- The Strategist - https://aspistrategist.ru -
Cyber wrap
Posted By Zoe Hawkins on September 2, 2015 @ 12:30
The US Third Circuit Court of Appeals has affirmed [2] the Federal Trade Commission’s (FTA) authority to charge corporations over insufficient levels of cybersecurity. Wyndham Worldwide, the parent company of several hotel chains is being taken to court by the FTA for the company’s alleged failure to protect customers’ personal data, which resulted in more than 600,000 customers having their credit card details stolen between 2008 and 2010. This court ruling [3] marks a significant step towards reaffirming the powers of the FTC, setting legal precedent for cybersecurity liability and raising questions in regards to other large-scale corporate breaches, like those which affected Target [4] in 2013 and eBay [5] last year.
After their well-publicised hack of a Jeep Cherokee, computer security engineers Charlie Miller and Chris Valasek have been hired [6] by Uber. You might recall that the duo exploited the vulnerabilities of Fiat Chrysler’s Uconnect software in order to remotely manipulate [7] the Jeep’s blinkers, navigation, brakes and steering; Jeep responded by recalling 1.4 million vehicles. Miller and Valasek will now be working at Uber’s Advanced Technology Centre in Pittsburgh which is currently researching autonomous car technologies. While questions have been raised [8] over the potential PR motives behind the hiring, this move comes as part of a much broader talent acquisition program which has recently poached [9] more than 100 engineers from different divisions of Google.
The White House is reportedly in the process of crafting a suite of sanctions [10] targeting Chinese firms responsible for corporate cyber espionage. Informed by an executive order [11] made by Obama in April, the US has shortlisted five state-owned and private Chinese firms that steal trade secrets from American companies. Retribution for activities in cyberspace wouldn’t be an unprecedented move, with the US having imposed sanctions [12] on North Korea after the Sony hack in 2014. The discussion is occurring at a politically precarious moment, only weeks before Chinese President Xi Jinping makes his first state visit [13] to Washington. Some are in favour of the move, arguing that it will act as a vital deterrent [14] for future cyberthefts, while other are wary that this could escalate Sino-US tensions and cause economic retaliation [15]. A decision is expected to be reached in the coming weeks, and will undoubtedly impact the outcomes of the visit, with the spokesperson of the Chinese embassy in Washington advocating [16] for ‘enhanced dialogue and cooperation’ between the two parties.
An American teenager has been sentenced [17] to 11 years in prison for supporting Islamic State. Ali Shukri Amin, a 17 year old high school student from Virginia, has been convicted [18] of running an influential pro-ISIS Twitter account with the handle @Amreekiwitness, which accrued more than 4,000 followers. In addition to his social media outreach, Amin raised funds [19] for the terrorist organisation by giving tutorials on how to use the cytpocurrency, Bitcoin. The teen’s jail sentence has sparked debate [20] over whether the government is being overly harsh on those who, while expressing hateful views, possess no capacity to inflict actual harm. However, Amin was also accused of radicalising a fellow teen [21] who proceeded to travel to Syria as a foreign fighter.
Japan’s Internal Affairs and Communications Ministry will execute large-scale simulated cyberattacks [22] in order to prepare for the 2020 Tokyo Olympics and Paralympics. The new National Centre of Incident Readiness and Strategy for Cybersecurity will run drills [23] to anticipate and prevent likely cyberattacks on critical infrastructure and processing systems. The urgency is fuelled by a lack of public confidence in the government’s cybersecurity following the data breach of the Japan Pension Service earlier this year. Starting in the 2016 financial year, Japan will allocate [24] more than ¥1 billion to the effort, however a shortage of trained cyber security experts remains a critical obstacle.
Article printed from The Strategist: https://aspistrategist.ru
URL to article: /cyber-wrap-86/
URLs in this post:
[1] Image: https://aspistrategist.ru/wp-content/uploads/2015/09/4275066215_7c7b6de6c4_z.jpg
[2] affirmed: http://thehill.com/policy/cybersecurity/252217-court-rules-leads-to-fears-of-ftc-litigation-on-cybersecurity
[3] court ruling: http://www2.ca3.uscourts.gov/opinarch/143514p.pdf
[4] Target: http://www.bloomberg.com/bw/articles/2014-03-13/target-missed-alarms-in-epic-hack-of-credit-card-data
[5] eBay: http://www.forbes.com/sites/gordonkelly/2014/05/21/ebay-suffers-massive-security-breach-all-users-must-their-change-passwords/
[6] hired: http://www.wired.com/2015/08/uber-hires-hackers-wirelessly-hijacked-jeep/
[7] manipulate: http://arstechnica.com/security/2015/08/uber-hires-researchers-who-hacked-chrysler-uconnect/
[8] raised: http://www.gizmodo.com.au/2015/08/uber-hires-the-car-hackers-that-stopped-chrysler-in-its-tracks/
[9] poached: http://www.nytimes.com/2015/08/29/technology/uber-hires-two-engineers-who-showed-cars-could-be-hacked.html?_r=0
[10] suite of sanctions: http://edition.cnn.com/2015/08/31/politics/china-sanctions-cybersecurity-president-obama/
[11] executive order: https://www.whitehouse.gov/the-press-office/2015/04/01/executive-order-blocking-property-certain-persons-engaging-significant-m
[12] imposed sanctions: http://www.bbc.com/news/world-us-canada-30661973
[13] first state visit: https://www.washingtonpost.com/world/national-security/administration-developing-sanctions-against-china-over-cyberespionage/2015/08/30/9b2910aa-480b-11e5-8ab4-c73967a143d3_story.html?postshare=9151441036659720
[14] vital deterrent: http://www.scmp.com/tech/enterprises/article/1853235/white-house-must-threaten-great-firewall-any-hope-curbing-chinas
[15] economic retaliation: http://www.wsj.com/articles/white-house-readying-sanctions-plan-against-chinese-firms-for-cybertheft-1441057946
[16] advocating: http://www.ibtimes.co.uk/us-weighing-sanctions-china-over-cyber-attacks-ahead-xis-visit-1517893
[17] sentenced: http://www.nbcnews.com/news/us-news/virginia-teen-sentenced-prison-isis-case-n417691
[18] convicted: https://www.hackread.com/pro-isis-virginia-teen-twitter/
[19] raised funds: http://www.ibtimes.com/who-ali-shukri-amin-virginia-isis-teenager-behind-pro-islamic-state-twitter-sentenced-2073208
[20] debate: http://thehill.com/policy/national-security/252172-virginia-teen-gets-11-years-for-tweeting-support-for-isis
[21] radicalising a fellow teen: http://arstechnica.com/tech-policy/2015/08/jihadist-us-teen-gets-11-years-for-blog-tweets-about-crypto-and-bitcoin/
[22] simulated cyberattacks: http://www.thejakartapost.com/news/2015/08/26/japan-plans-large-drills-avert-cyber-attacks-2020-games.html
[23] run drills: http://www.japantimes.co.jp/news/2015/08/30/national/filling-ranks-japans-cyberwarriors-time-2020-olympics-proves-major-challenge/
[24] allocate: http://the-japan-news.com/news/article/0002379732
Click here to print.
Copyright © 2024 The Strategist. All rights reserved.