• Risks Digest 32.07 (1/2)

    From RISKS List Owner@21:1/5 to All on Fri Jul 3 18:11:54 2020
    RISKS-LIST: Risks-Forum Digest Friday 3 July 2020 Volume 32 : Issue 07

    ACM FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS (comp.risks) Peter G. Neumann, founder and still moderator

    ***** See last item for further information, disclaimers, caveats, etc. ***** This issue is archived at <http://www.risks.org> as
    <http://catless.ncl.ac.uk/Risks/32.07>
    The current issue can also be found at
    <http://www.csl.sri.com/users/risko/risks.txt>

    Contents:
    A Doctor Confronts Medical Errors -- And Flaws In The System That Create
    Mistakes (npr.org)
    U.S. Watchdog's Report Faults Boeing's Disclosures on 737 Max Software
    (NYTimes)
    U.S. Cyber-Command says foreign hackers will most likely exploit new PAN-OS
    security bug (ZDNet)
    Education Dept. left Social Security numbers of thousands of borrowers
    exposed for months (WashPost)
    China's Software Stalked Uighurs Earlier and More Widely (NYTimes)
    A New Ransomware Targeting Apple macOS Users Through Pirated Apps
    (The Hacker News)
    Breaking HTTPS in the IoT: Practical Attacks For Reverse Engineers
    (BishopFox)
    When speech assistants listen even though they shouldn't (Julia Weiler)
    Over 400 Advertisers Hit Pause On Facebook, Threatening $70 Billion
    Juggernaut (NPR)
    How Police Secretly Took Over a Global Phone Network for Organized Crime
    (Irish News)
    Your next BMW might only have heated seats for 3 months (CNET)
    Microsoft releases emergency security update to fix two bugs in Windows
    codecs (ZDNet)
    Mr Potato Head sales problem (mykawartha)
    Deepfake Technology Enters the Documentary World (NYTimes)
    Fake 5G coronavirus theories have real-world consequences (WashPost)
    How automation is growing amid coronavirus outbreak and beyond
    (Orange County Register)
    Schools already struggled with cybersecurity. Then came COVID-19 (WiReD)
    Scary New Coronavirus is Now Infecting Millions, Study Says (CNN)
    Barbara Simons Receives 2019 ACM Policy Award (ACM)
    Re: Ripple20 IP stack vulnerability may affect literally billion devices
    (Brian Inglis)
    Re: Smells Fishy? The Fish That Prevent Iran From Hacking Israel's Water
    System (David E. Ross)
    Re: 40 msecs to go halfway around the Earth? (Henry Baker, Michael Bacon)
    Re: Quote of The Day (Henry Baker)
    Abridged info on RISKS (comp.risks)

    ----------------------------------------------------------------------

    Date: Wed, 1 Jul 2020 11:31:47 +0800
    From: Richard Stein <rmstein@ieee.org>
    Subject: A Doctor Confronts Medical Errors -- And Flaws In The System That
    Create Mistakes (npr.org)

    https://www.npr.org/sections/health-shots/2020/06/30/885186438/a-doctor-confronts-medical-errors-and-flaws-in-the-system-that-create-mistakes

    Mistakes and lessons learned from medical practitioners that may resonate
    with comp.risks readers.

    1) "On how the checklist system used in medicine was adapted from aviation"

    "In the aviation industry, there was a whole development of the process
    called "the checklist." And some people date this back to 1935 when a very complex [Boeing] B-17 [Flying] Fortress was being tested with the head of
    the military aviation division. And it exploded, and the pilot unfortunately died. And when they analyzed what happened, they realized that the high-tech airplane was so complex that a human being could not keep track of
    everything. And that even if he was the smartest, most experienced pilot, it was just too much and you were bound to have an error. And so they developed the idea of making a checklist to make sure that every single thing you have
    to check is done. And so it put more of the onus on a system, of checking up
    on the system, rather than the pilot to keep track of everything. And the checklist quickly decreased the adverse events and bad outcomes in the
    aviation industry."

    The interview stream continues with "On how the checklist system did not
    result in improved safety outcomes when implemented in Canadian operating rooms" reveals how checklists can compromise safety.

    Software stack release life cycle and ecosystem-wide deployment (aka change management) are governed by standard operating procedures and checklists to guide governance readiness based on must-fix versus 'deferred or exempt from fix, add to release notes' to 'kick bits out the door' for sale.

    Ecosystem deployment checklists cannot do not guarantee an organization
    against data breach or ransomware incidents. Public data privacy stewardship and effective computer ecosystem protections are traded for profit. Law enforcement pursues cybercriminals more than owners/operators of deployed platforms recognized as vulnerable to burgeoning risk perimeters and
    recurrent incidents.

    2) "Electronic medical records"

    "[Electronic medical records] really started as a method for billing, for interfacing with insurance companies and medical billing with diagnosis
    codes. And that's the origin. And then it kind of retroactively was expanded
    to include the patient care. And so you see that difference now."

    A solution scoped to expedite fee-for-service billing (revenue capture and realization) transitions into the doctor's office and compromises patient
    care. EHRs transform physicians into point-of-sale entry clerks to reduce back-end corporate expenses (aka overhead). EHR deployment transition diminishes nationwide healthcare effectiveness.

    ------------------------------

    Date: Wed, 1 Jul 2020 21:55:47 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: U.S. Watchdog's Report Faults Boeing's Disclosures on 737 Max
    Software (NYTimes)

    Boeing has completed a series of test flights, but a return to the skies
    will depend on more safety milestones.

    https://www.nytimes.com/2020/07/01/business/boeing-faa-737-max.html

    ------------------------------

    Date: Tue, 30 Jun 2020 07:38:54 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: U.S. Cyber-Command says foreign hackers will most likely exploit
    new PAN-OS security bug (ZDNet)

    Palo Alto Networks disclosed today a major bug that lets hackers bypass authentication on its firewall and corporate VPN products.

    https://www.zdnet.com/article/us-cyber-command-says-foreign-hackers-will-most-likely-exploit-new-pan-os-security-bug/

    ------------------------------

    Date: Wed, 1 Jul 2020 08:19:24 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Education Dept. left Social Security numbers of thousands of
    borrowers exposed for months (WashPost)

    The U.S. Department of Education for at least six months left the Social Security numbers of nearly 250,000 people seeking student debt relief unprotected and susceptible to a data breach.

    https://www.washingtonpost.com/education/2020/06/30/education-dept-left-social-security-numbers-thousands-borrowers-exposed-months/

    ------------------------------

    Date: Wed, 1 Jul 2020 08:15:42 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: China's Software Stalked Uighurs Earlier and More Widely,
    Researchers Learn (NYTimes)

    A new report revealed a broad campaign that targeted Muslims in China and
    their diaspora in other countries, beginning as early as 2013.

    https://www.nytimes.com/2020/07/01/technology/china-uighurs-hackers-malware-hackers-smartphones.html

    ------------------------------

    Date: Wed, 1 Jul 2020 11:52:05 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: A New Ransomware Targeting Apple macOS Users Through Pirated Apps
    (The Hacker News)

    Cybersecurity researchers this week discovered a new type of ransomware targeting macOS users that spreads via pirated apps.

    According to several independent reports from K7 Lab malware researcher
    Dinesh Devadoss
    <https://twitter.com/dineshdina04/status/1277668001538433025>, Patrick
    Wardle <https://objective-see.com/blog/blog_0x59.html>, and Malwarebytes <https://blog.malwarebytes.com/mac/2020/06/new-mac-ransomware-spreading-through-piracy/>,
    the ransomware variant -- dubbed "EvilQuest" -- is packaged along with legitimate apps, which upon installation, disguises itself as Apple's CrashReporter or Google Software Update.

    Besides encrypting the victim's files, EvilQuest also comes with
    capabilities to ensure persistence, log keystrokes, create a reverse shell,
    and steal cryptocurrency wallet-related files.

    With this development, EvilQuest joins a handful of ransomware strains that have exclusively singled out macOS, including KeRanger <https://unit42.paloaltonetworks.com/new-os-x-ransomware-keranger-infected-transmission-bittorrent-client-installer/>
    and Patcher <https://www.welivesecurity.com/2017/02/22/new-crypto-ransomware-hits-macos/> [...]

    https://thehackernews.com/2020/07/macos-ransomware-attack.html

    ------------------------------

    Date: Wed, 1 Jul 2020 11:51:05 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: Breaking HTTPS in the IoT: Practical Attacks For Reverse Engineers
    (BishopFox)

    As the old joke goes, the 'S' in 'IoT' stands for security. While (Internet
    of) Things can vary *wildly* in design robustness and overall security, many embedded devices nowadays have at least the basic protections in place. Happily, the egregious security mistakes of the past are now becoming less
    and less common. Despite the stereotype, Things in the IoT aren't quite as
    bad as they used to be (pun intended).

    For instance, the use of insecure communications (e.g., unencrypted HTTP),
    is now only found in a minority of Bishop Fox client product assessments,
    which gives a somewhat positive (and admittedly biased) picture of IoT
    security trends. In a twist of irony, the increasingly common implementation
    of encrypted communications to repel attackers is also an obstacle for pen testers assessing the security of the products, since the data is now hidden
    to everyone but the client and server. Overall, it's a win for security, but it's required us to develop new tactics for getting into that data.

    In my time at Bishop Fox, I've had to overcome this problem on many, many hardware assessments, with Things ranging from consumer gadgets to
    networking equipment to Internet-connected industrial control systems. Regardless of the specific implementation, the goal at the start of every assessment is the same: decrypt HTTPS traffic so I can understand what the system is doing and why. Once I have this understanding, I can begin to
    attack the device itself, upstream services, and sometimes even other
    devices.

    In this post I'll show you three attack techniques for performing Man-in-the Middle attacks against production-grade, HTTPS-protected Things. For these examples, we'll assume you're redirecting all the device's traffic through
    an HTTPS-aware proxy (like Burp), and that you have no administrative
    control over the device. All you have at the start is a view of the unintelligible encrypted stream, showcasing the full spectrum of unprintable ASCII characters: [...] https://labs.bishopfox.com/tech-blog/breaking-https-in-the-iot

    ------------------------------

    Date: Wed, 1 Jul 2020 10:21:42 -0600
    From: Jim Reisert AD1C <jjreisert@alum.mit.edu>
    Subject: When speech assistants listen even though they shouldn't
    (Julia Weiler)

    Julia Weiler, Ruhr-Universitaet Bochum, Translated by Donata Zuber,
    30 June 2020

    Researchers from Ruhr-Universität Bochum (RUB) and the Bochum Max Planck
    Institute (MPI) for Cybersecurity and Privacy have investigated which
    words inadvertently activate voice assistants. They compiled a list of
    English, German, and Chinese terms that were repeatedly misinterpreted by
    various smart speakers as prompts. Whenever the systems wake up, they
    record a short sequence of what is being said and transmit the data to the
    manufacturer. The audio snippets are then transcribed and checked by
    employees of the respective corporation. Thus, fragments of very private
    conversations can end up in the companies' systems.

    Süddeutsche Zeitung and NDR reported on the results of the analysis on 30
    June 2020. Examples yielded by the researchers' analysis can be found at
    unacceptable-privacy.github.io.

    https://news.rub.de/english/press-releases/2020-06-30-it-security-when-speech-assistants-listen-even-though-they-shouldnt

    ------------------------------

    Date: Wed, 1 Jul 2020 09:26:05 -0700
    From: Lauren Weinstein <lauren@vortex.com>
    Subject: Over 400 Advertisers Hit Pause On Facebook, Threatening $70 Billion
    Juggernaut (NPR)

    Over 400 Advertisers Hit Pause On Facebook, Threatening $70 Billion Juggernaut

    https://www.npr.org/2020/07/01/885853634/big-brands-abandon-facebook-threatening-to-derail-a-70b-advertising-juggernaut?utm_medium=RSS&utm_campaign=news

    ------------------------------

    Date: Thu, 2 Jul 2020 09:00:20 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: How Police Secretly Took Over a Global Phone Network for Organized
    Crime (Irish News)

    *Police monitored a hundred million encrypted messages sent through
    Encrochat, a network used by career criminals to discuss drug deals,
    murders, and extortion plots.*

    Something wasn't right. Starting earlier this year, police kept arresting associates of Mark, a UK-based alleged drug dealer. Mark took the security
    of his operation seriously, with the gang using code names to discuss
    business on custom, encrypted phones made by a company called Encrochat.
    For legal reasons, Motherboard is referring to Mark using a pseudonym.

    Because the messages were encrypted on the devices themselves, police
    couldn't tap the group's phones or intercept messages as authorities
    normally would. On Encrochat, criminals spoke openly and negotiated their
    deals in granular detail, with price lists, names of customers, and explicit references to the large quantities of drugs they sold, according to
    documents obtained by Motherboard from sources in and around the criminal world.

    Maybe it was a coincidence, but in the same time frame, police across the UK and Europe busted a wide range of criminals. In mid-June, authorities picked
    up an alleged member of another drug gang. <https://www.irishnews.com/news/northernirelandnews/2020/06/18/news/court-hears-police-uncovered-evidence-of-large-scale-supply-and-importation-of-drugs-on-encrypted-phone-1977585/

    A few days later, law enforcement seized millions of dollars worth of
    illegal drugs in Amsterdam. It was as if the police were detaining people
    from completely unrelated gangs simultaneously. "[The police] all over it aren't they," the dealer wrote in one of the messages obtained by
    Motherboard. "My heads still baffled how they got on all my guys." <https://www.thesun.ie/news/5564093/irish-crime-gangs-drugs-seized-oranges-melons/>

    Unbeknownst to Mark, or the tens of thousands of other alleged Encrochat
    users, their messages weren't really secure. French authorities had
    penetrated the Encrochat network, leveraged that access to install a
    technical tool in what appears to be a mass hacking operation, and had been quietly reading the users' communications for months. Investigators then
    shared those messages with agencies around Europe.

    "I've never seen anything like this."

    Only now is the astonishing scale of the operation coming into focus: It represents one of the largest law enforcement infiltrations of a
    communications network predominantly used by criminals ever, with Encrochat users spreading beyond Europe to the Middle East and elsewhere. French,
    Dutch, and other European agencies monitored and investigated "more than a hundred million encrypted messages" sent between Encrochat users in real
    time, leading to arrests in the UK, Norway, Sweden, France, and the Netherlands, a team of international law enforcement agencies announced Thursday. [...] https://www.vice.com/en_us/article/3aza95/how-police-took-over-encrochat-hacked

    ------------------------------

    Date: Thu, 2 Jul 2020 09:01:20 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: Your next BMW might only have heated seats for 3 months (CNET)

    As services-based economies sweep every industry, it's time for the
    automotive realm to carry on.

    German luxury cars are renowned for the breadth of their options sheets. On
    one hand, this means you can get your next BMW 5 Series <https://www.cnet.com/news/2021-bmw-5-series-hybrid-power-price-msrp/> configured exactly how you want it. On the other hand, it means you'll often wind up paying for extra for seemingly basic things like, say, a spare tire. Now, BMW is raising the ante by making many car options into software
    services enabled whenever you want them. The disconcerting part? They can be disabled, too.

    In a VR presentation streamed from Germany today, BMW ran through a series
    of digital updates to its cars, including more details on the new BMW
    digital key <https://www.cnet.com/news/apple-car-keyless-entry-ios-bmw/> service announced with Apple at last week's WWDC and confirming that current model cars will be fully software upgradeable over the air, a la Tesla. The first such update will hit BMW Operating System 7 cars in July. Packages are said to be approximately 1GB in size and will take roughly 20 minutes to install.

    But, the most notable part of the day's presentation was the new plan to
    turn many options into software services. BMW mentioned everything from advanced safety systems like adaptive cruise and automatic high-beams to
    other, more discrete options like heated seats.

    These options will be enabled via the car or the new My BMW app. While some will be permanent and assigned to the car, others will be temporary, with mentioned periods ranging from three months to three years. Some,
    presumably, will be permanent, but during the stream's Q&A portion BMW representatives demurred on the details.

    So, yes, you could theoretically only pay for heated seats in the colder
    months if you like, or perhaps save a few bucks by only enabling automatic high-beams on those seasons when the days are shortest. [...] https://www.cnet.com/roadshow/news/bmw-vehicle-as-a-platform/

    ------------------------------

    Date: Wed, 1 Jul 2020 22:35:09 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Microsoft releases emergency security update to fix two bugs in
    Windows codecs (ZDNet)

    Security updates have been silently deployed to customers on Tuesday through the Windows Store app.

    https://www.zdnet.com/article/microsoft-releases-emergency-security-update-to-fix-two-bugs-in-windows-codecs/

    ------------------------------

    Date: Tue, 30 Jun 2020 17:48:30 -0400 (EDT)
    From: Eli the Bearded <*@qaz.wtf>
    Subject: Mr Potato Head sales problem (mykawartha)

    Full url: https://www.mykawartha.com/news-story/10054836-canadian-tire-peels-back-problem-with-mr-potato-head-glitch-in-lindsay/

    Short url: https://potato-head.on-a.pizza/

    Canadian Tire is attributing the glitch that caused all items at Lindsay's
    Canadian Tire to scan as a Mr. Potato Head toy to a downloading error.

    Five stores in Lindsay and Whitby were impacted in the bizarre computer
    system fritz that started around 7 a.m. Monday (June 29). A staff member
    from Lindsay Canadian Tire who wished to remain anonymous said any item
    the team scanned showed the same product number and information as the
    popular toy.

    Cathy Kurzbock, manager of external communications for the Canadian Tire
    Corporation, clarified the glitch only made the names of products appear
    the same, not the prices or the item numbers. She said the anomaly didn't
    effect stores outside of Lindsay or Whitby.

    Sounds like this would have made for whimsical receipts and difficult
    returns.

    ------------------------------

    Date: Wed, 1 Jul 2020 22:02:27 -0400
    From: Monty Solomon <monty@roscom.com>
    Subject: Deepfake Technology Enters the Documentary World (NYTimes)

    A film about persecuted gays and lesbians in Chechnya uses digital
    manipulation to guard their identities without losing their humanity. The
    step raises familiar questions about nonfiction movies.

    https://www.nytimes.com/2020/07/01/movies/deepfakes-documentary-welcome-to-chechnya.html

    ------------------------------

    Date: Thu, 2 Jul 2020 08:59:22 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: Fake 5G coronavirus theories have real-world consequences
    (WashPost)

    Conspiracy theories have driven people to burn cellular equipment. Telecom workers have had to bear the brunt of this.

    Telephone engineer David Snowdon was just returning to his van after an assignment repairing a cell site when a car sped past him, spun around and stopped right in front of him. Two men got out of the vehicle and asked him
    if he had anything to do with 5G <https://www.cnet.com/5g/> masts.

    "You better not be or there will be f*cking trouble," said one of the men, before kicking the door of Snowdon's van, smacking the mirror around and walking off.

    Initially, the 56-year-old from Birmingham in the UK's Midlands region
    thought that what he experienced was an isolated incident. Then he did some research.

    "The next day, I went onto Facebook and there it all was, this big 5G conspiracy," he said in a phone call with CNET. "I thought, I better report this, and when I reported it to our security team, they went, 'Yeah,
    there's been quite a few.'"

    Over the past four months, telecom engineers across the UK have been
    subjected to verbal and physical abuse, or targeted online harassment and doxxing. The U.S. Department of Homeland Security issued a warning <https://www.washingtonpost.com/national-security/dhs-to-advise-telecom-firms-on-preventing-5g-cell-tower-attacks-linked-to-coronavirus-conspiracy-theories/2020/05/13/6aa9eaa6-951f-11ea-82b4-c8db161ff6e5_story.html>
    to carriers about potential threat to wireless equipment here. All because
    some people are buying into the conspiracy theory that 5G is to blame for
    the coronavirus <https://www.cnet.com/health/coronavirus-test-how-long-does-it-take-to-get-covid-19-results-back/>
    pandemic, something that popped up just as the disease spread beyond China
    in January.

    5G has been a target of conspiracy theorists for as long as it's been
    around, just as with 4G and 3G before it. But what's different this time
    around is that people started linking it in various ways to COVID-19, saying either that the technology weakens immune systems, or even that it's responsible for directly transmitting the virus.

    Scientists around the world are in agreement that all such claims are categorically false. [...] <https://www.cnet.com/news/5g-has-no-link-to-covid-19-as-social-media-aims-to-squash-false-conspiracy-theory/>
    https://www.cnet.com/news/fake-5g-coronavirus-theories-have-real-world-consequences/

    ------------------------------

    Date: Tue, 30 Jun 2020 12:50:32 +0800
    From: Richard Stein <rmstein@ieee.org>
    Subject: How automation is growing amid coronavirus outbreak and beyond
    (Orange County Register)

    https://www.ocregister.com/2020/06/29/how-automation-is-growing-amid-coronavirus-outbreak-and-beyond/

    "Even before the global pandemic, waiting in line to get prescriptions
    filled in a pharmacy was a pain. Enter NowRx, a company that started in the
    Bay Area and expanded to Orange County with sights on extending its reach to other regions of the state and Arizona.

    "The company claims it has 99% of the pharmaceuticals typically found at brick-and-mortar pharmacies (and online) and can deliver medication to you
    on the day or sometimes hours after your doctor submits a prescription."

    Pharmacists fulfill an essential role: trained to decipher a physician's enciphered scrawl, they also alert patients to dangerous interactions among prescriptions possibly overlooked by their doctor. One website that
    identifies them is drug interaction checker: https://reference.medscape.com/drug-interactionchecker.

    NowRX dispenses with consultation. Pharmacists have become too expensive and slow: they fill only ~100/day per person with an unacceptable error
    rate. The robo-pharmacist pushes prescriptions out at ~2000/day with substantially suppressed error occurrence.

    Will robo-pharmacists automatically identify physicians that over-prescribe opioids and notify the DEA? If NowRX dispenses incorrectly, and the medicine severely injures the patient, do their Terms of Service state the equivalent
    of "by accepting delivery, you agree to indemnify against error or injury
    after consuming or using said prescription(s)..."

    Note to job seekers: The essay discloses several charts projecting year 2030 robotic solution encroachment into various industries. The top-3 robotic targets are agriculture/forestry/fishing, retail, and finance/insurance.

    ------------------------------

    Date: Fri, 3 Jul 2020 06:17:30 -1000
    From: geoff goodfellow <geoff@iconia.com>
    Subject: Schools already struggled with cybersecurity. Then came COVID-19
    (WiReD)

    A lack of resources has made it hard to keep data secure.

    This time last year, Jaggar Henry was enjoying the summer like so many other teens. The 17-year-old had a job, was hanging out with friends on the
    weekends, and was just generally spending a lot of time online. But then, at the end of July, Henry combed his hair, donned a slightly oversized Oxford shirt, and appeared before his school district's board <https://www.youtube.com/watch?v=7Uemtp1cRss> in Polk County, Florida -- one
    of the larger school districts in the United States -- to outline a slew of security flaws he had found in its digital systems. His presentation was the culmination of months of work and focused on software used by more than
    100,000 students.

    Those vulnerabilities have been fixed, but Henry, who now works full time on education technology, says that his experience illustrates the challenges facing school districts across the United States -- and a problem that's
    grown more acute in the wake of COVID-19.

    The coronavirus pandemic has had major cybersecurity implications around the world. Tailored phishing <https://www.wired.com/story/coronavirus-phishing-scams/> attacks and contact-tracing scams <https://www.wired.com/story/covid-19-contact-tracing-scams> prey on fear
    and uncertainty. Fraudsters are targeting <https://www.wired.com/story/nigerian-scammers-unemployment-system-scattered-canary/>
    economic relief and unemployment payments. The stakes are higher than ever <https://www.wired.com/story/covid-19-pandemic-ransomware-long-game/> for ransomware attacks that target health care providers and other critical infrastructure. For businesses, the transition to remote work has created
    new exposures and magnified existing ones. <https://www.wired.com/story/coronavirus-cyberattacks-ransomware-phishing/>

    School districts in the United States already had significant cybersecurity shortcomings. They often lack dedicated funding and skilled personnel to continuously vet and improve cybersecurity defenses. As a result, many
    schools make basic system-setup errors or leave old vulnerabilities
    unpatched -- essentially propping a door open for hackers and scammers.
    Schools and students also face potential exposure from third-party education-technology firms that fail to adequately secure data in their platforms. [...]

    <https://www.wired.com/story/teen-hacker-school-software-blackboard-follett/> https://arstechnica.com/tech-policy/2020/07/schools-already-struggled-with-cybersecurity-then-came-covid-19/

    ------------------------------

    Date: Fri, Jul 3, 2020 at 3:29 AM
    From: Dewayne Hendricks <dewayne@warpspeed.com>
    Subject: Scary New Coronavirus is Now Infecting Millions, Study Says
    (CNN)

    A mutation works even faster than the original, a new study confirms.

    Just as we're dealing with one coronavirus epidemic, researchers are finding the virus has mutated to become an even faster infection machine. "A global study has found strong evidence that a new form of the coronavirus has
    spread from Europe to the U.S. The new mutation makes the virus more likely
    to infect people but does not seem to make them any sicker than earlier variations of the virus, an international team of researchers reported Thursday," says CNN. <https://www.cnn.com/2020/07/02/health/coronavirus-mutation-spread-study/index.html>

    "It is now the dominant form infecting people," Erica Ollmann Saphire of the
    La Jolla Institute for Immunology and the Coronavirus Immunotherapy
    Consortium, who worked on the study, told CNN. "This is now the virus."

    How They Discovered the Mutation

    "The study, *published in the journal Cell,* <https://www.cell.com/action/showPdf?pii=S0092-8674%2820%2930820-5> builds
    on some earlier work the team did that was *released on a preprint server* <https://www.biorxiv.org/content/10.1101/2020.04.29.069054v1> earlier in the year. Shared information on genetic sequences had indicated that a certain mutant version of the virus was taking over," reports CNN. "Now the team has not only checked more genetic sequences, but they have also run experiments involving people, animals and cells in lab dishes that show the mutated
    version is more common and that it's more infectious than other versions."

    Bette Korber, a theoretical biologist at Los Alamos National Laboratory and lead author of the study, noted, "The D614G variant first came to our
    attention in early April, as we had observed a strikingly repetitive
    pattern. All over the world, even when local epidemics had many cases of
    the original form circulating, soon after the D614G variant was introduced
    into a region it became the prevalent form."

    "It's remarkable to me," commented Will Fischer of Los Alamos, an author on
    the study, according to *Science Daily <https://www.sciencedaily.com/releases/2020/07/200702144054.htm>*, "both
    that this increase in infectivity was detected by careful observation of sequence data alone, and that our experimental colleagues could confirm it
    with live virus in such a short time."
    Focused on the Immune Response

    "We are focused on the human immune response because LJI is the
    headquarters for the Coronavirus Immunotherapy Consortium (CoVIC), a global collaboration to understand and advance antibody treatments against the
    virus," says Saphire, who leads the Gates Foundation-supported CoVIC.
    "Saphire explains that viruses regularly acquire mutations to help them 'escape' antibodies made by the human immune system. When a virus acquires
    many of these individual changes, it 'drifts' away from the original virus. Researchers call this phenomenon 'antigenic drift.' Antigenic drift is part
    of the reason you need a new flu shot each year," reports *MedicalXpress <https://medicalxpress.com/news/2020-07-mutation-coronavirus-dominate-globe.html>*.
    "It is extremely important for researchers to track *antigenic drift* <https://medicalxpress.com/tags/antigenic+drift/> as they design vaccines
    and therapeutics for COVID-19."

    No matter what strain of coronavirus we're fighting, it's essential we
    present a united front: wear your face mask when around people you don't shelter with, practice social distancing, wash your hands frequently,
    monitor your health, and to get through this pandemic at your healthiest,
    don't miss these *Things You Should Never Do During the Coronavirus
    Pandemic*. <https://www.msn.com/en-sg/news/other/things-you-should-never-do-during-the-coronavirus-pandemic/ss-BB13eYyy>
    https://www.eatthis.com/covid-19-mutation-study/

    ------------------------------

    Date: Wed, 01 Jul 2020 17:48:51 +0200
    From: "Diego.Latella" <diego.latella@isti.cnr.it>
    Subject: Barbara Simons Receives 2019 ACM Policy Award (ACM)

    ACM Bulletin Archives, 1 Jul 2020

    Barbara Simons was named the recipient of the 2019 ACM Policy Award for long-standing, high-impact leadership as ACM President and founding Chair of ACM's U.S. Public Policy Committee (USACM, now USTPC), while making
    influential contributions to improve the reliability of and public
    confidence in election technology. Over several decades, Simons has advanced technology policy by founding and leading organizations, authoring
    influential publications, and effecting change through lobbying and public education.

    Now part of ACM's Technology Policy Council (TPC), which serves global
    regions, the TPC groups have continued Simons' original vision for ACM: to

    [continued in next message]

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)