Why I Think Spotify’s Handling Of The Demise Of It’s Car Thing Device Quite Frankly Sucks

Posted in Commentary with tags on May 26, 2024 by itnerd

First some background. Back in October 2021, Spotify announced the Car Thing. This was a $90 USD device that went in your car and allowed you to stream from Spotify in your car. The device had a 4-inch touchscreen and knob for easy navigation, as well as support for Apple CarPlay, Android Auto, and voice control. But you needed a data connection of some sort and you also needed to be a Spotify Premium account holder to use it. I at the time questioned how useful this would be. But clearly Spotify felt there was a need for this device. Though it killed the product in 2022 as I am guessing that the money wasn’t rolling in because this product existed.

Fast forward to earlier this week when it was announced by Spotify that it was going to remote brick this device and users could dispose of it responsibly as e-waste. Effectively, Spotify was killing the product and making sure there was no possibility that it could return.

Cue the outrage on multiple fronts. Reddit and Spotify own forum among other places were soon filled with angry owners of the device venting their frustration at the company for this move. Some called this move unacceptable and many wanted a refund. Some even wanted the company to open source the device to keep it alive. Thus while I had my reservations about the usefulness of such a device, there are clearly many who found it useful.

Here’s my thoughts on this. What this seems like to me is that Spotify used its user base as a beta test group for a product. And now they want to kill the product because it didn’t work out the way the company wanted it to. Which is code for it didn’t make Spotify a pile of money from this device. Now if someone wants to pay up to be part of this beta test, is up to them. But for Spotify to brick the device and tell users to throw it away is completely unacceptable. Yes they did say to dispose of it responsibly as e-waste, but that’s still the wrong message. Because the message I would be getting if I were a Spotify customer is not to support them in terms of getting any other piece of hardware that they might come out with. And in an extreme case, I might be rethinking my support of Spotify in general. As in cancelling my subscription. So far from what I can tell, Spotify really isn’t saying anything than what is in the document that I linked to above. Nor have they answered questions about the possibility of open sourcing the device. But if they did open source the device, it would make them look a whole lot better than they do right now. Spotify really needs to recognize that they have stuffed the handling of this situation and rethink this. Because right now, they look like a bunch of clowns who don’t care about this subset of their user base. And for those like me who don’t have a Spotify account and who are watching this from afar, this situation and how it is being handled doesn’t give me an incentive to get a Spotify account. Even a free one.

Over to you Spotify. Though given your past track record in handling bad situations, I fully expect you to continue to screw up the response to this bad situation.

Threat Actor Committing Massive Gift Card Fraud: Microsoft

Posted in Commentary with tags on May 25, 2024 by itnerd

Microsoft has alerted retailers and restaurants to sophisticated gift card fraud by the threat actor Storm-0539, which can result in losses of up to $100,000 daily. According to Microsoft’s latest Cyber Signals report released this week, there has been a 30% rise in intrusion activity by Storm-0539 between March and May 2024.

Operating out of Morocco, Storm-0539 targets cloud and identity services linked to gift card portals of large retailers, luxury brands, and fast-food restaurants. The group increases its activity around major holidays such as this weeks Memorial Day and a 60% rise last year prior to Thanksgiving, Black Friday, and Christmas holidays.

Active since late 2021, Storm-0539 initially used point-of-sale (POS) malware to compromise payment card data. As industries strengthened POS defenses, the group shifted focus to gift card portals, infiltrating employee accounts at target organizations by sending smishing texts to personal and work mobile phones. The attackers gather information from employee directories, schedules, contact lists, and email inboxes.

Once inside, they move laterally through the network, identifying gift card business processes and remote environments like virtual machines, VPN connections, SharePoint, and OneDrive resources. Using compromised accounts, they create new gift cards. Microsoft has observed thefts of up to $100,000 a day from a single company through this method.

Storm-0539 maintains persistent access by registering their own devices for secondary authentication prompts, bypassing multifactor authentication (MFA). They present themselves as legitimate organizations to cloud providers to gain initial free resources for their attacks. This involves creating websites that impersonate US-based charities, animal shelters, and other nonprofits via typosquatting.

The group conducts extensive reconnaissance on federated identity service providers at targeted companies to convincingly mimic user sign-in experiences creating adversary-in-the-middle (AiTM) pages and using domains that closely match legitimate services. To minimize costs and maximize efficiency, Storm-0539 has been observed downloading legitimate 501(c)(3) letters from nonprofit websites to obtain sponsored or discounted technology services from major cloud providers. They also create free trials or student accounts on cloud service platforms, granting them 30 days of access to launch targeted operations.

“Storm-0539’s skill at compromising and creating cloud-based infrastructure lets them avoid common up-front costs in the cybercrime economy, such as paying for hosts and servers,” Microsoft stated. The company stresses the need for robust cybersecurity measures to counteract such sophisticated fraud schemes.

Ted Miracco, CEO, Approov Mobile Security:

   “The increasing reliance on mobile devices in cyber attacks, as illustrated by Storm-0539’s activities, highlights the need for comprehensive mobile and API security strategies. Smishing, or SMS Phishing, in this case underscores a significant vulnerability: employees often use the same devices for both personal and work-related activities, increasing the attack surface. 

   “In bypassing MFA by registering their devices, this incident highlights the need for more robust MFA implementations and better device management policies. Organizations must adopt a defense-in-depth approach to security, incorporating advanced mobile threat monitoring, training, and device management to protect against sophisticated threats.”

Seeing as gift cards are the number one go to gift for a lot of people, this is a huge problem. One that needs to be addressed on multiple fronts. Hopefully those organizations who rely on gift cards as a part of their business are paying attention.

Bad News: London Drugs Data Leaked By Hackers

Posted in Commentary with tags , on May 24, 2024 by itnerd

Remember the London Drugs hack? It shut down their stores for a while. And it caused their president to apologize for getting pwned. There’s a new chapter in this saga, and The Canadian Press has the details:

Retailer London Drugs says cybercriminals who stole files from its corporate head office last month have released some of the data after it refused to pay a ransom.

The Richmond, B.C.-based company says in a statement the files may contain “some employee information,” calling it a “deeply distressing” situation.

This statement comes in response to this Tweet from Brett Callow who is in a position to know these things:

So now we know that LockBit was the group who pwned London Drugs. And we know they swiped data. Though that part should have been a given as that’s how these groups operate. Right now we know that employee data was swiped. But they could have gotten more. And given that London Drugs refused to pay the ransom, as they should, then we’ll find out soon enough what else LockBit swiped.

This does bring up a question. If Brett Callow didn’t disclose this on Twitter, would London Drugs have said anything? Riddle me that Batman.

OVHcloud Adds Qiskit To Market Leading Quantum Notebooks Portfolio

Posted in Commentary with tags on May 23, 2024 by itnerd

OVHcloud today announces at France Quantum 2024 updates to its Quantum Notebooks portfolio. 

To further support the rapid growth and development of quantum computing, OVHcloud adds a new Quantum Notebook supporting the IBM-developed open-source QiskitTM SDK. This new addition completes OVHcloud already impressive set of Quantum Notebooks available in the Cloud, including Alice & Bob, C12, Eviden, Pasqal and Quandela. OVHcloud is one of IBM’s recommended notebook environment solution for users of the IBM Quantum Lab, which was sunset on 15 May, 2024.

Leveraging state of the art technologies, OVHcloud offers developers and students alike the opportunity to develop today, the algorithms of tomorrow. With the notebooks designed to program a wide variety of Quantum computer architectures, OVHcloud continues to support the development of a truly vibrant Quantum ecosystem. The addition of Qiskit, the most-used Quantum development framework in the world, allows for programmers to create software using the Python development language to program Quantum computers, including algorithms, circuits and pulses.

The Quantum Notebook with Qiskit is available now from the OVHcloud Public Cloud universe. Registered startups within the OVHcloud Startup Program can access the Qiskit SDK, through the Quantum Notebook now. Eligible students can get free access to the whole range of OVHcloud Quantum Notebooks, including Qiskit.

Resources

Elon Musk Has Decided To Make “Likes” Private On Twitter And Remove Likes Tab From Profiles

Posted in Commentary with tags on May 23, 2024 by itnerd

From the “this is a very cynical move” department comes this move to make “likes” private on Twitter and outright remove likes tab from profiles. This was confirmed in this Tweet:

Haofei Wang is director of engineering over at Twitter. At least until Elon decides to fire him on a whim. In any case, since he is in a position to know, this move can be taken as fact. The question is why is this happening. From where I sit, this means that Twitter which under Elon has become a cesspool of hate and other evil things has less accountability than it did before this move. Now with this move, the hate mongers, racists, and conspiracy theorists among others can fly under the radar without fear of being called out for liking a Tweet that is vile and unacceptable in a civil society. Which is likely what Elon wants seeing as he’s all for those sorts of people. The other side effect is that it will make it harder for brands to avoid having their ads next to content that they don’t like. I’m sure that that part will be marketed by Elon as “See there’s no issues here. Come back and advertise.” Which to be clear, no brand should be advertising on Twitter. And this move underscores why that’s the case.

Palo Alto Networks Unit 42 Research: Chinese APT Campaign Targeting Global Political Entities

Posted in Commentary with tags on May 23, 2024 by itnerd

Today, Palo Alto Networks Unit 42 released research about a Chinese APT group that has been conducting an ongoing campaign, Operation Diplomatic Specter, targeting political entities in the Middle East, Africa, and Asia since at least late 2022. 

Highlights in Unit 42’s analysis of the active campaign include:

  • The threat actor’s long-term espionage operations against at least 7 government entities, leveraging rare email exfiltration techniques against compromised servers. 
  • Operation Diplomatic Specter closely monitors contemporary geopolitical developments, attempting to acquire sensitive and classified military, political, and diplomatic data, which can potentially jeopardize national security and economic stability. 
  • The threat actor uses rare and unique techniques, tools and procedures, to exploit internet-facing server vulnerabilities, adapting their tactics to infiltrate mail servers for daily exfiltration.
  • As part of its espionage activities, the group makes use of a previously undocumented family of backdoors, including those that we have named TunnelSpecter and SweetSpecter.

Given the Government of Canada’s recent announcement of its first Enterprise Cyber Security Strategy, with a focus on ensuring that the Government can quickly and effectively combat cyber threats and address vulnerabilities across the government’s digital estate, this new report from Palo Alto Networks information ties in well with the cybersecurity landscape and the looming electoral landscape.
 
To explore the full analysis, please click here

Adyen Enables Tap to Pay on iPhone for Merchants to Accept Contactless Payments in Canada

Posted in Commentary with tags on May 23, 2024 by itnerd

Adyen has announced that it now enables its Canadian businesses to seamlessly and securely accept in-person contactless payments with Tap to Pay on iPhone. Tap to Pay on iPhone accepts all forms of contactless payments, including contactless credit and debit cards, Apple Pay, and other digital wallets, using only an iPhone and a supported iOS app – no additional hardware or payment terminal is needed.

In tandem with the new feature, Adyen has welcomed prominent retailers including Mackage, by partnering with NewStore, to its merchant base. Mackage can now accept contactless payments from customers using only an iPhone, providing an added level of convenience for customers. Mackage customers can experience Tap to Pay on iPhone at all stores across Canada, where they can “check out” without having to wait in line at the cashier. Canadian shoppers now have access to a fast, efficient, and easy shopping experience at their fingertips.

Using Tap to Pay on iPhone is easy, secure, and private. With Tap to Pay on iPhone, merchants will simply prompt the customer to hold their contactless payment method near the merchant’s iPhone, and the payment will be securely completed using NFC technology.

Apple’s Tap to Pay on iPhone technology uses the built-in features of iPhone to keep the merchants’ and customers’ data private and secure. When a payment is processed, Apple doesn’t store cards or transaction information on the device or on Apple servers. Tap to Pay on iPhone will enable Adyen’s customers to stay at the forefront of innovation by:

  • Simplifying in-person payments by removing the dependence on payment hardware to accept transactions, providing a complementary way to accept payments for line-busting.
  • Getting up and running quickly with installation and onboarding, allowing businesses to scale up their payment operation.
  • Providing secure and fast checkout experiences that increases mobility on location.
  • Allowing for a convenient and private way to pay for customers since transactions are encrypted and payment data is protected by the same technology that makes Apple Pay private and secure.

Adyen customers can contact their Account Manager to learn more about enabling Tap to Pay on iPhonefor their business. To learn more, visit https://www.adyen.com/devices/tap-to-pay-on-iphone.

ARPA-H Offers $50M Challenge To “UPGRADE” Hospital Cyber Defences 

Posted in Commentary with tags on May 23, 2024 by itnerd

The US government’s Advanced Research Projects Agency for Health (ARPA-H) has committed over $50 million to developing technology aimed at automating the security of hospital IT environments.

The initiative, named Universal PatchinG and Remediation for Autonomous DEfence, or UPGRADE, will bring together equipment manufacturers, cybersecurity experts, and hospital IT staff to create a customized and scalable software suite for enhancing hospital cyber-resilience. 

The program’s goal is to secure entire systems and networks of medical equipment, ensuring mitigation measures can be deployed on a large scale.

UPGRADE will concentrate on four key technical areas:

  1. Creating a platform for vulnerability mitigation
  2. Developing high-fidelity digital twins of hospital equipment
  3. Establishing methods to swiftly and automatically detect software vulnerabilities
  4. Creating defences for identified vulnerabilities

This week, the agency invited teams to apply for funding, totalling tens of millions of dollars, to develop and implement UPGRADE.

Stephen Gates, Principal Security SME, Horizon3.ai had this comment:

   “In the context of rapidly and automatically detecting software vulnerabilities, the UPGRADE program tends to miss the point of exploitable vulnerabilities – and other weaknesses. Addressing exploitability appears to be the missing link here.

   “Software vulnerabilities are nothing new and vulnerable software discoveries will never cease to challenge organizations’ rapid patching efforts. Simply put, all software has hidden vulnerabilities but not all vulnerabilities are exploitable.

   “What medical organizations (and any other organization) need today is a proven methodology of uncovering blind spots in their security postures that go beyond known and patchable vulnerabilities, such as easily compromised credentials, exposed data, misconfigurations, poor security controls, and weak policies. These issues are the catalysts that most often enable successful cyber-attacks.

   “Today, autonomous cyber risk assessment technologies are readily available to continuously test any organizations’ infrastructure to safely expose where they are at risk of exploitation by threat actors. Without this visibility, organizations will continue to remain at least one step behind attackers with no end in sight.

   “The challenge is that the majority of organizations have zero visibility into what is exploitable in their environments and what is not. They continue to be reactive to every vulnerability announcement, instead of being proactive by finding what threat actors can actually exploit. Throwing every defensive measure at the problem will not solve a condition of exploitability either, as it often just hides it. Once exploitability is proactively addressed, measurable security improvement will be the result.”

I’ve been saying for a long time that the health care sector is low hanging fruit for threat actors. Hopefully initiatives like this one will tip the scales in favour of the good guys as the status quo of health care organizations getting pwned is not sustainable.

Epson Says That This Father’s Day, Don’t Make Dad An “Afterthought”

Posted in Commentary with tags on May 22, 2024 by itnerd

When it comes to gifting, it’s truly the thought that counts. But according to a 2023 study from Retail Council, 50% of Canadians will tack on finding a Father’s Day gift to an existing shopping trip. 

As you prepare Father’s Day, consider that dad should never be treated as an afterthought – he’s a priority! Whether he’s reaping the rewards of a life of hard work, or he’s still out there hustling, dad deserves something special this year that shows he’s truly appreciated.

ET-4850 Wireless Colour All-in-One Cartridge-Free Supertank Printer (MSRP: $599.99 CAD)

With 20% of Canadians currently involved in owning a side business, and one in four considering or planning to start their own business in the next year (Angus Reid), the need for a proper home office setup has never been higher. If the grind never stops for Dad, then neither should his printer ink. The Epson ET-4850 comes with up to 2 years of ink in the box, also helping dad do one of his favourite things – save money. If Dad has a side hustle or his own small business, families can deck his home office out with this printer and watch him maximize his productivity with its high-capacity ink tanks and robust paper handling.

Where to Buy:

ET-2850 Wireless Colour All-in-One Cartridge-Free Supertank Printer (MSRP: $299.99 CAD)

Even if dad doesn’t have his own business or side hustle, he still needs a printer to help keep up with day-to-day printing tasks. The ET-2850 will make these tasks easier with auto-duplex printing, a high-resolution flatbed scanner and convenient colour display. Plus, this product provides impressive print quality and offers up to a 90% savings with replacement ink bottles vs. ink cartridges, so dad can happily print away alongside the family without having to worry about running out for refills.

Where to Buy:

EpiqVision Mini EF12 Smart Streaming Laser Projector (MSRP: $1,299.99 CAD)

If Dad is hard to shop for because it seems like he has everything, the Epson EpiqVision Mini EF12 is an awesome pick. This projector is perfect for the dad looking to upgrade his home theatre, living room or outdoor entertaining space. This product offers stunning picture quality up to 150″ and has built-in Android TV, so Dad can steam his favourite shows, movies and sporting events. Plus, it’s portable, making it easy for Dad to stream bright images from virtually anywhere in the home, or even outside for a luxurious cottage weekend!

Where to Buy:

New Research From Scalable Software Finds That Bad Tech Is Costing Millions Of Workers Almost 4 Hours Per Week

Posted in Commentary with tags on May 22, 2024 by itnerd

New research from Scalable Software has revealed that IT departments are struggling to evolve and adapt to the new hybrid digital workplace, leading to significant loss of productivity for millions of workers. The survey of 400 US and UK IT decision makers (ITDMs) found that, on average, employees lose nearly four hours a week (3.78) because of digital employee experience (DEX) failings. Despite being aware of the impact poor digital experiences and digital friction have on productivity, IT teams lack the data to identify problems and optimize experiences.

An overwhelming majority (90%) of ITDMs in both the US and UK say their organization suffers from “productivity paranoia” over hybrid working. Yet, the research finds many businesses still use traditional productivity measures which are not relevant in hybrid digital workplaces – so in reality are unable to accurately assess productivity or identify where blockers occur. For instance, businesses are relying on insufficient metrics such as work output (67%), line manager assessments (56%), time tracking software (51%), and employee self-assessment (48%). The risk of relying on such limited and subjective methods is conflating an output or being present online with being productive.

Previous research from Scalable Software found that 43% of knowledge workers say poor digital employee experience (DEX) has reduced their job satisfaction, while 29% say it has made them want to quit. Moreover, ITDMs and knowledge workers both identify the same top three causes of poor DEX; having to toggle between applications repeatedly to complete a task, applications that repeatedly freeze, crash or load slowly, and too many communication channels to manage resulting in “notification overload”. However, while there is a common understanding between workers and ITDMs of the major challenges, IT departments are still largely using reactive metrics to analyze DEX, including volume of IT support tickets/requests (67%), service desk performance (60%) and employee self-assessment (48%).

To successfully analyze productivity through improved DEX, organizations need to deploy platforms that can collate and distill data from every endpoint so that IT departments can accurately measure and analyze all workflows across the enterprise, regardless of whether staff work from home or in the office. These capabilities enable IT departments to proactively deliver exceptional digital experiences that help keep all employees productive and engaged.

To download the full report, The evolution of the IT department: From break/fix to the backbone of the modern enterprise, please visit: https://www.scalable.com/2024-digital-employee-experience-new-research

Methodology:

The research was commissioned by Scalable Software and conducted by independent research company, Sapio Research. Fieldwork was conducted in March and April 2024. Respondents consisted of 400 senior IT decision makers in organizations with more than 1,000 employees across the UK and the US.