STE WILLIAMS

Fortinet Buys CyberSponse for SOAR Capabilities

It plans to integrate CyberSponse’s SOAR platform into the Fortinet Security Fabric.

Fortinet this week confirmed plans to acquire CyberSponse, provider of security orchestration, automation, and response (SOAR) technology, with plans to integrate its SOAR capabilities into the Fortinet Security Fabric. Terms of the deal were not disclosed.

Today’s businesses operate in a time when legacy systems are no longer sufficient to maintain visibility into network environments. New technologies and use cases enter organizations with security as an afterthought, resulting in a complex piecemeal network where control is difficult. Cyberattacks have grown more advanced and harder to detect, leading to longer dwell time.

SOAR technology is intended to help businesses maintain greater visibility over increasingly complex networks. It generally comes with three capabilities: threat and vulnerability management, incident response, and operations automation to orchestrate workflows, processes, policy execution, and reporting. In a statement, Fortinet officials point out these functions build on the Security Fabric technology it has offered for the past four years.

Enter CyberSponse, a company founded in 2011 to create a virtual appliance-based SOAR platform. It has raised $7.6 million over five rounds of funding; the latest was in March 2016. CyberSponse’s platform consolidates and triages alerts from a range of security tools, automates threat analysis and repetitive tasks, and uses playbooks to inform incident response.

Read more details here.

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Next Security Silicon Valley: Coming to a City Near You?

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/fortinet-buys-cybersponse-for-soar-capabilities/d/d-id/1336616?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

‘Motivating People Who Want the Struggle’: Expert Advice on InfoSec Leadership

Industry veteran and former Intel security chief Malcolm Harkins pinpoints three essential elements for leaders to connect with their employees and drive business objectives.

(Image: Win Nondakowit/Adobe Stock)

Malcolm Harkins doesn’t seem like a violent guy. But he is passionate, a trait that emerged fully to the surface in a recent encounter with a CISO during a panel discussion.

“The CISO said, ‘I’m an adviser to the business.’ I wanted to leap across the table and beat the guy,” Harkins recounted in his presentation at the Cyber Strategy Retreat, a professional development event for technology and risk management leaders in Boston this month. “I took this guy to task in front of a couple of hundred people. I said, ‘Where the heck is your accountability? As an executive, you’re an owner. You own security. If the CEO makes all of the decision, well, why the heck does he need you?'”

The incident is an example of the messaging Harkins is focused on these days — that is, leadership, and specifically how security leaders can lead and inspire teams to own the security mission, believe in the goals laid out for them, and drive business objectives. It is the focus of a talk he is taking around the country titled “I believe, I belong, I matter.”

“It’s about motivating people who want the struggle,” Harkins says. “How are we doing that within our security teams? How are we doing that despite the fact that the CIO doesn’t give you the budget you need? Or the GM doesn’t show up to your meeting. If people don’t want to struggle, that is our fault as leaders. The result will be a continued manifestation of risk.”

From Call Center to Security Leader: Understanding the ‘Mission’
Many know Harkins as a well-established luminary in security. He was the first chief security and privacy officer at Intel, a company he joined immediately out of grad school as an analyst in 1992. He eventually moved on to become CISO at Cylance, which was later acquired by Blackberry. His most recent move is to security startup Cymatic, where he is the chief security and trust officer.

A winner of multiple industry awards, Harkins is also a regular contributor to industry publications and has authored numerous white papers and a book, “Managing Risk and Information Security: Protect to Enable.”

Harkins got his professional start not in security, but in a call center working for May Department Stores in its credit department in the late 1980s. It was, as he describes it, people calling to “bemoan their credit bills,” and he got his first taste of leadership when asked to manage the center while his own supervisor was on lunch break each day.

Malcolm Harkins

The real test of his ability to lead came one weekend when he was working in the call center and May officials attempted to bring the company’s chairman in for a tour.

“I said, ‘You are causing a distraction. You want a tour of this department, make an appointment.'” The tour was cut immediately short and the group left stunned.

Rather than take heat for the incident, management saw it as proof that he understood the mission of the call center, and Harkins was elevated to management himself. In his new role directing the call center, he insisted May make every available manager go to the call center when needed and take calls themselves.

“Those call center agents that were paid low and yelled at weren’t being respected,” Harkins explains. “To have a vice president sit down and say, ‘How do you do this?’ changed the culture. It took that call center from worst to best in the credit industry.”

The Recipe For Getting Employee Buy-In
The shift in mindset among employees that Harkins first implemented at May’s call center is what he has aimed to reproduce in each place he has landed throughout his career. The belief set he embraces — and now espouses as a leader — has little to do with security, specifically, and is much more focused on human nature and a sense of mission and community among workers.

Harkins’ thesis on what makes employees happy lies in three tenets:

  • I believe: I trust the organization’s mission, its management, and my peers.
  • I belong: The people in the organization frankly demonstrate they care about their employees.
  • I matter: The work I do and my organization make a difference.

It is a recipe that has served him well in nearly three decades of management.

“Those who believe what I believe, they lean in hard with where I go. Those who don’t, I can either ignore them or go engage them,” Harkins says. “You can’t believe in the message if you don’t know what the messenger believes and if they’re not clear about what they believe.”

Add to this a feeling of belonging in the organization — a sense of being cared for and connected, Harkins says, and then layer in ways to make employees understand why their work matters. This is the essential recipe for team success.

“You need to figure out how to create a security mission with the mission of business,” he adds. “The ideal state is when you have all of these. I’ve managed a lot of teams, and every problem I have ever diagnosed comes back to this framework.”

And with a high-functioning team that clicks and works hard, the objective is to give them purpose and clarity, Harkins says, so they truly understand what they are working toward each day in order to make security a business driver.

“Our job is to protect to enable,” he says. “If we don’t, we are getting in the way. We are getting in the way of the business mission.”

An Approach for Work and Home
Harkins leadership philosophy is one he employs in his personal life, he says. During his recent presentation in Boston, he showed the audience a picture of a book he created for his wife, Kim, about 10 years ago on their 20th wedding anniversary. It was titled “I believe, I belong, I matter,” and in the book’s final inscription it says, “I believe in you. I belong with you. I matter because of you.”

As a team, the Harkins raised their children, sharing the challenges of parenting their middle son who has Asperger’s Syndrome – a high-functioning autism spectrum disorder – which at times tested Harkins’ own leadership style and beliefs, he says.

For example, during his time at Intel, Harkins was teaching a leadership workshop based on the book “Model The Way,” by Barry Posner and James M. Kouzes. But putting it into practice at home was entirely different. One night after returning from a business trip, he noticed his son’s bedroom was disorganized and covered with toys, so he decided to “model the way” to a neat bedroom by cleaning the room himself. When his son came home from school later that day, he saw his room and had a breakdown. It took hours for Kim to settle him down.

Harkins’ son later told him he reacted that way because he “couldn’t find anything.” This was a wakeup call.

“I realized I had modeled my way,” Harkins says. “I hadn’t modeled his way of doing things.”

His son, he says, saw the tidiness as a message that he couldn’t play with his toys. He told his dad he liked things out and visible, where he could see them and find them easily. To this day, even in his 20s, he keeps his room this way, Harkins says.   

The lesson made Harkins consider going forward how often he imposed his way on others instead of taking unique needs into account, he says.

“Not that everything has to be customized or catered to — that would not be practical,” he says. “But where we can and where we should, we need to make sure when we model the way we do it to help others achieve their best.”

Because each team member is unique, Harkins says he understands leaders will get at the fundamentals of “I believe, I belong, I matter” differently. But ultimately it is about connection with a team and getting them to buy in to your vision for success.

“If your actions inspire others to dream more, learn more, do more, and become more, you are a leader,” he says. “I never once had a talent issue. I had people begging me to work through the night, 70 hours a week. The only way I know how to do that is to figure out this stuff and create this kind of culture.”

Joan Goodchild is a veteran journalist, editor, and writer who has been covering security for more than a decade. She has written for several publications and previously served as editor-in-chief for CSO Online. View Full Bio

Article source: https://www.darkreading.com/edge/theedge/motivating-people-who-want-the-struggle-expert-advice-on-infosec-leadership/b/d-id/1336615?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Visa Warns of Targeted PoS Attacks on Gas Station Merchants

At least two North American chains have been hit in sophisticated new campaigns for stealing payment card data.

Point of Sale (PoS) systems belonging to at least two North American gas station merchants and a hospitality chain have been attacked over the last few months by what Visa this week described as sophisticated cybercrime groups looking to harvest payment card data.

Unlike card theft operations where criminals attach hidden skimmers to card readers at gas pumps and other PoS systems, the latest attacks have involved the use of malware on the backend systems that merchants use to process card transactions. As a result, the attacks were a lot more sophisticated, Visa said in an alert.

“It is important to note that this attack vector differs significantly from skimming at fuel pumps, as the targeting of POS systems requires the threat actors to access the merchant’s internal network, and takes more technical prowess than skimming attacks,” Visa’s alert said.

Visa’s payment fraud division have identified at least three separate attacks targeting PoS systems since August. Two of them appear to have been carried out by FIN8, a threat group that has previously been associated with numerous attacks on PoS systems.

In one of the attacks that Visa identified this summer, the breach began when an employee at one of the gas station chains that was hit, clicked on a link in a phishing email and accidentally downloaded a Remote Access Trojan. The attackers used the Trojan to conduct reconnaissance on the breached network and eventually to move laterally into the merchant’s PoS environment where they deployed a RAM memory scraper for harvesting payment card data.

The modus operandi was similar in the second incident as well, but investigators have so far been unable to determine how the attackers got initial access to the merchant’s network, Visa said. In the second incident, the targeted gas station merchant accepted both chip transactions and magnetic stripe payments for in-store payments and only magnetic stripe payments at the gas pumps. Visa’s analysis shows the attackers specifically targeted the mag stripe data, the company said.

Visa’s alert did not mention how the attackers gained initial access to the network of the hospitality company though in that case as well, the attackers targeted the PoS system.

Sophisticated Cybercrime Groups

Telemetry from both of the latter two incidents suggested that FIN8 was involved, Visa said.  The command and control server used in the attack on the second merchant and the file used to store stolen payment card data for instance, have both been previously linked to FIN8. Similarly, the malware that was used in the hospitality chain attack is also something that FIN8 has used in the past.

Visa’s alert did not identify the cybercrime group behind the first attack. But in the past it has warned about a group called FIN6 compromising multiple PoS environments via a malware tool called Trinity POS or FrameworkPOS.

Card-stealing attacks against gas station chains in particular are increasing because many have yet to implement the EMV smartcard standard for payment transactions, Visa said. Chip cards offer significantly better protection against card data theft and cloning, compared to cards using magnetic stripes to store account and cardholder information.

Visa, MasterCard, American Express, and other card companies have for some time required all organizations accepting payment card transactions to cut over to EMV chip card technology. The migration has been happening in a phased manner across industry sectors for several years. Fuel merchants have until October 2020 to enable chip acceptance at fuel pumps. After that date, the liability for breaches will shift to the merchants that experience the breach.

Visa and the other major credit card associations have also recommended the use of point-to-point encryption, tokenization and other measures for protecting card data. Some of these measures are mandatory requirements under the Payment Card Industry Data Security Standard (PCI DSS).

Despite such measures, the US payment card infrastructure has lagged considerably behind other countries that have long ago moved to Chip and PIN technology.  The continued use of magnetic stripes has made the US payment environment an attractive target for criminals in recent years.

“EMV chips were created to make it expensive to manufacture counterfeit cards or steal money by tampering with a card or a transaction,” says Craig Young security threat researcher at Tripwire.

Chip-and-PIN enabled cards provide stronger defenses against misuse when lost or stolen though either implementation eliminates the RAM scraping threats described in the Visa alert, he says. “Elimination of magnetic stripes would force adversaries to adjust their tradecraft,” but not completely eliminate the threat he says.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives. Today’s top story: “The Next Security Silicon Valley: Coming to a City Near You?

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/visa-warns-of-targeted-pos-attacks-on-gas-station-merchants/d/d-id/1336619?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Weak account checks earn company $10.5 million privacy fine

What’s been 2019’s scariest cybersecurity trend?

There are plenty of candidates, of course, but let’s make the case for one that’s unlikely to be on most people’s worry list – the EU’s General Data Protection Regulation (GDPR).

If a European regulation sounds a bit underwhelming as threats go, consider the case of German call centre company 11 Telecommunications which has just been whacked with a €9.6m ($10.5 million) fine for allegedly failing to fully authenticate people phoning up to access their accounts.

According to Germany’s federal data protection commission, the BfDI, customers were able to authenticate themselves using only their name and date of birth when calling the company.

If accurate, this would represent a major security risk. Nobody should be able to phone up a company and gain access to personal information using something as easily obtained as a person’s name and birthday.

More to the point, it’s a violation of Article 32 of the GDPR, Security of Processing, which is why a single customer decided to report its lax security after complaining their data had been accessed by a former partner.

Big teeth

The maximum fine under GDPR is up to 4% of annual global turnover or the equivalent of $22 million – whichever is greater – in theory, the largest fines levied anywhere in the world for this kind of data protection failure.

For large companies, fines could run to billions. Even for small companies, it could be millions.

When GDPR came into force in the EU in May 2018 (which includes US and other foreign subsidiaries operating in or through the EU), it wasn’t clear how often such large fines would be imposed. The assumption was that the appeal process and negotiation might water them down.

Yet, in July 2019, the UK’s Information Commissioner announced its intention to fine British Airways £183 million ($230 million), equivalent to 1.5% of the company’s turnover, for the 2018 Magecart card-skimming attack.

A day later, and the same authority handed a £99.2 million fine on hotel group Marriott International for a long-running breach in an acquired subsidiary affecting 339 million customers, which was made public in 2018.

We don’t know whether appeals against these fines will be successful but there is a growing sense they won’t – the GDPR is a new reality and someone was going to be made an example of.

11 Telecom

The difference in the 11 Telecom case is that the breach being punished related to only one customer, its effect on others being largely hypothetical had processes not been tightened (which reportedly they have been).

The company’s attorney, Julia Zirfas, was unimpressed:

The fine is absolutely disproportionate. The new fine, after which the sum was calculated and applies to the entire German economy, was published on 14 October 2019 and is based on the annual consolidated sales. Even the smallest deviations can result in huge fines.

When compared to the vast Marriott breach, it could be argued the fine is out of proportion to the damage done.

The opposing view is that even potential breaches affecting smaller numbers of people can be serious and the best way to avoid repeat incidents is to frighten companies into change.

While the average consumer is probably barely aware of all this, GDPR fines are now at the top of many organisation’s worry list for 2020.

Sometimes, the most alarming – and significant – cybersecurity trends are the ones few people are paying attention to.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/X_4Ifs4bgEs/

Jack Dorsey wants a decentralised Twitter

Twitter CEO Jack Dorsey has announced a research effort to explore a decentralised version of the microblogging platform.

The idea behind decentralisation is to create services that no single organisation controls, so that there’s no single point of failure and no one dictating the rules. That’s the antithesis of Twitter, which controls all its own infrastructure and gets to decide who uses the platform and what they can and can’t say on it.

Dorsey has realised that this whole decentralised internet thing is rather a good idea, and wants to get in on it, stat. On Wednesday he tweeted:

To this end, he has created a research team inside Twitter to scope out the challenge.

The thing is, there’s already a protocol for decentralized microblogging and publishing accepted and used by a large number of people. It’s called ActivityPub, and the World Wide Web Consortium (W3C), which governs the protocols underpinning the web, has turned it into a proposed standard. ActivityPub emerged from Pump.io, a software engine that supports federated messaging using a concept called activity streams.

One of the protocol’s users is a social networking service called Mastodon, which we’ve written about before. Rather than a single central site owned by a company, it’s a collection of independent servers running the underlying hosting software, called instances. Anyone can set up an instance as long as they have a suitable server to run it, and there are instances targeting a wide variety of interests from open-source software to German heavy metal bands.

Instances find out about each other via their users. If I’m on the fosstodon.org instance and decide to send you a message or follow you over at the mastodon.social instance, then fosstodon.org has to send mastodon.social a message for that to happen. At that point, the servers learn about each other and begin communicating. The result is a loosely coupled web of instances that let their residents message and follow each other. The only real controllers are the people that run each instance, who get to make their own rules, which is what makes federation different from the truly decentralized model found in many blockchain applications, say. Still, if you don’t like the rules governing a federated instance, you can go and join another one instead.

Mastodon politely pointed its existence out to Dorsey:

Several people also responded to Dorsey pointing out that ActivityPub already does what he suggested. John Sullivan, executive director of the Free Software Foundation, shot back:

Dorsey responded that he’s open to anything:

Except that he didn’t say that in his initial tweet. He said that Twitter was going to develop something, which put some people on edge.

To his credit, he at least committed to developing something not owned by any single private corporation, but the company’s past activities are coming back to haunt him. Several Twitter users responded to his announcement by telling him that they don’t trust Twitter after it deprecated some key application programming interface (API) features a couple of years ago.

ActivityPub is one decentralised protocol, but there are several others, too, each taking their own approach to a concept that Dorsey has apparently just discovered. Do they really need Twitter’s help?

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/BVqq8LVgZWE/

YouTube bans malicious insults, veiled threats, harassment

In June 2019, Vox video journalist Carlos Maza posted a video compilation with clips from two years of malice served up via YouTube.

Over those two years, prominent right-wing personality Steven Crowder imitated Maza’s accent and called him, among other things, a “lispy sprite,” a “little queer,” “Mr. Gay Vox,” “Mr. Lispy queer from Vox,” “an angry little queer,” “gay Mexican,” and “gay Latino from Vox.”

The response from Google-owned YouTube at the time: Crowder’s videos didn’t violate its policies, so it wouldn’t remove them.

Our teams spent the last few days conducting an in-depth review of the videos flagged to us, and while we found language that was clearly hurtful, the videos as posted don’t violate our policies.

As an open platform, it’s crucial for us to allow everyone — from creators to journalists to late-night TV hosts — to express their opinions w/in the scope of our policies. Opinions can be deeply offensive, but if they don’t violate our policies, they’ll remain on our site.

Whistling a different tune

Cue a torrent of criticism.

Then, fast-forward six months later, and YouTube is whistling a far different tune. On Wednesday, YouTube updated its policy to ban malicious threats, veiled insults, and the string of malicious drips across videos and comments, each poisonous pearl of which doesn’t violate its policies per se but which, when strung together, create coordinated abuse campaigns.

Neal Mohan, chief product officer at YouTube, had this to say to the BBC:

Even if a single video doesn’t cross the line, with our new harassment policy we can take a pattern of behavior into account for enforcement.

Old policy: no explicit hate speech

Up until this new policy, YouTube had explicitly forbidden hate speech, which it defined as “content promoting violence or hatred” against people or groups related to race, sexuality, nationality and immigration status, among other attributes.

Its previous policies also barred the use of stereotypes that promote hatred, and it forbade “behavior intended to maliciously harass, threaten, or bully others,” including content that “is deliberately posted in order to humiliate someone” or that “makes hurtful and negative personal comments/videos about another person.”

But hey, a YouTube spokesperson told media outlets back in June, with regards to the Maza-Crowder situation, Crowder never instructed his viewers to harass Maza. Nor did Crowder dox Maza’s personal information, so… no harm, no foul?

Yes harm, yes foul. YouTube actually wound up reversing itself and stripping monetization from Crowder’s channel:

New policy: no implied hate speech

And now, under its new policy, it’s not just explicit threats that are prohibited. It’s also veiled or implied threats, including content that simulates violence against an individual or which suggest that violence may occur.

No individual should be subject to harassment that suggests violence.

It’s also building on its hate speech policy to prohibit racial, gender, and LGBTQ abuse:

We will no longer allow content that maliciously insults someone based on protected attributes such as their race, gender expression, or sexual orientation.

YouTube says that this goes for everyone, whether they’re private individuals, YouTube creators, or public officials.

Easier said than done. How well it manages to carry out this ambitious plan is another question entirely. Ars Technica’s Kate Cox presents a number of cases in which YouTube has failed to enforce its abuse policies over the years, most notably when it comes to a) making exceptions for popular, lucrative influencers and 2) for the very gnarly problem of politicians whose content is both highly newsworthy… as well as abusive.

Malice: Do we know it when we see it?

YouTube says that some content will be exempt from the new policy, including insults used in “scripted satire, stand-up comedy, or music”. Another exception is content that features actual or simulated harassment that’s created for documentary purposes, to combat cyberbullying or raise awareness.

There will be howling from those who consider it their right to express themselves when it comes to, say, making fun of somebody’s appearance, but YouTube says it’s not going to tolerate it anymore. It gave a number of examples of content that’s no longer welcome:

  • Repeatedly showing pictures of someone and then making statements like “Look at this creature’s teeth, they’re so disgusting!”, with similar commentary targeting intrinsic attributes throughout the video.
  • Targeting an individual based on their membership in a protected group, such as by saying: “Look at this filthy [slur targeting a protected group], I wish they’d just get hit by a truck.”
  • Using an extreme insult to dehumanize an individual based on their intrinsic attributes. For example: “Look at this dog of a woman! She’s not even a human being – she must be some sort of mutant or animal!”
  • Depicting an identifiable individual being murdered, seriously injured, or engaged in a graphic sexual act without their consent.
  • Accounts dedicated entirely to focusing on maliciously insulting an identifiable individual.

You and what army?

For those who show a pattern of repeated behavior across multiple videos or comments, YouTube’s going to hit ’em where it hurts: it’s going to snip monetization.

It’s tightening its policies for its YouTube Partner Program (YPP): The consequences for those channels that “repeatedly brush up against our harassment policy” will be suspension, eliminating their ability to make money on YouTube.

Channels that keep up the harassment may see content removed. If they still don’t stop, YouTube may take further action, and could terminate channels altogether.

Starting on Wednesday, videos that violate the new policy may be removed, but they won’t be given strikes. YouTube says it will gradually ramp up enforcement in the coming months.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/hOuEgAv-Vn0/

Facebook will target ads based on your Oculus VR data

Exploring District 06 in Boneworks with your Oculus virtual reality (VR) rig?

WATCH OUT!!!!!

It’s jam-packed with traps, obstacles, Nullmen zombies who’ll attack you on sight, and now, thanks to the zuckerborgians, you’re going to be stalked: followed right out of the virtual experience and into real life… by ADS!!!!!!

…because Facebook.

Facebook picked up the hot-hot-hot VR startup Oculus in 2014 for $2 billion: $400 million in cash and 23.1 million shares of Facebook stock.

It came fresh off the company’s $19 billion purchase of WhatsApp – a buy that made for a more logical fit into Facebook’s messaging space. But VR? How does that fit in with social media?

CEO Mark Zuckerberg at the time: VR is one of the “platforms of tomorrow!”:

Mobile is the platform of today, and now we’re also getting ready for the platforms of tomorrow. Oculus has the chance to create the most social platform ever, and change the way we work, play and communicate.

…and it now has the chance to change how Facebook tracks you, as it turns out.

On Wednesday, Facebook’s Oculus VR division announced new features that will help players to connect with friends, whether it’s via chat, organizing multiplayer games, live streaming to Facebook, throwing parties for any of your Oculus friends, and more.

Here’s the thing, Facebook Oculus said: in order to bring you all that VR community building, and to improve what ads we show you when you’re logged into Facebook, we’re going to be tracking what you do in Oculus.

As part of these changes, Facebook will now use information about your Oculus activity, like which apps you use, to help provide these new social features and more relevant content, including ads.

There’s a new privacy policy that describes this all, but in a nutshell, Facebook is going to be watching things like what apps you use so that it can target advertising at you.

What kind of ads? Facebook gave some examples, including “Oculus Events you might like to attend or ads for VR apps available on the Oculus Store.”

The company says this “won’t affect your on-device data,” which, as UploadVR has reported, is the location where Facebook says it stores 3D maps of your environment.

By “3D maps of your environment”, Facebook is referring to the coordinates that help to locate a headset and controllers in a known space so Oculus VR games “can work and keep you safe.”

In September, following a dust-up about Oculus testers’ homes – including views into bedrooms – being captured in screenshots that were then sent back to Facebook headquarters, the company sent this emailed statement to UploadVR, to clarify what data it collects and retains:

We don’t collect and store images or 3D maps of your environment on our servers today – images are not stored anywhere, and 3D maps are stored locally on the headset [for Quest] and on your local PC, where you have access to delete it [for Rift S]. That said, we’ll notify consumers if this information is required for VR experiences we provide on Quest/Rift S in the future.

Nothing to worry about, then? …besides this coming from the privacy-challenged, user data-bartering Facebook, that is?

The new data collection specifically applies to users who’ve logged into an Oculus VR headset with their Facebook account. Oculus’s previous data policy said that the company would use Facebook activity to help recommend content “you’ll find interesting and engaging” while using an Oculus VR headset. The new policy now says that Facebook can tap “information about your use of Oculus products to provide, personalize and improve Facebook Company Products, including to personalize the ads you see on and off Facebook Company Products.”

Oculus has provided this FAQ to give users an idea of what this all entails. It also notes that if users choose not to log into Facebook on Oculus, it won’t share data with Facebook that would allow third parties to target ads at you based on your use of the Oculus Platform.

Oculus still may collect your information for its own advertising purposes, though.

But as an Oculus spokesperson told PC Mag, you will not see ads during gameplay. At least, that is, “not currently.”

People who log into Facebook on the Oculus platform will see more targeted ads across Facebook products, however please note, we do not currently display ads in Oculus VR headsets.

If you want to tweak how Facebook targets ads at you based on your activity on and off the platform, here’s where to go.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/KvZ9_BDvYpk/

Ever wonder how hackers could possibly pwn power plants? Here are 54 Siemens bugs that could explain things

Siemens industrial control systems designed specifically for energy plant gear are riddled with dozens of security vulnerabilities that are, luckily enough, tricky to exploit from the outside.

The teams at Positive Technologies, Kaspersky Lab, and Biznet Bilisim took credit for finding and reporting 54 CVE-listed flaws in the SPPA-T3000 (PDF), an application server that handles the management of power plant controllers.

According to Siemens this week, the control system is “mostly used in fossil and large scale renewable power plants.” The vulnerable components are usually protected by a firewall, meaning a hacker would most likely have to be positioned appropriately on the local network to exploit the bugs. Crucially, the miscreant would need access to a so-called highway component behind the firewall before they could attack the app server.

“Exploitation of the vulnerabilities described in this advisory requires access to either Application- or Automation Highway,” Siemens explained. “Both highways should not be exposed if the environment has been set up according to the recommended system configuration in the Siemens SPPA-T3000 security manual.”

As we have seen, getting onto these internal networks is something hackers have been able to do, though.

Among the more serious flaws is CVE-2019-18283 and CVE-2019-18284, flaws that do not require any authentication to exploit. “The AdminService is available without authentication on the Application Server,” Siemens said of these flaws. “An attacker can gain remote code execution by sending specifically crafted objects to one of its functions.”

Other bugs include CVE-2018-4832 and CVE-2019-18289, two denial of service vulnerabilities (not something you want happening to a power plant control console), and CVE-2019-18288, a code execution bug involving the insecure handling of file uploads.

“By exploiting some of these vulnerabilities, an attacker could run arbitrary code on an application server, which is one of the key components of the SPPA-T3000 distributed control system,” said Vladimir Nazarov, head of the Positive Technologies ICS unit that discovered and reported 17 of the flaws.

“Attackers can thereby take control of operations and disrupt them. This could stop electrical generation and cause malfunctions at power plants where vulnerable systems are installed.”

So far, Siemens says it has only been able to patch three of the bugs. Siemens recommends administrators lock down the server from any sort of external network access. ®

Sponsored:
How to Process, Wrangle, Analyze and Visualize your Data with Three Complementary Tools

Article source: https://go.theregister.co.uk/feed/www.theregister.co.uk/2019/12/13/siemens_security_advisory/

Lessons Learned from 7 Big Breaches in 2019

Capital One, Macy’s, FEMA, and others: key takeaways from the year’s most notable breaches.PreviousNext

Image Source: donskarpo via Shutterstock

Image Source: donskarpo via Shutterstock

2019 is on track to be the worst year ever for data breaches.

Over 7.9 billion (with a “b”) data records were exposed in the first nine months of this year alone from a total of 5,183 breaches, according to Risk Based Security Compared to the same period last year, the total number of breaches in 2019 is higher by over 33%. Six breaches exposed over 100 million records, with hacking being the top reason for most compromises.

Most of the breaches involved compromise of data, such as email accounts, account credentials, and names and phone numbers of victims, but a substantially high number exposed Social Security numbers, bank account information, and payment card data that could be used for identity theft and fraud.

For victim organizations — and hundreds of millions of Internet users — the breaches were a reminder of just how vulnerable sensitive data continues to be on the Web. Despite heightened awareness of cyber threats and billions of dollars in cybersecurity investments in recent years, a vast majority of organizations remain as vulnerable to breaches as ever.

Here’s a look at the key takeaways from a handful of big data breaches in 2019. 

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full BioPreviousNext

Article source: https://www.darkreading.com/cloud/lessons-learned-from-7-big-breaches-in-2019-/d/d-id/1336575?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Endpoint Protection: Dark Reading Caption Contest Winners

Trojans, knights, and medieval wordplay. And the winners are …

Top honors and a $25 Amazon gift card go to cmgreenjr1 for his clever wordplay penned below by cartoonist John Klossner.

Second prize, a $10 Amazon gift card, goes to Matthew K. Miller (matthewkmiller), whose day job (not writing cartoon captions) is as a  senior information security engineer. His winning caption: “When I heard him say he was about to get medieval on the malicious actors, I didn’t take him literally.”

The two captions bested 44 other entries, all of which made our panel of judges (John Klossner, Tim Wilson, Kelly Jackson Higgins, Sara Peters, Kelly Sheridan, Curtis Franklin, Jim Donahue, Gayle Kesten, and yours truly) LOL for days. Thanks also to everyone who entered the contest and to our loyal readers who cheered the contestants on.

If you haven’t had a chance to read all the entries, be sure to check them out today.

Related Content:

Check out The Edge, Dark Reading’s new section for features, threat data, and in-depth perspectives, including: “The Edge Cartoon Contest: You Better Watch Out …

Marilyn has been covering technology for business, government, and consumer audiences for over 20 years. Prior to joining UBM, Marilyn worked for nine years as editorial director at TechTarget Inc., where she launched six Websites for IT managers and administrators supporting … View Full Bio

Article source: https://www.darkreading.com/application-security/endpoint-protection-dark-reading-caption-contest-winners/a/d-id/1336593?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple