Copy
Hello <<First Name>>, and welcome to this issue of the Science of Security and Privacy - Reviews & Outreach (R&O)! Its purpose is to highlight some of the exciting research, news, and events that impact our technical community. All presented materials are available on or through the Virtual Organization portal.
IN THIS ISSUE:
Cyber Scene - Geopolitics, Trade and Tech: No "Global-exit" 

No News Is Not Good News
 
Like fake news, no news turned out to be bad news for the Tribune press conglomerate on 29 December as its printing system experienced a disruption in their universe due to a malware attack from outside the US. From California to Florida to New York and Chicago in between, both the Tribune family and some of its former "children" (e.g., the LA Times) across the US scurried to restart. The digital versions were unaffected. No, it was not anelusive option for erasing fake news, but rather another reminder of the frailty of our digital life and quite a different, heavy-handed approach than subtle Russian 2016-and-beyond election meddling in the US and EU including, for at least the next 8 weeks, the UK. The Russians have been careful in picking their poison.
 
Another Not-So-Mighty Goliath Pen Versus Little David Hacker
 
German politicians, celebrities, and yes, once again journalists were subjected (Economist 12 Jan. "cyber-crime" Germany finds G0d") to dealing with G0d--a most ungodlike 20-year old hacker ("script kiddie") named December G0d who released the victims' phone numbers, addresses, credit card info, and sometimes private photos on Twitter. Sparing the "Alternative for Germany" far-right end of the country's political spectrum, the hacker said he was annoyed at the centrist and left-leaning Germany's politicians. But unlike most of the rest of the world who may empathize regarding at least distrust and dismay at many flavors of politicians but who have not taken up digital arms, he snatched code from some other hackers and apparently acted alone. 
 
Despite the new European General Data Protection Regulation (GDPR), discussed in several prior Cyber Scenes, the Economist article cites Matthias Schultze from a German think tank who observes that Germany has lagged behind some of its neighbors, seeking help from the US in this script kiddie case, and from the Brits in the 2015 probable Russian cyber-attack on the Bundestag’s servers. Rounding up a lone wolf cub in his parents' house, cliché that it is, continues to hound global cyber users. The article closes with an admonishment, inter alia, to users to take personal action to use better passwords as "cleanliness is next to G0dliness."
 
For a deeper dive into this German attack, including discussion of why the "cub reporter" selected only those critical of the German far right and the political implications of this action, see Melissa Eddy's NYT piece (1/5/19), "Hackers Leak Details of German Lawmakers Except for Those on Far Right."
 
Beyond password composition suggestions, cautionary tales of consequences, past and future, abound. Cyber/intelligence reporter David Sanger reports in the NYT on the Marriott breach discussed in the past included unencrypted passport numbers of up to 5.25 million. Unlike the credit cards that were breached in the heist in which "all but 354,000 had expired by September 2018," passports are good for 10 years. State Department said not to panic, given that the newer passports are hard to recreate, and although Sanger notes that Marriott offered to pay for a new passport if it could be connected to a verifiable fraudulent event, it did not offer to replace those stolen. Sanger concludes by noting that the absence of verifiable fraud points to governmental foreign spies, vice a "lone wolf cub" (your author's term) in the basement, as the former would seek info for their own and larger nefarious purposes vice short-term financial gain. As this article "goes to press," the US Government shutdown is showing signs of resolution in the coming weeks (back to that empathy re: politicians!) so State Department might be able to replace your compromised passport and the TSA security contingent at your local airport may be working in full, paid force, along with air traffic controllers. And the Secret Service? (oops, not furloughed).
 
Cyber Alchemy: Data into Ads
 
The implementation of the GDPR is, however, taking hold. Ask Google, just fined on 20 January by the French for a whopping $57 million (Euros 50 million) due to not disclosing properly the collection of user data on search engines, Google Maps and YouTube. This is the fourth and largest GDPR fine so far, and certainly not the last. Google did receive a larger fine prior to GDPR: Euros4.3 billion for mobile phone market abuse. The GDPR is now being cast as "Europe's Aggressive Watchdog."
 
Apple's CEO Tim Cook, however, asked for US rules that would mirror the GDPR. As Cyber Scene has discussed in the past, US legislators are struggling with how to proceed on this issue. Regulation surfaced repeatedly in the Google CEO testimony in mid December before the House Judiciary Committee discussed in the most recent Cyber Scene. 
 
Voters Bought a New House

Now that the new, post-mid-term Members of Congress are taking their seats (save one, it seems), there may well be more regulatory bipartisan action on the issue of GDPR-like regulation. Readers may be interested to see the breakdown of the 116th Congress Standing, Select and Joint Committees in the House and Senate.

As observant readers have noticed, the Senate and House do not standardize their web pages, just as they distinguish party affiliation on line in different manners. They do agree on this: that Chairs (#1) are always the majority party, and Ranking Members (#2) hail from the minority party. If you missed it, they split in the Nov. 2018 midterms: the Senate remains Republican but House flipped Democratic, so leadership changes have taken place on all House committees whereas retirements or defeats or personal preference changes among Members of the Senate result in far fewer committee assignment changes this round.

Is Free Trade Really Free?

The following scientific research national breach is not exactly "trade" and not free for the victim: Robert Pear (NYT 1/7/19) looks at NIH-funded scientists and researchers who now need to better protect US universities' biomedical research which may be on a fast cyber boat to China. In a scientific panel out-brief on "foreign influences on research integrity,” NIH Director Dr. Francis S. Collins and FBI Director Christopher Wray referred to nontraditional collectors of information whereby data thieves in "shadow laboratories" share data with the Chinese government.
 
Bloomberg Business also launched a huge ...  more ► 

SoS Musings - Exploring the Art of Deception in Cybersecurity 

The performance of deception has mainly been linked to the realms of warfare, politics, and commerce, but this technique is now considered one of the more promising strategies that could improve cybersecurity. The use of deceptive strategies and technologies in cyber defense operations could further improve the prevention of malicious adversarial operations as well as reduce the exposure and theft of real technology assets. The main goals behind the use of deception in cyber defense operations are to detect, examine, trick, and lure attackers away from sensitive assets once they have successfully infiltrated a targeted system or network. Deception can be performed through the generation of traps and placement of bait, which consists of simulated assets modeled after real technology assets within a real or virtual environment. According to a new report shared by MarketWatch, the deception technology market has been forecasted to be valued at over $2.50 billion by 2022, indicating the expected rise in the development and application of deception technology.
 
Through the application of deception techniques and technologies, organizations can improve upon the reduction of the cyber risks they face as well as improve their security posture. It is important that organizations increase the speed at which they detect and respond to cyberattacks as the longer hackers stay within the network or system that they have infiltrated, the more damage they could inflict and the harder it is for them to be detected. These damages include the theft of sensitive data, deletion or alteration of files, planting of malware, and more. As the use of deception technology fools hackers into thinking that they have gained access to assets such as workstations, servers, applications, and more, in a real environment, security teams can observe and monitor the operations, navigation, and tools of the hackers without the concern that any damage will occur on real assets. False positives are reduced by deception technology since any access to the deception layer can be considered malicious, thus immediately triggering alerts to accurate events. The information gathered through the application of deception technology such as the behavior and methods of attackers can be used to quickly detect and respond to attacks, post-breach, as well as develop better defense strategies and technologies. 
 
There have been advancements in ...  more ► 

Pub Crawl summarizes, by hard problems, sets of publications that have been peer reviewed and presented at SoS conferences or referenced in current work. The topics are chosen for their usefulness for current researchers. Select the topic name to view its description and links to the publications.
 
HARD PROBLEMS TOPICS
 
 
 
  6LoWPAN 2018
 
 
  Acoustic Coupling 2018
 
 
  Acoustic Fingerprints 2018
 
  Actuator Security 2018
 
 
  Ad Hoc Network Security 2018
 
 
  Adaptive Filtering 2018
 
  Advanced Persistent Threats 2018
 
  Adversary Models 2018
   more ► 
Forward R&O
Share R&O
Follow SoS
In the News
List of selected articles from recent SoS-VO postings with links to the entries on SoS-VO site.

"The Benefits and Limitations of AI in Cybersecurity"

"Protecting Critical Internet Infrastructure from IoT Device Risks"

"HolaVPN Is a Massive Security Risk, Security Researchers Warn"

"Hackers Make a Fake Hand to Beat Vein Authentication"

"Idaho Lab Protects US Infrastructure from Cyber Attacks"

"Security Flaws Let Anyone Snoop on Guardzilla Smart Camera Video Recordings"

"AI Advancement Opens Health Data Privacy to Attack"

"Open-Source Tool Aims to Curb BGP Hijacking Amid Chinese Espionage Concerns"

"The Worst Hacks of 2018"

"USB Type-C to Become More Secure With Authentication Standard"

"Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3"

"Newspaper Production Hit by Ryuk Ransomware Attack"

"University of Maryland Researchers Beat Google’s reCaptcha Audio Challenge"

"Proofpoint Warns of Custom Web Font Phishing Technique"

"PewDiePie Hackers Take Aim at Chromecast TVs"

"Hacking Attacks on Your Router: Why the Worst Is yet to Come"

"From Encrypting the Web to Encrypting the Net: 2018 Year in Review"

"Five Emerging Cyber-Threats to Worry About in 2019"

"New Variant of Mirai Malware Exploits Weak IoT Device Passwords to Conduct Brute-Force Attacks"

"Blockchains in Real Time"

"To Reduce IT Supply Chain Risk, Watch for Insider Threats and External Attackers"

"Hacker Uses Early Warning System for Fake Message Campaign"

"Use Edge Computing for IoT Security, Says IEEE"

"Why Security by Design and Security DevOps Are so Critical to Success"

"Arm Yourselves for Healthcare’s Cybersecurity War"

"Phishing Attacks Bypass Two-Factor Authentication"

"The Quiet Threat Inside ‘Internet of Things’ Devices"

"Tesla’s Model 3 Will Be the Prime Target at Upcoming Hacker Contest"

"New Side-Channel Attack Steals Data from Windows, Linux Page Cache"

"As the Government Shutdown Drags on, Security Risks Intensify"

"Fortnite Had a Security Vulnerability That Let Hackers Take over Accounts"

"Cryptomining Malware Uninstalls Cloud Security Products"

"Decrypted Telegram Bot Chatter Revealed as New Windows Malware"

"Cyberattacks Now Cost Businesses an Average of $1.1M"

"International Award-Winning Technology Protects the Power Grid by Hacking Would-Be Hackers"

"Google Play Malware Used Phones’ Motion Sensors to Conceal Itself"

"Nearly 773 Million Email Addresses Leaked, Spelling Trouble for People Who Re-Use Passwords"

"On Facebook and Twitter Your Privacy Is at Risk—Even If You Don't Have an Account"

"Data Breaches Are Inevitable – Here’s How to Protect Yourself Anyway"

"New Attacks Target Recent PHP Framework Vulnerability"

"Questioning the Effectiveness of Offensive Cyber Operations"

"Beware the Man in the Cloud: How to Protect Against a New Breed of Cyberattack"

"Ransomware in Decline, Report Confirms"

"2019 National Intelligence Strategy"

"DHS Warns Federal Agencies of DNS Hijacking Attacks"

This is a sample of some of the news items that are on the SoS site.  more ►  are available.
Upcoming Events

Check Point Research Summit (CPX 360)
Feb 4-7, Las Vegas, NV

QuBit Conference Belgrade
Feb 7, Belgrade, Serbia

MANUSEC: Cyber Security for Critical Manufacturing
Feb 7-9, Munich, Germany

Software and Cyber Solutions Symposium 2019: Acquisition, Security, and the Supply Chain
Feb 13-14, Arlington, VA

FutureCon Cyber Security Conference
Feb 21, Dallas, TX

17th USENIX Conference on File and Storage Technologies
Feb 25-28, Boston, MA

FutureCon CyberSecurity Conference
Feb 27, Los Angeles ,CA

Securi-Tay 2019
Mar 1, Dundee, UK

RSA Conference 2019
Mar 4-8, San Francisco, CA

NIST Threshold Cryptography Workshop 2019
Mar 11-12, Gaithersburg, MD

The 9th ACM Conference on Data and Application Security and Privacy
Mar 25-27, Dallas, TX

SREcon19 Americas
Mar 25-27, Brooklyn, NY

Symposium on Securing the IoT
Mar 25-27, San Francisco, CA 

Women in CyberSecurity (WiCyS) Conference
Mar 29-30, Pittsburgh, PA

InfoSec Southwest 2019
Mar 29-31, Austin, TX

InfoSec World
Apr 1-3, Lake Buena Vista , FL

HotSoS 2019
Apr 2-3, Nashville, TN

CSO50 Conference
Apr 8-10, Scottsdale, AZ

Virtual Execution Environments 2019
Apr 13-14, Providence, RI 

Insider Threat Summit 2019 (ITS5)
Apr 17-18, Monterey, CA

Secure Summit DC 2019
Apr 23-24, Washington, DC

 more ► 
Produced by
Cyber Pack Ventures, Inc. 5850 Waterloo Road Suite 140 Columbia, MD 21045 USA

You are receiving this email because you are a member of the SoS-VO website, have participated in an SoS event, or have opted into the SoS mailing list. Want to change how you receive these emails? You can update your preferences or unsubscribe from this list.

Email Marketing Powered by Mailchimp