Tag Archive for Security

Artificial Intelligence on the Throne

Artificial Intelligence  on the ThroneThe Internet of Things (IoT) is covering the world with all kinds of devices for the home and industry. Tech prognosticator IDC estimates that by 2025 there will be 41.6 billion IoT devices. The market research firm predicts the IoT devices will dump 79.4 zettabytes (ZB) of data. One class of IoT device for the home has gotten a major upgrade from California’s Stanford. Stanford University medical researchers have created a smart toilet by adding artificial intelligence to the throne. Before Stanford, the smart toilet was often the butt of jokes. The “smart toilet” offered ambient colored lighting, wireless Bluetooth music sync, heated seats, foot warmers, and automatic opening and closing lids. All nice but not really smart. The Stanford Precision Health Toilet (advanced Smart Toilet for healthcare) is really smart it can diagnose diseases. 

Artificial intelligence on the toilet

The Stanford Precision Health Toilet project led by Lead author, Seung-min Park, Ph.D., published A mountable toilet system for personalized health monitoring via the analysis of excreta.” In the journal Nature Biomedical Engineering, they describe a toilet designed to detect early warning signs of cancer and other diseases. The Stanford team believes it will be useful for people at an increased risk of developing certain health issues. Dr. Gambhir – a Ph.D., Stanford professor, chair of radiology, and the senior author of the research paper says that currently, the toilet can measure 10 different biomarkers. The device is fitted inside a regular toilet bowl and is connected to an app for evaluation. Dr. Gambhir envisions it as part of an average home bathroom. The sensors would be an add-on that’s easily integrated into “any old porcelain bowl.” Stanford Precision Health Toilet The extra-smart toilet uses cameras and test strips to collect number one and number two samples. It then analyzes both your pee and poo with artificial intelligence to generate diagnosesa trend in the medical industry. Stanford News says the smart toilet’s algorithms “can distinguish normal ‘urodynamics.’ Urodynamics is the flow rate, stream time, and total volume, among other parameters of urine. The Smart toilet can also check “stool consistencies from those that are unhealthy.analyze white blood cell countChanges in urine can reveal multiple disorders. The dipsticks can be used to analyze white blood cell count, consistent blood contamination. Certain levels of proteins, that can signify bad things. Including a spectrum of diseases, including infection, irritable bowel syndrome, kidney failure, bladder cancer, and prostate cancer.

A very unique biometric factor

The toilet’s built-in identification system uses fingerprints and analprints to identify users in order to match users to their data. Apparently, analprints turn out to be unique biometric factor like fingerprints or iris prints. Professor Gambhir said, “We know it seems weird, but as it turns out, your anal print is unique.” Stanford says no human will see you analprint biometric data. If the artificial intelligence detects something questionable the smart toilets’ app would alert the user’s healthcare team to conduct a full diagnosis and further tests. researchers are planning upgradesThe researchers are planning upgrades to the Precision Health Toilet. Mr. Park told The Verge the upcoming number two version of the toilet will help detect tumor DNA and viral RNA to help them track the spread of diseases like COVID-19. Dr. Gambhir told NakedSecurity his team is working to customize the toilet’s tests to fit a user’s individual needs. For example, a diabetic’s smart toilet could monitor glucose in the urine. Or if a person with a family history of bladder or kidney cancer could benefit by having a smart toilet that monitors for blood. The Stanford researchers tested the toilet and more than half of their pilot test subjects were comfortable using the extra-smart toilet. 37% were “somewhat comfortable.” 15% were “very comfortable” with the idea of “baring it all in the name of precision health.rb- Salvador DaliUsing analprints to match your poo with you is based on “work” by 20th-century surrealist painter Salvador Dali. Stanford’s Gambhir pointed out in an interview with Bioengineering that Dali studied anal creases for his unconventional erotic art (NSFW). Dr. Gambhir’s assurances that the health data would be stored with “privacy protections” in “secure, cloud-based systems.” Followers of the Bach Seat know that cloud-based systems is also known as “somebody else’s computer.” That sounds like a bad idea. We know cloud-based storage can be very leaky. And healthcare systems have come under increased attack during the COVID pandemic. The Feds could track people around coming and goingAnother problem with the ultra-smart toilet. When the FBI gets hold of this data, they could literally be up in everybody’s business. The Feds could track people around the world coming and going by adding analprints to their massive facial recognition surveillance database. Dr. Gambhir is quoted by NakedSecurity, 

We have taken rigorous steps to ensure that all the information is de-identified when it’s sent to the cloud and that the information – when sent to health care providers – is protected under [HIPAA],… 

NakedSecurity points out that time and time again Big Data can be dissected, compared, and contrasted to draw inferences about individuals. In other words, it’s not hard to re-identify people from anonymized records, be they records pertaining to location tracking, faceprints, or now-anuses. Dr. Gambhir reminds us all that while the Stanford Precision Health ultra-smart Toile has clear benefits as a diagnostic tool, it should not be a replacement for a doctor.

Stay safe out there!

Related article   Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

What You Need to Know About Zoom

Updated 12/01/2020 – Zoom has agreed to settle allegations (PDF) made by the US Federal Trade Commission (FTC) that it “engaged in a series of deceptive and unfair practices that undermined the security of its users.” Among the charges were that Zoom misled users by:

The settlement does not require Zoom to admit fault or pay a fine – So they got away with it.

Updated 05/01/2020 – Zoom made a big splash when CEO Eric Yuan claimed the video conferencing firm had surpassed 300 million daily Zoom meeting users last week. That’s impressive growth in the face of security and privacy holes documented on the Bach Seat and around the Intertubes.

Well in a Zoom tradition they “back-tracked” that announcement, just like they back-tracked their definition of “end-to-end encryption.” Zoom artificially inflated the number of users by counting meeting participants as “users” and “people.” 

Daily meeting participants can be counted multiple times – if you have four Zoom meetings in a day then you’re counted four times. SVCOnline explains that by calling meeting participants “daily users” makes Zoom usage seem larger than it is. The term most companies use to measure service usage is a daily active user (DAU). A DAU is counted once per day. 

Updated 04/08/2020 -Zoom now faces four lawsuits over its security and privacy practices. Today,  Google has banned employees from using Zoom, joining NASA, SpaceX, NYC schools, Clark County (Las Vegas) schools. the governments of Germany and Taiwan as well as Apple.

Updated 04/07/2020Reports of a new blow to Zoom’s security cred’s researchers have discovered up to 15,000 private Zoom recordings exposed online. Many of them were apparently stored in Amazon Web Services (AWS) S3 buckets without passwords.

What You Need to Know About Zoom

Zoom has taken off. Thanks to the global COVID-19 lock-down Zoom’s (ZM) stock has surged over 250% on the NASDAQ since October 2019. Zoom’s video conferencing platform daily usage has exploded from 10 million in December 2019 to more than 200 million in March 2020.

Zoom logo

After its stock price run-up and exploitation of the COVID-19 pandemic Zoom has come under intense scrutiny. The FBI issued a warning about using Zoom. The New York Attorney General’s office sent a letter to Zoom about its practices. Security professionals have found a disturbing list of flaws on Zoom. Here is a brief list of the risks you take when using Zoom.

Zoom Risks

Phishing – Security firm Check Point Software says criminals are waging phishing campaigns with Zoom-related themes as a lure. The phishing emails that Check Point has observed spoof Zoom login pages and attempt to get victims to input their credentials. The Zoom credentials are then harvested by the attackers. Also, Check Point has also uncovered malicious files with names that include “zoom” in the title. 

Encryption

Phony end-to-end encryption – Zoom uses misleading advertising to claim that its meetings use “end-to-end encryption,” according to The Intercept. Zoom uses the term end-to-end encryption” incorrectly. Zoom admitted their definitions of “end-to-end” and of “endpoint” are different from everyone else’s. A spokesperson told The Intercept, “When we use the phrase ‘End to End … it is in reference to the connection being encrypted from Zoom endpoint to Zoom endpoint.

Unlike Apple, Zoom’s data is only encrypted when it travels back and forth from an end-user to a Zoom server. Your data is decrypted at the Zoom server. Zoom (or TLA) can see and hear whatever is going on in its meetings. Zoom Chief Product Officer Oded Gal wrote:

We recognize that there is a discrepancy between the commonly accepted definition of end-to-end encryption and how we were using it.

The Intercept concludes that Zoom doesn’t decrypt user transmissions — but it could.

What You Need to Know About Zoom

Zoom bombing – Zoom bombing occurs when a third party interrupts or takes over a video conference. Anyone can “bomb” a public Zoom meeting. All they need is the meeting number. Attackers can use the file-share to post shocking images or make annoying sounds in the audio. The host of the Zoom meeting can kick out troublemakers, but they can come right back with new user IDs The FBI issued a warning about zoom bombing.

To prevent Zoom bombing do not share Zoom meeting numbers with anyone but the intended participants. Also require participants to use a password to log into the meeting.

Windows password stealing
Bleeping Computer reports that malicious users can use the Zoom side chats to post a Universal Naming Convention (UNC) link that points to a remote server. From there the victim’s Windows computer will try to reach out to the hacker’s remote server specified in the path. From there the PC will automatically try to log in with the user’s Windows username and password. The attacker could capture the password “hash” and decrypt it, giving them access to the Zoom user’s Windows account.

Windows malware injectionWindows malware injection – The same flaw allows a hacker to insert a UNC path to a remote executable malicious file into a Zoom meeting. If a Zoom user running Windows clicks on it, the computer will try to load and run the malicious software. The victim will be prompted to authorize the software to run, which will stop some hacking attempts but not all.

Apple iOS profile sharing – Zoom sends iOS user profiles to Facebook. This is done with the “log in with Facebook” feature in the iPhone and iPad Zoom apps. After Motherboard exposed the practice, Zoom said it hadn’t been aware of the profile-sharing. Zoom’s initial response was to blame the social network’s software development kit used in the Zoom software. CNet concludes that Zoom shares enough personal data that it qualifies as selling your data

Mac malwareMalware-like behavior on Macs – Zoom was caught using hacker-like methods to bypass normal macOS security. It was thought this flaw had been fixed. But security researcher Felix Seele noticed that Zoom installed itself on his Mac without the usual user authorization.

The application is installed without the user giving his final consent and a highly misleading prompt is used to gain root privileges. The same tricks that are being used by macOS malware.

A backdoor for Mac malware – Patrick Wardle, a former NSA hacker and now principal security researcher at Jamf said in a blog post that Zoom used a discontinued installation process. The deprecated process could allow malware to add malicious code to “escalate privileges.” This would allow an attacker to gain total control over the machine without knowing the administrator’s password

Zoom privacy issues

CSO Online reports that he demonstrated the backdoor. He installed a malicious script into the Zoom Mac client. This could give any piece of malware access to the Mac’s webcam and microphone. It would turn any Mac with Zoom into a spying device.

Leaks of email addresses and profile photos – Zoom automatically puts everyone sharing the same email domain into a “company” folder where they can see each other’s information. If you are not a user of large webmail clients like Gmail, Yahoo, Hotmail, or Outlook.com, you could end up in a “company” with dozens of strangers.

Data leakSharing of personal data with advertisers – Privacy experts for Consumer Reports reviewed Zoom’s privacy policy and found that it gave Zoom the right to use Zoom users’ personal data and to share it with third-party marketers. In a blog, Aparna Bawa, Zoom’s chief legal officer, claimed “we do not sell your personal data.” The lawyer definitely concluded, “We are not changing any of our practices.” But we don’t know the details of Zoom’s business dealings with third-party advertisers.

Cloud snitching – For paid subscribers, Zoom’s cloud recording feature can be a problem waiting to happen.  Mashable points out that any time Zoom is used, your person-to-person chat messages are saved and could be sent to your boss by any authorized user. CNet notes that Zoom administrators can limit the recording’s accessibility by IP addresses – but this is not enabled by default.

Tattle-tale attention-tracking feature – Zoom’s attention-tracking feature allows the meeting host to monitor if you are paying attention to their PowerPoint deck. The Zoom desktop client or mobile app alerts the host if any attendees go more than 30 seconds without Zoom being in focus on their screen.

rb-

I agree with those who are calling Zoom’s development processes lazy  As you can see  – Zoom’s software development process creates a huge attack surface.

Tom’s Guide is tracking the status of Zoom’s problems.  So is  Zoom safe to use?  – That is your call. – You need to make an informed decision and patch your Zoom software.

Zoom CEO Eric Yuan

You should be suspicious of “free” products. As in the case of Google and Facebook, you are the product for Zoom. They are monetizing you. Follow the money.

Eric Yuan, the founder, and CEO of Zoom is profiting by using your info. His personal wealth has increased 112% to $7.57 billion in the past three months, as the use of Zoom skyrockets amid the pandemic. While the other 99%f the world braces for a global recession.

How does he get all of that money on free software?

 

Stay safe out there!

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

RSA Sold

RSA SoldThe rumor mill was again right. During the holidays I wrote about Dell Technologies selling its RSA cybersecurity business. The encryption pioneer is being purchased by private equity firm Symphony Technology Group Partners (STG). The STG consortium includes the Ontario Teachers’ Pension Plan Board and AlpInvest Partners.

private equity firmSTG is based in Palo Alto, CA, and was founded in 2002. According to its website, the VC firm focuses on data, software, and analytics. STG entered the cybersecurity arena in April 2019 when they bought RedSeal, a cyber risk modeling firm in a $70M deal.

RSA Sold for $2B

The deal is expected to close in the next six to nine months. Financial terms were not disclosed, but multiple sources peg the all-cash deal at $2.08 billion.

In a prepared statement about the deal, William Chisholm, managing partner at Symphony Technology Group, said:

We are excited and fully committed to maximizing the power of RSA’s talent, expertise, and tremendous growth potential and continuing RSA’s strategy to serve customers with a holistic approach to managing their digital risk.

Rohit Ghai, president of RSA wrote:

Symphony Technology Group … independent configuration, we expect to be in an even better position to accelerate innovation, ensure customer success with our portfolio…

Dell Technology’s chief operating officer and vice chairman Jeff Clarke wrote in the post announcing the deal:

The strategies of RSA and Dell Technologies have evolved … different go-to-market models. The sale of RSA gives us greater flexibility to focus on integrated innovation across Dell Technologies.

rb-

CRN notes that the purchase price for the STG deal is nearly identical to the $2.1B EMC paid to buy RSA back in 2006. RSA then moved to Dell Technologies in 2016 when Dell purchased EMC for $60B. But why did Dell sell RSA?

  • Dell seems to be sinking a lot of money into Secureworks.
  • 2 billion dollarsDell’s VMware just bought CarbonBlack, why not RSA?
  • RSA was founded “way back in 1982.” And being a “legacy security firm” RAS may be seen at VMware as being part of VMware CEO Pat Gelsinger’s “Security is broken” talking point. Can companies face age discrimination too?
  • Maybe Dell just needs the cash.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

EULA – The Biggest Lie on the Web

EULA - The Biggest Lie on the WebTuesday, January 28, 2020, is international Data Privacy Day (DPD). The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices. One privacy best practice is to actually read the end-user license agreements (EULA) that come with everything you download from the Internet.

ead the end-user license agreements (EULA)If you can’t wade through the legal gibberish telling you they are going to sell all your data to someone you never heard of? I don’t blame you – two law professors analyzed the terms and conditions of 500 popular U.S. websites and found that more than 99% of them were “unreadable,” far exceeding the level most American adults read at but are still enforced. The researchers wrote that the average readability level of the EULA agreements they reviewed was comparable to articles in academic journals – take a look at “Terms of Service; Didn’t Read (ToS;DR).

EULA grades

ToS;DR is a project started to help fix the “biggest lie on the web”: almost no one really reads the terms of service we agree to all the time. The service grades website EULA’s from Amazon to Zappos from A (best) to E (worst) once a comprehensive list of cases has been reviewed by volunteers. Some of the ratings are:

  • grades websites from Amazon to ZapposA – The best terms of services: they treat you fairly, respect your rights, and will not abuse your data.
  • B – The terms of services are fair towards the user but they could be improved.
  • C – The terms of service are okay but some issues need your consideration.
  • D The terms of service are very uneven or there are some important issues that need your attention.
  • E The terms of service raise very serious concerns.
  • No Class Yet ToS;DR has not sufficiently reviewed the terms yet.

Here are the privacy ratings of the FAANG largest websites according to ToS;DR:

There are a few sites that respect users privacy and get a Class A rating from ToS;DR:

  1. DuckDuckGo search engineDuckDudkGo (Search engine),
  2. Kolab Now (Email/groupware),
  3. SeenThis (Advertising),
  4. WindowsLogic Productions (Software developer).

Other well-known sites with ToS;DR ratings:

  1. IMDb = Class C,
  2. YouTube = Class D,
  3. Twitter = Class D,
  4. Stack Overflow Class E.

You can download the ToS;DR:browser extensions here.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Stop Using These Passwords Now

Stop Using These Passwords NowThe annual list of the worst passwords is out. People are lazy and still use the same old compromised passwords. Not much has changed since 2018, 2017, or 2016. SplashData’s 9th annual list of worst passwords looked at 5 million passwords that were leaked in various data breaches in 2019 and found that 123456 is still the most frequently used password.

Some other interesting password factoids from the survey include:

  • SplashData logopassword has been knocked out of the top two spots for the first time in the list’s history.
  • Simple patterns using contiguous keys on the keyboard like 1q2w3e4r, qwertyuiop, and !@#$%^&* are new for 2019. They may seem complex but will not fool attackers.
  • QWERTY is a big mover in 2019. qwerty moved up 6 places to #3 in 2019 and qwerty123 moved up 13 spots to #13 in 2019.
  • After making his debut on the 2018 annual list “donald” fell to #34 on the most dangerous password to use.

RankPasswordChange
1123456(Rank unchanged from 2018)
2123456789(up 1)
3qwerty(Up 6)
4password(Down 2)
51234567(Up 2)
612345678(Down 2)
712345(Down 2)
8iloveyou(Up 2)
9111111(Down 3)
10123123(Up 7)
11abc123(Up 4)
12qwerty123(Up 13)
131q2w3e4r(New)
14admin(Down 2)
15qwertyuiop(New)
16654321(Up 3)
17555555(New)
18lovely(New)
197777777(New)
20welcome(Down 7)
21888888(New)
22princess(Down 11)
23dragon(New)
24password1(Unchanged)
25123qwe(New)

Morgan Slain, CEO of SplashData, told Gizmodo,

Our hope … is to convince people to take steps to protect themselves online, and we think these and other efforts are finally starting to pay off. We can tell that over the years people have begun moving toward more complex passwords, though they are still not going far enough as hackers can figure out simple alphanumeric patterns.

rb-

So how can you keep your online personal information safe?

  1. how can you keep your online personal information safe?Make sure none of your passwords are on SplashData’s worst passwords of the year list. If they are log on and change them immediately. See the full 100 worst passwords on SplashData’s site.
  2. Use two-factor authentication, whenever possible. Even if a hacker has your password, they won’t have that random code and therefore won’t be able to get into your account. Not sure if your favorite website supports two-factor authentication, search the Two Factor Auth List to find out.
  3. Consider a password manager. Your brain is no longer an adequate password manager. SplashData makes several password managers SplashIDTeamsID, and Gpass depending on your needs.

Related article

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.