STE WILLIAMS

iOS 13 will map the apps that are tracking you

As Apple continues its privacy march, the upcoming iOS 13 mobile update will be right there, and it’s pulling tracking apps along.

Apple showed off iOS 13 last week at its Worldwide Developers Conference (WWDC).

Beta testers at 9to5Mac have discovered that the upcoming release, now in preview, will tell you what apps are tracking you in the background and will give you the option of switching them off. Ditto for iPadOS.

The new feature comes in the form of a map that displays how a given app – 9to5mac showed screenshots of popup notifications about tracking apps from Tesla and the Apple Store – has been tracking you in the background, as in, when you’re not actually using the app.

The notifications show a map of the specific location data a given app has tracked, displaying the snail-slime trails that we all leave behind in our daily travels and which so many apps are eager to sniff at for marketing purposes.

Or for other reasons, as well. Besides the map, the popups will also provide the app’s rationale for needing access to a user’s background location.

Tesla’s explanation:

Tesla uses your location to show your proximity to your vehicle (while the app is open), and to optimize phone key on your support vehicles (while the app is in the background).

And the Apple Store app’s explanation:

We’ll provide you with relevant products, features, and services depending on where you are.

The notifications offer the option to keep giving a specific app background access to your location or to change it to “only while using.”

iOS 13, which Apple says will be available as a public beta next month, will also offer users the option to give apps access to location “just once,” instead of continuous background access or the constant access an app wants when in use.

You won’t see these notifications on Apple’s other platforms, given that you don’t need them. tvOS doesn’t support always-on location gathering, macOS doesn’t have Always or WhenInUse because prompting of the user is automatic, and Apple says watchOS doesn’t need it, according to 9to5mac.

Meanwhile, in other “stop these tracking apps!” news…

On Monday at WWDC, Apple SVP of Software Engineering Craig Federighi also said that Apple was “shutting the door” on developers’ “abuse” of location data by instead using Bluetooth and Wi-Fi network details to estimate users’ locations.

Federighi unveiled a new version of its Find My device feature onstage, saying that the new tool can track the location of iOS 13 and macOS 10.15 Catalina devices using Bluetooth and Wi-Fi even when they’re offline.

As AppleInsider reports, the new technology relies on crowdsourcing from Apple’s massive user install base, sending out Bluetooth beacon signals that are picked up by nearby iOS or Mac devices, which then pass on a found device’s identifier and their own location information back to Apple for later access by Find My users.

Every step of the data’s journey is encrypted, Federighi said, thereby protecting users’ privacy:

This whole interaction is end-to-end encrypted and anonymous. It uses just tiny bits of data that piggyback on existing network traffic so there’s no need to worry about your battery life, your data usage or your privacy.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/GPCKO6dxxNA/

Critical flaws found in Amcrest security cameras

Looking at the spec sheet, it’s not hard to understand why someone in search of an affordable but well-specified home security camera would choose the wireless IPM-721 series from US company Amcrest.

Launched around 2015, it offers 720p HD quality, two-way audio, the ability to pan and tilt, night vision, rounded off with four hours of cloud storage for your video footage at no extra cost.

This week, we learned that the camera had another less welcome characteristic in the form of six security flaws discovered back in 2017 by a researcher at security outfit Synopsys.

The 721 family has since been superseded by newer designs, which doesn’t, of course, mean that the many thousands of people who bought the product will stop using it just because a researcher has turned up security issues.

Those cameras are out there, an unknown number of which are in a vulnerable state that an attacker might identify using the Shodan search engine if they are configured to be accessible via the internet. Ideally, these cameras need to be identified and patched as soon as possible.

There are really three issues in play here – the nature and severity of the flaws, how users should go about updating the firmware to secure their cameras, and why it’s taken until 2019 for owners to hear about them.

The flaws

According to Threatpost, which spoke to the Synopsys researcher who uncovered the flaws, there are six vulnerabilities, now identified as CVE-2017-8226, CVE-2017-8227, CVE-2017-8228, CVE-2017-8229, CVE-2017-8230 and CVE-2017-13719.

We weren’t able to track down an advisory from Amcrest, but Synopsys posted outlines of each on Bugtraq.

Two of these – CVE-2017-8229 and CVE2017-13719 – earn a CVSS score of 9.8 and 10 respectively, which means they are critical issues.

The first allows an unauthenticated attacker to discover the camera’s admin credentials stored in clear text, facilitating a takeover of the device and, presumably including locking legitimate users out of the UI. Worryingly:

Based on cursory analysis of other Amcrest products, this might be prevalent in all the Amcrest IP cameras and also other Amcrest products.

The second is a problem in a stack overflow flaw affecting the camera’s Open Network Video Interface Forum (ONVIF) specification. This, too, could affect other Amcrest IP cameras, allowing devices to be remotely hijacked.

How to update

Reportedly, Amcrest made software patching the flaws some months ago, which would have been offered to owners when they next logged in. However, anyone who didn’t log in during this period would presumably not receive that notification.

According to Synopsis, all firmware versions (models 721S, 721W, 721B) for up to and including V2.420.AC00.16.R 9/9/2016 are vulnerable. On that basis, the firmware version offered on Amcrest’s website, V2.520.AC00.18.R, is the one to look for.

This can be applied manually by logging into the device’s UI, checking firmware versions and accessing Setup System Upgrade (you’ll find detailed instructions here).

Why the delay?

As the 2017 date on the CVEs makes clear, Amcrest has known about these flaws for least 18 months or more. It offered updated firmware a few months ago but delayed telling owners about the security aspect of its purpose in order to “give users time to update.”

Our concern with this would be the researcher’s assessment that other Amcrest camera systems might be affected by the two most serious flaws which, if correct, surely deserves a full public advisory.

Assuming users will update when they log in (which many never do) isn’t good enough. Owners need to be told to do this via email or via the company’s Twitter account (@AmcrestSecurity).

Ironically, Amcrest appears to be a responsible vendor by the Internet of Things’ standards where ignoring researchers and failing to offer patches can be the default position for some companies.

Article source: http://feedproxy.google.com/~r/nakedsecurity/~3/R6euG2lupv4/

Have I Been S0ld? Troy Hunt’s security website is up for acquisition

Troy Hunt, inventor and operator of the popular security website Have I Been Pwned (HIBP), is putting the service up for sale.

Hunt, a Microsoft Regional Director and MVP for security, created the site in 2013 after Adobe leaked 153 million usernames and weakly encrypted passwords. Users can enter an email address and discover if it is included in the exposed data. You can also enter a password to see if it features in a data breach.

The site was soon extended with data from other breaches and now contains nearly 8 billion records. HIBP publishes an API which gets over 12 million hits a day, most of them checking whether a password is safe to use. Mozilla’s Firefox is one of a number of products that integrates with the API to help users choose strong passwords. Commercial subscribers, governments and law enforcement agencies use the service too.

Hunt said in today’s announcement that “to date, every line of code, every configuration and every breached record has been handled by me alone. There is no ‘HIBP team’, there’s one guy keeping the whole thing afloat.”

Common passwords have been leaked, this one over 1 million times

Common passwords have been leaked, this one over 1 million times

He said that maintaining the site has been stressful and has taken him close to burnout. He believes it is time to put the business up for acquisition, which he is doing with KPMG.

The acquisition project is called Project Svalbard, in tribute to a Norwegian effort to store a vault of seeds to protect against future loss. “It sounds like a befitting name, beginning with the obvious analogy of storing a massive quantity of ‘units’,” Hunt said.

The question everyone will be asking: will the service get worse? Hunt said he will remain part of HIBP and that consumer searches will still be free. The idea is that a bigger organisation will enable him to build out more capabilities.

He also wants to put more effort into changing the behaviour of both individuals and organisations, in respect of their poor security practices.

Hunt has fallen behind, he said, on responsible disclosure – informing organisations that they have been breached. This he called “massively burdensome”.

When will it happen? No hurry, said Hunt. “I’m not under any duress (not beyond the high workload, that is) and I’ve got time to let the acquisition search play out organically and allow it to find the best possible match for the project.”

But he does not want to lead a new nonprofit even with sponsorship from other companies, believing that this would increase rather than reduce the stress he is under.

The site performs an excellent, though dispiriting, service. Those of us who have had active email accounts for many years are likely to feature multiple times in the HIBP database. Your correspondent’s, for example, is in 20 data breaches including Adobe, Bit.ly, Creative, Disqus, Dropbox, Kickstarter, Last.fm, MySpace and vBulletin, as reported by HIBP.

Sane security today means unique passwords for every site and a password manager, along with other strategies like multi-factor authentication, but take-up is weak as data from services like Microsoft’s Office 365 demonstrates.®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/11/have_i_been_pwned_security_site_is_up_for_sale/

Getting Up to Speed on Magecart

Greater awareness of how Magecart works will give your company a leg up on the growing threat from this online credit card skimmer. Here are four places to start.

If you’re not yet familiar with Magecart, you should be. On May 3, it was revealed that hackers used it to steal payment info from hundreds of online college bookstores. By some estimates, Magecart attacks have resulted in the theft of more credit card information than the high-profile breaches at Home Depot and Target. Beyond the college bookstores, it has hit the likes of Ticketmaster, British Airways, My Pillow, and Newegg in the last year alone. It’s time you got up to speed on the topic.

Magecart (pronounced like “age-cart,” but with an “m” at the beginning) is a method used to attack the payment systems of online vendors. It is a credit card skimmer (like those attached to the magnetic stripe readers at gas pumps) that intercepts card numbers and information when a payment card is swiped at the point of sale. The data is then saved or transmitted to be used illegally later. However, unlike at the gas pump, there is almost no way for a consumer to determine that Magecart skimming is about to take place. There is no physical manifestation of Magecart and it is not always easy to catch, even for knowledgeable IT professionals, because it takes advantage of universal code and other applications not typically related to payments.

Since first appearing in 2014, Magecart has been adapted by several different groups and for various targets. Each iteration tries to adapt to whatever defenses it encounters and seeks to exploit new vulnerabilities, making it difficult to effectively predict and stop. Leading researchers, like Yonathan Klinjsma, believe the various Magecart breaches have been carried out by at least 12 different groups since the method was first used and have noticed the groups moving beyond credit cards to steal credentials and administrative information as well.

Generally speaking, payments over the Web are relatively secure, with vendors using PCI DSS-compliant systems. As companies look to cut costs and increase efficiency, many use open source code to simplify the coding process and make it more uniform across the board. Others use third-party vendors to handle their payment systems. Although not necessarily bad ideas, these solutions present enterprising hackers with an opportunity to exploit common weaknesses and employ the Magecart attack.

The Newegg.com Breach
Despite not yet being a household name, Magecart is a growing problem. Last year’s breach involving Newegg.com illustrates what Magecart does and how it works. According to Volexity Threat Research, on August 13, 2018, the Magecart attackers registered a domain name called neweggstats.com (indicating that the Newegg website was likely compromised beforehand). That same day, the attackers obtained an SSL certificate enabling the new domain to have an air of legitimacy when browsers communicate with it. The skimming started three days later when hackers added eight lines of malicious code to the payment page and continued for almost a month before it was removed.

More specifically, the Magecart attackers inserted malicious JavaScript code on a single page presented during checkout. To get to that page, a customer had to put an item in the cart and input shipping information. At that point, the customer was taken to the payment page that contained malicious code. Once the customer input their information, it was transferred to a Magecart drop server where the back end of the skimmer saved the information. Once attackers accumulated a significant amount of credit card information (about 500,000 credit card numbers), they listed it for sale on underground markets.

Not surprisingly, Newegg revealed little about how exactly it was compromised. Regardless of whether it was poor IT security protocols, bad password management, or human error, if Newegg had tighter controls, this might have been avoided. It appears that whatever security protocols Newegg had in place failed to identify that a breach occurred for nearly a month. The Magecart attackers certainly made a significant effort to ensure that their actions were not obvious, but it is fair to say that the attack went on longer than it should have.

Protecting Your Company
A seemingly endless supply of online retailers and unassuming consumers who are relying on third-party code or other similar systems to facilitate purchases means Magecart is likely to remain a threat. But being aware of Magecart and how it works should give your company an advantage in protecting itself as you consider the following four measures:

1. Reevaluate your current cybersecurity infrastructure. Your system probably already includes some type of logging and a way for reviewing it, but would you, or your IT team, know if a hacker added eight lines of code to your website’s payment page? Regardless of the answer, it is always good practice to regularly ensure that your cybersecurity system is prepared for current threats.

2. Is your IT team aware of what Magecart is? Do they know how they would respond? Do you have a cybersecurity incident response plan in place? The way it developed, it appears Newegg found out about the breach from someone else and then had to be reactive instead of proactive. If a researcher contacted your company to alert you about a breach, would you know what to do? Do you have a plan in place for evaluating any damages and communicating about the situation to your customers?

3. Carefully consider the vendors you use for your business (both online and offline), especially with regard to public facing critical systems like the checkout page. Strive to ensure that your vendors have their own cybersecurity response plan in place and are doing all they can to avoid needlessly exposing your data.

4. Avoid payment methods that require transmittal of critical credit card information. Visa has addressed this with a token system in its Visa Checkout system. While it may not be a perfect solution, it is one that removes the exchange of credit card numbers at checkout and that can protect both you and your customer.

Related Content:

Casey Quinn is an associate in Newmeyer Dillion’s Las Vegas office, and a member of the firm’s privacy data security practice. Casey brings his substantial experience in complex business litigation to the table helping businesses proactively navigate the legal landscape … View Full Bio

Article source: https://www.darkreading.com/cloud/getting-up-to-speed-on-magecart-/a/d-id/1334884?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

JavaScript tells all, which turns out not to be so great for privacy: Side-channel leaks can be exploited to follow you around the interweb

Boffins from Graz University of Technology in Austria have devised an automated system for browser profiling using two new side channel attacks that can help expose information about software and hardware to fingerprint browsers and improve the effectiveness of exploits.

In a paper, “JavaScript Template Attacks: Automatically Inferring Host Information for Targeted Exploits,” researchers Michael Schwarz, Florian Lackner, and Daniel Gruss describe a technique for collecting information about browsers that calls into question the effectiveness of anonymized browsing and browser privacy extensions. The paper was brought to our attention this week, and presented earlier this year at the Network and Distributed System Security Symposium.

The researchers say their automated browser profiling scheme facilitates browser fingerprinting, overcomes some anti-fingerprinting techniques, and shows that browser privacy extensions “can leak more information than they disguise and can even be semi-automatically circumvented, leading to a false sense of security.”

Browser fingerprinting involves gathering information about an internet user’s browser and associated software and hardware, such as the browser type, the operating system, various network request headers, cookies, extensions, screen resolution and so on.

These properties can be collected using JavaScript, which exposes language features, namely the JavaScript object structure – children of the root window object – which can also be probed for information.

This isn’t a novel issue, but in conjunction with two new side-channel attacks, which reveal the instruction-set architecture and the memory allocator, the technique described can expose information about supposedly hidden parts of the browser environment with particular efficiency because it’s automated. And yes, you could disable JavaScript execution, though you’ll be losing a lot of web functionality.

The findings have implications for anyone under the impression that online privacy or online anonymity can be assured, but particularly for users of the Tor browser, which has been designed to resist fingerprinting. The research suggests Tor’s effort to make users appear to have the same browser fingerprint, thereby blending into the crowd, may fall short if additional data points are considered.

The upshot is: this technique is not going to immediately unmask you, and it’s by no means perfect, but it could potentially be used to track you around the internet and target you with adverts.

JavaScript Template Attacks can be used for user fingerprinting. But the technique has been designed to identify computing environments rather than users. It can thus facilitate exploit targeting, which is more effective when reconnaissance can assure vulnerability. However, the Graz boffins hope their work will advance defensive research rather than attack magnification.

The technique is simple enough. First comes the profiling phase, which involves compiling a list of properties accessible from JavaScript objects (eg window.Array.name, performance.timeOrigin). These become a profile.

Someone spying on someone else

Talk about a cache flow problem: This JavaScript can snoop on other browser tabs to work out what you’re visiting

READ MORE

The data collection then gets repeated using a different environment, such as an alternate browser or operating system. Together, these varied profiles of JavaScript objects and properties form a template that can be used to probe for variations.

The variations identified in this matrix of data reveal environmentally-dependent properties in Chrome, Edge, Firefox and mobile Tor, properties that provide information useful for identification and attack targeting.

One of the side-channel attacks developed for JavaScript Template Attacks involve measuring runtime differences between two code snippets to infer the underlying instruction set architecture through variations in JIT compiler behavior.

The other involves measuring timing differences in the memory allocator to infer the allocated size of a memory region.

The boffins’ exploration of the JavaScript environment reveals not only the ability to fingerprint via browser version, installed privacy extension, privacy mode, operating system, device microarchitecture, and virtual machine, but also the properties of JavaScript objects.

And their research shows there are far more of these than are covered in official documentation. This means browser fingerprints have the potential to be far more detailed – have more data points – than they are now. The Mozilla Developer Network documentation for Firefox, for example, covers 2,247 browser properties. The researchers were able to capture 15,709. Though not all of these are usable for fingerprinting and some represent duplicates, they say they found about 10,000 usable properties for all browsers.

Schwarz, Lackner, and Gruss conclude by noting that they hope browser makers will consider their findings as they work to improve browser and privacy extensions. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/11/javascript_fingerprinting/

US border cops confirm: Maker of America’s license-plate, driver recognition tech hacked, camera images swiped

The US Customs and Border Patrol today said hackers broke into one of its bungling technology subcontractors – and made off with images of people and their vehicle license plates as they passed through America’s land border.

The CBP issued a statement outlining how it learned on May 31 that the unnamed contractor, against Uncle Sam’s privacy rules and security measures, copied license plate scans and traveler pictures to its own network, only to have that network invaded by hackers and the data stolen.

In an email to The Register, a spokesperson for the border cops said:

On May 31, 2019, CBP learned that a subcontractor, in violation of CBP policies and without CBP’s authorization or knowledge, had transferred copies of license plate images and traveler images collected by CBP to the subcontractor’s company network. The subcontractor’s network was subsequently compromised by a malicious cyber-attack. No CBP systems were compromised.

Initial information indicates that the subcontractor violated mandatory security and privacy protocols outlined in their contract. As of today, none of the image data has been identified on the Dark Web or internet. CBP has alerted Members of Congress and is working closely with other law enforcement agencies and cybersecurity entities, and its own Office of Professional Responsibility to actively investigate the incident. CBP will unwaveringly work with all partners to determine the extent of the breach and the appropriate response.

The CBP went on to say it has removed all of the equipment used to gather the images involved in the leak, and will be “closely monitoring” the subcontractor for further screw-ups:

CBP has removed from service all equipment related to the breach and is closely monitoring all CBP work by the subcontractor. CBP requires that all contractors and service providers maintain appropriate data integrity and cybersecurity controls and follow all incident response notification and remediation procedures. CBP takes its privacy and cybersecurity responsibilities very seriously and demands all contractors to do the same.

While a CBP spokesperson declined to name the subcontractor at the heart of the kerfuffle, the Washington Post was first to receive the above statement – as a Microsoft Word document that had the name “Perceptics” in the file title. (Our copy arrived as a plain-text email body.)

The presence of Perceptics in the Word doc title would reconfirm the exclusive Register report from May 23 that Perceptics, a maker of license-plate reader hardware and software extensively used at the US government’s borders and checkpoints, had been ransacked by hackers, who made off with and dumped on the dark web a snapshot of its entire IT estate. Perceptics touts systems that can recognize drivers and their cars from camera footage, allowing officials to verify travelers.

That information dump, which encompassed hundreds of gigabytes of data, included internal emails and databases, documentation and client details, blueprints, backups, music, and more.

A further review of those files today uncovered at least 4,000 .JPG and .TIF images of, among other things, license plates, some identified and some not, belonging to vehicles passing through CBP’s checkpoints including those in Santa Teresa and Columbus, New Mexico, on the southern border with Mexico, and the Hidalgo Port of Entry on the Texas-Mexico border.

Traffic camera

Maker of US border’s license-plate scanning tech ransacked by hacker, blueprints and files dumped online

READ MORE

It appears the images were likely collected for troubleshooting or further development of the technology, rather than harvested en masse. There may be more images within the stolen data trove, of course. There are references to pictures taken in Alaska and San Diego, as well as sensor logs and error reports, for instance. It is understood fewer than 100,000 people have had their pictures or information leak via the subcontractor, though.

While El Reg last month reported the data was being offered on the Tor network for anyone to download if they could find it – and indeed, we found it on a hidden .onion website after a tipster alerted us to the leak – the CBP’s carefully worded statement on Monday this week noted that “as of today, none of the image data has been identified on the dark web or internet.”

As of today? Make of that what you will. The .onion website hosting Perceptics’s data is still alive and offering gigabytes of the subcontractor’s archives via an rsync server, though we have not confirmed whether this download service is today working as advertised.

Should Perceptics indeed prove to have been the subcontractor, which seems rather likely, and if the dates provided are correct, that would mean the CBP learned of the security snafu some eight days after we contacted Perceptics on May 23 to warn it of the intrusion – a cyber-break-in Perceptics at the time acknowledged had happened but wouldn’t go into further details – and then went public a week later.

A CBP spokesperson declined to confirm or deny Perceptics was the pwned subcontractor. A spokesperson for Perceptics, a former subsidiary of Northrop Grumman with customers around the world as well as various US states, could not be reached for immediate comment. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2019/06/10/us_custom_border_patrol_contractor_hacked/

Voting Machine Vendor Shifts Gears & Pushes for Backup Paper Ballots

Election Systems Software will ‘no longer sell paperless voting machines,’ CEO said.

Want to keep electronic voting safe and secure? Make sure that the votes are captured on paper, the CEO of electronic voting systems vendor Election Systems Software wrote in an op-ed this week.

“Our company, Election Systems Software, the nation’s leading elections equipment provider, recently decided it will no longer sell paperless voting machines as the primary voting device in a jurisdiction,” wrote ESS CEO Tom Burt in his piece in Roll Call.

This is a major shift in the company’s public position on voting machine vulnerabilities. 

Burt recommended: Get more money from Congress for better security on a national level; make sure there’s a paper trail for audits and recounts; and leverage the things that currently work well.

He also derided one of the factors in the US election system and called it a strength: With more than 10,000 separate voting jurisdictions in the nation, each responsible for choosing its own election products, it would, he wrote, be very difficult for a malicious actor to launch a massive, wide-scale attack on national voting.

For more, read here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/application-security/voting-machine-vendor-shifts-gears-and-pushes-for-backup-paper-ballots/d/d-id/1334924?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Cognitive Bias Can Hamper Security Decisions

A new report sheds light on how human cognitive biases affect cybersecurity decisions and business outcomes.

It’s a scenario commonly seen in today’s businesses: executives read headlines of major breaches by foreign adversaries out to pilfer customers’ social security numbers and passwords. They worry about the same happening to them and strategize accordingly – but in the text, they learn the breach was in a different industry, of a different size, after different data.

This incident, irrelevant to the business, distracted leaders from threats that matter to them.

It’s an example of availability bias, one of many cognitive biases influencing how security and business teams make choices that keep an organization running. Availability bias describes how the frequency with which people receive information affects decisions. As nation-state attacks make more headlines, they become a greater priority among people who read about them.

“At the organizational level, we have major decision-makers deciding how much to spend on cybersecurity solutions,” explains Dr. Margaret Cunningham, principal research scientist at Forcepoint and author of “Thinking about Thinking: Exploring Bias in Cybersecurity with Insights from Cognitive Science.” These execs may be aware of more frequent threats like phishing, but the real problem is they’re interpreting risk based on what’s available in today’s news cycle.

Understanding these biases can improve understanding of how employees make decisions, Cunningham continues. An academic who describes herself as “obsessed with the type of mistakes people make,” she noticed human error was a common topic in cybersecurity. However, what human error is, and the many types of mistakes people make, were not.

“There’s no way we can be robotic about human perception,” she says. “As security specialists, we need to mitigate these risks by understanding them better.” Bias, or the tendency for people to favor a person, group, or decision over another, is swayed by past and present experiences. It’s common in situations where the correct choice isn’t always clear, she explains.

Cybersecurity: An Emotional Roller Coaster

Cognitive bias isn’t specific to cybersecurity; it’s universal. Many factors that influence human behavior fly under our radar, especially in stressful situations that security pros often face.

“Bias is fluid,” says Cunningham. “It’s shaped by past experiences, how tired we are, how emotional we are, and honestly, being in tech is highly emotional.” She points to the “warlike” language often used in cybersecurity: attack, breach, firewall. Security practitioners are especially prone to bias because they work in a field that’s highly emotional and often abstract.

Six types of biases can skew security strategies: availability bias is one, but teams should also be aware of aggregate bias, which is when people infer something about an individual based on data that describes broader populations. For example, Cunningham reports, older people are often considered riskier users because of a perceived lack of familiarity with new technologies.

Confirmation bias is when someone seeks to confirm their beliefs by exclusively searching for information that supports their hunch while excluding opposing data. This is especially common in security, she says. It’s typical among analysts who enter an investigation digging for an answer they really want. “[This] creates avenues for ignoring the whole picture because we’re looking for what we know,” says Cunningham, instead of considering other possibilities.

Another is anchoring bias, which occurs when a person locks onto a specific feature, or set of features, of data early in the decision-making process. If a value is introduced early in a sales pitch, for example, all the numbers that follow will be in the same ballpark. This plays into cybersecurity when, for example, an analyst clings to a certain value early in an investigation and fails to move away from it – even when the solution to the problem requires them to do so.

The framing effect, which affects how choices are worded, often manipulates those who buy security tools. For example, a vendor may say “one in five companies never got their data back after a ransomware attack,” placing focus on the one organization that lost data instead of the four that didn’t. This strategy causes security admins to buy pricey tools for low-probability risk.

Finally, there’s the fundamental attribution error, which is the tendency to view people’s mistakes as part of their identities rather than contextual or environmental factors. It’s seen throughout security, where analysts or developers blame users for creating risks because they’re less capable. There’s also a self-serving bias here, as the users often blame IT.

Breaking Biases

Security pros cannot “cure” biases, says Cunningham, just as they can’t cure people making mistakes.

“What we can do is become better acquainted with the types of decisions, or decision points that are frequently and predictably impacted by bias,” she explains. If someone is aware of the potential for bias in a situation, they can use this awareness to avoid bias and potentially make different, more informed, choices as a result. After all, she points out, attackers understand how they can manipulate human emotion, and they’re using this knowledge to their advantage.

Related Content:

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance Technology, where she covered financial … View Full Bio

Article source: https://www.darkreading.com/threat-intelligence/cognitive-bias-can-hamper-security-decisions/d/d-id/1334925?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Huawei Represents Massive Supply Chain Risk: Report

The Chinese technology giant’s enormous product and service footprint gives it access to more data than almost any other single organization, Recorded Future says.

A new report from threat intelligence firm Recorded Future portrays Chinese technology giant Huawei as presenting a substantially bigger threat to US interests and organizations than currently perceived.

According to the firm, Huawei’s enormous range of technologies and products and its global customer base has put the company in a position to access an unprecedented amount of information on organizations, governments, and people worldwide. Huawei’s obligations to the Chinese government under various national security and related statutes puts that data at risk of interception and compromise, Recorded Future said.

“The position that Huawei occupies in China and its obligations under that government’s laws and regulations cannot be minimized,” warns Priscilla Moriuchi, director of strategic threat development at Recorded Future.

“Huawei, as a Chinese company, is not inherently malign,” she acknowledges. “However, the people that compose Huawei will at some point likely be forced into making decisions that could compromise the integrity or corporate ambitions of their customers.”

President Trump last month signed an executive order that effectively bans US government agencies from buying technologies that are owned by, controlled by, or subject to the laws of foreign adversaries.

The order cited concerns over the potential for foreign governments to force such vendors to use their technology to spy on US organizations and to conduct widespread espionage — via backdoors, for instance. The executive order also requires contractors that work with the federal government to jettison Huawei technologies from their infrastructure in a phased manner.  

The Trump administration’s order did not explicitly name Huawei, or any other technology companies for that matter. But many see it as directed particularly at the Chinese technology vendor.

Over the past few years, US officials have openly expressed concern over what they perceive as Huawei’s close ties to the Chinese government. The US has accused China of conducting widespread economic espionage for a long time. Last year, CNBC reported six US intelligence heads cautioning against the use of Huawei’s phones in the US market because of such concerns. Recently, government officials and others have focused on the national security implications of Huawei’s leadership in the 5G networking space. It has urged allies and governments around the world to stop using Huawei technology as well.

Huawei, for its part, has strongly denied accusations that it is working on behalf of the Chinese government or is supplying information to the government, as its critics have suggested. The company has described itself as a victim of a broader geopolitical battle between the US and Chinese governments. Huawei has suggested that at least some of the pushback from Western governments stems from its enormous success in the technology arena. The company is currently in the third spot behind Apple in the global smartphone market, and its technology is widely used across many parts of Asia.

“I would argue that we are beyond the point of needing specific evidence, and that we must address the question of Huawei risk comprehensively with the available data,” says Moriuchi.

Broad and Growing Footprint
Huawei currently offers a broader range of technology products than almost any other company, including Western technology giants such as Microsoft and Apple. The company’s portfolio includes broadband network components; cloud computing and storage technologies; infrastructure management software; network switches and routers; and mobile phones, laptops, and wearables. Many of these technologies are installed within organizations or are embedded in the networks of cloud service providers and other third parties, according to Recorded Future.

Huawei’s technology is being used in so-called “safe city” surveillance programs in multiple cities around the world, and the company is aggressively expanding its presence in the core Internet routing space via undersea cables and fiber-optic technology.

Huawei’s enormous footprint has given it access to more data than perhaps any single other organization. What makes that worrisome is that under Chinese laws passed since 2016, Huawei has a legal responsibility to provide access to and support the country’s intelligence-gathering apparatus, Moriuchi says. “There is no legal mechanism in China for a company to challenge or contest a request by the intelligence and security services,” she says.

Huawei has also benefited from government loans and received funding from China’s military and intelligence agencies and over the years has benefited from government support and preferential treatment, Moriuchi claims.

For companies and individuals, the threat from Huawei can be distilled down to the risk to business and personal data, networks, intellectual property, and even long-term corporate viability. When deciding to use Huawei products, organizations need to figure out what their risk tolerance for monitoring, interference, or potentially sensitive data theft from China is. 

“If the risk threshold is low, we recommend that companies minimize the number of Huawei technologies and services within core or critical segments of their networks,” Moriuchi advises.

Related Content:

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/huawei-represents-massive-supply-chain-risk-report/d/d-id/1334926?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Federal Photos Filched in Contractor Breach

Data should never have been on subcontractor’s servers, says Customs and Border Protection.

Photos used by US Customs and Border Protection (CBP) in an effort to protect travelers have been taken in an attack against a federal subcontractor. Officials confirmed the compromise, which they described as part of a malicious cyberattack.

While the agency declined to give details about the photos accessed by the attacker, the subcontractor is known to maintain databases of photos that include passport and visa photos, license plate images, and images from facial recognition systems.

According to the agency, a subcontractor transferred CBP data to its network, which was subsequently hacked. “The issue with subcontractors is that you can’t completely control how they secure their network,” says Pierluigi Stella, CTO of Network Box USA. “You can ask for certifications, financials, controls, and attestations, but there is always a limit to how much you can demand.”

In its statement announcing the breach, CBP said it has ” … removed from service all equipment related to the breach and is closely monitoring all CBP work by the subcontractor.”

The breach comes as CBP is increasing its use of facial recognition and other image-based security. “This incident further underscores the need to put the brakes on these efforts and for Congress to investigate the agency’s data practices,” said Neema Singh Guliani, a lawyer for the American Civil Liberties Union, in a statement. “The best way to avoid breaches of sensitive personal data is not to collect and retain such data in the first place.”

Read more here.

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/federal-photos-filched-in-contractor-breach/d/d-id/1334927?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple