Data Privacy: the Current Legal Landscape February 2016
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics
UNIVERSIDAD POLITECNICA´ DE MADRID ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics PH.D THESIS Platon Pantelis Kotzias Copyright c 2019 by Platon Pantelis Kotzias iv DEPARTAMENTAMENTO DE LENGUAJES Y SISTEMAS INFORMATICOS´ E INGENIERIA DE SOFTWARE ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF: Doctor of Philosophy in Software, Systems and Computing Author: Platon Pantelis Kotzias Advisor: Dr. Juan Caballero April 2019 Chair/Presidente: Marc Dasier, Professor and Department Head, EURECOM, France Secretary/Secretario: Dario Fiore, Assistant Research Professor, IMDEA Software Institute, Spain Member/Vocal: Narseo Vallina-Rodriguez, Assistant Research Professor, IMDEA Networks Institute, Spain Member/Vocal: Juan Tapiador, Associate Professor, Universidad Carlos III, Spain Member/Vocal: Igor Santos, Associate Research Professor, Universidad de Deusto, Spain Abstract of the Dissertation Potentially unwanted programs (PUP) are a category of undesirable software that, while not outright malicious, can pose significant risks to users’ security and privacy. There exist indications that PUP prominence has quickly increased over the last years, but the prevalence of PUP on both consumer and enterprise hosts remains unknown. Moreover, many important aspects of PUP such as distribution vectors, code signing abuse, and economics also remain unknown. In this thesis, we empirically and sys- tematically analyze in both breadth and depth PUP abuse, prevalence, distribution, and economics. We make the following four contributions. First, we perform a systematic study on the abuse of Windows Authenticode code signing by PUP and malware. -
Privacy and Data Security Update 2016
Privacy & Data Security Update: 2016 Federal Trade Commission January 2016 - December 2016 The Federal Trade Commission (FTC or Commission) is an independent U.S. law enforcement agency charged with protecting consumers and enhancing competition across broad sectors of the economy. The FTC’s primary legal authority comes from Section 5 of the Federal Trade Commission Act, which prohibits unfair or deceptive practices in the marketplace. The FTC also has authority to enforce a variety of sector specific laws, including the Truth in Lending Act, the CAN-SPAM Act, the Children’s Online Privacy Protection Act, the Equal Credit Opportunity Act, the Fair Credit Reporting Act, the Fair Debt Collection Practices Act, and the Telemarketing and Consumer Fraud and Abuse Prevention Act. This broad authority allows the Commission to address a wide array of practices affecting consumers, including those that emerge with the development of new technologies and business models. How Does the FTC Protect Consumer Privacy and Ensure Data Security? The FTC uses a variety of tools to protect consumers’ privacy and personal information. The FTC’s principal tool is to bring enforcement actions to stop law violations and require companies to take affirmative steps to remediate the unlawful behavior. This includes, when appropriate, implementation of comprehensive privacy and security programs, biennial assessments by independent experts, monetary redress to consumers, disgorgement of ill-gotten gains, deletion of illegally obtained consumer information, and provision of robust transparency and choice mechanisms to consumers. If a company violates an FTC order, the FTC can seek civil monetary penalties for the violations. The FTC can also obtain civil monetary penalties for violations of certain privacy statutes and rules, including the Children’s Online Privacy Protection Act, the Fair Credit Reporting Act, and the Telemarketing Sales Rule. -
Ultrasound-Based Cross-Device Tracking
Vasilios Mavroudis*, Shuang Hao, Yanick Fratantonio, Federico Maggi, Christopher Kruegel, and Giovanni Vigna On the Privacy and Security of the Ultrasound Ecosystem Abstract: Nowadays users often possess a variety of elec- Keywords: Ultrasounds, Deanonymization, tronic devices for communication and entertainment. In Privacy Violation, Cross-device Linking. particular, smartphones are playing an increasingly central role in users’ lives: Users carry them everywhere they go and often use them to control other devices. This trend pro- vides incentives for the industry to tackle new challenges, 1 Introduction such as cross-device authentication, and to develop new monetization schemes. A new technology based on ultra- Modern users have been increasingly relying on multi- sounds has recently emerged to meet these demands. Ul- ple devices and frequently switch between them in their trasound technology has a number of desirable features: it daily lives: Browsing the Internet from computers, playing is easy to deploy, flexible, and inaudible by humans. This mobile games on tablets, or watching shows on televi- technology is already utilized in a number of different real- sions. A recent survey has shown that a single user carries world applications, such as device pairing, proximity detec- 2.9 electronic devices on average [44]. Among the others, tion, and cross-device tracking. smartphones play a prominent role since users carry them This paper examines the different facets of ultrasound- everywhere they go, and they are often used to control based technology. Initially, we discuss how it is already used other devices. The trend of engaging with multiple digital in the real world, and subsequently examine this emerging platforms brought to the demand for new technologies to technology from the privacy and security perspectives. -
Cross-Device Tracking: Measurement and Disclosures
Proceedings on Privacy Enhancing Technologies ; 2017 (2):113–128 Justin Brookman, Phoebe Rouge, Aaron Alva, and Christina Yeung Cross-Device Tracking: Measurement and Disclosures Abstract: Internet advertising and analytics technology share common attributes — such as the same lo- companies are increasingly trying to find ways to link cal network and IP address — those services may behavior across the various devices consumers own. This be able to correlate user activity across devices. In cross-device tracking can provide a more complete view visiting 100 sites on two virtual devices, we con- into a consumer’s behavior and can be valuable for a nected to 861 different third party domains on both range of purposes, including ad targeting, research, and devices, including domains operated by dedicated conversion attribution. However, consumers may not be cross-device tracking companies. aware of how and how often their behavior is tracked – 96 out of 100 of the sites we tested allowed con- across different devices. We designed this study to try sumers to submit a username or email address that to assess what information about cross-device tracking could be shared to correlate users across devices. (including data flows and policy disclosures) is observ- – Six companies that collect login information as a able from the perspective of the end user. Our paper first party also collect extensive behavioral data as demonstrates how data that is routinely collected and a third party on other websites. shared online could be used by online third parties to – 16 out of 100 sites shared personally identifying in- track consumers across devices. -
Zero-Permission Acoustic Cross-Device Tracking
Zero-Permission Acoustic Cross-Device Tracking Nikolay Matyunin Jakub Szefer Stefan Katzenbeisser Technical University of Darmstadt, CYSEC Yale University Technical University of Darmstadt, CYSEC Darmstadt, Germany New Haven, CT, USA Darmstadt, Germany [email protected] [email protected] [email protected] Abstract—Adversaries today can embed tracking identifiers and detect them in a mobile application to show location- into ultrasonic sound and covertly transmit them between de- relevant content. The company Silverpush developed means of vices without users realizing that this is happening. To prevent embedding tracking identifiers into TV streams. Meanwhile, such emerging privacy risks, mobile applications now require a request for an explicit user permission, at run-time, to get researchers [4] demonstrated how the uXDT technology can access to a device’s microphone. In this paper, however, we be used for web-tracking purposes, e.g., for transmitting a show that current defenses are not enough. We introduce a tracking ID from the Tor browser to an application on the novel approach to acoustic cross-device tracking, which does not user’s smartphone in order to de-anonymize the web session. require microphone access, but instead exploits the susceptibility Due to privacy concerns, uXDT technology raised the atten- of MEMS gyroscopes to acoustic vibrations at specific (ultrasonic) frequencies. Currently, no permissions are needed to access the tion of public media [5] and the security community [4], [6]. gyroscope’s data, and the gyroscope can be accessed from apps or In response, the Federal Trade Commission issued warning even from a web browser. -
Something Fishy Going on Not a Direct Line Between You and the Store
March 2015 Like all fish stories, it just keeps getting bigger is done entirely over the Web, and an Internet con- nection is not like an old-fashioned phone call. It’s Something Fishy Going On not a direct line between you and the store. What started last year with an annoying bit of adware Instead, your information hops a number of times has mushroomed into revelations of critical flaws in between servers and gateways before ever reaching the basic software universally depended upon for Amazon’s cloud. This means your private data could secure communications – including buying and sell- be spied upon, and Amazon’s replies could be imper- ing online. Moveover, the essential issues raised sonated, too. Therefore it’s crucial to ensure that you touch the core problem of trust on the Internet and really are talking with Amazon and no one else. the means to guarantee it, which affects everyone. Sets of keys and secret handshakes It began when the world's largest PC manufacturer, China-based Lenovo , quietly preinstalled some TLS and the digital certificate scheme’s sole purpose adware from a Palo Alto company called Superfish , is to make sure who’s at the other end of the conver- specializing in “visual search”, on some of its note- sation. It all hinges upon a very complicated method books. When users would to pause to look at some- based on some mathematical wizardry called public- thing while shopping, they’d be faced with a popup key cryptography . This is how it basically works: ad suggesting alternatives from elsewhere. -
September 2015 M&A and Investment Summary Table of Contents
September 2015 M&A and Investment Summary Table of Contents 1 About Petsky Prunier 3 2 Overview of Monthly M&A and Investment Activity 6 3 Monthly M&A and Investment Activity by Industry Segment 12 4 Additional Monthly M&A and Investment Activity Data 42 Securities offered through Petsky Prunier Securities, LLC, member of FINRA. This M&A and Investment Summary has been prepared by and is being distributed in the United States by Petsky Prunier, a broker dealer registered with the U.S. SEC and a member of FINRA. Petsky Prunier is not affiliated with Altium Capital Ltd, but has partnered with Altium to expand its international presence. Altium has not prepared or verified the information in this Summary. Persons in the United States should contact Petsky Prunier for further information or services. This M&A and Investment Summary is not being distributed by Altium Capital Ltd in the United States and Altium Capital Ltd is not offering any services to persons in the United States. 2 | M&A and Investment Summary September 2015 Petsky Prunier: Maximizing Shareholder Value . Top-ranked, global investment bank dedicated to digital advertising and marketing, eCommerce, digital media, technology, information, business services, and healthcare services industries . Extensive sell-side M&A and capital raise expertise, with a transaction closing rate unmatched at our level of deal volume . Founded in 1999 . More than 50 focused professionals; growth of 40% since 2011 . New York, Palo Alto, Las Vegas, Chicago, Boston, Tampa . Deep relationships across a broad spectrum of strategic buyers, as well as private equity, growth equity, and VC groups and lenders . -
Cross-Device Tracking: Measurement and Disclosures
Proceedings on Privacy Enhancing Technologies ; 2017 (2):133–148 Justin Brookman, Phoebe Rouge, Aaron Alva, and Christina Yeung Cross-Device Tracking: Measurement and Disclosures Abstract: Internet advertising and analytics technology share common attributes — such as the same lo- companies are increasingly trying to find ways to link cal network and IP address — those services may behavior across the various devices consumers own. This be able to correlate user activity across devices. In cross-device tracking can provide a more complete view visiting 100 sites on two virtual devices, we con- into a consumer’s behavior and can be valuable for a nected to 861 different third party domains on both range of purposes, including ad targeting, research, and devices, including domains operated by dedicated conversion attribution. However, consumers may not be cross-device tracking companies. aware of how and how often their behavior is tracked – 96 out of 100 of the sites we tested allowed con- across different devices. We designed this study to try sumers to submit a username or email address that to assess what information about cross-device tracking could be shared to correlate users across devices. (including data flows and policy disclosures) is observ- – Six companies that collect login information as a able from the perspective of the end user. Our paper first party also collect extensive behavioral data as demonstrates how data that is routinely collected and a third party on other websites. shared online could be used by online third parties to – 16 out of 100 sites shared personally identifying in- track consumers across devices. -
Not-A-Virus'' Bundled Adware: the Wajam Case
Privacy and Security Risks of “Not-a-Virus” Bundled Adware: The Wajam Case Xavier de Carné de Carnavalet Mohammad Mannan [email protected] [email protected] Concordia University Montreal, QC, Canada ABSTRACT e.g., “not-a-virus”, “Unwanted-Program”, “PUP.Optional”, which Comprehensive case studies on malicious code mostly focus on may not even trigger an alert [24, 34]. After all, displaying ads is not botnets and worms (recently revived with IoT devices), prominent considered a malicious activity, and users even provide some form pieces of malware or Advanced Persistent Threats, exploit kits, of “consent” to install these unwanted bundled applications [75]. and ransomware. However, adware seldom receives such attention. However, prior to 2006, adware was also labeled as “spyware” [18], Previous studies on “unwanted” Windows applications, including due to its privacy-invasive nature. Since then, several lawsuits suc- adware, favored breadth of analysis, uncovering ties between differ- ceeded in downgrading the terms used by AV companies to adware, ent actors and distribution methods. In this paper, we demonstrate then to PUP/PUA [46, 58]. Consequently, adware has received less the capabilities, privacy and security risks, and prevalence of a par- scrutiny from the malware research community in the past decade ticularly successful and active adware business: Wajam, by tracking or so. Indeed, studies on PUPs tend to focus mostly on the rev- its evolution over nearly six years. We first study its multi-layer enues, distribution and relationships between actors [36, 74, 75], antivirus evasion capabilities, a combination of known and newly and the abuse of code signing certificates by PUPs to reduce sus- adapted techniques, that ensure low detection rates of its daily picion [37]. -
Lenovo Stops Superfish Preloads and Issues Advisory 21 February 2015, by Nancy Owano
Lenovo stops Superfish preloads and issues advisory 21 February 2015, by Nancy Owano previously included on some consumer notebook products shipped between September 2014 and February 2015, said Lenovo. The company also said that the software has never been installed on any enterprise product—servers or storage—and these products were in no way impacted. Also, Lenovo said it never installed this software on ThinkPad notebooks nor Lenovo desktops or smartphones. Superfish is a Palo Alto, California-based company which, with patented technology, developed a visual search engine. Writing in Bloomberg, Jordan Robertson said, "Superfish uses image-recognition algorithms that watch where users point on their screens and suggest ads based on the images they're looking at." The problem, said security Lenovo has seen calmer weeks. News sites in watchers, is that it could potentially expose users to droves rang chimes and sirens over an adware unauthorized activity monitoring. Robertson made program on some Lenovo models escalating to the point that in general pre-installed software concerns about the potential risk of a Man in the poses security and privacy concerns because Middle threat. Lenovo has been attempting to meet questionable behavior is hard to detect and the storm head-on and has stopped preloads of programs may be difficult to uninstall. the program called Superfish. In a statement, Lenovo said, "In our effort to enhance our user Lenovo's own security advisory issued the potential experience, we pre-installed a piece of third-party impact as "Man-in-the-Middle Attack" and called the software, Superfish (based in Palo Alto, CA), on severity "High." Lenovo said it ordered the pre-load some of our consumer notebooks. -
Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem
Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem Xavier de Carné de Carnavalet A thesis in The Concordia Institute for Information Systems Engineering Presented in Partial Fulfillment of the Requirements For the Degree of Doctor of Philosophy (Information and Systems Engineering) at Concordia University Montréal, Québec, Canada July 2019 c Xavier de Carné de Carnavalet, 2019 CONCORDIA UNIVERSITY School of Graduate Studies This is to certify that the thesis prepared By: Mr. Xavier de Carné de Carnavalet Entitled: Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem and submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information and Systems Engineering) complies with the regulations of this University and meets the accepted standards with re- spect to originality and quality. Signed by the final examining committee: Chair Dr. William Lynch External Examiner Dr. Carlisle Adams External to Program Dr. Wahab Hamou-Lhadj Examiner Dr. Amr Youssef Examiner Dr. Jeremy Clark Thesis Supervisor Dr. Mohammad Mannan Approved by Dr. Mohammad Mannan, Graduate Program Director July 24, 2019 Dr. Amir Asif, Dean Gina Cody School of Engineering and Computer Science Abstract Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem Xavier de Carné de Carnavalet, Ph.D. Concordia University, 2019 Transport Layer Security (TLS) is one of the most widely deployed cryptographic protocols on the Internet that provides confidentiality, integrity, and a certain degree of authenticity of the communications between clients and servers. Following Snowden’s revelations on US surveillance programs, the adoption of TLS has steadily increased. -
Issa-Cos Newsletter
ISSA-COS WWW.ISSA - COS.ORG NEWSLETTER VOLUME 4 NUMBER 3 M A R C H 2 0 1 5 Getting Ready For Spring INSIDE THIS ISSUE: olleagues, event one evening in April and the The Tech Industry’s board is finalizing the details of As I write this we are Darkest Secret: It’s All 2 what that will look like. If you have About Age busily preparing for our ideas of what you Membership Update 3 C Spring would like to see conference to be held Chapter Financials 4 A Note From please let your Training Team on 25 March at 5 Members-At-Large, Update UCCS. We have Our President Russ Weeks and A Note from Our Vice several vendors 5 James Asimah, President signed up, a very know. This is ISSA-COS Cyber interesting group of 10 something new for Focus Day speakers focused on us and there are no Are You a Risk to cybercrime topics, going-in plans that Your Own Firm or 13 and a real opportunity Business? say ‘we have to do to reach out to a How the NSA’s things this way”… Firmware Hacking population of people 12 let’s make the event Works and Why It’s working cybersecurity By Dr. Patrick Laverty So Unsettling something we want issues in our town Surprise! America it to be, all ideas will receive fair Already Has a who have either never heard of 15 discussion and consideration so Manhattan Project for ISSA or don’t fully know the Developing Cyber bring them up.