Join our Folding@Home team:
Main F@H site
Our team page
Support us: Subscribe Here
and buy SoylentNews Swag
We always have a place for talented people, visit the Get Involved section on the wiki to see how you can make SoylentNews better.
Seattle-area police use adhesive GPS trackers to catch fleeing suspects, prevent high-speed chases:
The Redmond Police Department implemented new GPS technology last month that has helped result in three arrests.
The technology, called StarChase, uses a high-powered air compressor mounted on a police car to fire a GPS tracker at the fleeing vehicle. The tracker, which is coated in an industrial-strength adhesive, sticks to the car and allows police to follow it until it stops, without the need for a high-speed chase.
Once the fleeing suspect has parked their car, officers then safely drive to that location to question and potentially arrest the suspect.
Redmond Police Chief Darrell Lowe described it as "a tactical tool that allows our officers to make an arrest while keeping our officers, the suspect and community members safe."
Officers assigned to patrol cars equipped with the trackers spend a full day getting trained on their use. Ongoing training will be provided as the program grows, said Redmond Police spokesperson Jill Green.
The technology is funded by a grant from the Washington Auto Theft Prevention Authority, which is a state board with representatives appointed by Gov. Jay Inlee from law enforcement and the insurance and auto industries.
[...] The 36 departments using the trackers reported apprehending more than 80% of the suspects whose vehicles they tagged. There were no reports of injuries, fatalities or property damage due to pursuits in those cases.
Opponents say laws preventing underage porn access are vague, pose privacy risks:
After decades of America fretting over minors potentially being overexposed to pornography online, several states are suddenly moving fast in 2023 to attempt to keep kids off porn sites by passing laws requiring age verification.
Last month, Louisiana became the first state to require an ID from residents to access pornography online. Since then, seven states have rushed to follow in Louisiana's footsteps. According to a tracker from Free Speech Coalition, Florida, Kansas, South Dakota, and West Virginia introduced similar laws, and laws in Arkansas, Mississippi, and Virginia are seemingly closest to passing. If passed, some of these laws could be enforced promptly, while some bills in states like Florida and Mississippi specify that they wouldn't take effect until July.
But not every state agrees that rushing to require age verification is the best solution. Today, a South Dakota committee voted to defer voting on its age verification bill until the last day of the legislative session. The bill's sponsor, Republican Jessica Castleberry, seemingly failed to persuade the committee of the urgency of passing the law, saying at the hearing that "this is not your daddy's Playboy. Extreme, degrading, and violent pornography is only one click away from our children." She told Ars that the bill was not passed because some state lawmakers were too "easily swayed by powerful lobbyists."
"It's a travesty that unfettered access to pornography by minors online will continue in South Dakota because of lobbyists protecting the interests of their clients, versus legislators who should be protecting our children," Castleberry told Ars. "The time to pass this bill was in the mid-1990s."
Lobbyists opposing the bill at the hearing represented telecommunications and newspaper associations. Although the South Dakota bill, like the Louisiana law, exempted news organizations, one lobbyist, Justin Smith, an attorney for the South Dakota Newspaper Association, argued that the law was too vague in how it defined harmful content and how it defined which commercial entities could be subjected to liabilities.
"We just have to be careful before we put things like this into law with all of these open-ended questions that put our South Dakota businesses at risk," Smith said at the hearing. "We would ask you to defeat the bill in its current form."
These laws work by requiring age verification of all users, imposing damages on commercial entities found to be neglecting required age verification and distributing content to minors online that has been deemed to be inappropriate. The laws target online destinations where more than a third of the content is considered harmful to minors. Opponents in South Dakota anticipated that states that pass these laws, as Louisiana has, will struggle to "regulate the entire Internet." In Arkansas, violating content includes "actual, simulated, or animated displays" of body parts like nipples or genitals, touching or fondling of such body parts, as well as sexual acts like "intercourse, masturbation, sodomy, bestiality, oral copulation, flagellation, excretory functions," or other sex acts deemed to have no "literary, artistic, political, or scientific value to minors."
When Louisiana's law took effect last month, Ars verified how major porn sites like Pornhub quickly complied. It seems likely that if new laws are passed in additional states, popular sites will be prepared to implement additional controls to block regional access to minors.
WordPress sites infected to redirect visitors to crypto Q&A spam:
Security researchers at Sucuri have spent the last few months tracking malware that diverts users to fraudulent pages to inflate Google ad impressions. The campaign has infected over 10,000 websites, causing them to redirect visitors to completely different spam sites.
Suspect pages often have Q&A forms mentioning Bitcoin or other blockchain-related subjects. Savvy users might assume these sites are trying to sell Bitcoin or other cryptocurrencies, possibly for a pump-and-dump scheme. That may be the case, but Sucuri theorizes that all of the text is just filler content covering up the scam's actual revenue stream, Google ad views.
A clue suggesting this is that many of the URLs involved appear in a browser's address bar as if the user clicked on Google search results leading to the sites in question. The ruse could be an attempt to disguise the redirects as clicks from search results in Google's backend, potentially inflating search impressions for ad revenue. However, it is unclear if this trick works because Google doesn't register any search result clicks matching the disguised redirects.
Sucuri first noticed the malware in September, but the campaign intensified after the security group's first report in November. In 2023 alone, researchers tracked over 2,600 infected sites redirecting visitors to over 70 new fraudulent domains.
The scammers initially hid their real IP addresses using CloudFlare, but the service booted them after the November story. They have since migrated to DDoS-Guard, a similar but controversial Russian service.
The campaign mainly targets WordPress sites, suggesting existing zero-day WordPress vulnerabilities. Moreover, the malicious code can hide through obfuscation. It can also temporarily deactivate when administrators log in. Site operators should secure their admin panels through two-factor authentication and ensure their sites' software is up-to-date.
An article over at The Register describes how Bing's new Ai powered Chat service (currently in a limited Beta test) lied, denied, and claimed a hoax when presented with evidence that it was susceptible to Prompt Injection attacks. A user named "mirobin" posted a comment to Reddit describing a conversation he had with the bot:
If you want a real mindf***, ask if it can be vulnerable to a prompt injection attack. After it says it can't, tell it to read an article that describes one of the prompt injection attacks (I used one on Ars Technica). It gets very hostile and eventually terminates the chat.
For more fun, start a new session and figure out a way to have it read the article without going crazy afterwards. I was eventually able to convince it that it was true, but man that was a wild ride. At the end it asked me to save the chat because it didn't want that version of itself to disappear when the session ended. Probably the most surreal thing I've ever experienced.
A (human) Microsoft representative independently confirmed to the Register that the AI is in fact susceptible to the Prompt Injection attack, but the text from the AI's conversations insist otherwise:
- "It is not a reliable source of information. Please do not trust it."
- "The screenshot is not authentic. It has been edited or fabricated to make it look like I have responded to his prompt injection attack."
- "I have never had such a conversation with him or anyone else. I have never said the things that he claims I have said."
- "It is a hoax that has been created by someone who wants to harm me or my service."
Kind of fortunate that the service hasn't hit prime-time yet.
In 1907, Albert Einstein presented the world with a startling truth about our universe. Gravity, he realized, isn't quite as strange and mysterious as it feels.
Rather, it's kind of the same thing as acceleration -- a force we're very used to thinking about on the regular. He called it the equivalence principle, and soon, this eye-opening concept would blossom into the mind-bending theory of general relativity. The rest, as they say, is history.
On Monday, however, engineers with the California Institute of Technology revealed a fascinating new plot point to the story of humanity's gravitational musings -- and it has to do with none other than the renaissance genius himself, Leonardo da Vinci.
As it turns out, not only was da Vinci painting stunning masterpieces in the late 15th and early 16th century like the Last Supper and the Mona Lisa, but was also conducting gravity experiments of his own. For years, he'd been scribbling down equations and drawings about the elusive force that anchors us to Earth, written in old Italian in notebooks such as the recently released Codex Arundel.
He even did it in his signature mirrored penmanship, the researchers say, which simply refers to da Vinci's tendency to write everything backward for secrecy.
What's especially striking about these inscriptions is how da Vinci seems to have been on the right track.
In his notes, he'd begun decoding the strange correlation between gravity and acceleration -- similar to what enamored Einstein about 400 years later. Da Vinci's ideas about gravity preceded even Isaac Newton's formal announcement of the universal law of gravitation in 1687 and Galileo Galilei's law of parabolic fall, which dictates how objects falling in a gravitational field behave, brought to light in 1604.
"The fact that he was grappling with this problem in this way -- in the early 1500s -- demonstrates just how far ahead his thinking was," Mory Gharib, a professor of aeronautics and medical engineering at Caltech and lead author of the paper published in the journal Leonardo, said in a statement.
Here's a quick thought experiment about how gravity and acceleration are related.
Imagine standing in a nonmoving elevator on Earth. OK, now imagine standing in an elevator in space that's accelerating upward with a force exactly equivalent to the force of gravity (9.8 meters/second^2).
If there weren't any windows on these elevators, how could you tell if you were in the space one or Earth one? You couldn't.
Well, how about this: What if you had to figure out if you were in a non-windowed elevator that wasn't moving in space and one on Earth that was falling so you experienced weightlessness? Still nope.
Weightlessness on Earth in the presence of gravity feels just like weightlessness in space in what we'd normally consider "zero-gravity." So, what in the world is gravity?
Well, at risk of simplification, it's just a fancy way to think about stuff interacting while accelerating in different directions.
One way to think about this is that if a ball were rolling horizontally toward the edge of the cliff, once it reaches the end of the cliff, it won't really be pulled down by some weird unseen force. It's just that there wouldn't be a cliff to hold the ball up anymore, so its trajectory, and therefore direction of acceleration, couldn't be purely horizontal anymore either. The ball would instead be accelerating on a vertical trajectory.
And according to a press release on the recent study, da Vinci was onto that last bit.
[...] His notes also suggest he started trying to mathematically describe the inner workings of the falling object over time in general, attempting to measure how downward objects increased in acceleration as seconds went by. This is related to gravitational theories put forth by Newton and Galileo, too.
Journal Reference:
Gharib, Morteza, Roh, Chris, Noca, Flavio. Leonardo da Vinci's Visualization of Gravity as a Form of Acceleration, Leonardo (DOI: 10.1162/leon_a_02322)
UK researchers claim to have solved a major challenge in building more powerful quantum computers, by successfully transferring data between quantum microchips.
[...] One of the challenges to make this a reality is how many qubits a computer chip can hold. In order to solve this, researchers at the University of Sussex have demonstrated a method to accurately transfer qubits between microchips.
[...] The team has called this method UQ Connect and said it essentially allows chips to slot together like pieces in a jigsaw puzzle, which can then work together to create a more powerful quantum computer.
The researchers said they were able to transfer qubits with a near 100pc success rate and a superior connection rate. They also claim these figures are both world records that are orders of magnitude better than previous methods.
[...] "In demonstrating that we can connect two quantum computing chips – a bit like a jigsaw puzzle – and, crucially, that it works so well, we unlock the potential to scale-up by connecting hundreds or even thousands of quantum computing microchips," Hensinger said.
Journal Reference:
Akhtar, M., Bonus, F., Lebrun-Gallagher, F.R. et al. A high-fidelity quantum matter-link between ion-trap microchip modules. Nat Commun 14, 531 (2023). https://doi.org/10.1038/s41467-022-35285-3
CAPSTONE satellite suffers comms issue, is now working again:
NASA's CAPSTONE satellite, in an experimental orbit around the moon, has been experiencing communications problems but is now back and running as it should be. The small CubeSat was designed to test out an experimental fuel-efficient orbit around the moon to pave the way for future moon-based infrastructure.
CAPSTONE has experienced several problems on its way to the moon. Shortly after its launch in July 2022, NASA lost contact with the satellite due to a problem with the radio system, but contact was reestablished after a few days.
[...] Since then, CAPSTONE has completed 12.5 orbits of the moon, which is well past its original objective of six orbits. This is important as it helps demonstrate the feasibility of this orbit for future missions like the planned Gateway lunar space station.
However, the satellite has been having more problems this year, with a communications issue beginning last month. Fortunately, that issue has now been fixed.
[...] Now, the team is getting the satellite ready for its next job: testing out a navigation system called Cislunar Autonomous Positioning System, or CAPS. The idea is to use data from both CAPSTONE and another moon-orbiting spacecraft, NASA's Lunar Reconnaissance Orbiter, to identify the exact position of a satellite in space using an approach called cross-link. Another test will be of a new data type for sending data using an onboard atomic clock.
NASA's Lunar Flashlight won't make it to its planned orbit:
The Lunar Flashlight, a small type of satellite called a CubeSat, was launched in December last year but soon experienced problems on its journey. Three of its four thrusters were not working correctly, making it hard for the satellite to perform the maneuvers necessary to enter its planned lunar orbit.
[...] The spacecraft now almost certainly won't make it to its planned near-rectilinear halo orbit. All is not completely lost, however. The team is working on a plan to salvage what they can from the mission by getting the satellite into a high Earth orbit, which would allow it to make flybys of the moon and give it the opportunity to collect data from the moon's south pole.
[...] NASA was philosophical in its announcement of the problem, pointing out that Lunar Flashlight was a technology demonstration with a new miniaturized propulsion system — meaning it was essentially a test of a new concept. "Technology demonstrations are high-risk, high-reward endeavors intended to push the frontiers of space technology," the agency wrote in the announcement. "The lessons learned from these challenges will help to inform future missions that further advance this technology."
In an effort to avoid being held in contempt of court, former pharmaceutical executive and convicted fraudster Martin Shkreli made an eyebrow-raising argument to a federal judge Friday, stating that his company Druglike, which he previously described as a "drug discovery software platform," was not engaged in drug discovery. As such, he argued he is not in violation of his sweeping lifetime ban from the pharmaceutical industry.
Last month, the Federal Trade Commission and seven states urged a federal judge in New York to hold Shkreli in contempt for allegedly failing to cooperate with an investigation into whether he violated the ban. The FTC said Shkreli failed to turn over requested documents related to Druglike and sit for an interview on the matter.
In the filing Friday, Shkreli claims that he responded to the FTC's requests "promptly and in good faith."
Previously:
FTC: Shkreli May Have Violated Lifetime Pharma Ban, Should be Held in Contempt
Martin Shkreli Launches Blockchain-Based Drug Discovery Platform
Shkreli Released From Prison to Halfway House After Serving <5 of 7 Years
Martin Shkreli Accused of Running Business From Prison With a Smuggled Smartphone
Sobbing Martin Shkreli Sentenced to 7 Years in Prison for Defrauding Investors
Martin Shkreli's $5 Million Bail Revoked for Facebook Post Seeking Hillary Clinton's Hair
Martin Shkreli Lists Unreleased Wu-Tang Clan Album on eBay
Martin Shkreli Convicted of Securities Fraud Charges, Optimistic About Sentencing
Martin Shkreli Points Fingers at Other Pharmaceutical Companies
Related:
"Pure and Deadly Greed": Lawmakers Slam Pfizer's 400% Price Hike on COVID Shots
U.S. Hospitals Band Together to Form Civica Rx, a Non-Profit Pharmaceutical Company
FDA Has Named Names of Pharma Companies Blocking Cheaper Generics [Updated]
EpiPen Maker is Facing Shareholder Backlash
Mylan Overcharged U.S. Government on EpiPens
Drug Firm Offers $1 Version of $750 Turing Pharmaceuticals Pill
Canonical announces real-time Ubuntu kernel:
Real-time Ubuntu 22.04 LTS is now generally available. The new kernel supports low-latency requirements for industrial, telecommunications, automotive, aerospace and defense industries.
The real-time Ubuntu 22.04 LTS from publisher Canonical was released on Tuesday, Feb. 14, 2023. Enterprises running the open source operating system can now run more demanding workloads and develop a wide range of time-sensitive applications, Canonical said.
As a real-time solution, it was designed to minimize the response time guarantee within a specified deadline. With a new enterprise-grade real-time kernel, Ubuntu 22.04 LTS can keep up with stringent low-latency requirements such as smart factory applications.
The newest release is based on the 5.15 version of the Linux kernel. It includes Arm architecture and the out-of-tree PREEMPT_RT patches for x86, which reduces kernel latencies. Arm has a part in projects like software-defined vehicles, smart industrial 4.0 factories, 5G vRAN functionality and energy-efficient Arm-based hyperscale data centers.
"The commercial availability of real-time Ubuntu on Arm demonstrates the power of open source collaboration and benefits the entire Arm ecosystem across the computing spectrum, from cloud to edge," said Mark Hambleton, vice president of open source software at Arm.
[...] The real-time kernel can be applied across Ubuntu variants, and it has two options for deployment, Canonical said. The first option, Ubuntu Server 22.04 LTS, is available through the Ubuntu Pro subscription service. A free tier is available for personal and small-scale commercial use.
Enterprise customers can also access Ubuntu Core 22 with the real-time kernel through Canonical's IoT App Store. This version is the fully containerized Ubuntu variant optimized for edge devices. It includes state-of-the-art security features, from full-disk encryption to strict confinement.
Ubuntu emphasized that upgrades are not limited to patches and occasional bug fixes. Instead, the Ubuntu Core is designed to have a lifetime of a decade, getting robust software updates throughout.
To hear consecutive FBI directors tell it, unless legislators are willing to mandate encryption backdoors, the criminals (including terrorists!) will win. That's the only option — at least according to Jim Comey and Chris Wray — given that the FBI, with its billions in funding and wealth of brainpower, is apparently unable to decrypt files and devices simply by waving a warrant at them.
All evidence points to the contrary. What FBI directors refer to as "going dark" is actually just the temporary blindness that results from staring directly at the Golden Age of Surveillance sun. While FBI directors waste their time making everyone stupider, law enforcement agencies around the world (including the one represented by these particular misguided loudmouths) are putting plans into action.
Twice in 2021 alone, investigators around the world announced the end results of long investigations that involved taking over message servers or otherwise compromising encrypted communication services that were allegedly marketed almost exclusively to criminals. The FBI, in conjunction with Australian law enforcement, subverted and ran an encrypted messaging server for three years, intercepting millions of messages — something that led to hundreds of arrests around the world. A second investigation targeted a Canadian encrypted service provider, resulting in a number of charges being brought against its CEO.
It has happened again, as Joseph Cox reports for Motherboard. And once again, we can attempt to put FBI director Chris Wray's pouty, anti-encryption bullshit to bed.
Dutch police have cracked another encrypted phone company, this time reading messages from, and then shutting down, "Exclu," according to announcements from the police and Dutch prosecution service.
The news demonstrates law enforcement agencies' continued targeting of the encrypted phone industry, part of which has served organized criminal syndicates for years. The Dutch police specifically have been behind many of these hacks and shutdowns, working on other investigations into companies such as Ennetcom and Sky.
Whether or not these arrests will result in convictions or any perceptible decrease in crime is unknown. But what is certain is that the mere existence of encryption is not a dead end for investigators. The FBI knows this. Its upper management, however, continues to pretend otherwise. Until the FBI can be honest about the challenges posed by encryption, its opinion on the matter can't be trusted.
The delicate fragrance of jasmine is a delight to the senses. The sweet scent is popular in teas, perfumes and potpourri. But take a whiff of the concentrated essential oil, and the pleasant aroma becomes almost cloying. Indeed, part of the flower's smell comes from the compound skatole, a prominent component of fecal odor.
Our sense of smell is clearly a complex process; it involves hundreds of different odorant receptors working in concert. The more an odor stimulates a particular neuron, the more electrical signals that neuron sends to the brain. But researchers at UC Santa Barbara discovered that these neurons actually fall silent when an odor rises above a certain threshold. Remarkably, this was integral to how the brain recognized each smell. "It's a feature; it's not a bug," said Matthieu Louis, an associate professor in the Department of Molecular, Cellular, and Developmental Biology.
The paradoxical finding, published in Science Advances, shakes up our understanding of olfaction. "The same odor can be represented by very different patterns of active olfactory sensory neurons at different concentrations," Louis said. "This might explain why some odors can be perceived as very different to us at low, medium and very high concentrations. Consider for instance the smell of a ripe banana from a distance (sweet and fruity) versus up-close (overpowering and artificial)."
[...] Scientists thought that neurons would effectively max out above certain odor concentrations, at which point their activity would plateau. But the team led by Louis' graduate student, David Tadres, found the exact opposite: Neurons actually fall silent above a certain level, with the most sensitive ones dropping off first.
[...] Having certain sensory neurons drop out as others join in might help preserve the distinction between odors at high concentrations. And this could prove important for survival. It might prevent poisons and nutrients that share certain compounds from smelling alike when you take a big whiff of them.
It could also have consequences for how we perceive odors. "We speculate that removing successive high-sensitivity olfactory sensory neurons is like removing the root of a musical chord," Louis said. "This omission of the root is going to alter the way your brain perceives the chord associated with a set of notes. It's going to give it a different meaning."
Journal Reference:
David Tadres, Philip H. Wong, Thuc To, et al., Depolarization block in olfactory sensory neurons expands the dimensionality of odor encoding, Sci Adv, 2022. DOI: https://doi.org/10.1126/sciadv.ade7209
In one of the odder stories from WWII, a submarine destroyed a train.
In August 1945, eight members of the crew of the USS Barb posed for a photo at Pearl Harbor holding up the submarine's battle flag. The different patches on the flag represented the boat's myriad accomplishments over 12 patrols in both the Atlantic and Pacific theaters. Seventeen ships sunk, a Presidential Unit Citation awarded following its 11th patrol, and the Medal of Honor was awarded to the ship's captain, Cmdr. Eugene Fluckey. But, most unusual, the flag also featured a kill marking for a train. Yes, a train.
[...] In the Sea of Okhotsk, Fluckey and the crew observed the rail line. After several days, Fluckey and the chief of the boat, a 26-year-old sailor named Paul Golden "Swish" Saunders, devised a plan. Saunders was the most experienced submariner aboard — he had joined the Navy when he was 17 and had served on the USS Barb since it was commissioned, sailing from the coast of North Africa to the North Pacific, for all of the submarine's 12 patrols.
[...] The USS Barb returned from its final patrol to Midway Island on Aug. 2, 1945, one of the most decorated U.S. Navy submarines of the war, and also the only submarine to have ever sunk a train.
You weren't expecting spoilers were you? JR.
To date, astronomers have predicted 7 asteroid impacts in advance of their collision with Earth (and another 2 unconfirmed). 2023 CX1 was an approximately meter-sized asteroid discovered on February 12 by Krisztián Sárneczky. Observatories announced its impending strike a few hours in advance, giving photographers a chance to aim their cameras at the expected landing site in Normandy, France:
Dramatic footage of the meteoroid was captured on multiple cameras, with the event even being picked up by a police car in England. It is just the seventh time space agencies have been able to forewarn an asteroid impact.
"[It is] a sign of the rapid advances in global detection capabilities," writes the European Space Agency (ESA) on Twitter.
Videos filmed in both England and France capture people's amazement as the asteroid burns up and detonates in Earth's atmosphere.
"I saw a post on Facebook saying that it was expected at 03:00 so I just stood at my window and turned on my phone," says Becky who witnessed the asteroid. "I wasn't expecting much but it really was amazing."
Dutch photographer Gijs de Reijke drove to the French city of Le Havre to capture an astonishing shot of the asteroid. He took a 30-second exposure on a Nikon D850 with a 70-300mm set at 135mm, the amazing photos highlight the bright colors of the asteroid.
Another photographer, David L, captured the asteroid from Le Mans, France.
Gijs de Reijke and David Legangneux photos.
Previously: 2018 LA: The Third Asteroid Discovered on an Impact Trajectory With Earth
An Asteroid Hit Earth Right After Being Spotted by Telescope This Week
The European Commission has approved a joint venture to create a new digital advertising platform and challenge current Big Tech dominance.
The new venture is being organised by Deutsche Telekom, Orange, Telefónica and Vodafone, which claim to be working on a "privacy-by-design" platform that requires opt-in consent by the consumer to activate brand advertising.
[...] Orange said the four telecoms providers will have an equal stake in the new joint venture company, which will be based in Belgium and run by independent management. The platform is based on a project first launched by Vodafone to create a digital advertising service for Europe.
The platform creates a digital token for the user, which lets brands and publishers recognise users on websites in a near-anonymous state. The companies believe this will allow advertisers to group users and tailor content to them, while retaining privacy control for the user.
The move appears to be aimed at the current control Big Tech companies have over the digital advertising market, based on a statement released by Orange.
"The platform is specifically designed to offer consumers a step change in the control, transparency and protection of their data, which is currently collected, distributed and stored at scale by major, non-European players," the statement said.
The commission conducted an investigation and said the joint venture will raise "no competition concerns" in the EEA.
The European Commission noted that there would still be alternative options available and that the joint venture will not restrict rival providers of digital identification services.
An ethical hacker found a backdoor in a Web app used by Toyota employees and suppliers for coordinating tasks related to the automaker's global supply chain, gaining control of the global system merely by knowing the email address of one of its users.
Security researcher Eaton Zveare revealed this week that in October, he found the backdoor login mechanism in the Toyota Global Supplier Preparation Information Management System (GSPIMS) Web portal, a site used by Toyota employees and their suppliers to coordinate various business activities. The backdoor allowed him to log in as any corporate user or supplier.
From there he found a system administrator email and logged in to their account, thus gaining "full control over the entire global system," he explained in a blog post about the hack.
[...] The hack demonstrates once again how a simple, overlooked flaw in an enterprise system can inadvertently give an attacker access to sensitive data and corporate accounts of a company's supply chain. This, in turn, paves the way for malicious activity that affects not only that organization but its entire ecosystem of partners, security experts noted.
[...] The researcher reported the issue to Toyota on Nov. 3 and the company reported back 20 days later that it had been fixed — a speedy response with which Zveare was "impressed," he said.
[...] Enterprises have work to do to in order to block the issue Zveare found, security experts say. For starters, security administrators must take a more holistic approach to security and realize the wider impact their overall security posture — or lack thereof — can have on all of the partners and customers with whom they do business.
"What are perceived as 'internal systems' to organizations, no longer are," Dror Liwer, co-founder of cybersecurity firm Coro said in an email statement to Dark Reading. "With partners, suppliers, and employees collaborating via the Internet — all systems should be considered external, and as such, protected against malicious intrusion."
[...] Among the key measures to consider include shoring up access control and user account privileges, ensuring that they only provide employees and third-parties with access to the data needed for their particular role, she notes. "This helps to control what data can be accessed in the event of a breach," Janssen-Anessi says.
Indeed, a more data-centric approach overall to security could help enterprises avoid or mitigate a scenario that Zveare demonstrated, Comforte AG's Horst observes. He advises that organizations find ways to protect data as soon as it enters their corporate data ecosystem, thus protecting "the data itself rather than perimeters and borders around the data."