Avast blog: The latest privacy legal environment is getting interesting

California’s privacy laws have now been in effect for more than two years, and we are beginning to see the consequences. Earlier this month, the California Attorney General’s office released the situations where various businesses were cited and in some cases fined for violations. It is an interesting report, notable for both its depth and breadth of cases.

The CalAG is casting a wide net and in my blog for Avast I discuss what happened there and how the  privacy legal situation is evolving elsewhere. I also offer some words of advice to keep your business from getting caught up in any potential legal action.

Avast blog: The rise of ransomware and what can be done about it

new report by John Sakellariadis for the Atlantic Council takes a deeper dive into the rise of ransomware over the past decade and is worth reading by managers looking to understand this marketplace. In my latest blog for Avast, I explore the reasons for ransomware’s rise over the past decade — such as more targeted attacks, inept crypto management, and failed federal policies — as well as measures necessary to start investing in a more secure future.

Building a better surgical robot

I have learned over the years that doctors who are digital natives, or at least comfortable with the technologies that I use (email and the web), are those doctors that I want to treat me. In the past, whenever I have looked for treatment, I have followed a different path to choose my doctor, looking for someone who was older with loads of experience, who has seen plenty of patients.

But older experience isn’t necessarily relevant anymore, and as I age that is also pushing the envelope of what “older” really means. The older docs got their medical education more than 30 years ago, when there were different treatment modalities, different standards of medical care, and computers were the size of rooms. This is why I went with my urologist, someone closer to my kids’ age than mine, when two years ago I had my prostate removed surgically. The operation went well, and was done with the DaVinici robotic device made by Intuitive Surgical. My surgeon, Eric Kim, did touch me during the surgery — to open and close me up and position the robotic arm The rest of the time he was using the robot.

The robots have some big advantages over manual methods. Patients spend less time in the operating room, not to mention a reduction in blood loss, much smaller incisions and shorter hospital stays. Kim estimates that less than five percent of all prostates are removed by manual methods anymore. He has done more than 100 surgeries using the latest model of the daVinci, one that requires a single incision. Many of his patients that had surgery with this model of the robot — myself included — were able to go home within a few hours.

The robots have another direct benefit: “The doctor has instant feedback from an ultrasound or heart-lung machine without taking their eyes off of the procedure and operating field in progress,” said David Powell, the principal design engineer for Intuitive.

Being interested in technology, I have learned that these robots have evolved from using 3D standard-definition stereo vision to today’s dual-console, multi-window 3D high-definition systems. These units can be found in hundreds of hospitals around the world and are used to perform numerous urology, thoracic, ENT and gynecologic laparoscopic surgical procedures.

The company has worked with Xilinx for two decades, upgrading their Virtex and Spartan FPGA video processing chipsets to make the views seen by their human surgeons more helpful and more precise. Plus, the better video setup means less eye strain for the surgeon, and the ability to train new staff members.

“Xilinx’ embedded processor architecture has led to a major revolution for us in terms of our subsequent platform designs,” said Powell. The current daVinci models employ dozens of these chipsets, and benefits from being programmable, as well as a more scalable and distributed architecture. This means that many new capabilities can be introduced with an in-field firmware upgrade, rather than swapping out major hardware components. All of this results in more uptime and increased robot usage, amortizing their costs over more surgeries. Our hospital has seven of the machines — both older and newer models — that are busy at most times. “It is rare for a robot to sit unused,” said Kim.

It is easy to recognize the newer electronics, because the original daVinci models used a collection of thick custom cables to connect its various components that were failure-prone and required frequent repairs. The current version uses a single fiber optic line to deliver eight channels of full 1080i HD video and is more reliable. Sadly, I wasn’t able to see the machine that did the deed on my prostate, but glad that I got the benefits!

New AMD website: Performance intensive computing

AMD and Supermicro have asked me to help them build this new website that focuses on higher-end computing services. Topics include building computing clusters, taking advantage of GPUs to increase capacity and performance, and highlighting various case studies where this equipment plays a key role, such as with scientific computing and for academic research.

Avast blog: A tale of two breaches: Comparing Twilio and Slack’s responses

We recently learned about major security breaches at two tech companies, Twilio and Slack. The manner in which these two organizations responded is instructive, and since both of them published statements explaining what happened, it’s interesting to observe the differences in their communication, along with some lessons learned for your own breach planning and response. You can read more about the situations in my latest blog post for Avast.

Avast blog: Dave Piscitello working to make the internet a more secure place

Dave Piscitello of Interisle Consulting Group: 5 Things You ...I first met Dave Piscitello in the late 1990s when we served together on the Interop+Networld conference program committee, and collaborated on several consulting reports. He went on to create his own conference on internet security that ran from 1997-2000, then went on to work on security for ICANN until 2018. He serves on several international do-gooder infosec boards and is part of a consultancy called the Cybercrime Information Center that produces some very excellent reports on the state of malware, phishing, and domain name abuses. The most current report is on phishing, which shows that monthly attacks have doubled since May 2020. What makes his report powerful is that includes data from four commercial information sources, which collected more than a million unique attacks and publish their own blocklists. I wrote about his work and the state of phishing for my latest Avast blog here.

 

CNN Underscored: Best mobile payment apps reviewed

Mobile payment apps can be a convenient way to send and receive money using your smartphone or smartwatch. Paying for items this way has never been easier, thanks to the availability of numerous mobile payment apps, better payment terminal infrastructure, and wider support for Bluetooth/near-field communication (NFC) contactless credit cards by American issuers. The coronavirus pandemic has also helped to make contactless “everything” more compelling. I tested out five different mobile payment apps: Apple Pay, Google Pay, Samsung Pay, Venmo (by PayPal) and Cash App (by Block, formerly Square) recently, and wrote my review for CNN/Underscored here.

Avast blog: More developments on NSO’s Pegasus spyware

 

Last summer, I wrote about a major international investigation of the NSO Group and its Pegasus spyware. We described how it works and what you can do to protect your phone. NSO has gone through some difficult times as a result of that analysis. NSO was almost purchased by an American company that is closely linked to intelligence operations until the US Government put them, along with another Israeli spyware vendor Candiru, on a special block list that prevents both from obtaining government contracts. Candiru, you might recall, was discovered to be doing its own zero-day spying by Avast researchers.

In my post today for Avast’s blog, I review what transpired at a recent hearing held by the House Intelligence Committee. There were three witnesses who emphasized the threat of spyware to various democracies around the world, and provided lots of specifics about how Pegasus has operated.

Avast blog: How to prepare for a hacking incident

The initial phases of a breach are often the most critical: The intruder is counting on your confusion, your lack of a plan or a clear chain of authority, and any early missteps. Given that it’s only a matter of time before a breach happens, what can you do after encountering an incident to minimize the damage?

For businesses of all sizes, incident response planning infrastructures have gotten very complex, with many interconnected relationships that might not be immediately obvious — until something goes wrong. In this blog for Avast, I outline how you can prepare for an incident in a well-thought-out and organized manner.

CNN Underscored: Best cloud personal storage apps

It used to be that 1 TB of storage was a lot, but now this amount of storage is quite common to find on even the least expensive laptops. Over the years, a number of cloud-based storage vendors have begun to support the TB era and now many of them offer monthly storage plans for a reasonable price. We tested five different cloud-based storage apps—Apple iCloud+, Box, Dropbox, Google One, and Microsoft OneDrive—to see which one is the best cloud-based storage app for you. OneDrive comes out on top and it was easier to install on Macs than on some of our Windows PCs that had additional browser-based security that blocked the desktop client downloads.

You can read my full review here.