Click on any headline below to jump to its summary and external news source.
If youâd prefer having this news presented to you, view/hear the on-demand recorded webcast . Also check out the rest of our webinars and videos on .
A co-brandable .MP4 version (focusing on TLS & SSL, financial impacts and miscellaneous news) is available to our Certified Partners for marketing purposes .
If you have any corrections or suggestions, please contact us.
Chrome sets security sights on solving for suspicious URLs
Let's Encrypt deprecates TLS-SNI-01 validation
Report sounds alarm bells re: IoT data security
Japan plans to hack its citizens' IoT devices
Brand & valuation damage send avg. cyberattack cost soaring to >US$1.6M
Ransomware victimâs corporate claim denied as insurer âdeclaresâ war
Global firms face US$5T in cybercrime losses
Inside-trading hackers made >US$4M on stolen filings/reports
US DHS emergency directive on DNS hijacking threat
Firefox 65 bolsters anti-tracking & privacy controls
New breed of cryptomining malware uninstalls cloud infrastructure security tools
Data & cyber risks are 2 of top 5 âmost likelyâ to impact businesses & governments in 2019
Chinese province launches deadbeat debtor detector
International takedown of the xDedic Marketplace for PII and hacked computers
Govât-compelled biometric phone unlocking ruled unconstitutional
UK unis cyber attacking each other
Girl Scouts of America Offering Cybersecurity Badges
Googleâs Chrome browser security team is looking for ways to make it difficult for cybercriminals and bad actors to capitalize on friendly-looking-but-false URLs which confuse users about the true identity of a website. Theyâre considering modifications to the presentation of URLs as we know (or perhaps, more accurately, see) them, such that users donât have to untangle long or tricky URLs â and itâs those URLs which provide effective cover fraudstersâ scams. (A good example would be spelling âgood exampleâ as âg00d exаmp1eâ with zeros instead of Oâs, a number 1 instead of a lower-case L, and a different alphabetâs character which looks exactly like a lower case âAâ.) Emily Stark, of the Chrome team, commented, "What weâre really talking about is changing the way site identity is presented⌠People should know easily what site theyâre on, and they shouldnât be confused into thinking theyâre on another site." One way Chrome might do this is leveraging Google Safe Browsing to flag questionable URLs. By comparing characters which look similar to one other (or domains which vary from one other just by a small number of characters), Chrome can push âattackers away from extremely misleading URLs. Of course, a key challenge is to avoid false positives, like legitimate domains which use suspicious substitutions."
Now in development, HTTP/3 is already in draft form via an RFC of the Internet Engineering Task Force (IETF). HTTP/3 is sometimes referred-to as HTTP-over-QUIC, as it takes advantage of Quick UDP Internet Connections (QUIC). An experimental protocol for now, QUIC is poised to replace TCP. Although QUIC tolerates data loss during transmission and does not provide error-free transmission like TCP, QUIC incorporates TLS 1.3, so therefore itâs encrypted by default, faster and more secure than HTTP/2. The intention seems to be for HTTP/3 to be finalized when all of the major browsers support TLS 1.3.
After learning last year that users could abuse the TLS-SNI-01 validation method to obtain certificates for domains they do not own, Letâs Encrypt began acting recently to deprecate the method. However, the provider of free but arguably minimally validated SSL certificates faces a significant challenge, based on its own use of the ACME TLS-SNI-01 challenge type for domains on a shared hosting infrastructure â in turn effectively compelling the CA to allow users to test the change via staging in order to determine the impact of the methodâs retirement. Users will âbe able to run certbot renew dry-run⌠If the dry run succeeds, youâll know that youâre ready for the deprecation date,â Letâs Encryptâs Jacob Hoffman-Andrews commented. Letâs Encrypt will support now just 3 validation methods (DNS-01, HTTP-01, TLS-ALPN-01).
Back to top
Just over 50%: thatâs the percentage of consumers who fear a lack of privacy with Internet of Things devices â but also the percentage of companies which can't detect IoT breaches. These and other not-so-comforting numbers come from Gemalto's State of IoT Security report, which also points out that only 59% of companies encrypt all their IoT-related data. That amounts to a lot of machines talking to each other and those conversations possibly include your organization's sensitive data or even aspects of your own digital identity. Itâs no surprise that securing IoT products and services is a big hurdle and consumers are aware of the repercussions: remembering that we are all individual consumers, too, 62% of consumers believe the security of their IoT devices needs improvement. The identified solutions range widely â from calls for government intervention, or first-mover advantages for industries or organizations to agree upon better guidelines for securing IoT products and services, or the possibility of solutions residing in blockchain technology.
Fearing that hackers might abuse IoT devices to attack the upcoming Tokyo 2020 Summer Olympics, Japanâs National Institute of Communications Technology (NICT) announced on January 25th that it plans to pre-emptively hack into citizens' IoT devices. Via a legislatively approved amendment, NICT was empowered to conduct the white-hat hacktion, which was explained to be part of an unprecedented survey of insecure IoT devices. The hacktion would be carried out by NICT employees under the supervision of the Ministry of Internal Affairs and Communications. Targeting over 200 million IoT devices, beginning with routers and web cameras but expanding to devices in both the consumer and corporate sectors, the hacktion must rely upon using default passwords and password dictionaries to attempt to log into Japanese consumers' IoT devices. When a connection is successful, that device and login would be compiled into a list of insecure devices which use both default and easily-guessable passwords; that *very hot* data would then be passed onwards to authorities and respective ISPs, who would be counted upon to alert affected consumers to secure the devices. Not surprisingly, the plan sparked outrage in Japan, with many arguing about its necessity; those in opposition explained that the same results could be achieved non-intrusively by sending a security alert to all users, moreover that thereâs no guarantee that users with default or weak passwords would change their passwords after being notified in private anyway.
Back to top
A recent survey found that the average actual cost of a cyberattack soars to nearly US1.7M when calculating-in collateral effects of productivity losses, brand damage, and decline in company valuation. According to Radwareâs 2018 â2019 Global Application and Network Security Report, âQuantifiable monetary losses can be directly tied to the aftermath of cyberattacks in lost revenue, unexpected budget expenditures and drops in stock values⌠Protracted repercussions are most likely to emerge as a result of negative customer experiences, damage to brand reputation and loss of customers.â The vendor-neutral survey reported that, of 790 IT executives, 45% reported attacks which had the goal of service degradation or a complete outage, but 78% reported that such happened regardless of the goal. And demonstrating that âbreach du jourâ doesnât just describe mega breaches. The report documented that most respondentsâ organizations have experienced some type of attack within the course of a year â in fact, only 7% of respondents claiming not to have experienced an attack at all.
Last yearâs outbreak of the NotPetya ransomware hit cookie corporation and candy confectioner Mondelez pretty hard, leading them to file an insurance claim with their insurer, Zurich. However, Zurich subsequently declined to pay the claim, citing that NotPetya was an act of war. And thatâs because several Western governments blame Russia as the source of the code and the outbreak â and therefore country-vs.-country stuff effectively is the stuff of acts of war. Mondelez, the US food company famous for brands, such as Cadbury and Nabisco, Oreo, Milka, and several brands of chewing gum, is now suing Zurich for US$100 million. This makes security case attribution a tricky thing, as all manner of insurance policies typically exclude coverage for acts of war.
According to a new survey and study of over 1700 C-level executives by Accenture, global firms could lose over US $5 trillion to cybercrime over the next five years. While nearly 80% of respondents said their organizations are adopting new technologies faster than they can secure them, the same number believe that the digital economyâs growth would be subdued unless internet security is dramatically improved. Worse, nearly 60% expressed doubt about how theyâd take action regarding such instability. Only 30% of those polled said they were very confident in their own cybersecurity with the vertical seen to be at highest risk is the tech sector, which could face losses of US $753B if worse comes to worst. The study called for both CEOs and CISOs to escalate above executive leadership onward to board-level action, argued Accentureâs Omar Abbosh, who continued, âTo become a cyber-resilient enterprise, companies need to start by bringing [their] expertise to the board, ensuring security is built-in from the initial design stage and that all business managers are held responsible for security and data privacy.â This was confirmed by the report, in which 75% claimed that addressing security concerns will require a group effort.
Attorneys and law enforcement officials of the United States government announced charges against seven American, Russian and Ukrainian hackers in early January, accusing them of an international stock-trading scheme which allowed them to access and utilize insider trading information from the US Securities Exchange Commissionâs corporate filing database, known as EDGAR. That information, from 157 pre-released corporate reports and announcements, gave the hackers the inside edge to net US$4.1 million. "After hacking into the EDGAR system, they stole drafts of [these] reports before the information was disseminated to the general public.â This is according to Craig Carpenito, U.S. Attorney for the District of New Jersey. Those documents included quarterly earnings, mergers and acquisitions plans and other sensitive news that the criminals knew to act upon before the public could. One inside trader made $270,000 in a single day.
Back to top
On Tuesday January 22, Director Christopher Krebs of the United States Department of Homeland Security issued its first Emergency Directive, in response to a global Domain Name System (DNS) hijacking campaign. It was the first Emergency Directive issued by the Cybersecurity and Infrastructure Security Agency (CISA) and is thus noteworthy as it compels all non-Federal security agencies (like state and local agencies) to act. At the time, the concern was over a cyber-hijacking campaign which private-sector researchers suggested was the work of the Islamic Republic of Iran and had affected âmultiple executive branchâ agencies by redirecting and intercepting Web and email traffic. Although other officials stated that no intelligence, Defense or classified networks were impacted, one industry source reported that at least six civilian agencies were affected. The alarm-worthy campaign was first spotted last fall by private-sector firms such as Cisco and FireEye, which detected malicious DNS activity in the Middle East. It targeted the Domain Name System (DNS) which translates Web or domain names into IP addresses, and involved the covert changing of a destination IP address so that any data (especially logins) entered by a user passes through the hackerâs server before being forwarded onward to its intended, legitimate destination.
Mozilla has unveiled version 65 of its Firefox browser, arming it with redesigned privacy controls for the Content Blocking section, where users can select their desired level of privacy protection. Nick Nguyen, Firefox VP of Product at Mozilla, said âWeâve always made privacy for our users a priority, and we saw the appetite for more privacy-focused features that protect our usersâ data and put them in control⌠So, we knew it was a no-brainer for us to meet this need. Itâs one of the reasons we broadened our approach to anti-tracking.â The standard or default setting of the new Content Blocking controls allows users to block known trackers in Private Browsing Mode and, in the future, third-party tracking cookies. Users can throttle up the setting to block all known trackers by Firefox in all windows. These controls, and new privacy policies which were rolled out in tandem, hail from Mozillaâs announcement in August 2018 that theyâd steadily bolster Firefoxâs anti-tracking efforts, which includes removing cross-site tracking by stripping cookies and blocking storage access from third-party tracking content. Mr. Nguyen continued, âSome sites will continue to want user data in exchange for content, but now they will have to ask for it⌠(this is) a positive change for people who up until now had no idea of the value exchange they were asked to make.â This steady rollout, plus Mozillaâs stand against tracking techniques like super cookies and browser fingerprinting, has met with praise by engineers and researchers in the security and privacy spaces.
New malware was found which gains full admin rights on specific cloud platforms, then uninstalls those platformsâ cloud-security products. Researchers Xingyu Jin and Claud Xiao at Palo Alto Networksâ Unit 42 discovered the malware, which interestingly doesnât attack or sidestep the products developed by Tencent Cloud and Alibaba Cloud (Aliyun) â it simply uninstalls them from the compromised Linux servers, and in turn eliminates those serversâ AI-based trojan detection and removal, logging activity audits, and vulnerability management. Tencent and Aliyun are industry-leading cloud providers in China which are expanding their business globally. Itâs supposed that the malware stops at security tool removal and doesnât do further damage or data compromise because it needs the horsepower and scale of the cloud infrastructures: the active user of malware is the Rocke threat group whose motivations are to infect vulnerable systems with Monero-based cryptomining malware â as evidenced by the malware not just killing off security products, but by doing same to other cryptomining processes on the servers. The researchers report explained that âthe variant of the malware used by Rocke group is an example that demonstrates that the agent-based cloud security solution may not be enough to prevent evasive malware targeted at public cloud infrastructure⌠We believe this unique evasion behavior will be the new trend for malwares which target at public cloud infrastructure.â
The World Economic Forumâs (WEF) annual "Global Risks Report" ranks the top 10 concerns that businesses and governments around the globe will face in the ensuing year. For 2019, the WEF predicts that only climate change and natural disasters (including earthquakes and tsunamis) will outrank cyberattacks and data theft as the biggest obstacles for businesses and governments. Specifically, âMassive incident of data fraud/theftâ is 4th on the list, and âLarge scale cyberattacksâ is right behind it as 5th most likely. The report, issued in mid-January, stems from the WEF's annual Global Risks Perception Survey, which polled about 1,000 experts and decision makers regarding their greatest concerns for the coming year. Over the last year, a number of different incidents had these experts â and citizens around the world â thinking more and more about cybersecurity. People readily recall those headlines and their lasting impacts, like the attack against India's ID database, the continuing problems at social media companies, like Facebook, and widespread issues, such as the Spectre and Meltdown side-channel vulnerabilities. The WEF report also found heightened concern over artificial intelligence and machine learning, as 32% of survey respondents believe that AI will cause harm to human society.
Back to top
The leader of the Russian Orthodox Church, Patriarch Kirill, has warned that societal dependence on smartphones might signal the coming of the Antichrist. In an interview with a state-owned Russian TV channel, the Patriarch explained that the "worldwide web of gadgets" could serve as the devilâs "opportunity to gain global control over mankind." Continuing, the Patriarch explained that as smartphones follow and document your identity, habits, location, interests and fears, âmethods and technology could appear that will not just provide access to all information but will also allow the use of this information.â Since information is power, then the concentration of both information and power could provide foreboded control, and therefore, âSuch control from one place forebodes the coming of the Antichrist.â
The China Daily reported that the Higher Peopleâs Court of the Hebei province in China has launched a mini-app on the popular WeChat platform which displays the locations of anyone within a half-kilometer radius whoâs in debt to you. The mini-app also displays each debtorâs personal information including their name, national ID number and why theyâre on a debt blacklist. The Chinese state Xinhua News Agency had reported about 15 months ago that the âdeadbeat shamingâ system would be on the way from the Chinese government. While the court took the high road in explaining-away the system and mini-app as âpart of our measures to enforce our rulings and create a socially credible environment," China Daily was much more straightforward about it, saying that it makes it âeasier for people to whistle-blow on debtors capable of paying their debts.â
Back to top
The xDedic Marketplace, a website that was used to sell access to compromised computers worldwide and to peopleâs personally identifiable information (or PII) has been taken down and its site has been seized, according to the United States Federal Bureau of Investigation. But it wasnât just the US involved: the takedown was an international operation featuring substantial support and cooperation from Europol and the Ukrainian cyber police, as XDedic's infrastructure had been located mostly in Belgium and Ukraine. xDedic is thought to have enabled over $68 million in fraud in operating across its broadly distributed network, using Bitcoin to hide its server locations and the identities of its administrators, buyers and sellers. Buyers could search for compromised credentials on xDedic by desired criteria like geographic location and operating system, getting the PII of eventual victims or access details to computers across all industries, including local, state and federal government infrastructure, hospitals, 911 and emergency services, call centers, major metropolitan transit authorities, accounting and law firms, pension funds and universities.
Earlier this year, the US Supreme Court ruled in Carpenter vs. United States that law enforcement must obtain a warrant to access mobile phone tower records, which would allow tracking of a citizenâs location over time. Now, a US District Court judge in California ruled that law enforcement canât compel people to unlock their mobile devices using biometrics; warrant or not, forcing such an unlock would be an unconstitutional violation of the personâs 4th and 5th amendment rights. âThe Court finds that the governmentâs request runs afoul of the(se) amendments, and the search-warrant applications must be denied,â ruled Judge Kandis Westmore. (The US Constitutionâs 4th Amendment protects citizens against unreasonable searches; the 5th Amendment protects a citizenâs right against self-incrimination.)
Twenty universities in the UK have come together to prepare their individual infrastructures to resist hacking â by hacking one another. By means of a competition theyâre calling Exercise Mercury, the universities are benchmarking their own security postures in the higher education sector and contributing collective learnings for one anotherâs benefit. In the mutual hackathon, universities are paired up for two weeks; in the first week, select students *and* staff of one university get to attack the other, then reverse roles from attacker to attacked during the ensuing week. Of course, no damage or defacement is done â but vulnerabilities in processes, policies, procedures and tech infrastructure are spotted and noted. But itâs not all simulated blood-and-gore once the week begins: teams usually take a day or two to identify whatâs most important to the opposing university, like sensitive research, for example; then itâs all-appropriate-guns-blazing as the balance of the week is spent detailing how to cause the most damage. And it wouldnât be a competition if there wasnât a winner: the team which would have inflicted the most negative impact is declared the winner. The competition began in late 2018 and will conclude once all 20 universities have had their chances to hack and be hacked; the data will then be collected and analyzed, and the entirety of the UK higher educational system will benefit from the common vulnerabilities.
The Girl Scouts of America is now offering a cybersecurity badge. To get more girls involved in science, technology, engineering and mathematics (STEM) from age 5 upward, the pursuit of the badge offers scouts the chance to learn about data privacy, online safety, coding and even how to become a white-hat hacker. According to Cristina Roa from Securonix, âThe Girl Scouts initiative âŚwill help to boost interest and participation in an industry in which women are âŚtraditionally underrepresented.â Continuing, Ms. Roa says the effort will âencourage more females to get into the industry.â
Back to top