Tag: Policy

Beware BitCoin Users: The Tax Man Cometh!

Beware you barrons of BitCoin – you World of Warcraft one-percenters: the long arm of the Internal Revenue Service may soon be reaching into your treasure hoard to extract Uncle Sam’s fair share of your virtual treasure. That’s the conclusion of a new Government Accountability Office (GAO) report on virtual economies, which found that many types of transactions in virtual economies – including bitcoin mining and virtual currency transactions that result in real-world profit – are likely taxable under current U.S. law, but that the IRS does a poor job of tracking such business activity and informing buyers and sellers of their duty to pay taxes on virtual earnings. The report, “Virtual Economies and Currencies: Additional IRS Guidance Could Reduce Tax Compliance Risks” (GAO-13-516) was released this week. It was prepared in response to a request from the U.S. Senate Committee on Finance, which asked GAO to look into virtual […]

Fraud Analytics: You’re Doing It Wrong!

One of the most vexing problems in computer security today is distinguishing malicious from legitimate behavior on victim networks. Sophisticated cyber criminals and nation-backed hacking groups make a point of moving low and slow on compromised end points and networks, while victim organizations are (rightly) wary of disrupting legitimate business activity for the sake of spotting a breach. In this Security Ledger Podcast, Paul interviews Jason Sloderbeck, Director of Product Management at RSA, EMC’s security division.  Jason talks about RSA’s Silvertail fraud analytics technology, and the organizational and technology issues that keep victims from spotting attacks. One of the big mistakes organizations make when they investigate attacks, Sloderbeck said, is focusing too narrowly on a point in time during a web session that is felt to be a good indicator of compromise – like when a user authenticates to a service or “checks out” on an e-commerce web site. “There’s a whole […]

FDA: Medical Device Makers, Hospitals Need To Boost Cyber Security

The U.S. Food and Drug Administration (FDA) has issued guidance to medical device makers and hospitals that use their products to pay more attention to cyber security and the potential for cyber attacks on vulnerable medical instruments.   The FDA released its “Safety Communication for Cybersecurity for Medical Devices and Hospital Networks” on Thursday – the same day that the Department of Homeland Security’s ICS (Industrial Control System) CERT issued a warning about the discovery of hard coded “back door” passwords in some 300 medical devices from 40 separate vendors, including drug infusion pumps, ventilators and patient monitoring systems. The FDA said it expects device makers to “review their cybersecurity practices and policies to assure that appropriate safeguards are in place to prevent unauthorized access or modification to their medical devices or compromise of the security of the hospital network that may be connected to the device. Hospitals were instructed to harden […]

Privacy Bombshell: NSA Given Access To Facebook, Apple, Microsoft, Others

If you haven’t had a chance to check out the Washington Post story on The National Security Agency’s (NSA’s) and FBI’s widespread program of wire tapping, which leads directly into the servers of nine leading U.S. Internet companies, including Facebook, Microsoft, Google and Apple. The classified program, dubbed PRISM, dates to 2007 and the administration of George W. Bush and authorizes the nation’s top spy agency to peer deep into the servers of  popular social networking sites, compiling audio, video, photographs, e-mails, documents and connection logs. Together the information could enable intelligence operators to track an individual’s communications, movements relationships over time. The classified program came to light following the leak of a classified presentation for NSA staff, dated April 2013, that describes the program as critical and a leading contributor of intelligence to President Obama’s daily briefing. While a small cadre of members of Congress were briefed on the program […]

Mobile Phone Use Patterns: The New Fingerprint

Mobile phone use may be a more accurate identifier of individuals than even their own fingerprints, according to research published on the web site of the scientific journal Nature. Scientists at MIT and the Université catholique de Louvain in Belgium analyzed 15 months of mobility data for 1.5 million individuals who the same mobile carrier. Their analysis, “Unique in the Crowd: the privacy bounds of human mobility” showed that data from just four, randomly chosen “spatio-temporal points” (for example, mobile device pings to carrier antennas) was enough to uniquely identify 95% of the individuals, based on their pattern of movement. Even with just two randomly chosen points, the researchers say they could uniquely characterize around half of the 1.5 million mobile phone users. The research has profound implications for privacy, suggesting that the use of mobile devices makes it impossible to remain anonymous – even without the use of tracking […]