1 – EFF Will Tell Copyright Office That Consumers Should Have the Freedom to Fix, Modify Digital Devices They Own
On Tuesday, April 20, and Wednesday, April 21, experts from the Electronic Frontier Foundation (EFF) fighting copyright abuse will testify at virtual hearings held by the Copyright Office in favor of exemptions to the Digital Millennium Copyright Act (DMCA) so people who have purchased digital devices—from cameras and e-readers to smart TVs—can repair or modify them, or download new software to enhance their functionality. The online hearings are part of a rulemaking process held every three years by the Copyright Office to determine whether people are harmed by DMCA “anti-circumvention” provisions, which prohibit anyone from bypassing or disabling access controls built into products by manufacturers to lock down the software that runs them. These provisions are often abused by technology companies to control how their devices are used and stop consumers, innovators, competitors, researchers, and everyday repair businesses from offering new, lower-cost, and creative services.
A Ukrainian national arrested for his role in a hacking group that compromised millions of financial accounts was sentenced to a decade in prison, US prosecutors said Friday. Fedir Hladyr, 35, had a high-level role as a manager and systems administrator for a hacking group known at FIN7, authorities said.
He was one of three Ukrainians arrested in mid-2018 for hacking more than 100 US companies and stealing millions of credit and debit card numbers, according to the Justice Department. “The defendant and his conspirators compromised millions of financial accounts and caused over a billion dollars in losses to Americans and costs to the US economy,” acting Assistant Attorney General Nicholas McQuaid said in a release. Hladyr was arrested in Germany, then extradited to Seattle where he pleaded guilty in 2019 to conspiring to commit computer hacking and wire fraud, according to authorities.
Here at Tripwire, we, like many others, recently surpassed the one-year anniversary of working from home due to the COVID-19 pandemic. Since March of 2020, we have converted kitchens, spare bedrooms and garages into office spaces. Our pets and children have become our coworkers, and companies are reporting a sudden increase in shirt sales as opposed to pant sales. This unique transition has required flexibility to adapt to a new environment, and with that new environment has come a different set of security practices. Although many of us have finally established a rhythm when it comes to working from home, it is worth reminding ourselves of some important security practices every remote employee should be implementing.
More details have emerged on the recent Codecov system breach which is now being likened to the SolarWinds hack. In new reporting by Reuters, investigators have stated that hundreds of customer networks have been breached in the incident, expanding the scope of this system breach beyond just Codecov’s systems. As reported by BleepingComputer last week, Codecov had suffered a supply-chain attack that went undetected for over 2-months. In this attack, threat actors had gained Codecov’s credentials from their flawed Docker image that the actors then used to alter Codecov’s Bash Uploader script, used by the company’s clients. By replacing Codecov’s IP address with their own in the Bash Uploader script, the attackers paved a way to silently collect Codecov
customers’ credentials—tokens, API keys, and anything stored as environment variables in the customers’ continuous integration (CI) environments. Codecov is an online software testing platform that can be integrated with your GitHub projects, to generate code coverage reports and statistics, which is why it is favored by over 29,000 enterprises building software.
If you’re a social network, you have to have a Clubhouse clone on your platform. I don’t make the rules. Reddit is the latest to join the fold, and announced a live audio product last night. The product is called Reddit Talk, and it lets you voice chat with other folks on your subreddit in real-time. However, it’s currently in the test phase and you have to register your interest through a waitlist if you want to try it out. The functionality of the feature is akin to Clubhouse in terms of creating rooms and joining them with Twitter Spaces-inspired emoji reactions thrown in. Reddit’s product manager, Peter Yang, noted that this product is different because the platform’s pseudo-anonymous nature allows users to have more authentic conversations. However, that’s true for Twitter and Discord as well.
Deployments of facial recognition from Israeli startup AnyVision show how the surveillance software has gained adoption across the United States even as regulatory and ethical debates about it rage. The technology finds certain faces in photos or videos, with banks representing one sector that has taken interest in systems from AnyVision or its many competitors to improve security and service. Organizations in other industries are chasing similar goals. The Los Angeles hospital Cedars-Sinai and oil giant BP Plc (BP.L) are among several previously unreported users of AnyVision. Cedars-Sinai’s main hospital uses AnyVision facial recognition to give staff a heads-up about individuals known for violence, drug fraud or using different names at the emergency room, three sources said. Cedars said it “does not publicly discuss our security programs” and could not confirm the information.
Someone is selling account information for 21 million customers of ParkMobile, a mobile parking app that’s popular in North America. The stolen data includes customer email addresses, dates of birth, phone numbers, license plate numbers, hashed passwords and mailing addresses. KrebsOnSecurity first heard about the breach from Gemini Advisory, a New York City based threat intelligence firm that keeps a close eye on the cybercrime forums. Gemini shared a new sales thread on a Russian-language crime forum that included my ParkMobile account information in the accompanying screenshot of the stolen data. Included in the data were my email address and phone number, as well as license plate numbers for four different vehicles we have used over the past decade. Asked about the sales thread, Atlanta-based ParkMobile said the company published a notification on Mar. 26 about “a cybersecurity incident linked to a vulnerability in a third-party software that we use.”