Tuesday, May 16, 2017
“See? We don’t need missiles to be dangerous!”
In Computer Attacks, Clues Point to Frequent Culprit: North Korea
Intelligence officials and private security experts say that new digital clues point to North Korean-linked hackers as likely suspects in the sweeping ransomware attacks that have crippled computer systems around the world.
The indicators are far from conclusive, the researchers warned, and it could be weeks, if not months, before investigators are confident enough in their findings to officially point the finger at Pyongyang’s increasingly bold corps of digital hackers.
I wonder if this is also North Korea. They have some experience hacking film studios.
Upcoming Disney Film Target of Online Piracy Threat
A hacker or hackers claim to have stolen an unreleased film from Walt Disney Co. and threatened to release it online unless the company pays a ransom, Chief Executive Robert Iger told employees.
Speaking at a town hall for Disney's ABC News division Monday where the topic of piracy was raised, Mr. Iger said Disney wouldn't pay the ransom, according to a person who was present.
… The hackers have threatened to first release five minutes of the movie and then more in 20-minute chunks, Mr. Iger told the Disney employees.
… It comes, however, at a time of increased concern about digital vulnerabilities throughout the business world, including in Hollywood. Hackers recently uploaded an entire season of "Orange is the New Black" to online file-sharing services before Netflix Inc. released the episodes on its streaming service.
Another nation state hacker.
Small Countries’ New Weapon Against Goliaths: Hacking
Hackers in Vietnam have been attacking foreign companies and other targets for years, seeking information and using tactics that suggest links to the Vietnamese government, a cybersecurity company said Monday.
The findings, laid out in a report released by the company, FireEye, come as companies and experts look beyond traditional sources of attacks like China and Russia to deal with new or rising threats. Smaller countries are now trying their hand at hacking, experts say, as they seek to follow dissidents, undermine enemies or comb corporate files for trade secrets.
Seems trivial in comparison to the ransomware attack last weekend.
Hackers Hit Bell Canada, Access Customer Information
Bell Canada on Monday said that an unknown hacker managed to access customer information on nearly 2 million customers, including email addresses, customer names and/or telephone numbers.
The company said that approximately 1.9 million active email addresses and approximately 1,700 names and active phone numbers were accessed illegally in the attack.
There is no indication that any financial, password or other sensitive personal information was accessed, a statement read.
The telco said the incident is not connected to the recent global WannaCry ransomware attacks, and believes there is “minimal risk involved for those affected” by the situation.
A recap for my Computer Security students.
15 Most Famous Cyberattacks of All Time
If we choose to use Big Data for medical research, this is going to come up every time.
Google received 1.6 million NHS patients' data on an 'inappropriate legal basis'
Sky News has obtained a letter sent to Professor Stephen Powis, the medical director of the Royal Free Hospital in London, which provided the patients' records to Google DeepMind.
It reveals that the UK's most respected authority on the protection of NHS patients' data believes the legal basis for the transfer of information from Royal Free to DeepMind was "inappropriate".
The development raises fresh concerns about how the NHS handles patients' data after last week's cyberattack on hospitals and GP surgeries, which could have been prevented if staff had followed guidance issued a month earlier.
… As Dame Fiona writes, she had informed Royal Free and DeepMind in December that she "did not believe that when the patient data was shared with Google DeepMind, implied consent for direct care was an appropriate legal basis".
Big Data for the military.
The Pentagon’s New Algorithmic Warfare Cell Gets Its First Mission: Hunt ISIS
By year’s end, the Pentagon wants computers to be leading the hunt for Islamic State militants in Iraq and Syria, through turning countless hours of aerial surveillance video into actionable intelligence.
It’s part of Project Maven, a fast-moving effort launched last month by Deputy Defense Secretary Bob Work to accelerate, improve, and put to wider use the military’s use of machine learning.
… Thousands of military and civilian intelligence analysts are “overwhelmed” by the amount of video being recorded over the battlefield. These analysts watch the video, looking for abnormal activities. Right now, about 95 percent of the video shot by drone aircraft is from the campaign against ISIS in Iraq and Syria.
GAO – Internet of Things: Status and implications of an increasingly connected world
by Sabrina I. Pacifici on May 15, 2017
Technology Assessment: Internet of Things: Status and implications of an increasingly connected world, GAO-17-75: Published: May 15, 2017. Publicly Released: May 15, 2017.
Question: Is there already a public transit App for Denver and I just missed it? If not, why not? I’d like to know if the bus will be here in one minute or I just missed it and the next one won’t be here for a half hour.
Uber app to display real-time public transit data so you can easily combine modes of transport
… For this feature — available only in the Android Uber app for now — the ride-hailing giant has teamed up with Transit, a Canadian-headquartered urban transport information service that operates in more than 125 cities globally, to show live departure times whenever a rider’s destination is near a transit stop.
Tapping on a specific departure will take the user to the Transit app for full directions, service information, and so on.
While this may seem like a counterintuitive move for Uber, given that it seems to be encouraging riders to use alternative transport, Uber is actually acknowledging the ways people already use its service. They may take an Uber car to a train station to travel a significant distance and then walk or jump into another Uber when their train reaches its destination. So this is Uber providing an element of conveniences to its users — it saves them having to continuously switch between the Uber app and other transport data services.
Something for my entrepreneurs to consider.
Why Amazon Is Leaving Legacy Retailers in the Dust
… “Their model is [that] the product is almost a commodity,” Kahn notes. “They can control those products, but what they’re differentiating on is the retail experience and technology. So, they take out all the pain points in shopping, and they lock you in. Amazon Prime is the perfect example.”