Image

It is not all doom and gloom: When cybersecurity gave us hope in 2023

A humorous — however true — joke at TechCrunch is that the safety desk may as properly be known as the Division of Dangerous Information, since, properly, have you seen what we’ve covered of late? There’s a unending provide of devastating breaches, pervasive surveillance and dodgy startups flogging the downright harmful.

Typically although — albeit hardly ever — there are glimmers of hope that we wish to share. Not least as a result of doing the appropriate factor, even (and particularly) within the face of adversity, helps make the cyber-realm that little bit safer.

Bangladesh thanked a safety researcher for citizen knowledge leak discovery

When a safety researcher discovered {that a} Bangladeshi authorities web site was leaking the private info of its residents, clearly one thing was amiss. Viktor Markopoulos discovered the uncovered knowledge because of an inadvertently cached Google search outcome, which uncovered citizen names, addresses, cellphone numbers and nationwide identification numbers from the affected web site. TechCrunch verified that the Bangladeshi authorities web site was leaking knowledge, however efforts to alert the federal government division were initially met with silence. The info was so delicate, TechCrunch couldn’t say which authorities division was leaking the information, as this may expose the information additional.

That’s when the nation’s laptop emergency incident response workforce, often known as CIRT, acquired in contact and confirmed the leaking database had been fixed. The info was spilling from none aside from the nation’s delivery, demise and marriage registrar workplace. CIRT confirmed in a public notice that it had resolved the data spill and that it left “no stone unturned” to grasp how the leak occurred. Governments seldom deal with their scandals properly, however an e mail from the federal government to the researcher thanking them for his or her discovering and reporting the bug reveals the federal government’s willingness to interact over cybersecurity the place many different nations is not going to.

Apple throwing the kitchen sink at its spyware and adware downside

It’s been greater than a decade since Apple dropped its now-infamous claim that Macs don’t get PC viruses (which whereas technically true, these phrases have plagued the corporate for years). Nowadays essentially the most urgent menace to Apple units is industrial spyware and adware, developed by personal corporations and bought to governments, which may punch a gap in our telephones’ safety defenses and steal our knowledge. It takes braveness to confess an issue, however Apple did precisely that by rolling out Rapid Security Response fixes to fix security bugs actively exploited by spyware makers.

Apple rolled out its first emergency “hotfix” earlier this yr to iPhones, iPads and Macs. The concept was to roll out crucial patches that might be put in with out at all times having to reboot the system (arguably the ache level for the security-minded). Apple additionally has a setting known as Lockdown Mode, which limits sure system options on an Apple system which might be usually focused by spyware and adware. Apple says it’s not aware of anyone using Lockdown Mode who was subsequently hacked. In actual fact, security researchers say that Lockdown Mode has actively blocked ongoing targeted hacks.

Taiwan’s authorities didn’t blink earlier than intervening after company knowledge leak

When a safety researcher advised TechCrunch {that a} ridesharing service known as iRent — run by Taiwanese automotive large Hotai Motors — was spilling real-time updating buyer knowledge to the web, it appeared like a easy repair. However after every week of emailing the corporate to resolve the continuing knowledge spill — which included buyer names, mobile phone numbers and e mail addresses, and scans of buyer licenses — TechCrunch by no means heard again. It wasn’t till we contacted the Taiwanese government for help disclosing the incident that we acquired a response instantly.

Inside an hour of contacting the federal government, Taiwan’s minister for digital affairs Audrey Tang advised TechCrunch by e mail that the uncovered database had been flagged with Taiwan’s laptop emergency incident response workforce, TWCERT, and was pulled offline. The velocity at which the Taiwanese authorities responded was breathtakingly quick, however that wasn’t the top of it. Taiwan subsequently fined Hotai Motors for failing to protect the data of greater than 400,000 prospects, and was ordered to enhance its cybersecurity. In its aftermath, Taiwan’s vice premier Cheng Wen-tsan mentioned the positive of about $6,600 was “too light” and proposed a change to the regulation that will enhance knowledge breach fines by tenfold.

Leaky U.S. courtroom file techniques sparked the correct of alarm

On the coronary heart of any judicial system is its courtroom data system, the tech stack used for submitting and storing delicate authorized paperwork for courtroom circumstances. These techniques are sometimes on-line and searchable, whereas limiting entry to recordsdata that might in any other case jeopardize an ongoing continuing. However when safety researcher Jason Parker discovered several court record systems with incredibly simple bugs that were exploitable using only a web browser, Parker knew they needed to see that these bugs had been mounted.

Parker discovered and disclosed eight safety vulnerabilities in courtroom data techniques utilized in 5 U.S. states — and that was simply in their first batch disclosure. A number of the flaws had been mounted and a few stay excellent, and the responses from states had been combined. Florida’s Lee County took the heavy-handed (and self-owning) place of threatening the safety researcher with Florida’s anti-hacking legal guidelines. However the disclosures additionally despatched the correct of alarm. A number of state CISOs and officers chargeable for courtroom data techniques throughout the U.S. noticed the disclosure as a chance to examine their very own courtroom file techniques for vulnerabilities. Govtech is damaged (and is desperately underserved), however having researchers like Parker finding and disclosing must-patch flaws makes the web safer — and the judicial system fairer — for everybody.

Google killed geofence warrants, even when it was higher late than by no means

It was Google’s greed pushed by advertisements and perpetual progress that set the stage for geofence warrants. These so-called “reverse” search warrants enable police and authorities businesses to dumpster dive into Google’s huge shops of customers’ location knowledge to see if anybody was within the neighborhood on the time against the law was dedicated. However the constitutionality (and accuracy) of these reverse-warrants have been called into question and critics have known as on Google to place an finish to the surveillance apply it largely created to start with. After which, simply earlier than the vacation season, the present of privateness: Google mentioned it might start storing location knowledge on customers’ units and never centrally, successfully ending the ability for police to obtain real-time location from its servers.

Google’s transfer shouldn’t be a panacea, and doesn’t undo the years of injury (or cease police from raiding historic knowledge saved by Google). Nevertheless it may nudge different corporations additionally topic to those sorts of reverse-search warrants — whats up Microsoft, Snap, Uber and Yahoo (TechCrunch’s mother or father firm) — to observe swimsuit and cease storing customers’ delicate knowledge in a means that makes it accessible to authorities calls for.

SHARE THIS POST