USC Data Science Program 529 (DSci 529): Security and Privacy in Informatics - Spring 2021
Lecture Friday - Noon to 3:20PM PM
Clifford Neuman
Current Events for February 26 2021
What’s Different About Data Security in the Cloud? Almost Everything -Ron Bennatan, Security Boulevard, Feb. 24th 2021
Many tech companies have accelerated their modernization plans for practical reasons due to the pandemic of covid-19 but it's hard for security to catch up with these cloud services. Most of the companies are facing two problems of data leak and non-compliance which lead to a great security gap between modern acceleration and the security policy. –Zixin Zheng
Government Use of Data
Singapore Government Plan To Install Monitoring App on Student Computers Meets With Resistance From Privacy Groups, NGOs Scott Ikeda, CPO, 02, 18, 2021
The government of Singapore is rolling out an initiative that aims to ensure all secondary school students in the country have a computer for home learning. However, these student computers will come packed with a potentially unwelcome addition: a monitoring app that allows teachers to view and control the screens remotely. And once the computers are distributed, students using their own devices will be required to install the monitoring app on them as well.
-Yueming, Gao
Supply Chain Subversion
Data security depends on a secure software-development supply chain - Author: Santiago Torres-Arias, Source: Venture Beat, Date: January 24, 2021
Today, if we want to protect data security and prevent supply-chain attacks, the key challenge is, how can we secure today's ecosystem that is made mostly of open-source and closed-source hybrids? Given the cultural background and approach to open source that is pervasive today, developers need to start injecting infrastructure and convey all of this information to users and consumers so they can make educated decisions. Besides, the lazy factor also causes this problem, using cryptography is inconvenient and not taken seriously. A cryptographic paper trail can provide verifiable information. --Tingyi Guo
Other
How to Identity Proof in an Increasingly Virtualized World - Jonathan McDonald, Entrepreneur January 28, 2021
Businesses are improving identity techniques to keep balance between security and accessibility, so that users can access their services without burdensome steps, but hackings can be detected and prevented. Several digital footprints are involved into intelligence analysis to draw a more complete picture bring more confidence for identity proof. Risks, however, still exist, as fraudsters are innovating hack techniques, and more data are being collected and in risk of exposure. – Lingyu Ge
CES2021: Raising the Bar on Privacy and Trust Online in 2021 -James Coker, INFO Security,Jan. 28th 2021
On the Consumer Electronics Show (CES) 2021, a message of rasing the bar on privacy of those tech companies' online services was brought up due to more customers were using their products for very important interactions. Many Tech companies claimed that they have a duty to help users feel safe online when using their products, and also including transparent privacy controls and data protection rules. In addition. those collections towards user's private datas for artificial intelligence and machine learning purposes were brought up to be concerned. –Zixin Zheng
Tik Tok bug gave access to contact's profile details - Author(Phil Muncaster), Source(Info Security Magazine) Date: 26 Jan 2021
A bug in Tik Tok's find a friend feature was found which allows an attacker to get details to all contacts in a victim's phone book
Since user's sync their phone numbers with their account this allows attackers to bypass https messaging to sign in
An attacker could use this to get private sensitive information and use it for malicious purposes such as phising.
Animals should also have digital privacy Rose Eveleth, 1/31/2020
We humans always care about the terrible outcomes of surveillance of the ubiquitous cameras, animals may have been watched more. Animals cannot choose what information to provide to other individuals. Data that the animals generated can be used to hurt them, for example, poachers in India attempted to hack into data from GPS collar of a tiger.- Chengyuan Zhou
The Pandemic and Privacy
Proposed Bill to Protect Health Related Data - Anuja Vaidya, MedCity News February 2, 2021
One of the main ways that the government has tried to control the spread of COVID-19 is by using technology. Because of this, there has been a large increase in health and medical data recorded for citizens. To ensure that this data is not misused and that an individuals privacy is protected, Democrats have proposed the Public Health Emerging Privacy Act to ensure that companies don't misuse this data for marketing and that the data is prevent from landing in the wrong hands. – Addison Allred
The Better Business Bureau is warning people not to post their Covid-19 vaccination cards on social media
- Alaa Elassar, CNN 2.1, 2021
The Better Business Bureau warns people do not share their covid-19 vaccine cards because they may give their personal info away. Another issue is that it provides convenience to scammers to create imitation cards to sell. The BBB suggests to share vaccine stickers instead of vaccine cards. – Bolong Pan
Scammers Selling Fake #COVID19 Vaccination Cards for Just $20 - Phil Muncaster, Infosecurity Magazine 02/10/2021
13% of Americans saying they won’t take the vaccine, which now emerged a black market regarding the COVID-19 vaccine card. According to DomainTools, scammers copy batch code from people who posted their real card on social media and started to sell them on Shopify-backed online stores. They have reached out to Shopify to monitor this kind of goods– Mingliao Xu
Working From Home Can Be Deadly - Myrle Croasdale, Digital Privacy, 18th February 2021
COVID Pushes Up HIPAA Violations Last Year to Second-Straight Record and soared 26% last year. Two major factors driving this trend are how medical records are considered to be information gold mine for identity thieves and how people in medical fields are less prepared in cybersecurity compared to other sectors - Nana Andriana
The Hot New Covid Tech Is Wearable and Constantly Tracks You - Natasha Singer, New York Times 11/15/2020
The powerful new surveillance systems, wearable devices that continuously monitor users, are being used in many places for different groups and purposes. In Rochester, Mich., Oakland University is preparing to hand out wearable devices to students that log skin temperature once a minute. In Plano, Texas, employees at the headquarters of Rent-A-Center started wearing detectors for virus exposure. And in Knoxville, students on the University of Tennessee football team tuck proximity trackers under their shoulder pads during games - Tian Yang
Privacy Regulation and other Government Regulation
TikTok Consumer Privacy Class Settlement Includes $92M Payout - Author(Ashley Cullins), Source(hollywoodreporter) Feb 24, 2021
TikTok has reached a deal that will resolve a class-action complaint over consumer privacy violations via its current app and its predecessor, Musical.ly, and, if approved by the court, the video-sharing social platform will pay $92 million into a settlement fund.
In addition to the payout, TikTok also has promised to initiate a new privacy compliance training program to protect users' data. -- Kaifan Lu
TikTok to Pay $92 Million Settlement in Nationwide Class-Action Lawsuit Over Alleged Privacy Violations -
Alyse Stanley, GIXMODO Feb 25, 2021
TikTok paid $92 million to settle a complaint about privacy violation. TikTok was claimed using facial recognition technology secretly to collect users’ biometric data, including ethnicity, gender and age, and some high-sensitive personal data without user’s permission and selling them to some third- party cooperators. TikTok denied most of the claims, but they agreed not to collect data out of the privacy policy. – Lingyu Ge
Balancing Privacy With Data Sharing for the Public Good - Erik Carter, The New York Times, 2/19/21
This is about economic news. Economists say that data with social value can be combined with standards to protect personal privacy. Governments and technology companies are increasingly collecting large amounts of personal data, which has produced new laws, numerous investigations, and calls for stricter regulations to protect personal privacy. – Yansong Wang
U.K. Tabloid Invaded Meghan’s Privacy, Judge Says - Mark Landler- The New York Time 02/11/2021
A High Court judge ruled that The Mail, a U.K. tabloid, had violated the privacy of Meghan Markle, the Duchess of Sussex, by publishing a private letter she had sent to her estranged father. The tabloid received a letter from Meghan's father, Thomas Markle, in February 2019 and contended that he was under no legal obligation to keep the contents of the letter private, due to the duchess' role as a public figure. Nevertheless, the judge ruled that Meghan, the Duchess of Sussex, had a reasonable expectation that the contents of the letter would remain private, calling the disclosures from the letter, published by the article, "manifestly excessive and hence unlawful".
-- Philana Williams
New Ethical Concerns in Online Privacy and Data Security - Joseph Chukwube, InfoSecurity, 02/05/21
The paper yields the ethical concern on the privacy of online technology and hopes to raise user’s awareness of rights regarding internet privacy. The author mentions GDPR which the users have the right to choose how their data is used, controlled, and stored. And the author provides the example of WhatsApp released a controversial new privacy policy that allows it to share data with Facebook and forces users to accept the same. – Yi Lin
Most are concerned about data privacy, but few are willing to change habits -Help Net Security, Feb 4, 2021 People are concerned more about their data privacy, especially during the pandemic. However, they are not protecting their personal information proactivity, some don't even read the terms and conditions. Many people, especially the younger generations, are willing to share their personal information for convenience. – Junbo Sheng
CCPA: Privacy Notices & Access Requests - David A. Zetoony - National Law Review Jan 29, 2020
While CCPA(California Consumer Privacy Act) allows consumers to "institute a civil action" for unauthorised access to their personal information, it does not provide a right of action. CPRA(California Privacy Rights Act), which is based on CCPA, uses the term “right to know” and “right to access” synonymously. A customer can submit request of specific information, which urges companies to give more detailed information than category-level, which was the case before. – Zihuan Ran
Gov. DeSantis slams big tech, proposes data privacy bill -
WFLA8 Staff, WFL8 2-15-21 Earlier this week, Gov. DeSantis proposed a new law to protect data privacy from Floridians from big tech. The proposed law features elements such as allowing users to request that their data be deleted and for them to have the option of opting out of the selling of personal information. Many believe that a source of motivation for such efforts revolves around the fact that platforms such as Twitter, banning Former President Trump. –Resherle Verna
States Push Internet Privacy Rules in Lieu of Federal Standards - David Uberti, The Wall Street Journal 02/18/2021
Data protection bills in Washington and Virginia come as the coronavirus pandemic pushes life further online, e-commerce, marketing and tech companies must navigate differing state-level privacy laws.There are increasing phenomenon of state-level internet privacy proposals aiming to replace nationwide framework, which could provide new protections for consumers and additional question marks for businesses. Many businesses have warned of a supplement of privacy laws since California passed its landmark statute in 2018, which supercharged other state-level attempts to pass comprehensive data protections in lieu of a federal standard.
– Lei Gao
Virginia is about to get a major California-style data privacy law. - Kate Cox, arsTECHNICA 2/11/2021
Virginia is about to become the second state in the country which adopts a comprehensive online data protection law for consumers. The CDPA applies to entities that "control or process" personal information of 100,000 or more Virginia residents in a calendar year or to entities that make 50 percent or more of their gross revenue from the sale of personal data if they hold information about at least 25,000 residents. – Rosy Zhou
New state privacy initiatives turn up heat on Congress - Rebecca Klar and Chris Mills Rodrigo, The Hill 02/10/2021
Virginia will be the second state that passes its state-level data privacy bills after California passed its privacy law in 2018. Many other states also have their plans on data privacy laws pending, while experts believe that different state levels can be troublesome. Experts expect the Biden administration to be more proactive in pushing forward a federal-level data privacy law. – Haonan Xu
Virginia Consumer Data Protection Act
on the horizon — Now what? - Joseph Duball, IAPP, 4 February 2021
Virginia is set to be the next U.S. state with a comprehensive data
privacy law, Consumer Data Protection Act (CDPA). The Senate Bill
passed unanimously by the Virginia Senate on its first and second
readings and is set for the final approval on Feb 5. The bill follows
principles outlined in CCPA and GDPR such as threshold requirements,
definition of personal data, individual rights for VA residents, and
opt-out provisions. More interestingly, it includes a separate
category called "sensitive data" which includes racial or ethnic
origin, religious beliefs, biometric data, and geolocation that can
only be processed with consent. If signed into law, it will go into
effect the same day as CPRA (January 1, 2023). -- Jonathan De Leon
Banks and fintechs battle over financial data - Tomio Geron, Protocol, 4th February 2021
The Consumer Financial Protection Bureau is preparing to change its rules on financial data. In Section 1033 of the Dodd-Frank Act, the changes could have a major impact on how consumers can access and move their financial data between banks, fintechs and other companies — as well as which companies become consumers' go-to source for financial services. – Nana Andriana
Singapore assessing WhatsApp privacy policy change, not 'adversely affected' in SolarWinds breach - Eileen Yu, By The Way 02/02/21
Singapore has yet to see any significant impacts from the SolarWinds security breach on its critical information infrastructures or government systems. But It is looking into concerns related to upcoming privacy policy changes on WhatsApp, which is amongst messaging platforms the government uses to push information to the local population. WhatsApp in recent weeks has begun pushing notifications to users about an update to its privacy statement. –Yixiang Cao
Apple
First Malware Designed for Apple M1 Chip Discovered in the Wild - Ravie Lakshmanan, The Hacker News, 2-18-2021
Despite being only recently released, there is already a piece of malware similar to Pirrit that is able to infect the device. Despite being a natively x86 compatible malware, it has been modified to run on the M1's ARM architecture and allow the download and install of unwanted applications ie the GoSearch22 adware. Although GoSearch22 has had its certificates revoked, it had the ability, when valid, to disguise itself as a legitimate browser and collect browsing data as well as pop up random advertisements and download more malware. This is the first of what is likely to be many compromises of Apple's newly designed CPU. -Vartan Batmazyan
Apple’s New Privacy Labels May Not Always Be Correctly Applied Scott Ikeda, CPO Magazine, 02/12/2021- The privacy labels of some Apple apps were found to not accurately represent the information collected, tested by a number of media sources
- The main issue is due to apple's not checking each and every app submitted to the store for compliance
- It seems like Apple’s new privacy labels may rely strongly on “community policing” to be truly effective, if not properly handled
- Haipeng Yu
iOS 14.4 update fixes iPhone security bugs, so it’s best to install it ASAP - The Verge>New iPhone update fixes actively exploited vulnerability - Mitchell Clark, The Verge January 26 2021
As discussed in lecture, security mechanisms are what realize security policy. In its most recent patch notes, Apple disclosed an 'arbitrary code execution' bug. This kind of flaw allows hackers to bypass security mechanisms and unfortunately it was seen 'actively exploited'. – Francisco Ventura
What We Learned From Apple’s New Privacy Labels - Brian X. Chen, New York Times,Jan. 27, 2021
APPLE store requires application manufacturers to list labels to indicate how the application will use the collected data to process customer information, which will also cause confusion for other applications. How to Read Apple’s Privacy Labels become important.
– Jinglun Chen
Apple and Facebook at odds over privacy move that will hit online ads - Alex Hern, theguardian.com, Jan 28, 2021
Apple decided to release a new feature called App Tracking Transparency(ATT) in "early spring". This will require apps to ask for users' permission in order to track them around the web. Facebook said Apple was pushing for "anti-personalized ads and will take the world back 10 or 20 years", they believe "ATT" will kill small businesses by preventing them from advertising to would-be customers. Also, Facebook targets a number of other features of IOS that are applied unfairly. A new set of "privacy nutrition labels" requires Facebook to list the types of data it collects while apps provided by Apple like iMessage do not display the same info. - Xihao Zhou