Wednesday, April 28, 2010

SKMM terima 165 aduan terhadap laman web

KUALA LUMPUR 28 April - Suruhanjaya Komunikasi dan Multimedia (SKMM) menerima 165 aduan dalam tempoh Januari hingga Mac tahun ini berhubung kandungan laman web atau blog yang melakukan pelbagai kesalahan di bawah Akta Komunikasi dan Multimedia (AKM) 1998.

Timbalan Menteri Penerangan Komunikasi dan Kebudayaan, Datuk Joseph Salang Gandum berkata, daripada jumlah tersebut, 90 aduan adalah bagi kandungan lucah, 72 kandungan bersifat mengancam atau jelik dan tiga aduan bagi kandungan berunsur palsu.

"Bagi kandungan bersifat lucah, tindakan siasatan dan sekatan akan dilakukan.

"Selain itu, laporan penyalahgunaan juga akan dihantar kepada moderator laman-laman web sosial seperti Facebook, blogspot dan YouTube," katanya ketika menjawab soalan Datuk Zaitun Mat di Dewan Negara hari ini yang bertanyakan jumlah aduan yang diterima SKMM berhubung kandungan laman web atau blog mengikut AKM 1998.

Katanya, bagi kandungan bersifat mengancam dan jelik serta kandungan palsu pula, nasihat dan amaran akan dikenakan oleh SKMM kepada pemilik laman-laman berkenaan dan sekiranya cukup bukti bagi mensabitkan kesalahan, pendakwaan boleh dikenakan terhadap pihak tersebut.

Menjawab soalan tambahan Fatimah Hamat yang ingin tahu langkah kerajaan dalam menangani laman web lucah yang mudah dilayari di kafe siber, Joseph Salang berkata,SKMM setakat ini telah menutup serta-merta 81 laman web yang didapati menerapkan unsur lucah seperti menyediakan video aksi lucah dan perkongsian cerita lucah dengan teman berbual.

"Ada antara laman web sosial yang turut mengandungi elemen lucah walaupun telah mendapat aduan tetapi tidak dapat diambil tindakan memandangkan moderator laman web tersebut mendapati ia dianggap tidak lucah disebabkan oleh faktor budaya negara masing-masing," katanya. - BERNAMA

Sumber Capaian : http://www.utusan.com.my/utusan/info.asp?y=2010&dt=0429&pub=Utusan_Malaysia&sec=Dalam_Negeri&pg=dn_19.htm

Google dedah program keselamatan palsu

SAN FRANCISCO 28 April - Google semalam berkata, program keselamatan palsu yang menjangkiti komputer kini merupakan ancaman dalam talian yang semakin berleluasa, dengan penggodam memperdaya pengguna untuk memasukkan kod perosak.

Satu analisis ke atas 240 juta laman web oleh gergasi Internet ini sejak 13 bulan lalu mendedahkan bahawa program antivirus palsu merupakan 15 peratus daripada perisian perosak yang dikesan.

"Ancaman antivirus palsu semakin meningkat. Jelas terdapat trend peningkatan dalam jumlah domain antivirus palsu yang ditemui setiap minggu," demikian menurut Google.

Penyebar program palsu ini menggodam laman web dengan menakut-nakutkan pengguna melalui mesej pop-up yang memberi amaran imbasan menemui perisian perosak dalam komputer.

Penipuan berlanjutan dengan penjualan program yang didakwa membantu menyelesaikan masalah tetapi sebenarnya 'menanam' kod perosak dalam komputer terlibat.

Transaksi sedemikian juga berisiko menyebabkan kebocoran maklumat kad kredit ke tangan penjenayah Internet.

Lebih mengejutkan, ramai mangsa terpedaya dan membayar untuk mendapatkan antivirus palsu. - AFP

Apa yang lebih teruk, ia biasanya dicampurkan dengan perisian perosak lain yang kekal di dalam komputer sama ada bayaran dibuat atau tidak," kata Google.

Google kini mengemaskini peralatan untuk menapis laman web berisiko dan penggodam biasanya akan bertindak menukar tempat dari satu nama domain ke domain lain. - AFP


sumber : http://www.utusan.com.my/utusan/info.asp?y=2010&dt=0429&pub=Utusan_Malaysia&sec=Luar_Negara&pg=lu_09.htm


Monday, April 26, 2010

Mobile Phone Hacking for £1000

Nigel Stanley By: Nigel Stanley, Practice Leader - IT Security, Bloor Research
Published: 21st April 2010
Copyright Bloor Research © 2010


History was made the other evening when the UK's three wannabe prime ministers took centre stage for a TV debate. This was the culmination of weeks of rehearsals, practice runs and body language training.

But what if I then tell you that every mobile phone call made by one of the campaign teams preparing for this TV event was secretly recorded and analysed, enabling their rival to understand everything from the campaign strategy through to the likely rebuttal to a particular question?

Illegal? Of course. Farfetched? No longer.

The past few months has seen the mobile phone industry thrown into turmoil as the computer hacking community has carried out successful attacks against mobile phone call security. I wrote an article about such a hack a while back, but at that point it remained a theory rather than a practical way to listen into mobile phone calls.

In this article I commented that the best way of getting access to mobile phone calls was to setup a fake base station, something that has historically been difficult and expensive. Little did I know that within 4 months we would have a practical mobile phone hacking kit, using off the shelf equipment and a fake base station, for around £1000. Not only that but the software needed to run the hack is available as a neatly packaged CD—free of charge.

There is even a video demonstration of the hack available here

Government agencies have had capabilities to listen into mobile phone calls for years, by tapping the insecure and unencrypted landlines that run from cellular base stations back to the exchanges and beyond. This new hack is different as it enables a criminal to set up a false mobile phone base station, capturing all phone calls within the vicinity, at very low cost.

It relies on a feature of mobile phones that forces them to automatically link into the closest base station to conserve their battery power. By setting up a false base station close to your intended target, hackers can capture the victim's phone signals. This type of intercept tool, called an IMSI catcher, has been around for a number of years but only available to approved government agencies and at a cost of hundreds of thousands of pounds.

Now a standard PC running the OpenBTS software GSM base station, an Asterisk PBX to link calls into the public phone network and a software defined radio receiver black box is all you need to capture these same phone calls.

For many people the only risk of their mobile phone conversation being intercepted was when they decided to bellow into their phone on a crowded train. Now we all need to face the fact that our calls can be intercepted with little effort.

Those that use mobile phones believing they are secure should think again, be they wannabe prime ministers, captains of industry or anyone else who shares confidential information via the mobile phone.


credit to : http://www.it-director.com/business/security/content.php?cid=12039