After Avast's Malefaction, Data Protection should be High-Priority

SC Magazine UK | February 14, 2020

  • Avast had been harvesting the web browsing data habits from its hundreds of millions of customers to supply some of the world’s biggest firms.

  • Avast's wrongdoings are what many privacy and security experts have long warned about: Attempts to deanonymize data sets.

  • The story stands as a lesson for consumers and calls for them to ensure that their data is protected and safe at all times.

Avast, a free anti-virus software provider, which is being used by millions around the world, has admitted to selling " highly sensitive" web browsing data via a subsidiary company called Jumpshot.


Investigations done by Vice and PC Mag had reported that Avast had been harvesting the web browsing data habits from its hundreds of millions of customers to supply some of the world’s biggest firms.


Soon after the reports came out, Czech authorities bounce into action, to start an investigation of their own. The investigation found that the anonymized web history data could then be traced back to individual users. Avast via Jumpshot was tasked with selling the user data from millions of devices to major brands and e-commerce providers.


Shares in Avast tanked after reports of sale of user data surfaced.


Recap on the Avast's Malefactions


Jumpshot, a US-based marketing company was purchased by Avast back in 2013.


The Czech-based anti-virus giants scraped data from the software it provides to customers and handed the information to the marketing subsidiary Jumpshot, which then repackaged the information and sold it for millions of dollars.


Even though Avast required users to opt into this data sharing, the investigation found many were unaware Jumpshot was then selling on their data. The revelations emerged following a joint investigation by trade publications Motherboard and PCMag.


The data sold include Google searches, Google Maps location searches, activity on companies’ LinkedIn pages, YouTube visits and data on people visiting porn websites.


Avast did not deny the allegations and said it had moved to stop the data-sharing practices.


READ MORE: Privacy experts Skeptical of proposed data protection agency


What the Latest on it?


The expose has led to the Czech data protection authority starting up an investigation into Avast and its activities. In an official statement, the company has said that it has initiated a preliminary investigation of the case based on the information revealed.


At the moment we are collecting information on the whole case. There is a suspicion of a serious and extensive breach of the protection of users’ personal data. Based on the findings, further steps will be taken and general public will be informed in due time.

- Ivana Janu, President, Czech Office for Personal Data Protection.


Lessons for Information Security

The story raises several serious questions about the ethics of processing and selling data. It also stands as a lesson on information security for consumers and calls for them to ensure that their data is protected and safe at all times.


It is an unfortunate fact that in this day and age, consumers must be wary of who they trust with their data. When the antivirus companies are the bad guy, it’s difficult to see who is good. The best course of action is to constantly ensure that your personal data stays secure. This can be done by managing preferences on websites, but when it comes to software as a service (SaaS) it becomes even more sinister and we must be even more wary.

-Robert Ramsden-Board, VP EMEA, Securonix

“As the saying goes, if you're not paying for the product, then you are the product. That wisdom certainly proved true in this case. AVG and Avast abused users' trust and put them at risk, which could well be a death sentence for a business that users rely on for protection,” said Paul Bischoff, a privacy advocate at Comparitech.com, while talking about users preferring to use free anti-virus versions even though availability of paid products by both Avast and AVG.



Boris Cipot, a senior security engineer at Synopsys, while talking about the recent developments and the seriousness amongst the authorities regarding to GDPR said, “I just wonder how many of such cases will need to be uncovered before this type of data trafficking stops and we can finally rest assured that the companies we trust with our data will not reuse it, or in some cases even misuse it.”


Avast's wrongdoings are what many privacy and security experts have long warned about: Attempts to deanonymize data sets. Even data that has been purportedly made anonymous can still often be linked back to individual users. It also highlights a continuing gulf between increasingly strict data protection regulations and user expectations.


Is your anti-virus spying on you?


READ MORE: 3 trends in Data privacy breach laws that will carry over to 2020

Spotlight

Threat actors are using social media to target enterprises and their customers with fraudulent accounts. The nature of instant sharing on social media means organizations can face swift reputation damage or financial loss if they fall victim to one of the many threat types used on these platforms. In order to effectively protect


Other News
API Security

Salt Security, CrowdStrike Expands Partnership with New Integration

Salt Security | September 20, 2023

Salt Security, a prominent API security company, has announced the expansion of its partnership with CrowdStrike, a leading cybersecurity technology company providing cloud workload and endpoint security, cyberattack response, and threat intelligence services. This expansion involves the integration of the Salt Security API Protection Platform with the widely recognized CrowdStrike Falcon Platform. Roey Eliyahu, Co-founder and CEO of Salt Security, stated, Protecting against API threats requires deep visibility and robust runtime protection. We’re excited to bring our unique strengths in API security to the CrowdStrike customer base with this new integration. Together with CrowdStrike, Salt can provide organizations with extended runtime protections and posture management across the cloud and application landscapes. [Source – Cision PR Newswire] Through this integration, customers gain access to a comprehensive 360-degree view of API security risks, particularly focusing on the application-layer attack surface. This integration is accessible via the CrowdStrike Marketplace and provides valuable API threat intelligence. It also enhances cross-organization API security capabilities by streamlining and enhancing the workflows related to API auditing, monitoring, and enforcement. The partnership between Salt Security, offering top-notch API runtime monitoring and AI-driven insights, and CrowdStrike, renowned for its award-winning AI-powered protection, provides organizations with complete visibility into their API attack surface. This integration also offers valuable context regarding the severity of threats in relation to business-critical aspects. With this partnership, customers benefit from: API vulnerability and threat context API threat mitigation API threat management automation The patented Salt API security platform stands out for its utilization of cloud-scale big data, artificial intelligence (AI), and machine learning (ML). These technologies work in tandem to automate the process of discovering and cataloging an organization's entire set of APIs. Salt plays a crucial role in pinpointing areas where APIs might expose sensitive data. This proactive approach aids enterprises in recognizing and mitigating potential API threats while also reinforcing their overall API security. Gur Talpaz, Head of Falcon Fund and Vice President of Corporate Development at CrowdStrike, said, With APIs now a prime target for malicious actors, securing them requires a comprehensive and diligent approach. Through this joint integration, we can harness the mature AI-driven intelligence of the Salt API security platform with our widely deployed Falcon platform, giving organizations complete visibility into their application-layer attack surface and a detailed understanding of their application threat landscape. [Source – Cision PR Newswire] About Salt Security Salt Security is a leading API security company that safeguards the APIs at the core of all modern applications. Its API Protection Platform is the sole API security solution that integrates the power of cloud-scale big data with time-tested machine learning and artificial intelligence to detect and prevent API attacks. Salt provides extensive context, real-time analysis, and continuous insights for API discovery, hardening APIs, and attack prevention by correlating the activities of millions of APIs and users over time.

Read More

Software Security

Keeper Security’s Latest Update Improves Android and User Interface

Keeper Security, Inc. | September 25, 2023

Keeper Security, a prominent cybersecurity software provider specializing in zero-trust and zero-knowledge solutions safeguarding credentials, privileged access, secrets, and remote connections, has announced the unveiling of a new, contemporary User Interface (UI) for the Keeper Password Manager application on Android. This awaited release introduces enhanced usability, intelligent search capabilities, and quicker synchronization times. With a focus on a polished appearance and user-friendly interactions, these enhancements are designed to simplify the utilization of Keeper's robust password and passkey management features, offering improved clarity and search functionality. Keeper has adopted an incremental approach to enhancing the user experience, consistently refining the appearance, usability, and overall feel of its applications while staying mindful of the importance of consistency, familiarity and the world-class security and functionality that Keeper users have come to expect. With this update, Keeper's new user experience has been effectively implemented across all platforms, encompassing desktop, web browsers, and iOS. Android users can also anticipate an upcoming dark mode experience soon. Android users of Keeper will encounter refreshed themes, including a default Light Mode and improved user-selectable themes. Additionally, new features include: Streamlined Usability Friendlier Interface Accessibility and Inclusion Advanced Search Craig Lurey, CTO and Co-Founder of Keeper Security, said, We are excited to introduce these enhancements to our Android app, completing the rollout of our stunning new user interface (UI) to every Keeper user. [Source – Cision PR Newswire] Lurey stated that the update represented their ongoing commitment to delivering the best possible user experience while maintaining the highest security standards. He mentioned that with the improved usability, modernized interface, and lightning-fast sync times, Keeper Password Manager for Android continued to be a go-to solution for organizations and individuals looking to secure their digital identities. About Keeper Security Keeper Security is revolutionizing the way to secure passwords, confidential data, and secrets for individuals and organizations worldwide. The company's user-friendly cybersecurity platform is built on the foundation of zero-trust and zero-knowledge security, providing protection for users on all devices. Its solution is quick to deploy and seamlessly integrates with any technology stack, effectively preventing breaches, lowering help desk expenses, and ensuring compliance. Trusted by millions of individuals and numerous global organizations, Keeper leads in top-tier password management, privileged access, secrets management, secure remote access, and encrypted messaging solutions.

Read More

Platform Security

SentinelOne Launches RemoteOps Forensics for Faster Incident Response

SentinelOne | September 18, 2023

SentinelOne, a global leader in autonomous cybersecurity, is addressing the pressing need for rapid and effective responses to the escalating wave of cyber breaches. Today, the company announced the launch of Singularity RemoteOps Forensics, a pioneering digital forensics product designed to streamline and accelerate incident response readiness. This innovative solution promises to empower organizations of all sizes, ushering in a new era of efficient and scalable investigation and response capabilities in the face of evolving cybersecurity challenges. Integrated seamlessly with the SentinelOne Singularity Platform and as an add-on to Sentinel One's Endpoint and Cloud Workload Security solutions, RemoteOps Forensics offers a rapid, adaptable digital forensics and incident response solution. Security teams can leverage this tool to enhance efficiency by optimizing resources and accelerating Mean Time to Resolution. With the capability for targeted investigations on various assets, including endpoints and server workloads, it enables conditional trigger-based evidence collection. This automation efficiently gathers evidence, such as process data, ports, service listings, MFT, Amcache, JumpLists, and memory dumps, orchestrating them in under a minute. Consolidating evidence into the Singularity Security DataLake allows for the correlation of SentinelOne and partner data with forensics data in a unified search, facilitating a comprehensive view of attacks, rapid root cause identification, and risk mitigation. Furthermore, it provides the ability to analyze collected evidence alongside Endpoint Detection and Response (EDR) data within a single console, empowering proactive defense against future threats. The integration and analysis of this combined data unveil concealed indicators of compromise, detect advanced attack patterns, and offer insights into threat actors' tactics, techniques, and procedures. RemoteOps Forensics is a cost-effective and resource-efficient solution that seamlessly integrates with the SentinelOne agent. This integration alleviates the necessity of deploying and provisioning multiple tools throughout the investigative process, resulting in significant time and resource savings for organizations. In addition, this innovative solution prioritizes the maintenance of forensic integrity by minimizing changes made to the disk, and it leverages SentinelOne's anti-tampering and metadata collection capabilities to safeguard data integrity. In doing so, it streamlines investigations and upholds the highest standards of forensic rigor, reinforcing organizations' cybersecurity defenses with a comprehensive and efficient approach. Jane Wong, Senior Vice President of Products and Strategy at SentinelOne, said, As timelines for reporting and responding to breaches shrink, it is imperative that the security teams have advanced forensics capabilities that can make investigations faster and more efficient, and with Singularity RemoteOps Forensics, the team is delivering them. [Source – Business Wire] SentinelOne's new forensic capabilities help develop incident response by enabling security teams to conduct thorough investigations more quickly, Jane also mentioned eliminating the requirement for specialized expertise or additional tools. About SentinelOne SentinelOne is a leading provider of autonomous cybersecurity solutions. With its identified Singularity Platform, the company excels at detecting, preventing, and responding swiftly to cyber threats. SentinelOne enables businesses to protect their endpoints, cloud workloads, containers, and identities, as well as their mobile and network-connected devices, with unparalleled speed, accuracy, and ease of use. With a formidable clientele comprising over 11,000 customers, SentinelOne has proven itself as the trusted guardian of a secure digital future.

Read More

Software Security

Conceal and CyberForce Security Announce Strategic Partnership: Amplifying MSSP Services with Advanced Browser Security

Business Wire | September 29, 2023

Conceal, a pioneer in web security innovation, is excited to announce its strategic alliance with CyberForce Security, a leader in cybersecurity products and services. This collaboration is set to enhance CyberForce's already comprehensive technology suite by including ConcealBrowse's elite browser security. We are thrilled to integrate with CyberForce Security, a powerhouse known for its value-driven approach and deep commitment to offering the finest cybersecurity solutions in the industry. By incorporating ConcealBrowse into their portfolio, we're collectively raising the bar in web protection for MSPs of all sizes.commented Gordon Lawson, CEO of Conceal. Miles Dunbar, COO of CyberForce Security, stated, “At CyberForce, our ethos revolves around understanding our partners and clients, both technically and business-wise. By integrating with Conceal's browser security, we're amplifying our promise of delivering only the best-of-breed solutions. This collaboration embodies our dedication to staying at the forefront of cybersecurity innovation.” This partnership aligns perfectly with CyberForce Security's mission of hand-picking elite cybersecurity products and ensuring every business, from start-ups to established giants, has access to top-tier protective solutions. As both companies champion a customer-centric approach, their synergistic endeavor promises to set new benchmarks in MSSP offerings. For Managed Service Providers seeking to fortify their security offerings, we invite you to join the Conceal MSP Community, where the focus is protection where it truly counts: at the browser. As part of our community, you’ll gain complimentary access to NFR licenses of ConcealBrowse. With effortless deployment and user-friendly interfaces, it integrates seamlessly into existing security infrastructures and stands robustly as a standalone solution, offering you unparalleled ease and flexibility. More so, built-in multi-tenancy and monthly billing features open avenues for revenue growth, allowing easy downstream deployment to your clients. Don’t miss this opportunity to enhance your security toolkit and grow your practice. About Conceal Conceal is at the forefront of defending against web-based attacks, using innovative technology to detect, prevent, and shield businesses and individual users from ever-evolving online threats. ConcealBrowse operates on the principle of proactive protection. Its AI-powered intelligence engine, ConcealSherpa, runs at machine speed with virtually zero latency to identify potentially harmful webpages autonomously, stopping cyber attacks that take advantage of weaponized links. For more information, visit https://conceal.io/.

Read More

Spotlight

Threat actors are using social media to target enterprises and their customers with fraudulent accounts. The nature of instant sharing on social media means organizations can face swift reputation damage or financial loss if they fall victim to one of the many threat types used on these platforms. In order to effectively protect

Resources