WITH 3 EASY TIPS - Black Knight IT
Transcription
WITH 3 EASY TIPS - Black Knight IT
WHAT’S INSIDE MONTHLY TECH NEWS FROM BLACK KNIGHT ! VOLUME 040 | March 2015 TechTimes Improve internet security WITH 3 EASY TIPS Disable this feature to stop your Samsung Smart TV from listening to you ENCRYPTION CAN CREATE STORMY WEATHER IN THE CLOUD SPYWARE p or ped f g n i l l L a t s n i e Pr e r a w Spy o Ra v o n e CLOUD TOP 8 CLOUD SECURITY TIPS Encryption in the Cloud Article from: http://www.technewsworld.com/story/81711.html THE CLOUD ENCRYPTION CAN CREATE STORMY WEATHER IN THE CLOUD Encryption has received a lot of attention lately as a solution to the growing data breach problem, but one of the hangups dogging the technology has been its ability to play nice in the cloud. That’s especially true if an organization wants to control the keys by which its data is scrambled and use services offered by a cloud provider beyond simple storage. TRUST BUT KEEP KEYS If a cloud provider can’t decrypt a client’s data, it could break the provider’s antivirus, data loss prevention, file preview and text indexing functions, as well as pose performance challenges. If the cloud provider can’t decrypt your data, the cloud just becomes a dumb bucket. That’s why cloud service providers in the past have had access to users’ data encryption keys. As long as a user trusted their provider, that approach was acceptable, but that’s no longer the case for many organizations. Compliance with regulations requires some businesses to control the keys by which they encrypt their data. Other organizations just don’t want to lose control of their information. If an organization wants to use a cloud provider’s services, it can allow a provider to access its keys. From a security perspective, though, that solution is imperfect. A rogue employee of the cloud provider could abuse those key privileges to peek at, or leak a customer’s data. The solution also opens the door for lawyers or government authorities to snatch the data. Those authorities usually obtain data from a provider through a civil or criminal subpoena. As long as there isn’t a gag order attached to the subpoena -- a rare occurrence except in national security cases -- a customer with control of its encryption keys has a chance to protect their data. 2 “After we receive a subpoena, we inform the customer that we’ve received it, at which time the customer can deny us access to its encryption keys,” Intralinks’ Partridge explained. “If they do that, the only thing we could hand over to the courts is encrypted data. When we’re served with a subpoena for data with a gag order, there’s pretty much nothing we can do but turn over decrypted data without telling the customer.” US Sen. Ed Markey (D-Mass.) released a report exploring the potential hacking of automobile electronics. Meanwhile, Samsung came under fire for its smart TV terms of service agreement, which warns that “if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party through your use of Voice Recognition.” Although new technologies in cars do have benefits such as the potential to improve driver safety and vehicle performance, as vehicles are becoming more connected through electronic systems like navigation, infotainment and safety monitoring tools, but the proliferation of these technologies raises concerns about the ability of hackers to gain access and control to the essential functions and features of those cars and for others to utilize information on drivers’ habits for commercial purposes without the drivers’ knowledge or consent. SOLUTION IN THE CLOUD If auto makers want to mitigate future cyberattacks on their products, they’ll need to focus their security efforts in the cloud, maintains Andreas Mai, director of smart connected vehicles at Cisco. “Cloud services need to assist a vehicle’s threat defense, and remove threats before they reach vehicles,” he told TechNewsWorld. “Misbehaving vehicles and anomalies need to be detected and addressed from the cloud,” he added. “It will simply not be acceptable to vehicle owners to visit a dealer every time a cyberattack needs to be addressed.” However, the situation is worse than Markey imagines and the answer remains elusive even as the need for a solution intensifies,” observed Roger C. Lanctot, associate director of the global automotive practice for Strategy Analytics. “Time to shelve the selfdriving cars until we sort this out,” he told TechNewsWorld. TOO SMART TV The Samsung smart TV furor also attracted a senator’s attention. Sen. Al Franken (D-Minn.) sent a letter to Samsung, as well as fellow smart TV maker LG, asking some pointed questions about the gathering of voice data containing personal information. Samsung said it would respond to Franken’s letter. In the meantime, it clarified its warning, saying that voice commands are captured and sent to third parties only when users conduct searches through its TVs. The third party is Nuance, a service provider that converts a user’s speech into commands the TV can understand. “Monitoring by smart TVs is part of a larger trend towards tracking all kinds of activities and behaviors,” noted Lance Cottrell, chief scientist at Ntrepid. “Location tracking, financial tracking and web tracking also provide very invasive levels of information about us. Increasingly people need to think about what things they really want to keep private,” he told TechNewsWorld, “because it is almost impossible to protect everything without going completely off the grid.” Regulatory compliance requires some businesses to control the keys by which they encrypt their data. Other organizations simply don't want to lose control of their information. However, if an organization wants to use a cloud provider's services, it can allow a provider to access its keys. "Encryption still takes place in the cloud, but it's done with keys managed by the customer," said Todd Partridge, director of product marketing at Intralinks. CLOUD 8 CLOUD SECURITY TIPS TOP 8 CLOUD SECURITY TIPS 1. Back Up Data Locally. It is good practice to create electronic copies for any of your data so you will still be able to access them even when the original is lost or has been corrupted. You should also manually backup your data in an external physical storage drive or device, like a hard disk or a thumb drive. This allows you to access the information when you have poor/no Internet. 2. Avoid Storing Sensitive Info. Keep only those files which you need to access frequently and avoid putting up documents containing passwords for your various online accounts or personally identifiable information such as your credit card numbers, national identification number or home address. If you must include this information in your files, make sure to encrypt them before you upload. 3. Use Services That Encrypt. The easiest way to safeguard your privacy when using cloud storage services is to look for one that offers local encryption for your data. This provides an additional layer of security since decryption will be required before you can be granted access to the data. This can be done using military-grade Advanced Encryption Standard (AES) (256 bits), which FileQuay uses. 4. Use A Strong Password / Apply Two-Step Verification Ensure that your password can stand a hacking or cracking attempt. There are tons of tips on the Internet on what makes for a good password. Aside from going for a strong and unique password, make sure to change it frequently and not repeat it across all other online accounts you have. Alternatively, you should use secure two-step verification for your login if your cloud service offers the option. 5. Encrypt before uploading. Even if you’re already opting for an encrypted cloud service, it wouldn’t hurt to go through a preliminary round of encryption for your files to get a little extra assurance. 6. Read The Small Print. Besides storing your data, some cloud services allow you to share your photos and files with others. This sounds appealing, but comes with a catch- fine print that they don’t advertise but in their Terms of Service (TOS) to make it legitimate. 7. Be Wary Of Online Behaviour. Sometimes, the security of your cloud data depends on what you do online, especially on public computers or connections. When using a public computer, do you opt to not save your password, and ensure that you logged out of your account after you are done? Saving your password and leaving it logged in exposes you to the risk of strangers accessing your data. If you tend to connect open and unsecured Wi-Fi hotspots in public places to log in to your cloud account- such connections are typically unencrypted, which means that whatever you do while connected can be ‘sniffed‘ by a hacker on the same network. 8. Protect With Anti-Virus/Spy You may be using a secure cloud service provider which you absolutely trust, but sometimes the weakest link happens to be the computer system you’re logging in from. Without proper protection for your system, you expose yourself to bugs and viruses that provide penetration points for hackers to access your account. 3 Improve Internet Security Disable this feature to stop your Samsung Smart TV from listening to you SECURITY Improve internet security WITH 3 EASY TIPS Are you concerned about internet security? Did you know there are a few simple ways to get increased protection that require only minimal investment of time? We’re not just talking about changing your passwords regularly or installing antivirus software. There are a few other methods that are less often talked about – here are three tips to boost your internet security that you might not have thought of yet. to come. They’ll often try to take advantage of this, searching for outdated devices to infiltrate while their victims watch YouTube on last year’s version of Firefox. Yes, installing an update might take 15 minutes of your time. But it can pay dividends in preventing a security breach that could cost you or your business thousands. Use HTTPs Embrace two-factor authentication When was the last time you typed those letters Also known as two-step verification, most into a browser? Probably not this decade. It’s of us have likely dealt with this at one time no wonder most people are unaware of this or another. When you’re logging onto your tip. So for those who are oblivious, https is bank’s website or your email account from the secure version of http – hypertext transfer a different computer than you normally use, protocol. Believe it or not, that last “s” actually you’re sometimes prompted for a one-time adds an extra layer of protection. It encrypts password – sent to you via text message, email information sent, both ways, between a or via some other method. website’s server and you. Nowadays, many sites such as Facebook, Dropbox and Twitter also give you the option to use two-factor authentication each time you log in. So if you’re looking for an easy way to up your security, it can give you that extra protection without slowing you down too much. Update browsers and devices Did you know that dated versions of browsers, operating systems and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. And hackers are ever aware that people can be lazy – saving that update for another day that never seems 4 www.technologyreview.com You’re probably thinking, adding that last “s” to http (or even typing in http in general) is a complete pain in the rear. So to make this easier you can actually install a program like “HTTPS Everywhere” that’ll automatically switch an http into an https for you. Currently “HTTPS Everywhere” is available for Firefox, Chrome and Opera. Looking for more tips to boost your internet security? Get in touch to find out how we can help. SECURITY Samsung Smart TV Worried about Samsung eavesdropping on your conversations? Here’s how you can turn off the Voice Recognition feature on your Smart TV. If you have a Samsung Smart TV with voice recognition in your lounge room, it might be worth making sure the feature's deactivated and a piece of tape is over the microphone before you make any private or sensitive statements. The South Korean technology giant has told users of the voice recognition feature that anything heard by the television may be whisked away by the company over the internet and sent to a third party. The company's privacy policy states: "Samsung may collect and your device may capture voice commands and associated texts so that we can provide you with voice recognition features and evaluate and improve the features" It adds the warning that if your spoken words include personal or other sensitive information, that information will be among the data captured and transmitted to a third party. If you disable voice recognition the television will still listen out for key command phrases, and “Samsung may still collect associated texts and other usage data so that we can evaluate the performance of the feature and improve it”. You can disable data collection entirely through the settings menu, which will also disable all voice command capabilities. Privacy campaigners have branded the policy “outrageous” and made comparisons to George Orwell’s description of telescreens, which spied on citizens in his novel 1984. provided to a third party during a requested voice command search. At that time, voice data is sent to a server, which searches for the requested content then returns the desired content to the TV.” Samsung has even stated in its own privacy policy that if the TV’s owner does decide not to share their private information, then the company may still take the information anyway. This leaves users with no knowledge or control over where your information goes or who has access to it and that is simply unacceptable. Samsung did not specify the ‘third party’ to which it sends the data, however the company has had previous dealings with voice recognition firm Nuance, the company behind Apple’s Siri. Nuance’s own privacy policies state that it too will forward data to third parties under “limited circumstances”, such as “when we believe we are required to do so by law”. “Samsung does not retain voice data or sell it to third parties,” the company told The Guardian. “If a consumer consents and uses the voice recognition feature, voice data is 5 Wireless Charging TPG makes $1.4b HARDWARE play for iiNet IKEA lamps, bedside tables that charge your smartphone to be rolled out soon FUTURISTIC furniture that charges your smartphone is about to arrive in your loungeroom and bedroom. A revolutionary range of lamps and bedside tables fitted with a wireless charging pad will be rolled out in Australia from October. IKEA says its “home smart” innovation will help do away with messy cables and flat battery fury. “We have been looking at people’s lives at home ... and how that frustration can be reduced,” national commercial manager Tim Prevade said. For householders were keen to get rid of cable clutter.The new furniture, with integrated Qi wireless charging, is compatible with phone models such as Samsung, HTC and Nokia, he said. iPhone owners wanting to use it will be able to buy a special case for their handset. Mr Prevade said the induction charging was similar to that for cooktops and electric toothbrushes. “It’s more or less the same energy usage and time to charge batteries,” he said. “It could potentially extend to other types of furniture, Users plug in the furniture pieces at a power like couches.” Various furniture also features source, then place their handset on a wireless a USB port allowing tablets and additional charging station with a marked sign indicating devices to be charged. where to rest the device. Australians have one of the world’s highest The products are expected to cost about $30 rates of smart phone usage with at least three to $40 more than standard items. Separate in four adults using a handset to access the wireless chargers including one that slots into web. Research released desks will also be sold. by technology analyst Telsyte last year suggested the average family juggled up to eight internetconnectable devices such as smartphones, tablets and computers. Some hi-tech homes had more than 20 devices, often used simultaneously. 6 www.technologyreview.com INTERNET provider TPG Telecom is set to take over rival iiNet in a deal worth $1.4 billion.iiNet’s board of directors has recommended shareholders accept the $8.60 per share offer, which is 33 per cent above the company’s five-day average stock price.“The board views this as a significant reward for shareholders who have shown their faith in iiNet,” iiNet chairman Michael Smith said. TPG executive chairman and CEO David Teoh said combined businesses would provide broadband to more than 1.7 million subscribers and be “well positioned to deliver scale benefits in an NBN environment. Australian law enforcement asks for more Facebook user data Australian law enforcement and government agencies are asking for increasingly more data on Facebook users, the latest figures from the social media giant show. In the six months from July to December last year, Australian government agencies requested 36 percent more data on Facebook user accounts than in the previous six month period. Facebook’s latest twice-yearly government requests report reveals it received 829 requests for user data on 933 accounts from Australia. It handed over the data on 69 percent of requests. “We restricted access to three items in compliance with a request from a local state consumer affairs regulator for violating local laws that ban ‘false and misleading information’,” Facebook stated in its report. “We also restricted one page in compliance with Australia’s federal anti-discrimination laws.” Govt pushes to collect more biometric data at airports The federal government is attempting to expand the amount and type of biometric data it collects on Australian citizens and foreigners - including minors - at the country’s airports through new legislation. The Immigration department currently collects facial images, signatures and fingerprints - the latter only in limited circumstances.The amendment would ensure that any type of personal identifier - defined as fingerprints or handprints; a person’s height TECH TIPs March Tech Times News “iiNet and TPG are highly complementary businesses in terms of geographic presence, market segments and corporate customer base,” he said. If iiNet shareholders approve the deal it should go through in July. IG market analyst Evan Lucas told The Australian the deal had been expected for years. “It’s the worst kept secret. It was always going to happen,” he said, adding that the $1.4 billion price tag was fair. “It’s a good price. It’s not expensive but it’s certainly not cheap.” Brandis to introduce site blocking legislation this week The federal government plans to introduce legislation allowing content owners to apply for court orders to force internet service providers to block overseas filesharing websites. The Copyright Amendment (Online Infringement) Bill - led by Attorney-General George Brandis - was cleared for introduction into parliament by the Coalition. The bill - the text of which is yet to be made public - will facilitate the blocking of overseas websites used for downloading and uploading copyright infringing content. Turnbull conceded that shutting down overseas filesharing websites could result in a game of whacka-mole - evident through the reappearance of The Pirate Bay under a different domain after the filesharing site was pulled down in a Swedish raid. “If you are asking me is it possible for .. to then move to another IP address or another URL, of course that is true,” Turnbull said at the time. The site-blocking scheme has been likened to online censorship by critics including consumer advocate group Choice and Pirate Party Australia, who argue it will create a filter that will allow the content industry to hit consumers with disproportionate penalties. and weight; photograph of a person’s head and shoulders; audio or video recording of a person; an iris scan; or a signature - can be collected from an individual. The bill will also allow law enforcement agencies to collect the biometric data of minors and incapable persons without the need to obtain consent or presence of a parent or guardian during the collection. 7 Digital Resolutions for 2015 TECH TIP Lenovo Rapped for Preinstalling Spyware Lenovo a few weeks ago came under fire for preinstalling spyware on some of its laptops. The software, Superfish, uses the same techniques cybercriminals often employ to crack encrypted traffic from computers to the Internet. Superfish is designed to bypass the security of HTTPS websites in a manner that would allow malware and attackers to also bypass the security provided by HTTPS. Users are inherently at risk of being directed to malicious sites that appear valid, making it much easier for attackers to steal information and further infect computers with malware.However, security concerns raised by malware fighters are misplaced, Lenovo insisted. "We have thoroughly investigated this technology and do not find any evidence to substantiate security concerns," the company said in a statement. Superfish was installed on some consumer notebooks from September to December of last year to help customers potentially discover interesting products while shopping, Lenovo explained. After receiving negative customer feedback, the company in January disabled the software on all Lenovo machines and stopped preloading it on new laptops. What makes Superfish so disturbing to many in the security community is the program's disregard for SSL security. SSL is used to encrypt communication between computers and websites. "If you uninstall the software, it doesn't remove the certificate created by it," Venafi's Bocek said. "That allows hackers to create malicious websites that will be trusted by those Lenovo computers." 8 Lenovo reportedly banned by MI6, CIA, and other spy agencies over fear of Chinese hacking (update) Beijing-based computer maker Lenovo has reportedly been blacklisted for years by spy agencies worldwide, as concerns about government-sanctioned Chinese hacking persist. According to the Australian Financial Review, Australia, the UK, Canada, New Zealand, and the US have all rejected Lenovo machines for their top-secret networks since the mid-2000s, though the computers can be used for lower-security tasks that don’t involve sensitive information. UPDATE: The Australian Government’s Department of Defence disputes the storysaying the Australian Financial Review’s report is “factually incorrect,” and that there is no ban on Lenovo products on its classified networks. It’s unclear whether the government agency is mincing words or whether the publication truly got the story wrong. AFR originally cited a Department of Defence spokesperson that Lenovo products had never been approved for those networks, but that’s not the same as a ban on them ever becoming approved in the future.