Archive for August 23, 2022

Oracle Gets Served With A Class Action Lawsuit Of Epic Proportions

Posted in Commentary with tags on August 23, 2022 by itnerd

Lawyers for software giant Oracle are going to be busy as they’re now going to be dealing with a class-action lawsuit.

The class-action has three class representatives, including Dr. Johnny Ryan, Senior Fellow of the Irish Council for Civil Liberties (ICCL), and was filed against Oracle in the U.S. District Court for the Northern District of California. It alleges Oracle has violated the Federal Electronic Communications Privacy Act, the Constitution of the State of California, the California Invasion of Privacy Act, competition law, and the common law. How did they do that? The lawsuit claims that Oracle created a network containing personal data of hundreds of millions of people and sold said data to third parties. Which is why the class includes every Internet user on the planet. Which makes this lawsuit in a word, epic.

Here’s the kicker. The plaintiff’s claim is backed up by a video on the ICCL website of Oracle CEO Larry Ellison describing how the company’s real-time machine learning system collects this information and states that 5 billion profiles are stored in the “Oracle Data Cloud.” Which I am guessing that the ICCL thinks is the digital smoking gun that they need to win this lawsuit.

As far as I can tell, Oracle hasn’t commented on this. But Chris Olson, CEO, The Media Trust has:

     “In 2016, the rules for data targeting were still up in the air – since then, emerging data privacy legislation has drawn a hard line around microtargeting, collecting and selling user’s data without express permission. However the ICLL’s lawsuit pans out, the fact that it’s happening is a major development for businesses around the world, especially since it is happening in the U.S, and alleges a violation of California law.

While not all businesses directly harvest data from their users in a way that violates data privacy legislation in Europe or America, most partner with digital vendors who do, whether through their websites or mobile platforms. Now more than ever, businesses must commit to digital trust and safety protections – otherwise, it is only a matter of time before they will suffer from breaches, lawsuits and expensive fines.”

It’s going to be interesting to see how Oracle responds to this. Because if they lose, it’s going to be expensive.

Xebia and 47 Degrees Join Forces

Posted in Commentary with tags on August 23, 2022 by itnerd

Xebia, a leading global IT consultancy and services company, has united with 47 Degrees, a US-based global technology consultancy focused on unlocking business growth by creating assured solutions for complex, mission-critical software. 

47 Degrees has been focused on building and deploying innovative applications for its clients as well as actively engaging in the tech community since 2010. The company offers comprehensive consulting services in functional programming languages and related technologies, like Scala, Kotlin, Spark, Kafka, and Akka. While the company is headquartered in Seattle, Washington, they have strong footholds in Spain, the United Kingdom, and Colombia.

Its team handles the design, development, and deployment of applications for its clients so that companies can focus on their core business goals. Their engineers—with years of development expertise—coordinate with client teams to provide additional bandwidth and adapt mission-critical workflow.

Functional languages provide significant advantages while building highly scalable and parallelized systems. As the demand for such scalable systems is increasing exponentially among enterprises as well as innovative start-ups worldwide, there is a simultaneous demand for specialized talent that is unfragmented and can support the adoption of functional paradigms.

As a full stack software firm, Xebia is a firm believer in and promoter of functional programming in its solution blueprints. We believe that the consolidation of boutique functional companies can offer enterprises a strong option and build confidence in functional paradigms.

Zeppelin Ransomware Advisory Issued By The FBI and CISA

Posted in Commentary with tags , on August 23, 2022 by itnerd

The CISA and FBI have put out an advisory on Zeppelin ransomware that is very much reading. The advisory goes into great detail about how the ransomware works and includes some threat mitigation strategies.

Dr Darren Williams, CEO and Founder of BlackFog has this comment to share:

     “Zeppelin ransomware, a fairly well-known malware strain has been in known use since 2019, often to target a wide range of businesses and critical infrastructure organizations. Zeppelin actors have been known to request ransom payments in Bitcoin, with initial amounts ranging from several thousand dollars to over a million dollars.

Zeppelin’s unique attack path is such that the FBI have observed the attackers executing the malware multiple times in the network, leaving a great big sting on the victim, who needs multiple unique decryption keys to combat the attack.

Attacks on hybrid working companies are nothing new, however it is crucial that employees remember they play a part in protecting themselves and the employer, too.

Attacks from vectors such as Zeppelin often start with a simple phishing email – employers must ensure they educate and remind their employees on cyber security best practices, to minimize attack risk. Standard, good cyber hygiene practice is essential here: remembering to regularly change passwords and use MFA as a basic practice. That said, if a threat actor wants to find their way in, they will! What matters is the data they were able to obtain and leave with…

Most cybercriminal gangs aim for extortion – organizations should also consider anti-data exfiltration to block the attacker and prevent data from being exfiltrated.”

I strongly suggest that you read this advisory because if the FBI and the CSI put out an advisory on this, you need to take it seriously.

Back to school reminder: Cyber hygiene for kids by Trend Micro

Posted in Commentary with tags on August 23, 2022 by itnerd

With the end of summer fast approaching, children of all ages will soon be returning to school. With increase in daily use of digital technology, it is critical for parents to integrate digital literacy and cyber hygiene in their child’s learning process. 

A recent survey found that two-thirds of parents allow their kids to use the internet on their own, with over 70 percent admitting that their children had engaged in risky behavior online.

To help improve kids’ safety and awareness online, Trend Micro has launched the Cyber Academy, which will offer 7–10-year-olds, a series of video-based lessons and learning materials designed to upgrade children’s digital literacy skills in a way that’s meaningful and engaging. The Cyber Academy consists of internet safety lessons that focus on passwords, two-factor authentication, security, and privacy among others. The lessons can be delivered on-demand by a teacher in the classroom or a guardian at home in just 10–15 minutes and are offered completely free of charge.

To learn more about Trend Micro’s Cyber Academy and tips for guardians and teachers click here.

Shaper Launches Studio – A Simplified Design Tool for Craftspeople 

Posted in Commentary with tags on August 23, 2022 by itnerd

Shaper Tools, the San Francisco-based woodworking and robotics company, announced the launch of Studio, an exciting new simplified design tool for craftspeople. Studio is compatible with Glowforge, Cricut or CNC machines. 

Shaper Studio is a simplified 2D design tool that focuses on features that matter most to craftspeople, short circuiting the path from idea to production, and omitting the unnecessary and confusing features that have crept into one-size-fits-all design software. Simply put, Studio helps users spend more time making and less time fussing with a computer. Studio can be used with any device and provides access to more than 3 million pre-made designs or allows the user to quickly and easily create their own designs with the Shape Shifter tool. When done with the design, Studio quickly exports the file to Shaper Origin or other design tools.

In 2018, Shaper launched Origin—the world’s first handheld CNC router. Since then, Shaper has been on a mission to make precision cutting easy and accessible to craftspeople everywhere. With the launch of Shaper Plate, its new universal template for Origin, and now Shaper Studio, Shaper is again demonstrating how intuitive digital workflows can integrate with, and aid, traditional workshops. 

Shaper Studio is $99 a year and users get unlimited access to fonts and artwork, plus some really powerful editing features like Studio’s ShapeShifter—the intuitive shape combination tool that further speeds up the design process—along with the ability to save and export an SVG file. Studio syncs directly to Shaper Origin, or can be used with other digital fabrication tools like vinyl cutters or laser cutters. A free 14-day trial allows users to test out the fully featured Studio product. Studio is web-based, making it easy to produce and edit designs on your phone, tablet, or computer.  A free Studio Lite version will also be available and released in mid-September.

To learn more about Studio or start a free trial, visit shapertools.com/studio.

Guest Post: Americans lost an unprecedented $3.56 billion to online fraud in H1 2022

Posted in Commentary with tags on August 23, 2022 by itnerd

A recent analysis by Atlas VPN reveals that US citizens lost a record $3.56 billion to various types of online fraud in the first half of 2022, an increase of almost 53% over the same period last year. 

Americans submitted more than 793 thousand fraud complaints in the first six months, and over 27% of those reports indicated a financial loss, amounting to the aforementioned total sum. 

The data for the analysis was extracted from a publicly accessible database managed by the Federal Trade Commission (FTC). US Citizens can submit fraud reports to the FTC for further investigation. The FTC shares this data to inform the nation about the state of the cybercrime landscape in the US.

This year’s most commonly reported scam category was imposter scams, with more than 361 thousand complaints, 22% reporting a loss and totaling $1.33 billion in damages.

Since 2018, imposter fraud has been the most commonly reported as well as the most damaging type of online fraud.

However, in H1 2022, investment-related scams caused even more financial losses to US citizens than imposter fraud.

Even though the number of investment scam complaints is relatively low at 52 thousand, an average investment scheme lures out $40,000 per victim, while other types of scams rarely swindle more than a three-digit sum. 

The potential to earn a typical half-year salary from a single scam sounds appetizing to cybercriminals, which is why they are focusing more of their efforts in this direction.  

To read the full article, head over to: https://atlasvpn.com/blog/americans-lost-an-unprecedented-3-56-billion-to-online-fraud-in-h1-2022

Commvault Receives Highest Product Scores for Three Out of Three Use Cases in the 2022 Gartner Critical Capabilities for Enterprise Backup and Recovery Software Solutions

Posted in Commentary with tags on August 23, 2022 by itnerd

Commvault, a global enterprise leader in cloud data management, today announced that Gartner, a company that delivers actionable, objective insight to executives and their teams, has given it the highest Product Score across all three use cases in the 2022 Critical Capabilities report: Data Centre Environments (4.23/5), cloud environments (4.18/5), and edge environments (4.22/5).

Commvault Complete Backup & Recovery scored highest  in all three use cases evaluated in this research. Commvault was also recently named a Leader in the 2022 Gartner Magic Quadrant™ for Enterprise Backup and Recovery Software Solutions, here Commvault has been positioned for its “Ability to Execute” and “Completeness of Vision.” 

Scoring the highest across all three Use Cases for three consecutive years speaks to Commvault’s commitment to innovation in protecting, managing, and securing today’s broadest range of workloads for on-prem, edge, and multi-cloud environments.

Commvault’s software and its Metallic SaaS solutions, can ensure data is protected and recoverable wherever it lives and however the customer wants it managed – as software, SaaS-delivered, an integrated appliance, or through a member of Commvault’s expansive partner ecosystem.

To read the 2022 Gartner Critical Capabilities for Enterprise Backup and Recovery Software Solutions and the latest Gartner Magic Quadrant for Enterprise Backup and Recovery Software Solutions report, visit: https://www.commvault.com/itleaders

Guest Post: Why You Should Be Afraid of Sim Swapping and How to Avoid It

Posted in Commentary with tags on August 23, 2022 by itnerd

By Hank Schless, Senior Manager of Security Solutions at Lookout

Imagine your phone isn’t working. It’s odd, but this should be an easy fix. You contact your phone carrier and you’re told that you requested a new sim card. But you never requested a sim card or called before today. If this happened to you, then you could be the latest victim of a very popular, effective and nightmarish scam. 

Sim swapping is an attack where scammers fake your identity with a mobile carrier to gain access to your phone. From there, they use “Forgot Password” for critical online accounts – think banking, investments and social media – to intercept two-factor authentication text messages. In 2021, this scam resulted in losses over $68 million

Lookout, the leader in delivering integrated Security, Privacy, and Identity Theft Protection solutions, has gathered the top ways you can protect yourself from sim swapping: 

  • Diversify Your Multi-Factor Authentication
    Think beyond SMS messages. Use strong multi-factor authentication methods such as biometrics, physical security tokens, or standalone authentication applications to access online accounts.
  • Don’t Overshare Online
    Avoid sharing your phone number, address or birth date in online spaces. This private information can be shared with a phone carrier to fake your identity and gain access to your sim card. 
  • Use a Variety of Passwords 
    Use strong and unique passwords for each important online account and change them often.
  • Don’t Share Login Details On The Phone 
    If you receive a call from your phone carrier requesting private account details, hang up and call the customer service line directly. 
  • Install Security Software On Your Devices
    Security protection, like Lookout, will automatically monitor and identify scam URLs in email, text messages, and on the web and block you from threats that can do harm.

Twitter Has Major Security Problems Says Whistleblower

Posted in Commentary with tags on August 23, 2022 by itnerd

Twitter hasn’t been having a good time lately. Largely due to Elon Musk and his attempt to buy the platform which is now in court. But it’s about to get a whole lot worse.

Twitter has major security problems that pose a threat to its own users’ personal information, to company shareholders, to national security, and to democracy, according to an explosive whistleblower disclosure obtained exclusively by CNN and The Washington Post. 

The disclosure, sent last month to Congress and federal agencies, paints a picture of a chaotic and reckless environment at a mismanaged company that allows too many of its staff access to the platform’s central controls and most sensitive information without adequate oversight. It also alleges that some of the company’s senior-most executives have been trying to cover up Twitter’s serious vulnerabilities, and that one or more current employees may be working for a foreign intelligence service.

Well, that sounds delightful. Which is a backhanded way of saying O.M.G. But here’s the plot twist. The whistleblower not only has a name, his disclosure could factor into the lawsuit that is currently going on between Musk and Twitter:

The whistleblower, who has agreed to be publicly identified, is Peiter “Mudge” Zatko, who was previously the company’s head of security, reporting directly to the CEO. Zatko further alleges that Twitter’s leadership has misled its own board and government regulators about its security vulnerabilities, including some that could allegedly open the door to foreign spying or manipulation, hacking and disinformation campaigns. The whistleblower also alleges Twitter does not reliably delete users’ data after they cancel their accounts, in some cases because the company has lost track of the information, and that it has misled regulators about whether it deletes the data as it is required to do. The whistleblower also says Twitter executives don’t have the resources to fully understand the true number of bots on the platform, and were not motivated to. Bots have recently become central to Elon Musk’s attempts to back out of a $44 billion deal to buy the company (although Twitter denies Musk’s claims).

The part about the bots is important as that’s Musk’s number one reason for backing out of the deal to buy Twitter, which in turn led to the lawsuit. And pretty much everything else that Zatko is claiming is sure to get the attention of governments around the world. All of whom will be asking Twitter some very tough questions. I hope they have their answers queued up. And I hope they’re better than this:

In a statement, a Twitter spokesperson told CNN that security and privacy are both longtime priorities for the company. Twitter also said the company provides clear tools for users to control privacy, ad targeting and data sharing, and added that it has created internal workflows to ensure users know that when they cancel their accounts, Twitter will deactivate the accounts and start a deletion process. Twitter declined to say whether it typically completes the process. 

“Mr. Zatko was fired from his senior executive role at Twitter for poor performance and ineffective leadership over six months ago,” the Twitter spokesperson said. “While we haven’t had access to the specific allegations being referenced, what we’ve seen so far is a narrative about our privacy and data security practices that is riddled with inconsistencies and inaccuracies, and lacks important context. Mr. Zatko’s allegations and opportunistic timing appear designed to capture attention and inflict harm on Twitter, its customers and its shareholders. Security and privacy have long been company-wide priorities at Twitter and we still have a lot of work ahead of us.”

Those are talking points Twitter. What you need to do is to show everyone that everything that he says isn’t true. You might as well do it now. Because I guarantee that you’ll be made to do it by the EU or the US among others.

Take it from me. Twitter is about to have a very bad day.

UPDATE: Kevin Novak, Managing Director of Cybersecurity, Breakwater Solutions had this comment:

     “Whether you cut your teeth on Mainframes or Commodores, Windows or Solaris, there is no doubt you know the name “Mudge”, his reputation precedes him across the globe from technologists to hackers alike.  He’s known for not only his technological and security knowhow, but also his appreciation for what is, and more importantly is not, a material cyber threat.  It should come as no surprise then, why security practitioners around the world are challenging Twitter’s allegation that Peiter “Mudge” Zatko was let go for poor performance, and not his act of openly painting a less than stellar picture of Twitter’s cyber practices to his Board of Directors in defiance of his management’s wishes.

The role of the Chief Information Security Officer (CISO) has changed considerably over the last decade, as it has been thrust out of the back room and into the board room.  CISOs today are challenged with wearing an array of differing functional hats that range from Legal to Marketing, to Technology, to Physical Security, to Privacy and Compliance, to Human Resources.  They are required to speak the most technical language when managing in the trenches and shift on a dime to provide cyber risk and financial loss analysis to Board Members.  Further, CISOs have now been thrust into the world of personal accountability with threats of prosecution when they don’t do ENOUGH to force cyber change internally, like that of former Uber CISO, Joe Sullivan, who was recently charged with obstruction by US Prosecutors.  While I’m certainly not in position to comment on whether Joe Sullivan acted inappropriately, the challenge for most CISOs when it comes to reporting major concerns, is that most CISOs only have a perceived degree of independence.  

The fact is, most CISOs go out of their way to shine a light on those insecurities that threaten an organization and its clients, and good CISOs even craft their message in terms that business executives understand: the potential for Lawsuits, Financial Fraud, Damage to Reputation, Loss of Operations, Government Sanctions, and Regulatory Scrutiny to name a few.  But bringing those messages to your manager, Sr. Executives, or the CEO is very different than answering openly and transparently to Board of Directors; particularly when you’ve been discouraged from doing so by your management team.  Speaking candidly, openly, and transparently to the board is often considered “career limiting” and you’ll often hear CISOs use language like: “I’m aligned with my manager, and we’re working through any challenges we’ve encountered”.  So CISO’s often have to choose between evils when facing the dissonance of knowing that their firm is acting recklessly: They can quit, speak openly and honestly–then face termination for not being a team player or more likely for “poor performance”, or Whistle blow.  None of these options is very appealing to the CISO, as each is profoundly impactful on their professional career, but they are issues that CISOs around the world face regularly.  It’s the reason that many regulators and regulatory doctrine have begun encouraging more independence for the CISO, reporting to the Board or CEO directly and not though a litany of management that might change their message before it can be heard by those who hold a fiduciary duty for protecting not only their own firm, but that of the public at large.

Time will tell when it comes to the case of Twitter vs. Mudge, but our hope is that the bad practices it elucidates brings positive change to the industry and helps CISOs going forward.”