I wish I could say this was the first
“shocking lack” I had ever reported. This relates to the ATM
cash withdrawal incident. (Note that if this had been a CyberWar
exercise by a state actor, passing some information to a criminal
gang along with instructions on how to withdraw cash from ATMs would
shift blame to them. Just saying...)
More fascinating reporting by Brian
Krebs:
A 2011 hacker
break-in at banking industry behemoth Fidelity National
Information Services (FIS) was far more extensive and
serious than the company disclosed in public reports, banking
regulators warned FIS customers last month. The disclosure
highlights a shocking lack of basic security
protections throughout one of the nation’s largest
financial services providers.
Read about it on KrebsonSecurity.com.
[From the article:
FIS management now recognizes that the
security breach events of 2011 were not just a pre-paid card fraud
event, as originally maintained, but rather are that of a broader
network intrusion.”
Indeed, the FDIC’s examiners found
that there was scarcely a portion of the FIS network
that the hackers did not touch.
For my Ethical Hackers: Using the
other guy's program means you don't leave any “programming
fingerprints” during your attack. (Also see: False Flag)
American
Gets Targeted by Digital Spy Tool Sold to Foreign Governments
The email appeared to come from a
trusted colleague at a renowned academic institution and referenced a
subject that was a hot-button issue for the recipient, including a
link to a website where she could obtain more information about it.
But when the recipient looked closely
at the sender’s email address, a tell-tale misspelling gave the
phishing attempt away — the email purported to come from a
professor at Harvard University, but instead of harvard.edu, the
email address read “hardward.edu”. [Always use
your spell checker! Bob]
Not exactly a professional con-job from
nation-state hackers, but that’s exactly who may have sent the
email to an American woman, who believes she was targeted by forces
in Turkey connected to or sympathetic to the powerful Gülen
Movement, which has infiltrated parts of the Turkish government.
The email contained a link to a web
site in Turkey, where a malicious downloader file was waiting to
install on her computer — a downloader that has been connected in
the past to a spy tool purportedly sold exclusively to law
enforcement and intelligence agencies around the world.
For my Ethical Hackers. Think we could
borrow Denver's machines?
Bruce66423 submits a report from The
Independent, writing that "a French primary election is made the
stuff of farce after journalists defeat the 'secure' election
system." From the article:
An
'online-primary,' claimed as 'fraud-proof' and 'ultra secure,' has
turned out to be vulnerable
to multiple and fake voting. The four-day election has also the
exposed the poisonous divisions created within the centre-right Union
Pour un Mouvement Populaire (UMP) by the law permitting gay marriage
which took effect last week. ... What was already shaping up as a
tense and close election was thrown into utter confusion at the
weekend. Journalists from the news site Metronews proved
that it was easy to breach the allegedly strict security of the
election and vote several times using different names."
So this does not sound like his squad
mates packing things up. Who searched his computer?
FourthAmendment.com writes:
Defendant was
injured by an IED while serving in the Army in Iraq, and he was
medically evacuated from Iraq. His property was inventoried pursuant
to Army regulation. His computer was subject to inventory for things
“gore, inappropriate, or porn” and for classified material before
the computer was returned to him, and child pornography was found.
The Court of Appeals for the Armed Forces held that the inventory of
the computer violated the Fourth Amendment and M.R.E. 313(c). United
States v. Kelly, 2013 CAAF LEXIS 569 (C.A. A.F. May 23, 2013)
Read more on FourthAmendment.com.
[From the article:
It appears that the initial inventory
of Kelly's belongings in Iraq by the SCMO was a proper inventory.
The SCMO secured Kelly's PE and properly made an accounting of
Kelly's belongings. The SCMO's sworn statement indicates that he
inventoried Kelly's belongings and "personally ensured"
that they were dropped at the Mortuary and he was given a memo that
served as a "hand receipt" which was eventually provided to
CID.
The first step on that slippery slope?
Like fingerprints, a DNA profile will never be deleted.
Mark Memmott reports:
By a 5-4 vote, the
U.S. Supreme Court has upheld a Maryland law that allows police to
collect DNA, without first getting a warrant, from persons who are
arrested.
“When officers
make an arrest supported by probable cause to hold for
a serious offense and bring the suspect to the station to
be detained in custody, taking and analyzing a cheek swab of the
arrestee’s DNA is, like fingerprinting and photographing, a
legitimate police booking procedure that is reasonable under the
Fourth Amendment,” writes
Justice Anthony Kennedy in an opinion joined by Chief Justice
John Roberts and associate justices Clarence Thomas, Stephen Breyer
and Samuel Alito.
Read more on NPR.
I don't get it...
Pete Williams and Andrew Rafferty
report:
Lawyers for Jill
Kelley — the Florida woman whose complaint to federal authorities
about harassing emails last year led to the resignation of former CIA
Director David Petraeus — on Monday filed a lawsuit claiming the
FBI and Department of Defense officials violated her privacy by
failing to keep information about her role in the investigation
confidential.
Read more on NBC.
Perhaps I could write up some
guidelines for a “Facebook for Employers” page? Include some
“Likes” from President Obama and the Pope? Or just some
discussions about 'searching for the perfect circumstances for a
privacy lawsuit?”
Daniel Solove writes:
In 2012, the media
erupted with news about employers demanding employees provide
them with their social media passwords so the employers could access
their accounts. This news took many people by surprise, and it set
off a firestorm of public outrage. It even sparked a significant
legislative response in the states.
I thought that the
practice of demanding passwords was so outrageous that it couldn’t
be very common. What kind of company or organization would actually
do this? I thought it was a fringe practice done by a few small
companies without much awareness of privacy law.
But Bradley Shear,
an attorney who has focused extensively on the issue, opened my eyes
to the fact that the practice is much more prevalent than I had
imagined, and it is an issue that has very important implications as
we move more of our personal data to the Cloud.
Read more on Concurring
Opinions.
What should the FDA be doing?
FDA
Can’t Hold Back Stream of Mobile Health Apps
It was bound to happen. As smartphones,
tablets and all those wearable computer gizmos get more and more
powerful — and just as important — become ever more constant in
our lives, they will enable apps that no one anticipated. Not even
the fine people of the Food and Drug Administration
We
wrote about one such app called uChek, after witnessing its
founder Myshkin Ingawale at this year’s TED conference perform a
urinalysis check on stage with nothing more than a very full plastic
cup, test strips, and an iPhone. The app, recently made available in
Apple’s iTunes store, uses the iPhone’s powerful camera to
analyze standard medical supply chemical strips by first taking
photos with your phone at predetermined times, and then comparing the
colors that emerge on the urine-soaked strip to a color-coded key.
Depending on how the colors match up (and what is being measured),
users get a simple positive or negative result, a number, or the
descriptors “trace” or “large” corresponding to the levels of
such things as glucose, bilirubin, proteins, specific gravity,
ketones, leukocytes, nitrites, urobilinogen, and hematuria present in
your urine.
When the app launched stateside,
Ingawale sent Wired an excited email. What James Woods, the FDA’s
Deputy Director of
Patient Safety And Product Quality
in the
Office of In Vitro Diagnostics and Radiological Health
, sent him
recently was an “It
Has Come to Our Attention Letter.”
Woods, in the very politely worded
missive, informs Ingawale that: “Though the types of urinalysis
dipsticks you reference for use with your application are cleared,
they are only cleared when interpreted by direct visual reading.
Since your app allows a mobile phone to analyze the dipsticks, the
phone and device as a whole functions as an automated strip reader.
When these dipsticks are read by an automated strip reader, the
dipsticks require new clearance as part of the test system.”
(Related) Another “What is
government's proper role” that highlights how poorly we deal with
technology. The 'rules of the road' are unlikely to change, so are
we merely looking to afix blame?
The
Feds Have No Clue How to Legislate Autonomous Cars
With everyone from Audi to Google to
Volvo developing autonomous vehicles, the federal government is
cautiously getting behind the wheel to regulate how self-driving cars
should be operated and legislated. But its recommendations are far
from clear-cut, underscoring just how far behind the times Washington
is with regard to emerging technology.
Still, by stepping into the fray and
attempting to codify when, where and how autonomous vehicles are
developed and deployed, the National Highway Traffic Safety
Administration is all but admitting that the day is coming when we’ll
all let the robot drive.
Perspective: “We don't need no
stinking cameras!”
"the reporters of the Chicago
Sun-Times are being given training in iPhone photography, to
make up for the firing of the photography staff. From the CoM
story: 'The move is part of a growing trend
towards publications using the iPhone as a replacement for fancy,
expensive DSLRs. It's a also a sign of how
traditional journalism is being changed by technology like the iPhone
and the advent of digital publishing.'"
(Related) “We need more stinking
cameras!”
"The Montreal Policemen's
Brotherhood is proposing that officers be equipped
with uniform-mounted cameras that can be used to record various
interactions. The union says in other jurisdictions where police
officers are equipped with point-of-view cameras, the use of force by
officers and assaults on officers drops by as much as 60%. One
system is currently
being tested in Edmonton, Alberta."
How to expand “summary” RSS feeds
into full text feeds. (Personnaly, I like the summaries)
[MakeUseOf just changed from full
text to a summary feed Bob]
… The reason is that too many
unethical sites were “scraping our feed” and passing off
MakeUseOf’s stories as their own. This meant that these low
quality sites were duplicating our content and ranking for it on
Google and other search engines. We don’t have a problem with
sites using our articles but in return, we insist on a clear
linkback, as well as author attribution. These content thieves were
not doing this, and they are not the kind of people to honor any
takedown requests. Therefore, we began a fiendishly clever plan and
moved to summary feeds.
If you absolutely cannot live without your full text RSS feeds,
you can still have them and at the same time help us defeat the
scrapers. Simply plug the
RSS feed into Full Text RSS
Feed. Then put the RSS feed address it gives you into your RSS
reader, and hey presto, you have your full MakeUseOf feed back.
For my Computer Security students.
Risk analysis does not stop with a determination that an event is
“low probability.” You must also consider the cost of recovery.
Presentation:
Survey of Government IT Professionals – Disaster Unpreparedness
“So, how confident are Fed IT
professionals in their agencies’ DR2 capabilities? How ready and
resilient are the systems, and do agencies verify by testing? To find
out, MeriTalk
surveyed 150 Federal DoD and civilian IT professionals in
December 2012. The Disaster Unpreparedness report reveals that few
agencies are actually prepared to recover their data in the event of
a natural or man-made incident… The amount of data agencies
must backup and recover is growing, yet only 8% of Feds are
confident they can recover their data today.”
For my Math students. The problem is
that many of these websites are targeted to K-12 students and unless
I can point to individual videos, my students feel the sites are too
juvenile for them. This one at least has a “College” section.
ULearniversity
- Online Math Lessons and Practice
ULearniversity
is a free site featuring arithmetic and algebra lessons. On
ULearniversity you can watch tutorial videos and practice the
concepts taught in the videos. ULearniversity provides instant
feedback on your practice problems. As a registered ULearniversity
user you can track your progress.
For all my students...
… this is the digital age and
there’s a substantial demographic that is working from home.
That’s nearly 10%
in the U.S. alone and rising. [And all of my students. Bob]
No comments:
Post a Comment