Newsflash dinsdag 19 juni 2018
Vier jaar voor man die webshops met backdoor ontwikkelde
(security.nl)

Een 37-jarige man uit Leeuwarden is veroordeeld tot een gevangenisstraf van vier jaar, waarvan een jaar voorwaardelijk, voor het ontwikkelen van webshops met een backdoor, waardoor hij gebruikersnamen en wachtwoorden van klanten van deze shops in handen kreeg en hier vervolgens mee fraudeerde.

De verdachte bood zichzelf bij bedrijven aan als websitebouwer. Voor diverse bedrijven ontwikkelde hij een webshopm, waar een script aan was toegevoegd waardoor hij alle gebruikersnamen en wachtwoorden van klanten van deze shops ontving.

Die inloggegevens werden vervolgens gebruikt om in te breken in mail- en socialmedia-accounts van klanten.

Ai-experts: Europa raakt achterop op gebied van kunstmatige intelligentie
(tweakers.net)

Verschillende ai-experts waarschuwen dat Europa het aflegt tegen landen als China en de Verenigde Staten als het gaat om de ontwikkeling van kunstmatige intelligentie. Ze pleiten voor een soort CERN voor ai.

Dat centrum , wat staat voor Confederation of Laboratories for Artificial Intelligence Research in Europe. In een schrijven de initiatiefnemers, waaronder een hoogleraar van de Universiteit Leiden, en Duitse en Noorse onderzoekers, dat het de bedoeling is dat er een netwerk ontstaat van verschillende onderzoekscentra, waarbij Claire fungeert als een 'centrale hub', en zaken als infrastructuur en uitwisseling van kennis faciliteert.

Ze willen daarbij het voorbeeld van het Europese onderzoekscentrum volgen. Daarmee doelen ze op een samenwerking van onderzoekers uit heel Europa.

Hoogleraar Wouter Stol: ‘Cybercrime is een probleem dat we met z’n allen moeten aanpakken’
(volkskrant.nl)

Van kinderpornonetwerken en identiteitsfraude tot virussen die je computer kapen. Opeens is cybercrime een ernstige bedreiging voor onze samenleving. Hoogleraar Wouter Stol vertelt hoe we daar met z’n allen iets aan kunnen doen. ‘Dit is te groot om alleen aan de politie over te laten.’

Hoogleraar Wouter Stol werkte ruim tien jaar als politiechef en inspecteur bij de Amsterdamse politie. Daar maakte hij de opmars van de computer mee, en later van het begrip cybercrime.

Na een deeltijdstudie sociologie promoveerde hij in 1996 op zijn onderzoek ‘Politie-optreden en informatietechnologie’. Inmiddels is Stol lector Cybersafety aan de Politieacademie en bijzonder hoogleraar Politiestudies aan de Open Universiteit (OU).

Exposed Container Orchestration Systems Putting Many Orgs at Risk
(darkreading.com)

More than 22,600 open container orchestration and API management systems discovered on the Internet.

New research confirms that many organizations are deploying workloads to the public cloud without adequate security controls and processes in place first.

Lacework recently used the Shodan search engine, SSL data mining techniques, and some internally developed tools to uncover as many as 22,672 open container orchestration dashboards and API management systems on the Internet.

Pass gets a fail: Simple Password Store suffers GnuPG spoofing bug
(theregister.co.uk)

Security researcher Marcus Brinkmann has turned up another vulnerability in the GnuPG cryptographic library, this time specific to the Simple Password Store.

Brinkmann explained that CVE-2018-12356 offers both access to passwords and possible remote code execution.

This bug is an incomplete regex in GnuPG's signature verification routine, meaning an attacker can spoof file signatures on configuration files and extension scripts (Brinkmann has dubbed the bug “SigSpoof 3” as the third signature spoofing bug he's found).

7 Ways Cybercriminals Are Scamming a Fortune from Cryptocurrencies
(darkreading.com)

With the cryptocurrency market bonanza in full swing, unscrupulous cybercriminals are cooking up new scams and hacks by the hour, all with the goal of reaping the ill-gotten rewards from investors, cryptocurrency exchanges, and legitimate coin miners across the internet.

According to most experts, 2018 is reaching a fevered pitch of criminal activity around all things blockchain and cryptocoin. In fact, one estimate by CryptoAware states that the criminal activity only halfway through 2018 makes up more than half of all criminal cryptocurrency incidents in the past seven years.

So far this year, losses are stacking up to nearly $1.7B in publicly disclosed losses, according to figures compiled by that company.

Fraudster admits she was OPM dealer: Leaked US govt staff files used to bag cash, car loans
(theregister.co.uk)

A woman has fessed up to using people's personal information, leaked online from the US government's Office of Personnel Management mega-hack, to take out loans and open bank accounts.

Karvia Cross, 39, of Bowie, Maryland, USA, pleaded guilty on Monday in the eastern district of Virginia to one count of identity theft and conspiracy to commit bank fraud. She faces anywhere from two to 30 years when sentenced this Fall.

Cross admitted to working with other fraudsters – five more people were charged in the case and one person beside Cross has already pleaded guilty – to use the names, dates of birth, and social security numbers of strangers to apply for and receive loans from the Langley Federal Credit Union in Virginia.

14 reasons why software projects fail
(cio.com)

Every software project begins with big dreams and grand visions. Somewhere in an alternative universe, there is a project that fulfills every dream but all too often software projects in our universe stumble toward the finish line and sometimes cross it.

Analysts might like to toss out random numbers to estimate what percentage of software projects fail, but these are wildly inaccurate by definition because, well, failure is not a binary thing.

You can end up with code that runs well but no one uses. Or you can end up with code that won’t even compile. Sometimes you can salvage something useful from the flaming wreckage and sometimes it’s best to run away before it explodes.

Top Threats to your Computer and How to Deal with Them
(hackernoon.com)

The online world is full of threats — some are quite obvious, while others, like trojans and crypto-lockers, are complicated, less well known and are often incredibly insidious.

Protecting your PC and all your personal data contained within is a constantly changing task and, often, the hardest part of increasing your security is knowing where to start. So what threats do you face? And what can you do to mitigate these dangers safely and pre-emptively?

To start with, we should discuss the types of threats most commonly faced by individuals, where there is overlap and what each threat does and hopes to achieve. Understanding this will make your job a lot easier.

Cyber Security Briefing: Dogs enlisted in cyber crime fight
(businesscloud.co.uk)

Dogs have long played an instrumental role in physical security as the keen noses of trained animals are able to sniff out weapons.

Now law enforcement agencies in the United States are enlisting their canine units in the fight against cyber crime.

Dogs at both federal and local level are being trained to find hidden electronic devices such as mobile phones, hard drives and microSD cards by identifying a chemical compound found within them called triphenylphosphine oxide, or TPPO. Last month ‘electronic storage detection’ dogs helped catch a student hacker who hid an incriminating thumb drive.

Why the US and China's brutal supercomputer war matters
(wired.com)

Thought global arms races are all about ballistic missiles, space or nuclear development? Think again: the new diplomatic frontline is over processing power and computer chips.

A major shift has taken place, with a new claimant to the crown of world’s fastest supercomputer. IMB’s Summit at Oak Ridge National Laboratory in Tennessee uses Power9 CPUs and NVIDIA Tesla V100 GPUs and has 4,068 servers powered by ten petabytes of memory working concurrently to process 200,000 trillion calculations per second – 200 petaflops.

That’s a lot of numbers – and here’s one more. Summit’s processing power is 117 petaflops more than the previous record-holder, China’s TaihuLight.

Senate passes defense bill, battle looms with Trump over China's ZTE
(reuters.com)

The U.S. Senate passed a $716 billion defense policy bill on Monday, backing President Donald Trump’s call for a bigger, stronger military but setting up a potential battle with the White House over Chinese telecommunications firm ZTE Corp (000063.SZ).

The Republican-controlled Senate voted 85-10 for the annual National Defense Authorization Act, or NDAA, which authorizes U.S. military spending but is generally used as a vehicle for a broad range of policy matters.

Before it can become law, the bill must be reconciled with one already passed by the House of Representatives. That compromise measure must then be passed by both chambers and signed into law by Trump.

Facebook cuts out gun-accessory ads for children
(bbc.com)

Children will stop seeing adverts for gun accessories on Facebook as it updates its policy from 21 June.

Currently, ads for scopes, holsters, gun-mounted lights, slings, sights, belt extras, safes and many other items can be seen by anyone using Facebook.

Facebook said the decision followed a "regular review" of its policies. But Tech news site The Verge speculated that the move was connected to renewed focus on gun violence in the US following a spate of school shootings.

A summer reading list for open organization enthusiasts
(opensource.com)

The books on this year's open organization reading list crystallize so much of what makes "open" work: Honesty, authenticity, trust, and the courage to question those status quo arrangements that prevent us from achieving our potential by working powerfully together.

These nine books—each one a recommendation from a member of our community—represent merely the beginning of an important journey toward greater and better openness.

But they sure are a great place to start.

Uber plans to connect whole of UK with flying taxis
(businesscloud.co.uk)

The flying cars promised in movies like Blade Runner and Back to the Future may be closer than you think - if Uber has its way.

The tech giant plans to connect the whole of the UK with ‘flying taxi’ drones which do not require massive changes to infrastructure like those seen in projects such as HS2.

Uber has invested £17 million into a flying vehicle research facility in Paris, its first R&D centre outside the US, as it looks to begin uberAIR commercial operations in three major cities within five years.

Google's AI is better at predicting patient deaths than hospitals
(newsbytesapp.com)

New research published by Google's Medical Brain team indicates that AI might be better than current systems in predicting patient deaths in hospitals.

While there are several barriers to scale up the technology for widespread use in hospitals, they're not insurmountable, and the healthcare potential of an AI-based prediction system for the likelihood of death, discharge, and re-admission is massive.

Here's more.

IBM shows off an artificial intelligence that can debate a human and change some minds
(usatoday.com)

IBM computers famously won at Jeopardy! and beat world class chess masters. Now, they're taking on human debaters.

At a media gathering here Monday afternoon, a black, artificial intelligence-infused IBM computer with a screen for a face more than held its own debating seasoned human debaters.

In one debate face-off, IBM's "Project Debater" AI computer made the case in favor of the government subsidizing space exploration against Israeli debate champion Noa Ovadia, who took the opposite position.