More stories

  • in

    Brazil advances efforts to tackle electronic fraud

    The Brazilian government has created a special commission aimed at tackling electronic fraud.

    Created by the Ministry of Justice (MoJ) under the National Consumer Defense Council, the commission will include representatives of antitrust regulator Cade, as well as the National Confederation of Commerce, the consumer defense bodies from the states of São Paulo, Tocantins and Porto Alegre, the Federal Public Defender’s Office, and the the Central Bank. This commission follows the recent creation of a working group, which is providing an assessment of the current online fraud landscape. The working group has the involvement of bodies such as the Brazilian Federation of Banks (Febraban) and the Central Bank.According to the MoJ, the working group will publish a final report listing proposals for combatting online fraud. The group is also due to meet with the National Data Protection Authority.In September, the MoJ started negotiations with Febraban about creating a National Cybercrime Strategy. According to Febraban, the discussions are informed by the National Strategy Against Corruption and Money Laundering, which is led by the Ministry of Justice and has been in place since 2003.The idea is to “expand the identification and repression” of the actors responsible for cybercrimes, the commission said. Other goals include jointly developing platforms for sharing fraud data, training security forces in cybersecurity and digital fraud issues, and leading public awareness campaigns on cyber risks and fraud. More

  • in

    VP Harris announces US support for international cybersecurity partnership in Paris

    US Vice President Kamala Harris said the US will be joining the Paris Call for Trust and Security in Cyberspace — a voluntary agreement between more than 80 countries, local governments and tech companies centered on advancing cybersecurity and “preserving the open, interoperable, secure, and reliable Internet.”The announcement was part of a diplomatic trip Harris made to Paris, where she met with French President Emmanuel Macron to discuss a range of issues. Macron spearheaded the creation of the initiative in 2018 and has long sought the inclusion of the US. But the administration of former President Donald Trump refused to join, criticizing it because both China and Russia also were not part of it. In a statement, The White House said the US “looks forward to continued partnership with France and other governments, private sector, and civil society around the world to advance and promote norms of responsible behavior in cyberspace.”  “This includes working with likeminded countries to attribute and hold accountable States that engage in destructive, disruptive, and destabilizing cyber activity. The United States’ decision to support the Paris Call reflects the Biden-Harris Administration’s priority to renew and strengthen America’s engagement with the international community on cyber issues,” The White House explained. “The United States interprets the Paris Call consistent with our existing domestic and international obligations and commitments, including the importance we place on respecting human rights, freedom of expression and privacy. This announcement builds on the United States’ continuing work to improve cybersecurity for our citizens and business, including rallying G7 countries to hold accountable nations that harbor cyber criminals, supporting the update of NATO cyber policy for the first time in seven years, and the recent counter-ransomware engagement with over 30 countries around the world to accelerate international cooperation to combat cybercrime.”The Paris Call is made up of nine principles, which include protecting individuals and infrastructure, protecting the internet, defending electoral processes, defending intellectual property, the non-proliferation of malicious software, lifecycle security, cyber hygiene, banning private actors from “hacking back,” and implementing international norms “of responsible behavior.”

    The effort has already led to some changes across Europe and South America that allowed for tougher cybersecurity measures around emergency phone systems, the protection of domain name systems, more prominent bug bounty programs and more. Before Harris left for Paris, two senior leaders in Congress — Senate Foreign Relations Committee chairman Robert Menendez and House Foreign Affairs Committee chairman Greg Meeks — wrote a letter to her urging for the US to join the Paris Call. “Given the recent surge of ransomware and other cyberattacks against the United States and our partners and allies, the Forum’s work on cybersecurity is essential. Cybersecurity is a critical economic and national security imperative, and confronting this challenge will require comprehensive and sustained US engagement with a wide range of stakeholders,” the two wrote. “In particular, private-sector companies play an increasingly significant role, including through the Paris Peace Forum and its Paris Call for Trust and Security in Cyberspace. We welcome your commitment to engage with our allies and partners, private-sector companies, and other important stakeholders at the Paris Peace Forum.” More

  • in

    Cybersecurity education company touts 3 to 6 month program for unemployed veterans

    Cybersecurity education company Cybint is doing its part to address veteran unemployment — which stands at 11% right now — and the cybersecurity talent shortage through a new 3 to 6 month program that trains novices in all things security. Texas has more than 42,000 open cybersecurity positions, one of the highest rates in the country. Cybint is partnering with universities and colleges like Houston Baptist University to offer the Cybint cybersecurity bootcamp to military and veteran students. Roy Zur, Cybint’s CEO, told ZDNet he was inspired to start the program by his time in the Israeli military, where he was part of a cybersecurity unit that re-skilled 18-year-old cadets who recently joined the army. Within six months, they were able to train people with no cybersecurity knowledge in a variety of security topics, and Zur eventually brought the method to the US after 10 years in the army. Also: Getting military veterans jobs in IT and cybersecurity”I wanted to bring this concept of re-skilling people, those that are very early in their career or are career shifters. Veterans are a big part of this population in the US, and after they finish their career in the military, we want to allow them to switch to other careers,” Zur said. “Some people think that cybersecurity is this mysterious thing that you need years of practice to get into. But eventually, if you simplify it, it’s about protecting data from different perspectives and protecting networks.”Zur explained that Cybint’s educational programs range from full-time three month courses to six month part-time courses, all of which draw heavily from the National Institute of Standards and Technology’s frameworks. 

    The bootcamp is divided into several pillars covering a variety of topics including protecting and defending, analyzing, investigating, and more. “By the end of the program, the graduates finish with skills in different aspects of network security, SOC analysis, SOC management, some basic aspects of malware analysis, and different aspects of forensics. They have a broad view of cybersecurity and, specifically, the hands-on skills of an entry-level security defender,” Zur said. “It’s not necessarily just for veterans, but veterans acquired great skills and experience in their military career. They have experience working under pressure and working in different environments. Most of them also have security clearances, which are important in cybersecurity. “We’ve also seen there is a significant rate of unemployment among veterans. The US government, different authorities and the military all want to help solve this problem. So it’s kind of like a win-win-win situation for everyone.”Also: VA releases new cybersecurity strategy in honor of Veterans DayZur’s goal is to partner with even more institutions, community colleges, and public universities to offer Cybint’s courses and bootcamps to students interested in cybersecurity. Ariel Julius Lee, a Cybint student and Marine Corps Veteran, said he started the program with little knowledge of the field of cybersecurity but noted that the bootcamp presented each topic for beginners. He told ZDNet the labs were especially helpful because they gave him an opportunity to apply the concepts covered by the instructors in practice. “While they have been challenging, they have helped me in reframing my approach to problem-solving. This has been the best aspect of the program thus far because implementing something you learned in practice, first-hand, is the best way to study,” Lee said.  “This bootcamp inspired me to pursue a career in the field of cybersecurity and boosted my confidence that I will be able to succeed in it.”Ethan Schellingerhout, another veteran who took part in the program, said it gave him a hands-on overview of cybersecurity through its labs and bettered his presentation skills through its research projects. It also helped prepare him for CompTIA Security+ exams.William Welch is a professor of computer information technology systems at Central Texas College, which previously hosted some of Cybint’s bootcamps. Many veterans, he said, separate from the service each week and are more than deserving of a chance to start a fresh career. “They exhibit grit, strong technical capability, and seek challenging, vital employment opportunities. The Cybint cybersecurity bootcamps are key as they train these capable veterans to handle and thrive in cybersecurity and technology organizations,” Welch said. Cybint has programs at schools in Illinois, Iowa, Louisiana, and New Hampshire in addition to its Texas locations. More

  • in

    How to delete your Facebook account for good

    Shutterstock
    I think it’s fair to say that most Facebook users have a love/hate relationship with the social network. Facebook makes it incredibly easy to stay in touch with old friends and family members around the world while making new friends with complete strangers in Facebook Groups. But the giant network has made some serious mistakes over the past few years, prompting some to swear off (and probably at) the social network for good. But before you dive into your account settings and delete your account, there are a few housekeeping items you need to do to ensure things like retaining a copy of your personal data, such as pictures you’ve shared on the network, or moving away from Facebook’s login service for apps and websites. It’s also important to note that deactivating your Facebook account doesn’t actually delete it. Also: Why I will never use Zuckerberg’s metaverseThe differences between deactivating and deletingSometimes you just need a break from Facebook. In those instances, deactivating your account is a better option than completely deleting it. Before taking either approach, let’s take a quick look at the differences.Deactivating your Facebook account means you can reactivate it in the future, restoring your account exactly as it was. People won’t be able to search for you, or see your Facebook timeline, while your account is deactivated. Any Facebook Pages you’re in control of will also be deactivated, so make sure you assign admin rights to someone else if it’s critical the Page remains active. A deactivated account will still allow you to access Facebook Messenger. 

    Deleting your Facebook account is a permanent option. Your account and all associated data will be removed from Facebook’s servers within 90 days. If you log back into your account in the first 30 days following your deletion request, however, the request will be canceled and your account will be fully restored. But after that 30-day period, there’s no way to reverse your deletion request; your account and all information will be lost. Deleting your account also removes your access to Facebook Messenger.One more important note: Until Facebook transitions its Oculus platforms away from requiring a Facebook login, deactivating or deleting your account will prevent you from using your Oculus headset. What to do before you delete your Facebook account
    Screenshot by Jason Cipriani/ZDNet
    If you’re set on deleting your Facebook account, take a few minutes to ensure the process goes as smoothly as possible. Facebook has become so intertwined with our online lives that losing your account can lead to some issues. For example, if you use Facebook’s Login service to sign in to apps or services, such as Spotify, you’ll need to edit your login settings to prepare for no longer having access to your Facebook account. In addition to account logins, you’ll want to download a copy of all of the personal data linked to your Facebook account. Start by signing into your Facebook account on a computer and going to your account Settings. Find that by clicking on the down arrow in the top-right corner > Settings & Privacy  > Settings. Using the menu on the left side of the screen, find and select Apps and Websites. You’ll see a list of apps and services that you’ve linked to your Facebook account. If you’re struggling to figure out how to move away from a Facebook login for a specific account, I suggest reaching out to the company’s support department for further instructions. Next, request and download a copy of your Facebook account data. You can do that by visiting this page or manually navigating there by clicking on the arrow at the top of the website followed by Settings & Privacy  > Settings  > Your Facebook Information find the Download Your Information option and click View.Also: Facebook whistleblower: ‘Morally bankrupt’ social giant will have to ‘hook kids’ to growThe next page will present you with a calendar to select the date range of your request. There is an option for All Time if you want all the data associated with your account from the day it was created until the present day. Leave the media quality option set to High, and I suggest leaving the format as HTML. Below the calendar, there will be a list of the various types of information you can request. All of the categories are selected by default — again, I suggest leaving this section as is. Finally, click Create File to send the request to Facebook. Facebook doesn’t provide an estimate on how long it takes to process your request, but I imagine it can take a day or two, depending on how much data you’ve requested. I’m basing that off of my experience when requesting similar information for an old Google account. Once your information is ready, you’ll receive an alert from Facebook telling you know how to download it. You’ll only have a few days to complete the download. Another step you’ll want to take a few days before you delete your account is to let people know you’re leaving Facebook. You can either create a post for your friends to see, or reach out privately to some of your Facebook friends, and let them know of an alternative way to stay in touch with you. Remember, once you delete your account, you’ll also lose access to Facebook Messenger. How to delete your Facebook account
    Screenshot by Jason Cipriani/ZDNet
    Once you’ve received a copy of your information and feel comfortable with your loved ones knowing you’re leaving the site, it’s time to actually do the deed.Visit this page on your computer and login to your Facebook account. Facebook will present you with a list of stuff you need to know. Such as suggesting you deactivate your account instead of deleting it in order to retain access to Messenger, and a reminder to download your information — as well as a list of any Facebook Pages that will also be deleted if you delete your account. Take just a few extra seconds to read through all of that to double-check, and then click on the Delete Account button when you’re ready and enter your password when prompted. Remember, you have 30 days to change your mind. Just login to your account and click on the Cancel Deletion button to restore your account. After 30 days, your account is gone forever.

    Social Networking More

  • in

    VA releases new cybersecurity strategy in honor of Veterans Day

    The Department of Veterans Affairs released a new cybersecurity strategy ahead of Veteran’s Day as a way to better protect the personal information of US veterans as well as to stop the potential corruption of critical data. The VA said cybercriminals have long sought access to veterans’ data for a variety of scams and exploitation, prompting the department to make changes to its security.  In 2006, the organization faced a massive data breach affecting the sensitive information of 26.5 million veterans as well as their spouses and family members.Just last month, the Justice Department sentenced a former medical records technician for the US Army after he was caught accessing personal information from US veterans and using the data to steal millions from benefits sites.While working as a civilian medical records technician and administrator with the US Army at the 65th Medical Brigade, stationed at Yongsan Garrison in South Korea, 40-year-old Fredrick Brown stole names, Social Security numbers, military ID numbers, dates of birth and contact information for thousands of military members. This occurred between July 2014 and September 2015. US Attorney Ashley Hoff noted that many of the veterans targeted in the scheme were disabled or elderly, since they received more service-related benefits.The Department of Veterans Affairs said it developed an entirely new strategy to protect veteran data. It uses new frameworks that outline ways they can protect the VA’s most critical business functions and assets while also making them more resilient. “As we continue to rapidly advance technology across VA, this strategy provides an agile framework to address the challenges of today and adapt to the technologies and threats of tomorrow,” said Secretary of Veterans Affairs Denis McDonough. 

    “This comprehensive approach practices accountability and transparency, while remaining hypervigilant of cyber threats — charting a course for success at the individual and enterprise levels.”On top of securing and protecting the data of the VA and veterans, the new plan includes measures to protect information systems and assets, use innovative measures to strengthen the organization’s cybersecurity, partner with other organizations on best practices, and use risk management frameworks to bolster their cybersecurity goals. Also: Getting military veterans jobs in IT and cybersecurityThe VA added that the new strategy takes into consideration, among other things, “Executive Orders, technological advancements, innovations, and world events that have impacted the way VA delivers services.”Andrew Barratt, vice president at cybersecurity firm Coalfire, said that the VA provides additional assistance to a number of the company’s employees.”We’re pleased to see the VA take steps to formalize a refreshed strategy committing to protecting Veterans’ data. Like many cybersecurity strategies, it is high level in nature and focuses on five critical goals,” Barratt said. Coalfire’s John Dickson added that it’s less about what strategies the VA announces and more about resource allocation and sustained executive focus on cybersecurity. “Given the 2006 public security breach, other organizational security ‘near misses,’ and the VA’s historical approach to cybersecurity, this is one case where actions most certainly speak louder than words,” Dickson said. More

  • in

    Google debuts ClusterFuzzLite security tool for CI, CD workflows

    Google has launched ClusterFuzzLite, a continuous fuzzing solution for improving software supply chain security. 

    On Thursday, Google software engineers Jonathan Metzman and Oliver Chang, together with product lead for Google’s CI/CD products, Michael Winser, said in a blog post that the new tool can run “as part of CI/CD workflows to find vulnerabilities faster than ever before.”Fuzzing is an automated testing technique for finding bugs and unexpected behavior by inputting invalid and random data into programs. This can flag up vulnerabilities or errors that may otherwise go unnoticed through manual analysis.  The new tool, ClusterFuzzLite, is based on ClusterFuzz, an open source scalable fuzzing infrastructure previously released by Google and used as the fuzzing backbone for the OSS-Fuzz program.  According to Google, ClusterFuzzLite can be integrated into existing workflows to fuzz pull requests, improving the chance of vulnerabilities to be found earlier in the development process and before changes are committed.  While ClusterFuzz and ClusterFuzzLite contain some of the same features — including continuous fuzzing, coverage report creation, and sanitizer support — the team says that the main difference is ClusterFuzz is easy to set up with closed source projects, and so developers can make use of it to quickly fuzz their software.  As of now, ClusterFuzzLite supports GitHub Actions, Google Cloud Build, and Prow. 

    “With ClusterFuzzLite, fuzzing is no longer just an idealized “bonus” round of testing for those who have access to it, but a critical must-have step that everyone can use continuously on every software project,” the team said. “By finding and preventing bugs before they enter the codebase we can build a more secure software ecosystem.” Documentation on the tool can be accessed at GitHub.  In February, Google launched the Open Source Vulnerabilities (OSV) website, a platform for open source vulnerability mapping. Previous and related coverage Have a tip? Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0 More

  • in

    CEO-designate of Pegasus spyware's NSO Group resigns after US sanctions

    Multiple Israeli news outlets are reporting that Itzik Benbenisti, the person slated to become the new CEO of controversial spyware company NSO Group, has resigned just two weeks after accepting the role. The Jerusalem Post and Haaretz reported that Benbenisti decided against replacing current CEO Shalev Hulio after the US Commerce Department’s Bureau of Industry and Security added NSO Group to the Entity List “for engaging in activities that are contrary to the national security or foreign policy interests of the United States” last week. NSO Group did not respond to requests for comment, but it did confirm Benbenisti’s decision to Haaretz. His appointment to CEO had been announced on October 31, but he had not started the job yet. 

    Sources told Haaretz that Benbenisti was spooked by the new sanctions as well as recent revelations about the company’s spyware that could lead to legal consequences.The US Commerce Department said NSO Group and another spyware firm called Candiru were added to the list because officials had found “evidence that these entities developed and supplied spyware to foreign governments that used these tools to maliciously target government officials, journalists, business people, activists, academics, and embassy workers.” The Commerce Department noted that the governments given these tools repressed a number of people in other countries, explaining that some authoritarian governments targeted “dissidents, journalists, and activists outside of their sovereign borders to silence dissent.”NSO Group continues to face a barrage of bad headlines over how its Pegasus spyware has been used around the world. Last week, a bombshell report from the University of Toronto’s Citizen Lab and the Associated Press said that even the Israeli government’s own spy agency used the tool to hack the phones of six Palestinian human rights activists. 

    That report followed another about the ruler of the UAE using Pegasus to spy on his ex-wife and her British lawyers. In July, the “Pegasus Project” used information from Amnesty International, the University of Toronto’s Citizen Lab, and Forbidden Stories to uncover that the NSO Group’s spyware was used to target at least 65 business executives, 85 human rights activists, 189 journalists, and at least 600 politicians. Targeted government officials included French President Emmanuel Macron, South African President Cyril Ramaphosa, and Iraqi President Barham Salih. Cabinet ministers from dozens of countries, including Egypt and Pakistan, were also targeted. Last week, on the heels of the sanctions announcement, several US Congress members demanded the State Department further investigate how Pegasus and other spyware is being used to abuse human rights around the world.”As members of Congress deeply concerned with the rising tides of authoritarianism around the world, we have closely tracked the parallel and reinforcing proliferation of commercially distributed surveillance and cyber-intrusion tools. These are extremely sensitive and powerful technologies used by foreign governments against Americans, as well as against journalists and civic activists,” Congress members said in a joint statement. “While recent reporting confirmed that NSO Group’s Pegasus software was used against journalists, human rights activists, and opposition politicians, many others are profiting from this new arms market.”Hulio is planning to stay on as CEO to guide the company through this turbulent period, according to Haaretz.  More

  • in

    Unsupervised AI arrives for quality inspection

    Getty Images/iStockphoto
    Quality in manufacturing is mission critical. AI-powered quality inspection is nothing new, but a joint venture from two big players in manufacturing could markedly improve outcomes and reduce barriers to entry.The new venture is called Lean AI. The technological secret sauce is what’s known as unsupervised AI, which is a cutting edge deep learning technology that doesn’t require massive datasets, months of setup time, or known inspection paradigms to function. The new company is a collaboration between Johnson Electric, which has knowledge and experience in manufacturing, and Cortica Group, which has pioneered unique autonomous AI technology for visual inspection.”With the power of Cortica’s Autonomous AI technology, and JE’s vast knowledge of the market, Lean AI will deliver a product that reduces the cost of human error when it comes to quality inspection in manufacturing and address the vulnerabilities in the current market,” says Karina Odinaev, CEO of Lean AI.The problem is that conventional Deep Learning-Based Quality Assurance Systems can take weeks or months, to deploy and rely on a data scientist or AI experts feeding large manually tagged training sets with thousands of defect image examples. These systems require constant maintenance and re-training for product variations or new cameras.Lean AI is leveraging a newer generation of unsupervised deep learning-based quality assurance technology to get past existing challenges. Its unsupervised system uses unlabeled data, applies predictive quality assurance, and compiles data that increases the speed of deployment and scaling. It’s an open platform, meaning it’s agnostic to camera, defect type, and product. That flexibility marks a big evolution in AI-driven inspection, which is a massive and growing market, particularly with renewed emphasis on efficiency as supply chains are stretched thin.By some estimates, the global machine vision market is currently valued at US$11 billion and is forecast to increase to US$15.5 billion by 2026.”Cortica has developed self-learning AI that is fundamentally different from traditional deep learning systems. Autonomous AI Technology operates like a human brain — it’s not a fixed system; instead, it continuously adapts itself to various scenarios and learns online in real-time. Its technology requires far less computing power, can be deployed at a fraction of the cost, and provides far superior performance outcomes,” says Igal Raichelgauz, Founder and Chairman of Cortica. “Our technology is robust and generic and applicable within a multitude of signal domains such as visual, audio, time series and other domains; visual inspection is only the beginning. Autonomous AI technology is quickly becoming the benchmark for the industry.” More