber space. It is quite possible to check them. History is the witness that no legislation has succeeded in totally eliminating crime from the globe. The only possible step is to make people aware of their rights and duties and to guard ourselves so that crime has no effect on us.

The experts said companies must have a chief cyber security officer and data systems should function on a need to know basis. Recent revelations about leakage of Aadhaar da ta and corresponding transaction data are serious concerns as government is integrating Aadhaar number to various services," the study said.Pointing out that post-demonetisation, digital wallets such as PayTM and BHIM gained prominence, last year also saw cyber attacks that compromised more than 3 million ATM and debit cards through Hitachi-engineered ATM machine hacking.The experts said a wider net needed to be cast by the Indian banking system and the government to engage cyber security experts from top institutes as advanced layer of protection was missing in most financial institutions. Quoting a report, the IIT-K experts said India may need $4 billion investment in the private-public model.In its recommendations, the experts said companies must have a chief cyber security officer and data systems should function on a need to know basis. The experts felt that existing cyber security frameworks like CERT-IN was inadequate as there were insufficient inter-disciplinary connections and the governmentprivate sector partnership was neither deep enough nor did it provide the required expertise. New police chief and commissioer of Bengaluru Police T Suneel Kumar conceded on reportedly speaking to reporters that the police force is illequipped to deal with increasing cybercrimes, but said the problem was not unique to the country's IT capital alone ."Cybercrime is increasing across the world and in the country too. The police department is establishing a separate cyber cell in each police station across the state to tackle these cases. There needs to be renewed focus on training," Kumar said soon after taking charge. He said: "Special attention will be given to cyber security and we''ll train our personnel.We'll rope in experts from various fields to help us.".The corporate need to appoint chief information security officers to control cyber crime risks.Demonetisation and the subsequent push for digitisation has reportedly escalated risks relating to cybercrime and reportedly India needs to urgently upgrade its defenses by setting up a cyber security commission on the lines of the Atomic Energy and Space Commissions, according to an IIT-Kanpur study shared with Parliament's committee on finance.Noting that the government has initiated a number of programmes to enhance the participation of citizens in the fully digitalised economy , the study said cyberse curity centres set up by the Reserve Bank of India (RBI) would be insufficient. "While RBI centres often come to IITs such as IIT-Kanpur for expert opinion, IITs do not engage in relevant research on cybersecurity," the study said. Incidents of cybercrime in India are rising sharply, recording an increase of over 100% in 2015 from 2014. The number grew from 71,780 in 2013 to 1.49 lakh in 2014 to 3 lakh in 2015. The study said attacks from the `Equation group' -which WikiLeaks reports said was a clandes tine CIA and NSA programme -infected India's telecom and military sectors and research institutes.The committee was briefed by Profs Manindra Agrawal and Sandeep Shukla from IIT-Kanpur (IIT-K). The study pointed out that since the government was pushing Aadhaar-based financial transactions, securing the Aadhaar database against unauthorised usage must be looked at carefully .It has come to light that certain banks were making hundreds of transactions on the Aadhaar numbers of unsuspecting citizens.

BackBox Linux-5 Arrived : it is a penetration testing and security assessment oriented Linux distribution . Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories that are constantly updated to the latest stable version of the most popular and best known ethical hacking tools.BackBox is more than an operating system, it is a Free Open Source Community project with the aim to promote the culture of security in IT environment and give its contribute to make it better and safer. All this using exclusively Free Open Source Software by demonstrating the potential and power of the community. BackBox Linux is an Ubuntu-based distribution designed for penetration testing and security evaluations. The Backbox distribution is designed to be fast and easy to use with a wide collection of security utilities. It provides a minimal yet complete desktop environment The BackBox project has announced the release of a new version, BackBox 5.Reportedly The Fedora Project is pleased to announce the immediate availability of Fedora 25, the next big step our journey into the containerized, modular future.Fedora is a global community that works together to lead the advancement of free and open source software. As part of the community's mission the project delivers three editions, each one a free, Linux-based operating system tailored to meet specific use cases: Fedora 25 Atomic Host, Fedora 25 Server, and Fedora 25 Workstation. Each edition is built from a common set of base packages, which form the foundation of the Fedora operating system. As with all new versions of Fedora, Fedora 25 provides many bug fixes and tweaks to these underlying components, as well as new and enhanced packages, including:Docker 1.12 for building and running containerized applications.Node.js 6.9.1, the latest version of the popular server-side JavaScript engine. Support for Rust, a faster and more stable system programming language.PHP 7, offering improved performance and reduced memory usage.Multiple Python versions -- 2.6, 2.7, 3.3, 3.4 and 3.5 -- to help run test suites across several Python configurations, as well as PyPy, PyPy3, and Jython.Reportedly Open source is making things easier for security professionals. But choosing software to check vulnerabilities still seems difficult for many developers. Fedora Security Lab is an RPM-based distro.Kali Linux isDebian based Linux distribution.The Fedora Security Lab provides a safe test environment to work on security auditing, forensics, system rescue and teaching security testing methodologies in universities and other organizations.The spin is maintained by a community of security testers and developers. It comes with the clean and fast Xfce Desktop Environment and a customized menu that provides all the instruments needed to follow a proper test path for security testing or to rescue a broken system. The Live image has been crafted to make it possible to install software while running, and if you are running it from a USB stick created with LiveUSB Creator using the overlay feature, you can install and update software and save your test results permanently.