- The Strategist - https://www.aspistrategist.org.au -
Cyber wrap
Posted By Michael Chi on May 31, 2017 @ 12:30
Article printed from The Strategist: https://www.aspistrategist.org.au
URL to article: https://www.aspistrategist.org.au/cyber-wrap-166/
[1] cybersecurity law: https://chinacopyrightandmedia.wordpress.com/2016/11/07/cybersecurity-law-of-the-peoples-republic-of-china/
[2] enters into force this week: http://www.reuters.com/article/us-china-cyber-law-idUSKBN18P0G9
[3] measures: https://www.huntonprivacyblog.com/2017/05/03/china-publishes-final-measures-for-security-reviews-of-network-products-and-services/
[4] here: https://www.aspistrategist.org.au/cyber-wrap-142/
[5] Some previous measures included putting in place regulations: https://www.huntonprivacyblog.com/2017/04/11/china-publishes-draft-measures-security-assessments-data-transfers/
[6] volume and nature: http://www.debrauw.com/newsletter/chinas-new-cybersecurity-law-effective-1-june-2017/?output=pdf
[7] A bunch of multinationals: http://www.scmp.com/news/china/article/2094450/global-business-groups-urge-beijing-delay-cybersecurity-law
[8] asked for a delay: http://fortune.com/2016/08/17/china-cybersecurity-law-foreign-business/
[9] an uptick in demand over their American counterparts: https://www.bloomberg.com/news/articles/2017-05-24/foreign-firms-fret-as-china-implements-new-cybersecurity-law
[10] Windows 10: https://blogs.windows.com/windowsexperience/2017/05/23/announcing-windows-10-china-government-edition-new-surface-pro/#qhj765StpMjqsEAB.97
[11] the term ‘network operators’: https://assets.kpmg.com/content/dam/kpmg/cn/pdf/en/2017/02/overview-of-cybersecurity-law.pdf
[12] potentially extends onerous compliance requirements to small businesses: https://blog.nacdonline.org/2017/03/chinas-cybersecurity-law-goes-into-effect-june-1-2017-are-you-ready/
[13] general criticism has been levied: https://www.hrw.org/news/2016/11/06/china-abusive-cybersecurity-law-set-be-passed
[14] freedom of speech and human rights: https://www.amnesty.org/en/documents/asa17/2206/2015/en/
[15] signed and issued a letter last Friday: https://www.ccianet.org/wp-content/uploads/2017/05/702-letter-201705-FINAL.pdf
[16] currently allows the NSA to collect bulk internet data on foreign citizens: https://www.cnet.com/news/google-facebook-amazon-microsoft-congress-nsa-surveillance-reform/
[17] asked the Department of Justice to investigate: http://www.politico.com/story/2017/05/25/trump-leaks-britain-manchester-238818
[18] temporarily suspended information sharing: http://www.skynews.com.au/news/top-stories/2017/05/26/trump-slams-leaks-as-uk-stops-sharing-intel.html
[19] since resumed: https://www.theguardian.com/uk-news/2017/may/25/uk-police-end-suspension-of-intelligence-sharing-with-us
[20] debilitating effects on elections and democratic processes: https://www.aspi.org.au/publications/securing-democracy-in-the-digital-age/ASPI-Securing-Democracy.pdf
[21] ‘tainting’—that is, selectively editing—e-mails before publishing: https://citizenlab.org/2017/05/tainted-leaks-disinformation-phish/
[22] additional evidence linking: http://news.softpedia.com/news/fancy-bear-hackers-tainted-dumped-emails-with-false-data-516079.shtml
[23] behind the DNC hack during the US presidential election: https://www.forbes.com/sites/thomasbrewster/2017/05/26/russian-dnc-hackers-planted-leaks-with-fake-data/#3c50a6ee52ff
[24] comments in The Australian: http://www.theaustralian.com.au/business/technology/eugene-kaspersky-hits-back-at-us-cyber-espionage-claims/news-story/35354e313eab7fc62b0a8ada1fc04991?nk=0bc486b9465e577f706c07a7cc3a7971-1496062723
[25] has hit back: http://www.ibtimes.co.uk/kaspersky-willing-give-us-anti-virus-source-code-disprove-russia-spying-claims-1623328
[26] US government officials: https://www.theguardian.com/us-news/2017/may/11/kaspersky-labs-cybersecurity-us-senate-intelligence
[27] Flashpoint has offered a dissenting opinion: https://www.flashpoint-intel.com/blog/linguistic-analysis-wannacry-ransomware/
[28] tally of the financial damage: https://phys.org/news/2017-05-tally-losses-wannacry-cyberattack.html
[29] over 450,000 machines infected: https://intel.malwaretech.com/botnet/wcrypt/
[30] steps to patch and update their systems: http://www.zdnet.com/article/queensland-hospitals-facing-system-failure-after-botched-wannacry-patch/
[31] problems preventing staff log-ins: https://www.tripwire.com/state-of-security/latest-security-news/five-australian-hospitals-suffer-outages-patching-ransomware/
[32] been suggested that the outage is from compatibility issues: https://www.theregister.co.uk/2017/05/25/ransomware_hits_australian_hospitals/
[33] have signed a memorandum of understanding: https://securitybrief.co.nz/story/waikato-uni-tongan-government-stand-side-side-cyber-security/
[34] framework for collaboration between CERT Australia and the Tonga National CERT: http://www.mic.gov.to/news-today/press-releases/6725-tonga-national-cert-signs-a-framework-of-operation-coorperation-foc-with-the-cert-australia-to-manage-cyber-security
[35] Indian media: http://economictimes.indiatimes.com/news/politics-and-nation/india-likely-to-sign-cyber-security-pact-with-spain-germany-during-pm-narendra-modis-visit/articleshow/58831565.cms
[36] announcing: http://www.firstpost.com/world/narendra-modis-four-nation-tour-a-primer-on-ever-cordial-india-spain-relationship-3494023.html
[37] Guidelines for driverless cars’: http://www.ntc.gov.au/Media/Reports/(00F4B0A0-55E9-17E7-BF15-D70F4725A938).pdf
[38] provides a map of areas in Australia where drones can be flown: https://www.itnews.com.au/news/casa-releases-safe-drone-flying-app-463016?utm_source=feed&utm_medium=rss&utm_campaign=iTnews+
[39] here: https://www.casa.gov.au/droneapp