Pete Recommends – Weekly highlights on cyber security issues, December 21, 2024

Subject: Lawmakers tell Apple, Google to prepare for TikTok ban
Source: Nexstar Media Wire
https://www.nxsttv.com/nmw/news/lawmakers-tell-apple-google-to-prepare-for-tiktok-ban/

(The Hill) — The top lawmakers on the House Select Committee on the Chinese Communist Party (CCP) told Apple and Google on Friday to prepare to remove TikTok from their app stores, as a potential ban looms next month.Committee Chair John Moolenaar (R-Mich.) and Ranking Member Raja Krishnamoorthi (D-Ill.) said in a pair of letters to Apple CEO Tim Cook and Google CEO Sundar Pichai that their companies “must take the necessary steps to ensure it can fully comply” with the law by Jan. 19.

Under a law passed by Congress earlier this year, TikTok’s China-based parent company ByteDance is required to divest from the popular social media app or face a ban on U.S. networks and app stores.

The law gave ByteDance about nine months — until Jan. 19 — to sell TikTok. President Biden, who signed the law in April, could also give the company an additional 90 days to complete a sale.


Subject: CISA lays out how agencies, industry should respond to major cyber incidents
Source: Federal News Network
https://federalnewsnetwork.com/cybersecurity/2024/12/cisa-lays-out-how-agencies-industry-should-respond-to-major-cyber-incidents/

The Cybersecurity and Infrastructure Security Agency is out with an updated national cyber incident response plan that CISA officials say represents an “accessible” and “practical” roadmap for agencies and industry to work together on major cyber events.CISA publishes the draft NCIRP update today along with a notice in the Federal Register. Comments on the new plan are due by Jan. 15.

It’s the first update to the national cyber incident response plan since 2016. The cyber agency has spent the past year working on the update at the direction of the Biden administration’s National Cyber Strategy.

The new plan is intended to account for cyber threats that have evolved and grown over the past eight years, as well as new government roles, as well. CISA, for instance, was created in 2018.

Greene said more than 150 experts from 66 organizations across government and industry worked to develop an “accessible and practical” incident response plan.

In addition to accounting for the creation of CISA, the updated plan includes a “defined path,” Greene said, for how non-federal entities can engage with the government to plan for and respond to cyber incidents.

Filed: https://federalnewsnetwork.com/category/technology-main/cybersecurity/


Subject: China Telecom operations in the US could be in jeopardy
Source: Android Headlines
https://www.androidheadlines.com/2024/12/china-telecom-operations-in-the-us-could-be-in-jeopardy.html

It seems that the operations of China Telecom in the US could be in some serious trouble. According to a report from Reuters, a source tipped them off that the US Commerce Department could be looking to crack down on the company’s operations in the US. This is due to concerns that China Telecom could take American data and pass it to Beijing, China.Not the first time – The US Commerce Department has reportedly sent the company a preliminary determination that its presence in the US, especially on US networks, could pose national security risks. They have since given China Telecom 30 days to respond. The company has also yet to respond to a request from Reuters for comment on the matter.

This is not the first time that China Telecom has found itself in the US government’s crosshairs. Back in 2021, the FCC revoked the carrier’s authorization to operate in the US. The organization claimed that this was due to national security concerns.

The presence of China Telecom in the US is not that big. This means that even if they were completely banned, it is unlikely that it would have any particularly significant financial impact. If anything, this move by the US government would be more symbolic, as some have suggested.

Filed: https://www.androidheadlines.com/category/carriers


Subject: Warning: A New Scam Targets Consumers with Unsolicited Gifts and Malicious QR Codes
Source: Cord Cutters News
https://cordcuttersnews.com/warning-a-new-scam-targets-consumers-with-unsolicited-gifts-and-malicious-qr-codes/

Consumers across multiple states are being warned about a new variation of the “brushing” scam that uses unsolicited gifts and malicious QR codes to steal personal and financial information. This scam involves recipients receiving unexpected packages containing items they did not order, often from online retailers like Amazon or other similar companies.The packages typically contain items like jewelry (rings, bracelets, necklaces), Bluetooth speakers, or other small gifts. While the package correctly displays the recipient’s address, it lacks sender information or any clear indication of the item’s origin. This ambiguity is a key element of the scam.

Inside the package, a QR code is included, often with the implication that scanning it will reveal the sender’s identity. This is the trap. Scanning the QR code does not reveal a friendly sender; instead, it installs malicious software on the victim’s phone, granting scammers access to a wealth of personal data.

Experts warn that once the QR code is scanned, scammers can access everything on the compromised device, including personal contacts, photos, emails, and, most critically, financial information. In many cases, victims have reported having their bank accounts drained after falling prey to this scam.

QR code scams are not a new phenomenon. They have been observed in various contexts, including on parking meters and other public spaces. This latest iteration, however, is particularly insidious due to the element of surprise and the lure of a “gift.”


Subject: The Breachies 2024: The Worst, Weirdest, Most Impactful Data Breaches of the Year
Source: ETF
https://www.bespacific.com/the-breachies-2024-the-worst-weirdest-most-impactful-data-breaches-of-the-year/

EFF: “Every year, countless emails hit our inboxes telling us that our personal information was accessed, shared, or stolen in a data breach. In many cases, there is little we can do. Most of us can assume that at least our phone numbers, emails, addresses, credit card numbers, and social security numbers are all available somewhere on the internet. But some of these data breaches are more noteworthy than others, because they include novel information about us, are the result of particularly noteworthy security flaws, or are just so massive they’re impossible to ignore. For that reason, we are introducing the Breachies, a series of tongue-in-cheek “awards” for some of the most egregious data breaches of the year….

Abstracted from beSpacific
Copyright © 2024 beSpacific, All rights reserved.

Posted in: Cybercrime, Cybersecurity, Economy, Financial System, Social Media