A
war by any other name would void your insurance. Shouldn’t it?
https://www.databreaches.net/cyberwar-are-attacks-by-russian-hackers-still-covered-by-cyber-insurance-germanys-perspective-for-now/
Cyberwar:
Are attacks by Russian hackers still covered by cyber insurance?
Germany’s perspective (for now)
Google
translation:
In
the wake of Russia’s attack on Ukraine, there are fears that Russia
will launch a broad-based cyber war. Western countries could also
become the focus of Russian cyber attacks. In this context, it can
be expected that cyber insurers will invoke the so-called war
exclusion and refuse to pay benefits. However, the considerations
made by the insurers are not convincing, as Jürgen Seiring, Managing
Director of VSMA GmbH, reports.
[…]
Cyber
attacks by Russian hackers against German companies should probably
continue to be insured.
Read
more at UnternehmenCybersicherheit.de.
Re:
Emperors and new clothing… This is like ignoring a smoke alarm.
https://www.databreaches.net/would-sea-mar-community-health-even-know-about-large-patient-data-dumps-if-not-for-databreaches-net/
Would
Sea Mar Community Health even know about large patient data dumps if
not for DataBreaches.net?
The
chronology of Sea Mar Community Health Center’s responses to a
massive data breach suggests that they may be first learning of data
dumps because of notifications by DataBreaches.net or this site’s
reporting of our discoveries. If true, what does that say about
their security and incident response? A DataBreaches.net commentary.
Since
2021, DataBreaches.net has been reporting on a massive breach
involving Sea Mar Community Health Centers in Washington state. For
almost one year now, DataBreaches.net has been contacting Sea Mar to
alert them to data appearing on the internet and to ask them for a
response. For more than
one year, Sea Mar has not responded to a single alert or request from
this site. The chronology of their public notifications,
however, suggests that if it were not for this site, they might not
even know that their patients’ and employees’ personal and
protected health information had been dumped on the internet.
Last
month, DataBreaches.net broke
the story that yet another 161 GB of Sea Mar data had been leaked on
the internet.
The files in that leak, unlike two previous data dumps of Sea Mar
data, consisted of more than 650,000 image files that, for the most
part, were driver’s license images.
DataBreaches.net’s
earlier coverage of prior data leaks of Sea Mar data are linked from
our March article. The three leaks — one by Marketo and two by
Snatch Team — all contained different files. Snatch Team would not
reveal whether there were two different entities who had listed data
with them at different times or if there was just one entity. Nor
did Snatch Team even seem to know that the data came from Sea Mar,
saying that the entity who listed the data dump with them did not
indicate the source of the data. As a result, it is not clear how
many threat actors or groups are in possession of the Sea Mar data or
how broadly it has been circulated already.
Sea
Mar has now issued another press release, stating that it has learned
of additional information involved in their previously-reported
incident. This additional information, they write, “may have
impacted data belonging to current and former Sea Mar patients and
other individuals associated with Sea Mar.” Looking at their press
release below, keep in mind that DataBreaches.net first alerted Sea
Mar to the Marketo leak on June
24, 2021.
This site then posted updates to the incident in October,
2021 (when
Sea Mar first issued a press
release ),
and then again in January,
2022 when
we discovered the first dump of 22 GB on Snatch Team, in February
after
Sea Mar was sued, and then again in March,
when we discovered the 161 GB dump on Snatch Team.
Keeping
that chronology in mind, here is Sea Mar’s newest
press release (emphasis
added by DataBreaches.net):
On
June
24, 2021,
Sea Mar was informed that certain Sea Mar data may have been copied
from its digital environment by an unauthorized actor. Upon receipt
of this information, Sea Mar immediately took steps to secure its
environment and commenced an investigation with the assistance of
leading, independent cybersecurity experts. Through the
investigation, Sea Mar learned that certain data may have been copied
from its digital environment between December
2020 and
March
2021 and
provided notification to individuals known to have been potentially
impacted.
In
January
and
March
2022,
Sea Mar learned of additional data that may have been copied from its
digital environment, and, upon review, identified that such data
contained personal and protected health information. The additional
data contained the following personal and protected health
information: Name, date of birth, and, in some cases, Social Security
number and/or driver’s license information.
Sea
Mar has provided notice of the incident on its website to alert all
potentially impacted individuals of this incident and the update
related thereto. The notice includes information about the incident
and steps that potentially impacted individuals can take to protect
their information.
The
privacy and protection of personal and protected health information
is a top priority for Sea Mar, which deeply regrets any inconvenience
or concern this incident may cause. Sea Mar is continuing to work
with cybersecurity experts to take steps to prevent a similar
incident from occurring in the future. Sea Mar has also established
a toll-free call center to answer questions about the incident. Call
center representatives are available Monday through Friday from 6:00
am – 3:30
pm Pacific Time and can be reached at 1-855-651-2684.
Apart
from the civil lawsuits they are facing, and from a regulatory
standpoint: will investigators look at why Sea Mar had so much old
and unencrypted data on their system? What did their risk assessment
look like for old data? What security did they have on current data?
And shouldn’t they have
had a system to receive and acknowledge notifications of a breach?
Finally, for now: would they have even known about the data leaks if
this site hadn’t discovered their data on leak sites and taken the
time to alert them each time?
Should
they also explain to the customer? “We know you don’t want to
subscribe, and we know why!”
https://www.reuters.com/technology/ai-is-explaining-itself-humans-its-paying-off-2022-04-06/
AI
is explaining itself to humans. And it's paying off
Microsoft
Corp's LinkedIn boosted subscription revenue by 8% after arming its
sales team with artificial intelligence software that not
only predicts clients at risk of canceling, but also explains how it
arrived at its conclusion.
The
system, introduced last July and to be described in a LinkedIn blog
post on Wednesday, marks a breakthrough in getting AI to "show
its work" in a helpful way.
… Google
Cloud sells explainable AI services that, for instance, tell clients
trying to sharpen their systems which pixels and soon which training
examples mattered most in predicting the subject of a photo.
But critics
say the explanations of why AI predicted what it did are too
unreliable because the AI technology to interpret the machines is not
good enough.
Perhaps
easier than some people I know...
https://www.newyorker.com/tech/annals-of-technology/can-computers-learn-common-sense
Can
Computers Learn Common Sense?
A
few years ago, a computer scientist named Yejin Choi gave a
presentation at an artificial-intelligence conference in New Orleans.
On a screen, she projected a frame from a newscast where two anchors
appeared before the headline “cheeseburger stabbing.” Choi
explained that human beings find it easy to discern the outlines of
the story from those two words alone. Had someone stabbed a
cheeseburger? Probably not. Had a cheeseburger been used to stab a
person? Also unlikely. Had a cheeseburger stabbed a cheeseburger?
Impossible. The only plausible scenario was that someone had stabbed
someone else over a cheeseburger. Computers, Choi said, are puzzled
by this kind of problem. They lack the common sense to dismiss the
possibility of food-on-food crime.
Perspective.
https://theconversation.com/the-russian-invasion-shows-how-digital-technologies-have-become-involved-in-all-aspects-of-war-179918
The
Russian invasion shows how digital technologies have become involved
in all aspects of war
Since
Russia invaded Ukraine, we keep hearing that this war is like no
other; because Ukrainians have cellphones and access to social media
platforms, the traditional control of information and propaganda
cannot work and people are able to see through the fog of war.
As
communications scholars and historians, it is important to add nuance
to such claims. The question is not so much what is “new” in
this war, but rather to understand its specific media dynamics. One
important facet of this war is the interplay between old and new
media — the many loops that go from Twitter to television to
TikTok, and back and forth.
Tools
& Techniques. When you have that tingle of suspicion?
https://www.bespacific.com/reverse-google-images-search-can-help-you-bust-fake-news-and-fraud/
Reverse
Google Images Search Can Help You Bust Fake News and Fraud
CNET:
“On Friday, a photo that purported to show two British naval
aircraft carriers dwarfing a much smaller French naval ship made the
rounds on social media. But you can’t always believe your eyes
online. Photos
are
easy to duplicate and then use in misleading ways. Scammers can lift
a social media profile photo, for example, and use it to give a fake
account a sheen of authenticity. Similarly, news
photos
can be grabbed from coverage of one event and pasted into stories
about another event, misleading readers about what’s happening. In
the case of the photo of the aircraft carriers, a reverse image
search revealed
the tiny vessel had
been added digitally, Snopes found. A reverse image search can help
you spot misleading photos by identifying their origin. If you’re
in doubt, this search engine tool will help you spot scams, debunk
false news, and discover people using your images
without
your permission. Reverse image searches rely on either Google’s
Images
or Lens service. Either will provide a list of websites displaying
the photo or image, as well as a link and description. Both services
can also give you a list of visually similar images that might
provide images shot from different angles. The list might also show
the same picture with an original caption or from an earlier news
story. That information is often used by fact-checkers, who’ve
been using the tools to verify
whether images from the war in Ukraine are
current and shared in the right context. These tools are so powerful
that scammers are turning to high-tech methods to end-run reverse
image searches. AI-generated profile pictures have become popular
with dishonest groups that rely on bogus social media accounts, like
the scheme researchers
identified on LinkedIn that
aimed to generate sales leads with a raft of fake profiles. Reverse
image searching an AI-generated photo won’t lead you to a real
person, so they’re harder to identify as fake. But the use of
AI-generated photos is currently fairly limited…”
Tools & Techniques.
https://www.engadget.com/snapchat-american-sign-language-lens-practice-184825207.html
Snapchat's
latest lens helps you learn the American Sign Language alphabet
Snap
isn't done teaching Snapchat users how to communicate using
sign language.
The social media service has introduced
an
ASL
Alphabet Lens that,
as the name implies, significantly expands the American Sign Language
learning experience. You'll still learn how to fingerspell your name
using individual letters, but you now also get to practice the ASL
alphabet and play two games to test your knowledge.