Hotel chain Marriott disclosed a security breach that impacted more than 5.2 million hotel guests who used the company's loyalty app.
from Cyber Security News https://ift.tt/2UvkFPU
Live Player 3.2 extension and toolbar is a corrupt browser application that ruins Firefox, Google Chrome and Internet explorer, etc. The Live Player 3.2 virus comes as a free TV channel player which offers its user watch various international TV shows and programs without paying anything. But soon after this program has been installed, you,ll
Hotel chain Marriott disclosed a security breach that impacted more than 5.2 million hotel guests who used the company's loyalty app.
Video-conferencing software Zoom has removed its “Login with Facebook” feature using the Facebook SDK for iOS as the Facebook SDK was collecting device information unnecessary for Zoom to provide its services.
Seniors and millennials may be more alike than many believe - they are both connecting to a similar number of Internet of Things devices (at least 7 Wi-Fi devices) and both engaging in similar, risky online behaviors, reveals a new Generali Global Assistance and the Identity Theft Resource Center study.
Forfeiture Support Associates, LLC d/b/a FSA Federal announced that Tim Prange has joined the company to lead its new division providing support services to the U.S. Department of Homeland Security United States Citizenship and Immigration Services.
A new global report from Claroty details a number of potential contributing factors for today's CISOs to consider, including the convergence of IT and OT roles.
In light of recent geopolitical events, there is heightened concern of espionage, nation state attacks and hacktivism.
In July of 2015, hackers from the group Impact Team announced that they had hacked Ashley Madison, a website catering to married individuals seeking an illicit relationship. The hackers claimed that they were in possession of account information for over 30 million users of the site.
Impact Team told Ashley Madison that they would release all the information they took if the website did not shut down. The site’s owners refused to bow to the pressure, and the data flooded out for everyone to see.
The entire incident has sparked a heated debate. The nature of the Ashley Madison site leads some to believe that the users “had it coming,” in some respects. Since the website’s sole purpose is to encourage and facilitate extramarital affairs, one can assume that the patrons of the website had every intention of cheating on their spouses or committed partners— definitely not the ideal way of resolving relationship difficulties.
However, some people maintain the purpose of Ashley Madison does not excuse the actions of the hackers. The fact remains that the Ashley Madison users relied on security, anonymity, and protection, all of which was promised them by the site’s owners. With the incursion of the hackers, that trust was broken.
Ashley Madison is no longer a safe, trusted haven for people desiring to break their marriage vows, and the website is no doubt hemorrhaging money as a result of the breach. In fact, several users have already begun proceedings to sue Ashley Madison for failing to protect their information. The Canadian parent company of the site, Avid Life Media, has put up a reward of $500,000 Canadian, or $377,000 in American currency, to motivate those with information about the hackers to come forward.
While the Ashley Madison site is disreputable, it is not illegal. When the hackers released the data they had collected, they jeopardized the stability of thousands of families. According to reports, some users have committed suicide as a result of their indiscretions going public. Others have been victims of extortion and blackmail. Still others may never recover from the effect on their personal and work relationships.
No matter what the target, the attack on private citizens’ personal information was a crime. Imagine the results if hackers focused on another site, perhaps that of a health insurance company, a dating website, or a major online retailer? Suppose they made demands that the company could not meet and then released information, including financial data, personal health records, social security numbers, and more? The effects would be devastating to millions of people.
The motive of the attack— shutting down Ashley Madison— may have been well-intentioned. However, if the perpetrators escape completely unscathed, without any form of punishment, the entire incident encourages cyber-terrorists to act against others, confident in their own anonymity. Of course, the attack has had another effect as well— discouraging users from trusting their personal information to a website like Ashley Madison. No matter how many guarantees a company may make, the discretion of the user is always the best safeguard.
The Information Technology Laboratory (ITL), a component of the NIST Computer Resource Center, has issued a bulletin that reiterates NIST standards for teleworking.
As COVID-19 has prompted an unprecedented number of companies and government agencies worldwide to suddenly shift to a remote-work model, uncertainties abound.
The term “spoofing” might have a comic implication in some contexts, but it’s no joke when it comes to information security. In fact, this is a subject matter of a whole separate chapter in a seasoned cybercriminal’s handbook. It comprises a multitude of techniques aimed at camouflaging a malicious actor or device as somebody or something else. Out of all the nefarious scenarios that fit the mold of a spoofing attack, the following 11 types are growingly impactful for the enterprise these days.
When you’re watching your favorite crime drama on TV, you may wonder how much of the cool technology is real and practical. Investment in technology is an important part of every police department across the country, but some cities place a greater emphasis on having the latest tech available to their officers. Check out Google Glass, one of many real-life gadgets that makes crime-solving and criminal-catching easier.
Google Draws Inspiration from Star Trek
You’ve probably seen pictures of Google Glass, a head-mounted device that resembles a much skinnier, cooler version of Geordi La Forge’s eyewear from Star Trek. In fact, Google claims that Star Trek was its inspiration for developing wearable electronics that seamlessly integrate into the user’s life. Google Glass rests along the brow line of the user and features a curved portion with a tiny screen near the right eye. The projection system in the device overlays objects and information over the wearer’s regular field of vision.
Dubai Takes the Lead
So how does this next-gen technology help officers in the field? In Dubai, in the United Arab Emirates, police departments have implemented a trial phase in which Google Glass aids its officers in identifying traffic problems and violations. In the future, detectives in Dubai will have Google Glass’s assistance for facial recognition, making it easier for them to identify perpetrators quickly.
The high price point of the Glass, around $1,500, gives most police departments pause. Not so with the Dubai police force, who drive fast, expensive cars that go with the city’s reputation as a high-end, luxurious tourist destination.
Cops Recognize Future Potential
Officers in North America may not have the Dubai law enforcement’s budget, but they recognize the value of a more limited investment in Google Glass. With future developments on the way for Google Glass, officers on patrol could instantly compare a face before them to a facial recognition database. Once a match is found, the office could immediately have access to names, outstanding warrants, criminal records, known associates, and other key information.
Google Glass Serves as a Body Camera
Some officers in Byron, Georgia are already using Google Glass as a body camera. Unlike other body cameras, which often yield fuzzy or jumpy footage, Google Glass provides close-up video that is surprisingly smooth and vivid. In addition, the footage reveals the situation from the perspective of the officer, which is vital when the department has to review what occurred during a crisis.
Currently, Google Glass is somewhat limited in its display capabilities, showing mostly short bits of text, taking video, recording audio, or accepting voice commands. As Google adds more features to Glass, policemen can use it to keep their cities safer, assist citizens faster, and save more lives.
SANS Security Awareness has created the “Securely Working from Home” Deployment Kit. This free kit provides security awareness professionals with a step-by-step guide on how to rapidly deploy a training program for their remote staff.
John Stewart, SVP, Chief Security and Trust Officer for Cisco, recently announced that he is leaving his role. What's next for him and his career?
NIST is updating its Security and Privacy Controls for Information Systems and Organizations framework, a collection of hundreds of specific measures for strengthening the systems, component products and services that underlie the nation’s businesses, government and critical infrastructure.
The possibilities of 3D printing are expanding every day as researchers, scientists, and your next-door neighbor think of new, creative uses for the technology. While it’s nowhere near the Star Trek replicator technology, which can produce a steaming hot, nutritious meal within seconds, 3D printing definitely has incredible potential. The latest implementation? Tiny microfish that can “swim” around in your body.
Enter the Microfish
At the University of California, San Diego, researchers claim to have made a bunch of nano-sized fish. These 3D-printed techno-creatures move through liquids much as fish would— hence the name “microfish.” The team created the microfish with the ability to carry along various nanoparticles. The fish can inject these particles into organs or cells within the human body.
Propulsion and Steering
How do the scientists steer their creations? They included platinum nanoparticles inside the fish. When the fish are in a solution of hydrogen peroxide, these particles react with the liquid to move the microfish forward. To direct the fish, the researchers also put in bits of magnetic iron oxide, which allows the microfish to be directed using magnets.
Design Opportunities
The 3D printing technology allows users to create items of almost any size, as long as the printer has the right parts and settings. Right now, teams like the UC San Diego group can design microscopic units that include various nanoparticles; and in the future, as the technology develops, they will no doubt be able to engineer more complex systems that respond to various if-then scenarios.
Cleanup Crew
What’s the future goal for the microfish? The research team hopes that such miniature robots could one day deliver medicine to patients. Perhaps they could also function as cleaning entities, removing toxins from water or from a bloodstream.
In fact, the research team has already tested a cleaning scenario with the microfish. They made some microfish with polydiacetylene, a toxin neutralizing agent, in nanoparticle form. Next, they created a solution that included harmful toxins. When introduced to the solution, the fish swam as directed, collecting and neutralizing the toxic particles with surprising speed. Scientists had expected them to function at the normal speed of a chemical reaction, but the microfish could move rapidly through the liquid and therefore completed the task much faster.
Future Goals
Undoubtedly, the science and research has much farther to go before we begin injecting ourselves with microfish. However, the medical field is always looking for new, effective, less traumatic ways of improving patient health. With the 3D printing moving ahead so quickly, the days of medical microfish may be just around the corner.
Javier Polit has been named Chief Information Officer (CIO) at Mondelēz International.
How does the team at the Val Verde ISD protect the data of its students, faculty and staff?
The not so black market of exploits sold by virtual arms dealers is starting to creep from the shadows and onto front page news. This is partly thanks to the new firm named Zerodium, a semi-startup whose main objective is finding exploits in software and harware and selling them to high profile companies, financial institutions, and governments. The theory is simple: find hacks in software and sell them for profit.
The clients of Zerodium and others like it are often countries, institutions, and governments seeking to either protect themselves from these exploits or to use the hacks for espionage and intelligence. Zerodium proudly flaunts the fact that they do not give up the secrets to the software companies themselves.
Recently headlines were made when Zerodium offered up a $1 Million USD bounty for a jailbreak exploit for the iPhone. Hackers were successful in finding a hole in a browser (either Chrome or Safari, it hasn’t been publicly confirmed yet) that allows the infiltration of the phone to gather data.
It was a very public announcement for a type of business transaction that has usually been kept in the shadows. Zerodium did not break any laws as of yet – it’s not a crime to discover holes in code nor sell them. Neither are they responsible to give such information back to the company or individual who owns the code in question.
Although Apple’s iOS isn’t the easiest nut to crack, it’s not impossible. The only thing you need is a lot of money. That’s why Chaouki Bekrar, founder of Zerodium, offered up the huge bounty. Bekrar will conceivably go on to sell this hack to an as yet unknown United States agency.
Bekrar has been publicly criticized by heavy hitters such as Google, who compare his dealings as selling bullets in a virtual war. Given the move to virtual everything these days, Bekrar could conceivably be seen as a kind of arms dealer. Zerodium is different in that it builds rather than buys zero day exploits such as this.
Zerodium will not immediately make the vulnerability known to Apple, although they “may” later send it to Apple’s engineers so that they can patch it.
Companies have long sponsored “hackathons,” awarding prize money to those who can dismantle a company’s software. However Zerodium is now going rogue, engineering hacks for profit.
Although Bekrar’s earlier company Vupen only dealt with NATO members, they are still criticized for operating in a very grey area that has some ethical questions. The exploits are merely sold, and what those exploits are used for can become unknown very quickly.
With the success of this rather ingenious marketing ploy, it’s likely that copycat corporations will pop up following Zerodium’s lead. The world of tech is certainly beginning to look like a cyber thriller scifi novel.
The Network Security Trade Act would ensure that the equipment and technology that are used to create the global communications and U.S. infrastructure are not compromised.
Kara Pelecky has been named Chief Information Officer at STANLEY Security, where she will be responsible for the strategic vision, leadership and ongoing implementation of STANLEY Security’s information technology initiatives.
Finnish cybersecurity firm F-Secure released its Attack Landscape H2 2019 report and in it, included some of the first passwords that hackers use when try to hack a device.
New research from The Australian National University (ANU) discusses seven scenarios in how the coronavirus could affect the global economy, including the number of people who could die from the virus.
TikTok announced that cybersecurity expert and security industry veteran Roland Cloutier will join the company as CISO.
It sounds like something out of a science fiction book or movie: it is confirmed that the Chinese government is expanding upon its already robust surveillance database in order to automatically track people and crunch the data in order to predict who is highly likely to commit an act of terrorism.
According to a recent ARS Technica blog post, the Chinese government is basing much of its current technology upon advances that have already been made in US law enforcement surveillance. These “predictive policing” technologies track people based on their purchases, online interactions, phone calls, movements, and more. The government is then able to dispatch police and military power to where crime is likely to occur.
In a communist environment such as China, this power is very Orwellian. Imagine if Tiananmen Square had never happened? If the communist party was able to predict this event and stop it in its tracks before it ever occurred? New technology is starting to be able to monitor an entire population for deviance from the norm.
It’s pretty scary, however China is getting a lot of ideas from the United States itself. Although the US has a lot of laws in place respecting personal privacy, China does not have a lot of those limitations in place.
Back in 1994 predictive policing was first used in New York City where data allowed the police force to deploy officers to places where crime was statistically likely to occur. Although crime fell 34% in three years it also opened a can of worms about the nature of the unconstitutional “stop and frisk” tendencies in which minorities where often targeted just for being in the wrong place at the wrong time.
But again, China doesn’t have many limitations on personal privacy, and its ability to use the internet to monitor citizens is much stronger. It can use predictive policing in a much more pinpointed fashion, and even target individual citizens.
China increased spending in this arena quite a bit, and is urging cities to set up cameras and connect itself into the larger web of surveillance technology including internet and other monitoring systems.
In a strange turn of events, China recently strengthened laws and even included the ability to force tech and internet companies to provide the Chinese government with backdoors and the ability to decrypt user data. The US as well as many international human rights groups objected to such laws, however most recently the FBI is ordering Apple to provide a backdoor into an iPhone used by a terrorist. This lawsuit is being followed very closely by the Chinese.
It’s an interesting development in a country that already has quite a bit of unchecked power over its citizens. However the United States isn’t that far behind when it comes to predictive policing elements. What do you think about this new technology? Is it a help to society or a threat to personal privacy? Leave a comment below
2020 is here and companies that fall under the California Consumer Privacy Act (CCPA) requirements need to take immediate actionable steps now. While many companies are aware that they are subject to the law, 85 percent say they have only partially implemented policies to comply or have done nothing to prepare, according to a recent poll. Non-compliant businesses will not only face hefty fees but potentially adverse impacts to their brand, a loss of customers and negative PR. What are three tips to ensure your enterprise complies with the CCPA?
Steve Pugh joined has joined Twilio as its chief security officer to lead the company’s global trust and security team responsible for corporate, physical and cybersecurity.
Jeff Franklin, who served as the State of Iowa’s Chief Information Security Officer for the past 10 years, has been named Iowa's Chief Cybersecurity Officer.
Which security executives have recently changed positions? Have you begun a new role? Email us at ritcheyd@bnpmedia.com
Fraud and economic crime rates remain at record highs, impacting companies in more ways than ever. PwC's bi-annual survey of business crime reports that fraud committed by customers tops the list of all crimes experienced (at 35%), up from 29% in 2018.
Public K-12 education agencies across the country experienced a total of 348 cybersecurity incidents during calendar year 2019, says a report from the K-12 Cybersecurity Resource Center.
(ISC)² has opened registration for its 10th annual Security Congress taking place at the Hyatt Regency Orlando in Orlando, FL from November 16-18.
Instead of blocking hackers, a new cybersecurity defense approach developed by University of Texas at Dallas computer scientists actually welcomes them.
The buzz word being thrown around in the technology world today is Internet of Things (IoT). With the developments of the internet, it is steadily finding its way into our everyday devices such as lamps, refrigerators, vehicles and even coffeemakers.
While smart technology has definitely led to ground breaking innovations and conveniences, it also has brought new forms of risks that warrant security concerns. Herein are just some of the dangers of internet connected devices.
Today many vehicles are incorporating built in automotive smart systems. Such systems are vulnerable to exploitation. Last year German security specialist Dieter Spaar indicated that certain weak point in the BMW Connected Drive Technology, could allow hackers to gain control of the vehicles by accessing function applications remotely.
A similar demonstration was done on a Jeep Cherokee that led to questions being asked of these systems’ security protocols. The demonstration showed that anyone with an internet connection could control the brakes and critical control systems. This was done through a smart phone network where corrupted data was sent to the Jeep’s navigation and entertainment system.
These two mainstream cases show a worrying possibility where vehicles with smart devices can be vulnerable to cyber-attacks. As such, the potential risk of remotely initiated accidents is higher than ever. This is not to mention that malicious hackers can also manipulate GPS navigation systems and lead unsuspecting drivers into ambushes. The real world implication of such smart automotive systems should be a security concern to drivers everywhere.
A study by Kaspersky lab security expert David Jacoby revealed that nearly all smart home devices are susceptible to a cyber-attack. For instance, a hacker on the same network as your home monitoring cameras can connect to any of them and have access to their live feeds. They can also acquire your password and use it to modify the cameras’ firmware.
This kind of breach makes it easy for malicious individuals to plan a break in. Another experiment showed that it was also possible to bypass a smart phone controlled home security system by using simple software. The software prevented the alarm system from going off when a door or window was opened.
Interconnected control systems of important industrial plants can also be exploited. Quite recently, a malware called Stuxnet was used to disrupt the functions of centrifuges of a nuclear power plant in Iran. If simple software could allow this, dedicated cyber criminals could carry out attacks with catastrophic results. Bold hackers are always finding weak spots on even the most secure control system networks.
Further compounding to this problem is the fact that such threats are not clearly understood. This is due to the dynamic nature of the internet where hackers are always changing their techniques and algorithms. The biggest concern by far of internet connected industrial systems is scale. A security breach on such systems would affect a large number of people.
Although internet connected devices make certain aspects of our lives easier. Their proliferation into certain areas should be carefully monitored and effective security protocols put in place. There are recommended steps that must be taken by everyone utilizing smart devices to ensure their security.