IT Security News Blast 8-23-2017

Much ado about Kaspersky

The message here is that unless there’s a risk-based approach including assessing your likelihood and impact that suggests that a capability could be turned against local governments, then there’s no need to clutch your pearls and go through the huge expense of firing your AV vendor and standing up a replacement program.  No matter how great your procurement process, it’s going to be hugely invasive and expensive.

https://criticalinformatics.com/much-ado-about-kaspersky/

 Uniformity required to combat cyber threats

“There are no significant steps yet taken towards harmonised standards across the region. Financial institutions struggle to understand the regulatory differences at a country level or be aware of emerging threats so as to design cyber risk programs that are coherent and robust across jurisdictions,” Deloitte global and Asia-Pacific leader, Centre for Regulatory Strategy, Kevin Nixon said.

http://www.financialstandard.com.au/news/uniformity-required-to-combat-cyber-threats-102467817

 Close fraud loopholes, before thousands of banking customers have their accounts hacked

By using the sensors and cameras on smartphones, banks have undoubtedly made life easier for customers and call centres, where staff must field hundreds of calls about forgotten passwords every day. But with cyber-crime on the rise, the big attraction was always the better security. Even the most cunning crooks would struggle to forge a fingerprint or replicate someone’s face… wouldn’t they?

http://www.thisismoney.co.uk/money/markets/article-4814548/DAN-HYDE-Close-fraud-loopholes.html

 Increasing Cyber-attacks to Boost Cloud Security Solutions Market

Banks and credit card companies are allowing customers to make transactions and payments using the Internet. The high dependence of people on web applications for online purchases and related activities increases the risk of identity theft. The increased instances of cyber-attacks have raised fear and awareness in the BFSI sector about the growing use of viruses and malware to target networks and applications, leading to the increased demand for cloud security solutions.

http://bwcio.businessworld.in/article/Increasing-Cyber-attacks-to-Boost-Cloud-Security-Solutions-Market/23-08-2017-124536/

 100% of government IT workers said employees are biggest threat to cybersecurity

A whopping 100% of IT specialists working for government agencies worldwide said they see employees as the biggest threat to security. In 2016, human error caused security incidents in 57% of government entities, and system downtime for 14% of them. Additionally, 43% of government IT professionals said they investigated security incidents that involved insider misuse.

http://www.techrepublic.com/article/100-of-government-it-workers-said-employees-are-biggest-threat-to-cybersecurity/

 Exploit leaks led to over 5 million attacks in Q2 2017

The second quarter of 2017 experienced a massive wave of these in-the-wild vulnerabilities due to a number of exploits being leaked on the web. This entailed a significant change in the cyber threat landscape. The major kick-off was the Shadow Brokers’ publication of the “Lost In Translation” archive, which contained a large number of exploits for different versions of Windows. The average number of attacks per day is constantly growing: 82% of all attacks were detected in the last 30 days of the quarter.

http://www.deccanchronicle.com/technology/in-other-news/220817/exploit-leaks-led-to-over-5-million-attacks-in-q2-2017.html

 The Risk of Cyber Attack in the Health Care Industry

Just as with most of the information that comes out of data breaches, medical info pulled from a hospital or provider breach typically ends up for sale on the dark web. From there, it might be sold off a single time, but more likely it will remain for sale for some time and fall into the hands of multiple buyers. The volume of data that has been captured and posted on the dark web is so great that much of it will never be used.

https://ivn.us/2017/08/22/risks-cyber-attack-health-care-industry/

 How to prepare for cyberattacks that strike during a public health crisis

The U.S.’s history of preparing for bioterrorism, not to mention the billions of government and taxpayer dollars spent, have created resources and strategies that hospitals should keep pace with and have access to during the next crisis. The first step is to update your existing public health emergency plans to include a cyber element. These plans need to be exercised and corrective actions from those exercises should revise those policies. Similarly, cyber plans must be assessed to take into account public health emergencies.

http://www.healthcareitnews.com/blog/how-prepare-cyberattacks-strike-during-public-health-crisis

 WH Cyber Czar warns against Kaspersky products

Its wares were recently taken off the preapproved list of providers for federal contracts and, according to various media reports, the FBI has privately warned businesses against the firm. While there has never been any evidence presented publicly that Kaspersky Lab is used for Russian intelligence purposes, there has been a great deal of innuendo. The Moscow-based cybersecurity firm denies any untoward connection to any government.

http://thehill.com/policy/cybersecurity/347605-wh-cyber-czar-warns-against-kaspersky-products

 Fourth US Navy collision this year raises suspicion of cyber-attacks

Should four collisions in the same geographical area be chalked up to coincidence? Let’s also consider that the current generation of sailors have been at war for their entire careers. The longest war in US history may be affecting the entire fleet’s readiness. But if we don’t believe that the fault lies with the sailors who were standing the watch during each collision, we’re left with the suspicion of some form of attack. TNW recently reported on the ease with which hackers were able to breach civilian ships.

https://thenextweb.com/insider/2017/08/22/the-us-navy-is-investigating-possibility-of-cyber-attack-in-latest-collision/#.tnw_Ypv4ES1N

 Is the Power Grid Getting More Vulnerable to Cyber Attacks?

One, our adversaries are getting much more aggressive. They’re learning a lot about our industrial systems, not just from a computer technology standpoint but from an industrial engineering standpoint, thinking about how to disrupt or maybe even destroy equipment. That’s where you start reaching some particularly alarming scenarios. The second thing is, a lot of that ability to return to manual operation, the rugged nature of our infrastructure—a lot of that’s changing.

https://www.scientificamerican.com/article/is-the-power-grid-getting-more-vulnerable-to-cyber-attacks/

 Robot makers slow to address danger risk: researchers

The researchers, Cesar Cerrudo and Lucas Apa of cybersecurity firm IOActive, said the vulnerabilities would allow hackers to spy on users, disable safety features and make robots lurch and move violently, putting users and bystanders in danger. While they say there are no signs that hackers have exploited the vulnerabilities, they say the fact that the robots were hacked so easily and the manufacturers’ lack of response raise questions about allowing robots in homes, offices and factories.

https://www.reuters.com/article/us-cyber-robot-hack-idUSKCN1B22F5

 Another staged body cam leads to 43 more dropped Baltimore prosecutions

In all, more than 100 cases have been dropped or will be. Dozens of additional cases are being investigated because of three body cam videos fabricated by the Baltimore Police Department. The first video was disclosed a month ago. Dozens of closed cases are also being re-examined, state prosecutors said. They said they are examining hundreds of cases involving officers connected to the videos.

https://arstechnica.com/tech-policy/2017/08/third-staged-baltimore-police-body-cam-surfaces-dozens-more-cases-dropped/

 Car tech privacy: Your car’s infotainment system might be grabbing data from your phone

News 6 has discovered that on thousands of different models of cars, when drivers and passengers plug-in a smartphone using a USB cable or pair it via Bluetooth, infotainment computers are collecting phone data and storing it. What information is being accessed and kept? How about your phone book, your call log, your text messages, photos, social media feeds and every single place you’ve been? If someone has the software, the machine expertise and access to your car, it’s all there for the taking– and someone does.

https://www.clickorlando.com/news/investigators/car-tech-privacy-your-cars-infotainment-system-might-be-grabbing-data-from-your-phone

 Feds drop demand for 1.3 million IP addresses that visited anti-Trump site

The US Department of Justice is backing down on its request to Web hosting service DreamHost to divulge the 1.3 million IP addresses that visited a Trump resistance site. The request was part of the government’s investigation into Inauguration Day rioting, which has already resulted in the indictment of 200 people. More are likely. […] The government, in the court document, said it did not realize that its original warrant, (PDF) which is part of a federal grand jury investigation into Inauguration Day rioting, was so grand in scope.

https://arstechnica.com/tech-policy/2017/08/feds-drop-demand-for-1-3-million-ip-addresses-that-visited-anti-trump-site/

 Protecting Smart Buildings from Cyber Attacks

Many of these devices will be deployed within smart buildings, critical infrastructure and public works. Engineering professionals have previously been largely ignored by cyber criminals and Internet-based security threats; however, as engineering firms find themselves with a much greater online presence, and as the technological integration of the occupant and the built environment gains momentum, cyber criminals are now placing a much greater focus on buildings as the targets for their attacks.

http://www.engineering.com/BIM/ArticleID/15476/Protecting-Smart-Buildings-from-Cyber-Attacks.aspx

 No U.S.-Russia cyber unit without Trump notifying Congress, bill says

The proposal, if it became law, would be the latest in a series of maneuvers by Congress that either limit the president’s authority on Russia matters or rebuke his desire to warm relations with Moscow. A provision contained within the annual Intelligence Authorization Act and passed by the U.S. Senate Intelligence Committee 14-1 would require the Trump administration to provide Congress with a report describing what intelligence would be shared with Russia, any counterintelligence concerns and how those concerns would be addressed.

https://www.reuters.com/article/us-usa-cyber-russia-idUSKCN1B3040

 Unable to get a domain, racist Daily Stormer retreats to the Dark Web

“We can’t keep trying random registrars,” Auernheimer wrote on Gab, a right-wing Twitter competitor, this morning. “We need one that will give us written assurance they will hold the line.” Auernheimer has concluded that’s not likely to happen. So the Daily Stormer has retreated to the Dark Web, operating as a Tor hidden service. A Tor hidden service uses the Tor network to camouflage the location of a Web server, making it practically impossible for anyone to figure out where the server is physically located. Because no one will be able to identify who is providing the Daily Stormer with its hosting service, activists won’t be able to organize a boycott to get the service shut down.

https://arstechnica.com/tech-policy/2017/08/unable-to-get-a-domain-racist-daily-stormer-retreats-to-the-dark-web/

 Are Cyber Weapons Too Dangerous to Use?

Effective cyber capabilities are complex, and building them often requires enormous financial and organizational investment. For a variety of reasons, the United States is in the best position to develop and deploy these tools. This raises the question of whether it should try in the first place. If the United States cannot control its own creations, as critics fear, it may inadvertently cause enormous collateral damage. Organizations like the National Security Agency and U.S. Cyber Command benefit from espionage and offensive cyber operations, but they are likely to hit a lot of unintended targets.

https://warontherocks.com/2017/08/are-cyber-weapons-too-dangerous-to-use/

====

Critical Informatics and the Critical Informatics logo are the trademarks of Critical Informatics, Inc. All other brand names, trademarks, service marks and copyrights are the property of their respective owners.  © 2017 Critical Informatics, Inc. All rights reserved.

//]]>