IEEE Computer Society Cipher --- Items from security-related news (E148)






  • Cryptographers Angry at US Visa Issuance Dysfunction
    Adi Shamir visa snub: US govt slammed after the S in RSA blocked from his own RSA conf
    The Register
    Mar 6, 2019
    By Iain Tomson

    Summary:
    Adi Shamir, the "S" in "RSA", looks forward to attending the annual RSA conference each year in San Francisco. This year he did not hear anything about his visa applicaiton, so he could not travel from Israel to California to appear in person. He did address the conference via Skype, and he suggested that if researchers could not travel to the US, then events should be held elsewhere. There was widespread speculation about the visa situation. Some people suspected that the US government shutdown had created a large backlog of paperwork. One said that it appeared that "no one is is in charge."


  • Shh! Your Hard Drive is Listening!
    From hard drive to over-heard drive: Boffins convert spinning rust into eavesdropping mic

    The Register
    Mar 7, 2019
    By Thomas Claburn

    Summary:
    Modern hard drives are magnificent pieces of machinery with precision engineering. One group of researchers wondered if the drives might be multi-purpose. Perhaps the delicate electronics could sense more than just the data on the drive. Could ambient sound waves deflect the read heads enough to serve as a sound sensor? The answer, surprisingly, is yes. Although the drive heads do not respond well enough to serve as a reliable microphone, they definitely respond to loud sounds, and that is detectable using extended features of the drive's firmware. Speak softly.


  • China Rejects Trash, Takes IDs
    HMD admits the Nokia 7 Plus was sending personal data to China HMD calls the event "an error" and has issued a patch.
    Ars Technica
    3/22/2019
    By Ron Amadeo

    Summary:
    An app that was installed on a batch of Nokia phones had a disturbing and unadvertised feature: it sent data about the phone usage to a server in China. All parties involved insist it was an innocent error. [Ed. And it won't happen again (until the next time).]


  • FCC's Opaque Neutrality Stance
    FCC has to pay journalist $43,000 after hiding net neutrality records
    FCC pays journalist's legal fees after failing to comply with records request.

    Ars Technica
    3/22/2019
    By Jon Brodkin

    Summary:
    Net neutrality is a policy that the FCC ended last year, after soliciting, and then apparently ignoring, public comments. The FCC maintained that millions of the comments were from fake accounts. A journalist requested the data from the FCC website that allegedly substantiated the claim, but the FCC was not forthcoming. A lawsuit was filed to force the revelation of the data, and a court granted a partial victory to the litigant.


  • Facebook, passwords exposed, again, of course

    Facebook apps logged users' passwords in plaintext, because why not
    Unencrypted user credentials stored on Facebook internal servers as far back as 2012.

    Ars Technica
    By Sean Gallagher
    3/21/2019

    Summary:
    Despite the widespread availablity of technology for storing passwords securely, Facebook engineers decided that there was no need to protect passwords inside the company's network enclave. This left the passwords visible to thousands of Facebook employees over a period of many years.


  • Take Another Little Peek at my Heart

    HOT WIRE MY HEART - Critical flaw lets hackers control lifesaving devices implanted inside patients Implanted devices from Medtronic can have their firmware rewritten, DHS warns.


    Ars Technica
    By Dan Goodin
    3/21/2019

    Summary:
    There are many people alive today because they carry implanted medical devices in their bodies. The devices have computers and wireless communication capabilities. Unsurprisingly, if they are devoid of standard security protections, they are completely hackable. The Conexus Radio Frequency Telemetry Protocol, which is Medtronic's proprietary means for the monitors to wirelessly connect to implanted devices, has a "raft" of security weaknesses that leave them open to everything from privacy violations to complete reprogramming by anyone within wireless range. Medtronic emphasizes that no device has ever actually been hacked, and that they are responding to US Department of Homeland Security's Cybersecurity and Infrastructure Security Agency' advisory https://ics-cert.us-cert.gov/advisories/ICSMA-19-080-01 with all due speed.