Welcome to the Surveillance Blog

Coming Soon!

Tech chiefs in plea over privacy damage

By Richard Waters

The US tech industry has failed to appreciate the mounting global concern over its record on online privacy and security and must act fast to prevent deeper damage to its image, Silicon Valley’s top executives and investors have conceded.

The self-criticism, much of it aimed at consumer internet companies such as Google and Facebook, comes as some of the tech sector’s best-known names have been battered by a backlash over revelations of widespread US internet surveillance and concerns about their growing business and cultural dominance.

Google has been most in the line of fire, with the European Commission turning up the heat in a competition case last week and a recent “right to be forgotten” legal ruling forcing it to remove some links from its European search services.

Copyright: Financial Times, 2014.

 

Full article at: http://www.ft.com/cms/s/0/b9ab8ec2-3c09-11e4-a6ce-00144feabdc0.html

After Breach, JPMorgan Still Seeks to Determine Extent of Attack

By Nicole Perlroth and Matthew Goldstein

The headache caused by the attack on JPMorgan Chase’s computer network this summer may not go away anytime soon.

Over two months, hackers gained entry to dozens of the bank’s servers, said three people with knowledge of the bank’s investigation into the episode who spoke on the condition of anonymity. This, they said, potentially gave the hackers a window into how the bank’s individual computers work.

They said it might be difficult for the bank to find every last vulnerability and be sure that its systems were thoroughly secured against future attack.

The hackers were able to review information about a million customer accounts and gain access to a list of the software applications installed on the bank’s computers.

Copyright: New York Times, 2014.

Full article at: http://www.nytimes.com

Connected Home: A Next-Gen Botnet Army?

By Dave Larson, Corero

We are now in an era where technological advances have allowed us to be “connected” more than ever before. With the Internet of Things quickly emerging and making its way into our businesses and everyday personal lives, the opportunity to capitalize on this revolution is at our fingertips, but we are also broadening the cyber threat and attack landscape in leaps and bounds.

Internet-based home automation, like your nanny cams, remote thermostat programming, home monitoring and security kits, connected lighting products (and the list goes on), are revolutionizing how we manage the day-to-day. We’ve all seen the television commercials promising that we will never have to worry if we shut the garage door before leaving for work, or if the kids left the lights on all afternoon — it’s all at our fingertips, literally.

What we don’t hear about as often is how these vulnerable devices are the next target for cyber attackers.

 

Full article at: http://www.wired.com/2014/09/connected-home-botnet-army/

Why Isn’t Apple a Leader in Security?

Tech Giant Makes Two Changes to Its iCloud Security in Response to Recent Hacks

Home Depot Confirms Data Breach

Do-It-Yourself Retailer Says No Evidence Debit PIN Numbers Were Compromised

Mysterious Phony Cell Towers Could Be Intercepting Your Calls

By Andrew Rosenblum

Every smart phone has a secondary OS, which can be hijacked by high-tech hackers

Like many of the ultra-secure phones that have come to market in the wake of Edward Snowden’s leaks, the CryptoPhone 500, which is marketed in the U.S. by ESD America and built on top of an unassuming Samsung Galaxy SIII body, features high-powered encryption. Les Goldsmith, the CEO of ESD America, says the phone also runs a customized or “hardened” version of Android that removes 468 vulnerabilities that his engineering team team found in the stock installation of the OS.

His mobile security team also found that the version of the Android OS that comes standard on the Samsung Galaxy SIII leaks data to parts unknown 80-90 times every hour.

Copyright: Popular Science, 2014

 

Full article at: http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-be-intercepting-your-calls

Barclays to launch finger vein scanners

By Daniel Schäfer in London

Barclays has become the first UK bank to launch scanners that identify customers by their fingers’ unique vein patterns, as the lender seeks to ramp up its fight against cyber crime and fraud.

Biometric finger vein readers will be offered to corporate clients for a fee from next year, enabling them to access their online bank accounts and authorise payments quickly without the need for a PIN number or password, Barclays said.

Copyright: The Financial Times Limited 2014.

Full article at: http://www.ft.com/cms/s/0/cf707970-3448-11e4-b81c-00144feabdc0.html

Big jump in number of security threats to mobile devices

Security threats to mobile devices jumped sharply during the first half of 2014 compared to the whole of 2013 as the proliferation of smartphones led to more attempts to spy on users and steal data, according to a new report from Alcatel-Lucent.

Data from the French telecoms company show a growing problem in personal information stolen and “bill shock” as result of pirated data usage.

Copyright: The Financial Times Limited 2014.

 

Full article at: http://www.ft.com/cms/s/0/1617d352-3451-11e4-b81c-00144feabdc0.html

Nato summit on ‘high alert’ for cyber attack

By Sam Jones in London

As world leaders gather in Wales for the Nato summit, British police say they are engaged in a security effort greater than that for the 2012 Olympics. But in contrast to the sporting event, security officials fear the most likely target will be online: Nato and the UK intelligence services have been put on “high alert” for a cyber attack.

Officials from Nato’s cyber defence unit have been meeting with GCHQ, the UK’s electronic spying agency, and other agencies since mid-July to share intelligence assessments and prepare for the event, people familiar with the plans have told the Financial Times.

Copyright The Financial Times Limited 2014.

 

Full article at: http://www.ft.com/cms/s/0/bd29b7b6-335a-11e4-9607-00144feabdc0.html