Golden rule of breach disclosure | Snowden pardon denied | Sponsored by Northrop Grumman




The golden rule of breach announcements

US businesses are increasingly aware of the threat cyberattacks can pose not just to their networks and customers but to their reputations if they mishandle the announcement and the response. Siobhan Gorman of Brunswick Group, a global communications consultancy company, points to a "golden rule" for companies to avoid egg on their faces as they disclose they've been hacked to media and the public.

"The golden rule is: Never disclose numbers at the outset unless you would stake your job on it," Ms. Gorman told Passcode and New America on the latest edition of The Cybersecurity Podcast. "Wait until the information is at a point where you're really confident in those numbers. Not because it's good to withhold information, but you need to be conscious of the limits you have at the outset." Forensics investigations often reveal hacks are more widespread than they look. Take Target as an example. The company first said payment information of 40 million people was stolen in December 2013. Weeks later, it said as many as 110 million people were affected. "They changed their own narrative... to one of mismanagement," says Gorman.

The Office of Personnel Management joined The Cybersecurity Hall of Shame this year, breaking Gorman's golden rule when it announced 4 million people's records were potentially compromised – then later clarifying it could be more than 20 million. Soon after, OPM chief Katherine Archuleta resigned. Listen here. // Sara Sorcher 



Podcast: Bug bounties, stunt hacks and golden rules of breach disclosures

HackerOne's Katie Moussouris and Brunswick Group's Siobhan Gorman join the latest episode of The Cybersecurity Podcast. Download episodes on iTunes. //Sara Sorcher

Researchers: We can crack a smart safe in less than 60 seconds

Bishop Fox researcher Dan Petro and senior security associate Oscar Salazar plan to demonstrate how an attacker can break into the CompuSafe Galileo next week at the Def Con security conference. // Malena Carollo


Commerce Department will release another draft of proposed Wassenaar changes

After many security companies and researchers lambasted the US Commerce Department's proposed changes to the Wassenaar Arrangement, the Bureau of Industry and Security is preparing to release another round of proposals aimed at limiting the sale of spyware, especially to oppressive regimes. The security industry had submitted formal comments explaining how the overly broad rules that classified certain cybersecurity technology as weapons could hinder legitimate analysis of computer security weaknesses.

So the US is considering those comments and trying again, Commerce Department Deputy Secretary Bruce Andrews said, insisting there will be an opportunity for another round of comments after the next draft is released. “It is our goal to try to accommodate both industry but also protect against bad behavior,” Mr. Andrews said on the Steptoe Cyberlaw podcast. // Steptoe & Johnson LLP

CISA likely to be postponed

The Cybersecurity Information Sharing Act, which is meant to increase cyberthreat sharing between the US government and private sector, isn’t likely to see any action in the Senate before members go on recess next month. // Politico

US national security and the freedom to innovate

In 1974, the first model of the F-16 fighter jet included 135 thousand lines of code. Today? The latest F-35 fighter includes 24 million lines of code.​ ​Complexity, to put it simply, is compounding.​

​And since World War II, these incredible advances in technology have been much in America's favor.​  But ​with federal support for R&D at frighteningly low levels, ​we risk losing our ability to stay at the cutting edge of complexity. What can we do to secure America’s innovative advantage? Northrop Grumman looks at the freedom to innovate and its impact on US national security on Passcode
 

Developers accidentally leaving 'git' folder unguarded on websites

Git is a tool that helps developers track changes in documents. Unfortunately, many websites often store the documents in a hidden-but-still-public folder, allowing anyone with an Internet connection who knows where to look a window onto a site's files. // The Next Web

Is deep web terrorism researcher a 'huckster'?

The Intercept questions whether the US government's go-to terrorism expert witness Van Kohlmann is worth the $1.4 million the government pays for his services. It claims Mr. Kohlmann has no expertise on international issues, but rather uses postings on the hidden "deep web" to determine whether or not individuals have been radicalized – using a process that's never been peer reviewed. // The Intercept

One of the people who harassed reporter Brian Krebs with police hoax has been caught

A SWAT team surrounded the house of Mr. Krebs, a reporter who covers criminal hacker enterprises, after police were falsely told a hostage situation had broken out. One of the hoaxers, who was allegedly angry about an article outing a secret website, was caught. // Krebs on Security

Hacking Team used known arms dealer as middleman 

Ori Zoller was well known for selling AK-47s to a Colombian paramilitary group the United States then classified as a terrorist group. The leaked Hacking Team e-mails suggest he has a new job – selling Hacking Team spyware for an Israeli contractor. //The Intercept.

Peruvian law will give warrantless access to cell phone location data

Under the law, telecommunications companies would be forced to hold onto customer records for a year. Police would need a warrant to look at those records, but privacy activists still worry "the decree contradicts international human rights standards." //Electronic Frontier Foundation

New, unusual thing hackers can hack today: A gun.

At the Black Hat security conference starting next week, researchers Runa Sandvik and Michael Auger will present how to hack TrackingPoint self-aiming rifles. // Wired

TECHNOLOGY WEDNESDAY

Windows 10 Is 'A Great Product. I'm Stunned' - John Dvorak, PC Magazine
One Step Forward While Taking One Step Back - Lance Ulanoff, Mashable
These 5 Windows 10 Features Will Make Apple Users Jealous - Time
What Is the Best Windows 10 PC Out There? - Vlad Savov, The Verge
Windows 7 Holdouts: We're Not Budging! - Ian Paul, PC World
Goodbye, Android - Lorenzo Franceschi-Bicchierai, Motherboard
The Anti-Amazon That's Making Money: Zazzle - Ari Levy, CNBC
That 'Useless' Liberal Arts Degree Is Now Tech's Hottest Ticket - Forbes
Miracle Chip Could Make Your Gadgets 1,000x Faster - Hope King, CNN
The Case Against SSDs - Robin Harris, ZDNet
Yahoo's Big Idea About Video Messaging: Silence - David Pierce, Wired
Can Twitter Avoid Being the Next MySpace? - Michael Yoshikami, CNBC  
This post appeared on 

LinkedIn: Shahriyar Gourgi