If you are having trouble viewing this email, click here to view this online



   ISSUE 58

27 May  2016

Article of the Month Around the World

Say no to Cyberbullying


The Internet is a wonderful tool that allows us to communicate, build relationships, gain and share knowledge and express ourselves. However, in recent years we have seen an increase in internet related crime, especially those targeting women and children. In a recent study by the National Academies of Sciences, Engineering, and Medicine, it was found that cyberbullying is now a �serious public health problem� with 7-15% of teenagers experiencing online abuse. The anonymity provided by the internet has fueled the spread of cybercrimes, particularly the online variants of offline crime such as cyber bullying.

The U.S. Department of Health & Human Services defines cyberbullying as �bullying that takes place using electronic technology�. In another definition by stopcyberbullying.org it is explained as �when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet, interactive and digital technologies or mobile phones.� According to the above definition, cyberbullying is more relevant to minors or children and when adults get involved, it becomes cyber-harassment or cyberstalking, not cyberbullying.
Children could become victims of cyberbullying through emails, text messages and via social media sites. A more comprehensive classification of cyberbullying attacks is as follows.

Table 1: Types of cyberbullying (Based on http://www.stopcyberbullying.org/how_it_works/index.html)

There are many methods to prevent cyberbullying. Described below are some of the methods that can be used to respond to and prevent cyberbullying.
However, these are only cases the FBI is aware of.

Table 2: Methods of preventing and responding to cyberbullying (Based on Hinduja & Patchin, 2012)



Being bullied whether online or offline is not a pleasant experience. Cyberbullying intensities the feeling of helplessness and sense of security because bullies can easily hide their online identities. Children are specially at risk because cyberbullying can lead to depression, anxiety and affect self -esteem in the victim. Therefore, when using the internet be mindful about your own safety and respect the privacy, human dignity and freedom of others.


Dr. Hemamali Tennakoon

Research and Policy Development Specialist, Sri Lanka CERT|CC







































1 Statistics on the Internet growth in Sri Lanka
2.The Dragon Research Group (DRG)
3.TSUBAME (Internet threat monitoring system) from JPCERT | CC
4.Shadowserver Foundation
5. Team Cymru


DDoS Attacks: Bigger, Stronger, Scarier


"...Distributed Denial-of-Service (DDoS) attacks overwhelm a target with activity so that websites can�t be accessed by legitimate traffic. In other words, your bank, entertainment company, newspaper, e-commerce portal�even your Internet connection where you�re killing it on Xbox Live�slows to a crawl or crashes.

DDoS attacks have been widely reported since 2000, and increase year-over-year in size, number, and intensity. They are time-tested, nearly impossible to prevent, very cheap to rent, and can have devastating, lasting consequences...."

  Apple�s big security update � but some iPad Pro users say they�ve been �bricked�

'...As usual, the principal OS X update applies to the current flavour of the operating system, El Capitan (OS 10.11), with a separate security update to patch the two versions before that, Mavericks (10.9.5) and Yosemite (10.10.5).

Users of OS X 10.8 and earlier are out of luck: those versions are in the same boat as Windows XP when it comes to security � unsupported and unpatched...'



'....First, the good news: Recent �social engineering� tests undertaken by an independent auditor reveal Homeland Security Department employees are getting savvier about basic cybersecurity.

But the bad news: Some employees are still leaving sensitive paper documents strewn about their cubicles.....'

Why virtual reality won�t transform sports viewing


'....Virtual reality�s ability to immerse viewers in new worlds has fueled talk of a fundamental change in how consumers experience media. While interest is growing in the emerging technology, and companies are racing to ship virtual reality headsets and content, one of the most popular areas of media consumption � sports � is unlikely to see major changes...'

Cisco retools core routing and switching certification to sharpen focus on SDN, IoT

'...The role of network engineer is changing as companies undergo digital transformations. To keep pace with the changes, Cisco is refreshing its core routing and switching certification to ensure that certified network pros have the right skills as companies move toward Internet of Things, cloud computing, network programmability and policy-based network management......'

Month in Brief
Facebook Incidents Reported to Sri Lanka CERT|CC in April  2016
  Statistics - Sri Lanka CERT|CC

Netflix built a massive worldwide operation to make Chelsea Handler�s dirty jokes land globally

'...�When life hands you lemons, make lemonade� with vodka.� That�s one of Chelsea Handler�s mantras.
But translating a joke like that into Portuguese, Arabic, and German is a tall order. That�s why Netflix, which recently launched a global late-night talk show starring the US comedian, has 200 linguists devoted to helping Handler�s profanity-laced humor land with worldwide audiences.....'

SEC warns cybersecurity is biggest threat to financial system

'...The chair of the US Securities and Exchange Commission (SEC), Mary Jo White, has warned that the biggest risk the financial system faces is cybersecurity.

Speaking at the Financial Regulation Summit in Washington DC, White warned the industry that their policies and procedures were not up to scratch and without them they faced the same fate as the Bangladeshi bank that recently lost $81m through a cyber attack.....'

Google�s Plan to Use Android Phones to Dominate Virtual Reality

"...Cardboard, its simple virtual-reality viewer, a lot has changed in the VR market. Samsung released its smartphone-powered Gear VR headset, high-end headsets like the Oculus Rift and HTC�s Vive hit the market, and a growing wave of developers are committing time and money to creating immersive content that goes with these devices...."
ESET releases new decryptor for TeslaCrypt ransomware

'...Have you been infected by one of the new variants (v3 or v4) of the notorious ransomware TeslaCrypt? If your encrypted files had the extensions .xxx, .ttt, .micro, .mp3 or were left unchanged, then ESET has good news for you: we have a decryptor for TeslaCrypt...."
Microsoft issues cumulative roll-up pack for Windows 7

"...Microsoft yesterday threw a bone to Windows 7 users by releasing a cumulative roll-up that collects all the bug fixes from February 2011 to April 2016, making it easier to update a PC running the still-standard OS.

The Redmond, Wash. company has ditched the "service pack" moniker, and so named Tuesday's collection a "convenience rollup update." The label was meaningless, however: The update was identical to a service pack....."
Operation Groundbait: Espionage in Ukrainian war zones

"...After BlackEnergy, which has, most infamously, facilitated attacks that resulted in power outages for hundreds of thousands of Ukrainian civilians, and Operation Potao Express, where attackers went after sensitive TrueCrypt-protected data from high value targets, ESET researchers have uncovered another cyberespionage operation in Ukraine: Operation Groundbait...."

Notice Board
  Training and Awareness Programmes - May  2016
03rd May 2016 Steering Committee meeting- School Internet Safety Team ICT Branch Laboratory, Ministry of Education
  11/12/13- May 2016 Creating software for school management system  ICT Branch Laboratory, Ministry of Education 
  09/10/11/12/13- May 2016 Orientation Programme for newly appointed teachers Education Leadership Development Center, Meepe 

Brought to you by: