FBI tried and failed to unlock 7,000 encrypted devices

In an 11-month period, the FBI failed to gain access to around 7, 000 encrypted mobile devices, BBC News reports , which is about half of those targeted by the agency according to FBI Director Christopher Wray. In a speech given at the Association of Chiefs of Police conference yesterday, he said that device encryption was “a huge, huge problem, ” for the agency. The FBI publicly went after Apple following the 2015 San Bernardino terror attack as it sought access to the shooter’s locked iPhone 5c — a request that Apple staunchly refused . It eventually got around the issue by paying an undisclosed vendor reportedly $900, 000 for software that gave the agency access to the phone. While that incident garnered a lot of attention, it certainly wasn’t the first time the FBI made it clear that encrypted smartphones were a headache for the agency. In 2014, then Director James Comey said that secure communications could lead to “a very dark place” and called on Congress to change the Communications Assistance for Law Enforcement Act accordingly. Further, while the FBI presented the San Bernardino attacker’s phone as a special case of national security, the Wall Street Journal reported that the Department of Justice was pursuing nine similar requests around the same time. Wray said at the conference, “I get it, there’s a balance that needs to be struck between encryption and the importance of giving us the tools we need to keep the public safe.” But as cybersecurity expert Alan Woodward told BBC News , encryption is here to stay. “Encryption that frustrates forensic investigations will be a fact of life from now on for law enforcement agencies, ” he said. “Even if the equipment manufacturers didn’t build in such encryption it would be possible to obtain software that encrypted data in the same way.” Source: BBC News

View the original here:
FBI tried and failed to unlock 7,000 encrypted devices

Accenture left four servers of sensitive data completely unprotected

UpGuard has yet again uncovered a trove of corporate data left unprotected, this time from major consulting and management firm Accenture . The data — contained on four cloud-based storage servers — were discovered by UpGuard Director of Cyber Risk Research Chris Vickery in mid-September and weren’t protected by a password. Anyone with the servers’ web addresses could download the stored information, which included decryption keys, passwords and customer info. And Accenture’s client list includes a number of large companies. On its website , Accenture says its clients “span the full range of industries around the world and include 94 of the Fortune Global 100 and more than three-quarters of the Fortune Global 500.” UpGuard says that the information stored on the unprotected servers could have been used to attack Accenture itself as well as a number of its clients and Vickery told ZDNet that the data amounted to the “keys to the kingdom.” In a blog post about the exposure, UpGuard said, “Taken together, the significance of these exposed buckets is hard to overstate. In the hands of competent threat actors, these cloud servers, accessible to anyone stumbling across their URLs, could have exposed both Accenture and its thousands of top-flight corporate customers to malicious attacks that could have done an untold amount of financial damage.” This data exposure is just the latest to be sniffed out by cybersecurity firm UpGuard. Other recent discoveries by the company include Election Systems & Software’s exposure of 1.8 million Chicago residents’ personal information, Deep Root Analytics’ leak of nearly 200 million US citizens’ data, the release of 14 million Verizon customers’ info by Nice Systems and exposure of classified intelligence data by a US defense contractor. In light of these repeated mishandlings of sensitive data, it’s becoming increasing clear that major companies need to take a serious look at their cybersecurity practices. UpGuard quickly notified Accenture after discovering the exposed data and the company secured the servers soon thereafter. Accenture also said that UpGuard was the only non-authorized visitor to access the servers. Accenture told ZDNet , “We closed the exposure when the Amazon Web Services S3 issue was first reported. As we continue our forensic review we may learn more but, the email and password information in the database is more than two and a half years old and for Accenture users of a decommissioned system.” Source: UpGuard

Read the article:
Accenture left four servers of sensitive data completely unprotected

Chicago School Official: US IT Jobs Offshored Because ‘We Weren’t Making Our Own’ Coders

theodp writes: In a slick new video, segments of which were apparently filmed looking out from Google’s Chicago headquarters giving it a nice high-tech vibe, Chicago Public Schools’ CS4ALL staffers not-too-surprisingly argue that creating technology is “a power that everyone needs to have.” In the video, the Director of Computer Science and IT Education for the nation’s third largest school district offers a take on why U.S. IT jobs were offshored that jibes nicely with the city’s new computer science high school graduation requirement. From the transcript: “People still talk about it’s all offshored, it’s all in India and you know, there are some things that are there but they don’t even realize some of the reasons that they went there in the first place is because we weren’t making our own.” Read more of this story at Slashdot.

Originally posted here:
Chicago School Official: US IT Jobs Offshored Because ‘We Weren’t Making Our Own’ Coders

Hackers Vandalize Vegas Pool Party Club in ‘All Out War’

From a CNET report: Next to DJ Tiesto’s loud image on Wet Republic’s website sits a photo of a bikini model with a beard and an eye patch, with a simple message: “It’s all out war.” Not exactly the type of message you’d expect from a spot that advertises itself as a dance club that doubles as a pool party, but when hackers are in town for Defcon, everything seems to be fair game. The hacker convention, which is in its 25th year in Las Vegas, typically has hotels on alert for its three days of Sin City talk, demos and mischief. Guests are encouraged not to pick up any flash drives lying around, and employees are trained to be wary of social engineering — that is, bad guys pretending to be someone innocent and in need of just a little help. Small acts of vandalism pop up around town. At Caesars Palace, where Defcon is happening, the casino’s UPS store told guests it was not accepting any print requests from USB drives or links, and only printing from email attachments. Hackers who saw this laughed, considering that emails are hardly immune from malware. But the message is clear: During these next few days, hackers are going to have their fun, whether it’s through a compromised Wi-Fi network or an open-to-mischief website. Wet Republic’s site had two images vandalized, both for the “Hot 100” party with DJ Shift. The digital graffiti popped up early Friday morning, less than 24 hours after Defcon kicked off. Read more of this story at Slashdot.

View post:
Hackers Vandalize Vegas Pool Party Club in ‘All Out War’

Sweden Accidentally Leaks Personal Details of Nearly All Citizens

An anonymous reader quotes a report from The Hacker News: Swedish media is reporting of a massive data breach in the Swedish Transport Agency (Transportstyrelsen) after the agency mishandled an outsourcing deal with IBM, which led to the leak of the private data about every vehicle in the country, including those used by both police and military. The data breach exposed the names, photos and home addresses of millions of Swedish citizen, including fighter pilots of Swedish air force, members of the military’s most secretive units, police suspects, people under the witness relocation program, the weight capacity of all roads and bridges, and much more. The incident is believed to be one of the worst government information security disasters ever. In 2015, the Swedish Transport Agency hand over IBM an IT maintenance contract to manage its databases and networks. However, the Swedish Transport Agency uploaded IBM’s entire database onto cloud servers, which covered details on every vehicle in the country, including police and military registrations, and individuals on witness protection programs. The transport agency then emailed the entire database in messages to marketers that subscribe to it. And what’s terrible is that the messages were sent in clear text. When the error was discovered, the transport agency merely thought of sending a new list in another email, asking the subscribers to delete the old list themselves. Read more of this story at Slashdot.

See the original post:
Sweden Accidentally Leaks Personal Details of Nearly All Citizens

Author of Original Petya Ransomware Publishes Master Decryption Key

An anonymous reader writes: The author of the original Petya ransomware — a person/group going by the name of Janus Cybercrime Solutions — has released the master decryption key of all past Petya versions. This key can decrypt all ransomware families part of the Petya family except NotPetya, which isn’t the work of Janus, but is believed to be the work of a nation-state actor that targeted Ukraine. Most (original) Petya campaigns happened in 2016, and very few campaigns have been active this year. Users that had their files locked have wiped drives or paid the ransom many months before. The key will only help those victims who cloned their drives and saved a copy of the encrypted data. Experts believe that Janus released Petya’s decryption key as a result of the recent NotPetya outbreak, and he might have decided to shut down his operation to avoid further scrutiny, or being accused of launching NotPetya. Read more of this story at Slashdot.

Continue Reading:
Author of Original Petya Ransomware Publishes Master Decryption Key

Germany Says Cyber Threat Greater Than Expected, More Firms Affected

From a Reuters report, shared by a few readers on Twitter: Germany’s BSI federal cyber agency said on Friday that the threat posed to German firms by recent cyber attacks launched via a Ukrainian auditing software was greater than expected, and some German firms had seen production halted for over a week. Analyses by computer experts showed that waves of attacks had been launched via software updates of the M.E.Doc accounting software since April, the BSI said in a statement. Read more of this story at Slashdot.

Read more here:
Germany Says Cyber Threat Greater Than Expected, More Firms Affected

Equal Rights Center Sues Uber For Denying Equal Access To People Who Use Wheelchairs

The Equal Rights Center is suing Uber, alleging that the company has chosen not to include wheelchair-accessible cars as an option in its standard UberX fleet of vehicles, and excludes people who use wheelchairs in Washington, D.C. According to the lawsuit, Uber is in violation of Title 3 of the Americans with Disabilities Act and the D.C. Human Rights Act. TechCrunch reports: After conducting its own investigation of Uber’s services for people in wheelchairs, the ERC found that passengers had to wait an average of eight times longer for an accessible car to arrive. They also had to pay twice as much in fares, according to the ERC’s study. Ultimately, the ERC wants Uber to integrate wheelchair accessible cars into its UberX fleet so that people who use wheelchairs don’t have to wait longer and pay more to use the car service. Uber said in a statement provided to TechCrunch: “We take this issue seriously and are committed to continued work with the District, our partners, and stakeholders toward expanding transportation options and freedom of movement for all residents throughout the region.” Read more of this story at Slashdot.

View the original here:
Equal Rights Center Sues Uber For Denying Equal Access To People Who Use Wheelchairs

Sci-Hub Ordered To Pay $15 Million In Piracy Damages

An anonymous reader quotes a report from TorrentFreak: Two years ago, academic publisher Elsevier filed a complaint (PDF) against Sci-Hub and several related “pirate” sites. It accused the websites of making academic papers widely available to the public, without permission. While Sci-Hub is nothing like the average pirate site, it is just as illegal according to Elsevier’s legal team, who obtained a preliminary injunction from a New York District Court last fall. The injunction ordered Sci-Hub’s founder Alexandra Elbakyan to quit offering access to any Elsevier content. However, this didn’t happen. Instead of taking Sci-Hub down, the lawsuit achieved the opposite. Sci-Hub grew bigger and bigger up to a point where its users were downloading hundreds of thousands of papers per day. Although Elbakyan sent a letter to the court earlier, she opted not engage in the U.S. lawsuit any further. The same is true for her fellow defendants, associated with Libgen. As a result, Elsevier asked the court for a default judgment and a permanent injunction which were issued this week. Following a hearing on Wednesday, the Court awarded Elsevier $15, 000, 000 in damages, the maximum statutory amount for the 100 copyrighted works that were listed in the complaint. In addition, the injunction, through which Sci-Hub and LibGen lost several domain names, was made permanent. Read more of this story at Slashdot.

Visit site:
Sci-Hub Ordered To Pay $15 Million In Piracy Damages

AI film editor can cut scenes in seconds to suit your style

AI has won at Go and done a few other cool things, but so far it’s been mighty unimpressive at harder tasks like customers service , Twitter engagement and script writing . However, a new algorithm from researchers at Stanford and Adobe has shown it’s pretty damn good at video dialogue editing, something that requires artistry, skill and considerable time. The bot not only removes the drudgery, but can edit clips using multiple film styles to suit the project. First of all, the system can organize “takes” and match them to lines of dialogue from the script. It can also do voice, face and emotion recognition to encode the type of shot, intensity of the actor’s feelings, camera framing and other things. Since directors can shoot up to 10 takes per scene (or way more , in the case of auteurs like Stanley Kubrick), that alone can save hours. However, the real power of the system is doing “idiom” editing based on the rules of film language. For instance, many scenes start with a wide “establishing” shot so that the viewer knows where they are. You can also use leisurely or fast pacing, emphasize a certain character, intensify emotions or keep shot types (like wide or closeup) consistent. Such idioms are generally used to best tell the story in the way the director intended. All the editor has to do is drop their preferred idioms into the system, and it will cut the scene to match automatically, following the script. In an example shown (below), the team selected “start wide” to establish the scene, “avoid jump cuts” for a cinematic (non-YouTube) style, “emphasize character” (“Stacey”) and use a faster-paced performance. The system instantly created a cut that was pretty darn watchable, closely hewing to the comedic style that the script was going for. The team then shuffled the idioms, and it generated a “YouTube” style that emphasized hyperactive pacing and jump cuts. What’s best (or worst, perhaps for professional editors) is that the algorithm was able to assemble the 71-second cut within two to three seconds and switch to a completely different style instantly. Meanwhile, it took an editor three hours to cut the same sequence by hand, counting the time it took to watch each take. The system only works for dialogue, and not action or other types of sequences. It also has no way to judge the quality of the performance, naturalism and emotional beats in take. Editors, producers and directors still have to examine all the video that was shot, so AI is not going to take those jobs away anytime soon. However it looks like it’s about ready to replace the assistant editors who organize all the materials, or at least do a good chunk of their work. More importantly, it could remove a lot of the slogging normally required to edit, and let an editor see some quick cuts based on different styles. That would leave more time for fine-tuning, where their skill and artistic talent are most crucial. Source: Stanford

See original article:
AI film editor can cut scenes in seconds to suit your style