Fraud&Security
Total Page:16
File Type:pdf, Size:1020Kb
computer FRAUD & SECURITY ISSN 1361-3723 July 2018 www.computerfraudandsecurity.com Featured in this issue: Contents Assessing website password practices – over a NEWS decade of progress? Financial organisations must show they’re ready for disasterVisit us @ 1 very now and again we get a guidance and policy enforcement on Big names in major breaches 3 www.biometrics-today.com Eflurry of headlines proclaiming a series of leading websites and com- FEATURES the passing of passwords, yet they pares them with three earlier studies. A Assessing website password practices – are still with us and still being bro- consistent finding in all prior cases was over a decade of progress? 6 World Password Day 2018 saw Microsoft suggesting ken and breached. that sites were doing less than might that it would deliver a “world without passwords”. Steven Furnell of the University But we’ve beenVisit here before. usIndeed, the fact that we be expected. So, 11 years on from the even have a World Password Day rather@ implies that of Plymouth, UK and Edith Cowan original study, what’s changed and passwordswww.membrane-technology.com are not as dead as past announcements and headlines would have us believe. Steven Furnell of the University, Australia presents the have things got better? University of Plymouth, UK and Edith Cowan University, results of an assessment of password Full story on page 6… Australia presents the results of an assessment of password guidance and policy enforcement on a series of leading websites and compares them with similar studies from 2007, 2011 and 2014. The findings have The role of crypto-currency in cybercrime been revealing in terms of the approaches taken by the sites and particularlyVisit the extent us to which @ they support he market for crypto-currencies rency. And alternative currencies also play their users in achieving good practice. A consistent Thas been incredibly volatile and a major role in ransomware attacks, being finding in all prior cases was that sites were collectively doing rather less than might be expected. So, 11 years these peaks and troughs have made the payment method of choice. The chief on from the original study, what’s changed and have crypto-currency value a popular media defence, says Aaron Higbee of Cofense, things got any better? topic. Hackers, too, have taken notice. is education. Phishing is a key element in The role of crypto-currency in cybercrime 13 The market for crypto-currencies has been incred- We have seen a recent sharp rise in these attacks and businesses need to help ibly volatile andVisit these peaks andus troughs @ have made crypto-jacking attacks, exploiting the power their employees to spot phishing attacks. crypto-currency value a popular media topic. Hackers, too, have taken notice. We have seen a recent sharp of victims’ computers to mine crypto-cur- Full story on page 13… rise in crypto-jacking attacks, exploiting the power of victims’ computers to mine crypto-currency. And alter- native currencies also play a major role in ransomware Critical infrastructure: understanding the threat attacks, being the payment method of choice. The chief defence against this growing threat, says Aaron Higbee ith nation state cyber-meddling exactly news to security specialists. But now of Cofense, isVisit education. Phishing us is a key element in now an acknowledged prob- these attacks and businesses need to help@ their first line W politicians and the general public are waking of defence – their employees – to spot phishing attacks. www.networksecuritynewsletter.com lem, there’s growing concern about up to the potential havoc that hackers could Critical infrastructure: understanding the threats to critical national infra- wreak. As Scott King of Rapid7 explains in the threat 16 structure (CNI). With nation state cyber-meddling now an acknowledged this interview, the threats are real, but not problem, there’s growing concern about the threats to The vulnerability of the systems that necessarily in the way people imagine. critical national infrastructure (CNI). The vulnerability of systems thatVisit underpin the functioning us of @ society isn’t underpin the functioning of society isn’t Full story on page 16… exactly news to security specialists. But now politicians and the generalwww.sealingtechnology.info public are waking up to the potential carnage that hackers could wreak. As Scott King of Financial organisations must show they’re ready Rapid7 explains in this interview, the threats are real, for disaster but not necessarily in the way people imagine. t the beginning of July, the Bank of individual firms and financial market Editorial 2 of England (BoE) and Financial Visit us A infrastructures, or cause harm to con- Report analysis @ 4 Conduct Authority (FCA) gave notice sumers and other market participants Newswww.filtrationindustryanalyst.com in brief 5 to the UK’s financial institutions that in the financial system,” said Andrew Calendar 20 they had three months in which to Bailey, chief executive of the FCA, and produce reports on how they avoid Jon Cunliffe, deputy governor of the IT failures and mitigate cyber-attacks. BoE, in a joint statement at the launch “Operational disruption can impact of the discussion paper. Visit us @ financial stability, threaten the viability Continued on page 3... www.computerfraudandsecurity.com ISSN 1361-3723/18 © 2018 Elsevier Ltd. All rights reserved This journal and the individual contributions contained in it are protected under copyright by Elsevier Ltd, and the following terms and conditions apply to their use: Photocopying Single photocopies of single articles may be made for personal use as allowed by national copyright laws. Permission of the publisher and payment of a fee is required for all other photocopying, including multiple or systematic copying, copying for advertising or promotional purposes, resale, and all forms of document delivery. Special rates are available for educational institutionsVisit that wish to make us photocopies @ for non-profit educational classroom use. www.pumpindustryanalyst.com EDITORIAL Editorial Office: Elsevier Ltd cell site location information (CSLI) The Boulevard,Editorial Langford Office: ElsevierLane, Kidlington, Ltd Editorial which showed that he was in the The Oxford,Boulevard, OX5 Langford 1GB, United Lane, Kingdom Kidlington, hings seem to have taken a location of each robbery when it hap- Oxford,Fax: OX5 +44 1GB, (0)1865 United 843973 Kingdom turn for the better lately with E-mail:Tel: [email protected]+44 1865 843239 T pened. The Supreme Court, however, Web: www.computerfraudandsecurity.com regard to privacy. And no, I’m not ruled this was a breach of the Fourth talking about the EU’s General PublishingPublisher: Director: Greg BethanValero Keall Amendment protection against unrea- Data Protection Regulation (GDPR), Editor:E-mail: [email protected] Mansfield-Devine sonable search. This is a major change although that will have focused E-mail:Editor: [email protected] Steve Mansfield-Devine in the law because it’s the first time E-mail: [email protected] the minds of many organisations Editorial Advisors: the amendment has been applied to in the right direction. Silvano OngettaEditorial, Italy; Advisors: Chris Amery , UK; something other than physical evi- JanSilvano Eloff , OngettaSouth Africa;, Italy; Hans Chris Gliss Amery, Germany;, UK; The US Supreme Court has handed David Herson, UK; P. Kraaibeek, Germany; dence. Jan Eloff, South Africa; Hans Gliss, Germany; down a somewhat surprising ruling WayneDavid Madsen Herson, ,Virginia, UK; P. Kraaibeek USA; Belden, Germany; Menkus , The court emphasised that its rul- WayneTennessee, Madsen USA; ,Bill Virginia, Murray USA;, Connecticut, Belden Menkus USA; , that will have major implications for Donn B. Parker, California, USA; Peter Sommer, ing applies only to the specific issue Tennessee, USA; Bill Murray, Connecticut, USA; how some data is used. In the case DonnUK; Mark B. Parker Tantam, California,, UK; Peter USA; Thingsted Peter Sommer, Denmark;, UK; of location data and that it does not HankMark Wolfe Tantam, New, UK;Zealand; Peter Charles Thingsted Cresson, Denmark; Wood, of Carpenter vs the United States, USA; Bill J. Caelli, Australia extend to “conventional surveillance Hank Wolfe, New Zealand; Charles Cresson Wood, the court effectively overturned the USA; Bill J. Caelli, Australia techniques and tools, such as security Production Support Manager: Lin Lucas so-called ‘third-party doctrine’ – the E-mail: [email protected] cameras; does not address other busi- Production Support Manager: Lin Lucas assumption that when you hand your SubscriptionE-mail: Information [email protected] ness records that might incidentally An annual subscription to Computer Fraud & Security private information to a third party, Subscription Information reveal location information; and does includes 12 issues and online access for up to 5 users. An annual subscription to Computer Fraud & Security includes such as an online service, that you can Subscriptions run for 12 months, from the date not consider other collection tech- 12 issues and online access for up to 5 users. payment is received. no longer have any reasonable expec- Prices: niques involving foreign affairs or E1139 for all European countries & Iran tation of privacy with regard to that More information: www.elsevier.com/journals/institu- national security”. US$1237 for all countries except Europe and Japan tional/computer-fraud-and-security/1361-3723 information. ¥151 620 for Japan CSLI is “detailed, encyclopaedic, (Prices valid until 31 December 2011) Permissions may be sought directly from Elsevier Global Rights This led to the situation where To subscribe send payment to the address above. and effortlessly compiled” and is auto- Department, PO Box 800, Oxford OX5 1DX, UK; phone: +44 1865 mobile phone operators were selling Tel:843830, +44 (0)1865fax: +44 1865 843687/Fax: 853333, email: +44 [email protected]. (0)1865 834971 You matically collected, requiring no action Email:may also [email protected], contact Global Rights directly through Elsevier’s home page customer information – including on the part of the subscriber.