If you are having trouble viewing this email, click here to view this online

 

VOLUME 59

   ISSUE 59

22 June  2016

Article of the Month Around the World

Building Inexpensive Software Defined Radio System

 

 

Software-defined radio (SDR) is a technique for turning a computer into a radio. But not just an AM/FM radio by using the computing power on your desktop you can listen and decode a wide variety of broadcasts. SDR can turn your computer into a weather-band receiver, a police/fire report scanner, a music listening station, and more! Instead of manually tuning inductors, its all done in software by chips fast enough to pick up and decode radio waves on the fly

To build inexpensive SDR system, we need following items.

1. RTL2832U Chipset and R820T tuner based Digital Video Broadcasting Terrestrial (DVBT) Tuner.
You can buy DVBT Tuner from eBay around 10 USD.
 

 

 2. SDR Sharp (SDR#) Software

 

 You can download from : http://airspy.com/download/

 

Once you have properly configured those to hardware and software modules, you can use a computer (with Windows, Mac, or Linux) to tune into: FM Radio, AM signals (but not AM radio), CW (morse code!), unencrypted radio signals (such as those used by many police and fire departments), POCSAG pagers, and more.

Step by step configuration details: https://cdn-learn.adafruit.com/downloads/pdf/getting-started-with-rtl-sdr-and-sdr-sharp.pdf

Detailed Video : https://www.youtube.com/watch?v=IaKEYEyrRgk

 

 

Priyankara Perera

Priyankara is an Associate Information Security Engineer at Sri Lanka CERT|CC



 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 





 

 

References

1 Statistics on the Internet growth in Sri Lanka
http://www.trc.gov.lk/images/pdf/
statis_sep_2012.doc
2.The Dragon Research Group (DRG)
http://www.dragonresearchgroup.org/
3.TSUBAME (Internet threat monitoring system) from JPCERT | CC
https://www.jpcert.or.jp/english/tsubame/
4.Shadowserver Foundation
http://www.shadowserver.org/wiki/
5. Team Cymru
http://www.team-cymru.com
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

 
  
 

Banks to face expulsion from global payments systems over IT security

  

"...SWIFT, the global inter-bank payments system, will threaten members with expulsion over poor cyber security in a shake-up in the organisation's security strategy.

That is the message of SWIFT CEO Gottfried Leibbrandt following a string of sophisticated cyber attacks at a number of banks, which seem to have been conducted by experienced attackers with knowledge of both SWIFT and banks' international payments procedures....."

  Zuckerberg's social media accounts targeted by hackers
   

'...He might run the world's biggest social networking site, but not even Mark Zuckerberg is immune to being hacked.
The Facebook founder's accounts on sites including Instagram, Twitter, LinkedIn and Pinterest appear to have been briefly compromised on Sunday.
A hacker group called Ourmine, which has more than 40,000 Twitter followers, claimed responsibility....'

Apple promises “differential privacy” at Worldwide Developers Conference

   
  

'....Big tech companies like Google and Facebook want as much of your data as they can get their hands on, because their survival depends on using information about you to better target you with advertisements.

Apple claims to be different – it sells hardware, like Macs, iPhones and Watches, not ads......'

RUSSIAN HACKERS HACK DEMOCRATIC PARTY COMPUTERS

  

'....Two groups of hackers sponsored by the Russian government broke into the computer systems of the Democratic National Committee and accessed emails, chat logs and a trove of detailed opposition research on Donald Trump assembled by the party’s researchers....'

Indian organizations targeted in Suckfly attacks

'...In March 2016, Symantec published a blog on Suckfly, an advanced cyberespionage group that conducted attacks against a number of South Korean organizations to steal digital certificates. Since then we have identified a number of attacks over a two-year period, beginning in April 2014, which we attribute to Suckfly. The attacks targeted high-profile targets, including government and commercial organizations. These attacks occurred in several different countries, but our investigation revealed that the primary targets were individuals and organizations primarily located in India.......'

Month in Brief
Facebook Incidents Reported to Sri Lanka CERT|CC in May  2016
 
  
  Hacked
  Fake
  Other
   
  Statistics - Sri Lanka CERT|CC

 APPLE OPENS UP SIRI TO DEVELOPERS

'"...During Apple's latest conference, the company announced it would be opening up voice assistant Siri to developers. What exactly does that mean? You can tell Siri to send a message in Slack or tell Siri to order an Uber for you. The possibilities for app developers to use Siri are endless.....'

Computer science salaries rise with demand for new graduates

'...As scores of college graduates hit the job market this spring, their employment prospects are more promising than those of last year’s graduating class. In particular, computer science graduates are a hot commodity....'

Vawtrak banking Trojan shifts to new targets

"...The Vawtrak banking Trojan (aka Snifula) is slowly but surely becoming a serious threat. With version 2, the malware has acquired the capability to target even more users, a modular architecture, and better obfuscation.

“Several of the updates included in Vawtrak version 2 center around complicating the analysis process and breaking existing tools used to decode interesting data used by the malware,” Sophos researchers have found....."
Microsoft covets LinkedIn algorithms

'...Microsoft yesterday announced it would buy the business social network LinkedIn for a company acquisition record of $26.2 billion, a purchase triggered by Microsoft's appetite for algorithms, an analyst argued.

"There are two components to LinkedIn that Microsoft wanted," said Jenny Sussin, a Gartner research director, in an interview. "One is the data component, the other is the algorithm component."...."
A Trial Balloon Takes Flight into the Cloud

"...Humorous metaphor about the cloud aside, this is a not-so-lighthearted article. This is the convergence of progress, loss, and humility.
In the fall of 2015, Salesforce.com (SFDC) announced upcoming initiatives for the Internet of Things. What we now know is that it was envisioned with AWS as its backbone......"
Machine learning could help companies react faster to ransomware


"...File-encrypting ransomware programs have become one of the biggest threats to corporate networks worldwide and are constantly evolving by adding increasingly sophisticated detection-evasion and propagation techniques.

In a world where any self-respecting malware author makes sure that his creations bypass antivirus detection before releasing them, enterprise security teams are forced to focus on improving their response times to infections rather than trying to prevent them all, which is likely to be a losing game...."

 
Notice Board
  Training and Awareness Programmes - June  2016
  
DateEventVenue
2016-06-06 Trainers' Training Programme Computer Laboratory ,ICT Branch, Ministry of Education
  2016-06-05 to 2016-06-09 Training programme for (G.C.E) A/L syllabus   Education Leadership Development Center, Meepe 
  2016-06-16 to 2016-06-21 Training programme for (G.C.E) A/L syllabus   Education Leadership Development Center, Meepe 
  2016-06-17 Meeting on Conducting ICT Career Oriental Programmes . Computer Laboratory ,ICT Branch, Ministry of Education 

Brought to you by: