Mind Matters Natural and Artificial Intelligence News and Analysis

CategoryComputer Security

cyber-network-data-flow-open-source-3d-illustration-of-digital-hi-tech-particles-stockpack-adobe-stock
Cyber network, data flow, open source. 3D illustration of digital hi-tech particles

The Backdoor to Control the Internet

We almost lost the Internet last week, but open-source developers saved the day.

Few people are aware, but over the last several days, a perceptive developer foiled a multi-year plot to install a remote backdoor into, well, the entire Internet. Two years ago, a programmer known as Jia Tan (JiaT75) started helping out with a lesser-known compression library, known as xz. For those who don’t know, software today is not a monolithic entity. Every piece of software you use it built from a collection of tools, known as libraries, that make programming easier. For instance, most programmers never have to write the specifics of a sorting algorithm, because, somewhere, there is a library which performs sorting for them. This leaves programmers to focus on higher-level tasks, like actually making the software do what the users want. However, these Read More ›

secure-cyber-world-blue-background-illustrating-protection-digital-safety-blue-background-with-lock-symbol-cybersecurity-visuals-blue-background-and-lock-emblem-guarding-digital-assets-blue-bac-stockpack-adobe-stock
Secure Cyber World, Blue Background Illustrating Protection, Digital Safety, Blue Background with Lock Symbol, Cybersecurity Visuals, Blue Background and Lock Emblem, Guarding Digital Assets, Blue Bac

A Timely Leak Offers a Peek Into Chinese Cyberespionage Worldwide

What Chinese hackers are doing can sound as exciting as a spy movie — but it is much more dangerous
Some of the leaked documents shed light on the corrupt business practices inherent in the hacker ecosystem and on the role of the CCP government. Read More ›
internet-security-and-privacy-challenges-use-a-human-eye-and-digital-binary-code-to-convey-the-idea-of-surveillance-by-cybercriminals-stockpack-adobe-stock
internet security and privacy challenges. Use a human eye and digital binary code to convey the idea of surveillance by cybercriminals.

We’re Slowly Learning About China’s Extensive Hacking Network

China’s state-backed hackers have embedded malware within U.S. programs used to manage clean drinking water, the power grid, and air traffic, among others
Hackers’ advantage: One of the biggest security weaknesses in U.S. digital networks and infrastructure is out-of-date, no-longer-supported technology. Read More ›
big-brother-electronic-eye-concept-technologies-for-the-global-surveillance-security-of-computer-systems-and-networks-stockpack-adobe-stock
Big brother electronic eye concept, technologies for the global surveillance, security of computer systems and networks

This is Digital McCarthyism

Far from being liberated by these technologies, we have been plunged back into the worst abuses of surveillance and privacy violation.

The notion that we’re getting somewhere, making progress, is remarkably durable. It survives wars, financial collapse, riots, scandals, stagnating wages, and climate change (to name a few). Though techno-futurists are also fond of AI apocalypse scenarios, where artificial intelligence somehow “comes alive,” or at any rate uses its superior intelligence to make an autonomous decision to wipe out humanity, much more ink has been spilled this century prognosticating indomitable technical progress, which somehow stands in for human progress generally. But sanguine belief in progress is belied by the actual events of the twenty-first century. Computers have gotten faster and AI more powerful, but digital technology has also been used to spread misinformation, make deep fakes, and conduct relentless cyberwarfare. Financial Read More ›

robotic-hand-using-wooden-geometrical-shapes-at-during-machine-learning-3d-illustration-stockpack-adobe-stock
Robotic hand using wooden geometrical shapes at during machine learning. 3d illustration.

Why the Turing Test Is Becoming Obsolete

Chatbots can easily pass the test without doing any thinking at all
One research team recommends replacing the Turing test (can it deceive humans?) with tests for actual reasoning skills. Read More ›
Hacker in data security concept. Hacker using laptop. Hacking the Internet. Cyber attack.

Spies and Lies: China’s Cyberespionage Is on an Unprecedented Level

Chinese cybertheft is an ever-increasing threat.
Intelligence agencies are clear that the problem is not the Chinese people or Chinese citizens living in other countries. The problem is the Chinese government. Read More ›
water-horizon-stockpack-adobe-stock
Water horizon

Meta Fined Over 1.3 Billion

The EU is penalizing the tech giant for shipping data across the Atlantic

European Union regulators have fined Meta over a billion dollars for sending users’ data to the United States. Many companies operate using a free flow of data across the Atlantic, so the ruling will complicate other companies’ modes of business. Sam Schechner reports, The steep fine represents a step change from EU privacy regulators, who are increasing their enforcement of the GDPR, the bloc’s privacy law, some five years after it came into effect. A board of EU regulators has taken more control over cross-border decisions—and has insisted on bigger fines, people familiar with the deliberations say.  -Sam Schechner, Facebook Owner Meta Fined $1.3 Billion Over Data Transfers to U.S. – WSJ Meta is not pleased with the decision, unsurprisingly, Read More ›

virus-detected-hologram-concept-stockpack-adobe-stock
Virus detected hologram concept

Ransomware Attacks on Public Institutions

Hackers are always coming up with new approaches, keeping IT staff on their toes

by Karl Stephan In what is just the latest of a lengthening series of ransomware attacks, the sheriff’s office of San Bernardino County, California reportedly paid over $1 million in ransom to an Eastern-Europe-based hacking group.  About half the money was paid by insurance and the county paid the rest from its risk-management fund.  Reporters for the Los Angeles Times were unable to determine exactly who authorized the payments, which enabled the county to restore its email servers, in-car computers, and law enforcement databases.  According to the report, the FBI discourages payments to ransomware hackers, but almost half of the state and local governments attacked worldwide pay anyway.  A survey conducted by the British security firm Sophos was cited in the report, which said that Read More ›

police-tactical-team-gathered-round-a-house-stockpack-adobe-stock
Police tactical team gathered round a house

Swatting Goes Into Politics — as Congresswoman Greene Discovered

Swatting — calling the police and pretending that a violent incident is taking place at a given address — can kill the victim

This has been a summer to remember for U.S. Congresswoman Marjorie Taylor Greene (R-Georgia). She was “swatted” twice. The first false report that brought the police to her home was Wednesday, August 23: According to the first Rome PD report, five officers responded to a call on Wednesday during the initial attempted swatting. The caller claimed that a man had been “shot five times in a bathtub” at Greene’s home, and there was a woman and possibly children still in potential danger. On the way to Greene’s house, police realized who the homeowner was, but “due to the nature of the call,” police “formed up” at a nearby intersection and made a “tactical approach.” Rome PD provided Ars with no Read More ›

ransomware-stockpack-adobe-stock
Ransomware

What To Do If Your Business Is Hit With a Ransomware Demand

A roundup of advice for small businesses and their employees and contract workers, on site or remote

Ransomware attacks have reportedly continued to grow in 2022, as criminals hone their skills in grabbing our data and wanting money to release it. Today, it’s not just government and large businesses that are at risk. Small to mid-size businesses are at greatest risk. That’s because a) they often don’t have enough security in place and b) let’s face it, today’s attacker might be content with $300,000 each from a cluster of them rather than $30 million from a giant firm. Attracts less attention, for one thing. Here’s Blackfog’s monthly list of publicly reported attacks in 2022. In the first 30 minutes… Don’t just panic and agree to pay: [Kevin] Epstein says international law enforcement and white hat hackers usually Read More ›

3d-rendering-of-binary-tunnel-with-led-leading-light-concept-for-data-mining-big-data-visualization-machine-learning-data-discovery-technology-customer-product-analysis-stockpack-adobe-stock
3D Rendering of binary tunnel with led leading light. Concept for data mining, big data visualization, machine learning, data discovery technology, customer product analysis.

Deep Web? Dark Web? What’s Dangerous? What’s to Know?

The Deep Web hosts information like bank statements and health records so a search on your name won't turn them up

The terms deep and dark sound glamorous and forbidding, maybe criminal. Both terms just mean that we can’t reach a site on that portion of the web via a conventional search engine. The Surface Web, the part that we can reach via a conventional search engine like Google, DuckDuckGo, or Brave, is estimated roughly to be 0.03% of the internet (Britannica). The Deep Web contains email accounts, bank statements, health records, and other services that can only be accessed by passwords. It’s the main reason that our private business can’t be accessed just by searching on our names. Both the Surface Web and the Deep Web are growing as more people go online. Now, about the Dark Web: By comparison, Read More ›

hacking-and-malware-concept-stockpack-adobe-stock
Hacking and malware concept

Largest Data Grab Ever Stole Shanghai’s Mass State Surveillance

The police, dutiful in monitoring everyone, flunked data security. Now it’s all for sale on the Dark Web

Beijing wants to create a centralized database with personal information on everyone living in China. To do that, the government saves massive amounts of data acquired through surveillance technologies such facial and voice recognition and cell phone monitoring. In a previous article, we saw that the Chinese government’s surveillance network is much more extensive than once thought. However, while the Chinese government has prioritized collecting massive amounts of data, it has not prioritized protecting it. Thus, a hacker has acquired police data files on 1 billion Chinese residents (approximately 23 terabytes of data) from the Shanghai National Police database. The files include name, national ID number, cell phone number, birthdate, birthplace, ethnicity, education level, marital status, and delivery records. They Read More ›

outpost-stockpack-adobe-stock
outpost

Three Simple Words Can Find Any Place on Earth

The “what3words system” of geolocation is easier to remember than many street addresses and may also work for passwords

What3words is an app and web-based service that can convert practically any location within 3 × 3 meters (or 10 × 10 feet) — the size of a typical small bedroom or den — to just three short English words if you can give it an address. Don’t believe that? Try it. The address of the Library of Congress is person.hotels.canny The address of the Louvre Museum in France is started.pelting.pops And … bluffs.alas.skater? That’s the address of a Canadian Tire store somewhere in Ottawa. Clicking Bing Maps at the What3Words site will give you that store’s street address, satellite image and tell you how to get there. So why do this? Math prof Mary Lynn Reed explains: This new Read More ›

new-strong-password-and-weak-ones-near-keyboard-stockpack-adobe-stock
New strong password and weak ones near keyboard.

Forget Your Password? Apple Wants To End Them for Good But…

Do you want to give Apple your face- and fingerprints, maybe other “biometrics” down the road…?

We’ve all heard the tales of woe about people whose password was “password” or “123456” or “BertJones”. Currently, Big Tech, tired of the flak and the fallout, is trying to end passwords. Here’s Apple’s approach: When Apple’s latest software updates for iPhones, iPads and Macs arrive this fall, they will include a way for users to log into various online accounts without entering passwords or relying on password managers to save and fill in credentials. The technology generates unique passkeys for each app or browser-based service in the place of characters. Those passkeys, a new type of identity authentication, prompt a scan of your face or fingerprints to log you in… Passkeys, like those from Apple, are made up of Read More ›

portrait-of-insidious-hacker-organizing-virus-attack-on-corporate-servers-in-hideout-place-serious-man-looking-at-camera-sitting-at-desk-with-multiple-displays-stockpack-adobe-stock
Portrait of insidious hacker organizing virus attack on corporate servers in hideout place. Serious man looking at camera sitting at desk with multiple displays.

At the Water Cooler: They’re Talking About Computer Hacks Again

Some people appear to know all the answers to the latest assaults on our finances and privacy. If only the government would listen… (?)

In 2020, hackers threatened to release thousands of Finnish psychotherapy patients’ records to the internet unless they paid a steep ransom. Meanwhile, just last month, U.S. authorities uncovered a ‘Swiss Army Knife’ for hacking industrial control systems. “The malware toolkit, known as Pipedream, is perhaps the most versatile tool ever made to target critical infrastructure like power grids and oil refineries.” (Wired) So yes, we have a problem. Wired sums up last year’s hacking news: “As John Scott-Railton, senior researcher at University of Toronto’s Citizen Lab, puts it, ‘2021 is the year where we’re realizing that the problems we chose not to solve years or decades ago are one by one coming back to haunt us.”” (December 24, 2021) The Read More ›

big-data-futuristic-visualization-abstract-illustration-stockpack-adobe-stock
Big data futuristic visualization abstract illustration

How Software Makers Will Push Back Against Reforms

Software makers will grumble but insurers may force their hand. That, however, is NOT the Big Battle…

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. On Friday, we looked at the claim that human data collectors should own your data because it is too complex for you to manage. In this final installment, we look at how tech companies will try to avoid actually having to change anything. Preview of Coming Attractions If policymakers start to move towards implementing the policies suggested above, there will be a pushback from software makers that are not HDCs. They will be unhappy about additional software development costs, and they will play the “It’s the cyberattackers, not us!” card, saying it’s unfair to hold Read More ›

smart-technologies-in-your-smartphone-collection-and-analysis-of-big-data-stockpack-adobe-stock
Smart technologies in your smartphone, collection and analysis of big data

Is Your Data About Yourself Too Complex for You to Manage?

That’s the argument human data collectors (HDCs) make for why they should be allowed to collect and own your data

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. On Tuesday, we looked at how the current system punishes small businesses for data breaches that they could not have prevented. Today, we look at the claim that human data collectors should own your data because it is too complex for you to manage. The Easy Button The most common objection to data ownership is that self-management of owned data is overly complex. That view is based on the complexity of so-called “privacy controls” offered by big tech HDCs, controls which have every appearance of being deliberately obtuse. As a software developer and Read More ›

needle into eye
Danger for the eye

Cybersecurity: Why a Poke in the Eye Does Not Work

The current system punishes small businesses for data breaches they could not have prevented

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. Yesterday, we looked at how online human data collectors get free from legal responsibility. Today we look at how the current system punishes small businesses for data breaches that they could not have prevented. A Poke in the Eye Furthermore, in the domain of unintended consequences, deterrence polices are based on the technological symptomatic point solution fallacy. Businesses are assumed to be negligent if they have a data breach. That’s correct in some cases, but in others, businesses, particularly small and medium-sized businesses, suffer increased compliance costs or have been bankrupted by data breaches that they Read More ›

close-up-businesswoman-collecting-data-information-converting-into-statistics-planning-strategy-gathering-resources-creating-visual-graphical-graphs-using-computer-laptop-and-smart-mobile-device-stockpack-adobe-stock
Close up businesswoman collecting data information converting into statistics, planning strategy gathering resources creating visual graphical graphs using computer laptop and smart mobile device

How Online Human Data Collectors Get Free From Responsibility

Cybersecurity expert David A. Kruger talks about the Brave Old World in which you have much less power than Big Tech does

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. Last week, we looked at how search engine results can be distorted. This week, we look at how HDCs (human data collectors) free themselves from any responsibility for outcomes. Brave Old World HDCs’ licensing strategy is designed to free them from any vestige of fiduciary duty. Fiduciary law traces its roots back to the Code of Hammurabi in 1790 BC, through the Roman Empire, early British law, and up to the present day. The purpose of fiduciary law is to compensate for two sad facts of human nature. In unequally powered business relationships, 1) businesses with more Read More ›

close-up-man-hand-type-on-keyboard-laptop-to-use-search-engine-optimization-seo-tools-for-finding-customer-or-promote-and-advertise-about-content-online-for-marketing-technology-and-business-concept-stockpack-adobe-stock
close up man hand type on keyboard laptop to use search engine optimization (SEO) tools for finding customer or promote and advertise about content online for marketing technology and business concept

How Search Engine Results Can Be Distorted

Search providers such as Google are able to increase their ad revenues by distorting the search results delivered to users

Veteran software developer David A. Kruger offered some thoughts on computer security recently at Expensivity and we appreciate the opportunity to republish them here as a series. Last week, we looked at the way data is collected on us for and marketed. This week we look at how search engine results can not be what they seem: Off Target The promise and purpose of search technology is that with it a user can find what they are looking for, not what the search engine provider deems worthy of being found. That creates an inherent conflict of interest when search providers such as Google are able to increase their ad revenues by distorting the search results delivered to users. Distortion, in Read More ›