Amazon says 'bias' in Pentagon awarding $10bn contract

News Network
November 15, 2019

Nov 15: Amazon has challenged the awarding of a USD 10 billion Pentagon cloud computing contract to Microsoft, alleging "unmistakable bias" in the process.

The 10-year contract for the Joint Enterprise Defense Infrastructure program, better known as JEDI, ultimately will see all military branches sharing information in a system boosted by artificial intelligence.

"It's critical for our country that the government and its elected leaders administer procurements objectively and in a manner that is free from political influence," a spokesperson for Amazon Web Services said on Thursday.

"Numerous aspects of the JEDI evaluation process contained clear deficiencies, errors, and unmistakable bias," Amazon said it filed a notice in US court last week signalling its intent to protest the handling of the bidding process.

US President Donald Trump has repeatedly lashed out at Amazon and company founder Jeff Bezos, who also owns The Washington Post. The newspaper is among US media outlets most critical in its coverage of Trump and his administration.

The president told reporters during a news conference in July that he had asked aides to investigate the JEDI contract, citing complaints from companies that compete with Amazon.

"I'm getting tremendous complaints about the contract with the Pentagon and with Amazon. ... They're saying it wasn't competitively bid," Trump said.

"Some of the greatest companies in the world are complaining about it, having to do with Amazon and the Department of Defense, and I will be asking them to look at it very closely to see what's going on."

Amazon was considered the lead contender to provide technology for JEDI, with its Amazon Web Services (AWS) dominating the cloud computing arena and the company already providing classified servers for other government outfits including the CIA.

But the Pentagon delayed awarding the hefty contract, saying the process would be reviewed by newly appointed Defense Secretary Mark Esper, who was selected by Trump.

A new book on the tenure of Esper's predecessor James Mattis, written by his speechwriter Guy Snodgrass, contends that Trump told Mattis to "screw Amazon" out of the JEDI contract.

Microsoft was Amazon's only rival in the final bidding for the winner-take-all contract, despite employees urging it to drop out. The Pentagon announced it was awarded the contract to Microsoft in late October.

"AWS is uniquely experienced and qualified to provide the critical technology with the US military needs, and remains committed to supporting the DoD's modernization efforts," the Amazon spokesperson said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 22,2020

Kochi, May 22: During the nationwide COVID-19 lockdown, Kerala recorded the highest number of cyber attacks followed by Punjab and Tamil Nadu, a study by anti-virus software firm K7 Computing said on Thursday.

In a statement issued in Chennai, the company said its K7 Computing's Cyber Threat Report, a comprehensive analysis of cyber attacks during the lockdown has found that Kerala recorded the highest number of cyber attacks during this period. The report analyses various cyber attacks within India during the pandemic and reveals that threat actors targeted the state with COVID-themed attacks aimed at exploiting user trust.

In Kerala, regions like Kottayam, Kannur, Kollam, and Kochi saw the highest hits with 462, 374, 236, and 147 attacks respectively, while the state as a whole saw around 2,000 attacks during the period - the highest thus far in the country.

This was followed by Punjab with 207 attacks and Tamil Nadu with 184 attacks, the company said.

The sudden surge in the frequency of attacks witnessed from February 2020 to mid-April 2020 indicates that scamsters across the world were exploiting the widespread panic around coronavirus at both the individual and corporate level.

These attacks aimed to compromise computers and mobile devices to gain access to users' confidential data, banking details, and cryptocurrency accounts.

The key threats seen during this period ranged from phishing attacks to rogue apps disguised as COVID-19 information apps that targeted users' sensitive data. Phishing attacks were noticed more in Tier-II and Tier-III cities while the metros fared better. Smaller cities saw over 250 attacks being blocked per 10,000 users.

Users from Ghaziabad and Lucknow seem to have faced almost 6 and 4 times the number of attacks as Bengaluru users.

According to the statement, a majority of the recorded attacks were phishing attacks with sophisticated campaigns that could easily snare even the most educated users. These attacks were aimed at heightening users' fears and creating a sense of urgency to take action.

K7 Labs noticed phishing attacks where scamsters posed as representatives of the United States Department of Treasury, the World Health Organization (WHO), and the Centres for Disease Control and Prevention (CDC), the company said.

Users were encouraged to visit links that would automatically download malware on the host computer such as the Agent Tesla keylogger or Lokibot information-stealing malware, infamous banking Trojans such as Trickbot or Zeus Sphinx, and even disastrous ransomware.

Other attacks included infected COVID-19 Android apps like CoronaSafetyMask that scam users with promises of masks for an upfront payment; the spyware app Project Spy; and seemingly genuine apps that are infected with dangerous malware like banking Trojans such as Ginp, Anubis and Cerberus.

"Covid-19 has created an ideal situation for various threat actors to target individuals and enterprises alike. The panic caused by the stringent lockdown measures and rapid spread of this virus has left many people looking for more information on the situation," J. Kesavardhanan, Founder and CEO of K7 Computing was quoted as saying in the statement.

"Threat actors exploit this fear to their advantage and scam users into downloading malicious software and divulging sensitive information like banking codes. The need to be cyber cautious has never been greater. This is more so in the case of corporates who have adopted a work from home policy hurriedly without adequate cyber hygiene. We have seen an increase in attacks on enterprises and SME employees as well," he added.

Such attacks are expected to continue till normalcy returns. Social engineering attacks targeted at winning users' trust will gain momentum.

Healthcare institutions, well-known government offices, and international organisations will continue to be a prime target throughout the pandemic, the statement said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
March 8,2020

Consumer watchdog Which? has claimed that more than one billion Android phones and tablets are vulnerable to hackers as they no longer supported by security updates.

According to the research report, the most at-risk phones are any that run Android 4 or older and those smartphones running Android 7.0 which can not be updated are also at risk.

Based on data from Google analysed by Which?, two in five android device users around the world are no longer receiving the important updates. Currently, those devices are unlikely to have issues, but the lack of security leaves them open to attack.

"It is very concerning that expensive Android devices have such a short shelf life before they lose security support, leaving millions of users at risk of serious consequences if they fall victim to hackers," Kate Bevan editor Which? said in a statement.

"Google and phone manufacturers need to be upfront about security updates with clear information about how long they will last and what customers should do when they run out. The government must also push ahead with planned legislation to ensure manufacturers are far more transparent about security updates for smart devices and their impact on consumers," Kate added.

Android phone released around 2012 or earlier, including popular models like the Samsung Galaxy S3 and Sony Xperia S, are particularly at risk to hackers.

Which? has made suggestions to Android users on what to consider if they have an older phone that may be at risk.

Any Android device which is more than two years old, check whether it can be updated to a newer version of the operating system. If it is on an earlier version than Android 7.0 Nougat, try to update via Settings> System>Advanced System update.

In case a user is not able tto update the phone, the device could be at risk of being hacked if it is running a version of Android 4 or lower.

A user also need to be careful about downloading apps outside the Google Play store and should also install a mobile anti-virus via an app.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
May 7,2020

Toronto, May 7: Scientists have uncovered how bats can carry the MERS coronavirus without getting sick, shedding light on what triggers coronaviruses, including the one behind the COVID-19 pandemic, to jump to humans.

According to the study, published in the journal Scientific Reports, coronaviruses like the Middle East respiratory syndrome (MERS) virus, and the COVID19-causing SARS-CoV-2 virus, are thought to have originated in bats.

While these viruses can cause serious, and often fatal disease in people, bats seem unharmed, the researchers, including those from the University of Saskatchewan (USask) in Canada, said.

"The bats don't get rid of the virus and yet don't get sick. We wanted to understand why the MERS virus doesn't shut down the bat immune responses as it does in humans," said USask microbiologist Vikram Misra.

In the study, the scientists demonstrated that cells from an insect-eating brown bat can be persistently infected with MERS coronavirus for months, due to important adaptations from both the bat and the virus working together.

"Instead of killing bat cells as the virus does with human cells, the MERS coronavirus enters a long-term relationship with the host, maintained by the bat's unique 'super' immune system," said Misra, one of the study's co-authors.

"SARS-CoV-2 is thought to operate in the same way," he added.

Stresses on bats, such as wet markets, other diseases, and habitat loss, may have a role in coronavirus spilling over to other species, the study noted.

"When a bat experiences stress to their immune system, it disrupts this immune system-virus balance and allows the virus to multiply," Misra said.

The scientists, involved in the study, had earlier developed a potential treatment for MERS-CoV, and are currently working towards a vaccine against COVID-19.

While camels are the known intermediate hosts of MERS-CoV, they said bats are suspected to be the ancestral host.

There is no vaccine for either SARS-CoV-2 or MERS, the researchers noted.

Follow latest updates on the COVID-19 pandemic here

"We see that the MERS coronavirus can very quickly adapt itself to a particular niche, and although we do not completely understand what is going on, this demonstrates how coronaviruses are able to jump from species to species so effortlessly," said USask scientist Darryl Falzarano, who co-led the study.

According to Misra, coronaviruses rapidly adapt to the species they infect, but little is known on the molecular interactions of these viruses with their natural bat hosts.

An earlier study had shown that bat coronaviruses can persist in their natural bat host for at least four months of hibernation.

When exposed to the MERS virus, the researchers said, bat cells adapt, not by producing inflammation-causing proteins that are hallmarks of getting sick, but instead by maintaining a natural antiviral response.

On the contrary, they said this function shuts down in other species, including humans.

The MERS virus, the researchers said, also adapts to the bat host cells by very rapidly mutating one specific gene.

These adaptations, according to the study, result in the virus remaining long-term in the bat, but being rendered harmless until something like a disease, or other stressors, upsets this balance.

In future experiments, the scientists hope to understand how the bat-borne MERS virus adapts to infection and replication in human cells.

"This information may be critical for predicting the next bat virus that will cause a pandemic," Misra said.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.