STE WILLIAMS

CISO Pressures: Why the Role Stinks and How to Fix It

CISOs spend much less time in their role than other members of the boardroom. It’s a serious problem that must be addressed.

Look around the boardroom. The average tenure of a CEO is 8.4 years. A CFO will spend approximately 6.2 years in the position, while a COO lasts 5.5 years. In stark contrast, a CISO will spend an average of 1.5 to 2 years before leaving behind the constant stress and urgency of the job.

There’s a serious problem in the cybersecurity industry, and all too often, it’s ignored because it’s uncomfortable to address. Now is the time to acknowledge the issue and understand the true challenges and repercussions of the modern-day CISO role.

A Running List of Immediate Challenges
When CISOs come to work, there’s a growing list of issues to face. Perhaps the most ominous is the constant cyberattacks threatening organizations of all sizes and spanning all industries. Add to this dilemma the fact that today’s cyberattacks are increasingly sophisticated, with many fueled by geopolitical tension and clever cybercriminal techniques such as lateral movement, island hopping, and counter-incident response to stay invisible. We recently found that the average organization’s protected endpoint was targeted by two cyberattacks per month throughout 2018. At this rate, an organization with 10,000 endpoints is estimated to see more than 660 attempted cyberattacks per day — leading to immense pressure for CISOs and their teams at the front lines.

In many organizations, there’s also an assumption that security is the sole responsibility of the CISO. In reality, it’s a business imperative — everyone from the CEO to the seasonal intern should prioritize secure best practices to keep the organization protected. This could be as simple as attending regular cybersecurity trainings and learning not to click on the suspicious phishing link shared via an unknown email alias. These small steps can aid security teams immensely and take some pressure off of the CISO.

Add to these challenges the accelerated rate of evolving business technology. With most organizations laser focused on digital transformation efforts, the constantly shifting legal and regulatory environment consisting of legislation such as GDPR and the California Consumer Privacy Act, and the fact that everyone thinks they’re an expert at the job, you have a recipe for a burned-out CISO with no finish line to the job’s responsibilities in sight.

The Daunting Repercussions
While these CISO challenges sound daunting, what’s even more alarming is the repercussions they’re having on the people in the role. With 60% of CISOs admitting that they rarely disconnect from work, and 88% working more than 40 hours — (some much more, since most cyberattacks seem to strike on weekends — mental health is often ignored. In fact, nearly 17% of CISOs are either medicating or using alcohol to deal with job stress. Others give up altogether, with less than a third remaining in their job for more than three years.

What can be done to change these devastating effects? To begin, let’s examine the talent gap. CISOs need support and they must fill this gap — but not just by looking for external candidates. Look internally for support, and ensure all candidates are being onboarded/trained properly. Next, offer continual education from internal and external resources, and retain by advancement — reward a job well done and be a regular advocate for promotions and/or raises in the industry before it’s too late.

CISOs also need help from other business leaders and functions. CISOs are known to support every department, but that support isn’t always returned. Look to leaders in finance, marketing, customer service, and HR, who often take priority when allocating budgets, for support, not only financially but for sound business advice based on what they’re seeing across the organization.

Most importantly, from a CISO’s perspective, the role requires a mindset shift. It’s time to change traditional strategy because it’s not effective. First, let’s stop buying technology because the bells and whistles sound promising, especially as the industry careens toward $124 billion in global security spending, according to Gartner, this year. Instead, let’s start understanding where the true security problem lies within the organization and work from there.

Finally — and this holds true across the board — CISOs must understand that sometimes being “perfect” in the role is impossible. It’s OK to fail, attempt new ways to solve problems, and explore other options. While this won’t immediately solve the burdens, it does provide an opportunity to breathe during the never-ending battle against the bad guys.

Related Content:

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Rick McElroy, Head of Security Strategy for Carbon Black, has 20 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. He has held security positions with the US Department of … View Full Bio

Article source: https://www.darkreading.com/careers-and-people/ciso-pressures-why-the-role-stinks-and-how-to-fix-it/a/d-id/1335292?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Ex-NSA Contractor Gets 9 Years for Retaining Defense Data

Law enforcement recovered two decades’ worth of stolen material from the home and car of former government contractor Harold Martin.

A US district judge has sentenced former government contractor Harold Thomas Martin, III, to nine years in federal prison and three years of supervised release for the “willful retention of national defense information,” the Department of Justice reported today.

Between Dec. 1993 and Aug. 2016, Martin was employed by at least seven private companies and assigned as a contractor to “a number of government agencies,” according to his plea agreement. Each agency required Martin to receive and hold a security clearance; at various times he had clearances up to Top Secret and Sensitive Compartmented Information, meaning unauthorized disclosure could cause “exceptionally grave damage” to US national security. Martin’s role gave him access to government systems, programs, and data in secure locations.

Martin, who also worked as an NSA contractor, admitted to stealing and retaining US government property from secure locations and computer systems, in both physical and digital form, starting in the late 1990s and continuing through Aug. 2016. Information was marked to indicate it was property of the US and contained highly classified data including Top Secret/SCI information. He kept at least 50 terabytes of stolen files and classified data in his home and car, despite knowing he was not authorized to do so, and despite knowing knowing removal of this information could compromise national security and aid adversaries.

At his sentencing, officials noted crimes like these require the government to treat the stolen data as compromised, which could result in changing or eliminating national security programs. Martin’s actions also cost time and resources in investigating the consequences of the theft.

“This sentence, which is one of the longest ever imposed in this type of case, should serve as a warning that we will find and prosecute government employees and contractors who flagrantly violate their duty to protect classified materials,” said US Attorney Robert K Hur in a statement.

Read more details here.

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/ex-nsa-contractor-gets-9-years-for-retaining-defense-data/d/d-id/1335312?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Firmware Vulnerabilities Show Supply Chain Risks

A recently announced pair of vulnerabilities in server firmware could put enterprise IT at risk.

A recently announced pair of vulnerabilities in the firmware for baseboard management controllers (BMCs) used by at least eight different manufacturers’ servers is the latest incident to show a supply chain vulnerability that can have an impact on enterprise computing. The affected firmware, MergePoint EMS, made by Avocent (now Vertiv), is used in servers from Lenovo, Acer, Gigabyte, Penguin Computing, and others.

BMCs monitor internal pieces of the system that include temperature, power-supply voltage, fan speeds, communications parameters, and certain operating system functions. The vulnerabilities were discovered by researchers at Eclypsium as part of their normal research activity.

One of the vulnerabilities involves the lack of security for firmware updates to the system, potentially allowing an attacker to write new instructions for the firmware while undetected. The other is a command injection vulnerability, which could potentially allow an attacker to inject random instructions into a running system.

Eclypsium writes that it followed responsible disclosure in notifying the affected vendors of the vulnerabilities. As of this time, Lenovo and Gigabyte have released patches for the issues.

For more, read here.

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions, and service providers in the Business Hall. Click for information on the conference and to register.

 

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/firmware-vulnerabilities-show-supply-chain-risks/d/d-id/1335313?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Stop facial recognition trials now, warns UK committee

The UK government should suspend trials of automatic facial recognition systems until it can meet regulators’ concerns about the technology, according to a report released Friday.

The report, issued by the House Of Commons Science and Technology Committee, examines the work of the UK’s Biometrics Commissioner and Forensic Science Regulator. It warned that the government does not yet have a well-thought-out strategy for biometrics or a proper legal framework for trialing automatic facial recognition systems. It said:

We call on the Government to issue a moratorium on the current use of facial recognition technology and no further trials should take place until a legislative framework has been introduced and guidance on trial protocols, and an oversight and evaluation system, has been established.

In June 2018, the UK government published a biometrics strategy. However, the Committee took a dim view of it. It warned that it is little more than a list of some things that the Home Office had been doing, rather than a robust roadmap for biometrics ethics and governance. The report said:

It is not really a strategy at all, lacking a coherent, forward looking vision and failing to address the legislative vacuum around new biometrics.

No legislation for new biometrics

While there is a legal framework for managing fingerprints and DNA under the Protection of Freedoms Act 2012, it doesn’t cover facial or voice recognition, the report added. There is no legislation covering the use and oversight of new biometrics.

The UK’s Forensic Science Regulator is responsible for ensuring appropriate standards in forensic science (which would include facial recognition systems) in the UK. It has no statutory powers, meaning that it can make recommendations but not penalise government bodies. The Committee has been asking for these powers since 2011.

The Regulator is also responsible for ensuring effective collaboration with Scotland and Northern Ireland for UK-wide quality standards. When it comes to new biometrics such as facial recognition, the UK has lagged behind Scotland, which has already proposed legislation around its use, the report said.

This isn’t the first recommendation that the Committee has made to suspend trials of automatic facial recognition systems. It made a similar request last year. However, the Metropolitan Police and South Wales Police have proceeded with automatic facial recognition system trials that began in 2016, matching surveillance camera images against a watchlist drawn from custody photographs and other police sources.

In breach of six-year limit on custody photos

The report questioned the legality of these custody images. In 2012, the UK’s High Court ruled that it was unlawful for the government to retain images of people taken in custody indefinitely, and instead introduced a six-year limit. The government hasn’t complied with this ruling, the Committee warned, meaning that police have been using millions of unauthorized images, including those of unconvicted individuals, in automatic matching algorithms as part of these trials.

The Committee isn’t the only body to express concern about facial recognition trials. In early July 2019, researchers from the Human Rights, Big Data Technology Project at the University of Essex Human Rights Centre published a report calling for the suspension of the police facial recognition trials. The systems used in the six trials made 42 matches, it said, but only 8 of them could be verified with absolute confidence.

The legal basis for the trials was unclear and didn’t take human rights into account, the researchers warned, adding that it was “highly possible” that the trials would be considered unlawful if challenged in court.

These court cases are looming. In his 2018 annual review, the Biometrics Commissioner pointed to a case brought against the South Wales Police by advocacy group Liberty, and Big Brother Watch’s case against the Metropolitan Police and the Home Office. The Commissioner warned:

Any of these judgments could, potentially, lead to a re-think of present legislation.

The UK’s Science and Technology Committee report came days after Oakland City Council in the US voted unanimously to ban the use of facial recognition by city departments, including police. This makes it the third city in the US to ban facial recognition after San Francisco and Somerville, Massachusetts.

The backlash against facial recognition surveillance is certainly growing, with the online activist group Fight for the Future is calling for a Federal ban, calling it a ‘threat to basic rights and safety’.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/0CSbKeo22L8/

Hacked Bulgarian database reaches online forums

Data on millions of people stolen from the Bulgarian government has already popped up on hacker trading forums.

A hacker originally stole the data from the National Revenue Agency (NRA), which is part of Bulgaria’s Ministry of Finance, sending media outlets a link to the downloadable copy last Monday, 15 July 2019. The NRA confirmed this in a statement on its website.

After analysing the leak, it said that the data had been stolen around three weeks before. The hacker had accessed only 3% of its systems, it said in an update the following day.

ZDNet learned that a hacker known as Instakiller obtained the documents after a local TV outlet displayed a link to the file. It was password protected, but the hacker gave it to members of a forum, who cracked the password within hours.

According to local media reports, data came from sources including the Employment Agency, Bulgarian Excise Centralized Information System, and the National Health Insurance Fund, alongside the NRA.

Aside from names, addresses and other personal details, the data included several hundred thousand photographs of citizens’ faces. The hacker sent media 57 compromised databases totalling 10.5GB but claimed to have 110 databases amounting to over 20GB. The hacker told media (translated):

More than five million Bulgarian and foreign citizens as well as companies are affected

In a country of 7 million people, this represents almost the entire adult population. The hacker also criticized the Bulgarian government’s cybersecurity and called for the release of Julian Assange.

In a message sent to a local TV station, the alleged hacker claimed to be a Russian married to a Bulgarian. He had a grievance against Bulgaria and threatened to reveal more data if the government did not “reveal the truth”.

On Wednesday, 17 July 2019, Bulgarian authorities announced that they had arrested a suspect in connection with the theft of the data, and on Friday, a local news outlet reported that a 20-year-old Bulgarian citizen had been arrested in connection with the hack, and subsequently released on bail.

Government officials later determined that he had not hacked Bulgaria’s critical national infrastructure and that the data released was “not particularly dangerous”.

They consequently downgraded the charges against him, and he now faces up to three years in prison for the lesser charge of ‘crime against information systems’, rather than the eight years under the previous charge of ‘computer crime against critical infrastructure’.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/cIsspE3NhLw/

Marketing biz bares folks’ data in the act of asking for their GDPR comms preferences

An education sector marketing firm has committed a data breach – ironically, because it mass-mailed people asking them to update their GDPR communications preferences.

Sprint Education sent an email earlier this week to one of its mailing lists asking recipients to update their mailing preferences.

The lengthy message stated that emailed folks’ information had been harvested by Sprint under the terms of GDPR Article 6(1)(f), “legitimate interest”.

Unfortunately for Sprint, one of the lucky recipients was a Register reader. He noticed the URL for updating one’s mailing list preferences contained a string of numbers – and you can guess what he did and what he found.

“This is my first contact of any kind with this company, and it was totally unsolicited,” said our reader, who asked not to be named.

By tweaking one of the digits, the name, job title and work email address of everyone on that Sprint Education mailing list could be viewed by the world and their dog. Some of the people whose data was on file had been on Sprint’s database since the early part of this decade.

During the writing of this article, the link went from exposing anyone’s creds to exposing none at all, redirecting to a simple opt-out page. However, text on the previous marketing preference page said:

We process your data in line with all relevant laws including the UK’s Data Protection Act (DPA), the EU’s General Data Protection Regulation (GDPR), and the ePrivacy Directive.

The opt-out page now simply reads: “We’re sorry that you didn’t find the email sponsored by Sprint Education to be of use.”

Guy Lewis, a director of Sprint Education, told The Register: “From the very nature that we send teachers (corporate subscribers) a Data Collection and Fair Processing Notice before we begin actively processing their data and then that you resolved at a Preference Centre where they can manage their GDPR preferences, shows that we are an organisation that takes data protection and privacy with the utmost seriousness.”

He added that the data being displayed was already in the public domain and explained the cause of the cockup: “In this single instance the team member here who broadcasted the email did not turn off [link click] tracking for our Preference Centre links (which as you’ve no doubt seen and noted ARE obfuscated and crucially, non-sequential). As soon as the team member noticed (which was almost immediately) the send was halted, meaning fewer than 250 school staff will have received the email with the sequential links in.”

Tech lawyer Neil Brown, director of law firm decoded.legal, said Sprint Education seemed to have made a genuine effort to comply with data protection laws despite the snafu.

“I think they’ve done a really rather good job of getting in touch with people whose data they’ve scraped/bought, and told them who they are, what they are doing with the data, and what the recipients can do about it. And they’ve done it in plain, intelligible, language. Bravo. I wish more companies did this.

“Allowing someone to view other people’s data in this way could well be a breach of Article 32 GDPR. I say ‘could’ because, if the data is public anyway (as they say in their privacy notice), they have an argument that that level of security was appropriate to the risk, as the risk associated with someone obtaining the data is very low – and being opted-out of marketing is probably no bad thing for most people either.” ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/22/sprint_education_gdpr_email_fail/

Cisco ‘in talks’ to borg with web app protector Signal Sciences for its web app firewall tech

Network overlord Cisco is reportedly planning to purchase Signal Sciences, a frequent cybersecurity collaborator and member of the Cisco Security Technical Alliance.

Signal Sciences is an American upstart that deals in web application security. Its flagship product is a next-generation Web Application Firewall (WAF) delivered as a service, using a patented process to secure both on-premises and cloud-based IT.

The outfit has raised $61.7m to date across four funding rounds, most recently $35m in February, from investors including Lead Edge Capital and Index Ventures.

Just last month, Cisco confirmed Signal Sciences’ products would be integrated with its Threat Response platform, so they could analyse event data from select Cisco Security products and threat intelligence from Cisco Talos.

“Integrations of this kind equip our customers with actionable insight into the threats across their infrastructure and applications,” Snehal Patel, senior director of product management for Cisco’s Security business group, said at the time.

Now, several sources have told The Information that Switchzilla is planning to bring the WAF capabilities in-house.

Signal Sciences was established in 2014, with headquarters in Culver City, California, by a team that used to run security and DevOps operations for e-commerce website Etsy.

Its WAF uses a patented method of defending web apps and APIs against attacks; the system distributes small (10 MB install package) software agents written in Google’s Go programming language across customers’ servers to perform detection and enact decisions against requests.

The second component of the system is optional modules – containing just a few hundred lines of code – that pair with the agents to pass requests and enforce fail open functionality.

Agents and modules connect to the Signal Sciences Cloud Engine, an analytics backend hosted with AWS that feeds them up-to-date security intelligence.

The upstart says its WAF can be deployed in under an hour and supports 34 different hybrid and multi-cloud platforms.

Besides WAF, Signal Sciences also develops runtime application self-protection (RASP) tools – while WAF is technically a perimeter-based protection technology, RASP monitors the inputs of specific applications using lightweight modules in the code, protecting the runtime environment from the inside.

The company’s advisors include former Facebook chief security officer Alex Stamos, former Adobe CSO Brad Arkin, Etsy CEO Chad Dickerson and its CTO, John Allspaw, and TripWire founder Gene Kim.

Customers include Under Armour, Etsy, Adobe, Datadog and WeWork, among others. Signal Sciences said it was protecting more than 15,000 cloud-native, legacy and serverless applications in June 2018, and serving more than a trillion production requests per week.

Security has been one of Cisco’s strongest plays in terms of revenue. In May, Switchzilla reported that its security business was up 21 per cent year-on-year, driven by ID and access services, and products that fight against advanced and unified threats. For comparison, its infrastructure platform biz saw a modest growth of just 5 per cent. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/22/cisco_could_swallow_up_waf_developer_signal_sciences/

Palo Alto gateway security alert, FSB hack, scourge of data-stealing web plugins, and more

Roundup Let’s catch up with all the recent infosec news beyond what we’ve already covered.

Palo Alto Networks gateway apps vulnerable to hijacking

If you’re using Palo Alto Network’s GlobalProtect Portal or Gateway, ensure you’re using the latest version of the software. The biz quietly issued a maintenance update to close a security hole – a trivial string formatting vulnerability no less – that can be potentially exploited by miscreants to hijack installations of the code over the network or internet.

This is a pre-authentication remote-code execution flaw, and it’s present in software that’s typically used on public-facing Palo-Alto-powered firewalls and VPN-based gateways into corporate networks. Thus, the whole situation is un-good: it could be leveraged to infiltrate organisations.

According to Palo Alto Networks this week, here’s the list of affected products: PAN-OS 7.1.18 and earlier, PAN-OS 8.0.11 and earlier, and PAN-OS 8.1.2 and earlier releases. PAN-OS 9.0 is not affected. The “critical” security hole is labelled PAN-SA-2019-0020 aka CVE-2019-1579.

“Successful exploitation of this issue allows an unauthenticated attacker to execute arbitrary code,” Palo Alto noted.

“If you have not already upgraded … we recommend that you update to content release 8173, or a later version, and confirm threat prevention is enabled and enforced on traffic that passes through the GlobalProtect portal and GlobalProtect Gateway interface. You are not affected if you do not have GlobalProtect enabled.”

See this Twitter thread for more information and details of a proof-of-concept exploit.

FSB contractor hacked, secret files swiped

A contractor for Russian intelligence agency the FSB was hacked on July 13, with about 7.5TB of data stolen, it was reported this week.

It’s understood a hacker gang calling itself 0v1ru$ compromised systems operated by FSB IT provider SyTech, and an archive of data siphoned from the biz was passed to journalists to pore over.

Among the swiped files, we’re told, were blueprints for a Tor deanonymizing effort dubbed Nautilus-S, as well as a project to map out Russia’s internet links to the outside world. There were also documents on the surveillance of selected Russian corporate email accounts, attempts to spy on peer-to-peer file-sharing networks (including BitTorrent), and a project to harvest social network profiles in 2009 to 2010 (think Facebook, LinkedIn, MySpace, and their ilk).

Blighty’s plod web hack shock

A website belonging to London’s Met Police was hijacked on Friday night by miscreants who proceeded to publish nonsensical announcements to the world until officers regained control. The site, news.met.police.uk, normally carries press releases, but was compromised to spam out garbage. The publishing system also automatically emitted the fake news as tweets to the Met’s 1,220,000 Twitter followers, and in emails to journalists.

Naughty extensions turn browsers in data siphons

Shady web browser plugins have been collecting and uploading personal details on millions of people, it has been learned.

Reg alumnus Dan Goodin, along with security researcher Sam Jadali, uncovered how an operation nicknamed DataSpii has collected personal details on more than four million users by distributing spyware-laced browser plugins for Chrome and Firefox.

The collected information is said to include everything from credit card numbers and GPS coordinates to income tax returns and travel plans. In short: only install highly trusted extensions.

“This leak exposed personal identifiable information (PII) and corporate information (CI) on an unprecedented scale, impacting millions of individuals,” noted Jadali. “The collected data was then made available to members of an unnamed service, which we refer to in our report as Company X. Both paid and trial members of this service had access to the leaked data.”

Oh, ship! US Coast Guard warns of hackers at sea

The US Coast Guard is warning private cargo ships to beef up their on-board security after one such vessel was hit with a malware infection earlier this year.

The military said in its alert this month [PDF] that back in February a Coast Guard crew responded to a report of a New York-bound shipping vessel that was having problems with its on-board systems. A post-incident analysis eventually concluded that a malware infection had struck the ship and taken out some of its systems.

“The team concluded that although the malware significantly degraded the functionality of the onboard computer system, essential vessel control systems had not been impacted,” the Coast Guard said. “Nevertheless, the interagency response found that the vessel was operating without effective cybersecurity measures in place, exposing critical vessel control systems to significant vulnerabilities.”

While the report does not pinpoint the exact source of the infection, the Coast Guard notes two key findings from the investigation: crew members could use the ship’s network for personal use (i.e. checking emails or managing bank accounts) and USB devices were routinely used to transfer cargo data to and from the ship’s systems.

Accounting cloud firm iSynq hit by ransomware

A cloud provider that provides Quickbooks accounting software to businesses is offline after a ransomware attack crippled its servers. Security breach connoisseur Brian Krebs reports that the hosting house has turned off some of its servers and called in outside help in response to the outbreak.

Colleges attacked through ERP flaw

A vulnerability in the Ellucian Banner ERP software is being blamed for network intrusions at more than 60 US universities.

The attackers exploited a known flaw in the application that was patched back in May. Any university admins (or anyone else, for that matter) running Ellucian Banner ERP should update their software ASAP.

Contractor charged for threatening Congresswoman over vaccine bill

A government IT contractor is facing serious charges after threatening to kill a member of Congress who supported a bill to mandate vaccinations.

Darryl Varnum, a cybersecurity contractor (formerly) with the Department of Defense was charged with leaving a threatening voicemail at the office of Frederica Wilson, a Florida Democrat who sponsored the bill. He faces one felony count of threatening an official.

Bluetooth haircare is hot, hot, hot

You might want to think twice before springing for a connected hair appliance.

This after researchers with PenTest Partners found that several brands of Bluetooth hair straighteners posed fire hazards. The team was able to manipulate the mobile applications on paired smartphones to cause the appliances to heat up to dangerous levels.

Maybe just stick with the old fashioned dumb-irons for now.

Nvidia Tegra bugs revealed

A new patch has been issued by Nvidia to address a potentially serious flaw in the Tegra chipset, used by loads of gadgets including drones. Researcher Triszka Balázs says the vulnerability, designated CVE-2019-5680, could potentially allow an attacker to bypass secure boot checks, and achieve arbitrary code execution.

LLVM Arm stack protections rendered potentially useless by security hole

The LLVM compiler’s stack protection mechanism for Arm software can be potentially evaded, making it easier for miscreants to pull off buffer-overflow exploits and the like.

Apple researchers Jeffrey Crowell and Will Estes found that the stack protections in LLVM Arm can be manipulated in such a way that the stack protection fails to properly detect and thwart overflows.

“When the stack protection feature is rendered ineffective, it leaves the function vulnerable to stack-based buffer overflows,” the duo write.

“It is possible that the return address could be overwritten due to a local buffer overflow and is not caught when the cookie is checked at the end. It is also possible that the cookie itself could be overwritten since it resides on the stack, causing an unintended value to pass the check.”

Yet another medical company blames AMCA for loss of customer records

US medical bill collectors AMCA are once again being blamed for a massive loss of personal medical data.

A filing from Clinical Pathology Laboratories says that the pwned AMCA server that leaked LabCorp and Quest Diagnostics data also allowed 2.2 million of its patient records to be exposed. 34,500 of those records included payment card information.

WikiLeaks source cries foul over early disclosure

One of the hackers credited for providing WikiLeaks with confidential intel says the secret-sharing site jumped the gun on a document dump and jeopardized an ongoing operation.

Phineas Fisher, source of the 2016 Erdogan emails leak, claims that the massive Turkish government data heist would have been even larger, had WikiLeaks not published the information early, tipping Erdogan’s camp off to the hack and allowing them to lock down their systems before more damning evidence could be collected.

DropBox gaffe drops unwanted update on machines

Some DropBox users got an unexpected update last week when the cloud storage house accidentally sent one of its test applications out to regular users.

The cloud storage biz says it accidentally posted the new version of its desktop file manager app, currently in early access phase, to regular users who were alarmed at the new application suddenly appearing on their machines. Dropbox says it has since resolved the matter.

Tesla owner finds flaw in naming system

A security researcher and Tesla owner discovered the leccy automaker’s naming system for customers’ cars was insecure. Bug-hunter Sam Curry snuck some JavaScript code into the name field on his auto, in its configuration settings, and forgot about it, only to have the code trigger when a Tesla support agent viewed the name of the car in an internal system several weeks later when servicing a cracked windshield.

Curry would eventually get credit for discovering the bug, and earned a $10,000 bounty. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/21/security_roundup_190719/

All very MoD-ern: RAF test pilot headed into space with Virgin, £30m small sat demo project

Roundup As the world celebrates the 50th anniversary of the Apollo 11 Moon mission, the UK’s Ministry of Defence has gone a bit wacky – not only does it have fresh space plans, but it also wants to strap laser zappers to stuff too.

At the Royal Air Force’s Air and Space Power Conference held earlier this week, Defence Secretary Penny Mordaunt declared the ministry is putting £30m into the development of a British small satellite demonstrator, which it hopes to launch “within a year”.

Under the name Team Artemis, the joint UK-US venture will include eight British military personnel who will be sent to California to get involved in a US-led “international coalition formed to strengthen deterrence against hostile actors in space and prevent the spread of space debris in orbit”.

Mordaunt said in a speech delivered at the conference: “Given the vastness of the challenge, this might seem a relatively small-scale initiative. But effectively we’re planting the acorns from which the future oaks will grow. Critically, British industry is already a world leader in these innovative technologies.”

As part of Britain’s small but proud space heritage, she pointed to the Carbonite-2 satellite, designed by Surrey Satellites (an Airbus subsidiary), which the RAF has been testing to beam live video footage from space.

Rather implausibly, Mordaunt also heralded “a new age of ‘sombre’ wars conducted in the shadows, on the dark web, in the business world, space and often remote from what we’ve known of the battlefield” – a pronouncement that drew scorn from those used to the MoD’s impenetrable gobbledygook.

Our man in spaaaaace – Mk.2

An RAF test pilot will also be dispatched to Virgin Orbit’s bid to get into space, Mordaunt announced. Perhaps the Air Force is a little jealous that Major Tim Peake, a British Army Air Corps helicopter pilot before his transition to stellar glory for all time, scooped all of the publicity when he went into orbit with the EU Space Agency.

On top of that, the Defence Secretary also said she wants to see the RAF become a service where new joiners can “become an aviator or an astronaut, where you will push back the frontiers of space and create a launchpad to the stars”.

Not so many years ago, the RAF’s sole contribution to space awareness was a squadron leader driving a Whitehall desk. The service has evidently decided to go the whole hog, though whether Britain will do a Donald Trump and inaugurate a standalone Space Force remains to be seen.

And back to F-35s

Britain received its latest batch of F-35B VSTOL fighter jets from America as well this week, with the six aircraft having been flown across the Atlantic in the same way as the first batch. Allocated to 207 Sqn RAF, the jets will be used for training duties in the UK – meaning British aviators will no longer have to fly to sunny southern USA for conversion onto the supersonic stealth aircraft.

Turkey has also been kicked out of the F-35 program by Trump after buying a state-of-the-art Russian air defence system. This solves at least one of the problems El Reg‘s defence desk foresaw years ago, as since the days of Turkey housing a single engine overhaul plant, wiser heads have commissioned another one in Norway. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/19/mod_space_projects_team_artemis_virgin_orbit/

When Harry met celly: NSA hoarder thrown in the clink for 9 years – after taking classified work home for decades

An ex-NSA contractor who admitted stashing some 50TB of secret US government documents and exploit code at his home was today sentenced to nine years behind bars.

Harold Martin, 54, was given the nine-year term along with an additional three years of supervised release by Judge Richard Bennett in a US federal district court in Maryland.

The sentence was in line with the guidelines for the single count of willful retention of defense information that Martin agreed to plead guilty to as part of a plea deal that was cut earlier this year.

Martin admitted to collecting terabytes of hush-hush dossiers, manuals, code, blueprints, and such files, from the NSA over the course of his 22-year career as a private contractor with the American intelligence agency. From 1993 to 2006, Martin hoarded data classified as “Secret” and “Top Secret” and took them home to his Maryland residence.

The documents Martin stole were said to include NSA reports on its targets and the intrusion techniques foreign hacking groups had used against Uncle Sam. He also collected software and documents on the exploits and monitoring tools that NSA and US government hackers used against foreign targets.

“Many of the documents Martin stole bore standard markings indicating that they contained highly classified information of the United States, including ‘Secret’ and ‘Top Secret’, as well as Sensitive Compartmented Information. The information in the classified documents included National Defense Information,” the government said in its 2017 indictment (PDF) of the ex-contractor.

NSA

Snowden files confirm Shadow Brokers spilled NSA’s Equation Group spy tools over the web

READ MORE

“Martin retained stolen documents, in hard copy and digital form, containing National Defense Information and classified information in a number of locations within his residence and in his vehicle.”

It is believed that some of those documents and code would eventually end up as part of the massive Shadow Brokers intelligence dump.

Lawyers for Martin argued that he never intended to disseminate any of the collected NSA information. Rather, he was seeking to build a personal archive of data in part due to hoarding tendencies he had developed.

In taking the single guilty plea, he avoided a longer sentence from nine other charges of the same crime. Still, it is the longest sentence yet given to a person convicted of leaking US intelligence documents.

By comparison, NSA whistleblower Reality Winner was handed a five year sentence for her document leaks, and ex-contractor Nghia Pho got five and a half years for taking home classified docs that were later stolen by Russian hackers. ®

Sponsored:
Balancing consumerization and corporate control

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/07/19/nsa_hoarder_jailed/