The Guardian view on Northern Ireland’s data leak: putting lives at risk | Editorial

The police’s error is hard to forgive, but ministers must treat Northern Ireland’s wider human safety needs as a priority too

A new documentary film recounts a grim story from the Northern Ireland Troubles. Half a century ago, Thomas Niedermayer was a German businessman living in Belfast. At Christmas in 1973, he was kidnapped from his home by the IRA, possibly to be traded for imprisoned bombers, and murdered. His body was found in a shallow grave in 1980. Ten years on, his widow, Ingeborg, took her own life. A year after that, the Niedermayers’ younger daughter, Renate, killed herself. Another two years later, their elder daughter, Gabriella, did the same.

The Niedermayer murder, as detailed in the Face Down documentary, was vicious. For the family, the damage lasted for generations, creating new victims and further tragedies. The lesson is frighteningly timely. This week, the Police Service of Northern Ireland mistakenly published an online spreadsheet detailing the surnames, initials, ranks or grades, locations and departments of all current PSNI officers and civilian staff members. The spreadsheet was not taken down for three hours. Approximately 10,000 people were listed. The consequences could endure for decades.

Continue reading…

from Data and computer security | The Guardian https://ift.tt/FswGJ6N
via IFTTT

Northern Ireland police chief urged to consider position over data breach

DUP MP Sammy Wilson says serious questions must be asked at highest level of PSNI amid fears over safety of officers

The head of policing in Northern Ireland has been urged to consider his position over the mass breach of officers’ data, amid warnings that terrorists could use the information to carry out attacks.

Sammy Wilson, a Democratic Unionist party MP, suggested Simon Byrne’s future as chief constable might not be sustainable.

Continue reading…

from Data and computer security | The Guardian https://ift.tt/Zl2AUVd
via IFTTT

PSNI apologies to police officers after unprecedented data breach – video

The UK Information Commissioner’s Office has launched an investigation into an unprecedented data breach that disclosed details of more than 10,000 police officers and staff in Northern Ireland. The agency, which regulates data privacy laws, is working with the Police Service of Northern Ireland to establish the level of risk amid warnings that the leak may compel officers to leave the force or move their home address. The PSNI blamed human error for releasing an Excel spreadsheet that was published on an FoI website and removed two hours later once police discovered the mistake. Chris Todd, a PSNI assistant chief constable, apologised and said the error was unacceptable

Continue reading…

from Data and computer security | The Guardian https://ift.tt/rJy2W68
via IFTTT

Hacked UK voter data could be used to target disinformation, warn experts

Data from Electoral Commission breach could allow rogue actors to create AI-generated messages in effort to manipulate elections

Data accessed in the Electoral Commission hack could help state-backed actors target voters with AI-generated disinformation, experts have warned.

The UK elections watchdog revealed on Tuesday that a hostile cyber-attack had been able to access the names and addresses of all voters registered between 2014 and 2022.

Continue reading…

from Data and computer security | The Guardian https://ift.tt/MVBydzA
via IFTTT

Police officers in Northern Ireland may leave force or move after data breach

Serving PSNI members and staff fear that they could be attacked or intimidated after their personal information was posted online in error

Police officers in Northern Ireland may consider leaving the force or moving home after an unprecedented data breach disclosed details of more than 10,000 officers and staff, it has been claimed.

Political leaders and police representatives on Wednesday grappled with the security and financial implications of an error that could expose officers, including those who work undercover, to terrorist intimidation and attack.

Continue reading…

from Data and computer security | The Guardian https://ift.tt/fOTFezM
via IFTTT

Electoral Commission and PSNI data breaches: what we know so far

Russia named as likely culprit in cyber-attack on election watchdog while police service accidentally publishes staff details

The UK election watchdog and Northern Ireland’s police service both announced serious data breaches on Tuesday, in the latest example of the vulnerability of personal details to hacks and human error.

The UK data regulator, the Information Commissioner’s Office (ICO), is looking at the incidents, which have raised immediate safety concerns over the consequences of leaking personal data. Here is what has happened and what we know so far.

Continue reading…

from Data and computer security | The Guardian https://ift.tt/VdkmE8B
via IFTTT

Microsoft Patch Tuesday, August 2023 Edition

Microsoft Corp. today issued software updates to plug more than 70 security holes in its Windows operating systems and related products, including multiple zero-day vulnerabilities currently being exploited in the wild.

Six of the flaws fixed today earned Microsoft’s “critical” rating, meaning malware or miscreants could use them to install software on a vulnerable Windows system without any help from users.

Last month, Microsoft acknowledged a series of zero-day vulnerabilities in a variety of Microsoft products that were discovered and exploited in-the-wild attacks. They were assigned a single placeholder designation of CVE-2023-36884.

Satnam Narang, senior staff research engineer at Tenable, said the August patch batch addresses CVE-2023-36884, which involves bypassing the Windows Search Security feature.

“Microsoft also released ADV230003, a defense-in-depth update designed to stop the attack chain associated that leads to the exploitation of this CVE,” Narang said. “Given that this has already been successfully exploited in the wild as a zero-day, organizations should prioritize patching this vulnerability and applying the defense-in-depth update as soon as possible.”

Redmond patched another flaw that is already seeing active attacks — CVE-2023-38180 — a weakness in .NET and Visual Studio that leads to a denial-of-service condition on vulnerable servers.

“Although the attacker would need to be on the same network as the target system, this vulnerability does not require the attacker to have acquired user privileges,” on the target system, wrote Nikolas Cemerikic, cyber security engineer at Immersive Labs.

Narang said the software giant also patched six vulnerabilities in Microsoft Exchange Server, including CVE-2023-21709, an elevation of privilege flaw that was assigned a CVSSv3 (threat) score of 9.8 out of a possible 10, even though Microsoft rates it as an important flaw, not critical.

“An unauthenticated attacker could exploit this vulnerability by conducting a brute-force attack against valid user accounts,” Narang said. “Despite the high rating, the belief is that brute-force attacks won’t be successful against accounts with strong passwords. However, if weak passwords are in use, this would make brute-force attempts more successful. The remaining five vulnerabilities range from a spoofing flaw and multiple remote code execution bugs, though the most severe of the bunch also require credentials for a valid account.”

Experts at security firm Automox called attention to CVE-2023-36910, a remote code execution bug in the Microsoft Message Queuing service that can be exploited remotely and without privileges to execute code on vulnerable Windows 10, 11 and Server 2008-2022 systems. Microsoft says it considers this vulnerability “less likely” to be exploited, and Automox says while the message queuing service is not enabled by default in Windows and is less common today, any device with it enabled is at critical risk.

Separately, Adobe has issued a critical security update for Acrobat and Reader that resolves at least 30 security vulnerabilities in those products. Adobe said it is not aware of any exploits in the wild targeting these flaws. The company also issued security updates for Adobe Commerce and Adobe Dimension.

If you experience glitches or problems installing any of these patches this month, please consider leaving a comment about it below; there’s a fair chance other readers have experienced the same and may chime in here with useful tips.

Additional reading:

-SANS Internet Storm Center listing of each Microsoft vulnerability patched today, indexed by severity and affected component.

AskWoody.com, which keeps tabs on any developing problems related to the availability or installation of these updates.

from Krebs on Security https://ift.tt/WAXokM8
via IFTTT