<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	
	xmlns:georss="http://www.georss.org/georss"
	xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
	>

<channel>
	<title>hackers &#8211; CalWatchdog.com</title>
	<atom:link href="https://calwatchdog.com/tag/hackers/feed/" rel="self" type="application/rss+xml" />
	<link>https://calwatchdog.com</link>
	<description></description>
	<lastBuildDate>Sun, 13 Mar 2016 05:42:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<site xmlns="com-wordpress:feed-additions:1">43098748</site>	<item>
		<title>State auditor warns government agencies in danger of hacking</title>
		<link>https://calwatchdog.com/2016/03/13/state-auditor-renews-cybersecurity-warning/</link>
					<comments>https://calwatchdog.com/2016/03/13/state-auditor-renews-cybersecurity-warning/#comments</comments>
		
		<dc:creator><![CDATA[Chris Reed]]></dc:creator>
		<pubDate>Sun, 13 Mar 2016 12:33:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Inside Government]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Board of Equalization]]></category>
		<category><![CDATA[Chris Reed]]></category>
		<category><![CDATA[Elaine Howle]]></category>
		<category><![CDATA[PUC]]></category>
		<category><![CDATA[state auditor]]></category>
		<category><![CDATA[Brown administration]]></category>
		<category><![CDATA[jacqui irwin]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Department of Technology]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=87271</guid>

					<description><![CDATA[State Auditor Elaine Howle, who issued a report last year warning of cybersecurity problems at dozens of state agencies, says the problems remain mostly unaddressed. Testifying at a recent hearing]]></description>
										<content:encoded><![CDATA[<p><img fetchpriority="high" decoding="async" class="alignnone size-medium wp-image-50515" src="http://calwatchdog.com/wp-content/uploads/2013/09/howle-300x190.jpg" alt="howle" width="300" height="190" align="right" hspace="20" srcset="https://calwatchdog.com/wp-content/uploads/2013/09/howle-300x190.jpg 300w, https://calwatchdog.com/wp-content/uploads/2013/09/howle.jpg 338w" sizes="(max-width: 300px) 100vw, 300px" />State Auditor Elaine Howle, who issued a <a target="_blank">report</a> last year warning of cybersecurity problems at dozens of state agencies, says the problems remain mostly unaddressed.</p>
<p>Testifying at a recent hearing of the Assembly Committee on Privacy and Consumer Protection and Select Committee on Cybersecurity, Howle said 73 of the 77 agencies she reviewed had inadequate or worse safeguards against hacking. Her three biggest concerns: the state&#8217;s court system, the Board of Equalization and the California Public Utilities Commission.</p>
<p>Howle&#8217;s remarks were countered by a representative of the Brown administration. The state Department of Technology&#8217;s chief information security officer, Michele Robinson, said Howle had exaggerated the state&#8217;s problems.</p>
<p>But lawmakers didn&#8217;t appear to accept Robinson&#8217;s defense of the state&#8217;s efforts. Assemblywoman Jacqui Irwin, D-Thousand Oaks, <a href="http://www.kcra.com/news/california-lawmakers-slam-officials-for-technology-gaps/38175862" target="_blank" rel="noopener">told</a> Sacramento TV station KCRA after the hearing that she considered Howle&#8217;s warnings &#8220;very disturbing. &#8230;  We have 160 departments that are holding your private information. So Social Security numbers, addresses, medical information &#8212; yes, there is a risk for the typical Californian.&#8221;</p>
<p>Here is the key summary of Howle&#8217;s 2015 audit:</p>
<blockquote><p>In the past few years, retailers, financial institutions, and government agencies have increasingly fallen victim to cyber attacks. Most recently, in June 2015 the federal Office of Personnel Management announced that a cybersecurity intrusion had potentially exposed the personal information of approximately 20 million current and former federal employees and other individuals. Given the size of California&#8217;s economy and the value of its information, the state presents a prime target for similar information security breaches. Its government agencies maintain an extensive range of confidential and sensitive data, including Social Security numbers, health records, and income tax information. If unauthorized parties were to gain access to this information, the costs both to the state and to the individuals involved could be enormous. However, despite the need to safeguard the state&#8217;s information systems, our review found that many state entities have weaknesses in their controls over information security. These weaknesses leave some of the state&#8217;s sensitive data vulnerable to unauthorized use, disclosure, or disruption.</p></blockquote>
<p>But Howle didn&#8217;t just offer this general conclusion. She also specifically criticized the Brown administration:</p>
<blockquote><p>Despite the pervasiveness and seriousness of the issues we identified, the technology department has failed to take sufficient action to ensure that reporting entities address these deficiencies. In fact, until our audit, it was not aware that many reporting entities had not complied with its requirements. To determine whether reporting entities have met the security standards, the technology department relies on a self-certification form it developed that the reporting entities must submit each year. However, the poor design of this form may have contributed to many reporting entities incorrectly reporting that they were in full compliance with the security standards when they were not. Specifically, we received complete survey responses from 41 reporting entities that self-certified to the technology department that they were in compliance with all of the security standards in 2014. However, when these 41 reporting entities responded to our detailed survey questions related to specific security standards, 37 indicated that they had not achieved full compliance in 2014. &#8230; The technology department was unaware of vulnerabilities in these reporting entities&#8217; information security controls; thus, it did nothing to help remediate those deficiencies.</p></blockquote>
<p>According to KCRA, a state task force created last year could turn in the first draft of a state government cybersecurity initiative this month.</p>
<p>The Howle audit knocking the state government&#8217;s failure to worry enough about hackers was one of six harsh reports she issued in a three-month span last summer, as CalWatchdog <a href="http://calwatchdog.com/2015/09/25/ca-auditor-six-harsh-reports-three-months-2/" target="_blank">reported</a>. Perhaps the most alarming report found that the state did a poor job tracking mentally ill gun owners, despite a previous 2013 audit that warned about the shortcomings of the state&#8217;s efforts.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://calwatchdog.com/2016/03/13/state-auditor-renews-cybersecurity-warning/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">87271</post-id>	</item>
		<item>
		<title>CalPERS reacts to Anthem security breach</title>
		<link>https://calwatchdog.com/2015/02/05/calpers-reacts-to-anthem-security-breach/</link>
					<comments>https://calwatchdog.com/2015/02/05/calpers-reacts-to-anthem-security-breach/#comments</comments>
		
		<dc:creator><![CDATA[John Seiler]]></dc:creator>
		<pubDate>Fri, 06 Feb 2015 00:13:39 +0000</pubDate>
				<category><![CDATA[Breaking News]]></category>
		<category><![CDATA[Rights and Liberties]]></category>
		<category><![CDATA[CalPERS]]></category>
		<category><![CDATA[John Seiler]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Anthem]]></category>
		<category><![CDATA[computer security]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=73413</guid>

					<description><![CDATA[The hacker attack on health insurance provider Anthem Blue Cross announced last night in particular affects hundreds of thousands of members of the California Public Employees&#8217; Retirement System. But a]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignright  wp-image-73417" src="http://calwatchdog.com/wp-content/uploads/2015/02/hackers-movie-poster.jpg" alt="hackers movie poster" width="298" height="397" srcset="https://calwatchdog.com/wp-content/uploads/2015/02/hackers-movie-poster.jpg 384w, https://calwatchdog.com/wp-content/uploads/2015/02/hackers-movie-poster-165x220.jpg 165w" sizes="(max-width: 298px) 100vw, 298px" />The <a href="http://losangeles.cbslocal.com/2015/02/05/fbi-investigating-anthem-security-breach-affecting-80m-customers/" target="_blank" rel="noopener">hacker attack </a>on health insurance provider Anthem Blue Cross announced last night in particular affects hundreds of thousands of members of the California Public Employees&#8217; Retirement System. But a security expert told CalWatchdog.com the breach is not critical &#8212; provided those affected take precautions.</p>
<p>The attack on Anthem comes on the heels of similar breaches of data for <a href="http://krebsonsecurity.com/2014/05/the-target-breach-by-the-numbers/" target="_blank" rel="noopener">Target</a>, <a href="http://www.usatoday.com/story/money/business/2014/11/06/home-depot-hackers-stolen-data/18613167/" target="_blank" rel="noopener">Home Depot</a> and other companies.</p>
<p>Anthem President and CEO Joseph Swedish <a href="http://www.anthemfacts.com/" target="_blank" rel="noopener">wrote in a letter</a> to members:</p>
<p style="padding-left: 30px;"><em>&#8220;Anthem was the target of a very sophisticated external cyber attack. These attackers gained unauthorized access to Anthem’s IT system and have obtained personal information from our current and former members such as their names, birthdays, medical IDs/social security numbers, street addresses, email addresses and employment information, including income data. Based on what we know now, there is no evidence that credit card or medical information, such as claims, test results or diagnostic codes were targeted or compromised.</em></p>
<p style="padding-left: 30px;"><em>&#8220;Once the attack was discovered, Anthem immediately made every effort to close the security vulnerability, contacted the FBI and began fully cooperating with their investigation. Anthem has also retained Mandiant, one of the world’s leading cybersecurity firms, to evaluate our systems and identify solutions based on the evolving landscape.</em></p>
<p style="padding-left: 30px;"><em>&#8220;Anthem’s own associates’ personal information – including my own – was accessed during this security breach.&#8221;</em></p>
<h3>CalPERS concern</h3>
<p>In an email obtained by CalWatchdog.com, Rita L. Gallardo, division chief of CalPERS&#8217; Office of Stakeholder Relations, wrote earlier today to those affected:</p>
<p style="padding-left: 30px;"><em>&#8220;As many of you have heard in the news, our health plan partner Anthem Blue Cross disclosed late last night that hackers breached its computer systems and the personal information of its members.  Like you, we are very concerned and frustrated about this unacceptable breach.  We have been in touch with Anthem this morning to ensure they are doing everything possible to protect our members and their families who are enrolled in the plan.&#8221;</em></p>
<h3>Precautions</h3>
<p>The hacker attack should not seriously affect Anthem members, whether or not they are part of CalPERS &#8212; provided people take precautions, Jim Harper told CalWatchdog.com; he&#8217;s a senior fellow in information studies at the Cato Institute.</p>
<p>He said that even if hackers obtain Social Security numbers, &#8220;it actually isn&#8217;t that serious because identity fraud takes a lot of work to pull off. When 80 million sets of ID are stolen, that doesn&#8217;t mean there will be 80 million incidents of identity fraud.&#8221;</p>
<p>The real risk now, he warned, is to make sure hackers don&#8217;t use the Anthem news itself as a way to trick people. As the Anthem and CalPERS statements quoted above indicate, members will be notified about the attack, and about what they can do.</p>
<p>Harper said people might get so tired of responding to legitimate inquires that, when a hacker inquiry pops up, they complacently could think, &#8220;Oh, not another one! All right, I&#8217;ll fill out the form and give them the information&#8221; &#8212; which then is use by the hacker for a serious security breach.</p>
<p>He urged Anthem members to change their passwords often to prevent identity theft. Which is good advice as well for those not part of Anthem, and for any system involving passwords.</p>
<h3>CalPERS activism</h3>
<p>CalPERS, the country&#8217;s largest retirement system, also is known for its shareholder activism, such as <a href="http://money.cnn.com/2012/05/02/markets/calpers-activist/" target="_blank" rel="noopener">discouraging </a>what it considers &#8220;excessive CEO pay&#8221; by companies. CalPERS maintains its activism helps improve company performance and is for the overall betterment of society.</p>
<p>Critics say such activism can reduce investment values, with the taxpayers who ultimately backstop CalPERS&#8217; investments put on the hook for any shortfalls.</p>
<p>It&#8217;s too early to know, but Harper said the Anthem security breach might spark CalPERS&#8217; activism in this area, in particular ensuring that &#8220;consumers have a right to know a breach has occurred. That sounds good. Yet it&#8217;s not necessarily good for consumers.&#8221;</p>
<p>He said that, given the ongoing security breaches, with more expected in the future, &#8220;If you hear about it all the time, it creates fear and unease, but not much more security.&#8221;</p>
<p>Instead, he reiterated that the best policy for consumers is constant vigilance over their own passwords and other data.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://calwatchdog.com/2015/02/05/calpers-reacts-to-anthem-security-breach/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">73413</post-id>	</item>
		<item>
		<title>State government&#8217;s computers so primitive they&#8217;re tough to hack</title>
		<link>https://calwatchdog.com/2014/12/25/state-governments-computers-so-primitive-theyre-tough-to-hack/</link>
					<comments>https://calwatchdog.com/2014/12/25/state-governments-computers-so-primitive-theyre-tough-to-hack/#comments</comments>
		
		<dc:creator><![CDATA[Chris Reed]]></dc:creator>
		<pubDate>Thu, 25 Dec 2014 14:30:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[California economy]]></category>
		<category><![CDATA[Inside Government]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[state payroll]]></category>
		<category><![CDATA[Chris Reed]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[state government]]></category>
		<category><![CDATA[COBOL]]></category>
		<category><![CDATA[Sony]]></category>
		<guid isPermaLink="false">http://calwatchdog.com/?p=71802</guid>

					<description><![CDATA[The hack of Sony Pictures by shadowy types believed associated with the North Korean government took another twist on Christmas Eve when Sony went ahead and released &#8220;The Interview&#8221; on]]></description>
										<content:encoded><![CDATA[<p>The hack of Sony Pictures by shadowy types believed associated with the North Korean government took another twist on Christmas Eve when Sony went ahead and released &#8220;The Interview&#8221; on YouTube after initially caving to hackers&#8217; demands and scrapping plans for any release of the crude, Pyongyang-mocking comedy. But the hack still portends a new era in which large institutions are targeted not just to steal secrets but for other purposes &#8212; starting with embarrassment and manipulation.</p>
<p>So which sort of institution is particularly vulnerable? One would think the state of California because of its long history of incompetence in upgrading and installing computer systems.</p>
<p><img decoding="async" class="alignnone size-full wp-image-71808" src="http://calwatchdog.com/wp-content/uploads/2014/12/old.computers.jpg" alt="old.computers" width="323" height="252" align="right" hspace="20" srcset="https://calwatchdog.com/wp-content/uploads/2014/12/old.computers.jpg 323w, https://calwatchdog.com/wp-content/uploads/2014/12/old.computers-282x220.jpg 282w" sizes="(max-width: 323px) 100vw, 323px" />This is from a 2010 Sac Bee story about the state being unable to adjust paychecks to reflect fewer hours paid during a furlough:</p>
<p><em>“California&#8217;s payroll computer system is so old that it relies on programming language, Common Business Oriented Language, or COBOL, that was introduced in the late 1950s, popularized in the 1960s and 1970s, and is no longer routinely taught to programmers.</em></p>
<p><em>“&#8217;When I was studying computer science in India, in 1973, none of us wanted to study because it was considered old-fashioned back then,&#8217;” said Prem Devanbu, computer science professor at the University of California, Davis.</em></p>
<h3>State agency overwhelmed by computer chores</h3>
<p>This is from a Governing magazine story the same year:</p>
<p><em>Dale Jablonsky, who until August was CIO of the California Employment Development Department (EDD), knows the situation all too well. The EDD runs California&#8217;s unemployment insurance program, where caseloads skyrocketed during the current recession. As the economic downturn deepened, Congress repeatedly extended the length of time individuals could draw unemployment benefits.</em></p>
<p><em>“In all, federal lawmakers approved seven benefit extensions since the recession began — and each was a nightmare for the EDD. Every extension requires changes to several hundred interconnected computer programs in the EDD&#8217;s eligibility system. Those programs are written in common business oriented language (COBOL), an ancient programming language, and modifications must be hand-performed by increasingly rare — and expensive — COBOL experts.</em></p>
<p><em>“&#8217;It typically takes two to three weeks to implement changes, depending on how complex the federal legislation is,&#8217; Jablonsky says. &#8216;Sometimes the legislation is so complex it takes five to six weeks to implement.&#8217; Indeed, implementing one particularly complex piece of legislation in late 2009 required changes to 650 programs in the EDD system. The resulting delay in mailing unemployment checks made front-page news throughout the state … .”</em></p>
<h3>COBOL not hospitable to hackers</h3>
<p>Oddly enough, however, using a computer language invented in 1959 actually is a deterrent to hackers. Computer World explained why in 2000. COBOL is a &#8230;</p>
<p><em>&#8230; simple language that&#8217;s so easy to read, it&#8217;s impossible to hide malicious programs. A language for mainframe data locked securely behind tried-and-tested access controls like the Resource Access Control Facility (RACF), Top Secret and ACF2&#8230;. Checking code for malicious programs is easy in COBOL.</em></p>
<p>COBOL can be part of a larger security problem when programmers try to connect it with newer software that can be accessed over the Internet. But by itself, its backwardness is an asset.</p>
<p>So now the government in the state that&#8217;s home to Silicon Valley and the birth of the information technology revolution has a reason to remain trapped in the mid-20th century on its IT.</p>
<p>Merry Christmas!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://calwatchdog.com/2014/12/25/state-governments-computers-so-primitive-theyre-tough-to-hack/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">71802</post-id>	</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/


Served from: calwatchdog.com @ 2026-04-14 14:18:22 by W3 Total Cache
-->