If you are having trouble viewing this email,
click here to view this online  |
|
VOLUME 58 |
ISSUE 58 |
27 May 2016 |
|
| | Article of the Month | | | | Around the World | |
Say no to Cyberbullying

| |
The Internet is a wonderful tool
that allows us to communicate, build relationships, gain and share knowledge
and express ourselves. However, in recent years we have seen an increase in
internet related crime, especially those targeting women and children. In a
recent study by the National Academies of Sciences, Engineering, and
Medicine, it was found that cyberbullying is now a �serious public health
problem� with 7-15% of teenagers experiencing online abuse. The anonymity
provided by the internet has fueled the spread of cybercrimes, particularly
the online variants of offline crime such as cyber bullying.

The U.S. Department of Health & Human Services defines cyberbullying as
�bullying that takes place using electronic technology�. In another
definition by stopcyberbullying.org it is explained as �when a child,
preteen or teen is tormented, threatened, harassed, humiliated, embarrassed
or otherwise targeted by another child, preteen or teen using the Internet,
interactive and digital technologies or mobile phones.� According to the
above definition, cyberbullying is more relevant to minors or children and
when adults get involved, it becomes cyber-harassment or cyberstalking, not
cyberbullying.
Children could become victims of cyberbullying through emails, text messages
and via social media sites. A more comprehensive classification of
cyberbullying attacks is as follows.
Table 1: Types of cyberbullying (Based on
http://www.stopcyberbullying.org/how_it_works/index.html)

There are many methods to
prevent cyberbullying. Described below are some of the methods that can be
used to respond to and prevent cyberbullying.
However, these are only cases the FBI is aware of.
Table 2: Methods of preventing and
responding to cyberbullying (Based on Hinduja & Patchin, 2012)

Being bullied whether
online or offline is not a pleasant experience. Cyberbullying intensities
the feeling of helplessness and sense of security because bullies can easily
hide their online identities. Children are specially at risk because
cyberbullying can lead to depression, anxiety and affect self -esteem in the
victim. Therefore, when using the internet be mindful about your own safety
and respect the privacy, human dignity and freedom of others.
Dr. Hemamali Tennakoon
Research and Policy
Development Specialist, Sri Lanka CERT|CC
| | | | | |
References | |
1 Statistics on the Internet
growth in Sri Lanka | |
http://www.trc.gov.lk/images/pdf/ | |
statis_sep_2012.doc | |
2.The Dragon Research Group (DRG) | | |
http://www.dragonresearchgroup.org/ |
3.TSUBAME (Internet threat
monitoring system) from JPCERT | CC | |
https://www.jpcert.or.jp/english/tsubame/ | |
4.Shadowserver Foundation | | | | | | | | | |
http://www.shadowserver.org/wiki/ | |
5. Team Cymru | |
http://www.team-cymru.com | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
| | | | | | |
| |  | | | |
 | |  |
DDoS Attacks: Bigger, Stronger, Scarier | | |

"...Distributed
Denial-of-Service (DDoS) attacks overwhelm a target with activity so that
websites can�t be accessed by legitimate traffic. In other words, your bank,
entertainment company, newspaper, e-commerce portal�even your Internet
connection where you�re killing it on Xbox Live�slows to a crawl or crashes.
DDoS attacks have been widely reported since 2000, and increase
year-over-year in size, number, and intensity. They are time-tested, nearly
impossible to prevent, very cheap to rent, and can have devastating, lasting
consequences...." | | | | | |  |
Apple�s big security update � but some iPad Pro
users say they�ve been �bricked� | |
|

'...As usual, the principal OS X update applies to the current flavour
of the operating system, El Capitan (OS 10.11), with a separate security
update to patch the two versions before that, Mavericks (10.9.5) and
Yosemite (10.10.5).
Users of OS X 10.8 and earlier are out of luck: those versions are in
the same boat as Windows XP when it comes to security � unsupported and
unpatched...' | | | | |  |
AUDIT: DHS EMPLOYEES NOT FOOLED BY PHISHING
SCAMS | | | |
 | |
| |
'....First, the good news: Recent �social engineering� tests undertaken by
an independent auditor reveal Homeland Security Department employees are
getting savvier about basic cybersecurity.
But the bad news: Some employees are still leaving sensitive paper
documents strewn about their cubicles.....' | |  |
Why virtual reality won�t transform sports
viewing | | |
 | | |
'....Virtual reality�s ability to immerse viewers in new worlds has
fueled talk of a fundamental change in how consumers experience media.
While interest is growing in the emerging technology, and companies are
racing to ship virtual reality headsets and content, one of the most
popular areas of media consumption � sports � is unlikely to see major
changes...' | | | | |  |
Cisco retools core routing and switching
certification to sharpen focus on SDN, IoT | | |
 | | | | | | |
'...The role of network engineer is changing as companies undergo
digital transformations. To keep pace with the changes, Cisco is
refreshing its core routing and switching certification to ensure that
certified network pros have the right skills as companies move toward
Internet of Things, cloud computing, network programmability and
policy-based network management......' | |
|
| Month in Brief | | Facebook Incidents Reported to Sri Lanka CERT|CC in
April 2016 | |
 | | | | | | | | |
Statistics - Sri Lanka CERT|CC | | |
| |  |
Netflix built a massive worldwide operation to
make Chelsea Handler�s dirty jokes land globally | |
| |

| |
'...�When life hands you lemons, make lemonade� with vodka.� That�s one
of Chelsea Handler�s mantras.
But translating a joke like that into Portuguese, Arabic, and German is
a tall order. That�s why Netflix, which recently launched a global
late-night talk show starring the US comedian, has 200 linguists devoted
to helping Handler�s profanity-laced humor land with worldwide
audiences.....' | | |  |
SEC warns cybersecurity is biggest threat to
financial system | |
 | |
'...The chair of the US Securities and Exchange Commission (SEC), Mary
Jo White, has warned that the biggest risk the financial system faces is
cybersecurity.
Speaking at the Financial Regulation Summit in Washington DC, White
warned the industry that their policies and procedures were not up to
scratch and without them they faced the same fate as the Bangladeshi
bank that recently lost $81m through a cyber attack.....' |  |
Google�s Plan to Use Android Phones to
Dominate Virtual Reality | |

| |
"...Cardboard, its simple
virtual-reality viewer, a lot has changed in the VR market. Samsung released
its smartphone-powered Gear VR headset, high-end headsets like the Oculus
Rift and HTC�s Vive hit the market, and a growing wave of developers are
committing time and money to creating immersive content that goes with these
devices...." |  |
ESET releases new decryptor for TeslaCrypt
ransomware | |
 | |
'...Have you been infected by one of the new variants (v3 or v4) of the
notorious ransomware TeslaCrypt? If your encrypted files had the
extensions .xxx, .ttt, .micro, .mp3 or were left unchanged, then ESET
has good news for you: we have a decryptor for TeslaCrypt...." |  |
Microsoft issues cumulative roll-up pack
for Windows 7 | |

| |
"...Microsoft yesterday
threw a bone to Windows 7 users by releasing a cumulative roll-up that
collects all the bug fixes from February 2011 to April 2016, making it
easier to update a PC running the still-standard OS.
The Redmond, Wash. company has ditched the "service pack" moniker, and
so named Tuesday's collection a "convenience rollup update." The label
was meaningless, however: The update was identical to a service pack....." |  |
Operation Groundbait: Espionage in
Ukrainian war zones | |

| |
"...After BlackEnergy, which has, most infamously, facilitated attacks
that resulted in power outages for hundreds of thousands of Ukrainian
civilians, and Operation Potao Express, where attackers went after
sensitive TrueCrypt-protected data from high value targets, ESET
researchers have uncovered another cyberespionage operation in Ukraine:
Operation Groundbait...." |
| | | |
| | Notice Board | | | Training and Awareness Programmes
- May 2016 | | | | | | | | | Date | Event | | Venue | | | | | | |
03rd May 2016
|
Steering Committee
meeting- School Internet Safety Team | |
ICT Branch Laboratory,
Ministry of Education | | |
11/12/13- May 2016 |
Creating software for school
management system | |
ICT Branch Laboratory,
Ministry of Education | | |
09/10/11/12/13- May 2016 |
Orientation Programme for
newly appointed teachers | |
Education Leadership
Development Center, Meepe | | |
|
| |
| |
|
| |
|
|
| | | | | Brought to you by: | | |  | |
| |