- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By Zoe Hawkins on August 10, 2016 @ 12:30
Las Vegas was the place to be last week, with the world’s largest annual hacker conferences, Black Hat [1] and Defcon [2], taking over the town. The events unearthed lots of cyber gossip, but it was the world’s first machine-only hacking competition that stole the show. DARPA’s Cyber Grand Challenge [3] pitted seven ‘cyber reasoning systems’ against each other to assess their ability to detect software vulnerabilities and write new security patches without human assistance. The automated computers were confronted [4] with modified versions of historic bugs, including Heartbleed, Sendmail crackaddr and the Morris Worm. Carnegie Melon’s ‘Mayhem’ won the US$2 million prize, and even briefly held a lead [5] on a human team in a separate hacking event—before eventually coming last. This sort of artificial intelligence isn’t intended to replace [6] human analysis, but the success of the Challenge confirmed the utility of automated network defence and the assistance that such systems can offer in network protection. Other highlights from the desert include flying laptops [7], the return of the Jeep hackers [8], the rise of automated spear-phishing Twitter bots [9], and how to hack your way into first class airline lounges [10].
It was at the Black Hat conference that Apple announced its first ever bug bounty program [11]. Ivan Krstic, Apple’s head of security engineering and architecture, revealed that Apple will start offering up to US$200,000 [12] to hackers who report undiscovered security vulnerabilities in Apple’s software. After years of refusing to pay [13] independent researchers and relying instead on internal security efforts, Apple will start the program next month on an invitation-only basis. In doing so, it joins the ranks of many other large tech companies that offer rewards for cybersecurity detective work, including [14] Google, Microsoft and Facebook. Fancy yourself a white hat hacker? Well, check out Bugcrowd’s up-to-date inventory of live bug bounty programs [15]. Happy hunting!
Rumours are circling that the Obama administration is planning to elevate [16] the powers of the Pentagon’s Cyber Command. There are preparations [17] to separate Cybercom from the NSA into a separate and more influential Unified Combatant Command. Rejigging the organisational structure appears necessary [18] to improve Cybercom’s performance, as the shortcomings of its current online campaign against ISIS are drawing criticism from military leaders. Standby for confirmation of this change from the White House.
Cyber continues to bubble up in the US elections. The recent hack [19] of the Democratic National Committee’s network has generated concerns over the security of the electronic voting technology. The Obama administration is considering [20] the possibility of designating the electronic ballot-casting system as ‘critical infrastructure’. Doing so would allow the Department of Homeland Security to take more robust measures [21] to protect the system, which Secretary Jeh Johnson described as part of the US’ ‘vital national interest’. Those discussions join a long election dialogue on cybersecurity that has included Clinton’s email misdemeanours [22], the DNC hack, Trump inciting Russian hackers [23] and the respective policy positions [24] of both candidates. Cybersecurity expert and founder of both Black Hat and Defcon, Jeff Moss, has publicly endorsed [25] Clinton, despite her online blunders—better the devil you know. But then again, who could go past Trump’s profound value-add [26] last month when he announced, ‘I am a fan of the future, and cyber is the future’…
As the host of the 2016 Summer Olympic Games, Rio has needed to up its cybersecurity game. Large scale sporting events bring with them an increased volume of online activity and are naturally attractive [27] to cybercriminals. A report [28] from security firm Fortinet reveals a spike in malicious online activity such as online payment fraud, in sync with the opening of The Games. Over the last month, Brazil has experienced an 83% rise [29] in the number of malicious URLs, in comparison to a 16% increase globally. The major threats [30] are expected to be phishing scams, unsecure public Wi-Fi connections and ATM skimmers. Luckily, US-CERT has published some handy tips [31] to keep you cyber secure at The Games.
Speaking of cybercrime, Australia has set up [32] a new cyber-intelligence unit to track terrorism financing, money laundering and financial fraud. Justice Minister Michael Keenan indicated that this unit would be stood up within [33] the Australian Transaction Reports and Analysis Centre to crack down on organised criminal activities online. The unit will tackle job recruitment scams with IDCARE [34] and identify criminal patterns in cooperation with ACORN [35], the Australian Cybercrime Online Reporting Network.
The Australian Bureau of Statistics suffered an embarrassing denial of service [36] last night, just as millions of Australians logged on to complete the national census. This comes after widespread privacy concerns [37] over the increased time period that individuals’ information would be stored and security worries [38] over the fortitude of the website’s encryption. So much so, that several senators openly committed to boycotting [39] this week’s survey, despite hefty fines. So last night’s debacle is an awkward development, with questions [40] being raised by the media on the origin and motivation of the incident, and its implications for the integrity of personal data. While you’re waiting for the census website to come back online, check out #bettercensusquestions [41] for some comic relief.
Finally, Pokémon Go’s rise to become the most successful mobile game in history [42] has led to the creation of malicious apps [43] masquerading as the real thing. These knock-off games have popped up on the Google Play store and are smuggling malware onto people’s Android mobile operating systems. Check out Dell’s analysis of these exploits here [44]. Getting ahead of the game, Iran has banned Pokémon Go [45] before its even been released, on the grounds of security concerns. So, thanks to the country’s High Council of Virtual Spaces, Iranians will never be able to catch ‘em all – but at least they will be safe from cybercriminals.
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-131/
URLs in this post:
[1] Black Hat: https://www.blackhat.com/us-16/
[2] Defcon: https://www.defcon.org/
[3] Cyber Grand Challenge: https://www.cybergrandchallenge.com/
[4] confronted: http://www.infoworld.com/article/3104875/security/supercomputers-give-a-glimpse-of-cybersecuritys-automated-future.html
[5] briefly held a lead: https://techcrunch.com/2016/08/05/carnegie-mellons-mayhem-ai-takes-home-2-million-from-darpas-cyber-grand-challenge/
[6] isn’t intended to replace: http://www.wired.com/2016/08/will-humans-bots-rule-cybersecurity-answer-yes/#slide-6
[7] flying laptops: https://motherboard.vice.com/read/the-danger-drone-is-a-500-flying-hacker-laptop
[8] Jeep hackers: http://phys.org/news/2016-08-jeep-hackers-black-hat-scarier.html
[9] spear-phishing Twitter bots: http://www.infosecurity-magazine.com/news/bhusa-researchers-present-phishing/
[10] airline lounges: https://www.wired.com/2016/08/fake-boarding-pass-app-gets-hacker-fancy-airline-lounges/
[11] first ever bug bounty program: http://www.reuters.com/article/us-cyber-blackhat-apple-idUSKCN10F2TX
[12] up to US$200,000: http://www.scmagazineuk.com/black-hat-las-vegas-apple-offers-bug-bounty-programme/article/514568/
[13] refusing to pay: https://techcrunch.com/2016/08/04/apple-announces-long-awaited-bug-bounty-program/
[14] including: http://www.theverge.com/2016/8/4/12380036/apple-bug-bounty-program-vulnerability-security
[15] inventory of live bug bounty programs: https://bugcrowd.com/list-of-bug-bounty-programs
[16] planning to elevate: http://www.reuters.com/article/us-usa-cyber-idUSKCN10G254
[17] preparations: http://www.techrepublic.com/article/is-us-cyber-command-preparing-to-become-the-6th-branch-of-the-military/
[18] appears necessary: https://www.engadget.com/2016/08/06/us-elevates-role-of-cyber-command/
[19] recent hack: https://www.wired.com/2016/07/heres-know-russia-dnc-hack/
[20] considering: http://www.nytimes.com/2016/08/04/us/politics/us-seeks-to-protect-voting-system-against-cyberattacks.html?_r=0
[21] robust measures: http://www.techrepublic.com/article/how-obama-administration-plans-to-prevent-rigged-elections/
[22] email misdemeanours: http://www.politico.com/news/hillary-clinton-emails
[23] inciting Russian hackers: http://www.nytimes.com/2016/07/28/us/politics/donald-trump-russia-clinton-emails.html
[24] policy positions: http://lifehacker.com/hillary-clinton-and-donald-trumps-cybersecurity-platfor-1784790979
[25] publicly endorsed: http://fortune.com/2016/08/06/black-hat-defcon-apple-darpa-hillary-clinton/
[26] value-add: http://www.theverge.com/2016/7/21/12247390/donald-trump-cyber-interview
[27] naturally attractive: http://blogs.wsj.com/riskandcompliance/2016/05/06/rio-olympics-likely-a-magnet-for-cybercriminals/
[28] report: https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/Threat-Report-FortiGuard-Eye-of-Storm.pdf
[29] 83% rise: http://www.businessinsider.com.au/cybersecurity-threats-at-the-rio-2016-olympic-games-2016-8?r=US&IR=T
[30] major threats: https://www.cigital.com/blog/olympic-cyber-security-threats/
[31] handy tips: https://www.us-cert.gov/ncas/current-activity/2016/08/02/Cybersecurity-Tips-Rio-Olympics
[32] set up: http://www.itnews.com.au/news/australia-sets-up-cyber-unit-to-trace-terrorism-payments-433157
[33] stood up within: http://www.reuters.com/article/us-cyber-australia-idUSKCN10K080?il=0
[34] IDCARE: http://www.idcare.org/
[35] ACORN: https://www.acorn.gov.au/
[36] denial of service: http://www.gizmodo.com.au/2016/08/the-australian-census-website-didnt-just-crash-it-was-hacked/
[37] privacy concerns: http://www.news.com.au/national/breaking-news/census-privacy-top-priority-abs/news-story/b59f4d927eeec913ba4e5e568ba38a3e
[38] security worries: http://www.itnews.com.au/news/abs-forced-to-defend-census-website-security-432176
[39] boycotting: http://www.abc.net.au/news/2016-08-09/scott-ludlam-wont-put-name-on-census-form/7703380
[40] questions: http://www.news.com.au/technology/online/hacking/expert-rubbishes-abs-hacker-claims-and-says-census-was-doomed-from-the-start/news-story/28f271aeedaaddbbbfb403d9a9713476
[41] #bettercensusquestions: https://twitter.com/search?q=%23bettercensusquestions&src=tyah
[42] most successful mobile game in history: http://www.theaustralian.com.au/news/inquirer/ahunting-we-will-go-pokemon-go-gets-kids-outdoors/news-story/15d61b375775e8a13661d5b7e5953e15
[43] malicious apps: https://www.hackread.com/more-fake-android-pokemon-go-apps/
[44] here: https://www.mysonicwall.com/sonicalert/searchresults.aspx?ev=article&id=950
[45] banned Pokémon Go: http://www.dailydot.com/layer8/iran-bans-pokemon-go/
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.