STE WILLIAMS

Amazon resets compromised passwords: Report

Amazon.com appears to be asking some of its customers to reset passwords after a breach of some sort.

The online bazaar sent cryptic emails to some of its account holders warning them that their passwords were blabbed in some way, and therefore have to be changed, according to ZDNet.

“We recently discovered that your password may have been improperly stored on your device or transmitted to Amazon in a way that could potentially expose it to a third party. We have corrected the issue to prevent this exposure,” Amazon is reported to have told customers.

Amazon says it has no evidence that the passwords were abused, and had reset the credentials out of an “abundance of caution.”

The company has not yet confirmed the reset to any media, including El Reg.

Let’s not rush to judgement here: Amazon has oodles of partners and it could well be that the passwords were transmitted in clear text from a third party application or service, a suggestion we make given the seemingly small number of resets. Bezos’ book barn may not have been compromised in any way. ®

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/25/amazon_password_reset/

Second Dell backdoor root cert found

A second root certificate has been found in new Dell laptops days after the first backdoor was revealed.

The DSDTestProvider certificate was first discovered by Laptopmag. It is installed through Dell System Detect into the Trusted Root Certificate Store on new Windows laptops along with the private key.

Dell has been contacted for comment. The Texas tech titan has called the first certificate gaffe an “unintended security vulnerability” in boilerplate media statements.

Carnegie Mellon University CERT says it allows attackers to create trusted certificates and impersonate sites, launch man-in-the-middle attacks, and passive decryption.

“An attacker can generate certificates signed by the DSDTestProvider CA (Certificate Authority),” CERT bod Brian Gardiner says.

“Systems that trusts the DSDTestProvider CA will trust any certificate issued by the CA.

“An attacker can impersonate web sites and other services, sign software and email messages, and decrypt network traffic and other data. Common attack scenarios include impersonating a web site, performing a MiTM attack to decrypt HTTPS traffic, and installing malicious software.”

Punters should move the DSDTestProvider certificate to the untrusted store using Windows certificate manager. They also need to kill Dell.Foundation.Agent.Plugins.eDell.dll to stop persistence.

The eDellRoot certificate was found this week in XPS, Precision, and Inspiron laptops.

Security bod Robert Graham recommends says black hats should head straight to the international airport lounge and use the handy certificates and keys to plunder executives’ laptops.

“If I were a black hat hacker, I’d immediately go to the nearest big city airport and sit outside the international first class lounges and eavesdrop on everyone’s encrypted communications,” Graham says.

“I suggest international first class, because if they can afford US$10,000 for a ticket, they probably have something juicy on their computer worth hacking.”

Sponsored:
Go beyond APM with real-time IT operations analytics

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/25/dsdtestprovider/

Cyber Monday: What Retailers & Shoppers Should Watch For

Attackers have a variety of ways to commit fraud and may take advantage of busy time to sneak in a data breach.

While store managers and salespeople gear up for long lines, social engineering, and point-of-sale malware on Black Friday, CIOs and development teams gear up for fraudulent online purchases and Web-based data breaches on Cyber Monday.

The most immediate concern is anything that prevents a retailer from making money, like a denial of service attack on an online shop or mobile purchasing app — or a security measure that causes impatient customers to take their business elsewhere. Threats that may cost a retailer money — like shipping fraud or chargebacks for fradulent purchases made with stolen credit cards or gift cards bought with stolen credit card data — are secondary. Data breaches of customer payment card records or other information fall to the bottom of the priority list.

As the Retail Cyber-Intelligence Sharing Center (R-CISC) explained in advice to members about holiday “hacking season”: “Downtime is expensive, but especially so at this time of year. Retail staff is motivated and focused on sales, at the risk of possibly allowing fraudulent transactions or other types of breaches.”

[Read about PoS malware and new ways to trick new payment technology in “Black Friday: Brick-and-Mortar Retailers Have Cyber Threats Too.”]

Suni Munshani, CEO of Protegrity, says attackers know all this well and can take advantage of retailers’ priorities as well as the fact that shopping patterns are different during the holiday season than they are the rest of the way.

“On a big shopping day,” he says, “it’s harder to zero in on fraudulent behavior and respond to it quickly.”

According to the R-CISC: “Retailers see much higher volume peaks, especially at sale times, both in stores and online. This makes it harder to detect anomalous traffic, and it’s impractical to block IP ranges based on geography, because online sales can be global.”

Much of the fraud committed during the holiday season won’t be dealt with until January 15, says Munshani.

Plus, Munshani says that attackers will steal “anything that can be monetized,” which extends beyond cardholder data. Attackers may also grab information about what items stores are planning to order and where they’re being shipped.

“Visibility into the supply chain can provide a competitive advantage,” says Munshani. “If I wanted to leverage that data in the financial markets, I could leverage that in a heartbeat.”

How are attackers likely to compromise retailers online this season?

 Via vulnerable web apps

“[Poor] patching and weak application security were two of the underlying themes across all retailers, weak and strong,” says Aleksandr Yampolskiy, co-founder and CEO of SecurityScorecard, which released a new report on retail security this week.

Yampolskiy says that even the top-performing retailers they studied were often vulnerable to POODLE and FREAK. Plus, 100 percent of retailers were found with Web application vulnerabilities or server misconfigurations. They were particularly prone to troubles in their content management systems (CMS). 

“Some of these retailers are brick and mortar,” Yampolskiy says. “Doing good IT is not part of their core competence.” That said, some of the top-performing retailers online are ones that are primarily brick-and-mortar businesses.

SecurityScorecard did not find any correlation between security practices and what kinds of goods a business sells — food, furniture, or footballs. The top performers, according to SecurityScorecard are: Guess (clothing), Dick’s Sporting Goods, Brookshire’s (grocery store), Quizno’s (fast food franchise), DyersOnline.com (Automotive supplies), Moen (housewares), American Greetings (greeting cards), and BackCountry.com (clothing). 

Via mobile devices

More and more consumers are doing their shopping from mobile devices. Adobe, in its Digital Index Online Shopping Predictions, predicted that on Thanksgiving Day, mobile devices will for the first time overtake desktops as the top device for online shopping. Iovation predicts that between Black Friday to Cyber Monday, 48% of all retail transactions will be made from mobile phones and tablets. This is higher than the overall percentage through the year thusfar, which is 41%, according to Iovation.

The good news, according to Iovation VP of Product Scott Olson: “We still see fraud rates a little lower on mobile, because it’s harder to automate on mobile.”

Yet, according to a study by Bluebox, released today, there are plenty of security vulnerabilities lurking within the top three one-click purchase apps from merchants and the top two peer-to-peer payment apps used to send monetary gifts to family and friends.  

Bluebox researchers found that all of those apps were vulnerable to tampering that would allow funds to be rerouted to accounts controlled by attackers and that none of the apps encrypted data written to disk.

Via online auctions 

There’s also “triangulation fraud,” which Olson says is “a very clever way to monetize stolen cards.”

A triangulation fraudster sets up an online auction for an item they don’t actually possess — say, a high-end camera. When the auction ends, the attacker uses a stolen payment card to purchase that same camera from a store and has it shipped to the winning bidder.

The bidder gets their purchase. The attacker pockets the bidder’s payment. (It doesn’t matter to the attacker if the bidder paid $100 for an item that cost $500 at the store, because the attacker paid that $500 with someone else’s money. Their net gain is still $100.)

The fraud is for the unlucky cardholder, their bank, and the retailer to sort out.

Via gift cards

Another popular way for attackers to monetize stolen payment card data is through online gift card purchases.

Retailers can’t do without the revenue made from gift cards, so they have attempted to outsource the headache and the liability for gift card fraud by outsourcing it to third-party fulfillment services like CashStar. According to SecurityScorecard, the practice seems to be effective.

“CashStar does seem to be pretty good at reducing fraud,” says Alex Heid, chief of research at SecurityScorecard. “Chatter on the underground seems to confirm it,” he says, referencing frustrations voiced on hacker forums.

 

Better defense

Munshani says that retailers and security companies have already made huge advancements in Web security measures, to improve authorization and reduce fraud without increasing the “friction” that makes impatient consumers decide to take their business elsewhere.

He recommends systems that request second factors of authentication only when a site user or payment accountholder exhibits anomalous behavior. For example, he says, when a user connects from an unfamiliar device, issue a second factor, like a SMS verification code. When a purchase is made for a large amount or from a region an accountholder is not usually traveling in, send a message to confirm purchase.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Article source: http://www.darkreading.com/vulnerabilities---threats/cyber-monday-what-retailers-and-shoppers-should-watch-for/d/d-id/1323303?_mc=RSS_DR_EDT

Cyber-terror: How real is the threat? Squirrels are more of a danger

Comment The UK Chancellor George Osborne last week announced that the British government plans to double cybersecurity spending and establish a single National Cyber Centre.

Cybersecurity spending will rise to £1.9bn ($2.87bn) at a time of budget cuts to police and other government departments. More details are expected to come in the Autumn Statement to Parliament on Wednesday.

Speaking at GCHQ last week, Osborne claimed that the extra spending is justified in large part because cyber-jihadists are trying to take down critical infrastructure – power stations, air traffic control systems and more. Daesh, aka the Islamic State, is plotting deadly attacks on computer systems – and is close to achieving the capability, the Chancellor alleged [speech transcript here, press statement here].

“I have made a provision to almost double our investment to protect Britain from cyber attack and develop our sovereign capabilities in cyberspace, totaling £1.9 billion over five years,” Osborne said.

“If you add the spending on core cyber security capabilities government protecting our own networks and ensuring safe and secure online services, the government’s total cyber spending will be more than £3.2 billion.”

Some of the money will go into an Institute of Coding as well as fighting cybercrime. But a major focus of the spending will come in further boosting the capabilities of GCHQ to tackle Daesh killers. Neither Russian nor China (the UK’s most capable cyber-espionage adversaries) merited a mention in the Chancellor’s speech.

Daesh, by contrast, were mentioned eight times. As well as talking about the use of the “internet for hideous propaganda purposes, for radicalization [and] for operational planning,” Osborne claimed the medieval terror mob posed a growing cyber threat.

But what are the capabilities of the self-styled Cyber Caliphate? Russia is now the chief suspect in the most serious network assault ever attributed to the Cyber Caliphate group, the hack on French TV station TV5 Monde back in April. Jihadist propaganda was posted on the station’s website by miscreants who claimed they were affiliated with the Islamic State. The TV network was knocked off air for about 18 hours.

Pretty much everyone took it at face value that the Cyber Caliphate was behind the attack, and it wasn’t until weeks later, once the dust had settled, that experts published evidence that undermined the Daesh-involvement hypothesis and fingered Russians as the likely culprit.

DDoS, defacement and social media hijacking

As explained in some depth by security expert Robert Pritchard, cyber-jihadism is likely limited to “website defacements, denial of service attacks or some sort of social media hijacking.” Pritchard published the article months ago but he told us last week that the capabilities of cyber-jihadists hasn’t changed much, in his assessment.

Hacktivists on the pro-Assad side – most notably the self-styled Syrian Electronic Army – are demonstrably capable when it comes to social media hijacking, which they normally pull off using phishing. Elements of malware slinging are also involved in both sides of the pitiless civil war in Syria.

But an ability for militias or terrorists to launch infrastructure attacks? Really there’s no evidence for that, at least in the public domain – even though some infosec firms are all too ready to ramp the threat level all the way down to DEFCON-1.

London calling

Anti-malware firm BitDefender last week implausibly warned that an “IS cyber-attack on the UK could cripple all forms of communication and infrastructure.”

Catalin Cosoi, chief security strategist at Bitdefender, stated: “A possible worst-case scenario is the crippling of all communication and critical infrastructures, ranging from mobile phone to water supply, electricity, and gas. This could be coordinated alongside a physical tactical assault, as disrupting any form of communication or internet-connected technology could be used as a serious tactical advantage on the ground.”

“It is conceivable that although Islamic State might not have the necessary technical skills, it could potentially outsource these types of attacks to parties that do. The black market is riddled with such services, all waiting for the right buyer,” he added.

Challenged by the Register to justify this warning, Cosoi referred to run-of-the-mill action movie Die Hard 4.0, and denied spreading fear, uncertainty and doubt. Independent experts, such as Steve Lord, are dismissive. “Bitdefender’s assertions are more grounded in Hollywood than reality,” he said.

Sponsored:
OpenStack for enterprise: The tipping point cometh

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2015/11/24/cyber_terror/

Dell Hands Hackers Keys To Customer Systems

Dell installs root certificate with associated private keys to create its very own Superfish scenario.

Dell customers are scrambling today to deal with a root certificate debacle that some security experts are likening to the Lenovo Superfish issue that emerged earlier this year. Brought to light in a reddit post over the weekend, the issue is with a root Certificate Authority (CA) certificate called eDellRoot that includes a private key and has been installed on new Dell computers and those updated by Dell software.

“It’s not a simple bug that needs to be fixed, it’s a drop-everything and panic sort of bug,” wrote Rob Graham, owner of Errata Security. “Dell needs to panic. Dell’s corporate customers need to panic.” 

According to the researchers with Duo Labs, the fact that eDellRoot is being shipped with an associated private key that is identical in all models is an epic fail. This information makes it trivial to impersonate websites, whether it be online banking sites, shopping sites, or Google.

“If a user was using their Dell laptop at a coffee shop, an attacker sitting on the shop’s wi-fi network could potentially sniff all of their web browsing traffic, including sensitive data like bank passwords (or) emails,” wrote Duo Labs researchers Darren Kemp, Mikhail Davidov and Kyle Lady. “The attacker could also manipulate the user’s traffic, e.g., sending malware in response to requests to download legit software, or install automatic updates – and make it all appear to be signed by a trusted developer.” 

According to Graham, if he were an attacker, he’d be out at the nearest big city airport by the international first class lounges and eavesdropping on encrypted communications in hopes of finding vulnerable Dell users. 

“I suggest ‘international first class,’ because if they can afford $10,000 for a ticket, they probably have something juicy on their computer worth hacking,” Grahm says.

For its part, Dell acknowledged the issue yesterday and posted instructions on how to remove the certificate from its machines. As of today, Dell software updates will remove the certificate, the company says. Dell also says that unlike with Lenovo, the root certificate was not used to insert adware on customer machines. 

“The certificate is not malware or adware. Rather, it was intended to provide the system service tag to Dell online support allowing us to quickly identify the computer model, making it easier and faster to service our customers,” Dell said in a statement. “This certificate is not being used to collect personal customer information.”

This really doesn’t matter to the security community, though. While the fact that Superfish was meant to power adware made things worse, Graham says that the big problem was a root cert shipping with private keys.

“In this respect, Dell’s error is exactly as bad as the Superfish error,” he says.

According to Andrew Lewman, vice president of data development at Norse, enterprises should automatically be reinstalling operating systems rather than trusting default factory installs. Nevertheless, they should take extra precautions.

“As for protection, all enterprises should block the Dell certificate authority both on the network and on their devices. Uninstalling the certificate authority from laptops and desktops should be a matter of a policy update.” 

 

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio

Article source: http://www.darkreading.com/vulnerabilities---threats/dell-hands-hackers-keys-to-customer-systems/d/d-id/1323297?_mc=RSS_DR_EDT

Stealthy ModPOS Is ‘Most Sophisticated PoS Malware’ Ever

More than just a point-of-sale card scraper, it’s modular malware, and every module is a rootkit.

Just in time for the holidays, researchers at iSIGHT Partners are warning retailers about ModPOS — malware in their point-of-sale systems that is nearly impossible to detect, can do a whole lot more than just scrape customers’ credit card data, and has already successfully breached U.S. retailers.

“This is by far the most sophisticated PoS malware I’ve ever seen,” says Maria Noboa, senior threat analyst at iSight.

BlackPOS was behind the monster breach at Target, BackOff hit UPS and over a thousand others, and now new PoS malware like CherryPicker and AbaddonPOS have hit the scene. Yet, none of them have the same level of complexity and committment to stealth that ModPOS does.

“It took us two to three weeks just to determine it was malicious,” says Noboa. It then took researchers several more weeks to pick ModPOS apart and figure out how it works. In comparison, it only took them about 20 minutes to reverse engineer CherryPicker, says Noboa.

[PoS malware proves that Cyber Monday isn’t the only thing retailers and shoppers have to worry about over the holidays. Read “Black Friday Security: Brick-and-Mortar Retailers Have Cyber Threats Too.”]

ModPOS is modular. In addition to the PoS card scraper module, it also has a keylogger, an uploader/downloader (with which it could add other pieces), and plug-ins for scraping credentials, and gathering local system and network information.

So, explains Noboa, if it compromises the point-of-sale system and finds that the retailer has wisely encrypted all of the cardholder data or stored it elsewhere, ModPOS can still find ways to make its attack fruitful for them and damaging to the target.

The code was written by someone with exceptional skill, says Noboa. “The shell code they use,” she says, “are effectively full programs.” They found one piece of shell code contained over 600 functions.

The malware is able to stay persistent and obfuscated because every one of those modules operates in kernel mode, so, “each one is a rootkit,” says Noboa.

It’s also difficult to detect because all hashes are unique to the victim system. So the researchers can’t just hand out a list of hashes along with indicators of compromise, because it wouldn’t do anybody any good.

The researchers have not found any evidence of anyone selling ModPOS or even discussing it on underground forums. 

“All of this points to [the malware] being a profit center for someone,” says Noboa. They’re making their money from use of the malware, not sale of it, and they’re not interested in sharing.

All of this has helped ModPOS be quietly lucrative. iSight researchers believe the ModPOS attacks began as early as 2013, and have since stolen millions of credit and debit cards from unnamed U.S. retailers.

They don’t know yet how it’s being distributed right now or have a fix on the threat actor. They do say there are indications that point to Eastern Europe.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad … View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/stealthy-modpos-is-most-sophisticated-pos-malware-ever-/d/d-id/1323294?_mc=RSS_DR_EDT

Cisco Cert Tracker Offline After Pearson VUE Breach

Third-party certification credential manager used by Cisco and others is taken down after malware infection.

Pearson VUE has disclosed that intruders infected its certification credential manager system with malware. The system supports certification tracking programs for Cisco, F5 and other technology companies.

In the wake of the security breach, Pearson VUE has taken the system offline as works with law enforcement to investigate the incident. The system appears to have been down for at least a week. Cisco said its certification tracking system is down, but that testing for Cisco certifications is unaffected and continues.

In a blog post Monday, Chris Jacobs, director of certifications and lab delivery technical services at Cisco, described the Pearson Credential Manager System (PCM) as “an important part of Cisco’s certification ecosystem” that enables users to manage and track their CCIE, CCNA, CCNP and other Cisco certifications.

Read the full article here on Network Computing.

 

Marcia Savage is the managing editor for Network Computing, and has been covering technology for 15 years. She has written and edited for CRN and spent several years covering information security for SC Magazine and TechTarget. Marcia began her journalism career in daily … View Full Bio

Article source: http://www.darkreading.com/attacks-breaches/cisco-cert-tracker-offline-after-pearson-vue-breach/d/d-id/1323300?_mc=RSS_DR_EDT

RSA Warns Of Zero Detection Trojan

GlassRAT has remained undetected for more than three years while stealthily targeting victims, security firm says.

It’s apparently not just zero-day vulnerabilities that organizations need to worry about these days, but also zero detection malware threats.

For the second time in recent weeks, a security vendor has issued a warning about a malware tool that appears to have evaded detection for multiple years while stealthily going about targeting victims.

The malware, called GlassRAT, appears to have been released back in 2012. The limited telemetry and anecdotal reports that are available on it indicate that GlassRAT has been used to target Chinese nationals at large multinational companies, RSA Research said in an alert released this week.

The “zero detection” malware, which is signed with a digital certificate apparently misappropriated from a Chinese software developer, is “transparent” to most antivirus tools, RSA researchers said in the report. It is detectable only via network forensics and specialized tools that are capable of detecting suspicious activity on endpoint systems, they said.

“GlassRAT appears to have operated, stealthily, for nearly 3 years in some environments,” the paper noted.

The RSA researchers described GlassRAT, as a well-designed remote access trojan that is being used in a highly targeted manner. The dropper used to deliver the payload is digitally signed and deletes itself from the system after its task is complete.  Once installed, the malicious file itself remains below the radar of endpoint anti-malware tools.

The malware provides reverse shell functionality on an infected system allowing the threat actors behind GlassRAT to directly connect to it from a remote location. The malware is designed to steal data, transfer files and relay system information to the attackers.

 “What makes GlassRAT notable is not what it is, but perhaps rather where it came from, who is using it, and for what purpose,” the researchers said.

Available information on GlassRAT suggests that it is connected to, or at least has used the same command and control infrastructure that other malware campaigns in the past have used to target organizations of strategic and geopolitical significance, the RSA researchers said.

Two domains associated with GlassRAT for instance, were previously associated with the Mirage and PlugX campaigns that targeted military and government organizations in Mongolia and the Philippines. The overlap window is fairly small suggesting that the threat actors behind GlassRAT may have made an operational slip in using the same infrastructure.

The threat represented by malware like GlassRAT should not be underestimated because there may be many more undetected or non-detectable samples like it in the world, the researchers said. “ It is also crucially important to recognize the potential origins of these attacks, when detected, to better understand risks to the organization.”

GlassRAT marks the second time this month when a security vendor has warned about a malware threat that remained undetected for a lengthy period. Earlier this month, Trustwave issued an alert on Cherry Picker, a point of sale malware tool that like GlassRAT remained below the radar for more than four years before being discovered.

Trustwave pointed to Cherry Picker’s use of encryption, modified configuration files and sophisticated obfuscation techniques as reasons why the malware remained undetected for so long. According to researchers at the company, no malware they have encountered goes quite as far as Cherry Picker does in cleaning up after itself after infecting a system.

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: http://www.darkreading.com/vulnerabilities---threats/rsa-warns-of-zero-detection-trojan-/d/d-id/1323308?_mc=RSS_DR_EDT

Smile this Black Friday, you might well be on camera!

Get ready for Black Friday shopping MADNESS!!

$394.99 for a drone that captures HD 1080p video and 14MP photos?!

$300 off a 49-in. Smart UHD TV featuring a 4K Upscaler to enhance details to near 4K quality?!?!

Get out!

No, seriously, get out of those stores if you care about your privacy.

It’s not just scammers who want to suck personal data out of customers like a bunch of pan juice slurping bird basters this Black Friday. What about retailers themselves?

It may be legal, but it’s still data suckage, and according to a recent survey, plenty of people don’t like it one little bit.

“It” is this, specifically: anticipate that your face data points may well be recognized and matched as stores track you.

The survey was conducted over the summer by research firm Opinion Matters for big-data provider CSC. It involved 2049 UK consumers (both in-store and online) and 150 senior IT, marketing or digital retail executives.

It found that 74% of retailers admit they track customers from the moment they enter a store, including tracking visitor behavior; recording information about gender, age and how much time you spend in the store; or recognizing how many times you’ve been in the store.

31% use big data, 27% use facial recognition, and 65% track customers for security purposes: for example, they’re using facial recognition to spot shoplifters and to give store security a heads-up about who to keep an eye on.

As Fortune reported earlier this month, retailers are scanning shoppers to automatically pick out suspected thieves – all without any rules to protect their privacy.

If you want to know which retailers are acting like the retail version of Facebook, with its massive, ever-expanding facial recognition database and ever-more sophisticated recognition technologies, good luck with that.

Most of the retailers contacted by the magazine kept their lips zipped about whether or not they’re using the technology.

Home Depot says it’s not. Walgreens says it’s got no contract with one particular facial recognition technology company – but at any rate, it doesn’t talk about specific security measures. Target wouldn’t say yes or no.

In fact, Walmart was the only company that ‘fessed up to using the software: the retailer tested facial recognition software in stores across several states for several months, but then discontinued the practice earlier this year.

Not because of privacy concerns, mind you: rather, crunching the data on shoppers’ faces was just too darn expensive.

For those people who actually know what facial recognition technology is (56% said they didn’t), the idea of so many retailers using it – without informing shoppers, mind you – is disturbing.

According to the survey, a third – 33% – of consumers know what facial recognition is and find it intrusive, particularly people over the age of 55.

A quarter – 25% – of retailers said they’re using facial recognition technology in-store to get existing customers to come back and shop again. That figure rose to 59% for fashion and apparel retailers.

The larger retailers (101-250 stores) use facial recognition most frequently (43%).

Nearly half (49%) of all retailers are in favor of facial recognition technology. As little as 7% felt that it was intrusive for customers. .

They’re pretty oblivious to the idea that customers might find this intrusive: 83% of retailers think that customers would respond positively to behavioral technology, either stating that it’s improved their shopping experience or that customers have benefitted from data-improved shopping experiences.

Only 9% of retailers felt that customers would object, and only 7% felt that customers wouldn’t even be aware of this type of technology used in-store.

The lack of rules governing the use of the technology in retail environments isn’t surprising: it’s just the latest wrinkle in the ways businesses have been glomming onto our details.

After all, in the past we’ve seen businesses trying to monitor potential customers by tracking their mobile devices, such as businesses that have built shopper profiles based on sniffing phones’ Wi-Fi, marketeers tracking your mobile phone as it broadcasts your movements around a shop, or even setting up rubbish bins to sniff your Wi-Fi.

Then too, there was that beverage vending machine that takes photos of people, superimposes wigs on their heads and exhorts them to buy a drink, or even guesses those people’s names and genders: the better to target-market at them.

When it comes to facial recognition in particular, we’ve seen a Russian billboard advertising contraband that hides when it recognizes cops’ badges (admittedly, that would be less facial recognition than badge recognition, though the same principles apply).

But still, the fact that retail is the Wild West of facial recognition stands in sharp contrast to what’s happening outside of the stores.

In June, pro-privacy groups in the US walked out of discussions with the Department of Commerce over creating new standards for using facial-scanning software.

But while privacy groups have thrown up their hands, law enforcement has kept grabbing for more.

The voracity includes the FBI’s latest plans to expand its facial recognition database.

The US city of San Diego, for its part, quietly slipped the technology into the hands of law enforcers in 2013.

And what of Facebook, the face collecting/dissecting marketing machine?

In April, Facebook was hit by a class action suit in the US – along with the photo-service site Shutterfly – when consumers in the state of Illinois filed suits alleging violation of a state law related to biometrics.

One of the suits claimed that Facebook violated its users’ privacy rights in acquiring what it describes as the largest privately held database of facial recognition data in the world.

In European countries and Canada, meanwhile, automated photo tagging features are unavailable because regulators are a mite queasy about the privacy implications.

In 2012, the company opted to ditch the facial recognition program and delete the user-identifying data it already held.

There’s actually been one (potentially) positive use of facial recognition suggested recently: Earlier this month, Facebook suggested using facial recognition to spot kids in photos and warn parents if they’re on the brink of sharing those images publicly instead of just with friends.

But here’s the biggest difference between facial recognition being used by Facebook vs. the cops, the Feds or the big-box electronics store down at the mall: at least with Facebook, we know what its face-crunching people are up to.

The company isn’t exactly shy about its sophisticated technology.

That’s why we know, for example, that Facebook’s DeepFace technology rivals humans’ ability to recognize faces, accurately identifying faces 83% of the time, even in profile or with features obscured.

We know Facebook is after our faces. We can choose to stay off the site if we find that unacceptably intrusive.

We don’t know what retailers are up to. This is true even in privacy-sensitive Europe.

So if Black Friday finds you packed in like a sardine, battling with co-shoppers for whatever door-buster deal got you off the couch, get ready to grin and bear it: the cameras well might appreciate both the grin and having you give a sunglasses-free, full-face frontal.

Image of stop sign courtesy of Shutterstock.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/5LjuPH86tQM/

How Rickrolling is hindering counter-terrorism

When Anonymous launched its “very many cyberattacks” retaliation against the Islamic State (IS)* following the Paris attacks, we didn’t really know just what, exactly, it would entail.

Now we do. It entails Rick Astley.

People claiming affiliation with the Anonymous brand on Wednesday tweeted that they were preparing to launch Rickrolling attacks:

Rickrolling, for those unfamiliar with the ancient-by-internet-standards meme, is the bait-and-switch prank of posting links on social media accounts that connect to Rick Astley’s 1987 music video, “Never Gonna Give You Up”.

Anonymous “declared war” on Daesh* early last week, warning in a YouTube video that:

These [Paris] attacks cannot be left unpunished.

Within 24 hours of Daesh having called Anonymous “idiots,” Anonymous claimed to have taken down 5,500 of the group’s accounts.

The Anonymous-affiliated are, as is characteristic, proud of what they consider their hacking prowess.

Anonymous spokesman Alex Poucher told RT:

Our capability to take down ISIS is a direct result of our collective’s sophisticated hackers, data miners, and spies that we have all around the world. We have people very, very close to ISIS on the ground, which makes gathering intel about ISIS and related activities very easy for us.

[The collective has built tools that] might be better than any world government’s tools to combat ISIS online.

But the intelligence agencies of the world’s governments are neither amused nor aided by the group’s antics.

In fact, finding and shutting down as many Daesh-affiliated social media accounts as they can find is hindering counter-terrorism.

One of the security groups that rely on the terror group’s social media presence to infiltrate and monitor jihadist accounts and forums is Ghost Security Group, known as GhostSec.

Like Anonymous with its denial-of-service (DoS) attacks, GhostSec also takes down terrorist sites – but it does so with far more discretion, aiming primarily for recruitment sites.

But that’s not all it does: GhostSec also reaps information from Daesh accounts.

Any important information it gathers, such as plans for major terrorist attacks and bomb-making instructions, it passes on to US intelligence agencies, such as the FBI.

This, not Rickrolling or DoS, is the type of counter-terrorism cyber work that’s productive. For example, GhostSec once passed information through a third party to the FBI that reportedly disrupted a suspected Daesh-linked cell in Tunisia as militants plotted a 4 July repeat of the Sousse beach massacre.

As Foreign Policy reports, GhostSec pulled it off with a mixture of Twitter tracking and geolocation via Google Maps.

As Tech.Mic tells it, Anonymous may boast about the closure of Daesh accounts, but it’s really GhostSecGroup that’s responsible for doing the bulk of the work when it comes to fighting the group online.

A GhostSec spokesman known as DigitaShadow had this to say about Anonymous’s less nuanced tactics:

When it comes to terrorist attacks, one of the big worries is that you could take down forums and cost someone their lives.

Anonymous has a habit of shooting in every direction and asking questions later.

Rickrolling is good for lulz.

Mind you, lulz are a welcome relief from horror.

Seriously. Saints bless the Belgians who responded to the #BrusselsLockdown by flooding social media with cat photos.

But when it comes to hampering the work of real counterterrorism, there’s little room for lulz.

*Given that IS isn’t actually a state, and that Isis is the name of an Egyptian nature goddess and of some women and girls who don’t deserve to be tormented over their lovely name, some prefer to call the terrorist group Daesh.

Image of Rick Astley courtesy of youtube.com

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/tkejgZXoiVc/