Rarely is something what it appears.
So much of our time is spent in a virtual world where disguises are becoming increasingly difficult to spot.
Phishing emails, spoofed websites, hacked & bogus accounts and fake content shared until it reaches viral status -- these and so many other elements of the virtual world fool huge numbers of people each day into taking action or believing things they may not otherwise.
Read on to learn how to look beyond the digital sheep's clothing to spot what may very well be a wolf underneath.
NOTE: I'm using the idiom for this month's topic. Nothing against real wolves; they are beautiful animals!
|
|
U.S. Voting Systems Under Attack
|
The 2018 elections will make 2016 look like preschool.
If we thought the privacy and security concerns raised in the 2016 election cycle were bothersome, just wait until this year's process gets underway.
Over the past several weeks, I've spoken with numerous election and voting system security analysts. Each says we are about to experience an entirely new level of disturbing circumstances.
LISTEN: Are US Voting Systems and Voter Registration Data Secure?
Political muddiness can make it difficult to recognize the reality of cybersecurity threats against our democratic process. However, the July 13 indictment of Russian intelligence officers for hacking during the 2016 elections makes it quite a bit harder to deny.
Shows that address this topic
Tune into the on-demand episode of my radio show
with guest Maurice Turner
, a senior technologist at the Center for Democracy & Technology, to learn more.
I also addressed this topic in my June 26 show with Ed Moyle and plan to cover it several more times between now and the November elections in the U.S. Please share your feedback, and if you have any guest suggestions, especially those who are experts in voting and elections security, send them my way!
|
|
Privacy Heroes: Drs. Katina & M.G. Michael
|
|
'Uberveillance coined,' pair dedicate careers to privacy awareness
Dr. M.G. brings a unique, cross-disciplinary perspective to the international conversation around privacy, as he is a theologian and a historian. Also posted at the University of Wollongong's School of Computing and Information Technology, Dr. M.G. is an Associate Professor. Previously, he was coordinator of Information & Communication Security Issues for the university.
The focus of Dr. Katina & Dr. M.G.'s research, writing and speaking touches on a number of fascinating topics, from cryptography and the auto-ID trajectory to biometrics and chip implants. If you ever get the chance to attend a talk by either of these very bright, very passionate and very educated individuals, take it. They are doing great things to put the international community of consumers, business and governments on the right path to protecting our most precious digital assets, among them, our identities!
We want to know: Who is your privacy hero?
Throughout 2018, we'll introduce an individual or team who has gone over and above to advance data security and/or privacy in their corner of the world. To nominate, simply
drop us a note and explain why we need to know your hero.
At the end of December, we will announce our Privacy Hero of 2018. The hero will receive a token of appreciation and commemoration of outstanding work.
|
|
Fake Accounts Spread Fake News, Fake Sentiment
|
Social campaigns shine light on very 'real' problem
A politically divisive social media campaign with the hashtag #WalkAway began to spread on Twitter, Facebook and other platforms this summer.
Viral campaigns are a hotbed of opportunity for nation-state hackers who are attracted to the sheer numbers of people they can reach. By spoofing legitimate content and/or creating bogus accounts, they can quite easily spread misinformation and flat-out lies.
Experts have explained that nation states and extremist groups
are drawn in by the chance to create a
heightened
sense of division among voters in the U.S. They
believe their craft will help influence the outcomes of the country's elections.
Listen: Are US Voting Systems and Voter Registration Data Secure?
A word of warning
ANYONE can use a hashtag. Just because the hashtag is present in a social post does not mean the individuals who started the campaign support the message. Nor do thousands of likes or retweets add to its legitimacy. In fact, the "people" doing the retweeting and liking may not even be real.
To prevent the spread of bogus content, always check the authenticity of a story before sharing it.
Read more
This article provides a view of the topic from the UK perspective...
|
|
Scammers Pose as Celebrities Online
|
NY Times counts 9,000 fake celebrity accounts
It's easy to pretend you're someone else online... even a celebrity. Several high-profile incidents point out just how frequently this type of scam is deployed:
- A scammer posing as singer Justin Bieber solicited nude photos from minors.
- Someone posing as TV star and actress Oprah Winfrey was soliciting money from people on Twitter.
The New York Times recently dug into the problem. They conducted a study to see how many social media impersonators they could find for the 10 most followed people on Instagram. They
found nearly 9,000 accounts across Facebook, Instagram and Twitter!
Before you get involved with a proclaimed celebrity online, remember the person may be a scammer. If they ask for money, illicit photos, personal data or something else that could ultimately hurt you and/or your family and friends, be extremely wary.
|
|
Scammers Pose as You!
|
A very real call I got after someone faked my phone number
Have a listen to this call I recorded after a stranger called me asking why I'd called her... only I didn't. My phone number had been spoofed.
Phone scammers have access to many easy-to-use tools that make their calls appear to be coming from a legitimate number.
Even from the other side of the world, they can use a number with an area code local to you. And it works really well; that local number is often enough to convince people to answer calls from numbers they otherwise don't recognize.
|
|
Ransomware Delivered by Phony Accounts
|
Phishing from fake accounts responsible for much of the world's malware crime
Ransomware has become a worldwide problem predicted to generated more than
$8 billion in global damages
this year. That number is expected to rise to nearly $12 billion in 2019.
Not only is the crime spreading geographically, it's also becoming more sophisticated as the ransomware artists (and the bots they architect) learn more with each deployment.
Even as the crime evolves, one thing seems to remain constant, and that's the delivery method. A great number of these incidents begin with a phishing email. The strategy works because
humans are often the weakest link
in an organization's cyber security strategy.
The phony communications fooling people these days are not your father's phishing attempts... they are
incredibly convincing. I've seen (and shared here in this Tips message) several incidents that could trick even the most cautious individual.
One of the reasons so many of these phishing emails work so well is because they are delivered from look-alike accounts. As email recipients, we've all been cautioned against opening emails from "people we don't know or trust."
Well, that advice has, in a sense, back fired.
Because ransomware artists have gotten so good at impersonating the people we know and trust, they have also gotten good at convincing us to open their emails, click on their links and download their attachments.
|
|
By impersonating business partners, scammers make big money
You've heard of whaling, phishing attacks that target a company's "big fish," such as the CEO. The email often appears to be from a trusted employee and asks the executive to perform some sort of financial transaction, like a wire transfer. Believing the request to be legitimate, the executive complies, and there goes the company's money.
Not to be outdone, catphishers are following in their whaling counterparts' footsteps by targeting executives with their own scams. They are similar, in that the catphisher pretends to be someone he or she is not, but the catphisher is more of a long-game scammer. The goal of the catphisher is to develop trust over time, often so the payout is larger.
It's becoming such a problem, I decided to dedicate an entire episode of my radio show to the issue. Take a listen to my conversation with
senior intelligence analyst and security researcher Allison Wikoff to
get educated about how you can steer clear of these scam artists.
LISTEN
:
Curious Cases of Catphishing Executives and IT Pros
|
|
 Ripped from the Headlines
|
|
Three major brands make news with privacy blunders
Here are just three of the news-making privacy and security stumbles hitting the press.
Walmart created a surveillance tool to eavesdrop on workers, including the conversations they have with customers. The idea is to
judge an employee's productivity based on sounds the tool collects.
Walmart is not the only company deploying this type of technology. Many retail stores and public locations are using microphones combine with speech recognition and artificial intelligence to learn more about you. Keep public conversations low if you don't want them picked up!
Facebook stock took a tumble after its privacy blunders became water cooler talk. Had the social media giant addressed privacy from the start, it probably wouldn't be taking such a huge hit now. Would they have been slower to grow? Possibly. However, if they had implemented privacy protections correctly from the very beginning, it may have actually been a way to grow faster.
The TSA has been monitoring passengers without terrorist ties. Under a domestic surveillance program called "Quiet Skies," the agency has kept a close watch on what it considers suspect behavior from all passengers. This news broke just this weekend, so we'll dig into it a bit more and come back with more about it in the September Tips issue.
|
|
Where to Find the Privacy Professor
|
|
In the classroom...
After years of
providing a regularly updated set of online employee training modules for my SIMBUS business clients,
and on-site certification teaching for IAPP, I'm excited to now also be teaching online IAPP-approved CIPP certification classes.
As an instructor for AshleyTrainingOnline, an IAPP-registered certified training partner, I will host a full schedule of classes
.
Do you have a team or group you'd like to coordinate training for? We can often arrange a discounted price for organizations and associations based on the number you have participating.
Hope to see you in the virtual classroom sometime soon!
**
I also teach CIPM and CIPP/US classes, so if you are interested in those, let me know!**
On the road...
One of my favorite things to do is visit with leaders in different industries - health care and managed systems providers to insurance and energy (and beyond!). Below are a few of the events I have scheduled for the upcoming season.
September 5: Giving keynote, "Understanding the Privacy Impact of Cloud Services & Social Media," at
Spotlight on Security Speaker Series hosted by ISSA, ISACA, Women in Security, netskope and Sprint. Event is at the Sprint World Headquarters in Overland Park, Kansas.
September 19-20: Giving keynote and workshop at Data Privacy Asia, Manila, Philippines.
On the air...
HAVE YOU LISTENED YET?
I'm so excited to be hosting the radio show
Data Security & Privacy with The Privacy Professor on the
VoiceAmerica Business network
. All episodes are available for on-demand listening on the VoiceAmerica site, as well as iTunes, Mobile Play, Stitcher, TuneIn, CastBox, Player.fm and similar apps and sites.
Hear the perspectives of incredible guests as they talk through a wide range of hot topics. We've addressed identity theft, medical cannabis patient privacy, cybercrime prosecutions and evidence, government surveillance, swatting and GDPR, just to name a few. Several episodes provide career advice for cybersecurity, privacy and IT professions.
SPONSORSHIP OPPORTUNITIES: Are you interested in being a sponsor or advertiser for my show? It's quickly growing with a large number of listeners worldwide. Please get in touch! There are many visual, audio and video possibilities.
In the news...
CPO Magazine
Credit Union Times
Health Care Info Security
Secure World
CWIowa Live
The morning TV broadcast regularly covers privacy and security tips with their guest, the Privacy Professor! Each is a brief 10-15 minutes and covers topics ranging from insider theft to connected vehicles. Check out
this online library to watch recent episodes.
On June 6,we talked about what every consumer needs to understand about digital assistants and Facebook, namely that what you share with these places is collected, analyzed and shared, possibly with hundreds of third parties.
Keep an eye on my YouTube channel, where you can catch up on many of my visits to CWIowa Live.
Questions? Topics?
|
|
3 Ways to Show Some Love
The Privacy Professor Tips of a Month is a passion of mine and something I've offered readers all over the world for since 2007 (Time really flies!). If you love receiving your copy each month, consider taking a few moments to...
1) Tell a friend! The more readers who subscribe, the more awareness we cultivate.
2)
Donate! T
here are time and hard dollar costs to producing the Tips each month, and every little bit helps.
3) Share the content. All of the info in this e
mail is sharable (I'd just ask that you follow
|
|
|
 |
Sorry, no wolves or sheep in our album. Would you settle for llamas? Here they are with my sons circa 2012.
|
 |
As you settle into the end of summer, be on the lookout for the data wolves in sheep's clothing. They are everywhere, just waiting for you to come close. Help others spot them, too, by sharing stories and passing along information as you learn of it.
Best of luck, and certainly get in touch if I can answer any questions or help you get better at spotting the crooks!
Rebecca
Rebecca Herold, The Privacy Professor
|
|
|