Pete Recommends – Weekly highlights on cyber security issues, September 28, 2024

Subject: LinkedIn Halts AI Data Processing in UK Amid Privacy Concerns Raised by ICO
Source: The Hacker News
https://thehackernews.com/2024/09/linkedin-halts-ai-data-processing-in-uk.html

The U.K. Information Commissioner’s Office (ICO) has confirmed that professional social networking platform LinkedIn has suspended processing users’ data in the country to train its artificial intelligence (AI) models. “We are pleased that LinkedIn has reflected on the concerns we raised about its approach to training generative AI models with information relating to its U.K. users,” Stephen Almond, executive director of regulatory risk, said.

“We welcome LinkedIn’s confirmation that it has suspended such model training pending further engagement with the ICO.”

Almond also said the ICO intends to closely keep an eye on companies that offer generative AI capabilities, including Microsoft and LinkedIn, to ensure that they have adequate safeguards in place and take steps to protect the information rights of U.K. users.

“The companies collected and could indefinitely retain troves of data, including information from data brokers, and about both users and non-users of their platforms,” the FTC said, adding their data collection, minimization, and retention practices were “woefully inadequate.”

“Many companies engaged in broad data sharing that raises serious concerns regarding the adequacy of the companies’ data handling controls and oversight. Some companies did not delete all user data in response to user deletion requests.”


Subject: ‘Harvest now, decrypt later’: Why hackers are waiting for quantum computing
Source: VentureBeat
https://venturebeat.com/security/harvest-now-decrypt-later-why-hackers-are-waiting-for-quantum-computing/

[I wonder how many hacker orgs are willing to play the long game? esp. if it is decades? maybe it’s time for the whitehats to encrypt the blackhats’ data? /pmw1]

Hackers are waiting for the moment quantum computing breaks cryptography and enables the mass decryption of years of stolen information. In preparation, they are harvesting even more encrypted data than usual. Here is what businesses can do in response.Why are hackers harvesting encrypted data?

Most modern organizations encrypt multiple critical aspects of their operations. In fact, about eight in 10 businesses extensively or partially use enterprise-level encryption for databases, archives, internal networks and internet communications. After all, it is a cybersecurity best practice.

Alarmingly, cybersecurity experts are growing increasingly concerned that cybercriminals are stealing encrypted data and waiting for the right time to strike. Their worries are not unfounded — more than 70% of ransomware attacks now exfiltrate information before encryption.

The “harvest now, decrypt later” phenomenon in cyberattacks — where attackers steal encrypted information in the hopes they will eventually be able to decrypt it — is becoming common. As quantum computing technology develops, it will only grow more prevalent.

  • How ‘harvest now, decrypt later’ works…
  • The consequences of qubits cracking encryption…
  • Why prepare if quantum isn’t here yet?…
  • What can enterprises do to protect themselves?…

There are a few steps business leaders should take in preparation for quantum computing cracking cryptography.

Filed: https://venturebeat.com/category/security/


Subject: Verizon faces lawsuit over allegedly illegal collection of voiceprints
Source: Android Headlines
https://www.androidheadlines.com/2024/09/verizon-faces-lawsuit-over-allegedly-illegal-collection-of-voiceprints.html

Verizon will be dealing with a couple of lawsuits from disgruntled customers. The company has been particularly busy lately, handling 5,000 worker layoffs and moving forward with the acquisition of Frontier. Now, Verizon must contend with a lawsuit pertaining to the use of voiceprints and another concerning website accessibility.Verizon does not ask for consent to collect voiceprints, lawsuit says

Thelton George Parker Jr. and Steven Doyle filed the first lawsuit. They allege that the mobile carrier is violating Illinois data protection laws with its Voice ID feature. Voice ID is a biometric identification system that allows customers to access their Verizon accounts when they call. The system uses the customer’s voiceprint instead of a numeric password, making it more secure. However, the plaintiffs claim that the carrier does not correctly request prior authorization to capture and use voiceprints.

The Biometric Information Privacy Act (BIPA) in Illinois mandates the use of additional layers of protection for voiceprints due to their potential for individual identification. State law mandates that companies provide customers with specific information about the handling of their data, including its use and duration of storage. The law also requires companies to request consent from customers. According to the plaintiffs, Verizon should have sent them a written request to consent to the recording and use of their voiceprints.

Filed: https://www.androidheadlines.com/category/carriers


Subject: The US could ban all Chinese tech for connected vehicles
Source: AndroidHeadlines
https://www.androidheadlines.com/2024/09/the-us-could-ban-all-chinese-tech-for-connected-vehicles.html

The United States could take a new step in its trade restrictions policy against China. Recently, the government announced heavy tariffs on Chinese EVs. Now, a new report claims that the United States will soon propose a ban on Chinese software and hardware for connected vehicles.The connected and autonomous vehicles segment is booming in the Asian country. Chinese companies have been developing connected and autonomous EVs for a long time, a sector where even Xiaomi has ventured. However, the United States government is responding with protectionist policies on the local market.

Washington may soon propose a ban on Chinese hardware and software for connected vehicles. Recently, Washington announced a severe 100% tariff on Chinese electric vehicles. According to Reuters, the next step will be a proposal for a total ban on hardware and software used in connected vehicles. If it sounds familiar, it’s because the United States did the same thing years ago with Huawei’s telecommunications equipment. The United States Department of Commerce could announce the measure on Monday.

Filed: https://www.androidheadlines.com/category/tech-news


Subject: New feature of iOS 18 and later: Request or give remote control in a Facetime call on an iPhone
Source: BrianKregs Mastodon account
https://infosec.exchange/@briankrebs/113187277290933742

Just FYI in re a new feature of iOS 18 and later: Request or give remote control in a Facetime call on an iPhone. This one could be a double-edged sword for some iPhone owners in your life. Thankfully, it’s not full remote control: support.apple.com/guide/iphone

Accept a remote control request
A participant can request to remotely control your screen if they’re using an iPhone or iPad with iOS 18, iPadOS 18, or later.

When you receive a remote control request notification in the FaceTime app on your iPhone, tap Allow.

A countdown from 3 to 1 appears, then the remote control session starts.

WARNING: The person remotely controlling the screen can perform tasks on your iPhone such as opening and closing apps, changing settings, deleting items, or sending messages. Only approve remote control requests from people you trust.


Subject: Cox Media Group Reveals Its ‘Active Listening’ Software Spies on User Convos, Clients Include Meta, Google
Source: Tech Times
https://www.techtimes.com/articles/307372/20240904/cox-media-group-reveals-active-listening-software-spies-user-convos.htm

[thx, Jeff] Your conversations may not be safe on Facebook and Google because of Cox Media.

A marketing firm called Cox Media Group has recently revealed that it is listening to user conversations via their smartphones through its so-called “Active Listening” Software. With this, the company will push advertisements that users will see on certain platforms based on the heard conversations as unveiled by a report.

The famed media conglomerate is known for its massive partnership with Meta’s Facebook and Google, among other Big Tech clients.

Cox Media Group Confess That It Listens to Your Conversations for Ads

404 Media’s recent exposé unveiled how Cox Media Group (CMG) privately confessed that it can listen to user conversations via a person’s smartphone to help them deliver the most appropriate ads in their online experience. It was revealed that CMG admitted this via a slide deck unveiled to investors, detailing how it can listen in on a conversation.

This was made possible through CMG’s “Active Listening” software according to the New York Post, and it also uses artificial intelligence to obtain “real-time data.”

Later on, its AI will analyze these collected data across over 470 sources, with the consumers leaving data trail “based on their conversations.” That being said, it was not revealed how many users were affected by this spying.

Related Article: Expert Claims that Advertisers Monitor Your Every Move Even in Unexpected Places

Tags:


Subject: Telegram Will Share User IP Addresses, Phone Numbers With Police Upon Request
Source: Gizmodo
https://gizmodo.com/telegram-will-share-user-ip-addresses-phone-numbers-with-police-upon-request-2000502252

A month after French authorities charged him with enabling drug trafficking and child abuse on his platform, Telegram CEO Pavel Durov announced Monday that the popular messaging app has taken several steps to weed out illegal material.In a significant reversal, the company changed its policies, and it will now turn over Telegram user IP addresses and phone numbers to law enforcement agencies in response to valid legal requests. Prior to Durov’s arrest, the company’s FAQ page said: “All Telegram chats and group chats are private amongst their participants. We do not process any requests related to them.”In a post on Telegram, first reported by Bloomberg, Durov said that a team of moderators has spent the last several weeks removing unsafe and illegal content. Telegram also updated the platform’s search function to make it less likely to turn up such material.

“These measures should discourage criminals,” Durov wrote. “Telegram Search is meant for finding friends and discovering news, not for promoting illegal goods. We won’t let bad actors jeopardize the integrity of our platform for almost a billion users.”

Tagged:


Subject: AI copyright tool is serving takedown notices to AI-generated Mario images
Source: AndroidHeadlines
https://www.androidheadlines.com/2024/09/ai-copyright-tool-is-serving-takedown-notices-to-ai-generated-mario-images.html

Generative Artificial Intelligence (Gen AI) tools are now battling each other online. An AI copyright tool is actively serving takedown notices to social media posts containing Mario and other content copyrighted by Nintendo.AI copyright tool going after AI-generated Mario imagesEver since Gen AI burst on the scene, AI-generated images and videos have been flooding the internet. Social media users are churning out a lot of content using Gen AI tools, and a lot of the imagery appears to ignore copyright laws.

An AI copyright tool is now going after AI-generated content on X (formerly Twitter). Several dozen posts of X have been reportedly taken down. Most of these posts contained images of Mario, which were generated using AI.

According to The Verge, a company called Tracer is using AI to identify the images and serve takedown notices on behalf of Nintendo. The publication posted an AI-generated picture of Mario holding a beer and a cigarette, and sure enough, it was taken down.

The Verge’s Tom Warren received an email shortly after the image was taken down. It indicated a Digital Millennium Copyright Act (DMCA) notice was issued to X. The person serving the notice was “customer success manager” Ben Arzen of Tracer.

Tracer is a relatively new company that offers AI-powered services to companies. The company’s AI helps to identify trademark and copyright violations online.

Regardless, it might be difficult for an AI tool to make the distinction between user-created and AI-generated art. Moreover, Nintendo has always been very aggressive while dealing with copyright issues. Hence, it makes sense Nintendo hired one of the first companies to use AI to go after AI-generated content.

Filed: https://www.androidheadlines.com/category/tech-news


Subject: Lessons from the CrowdStrike outage
Source: Nextgov/FCW
https://www.nextgov.com/ideas/2024/09/lessons-crowdstrike-outage/399855/

COMMENTARY: Agencies can mitigate impacts of future outages by putting IT risks front and center and by understanding the incident response requirements of their vendors.This summer’s CrowdStrike outage has been widely discussed across government agencies, boardrooms, CIO/CISO offices, media, professional organizations and in academic settings. The circumstances around the faulty software update provide a rare case study for those focused on continuity of operations.The software update issue hit nearly 8.5 million Windows operating systems and impacted a broad range of Microsoft users, but government agencies and businesses suffered the brunt of the effects. Disruptions to both internal and external operations were so great that companies such as Delta Airlines said the outage cost the company about $550 million and that they are pursuing damages against both Microsoft and CrowdStrike….

  • Integration of IT and business risks: …
  • Mitigation strategies for software updates: …
  • Review of service level agreements: …
  • Maintaining transparency and clear communication: …

Diversifying security solutions…

The silver lining lies in the lessons learned from this incident. This deeper understanding will better equip agencies and organizations to respond to future challenges. Although it is doubtful we can entirely prevent unexpected events like the CrowdStrike software update issue, we can implement proactive measures to mitigate the impact of similar occurrences in the future.

Posted in: AI, Copyright, Cybercrime, Cybersecurity, Internet Trends, Legal Research, Social Media