Tuesday, November 22, 2016

Something I could ask my Computer Security class to do?
IoT security camera infected within 98 seconds of plugging it in
Unlike the average Jane or Joe Doe who would not want their security camera to be immediately infected with malware, Rob Graham, CEO of Errata Security, called it “fun” to watch the infection happen.  He tweet-documented his experience.
   It supports Universal Plug and Play (UPnP), not a secure feature but easy for non-techies to setup since basically a person plugs a UPnP device in and it works.  The average user would not likely do this, but Graham said he isolated the camera from his home network by setting it up behind a Raspberry Pi router.
   His security camera ended up with multiple malware infections.  Mirai malware was not the first infection; he said it was “something else similar to it.”


Also see their Breach Litigation report
From Bryan Cave, this free resource on Incident Readiness and Response:
Since the first publication of this handbook in 2014, the legal ramifications for mishandling a data security incident have become more severe.  In the United States, the number of federal and state laws that claim to regulate data security has mushroomed.  The European Union has also enacted a new General Data Protection Regulation which will extend the United States framework for responding to data breaches across the EU, but with significantly enhanced penalties.  This handbook provides a basic framework to assist in-house legal departments with handling a security incident.
Click here for the Data Security Breach Handbook 2016 edition.


Is this why Trump was elected?
Most Students Don’t Know When News Is Fake, Stanford Study Finds
Preteens and teens may appear dazzlingly fluent, flitting among social-media sites, uploading selfies and texting friends.  But they’re often clueless about evaluating the accuracy and trustworthiness of what they find.
Some 82% of middle-schoolers couldn’t distinguish between an ad labeled “sponsored content” and a real news story on a website, according to a Stanford University study of 7,804 students from middle school through college.  The study, set for release Tuesday, is the biggest so far on how teens evaluate information they find online.  Many students judged the credibility of newsy tweets based on how much detail they contained or whether a large photo was attached, rather than on the source.


A couple of the talks at the WSJ’s CEO Conference.
Stephen Wolfram on Communicating With AIs

NSA Chief Michael Rogers Talks Cybersecurity


Perspective.
Almost half the world will be online by end of 2016; poorer countries will lag : Report
By the end of 2016, almost half of the world's population will be using the internet as mobile networks grow and prices fall, but their numbers will remain concentrated in the developed world, a United Nations agency said on Tuesday.
In the world's developed countries about 80 percent of the population use the internet.  But only about 40 percent in developing countries and less than 15 percent in less-developed countries are online, according to a report by the U.N.'s International Telecommunications Union (ITU).

No comments: