Newsflash dinsdag 5 maart 2019
Omstreden stemsoftware wordt ingezet bij Provinciale Statenverkiezingen
(nu.nl)

De Nederlandse stemsoftware Ondersteunende Software Verkiezingen (OSV) wordt op 20 maart ook bij de Provinciale Statenverkiezingen gebruikt. In de software werden de afgelopen jaren kwetsbaarheden gevonden.

De Kiesraad schrijft in het jaarverslag van 2018 (pdf) dat de software aan vervanging toe is. De OSV wordt sinds juni 2009 gebruikt om stemmen te tellen en uitslagen te berekenen, maar is door de jaren heen meerdere keren onveilig bevonden.

Na onderzoek door RTL Nieuws werden in 2017 al kwetsbaarheden in OSV gevonden. Hackers zouden de software kunnen misbruiken om de uitslag van verkiezingen te beïnvloeden. Een jaar later bleek na een nieuw onderzoek van RTL Nieuws dat de software nog steeds tientallen kwetsbaarheden bevatte.

Overheid heeft geen documenten over besmette ICS-systemen
(security.nl)

De overheid heeft geen documenten over met malware besmette industriële controlesystemen (ICS) of beleidsdocumenten waarin staat hoe hiermee moet worden omgegaan. Dat blijkt uit een reactie van het ministerie van Algemene Zaken op een Wob-verzoek van de Volkskrant.

De krant probeerde via een beroep op de Wet openbaarheid van bestuur (Wob) informatie te krijgen over het beleid ten aanzien van malware in ICS-systemen, zoals preventiemaatregelen, risicoanalyses over de weerbaarheid van partijen en samenwerkingsverbanden tussen verschillende partijen die zich met de cyberveiligheid van ICS-systemen bezighouden.

Ook werden verschillende ministeries gevraagd om een overzicht van de gevallen waarbij malware in ICS-systemen was aangetroffen of informatie waaruit zou blijken om wat voor soort malware het ging en wat de verwijderkosten waren.

Europese zorgen over reikwijdte CLOUD Act VS
(agconnect.nl)

De vorig jaar aangenomen Amerikaanse CLOUD Act zorgt voor Europese onrust over de reikwijdte van die wetgeving voor datavordering bij cloudaanbieders. Terwijl de VS sust dat deze wet slechts is bedoeld als hulp bij opsporing van criminele activiteiten leeft de vrees dat misbruik mogelijk is.

Een Chinese wet voor verplichte medewerking aan datavorderingen wordt door de VS juist bekritiseerd als middel voor cyberspionage. Hierdoor wordt een Chinees bedrijf als Huawei nu gewantrouwd.

Europese experts en politici maken zich zorgen over Huawei, maar ook over Amerika, schrijft persbureau Bloomberg. Het centrale punt van zorg in beide gevallen is de ambities met betrekking tot data en overheidsvordering daarvan.

'Ziekenhuizen bemoeilijken gegevensinzage huisartsen'
(skipr.nl)

Huisartsen hebben geen of moeilijker toegang tot medische gegevens van patiënten doordat ziekenhuizen hun beleid rond gegevensuitwisseling met andere zorgverleners te hebben gewijzigd.

Dat meldt de Landelijke Huisartsen Vereniging (LHV) na klachten uit met name het noorden van het land.

Het gaat onder meer om de Noordwest Ziekenhuisgroep met locaties in Alkmaar, Den Helder, Heerhugowaard, Limmen, Schagen en op Texel. Bij het Wilhelmina Ziekenhuis in Assen is sprake van dezelfde problemen. Volgens de LHV speelt dit probleem ook in andere delen van het land, maar een overzicht ontbreekt.

Is the world ready for the next big ransomware attack?
(csoonline.com)

WannaCry and NotPetya brought major companies to their knees and cost billions to remediate. A new report from Lloyds of London warns another similar ransomware attack would still be devastating.

The WannaCry and NotPetya ransomware attacks were massive incidents that impacted companies both large and small across large geographic areas. Both propagated quickly and brought massive organizations such as the UK’s National Health Service (NHS) and shipping giant Maersk to a standstill.

While the threat from those two individual attacks has been mostly mitigated, variants of both still continue to propagate out in the wild. A new report suggests that another global attack in the same style, if coordinated and executed properly, could cause even more damage and cost companies billions of dollars in damage.

The Cyber Resilience Model
(informationsecuritybuzz.com)

For too long, organisations have sought the holy grail of 100% Cyber Security. But security is never absolute; it is essential to understand that a breach is inevitable.

It is the way in which organisations respond to a cyber security breach that is critical. Alan Calder, Chief Executive of GRC International plc, parent company of IT Governance explains the fundamental importance of creating a Cyber Resilient model.

Cyber security is defined as the state of protecting information from attack by identifying risks and establishing appropriate defences. But as investment in security solutions continues to spiral it is essential for organisations to recognise the truth: total cyber security is unachievable.

UK banking was struck by one IT fail every day for most of 2018
(theregister.co.uk)

The UK banking sector was hit by IT outages on a daily basis in the last nine months of 2018, with 302 reported TITSUPs according to consumer group Which?.

Financial institutions have been required to report major operational or security incidents to the sectoral watchdog since April 2018, and Which? used this data to assess the frequency of failures.

It found that, between 1 April and 31 December 2018, there were 302 reports – equivalent to a mean of 1.1 incidents each day. Which? said that six of the major banks had suffered at least one incident apiece every two weeks.

Here's What Happened When a SOC Embraced Automation
(darkreading.com)

Despite initial apprehension, security engineers and analysts immediately began to notice a variety of benefits.

Most security operations centers (SOCs), regardless of industry or maturity level, are challenged by a dearth of qualified experts and unmanageable numbers of security alerts that lack context or actionable value. Year after year, overcoming these obstacles continues to be at the top of the SOC wish list.

Combining the power of automation with advanced network and security capabilities could very well be the solution.

Here are the data brokers quietly buying and selling your personal information
(fastcompany.com)

It’s no secret that your personal data is routinely bought and sold by dozens, possibly hundreds, of companies. What’s less known is who those companies are, and what exactly they do.

Thanks to a new Vermont law requiring companies that buy and sell third-party personal data to register with the Secretary of State, we’ve been able to assemble a list of 121 data brokers operating in the U.S. It’s a rare, rough glimpse into a bustling economy that operates largely in the shadows, and often with few rules.

Even Vermont’s first-of-its-kind law, which went into effect last month, doesn’t require data brokers to disclose who’s in their databases, what data they collect, or who buys it. Nor does it require brokers to give consumers access to their own data or opt out of data collection.

Ransomware attack on Israeli users fails miserably due to coding error
(zdnet.com)

Hackers launched a failed cyber-attack on Saturday in an attempt to infect millions of Israeli users with ransomware. The attack is believed to have been carried out by hackers operating out of Palestine, based on current evidence.

The incident took place on Saturday, March 2, when hackers successfully poisoned DNS records for Nagich, a web service that provides an accessibility (a11y) widget that's embedded on thousands of Israeli websites to provide access for persons with reading disabilities.

According to reports from Israeli cyber-security experts, hackers used the Nagich widget to automatically embed malicious code on thousands of Israeli websites.

Data Governance, AI And Healthcare: An Exciting New World Of Health Provision
(forbes.com)

As AI becomes more commonplace, there’s an increased need for data governance. It’s an issue that’s been identified by the government, as it recently announced an ethics group to oversee large groups of data sets.

An All-Party Parliamentary Group (APPG) on Artificial Intelligence was set up in January 2017 to specifically explore how the technology might impact and have implications on our lives.

The issue of data governance is complex, and the solution everyone is hoping to come to is a safe, secure and regulated framework that is effective while keeping on the ‘right’ side of the right to privacy.

Spotting Insider Breaches: Employees Can Help
(healthcareinfosecurity.com)

Two recent security incidents involving insiders spotlight the importance of employee vigilance in detecting and containing breaches.

In one incident, an employee at Rutland Regional Medical Center in Vermont noticed unusual activity with their email account and reported it to the medical center's IT department. In the other incident, a former employee of Kentucky Counseling Center in Louisville reported to the mental health services provider that they had received an email containing unauthorized patient information from a staff member.

"Employees who report incidents like these should be commended, and they provide a learning opportunity for their organizations," says Kate Borten, president of security and privacy consulting firm The Marblehead Group.

‘It is a big problem’: European lawmakers discuss medical device oversight
(icij.org)

Europe should force medical equipment companies to set up a fund to help victims of faulty devices as part of a complete overhaul of legislation governing the industry, a European parliamentary committee heard Wednesday.

A Dutch Member of the European Parliament (MEP) Annie Schreijer-Pierik proposed the initiative during a wide-ranging address in which she said patients were deliberately being kept in the dark about the potential risks involved in medical device implantation and subsequent failures by the absence of available public data.

“You can say it’s not such a big problem, but if it affects you, it is a big problem no matter what you say,” she observed.

Security leaders suffering from "cyber fatigue"
(itproportal.com)

Cybersecurity professionals are positive about the challenges of dealing with the growing number of threats around today, but many still feel pessimistic about their work, new research has found.

A significant number of workers say they are suffering from "cyber fatigue" according to Cisco's latest 2019 CISO Benchmark Study ahead of RSA this week.

The study, which surveyed more than 3000 security leaders across 18 countries, found 30 per cent of CISOs reported they felt almost like giving up in the face of constant attacks - although this was down from 46 per cent last year.

Five Emerging Cyber-Threats To Worry About In 2019
(citi.io)

Last year was full of cybersecurity disasters, from the revelation of security flaws in billions of microchips to massive data breaches and attacks using malicious software that locks down computer systems until a ransom is paid, usually in the form of an untraceable digital currency.

We’re going to see more mega-breaches and ransomware attacks in 2019. Planning to deal with these and other established risks, like threats to web-connected consumer devices and critical infrastructure such as electrical grids and transport systems, will be a top priority for security teams.

But cyber-defenders should be paying attention to new threats, too. Here are some that should be on watch lists:

Why Ransomware Is Still An Active Threat
(eweek.com)

For several years, ransomware was a rising threat, causing hundreds of millions of dollars in damages and disrupting operations around the world.

But what is the state of ransomware in 2019? In a session at the RSA Conference here, a pair of McAfee researchers detailed how the threat landscape for ransomware has changed and where it is headed. They also provided insight into what organizations can now do to help minimize the risk of being a victim of ransomware.

"There is a myth that ransomware is dying, but it's not," Raj Samani, Chief Scientist, McAfee told eWEEK in an interview. "We've seen a lot of activity with Gandcrab over the last 12-24 months and that's not going away."

Verify: Inquiry criticises government ID scheme
(bbc.com)

The National Audit Office (NAO) has criticised the government's flagship identity verification scheme. A damning report says Gov.UK Verify has fallen well short of its target of 25 million users by 2020, managing only 3.6 million so far.

The government has had to lower its estimates for Verify's financial benefits by 75%. It says challenges like these are to be expected when the government is working "at the forefront of new technology".

The Verify platform was launched by the Government Digital Service (GDS) in 2016, intended to become the default way for people to prove their identity for online government services.

Bounty Hunters Find 100K+ Bugs Under HackerOne Program in 2018
(darkreading.com)

Organizations signed up with the vulnerability disclosure platform shelled out a record $19 million for bug discoveries in their systems.

Security researchers from around the world last year reported over 100,000 valid vulnerabilities in software and systems belonging to organizations signed up with the HackerOne crowdsourced vulnerability disclosure platform.

Together the researchers earned more than $19 million in bounties in 2018 — or nearly the same amount as the combined total paid out to hackers over the past six years under the HackerOne program.

US Democrats to push to reinstate repealed 'net neutrality' rules
(itnews.com.au)

Democrats in the US Congress plan to unveil legislation on Wednesday to reinstate "net neutrality" rules that were repealed by the Trump administration in December 2017, House of Representatives Speaker Nancy Pelosi said.

Pelosi told lawmakers in a letter that House Democrats, who won control of the chamber in the November 2018 elections, would work with their colleagues in the US Senate to pass the "Save The Internet Act."

The text of the proposed legislation has not been released.

Alphabet snoop: If you're OK with Google-spawned Chronicle, hold on, hold on, dipping into your intranet traffic, wait, wait
(theregister.co.uk)

Google-spawned security outfit Chronicle this week unveiled a service that analyzes telemetry data from customers' networks to detect cyber-attacks lurking among the rivers of packets.

Dubbed Backstory, the tool will allow IT admins to sift through things like DNS usage, endpoint activity logs, and Cisco NetFlow data to see who was doing what and when on corporate network.

Additionally, Chronicle said it will allow customers to compare their logs and telemetry information against information gathered by Google and a number of "other sources," to verify whether activities on their systems are legit or malicious, though the Alphabet-backed company says it does not sell nor share any user data.

When 2FA means sweet FA privacy: Facebook admits it slurps mobe numbers for more than just profile security
(theregister.co.uk)

Another week, another Facebook privacy storm.

This time, the Silicon Valley giant has been caught red-handed using people's cellphone numbers, provided exclusively for two-factor authentication, for targeted advertising and search – after it previously insinuated it wouldn't do that.

Folks handing over their mobile numbers to protect their accounts from takeovers and hijackings thought the contact detail would be used for just that: security. Instead, Facebook is using the numbers to link netizens to other people, and target them with online ads.