If you are having trouble viewing this email, click here to view this online



   ISSUE 47

17 June 2015

Article of the Month  Around the World

Beware! Your Web Cam may be watching you.


The most appearing cameras become the less we�re aware they are even there. They glare out at us inanely from our laptops, phones, Tablets, just waiting to be switched on. But what would you feel if they were turn on by someone else without your prior knowledge? It would be the greatest violations of privacy.Below are some ways to prevent from webcam takeovers.

How hackers gain access to the webcams

A recent study mentioned many different websites containing live feeds from webcams. There are different types of webcam hacks that have happened over the past few years. General process is to identify a security vulnerability in the webcam software or the hardware itself. Most attackers would use a Trojan or RATS to access your device. Once your device is infected with malicious program the attacker can take control of the webcam at any time.
Another technique is Clickjacking, where it compromised a website to make a Flash permission button hidden. The website then places this hidden button over a likely-to-be-clicked area such as the Download button on a file. Abruptly, the victim thinks all they�re doing is downloading a file, but has recklessly given authority to the Flash app to use the webcam.

Preventing Your Webcam from Being Hacked

So below are some ways to prevent from webcam takeovers.

Don�t click suspicious links and attachments

Be careful when opening attachments in email when you don�t know the sender. Beware when downloading files like free music, movies and torrents from the internet. And be cautious when clicking links you found in social media.

Use a good antivirus software and equip your computer with two-way firewall

Install a security software that provides protection against malware and spyware. Most antivirus software can detect suspicious activities and processes running in your computer. And also using a Firewall is an efficient way to ensure traffic going in and out of the device is legitimate.

Use webcam protection software

This is an efficient method to stay safe without doing extra work. Because these software notify you whenever the webcam is used or running in background without your permission. But you must use a trusted and verified software for this.

Update firmware

Webcams, like any other electronics devices are controlled by firmware. Attackers mostly use vulnerabilities in firmware to exploit webcams. So it�s a good precaution to update firmware regularly.




Cover it, unplug it

If you are looking an easy way to prevent webcam snooping, this is the simplest method. You can cover your webcam by taping a piece of paper when you are not using it. You can unplug it if it�s a separate webcam.

Stay alert

Normally all webcams have LED light to indicate whether the webcam is powered on or not. So it�s good to be alert when you see the light blinking when you�re not using it.


Most importantly don�t be scared. Just because there is a possibility to hack into your webcam, it doesn�t mean it�s likely to be hacked. But it�s always good to be aware of those kind of situations. It�s better to be safe by taking necessary precautions.


-Charuka Senal Damunupola

Charuka is an undergraduate of National School of Business Management who is currently following BSc (Honours) Computer Science offered by University College Dublin Ireland. Currently he is working as Intern - Information Security Engineer at Sri Lanka CERT|CC















































�..When you think about the hallmarks of cloud computing -- on-demand service, resource pooling, elasticity, scalability and the like -- it�s easy to overlook how you pay for those cloud services.. ....�

  Threat intel sharing: Security breakthrough or flavor of the month?

'....Threat intelligence sharing has become the "new black" in the world of enterprise security, a trendy buzzword that has become ubiquitous at industry conferences and in vendor marketing pitches. But what exactly is threat intelligence sharing and are we using it effectively to defend against cyberattacks?....'




'...Last week, Apple CEO Tim Cook made a speech that�since it�s Apple�was widely picked up everywhere. While the full text of the speech was not made available, the bits TechCrunch and everyone else cited focused on user privacy:....'

Healthcare organizations face unique security challenges


'...Healthcare organizations today are facing a new and unique set of challenges. Their recently-digitized healthcare records have turned out to be extremely valuable to criminals, while hospitals, clinics, and other organizations are still learning how to protect them.....'


'...Elon Musk, the entrepreneur who co-founded PayPal before founding Tesla Motors and SpaceX, said yesterday he�s �not really a fan of disruption,� but is rather �just a fan of making things better.�..�

Month in Brief
Facebook Incidents Reported to Sri Lanka CERT|CC in May 2015
 Statistics - Sri Lanka CERT|CC

Prove hacking: experts

'....No solid evidence so far has supported the United States' claim that a recent cyber attack originated from the Chinese government, and such unproven allegations will harm bilateral relations, according to Chinese experts...'

​What's the best cloud storage for you?

'...That's great! Except, well, how do you choose which one is right for you? It used to be that most people decided simply on the basis of how much free storage you got. That had the advantage of being simple, but it only tells part of the story....'

The Past, Present, and Future of Phishing and Malware

'...In the Digital Age, email is second nature. It�s a commonly accepted method of communication, and a convenient one, at that. With convenience, however, comes danger � especially if you�re not even alerted to the bait!..'

Software Licensing got you down? Get your SaaS in gear and go cloud



'....My ZDNet colleagues Ed Bott and David Gewirtz are both fed up with Microsoft over software licensing issues, albeit for different reasons.

Ed is annoyed with Microsoft over its poor communication of its Windows editions and David just wants to line up Microsoft's legal department in front of a firing squad....'

Exclusive: Facebook earns 51 percent of ad revenue overseas - executives



'...."Overseas markets bring in more advertising revenue than the United States for Facebook Inc, amounting to 51 percent of global ad sales in the first quarter, with growth in Asia the fastest in the world at 57 percent, company executives told Reuters....'

Notice Board
  Training and Awareness Programmes - June 2015
- 04th June Workshop on School Management software Provincial ICT Resource Center, Anuradhapura
08th- 12th June ICT training programme for teachers in the schools with solar power ICT laboratories Computer Laboratory, ICT Branch, Ministry of Education
12th June Workshop for Principals of 1000 Secondary schools Plantation Management Institute, Athurugiriya
15th June Workshop on maintenance of Technology laboratories- North Central Province Palm Garden Hotel, Anuradhapura
19th June Workshop on creation of G.C.E.(O/L) Module Computer Laboratory, ICT Branch, Ministry of Education
24th- 26th June Workshop on preparation of hand book on ICT centers National Inland Fisheries and Aquaculture Institute . Kalawewa

Brought to you by: