Newsflash woensdag 13 september 2017
Vorig jaar ruim 43.000 smartphones in Nederland gestolen
(security.nl)

Vorig jaar zijn er ruim 43.000 smartphones in Nederland gestolen, zo laat het ministerie van Veiligheid en Justitie vandaag weten. In 2013 ging het nog om bijna 70.000 toestellen.

Hoewel het aantal gestolen smartphones voor het derde jaar op rij is gedaald, zijn met name telefoons van jongeren niet goed tegen diefstal beveiligd, aldus het ministerie, dat zich op baseert op onderzoek van onderzoeksbureau SAMR (pdf).

Van de jongeren in de leeftijd van 16 tot 25 jaar die aan het onderzoek deelnamen zegt 36 procent dat de telefoon in het geval van diefstal of verlies op afstand is te traceren en 21 procent kan de smartphone op afstand blokkeren. De meeste jongeren (63 procent) hebben hun toestel wel beveiligd via een pincode of vingerafdruk.

Europarlement stemt in met plan voor gratis wifihotspots
(tweakers.net)

Het Europees Parlement heeft ingestemd met een regeling voor het aanbieden van gratis wifihotspots en de financiering daarvan. Het project draagt de naam WIFI4EU. Het is bedoeling dat in 6000 tot 8000 gemeenten in heel Europa in openbare ruimtes hotspots komen.

De verspreiding gaat op basis van een 'first come, first serve'-principe. Alleen publieke instanties met openbare ruimtes, zoals bibliotheken, gemeentehuizen, ziekenhuizen, parken en trein- en busstations, kunnen hiervoor in aanmerking komen. Alleen instanties die nu nog geen openbare hotspots hebben, kunnen meedoen.

De instanties die meedoen, moeten betalen voor de connectiviteit en het onderhoud van de dienst. Daarbij geldt de verplichting om ten minste drie jaar lang gratis wifi aan te bieden. Er komt alleen subsidie van de EU als er bij het gebruik van hotspots geen reclame wordt gemaakt en er geen sprake is van commercieel gebruik van de persoonsgegevens.

Bluetooth flaws put billions of devices at risk
(itnews.com.au)

The popular personal area network Bluetooth protocol used by almost every modern mobile device is full of security holes that can be exploited by attackers, researchers have found.

In their BlueBorne research paper [pdf], researchers Ben Seri and Gregory Vishnepolsky from security vendor Armis outline several zero-day vulnerabilities and other security flaws in recent Bluetooth implementations.

They outlined eight vulnerabilities that can be used to attack the Linux open source kernel and Google's Android operating system, as well as Microsoft Windows and Apple iOS.

How to Stop the Next Unstoppable Mega-Breach—Or Slow It Down
(wired.com)

The recent, massive Equifax data breach, which put 143 million US consumers' personal data at risk—including names, Social Security numbers, birth dates, addresses, and some drivers license and credit card numbers—drove home the dangers facing any organization that stores a valuable trove of data.

But awareness alone hasn't stopped or even slowed the recent slate of mega-breaches, which have impacted even strongly defended networks, like those of the Central Intelligence Agency and National Security Agency. That doesn't mean it's time to give up. Even if you can't stop breaches altogether, plenty of steps could slow them down.

Before Equifax,a number of other memorable data breaches lost tens of millions of records—including at Target, Home Depot, the Office of Personnel Management, and Anthem Medicare. While each attack happened in different ways, extra precautions could have helped mitigate the impacts.

Equifax attackers got in through an Apache Struts flaw?
(helpnetsecurity.com)

Have the attackers responsible for the Equifax data breach exploited a vulnerability in Apache Struts, a popular open source framework for developing web applications, to compromise the company’s networks?

Equifax has yet to share more details about how the attack was pulled off, but a report by financial services firm Robert W. Baird & Co. says the company’s “understanding” is that it was an Apache Struts flaw that did the trick.

Quartz reported it was CVE-2017-9805, publicly revealed last week after it had been patched by the Apache Software Foundation. But, the publication later said it was possible that it was CVE-2017-5638, whose existence was disclosed in March 2017 and was, at the time, under active exploitation.

Microsoft patches zero-day used to install police spyware
(itnews.com.au)

Microsoft's regular Patch Wednesday round of security updates for Windows has closed a bug that left computers open to malware installed by law enforcement agencies.

The flaw, CVE-2017-8759, affects the .NET programming framework and allows for remote code execution. Security vendor FireEye said the vulnerability had been used to target Russian Windows users through a malicious Microsoft Office document in rich text format (RTF) in July this year.

The vulnerability would attempt to install Gamma Group's FinSpy or FinFisher law enforcement spyware, FireEye said.

Organizations are uncovering a cloud security paradox
(helpnetsecurity.com)

The characteristics of modern applications in the cloud are changing, requiring software and IT architects to shift priorities.

Businesses of all sizes are transforming in order to compete in the digital era, but are bogged down by legacy technologies and inefficient siloed processes and tools that are ill-equipped to handle today’s volume of data.

Today’s modern enterprise must harness this data and churn it into continuous intelligence in order to make critical business decisions. The second State of Modern Applications in the Cloud report from Sumo Logic continues to reflect the emerging trends and year-over-year shifts in how businesses are approaching their digital strategy, and the ways in which they build their modern applications across each tier of the application architecture.

Why North Korean Actors May Be Targeting Cryptocurrencies
(darkreading.com)

FireEye links North Korean cyberthieves to a recent spate of spearphishing attacks against South Korea.

North Korean cybercriminals may increasingly steal Bitcoins and other cryptocurrencies, following the sanctions imposed Monday by the United Nations Security Council over North Korea's persistent nuclear testing, according to a FireEye blog post.

The sanctions, which include capping North Korea's oil imports and banning the country's profitable textile export business, may fuel even more spearphishing attacks against South Korea's cryptocurrency exchanges and other nations' exchanges, FireEye asserts, as North Korean actors seek to fund the government's activities and the pocketbooks of the country's elite.

DOE invests $50 million to improve critical energy infrastructure security
(helpnetsecurity.com)

Today, the Department of Energy (DOE) is announcing awards of up to $50 million to DOE’s National Laboratories to support early stage research and development of next-generation tools and technologies to further improve the resilience of the Nation’s critical energy infrastructure, including the electric grid and oil and natural gas infrastructure.

This investment builds on the Department’s ongoing efforts toward the rapid development and widespread adoption of tools and technologies that will help create a more resilient, secure, sustainable, and reliable electricity system that can meet the demands of the 21st century and beyond.

“A resilient, reliable, and secure power grid is essential to the Nation’s security, economy, and the vital services that Americans depend on every day,” said Secretary of Energy Rick Perry.

It's September 2017, and .NET lets PDFs hijack your Windows PC
(theregister.co.uk)

While much of the tech world is still fixating on Apple's $1,000 face-reading iPhone, administrators are going to be busy testing and deploying this month's Patch Tuesday load.

Microsoft, Adobe, and Google have all released patches to mark the second Tuesday of the month. The updates include fixes for Flash, Edge, Internet Explorer, and Android.

Redmond's September patch dump addresses a total of 81 CVE-listed vulnerabilities, 39 of which would allow for remote code execution. Four of the flaws are already publicly known and one has been actively exploited.

Deception: A Convincing New Approach to Cyber Defense
(darkreading.com)

How defenders in a US national security agency capture-the-flag exercise used an endless stream of false data across the network to thwart attackers and contain damage.

We live in a reality of continually multiplying attack vectors. Hackers are using increasingly brazen methods to break past perimeter defenses, using stolen credentials and backdoors, phishing, spyware and malware, brute force, and more.

Once attackers have successfully breached a network, they typically have plenty of time to do significant damage. According to the Verizon 2016 Breach Investigations Report, only about 25% of compromises were discovered in "days or less," and the 2017 FireEye M-Trends report indicates that despite continuing improvement, the median number of days attackers dwell in victim networks before discovery is still 99 days — over 3 months — with 47% of breach notifications coming from external sources (such as when the FBI comes knocking).

European banks at mercy of US regulators
(helpnetsecurity.com)

European banks are under disproportional enforcement pressure from US regulators. Since 2012, of the $38.4bn levied in economic crime fines worldwide, 97 percent of all fines have come from US regulators. With the average fine for European banks being ten times the amount US banks have been served.

The Corlytics Barometer, which this issue focuses on economic crime globally, reveals that enforcement action for sanctions and tax evasion are exclusively handed out by US regulators, whereas bribery and anti-money laundering AML are higher up the watch list for European and Asian regulators.

Although the number of fines have increased over the last 12 months, the average value of each fine has decreased. This is due in some part to a few very large fines issued by the US regulators (predominantly the Office of Foreign Assets Control) in 2014. These were mainly for sanctions and Anti-Money Laundering and Banking Secrecy Act (AML/BSA) breaches.

Auto-makers told their autopilots need better safeguards
(theregister.co.uk)

America's National Transport Safety Bureau (NTSB) has decided that late Tesla-driver Joshua Brown was responsible for the crash he died in, but that Tesla's Autopilot contributed by (at the time) allowing him to ignore the road for too long.

As we reported in June, Brown's hands-off approach to driving was the big factor in his demise, but it didn't help that Autopilot missed a truck turning in front of his car.

The NTSB has now expanded on its findings, blaming the accident on a combination of “driver errors, over-reliance on automation” and a “lack of safeguards”.

Bosch wants crowdsourced data for future connected cars
(theregister.co.uk)

“It’s all about how to make the car safer and safer,” German engineering firm Bosch told The Register last week as it exhibited its driverless technologies in London.

Bosch, best known in the UK for domestic power tools and white goods, has been working on self-driving car technology for a few years now. While nothing that it exhibited in London’s Somerset House was new as such, the company’s plans for the future are ambitious – and, inevitably, linked with advances in artificial intelligence technology.

Stephan Stass, Bosch’s senior veep for its driver assistance unit, told us: “Artificial intelligence is absolutely mandatory to go to the next level, level 4 or level 5. It’s not all about see[ing] the current scenery, you have to make an interpretation... ‘What am I going to do?’ in order to maybe reduce the speed.”

Don't forget the human factor in AI and Machine Learning
(theregister.co.uk)

We will be taking a long hard look at AI, ML and data analytics at MCubed next month, but there’s one other element we’ll be keeping in mind throughout: humans.

Yes, from October 9 to 10 we’ve got conference sessions that will get you on top of the key building blocks of ML and machine learning - from algorithms to frameworks, to architectures.

And we’ll have speakers who’ve applied all of the above to real organisations, full of real humans, or to solving problems that humans really care about - from how they shop to how they can prevent a roof from collapsing in heavy rain.

Facial recognition is here. The iPhone X is just the beginning
(theguardian.com)

I have a confession to make. I’m a privacy lawyer who researches the risks of face recognition technology – and I will be buying the new iPhone.

Apple’s next generation smartphone will unlock using face recognition, thanks to infrared and 3D sensors within its front-facing camera. Reports indicate that the face scan and unlock system will be almost instantaneous and require no buttons to be pressed, being always “on” and ready to read your face. Android users can expect similar face unlock features as well.

For the millions of people who will soon depend on face recognition to check their email, send a text, or make a call, it will be quick, easy to use, and yes, pretty cool. But as we grow accustomed to fast and accurate face recognition, we cannot become complacent to the serious privacy risks it often poses – or think that all its applications are alike.