Pharmacare, Harvard Try To Shut Down Security Hole 93
cfusion writes "CVS's drug insurance wing Pharmacare and Harvard University have taken steps to shut down a security hole that would have allowed anyone on the Internet to view any Harvard affiliate's drug history, a possible violation of Federal laws concerning medical records (HIPAA). The Boston Globe has the story,
which came after the vulnerabilities were discovered by two reporters for the school newspaper (that story has screenshots that show just how easy it was). Raises interesting questions about computer security and using ID numbers as passwords."
I'm impressed (Score:5, Insightful)
Re:I'm impressed (Score:5, Insightful)
Think about it. A good guy finds a bug in the software, but in order to test it he ended up breaking into something. For fear of prosecution, he says nothing. Then a bad guy does the same thing, and takes down the system after stealing all the data. If the first guy knew he could contact the administrator without fear of prosecution (if he could prove he has positive intents), then the problem could be patched before the bad guy gets there.
Re:Simple (Score:1)
Re:Simple (Score:2)
Then, by drawing attention to the problem, they can actually get the server operator to fix it. There is a huge difference between:
"I think your server might have a security exploit. You can find the patch at http://whatever.net"
and
"Your server has a security exploit that allowed me to download somebodies perso
Re:I'm impressed (Score:2)
"less insecure", not "more secure"
Re:I'm impressed (Score:2)
Re:I'm impressed (Score:3, Interesting)
About a month ago, I found a major flaw in UI-Integrate, the system that does EVERYTHING for the University of Illinois (UIC, UIUC, and UIS). Anyway, I found this blatantly obvious (XSS) hole, and wrote up an advisory. Since it was potentially major, I didn't post it publicly. I made slight mention on my blog ("hey, I found a security hole, cool"). I showed u
Yes! (Score:4, Funny)
What's that? Oh, you say it was print journalists?
Sorry, never mind everyone!
Re:Yes! (Score:2)
Well, one victory at a time I suppose...
Raises questions? (Score:5, Insightful)
You me, before this, you would have thought it would be okay to use non-private ID numbers as passwords?
Re:Raises questions? (Score:2)
Re:Raises questions? (Score:3, Funny)
I'm told there's a large, affluent first world country where this is the norm. Every citizen is issued a nine digit identifier, which is then used for the rest of their life as both username and password for various reasons, both important and trivial.
But that's probably just an urban legend.
Re:Raises questions? (Score:3, Insightful)
Re:Raises questions? (Score:3, Interesting)
Please prove you are who you say you are, by revealing your date of birth and your mother's maiden name.
(I'm not joking, that public-record information is used to access my bank account over the phone)
Re:Raises questions? (Score:3, Interesting)
I suggest you change banks, immediately. It would be a good idea to let them know why, but switching is the most important thing.
People jst accept these things, assuming they will never be the victim, until it happens.
It can take an incredibly long time to recover your money after it is stolen, and if your bank is not FDIC insured, you run the risk of possibly never getting it back (or having to go through a
Re:Raises questions? (Score:2)
No password (Score:2, Insightful)
So they actually used an "username" with the purpose of representing both an username and a password.
That is a security issue by design. What were they thinking?
Re:No password (Score:2, Insightful)
Somebody is going to pay. BIG (Score:1, Insightful)
Harvard? (Score:5, Funny)
Re:MOD PARENT UP +1 Funny (Score:1)
You must be new h------
*OWW*
What was THAT for?
Re:Harvard? (Score:2)
Re:Harvard? (Score:2)
He did not state it that way. (Score:2)
And he's right about that- there have been studies which suggest that men and women's brains are different.
But apparently it's not politically correct to state what has been found in scientific research. If you notice, nobody claimed what he said was factually incorrect, they just said it was inappropriate. The press didn't seem to be too interested in asking experts about
Re:He did not state it that way. (Score:2)
Really? Well, here I am saying it: what he said was not only inappropriate, it was factually incorrect. I don't give a fuck how big your brain is or how fast you are. All it takes to be a great mathematician is some powerful creativity and the willpower to follow through on ideas. If anything, the reason there are few women mathematicians is because:
You're a funny guy, you know that? (Score:2)
Wow, who needs studies performed by qualified researchers in the field when we have some guy named "Capt'n Hector" telling us how it all works?
Sounds like a brilliant idea. Let's just discard all those "studies" performed by "educated scientists" who have "doctorate degrees" and just replace them with emotionally-charged outpours by people like yourself. After all, you know better.
By the way- Feel free to provide evidence of your claim that he
Re:You're a funny guy, you know that? (Score:2)
And to think, Summers said that the reason there aren't woman mathematicians at Harvard is because they are biologically inferior. The same excuse was used to by the Nazis to kill Jews. I DO know better, and you should too.
Lastly, "people like myself?" I am the son of one such of these rare woman mathematicians. She had to fight for her tenure at UC Berkeley. Her name is Jenny Harrison, perhaps you've heard of her. I spent the first 7 years of
Re:You're a funny guy, you know that? (Score:2)
Wow, you're really trying hard to set up a strawman argument. That one is ancient- equate everything to Nazis and you just *must* be right.
Nobody said that women are biologically inferior. He just claimed that it's possible that women could be at a disadvantage in that one specific sub
Re:He did not state it that way. (Score:1)
Re:He did not state it that way. (Score:2)
Actually, this could be one of those fabled biological differences. If aggression is caused by body chemicals, then the fact that boys tend to be more agressive than girls could explain some of the social outcomes.
That said, you're dead right on this observation:
Professor.. NOT! It was the Harvard President! (Score:1)
Said he was trying to be provocative at a research conference.
I was going to write, "We should consider the hypothesis that Ivy League males are just rock-dumb when it comes to cultural sensitivities."
But, then Summers issued a better sounding apology.
The meta-parent really IS funny!
-- Sally
raises interesting questions? (Score:5, Insightful)
Since when has anybody thought that was an acceptable practice? Ever?
It doesn't raise questions about the practice, it raises questions about the quality of the people dictating the practices. This is 30-years-ago stuff, isn't it? Really, now.
I will resist any humor related to the gender-based aptitudes of any IT mangement personnel at Harvard, given their recent discomfort in that area. BTW, if you've ever dealt with HIPAA compliance, it's right up there with Sarbanes-Oxley in terms of IT shop burdens. Not that it's any excuse for using people's known ID numbers as passwords. Whew.
Re:raises interesting questions? (Score:2)
Re:raises interesting questions? (Score:2)
"Possible?" (Score:5, Informative)
Speaking as someone who admins boxes with data that falls under HIPAA (as well as IRS data, but those are different servers), there's no "possible" about it. You don't screw around with HIPAA violations. You will get nailed good and hard.
Re:"Possible?" (Score:3, Insightful)
Since you deal with it, perhaps you could illuminate the types of auditing that go on, and whether there's the possibility of using a software vendor which will indemnify against security design flaws.
Re:"Possible?" (Score:3, Interesting)
It is a common misunderstanding to think that software, hardware, or turnkey systems can be made inherently HIPAA compliant. They can't.
HIPAA does not specify technologies, it specifies that a clinic (or whatever) that generates, uses, or stores protected health information have policies in place to protect that data (for several values of "protect") and that it adheres to its own policies.
Like ISO 9000, HIPAA is just a standard framework for creating policies
The troll boy theah's got a point, boy (Score:2)
You don't screw around with HIPAA violations. You will get nailed good and hard.
Parent NessusRed writes:
sorry idiot no one has been charged with HIPAA violations to date. settle down diaherra mouth.
...and this guy's at -1??
I'm not aware of any HIPAA violations prosecuted to date, and I'd love to hear about them if they exist. One of the great tricks done by the HIPAA legislation and its industrial camp followers is to convince people that it's scary shit. No doubt the po
Re:The troll boy theah's got a point, boy (Score:2)
I think the feds are still focusing on getting clinics to comply with HIPAA, and are not yet using prosecution and fines as much more than a threat.
I think it's a sound approach... they come to a non-compliant clinic, set a really big freakin' stick down on the table, and speak softly about the need to get into compliance with the regs for the protection of the patients. They say that later they'll a
Only possible. Maybe not likely. (Score:5, Informative)
The Privacy portion of HIPAA is what caused a big stir a couple years ago when it went into effect. (It's the only part of HIPAA really apparent to patients.) It deals with the sorts of intentional disclosures of Protected Health Information that a clinic can make. It does not (amazingly) deal much with unauthorized access to PHI.
For instance, it is allowed under HIPAA Privacy to e-mail a patient's chart to someone over the public internet, as long as you are absolutely sure that the e-mail address you entered represents the correct intended recipient. HIPAA Privacy cares not who reads it in transit.
The Security section of HIPAA will definitely cover this sort of thing. It applies to all electronic PHI in place or in transit. However, it doesn't take effect for a couple months yet. So if you're going to screw up PHI security this badly, you'd best do it quick!
the key question (Score:5, Interesting)
Re:the key question (Score:3, Informative)
Re:the key question (Score:2)
any competent person in the field will tell you that they ARE NOT PASSWORDS and SHOULD NEVER BE USED AS PASSWORDS
I agree, but I have experienced a similar situation (fortunately nothing as sensitive as medical records), and you would not believe the pressure there was to use a public ID as a password.
Everyone was pushing for the path of least resistance, which is rarely a secure path.
Funny thing is, all of the potential "problems" that were brought up as justification for developing an insecure system
Scott Bradner (Score:2)
Heh... that should be MUST NOT be used as passwords.
The funny thing is that their security consultant is Scott Bradner, who came up with the MUST, SHOULD, etc. terminology for RFCs. He was also transport area director at the IETF (but not s
self incrimination (Score:3, Interesting)
Re:self incrimination (Score:2)
Re:self incrimination (Score:2)
Re:self incrimination (Score:1)
Re:self incrimination (Score:2)
Re:self incrimination (Score:2)
Re:self incrimination (Score:1)
NEVER EVER submit to a drug test.
1. they are most probably illegal (time will tell)
2. if !1 then they are highly invasive
3. if your employer does not trust you, or the field you work in does not trust you... It's time for a change.
Advice? Start your own business, contract, work for humans.
Re:self incrimination (Score:2)
From a Harvard Student... (Score:3, Informative)
Attached to our ID numbers we have passwords which the university has strict rules when we select (8 digits, at least 1 letter and 1 number, they're case sensitive, etc). There is no online resource here at Harvard that we can access with only our ID number-- we need the password as well.
And then we also have independant usernames and passwords which we use to access email and log onto networked computers around campus. So the security here is pretty good: visible usernames + secret passwords for email, computer access, etc. coupled with "secret" ID numbers + secret passwords for college resources.
Rob
Re:From a Harvard Student... -- patently false (Score:5, Informative)
For instance, head over to http://www.seo.harvard.edu/students/search.html and note that only ID+last name is required. Or https://www.fas.harvard.edu/computing/utilities/a
From the Crimson article:
"But even if iCommons is fixed, The Crimson has identified a variety of web tools that require no more than the non-secret ID, or a combination of ID and last name or birthday, to access information that would generally be considered confidential.
For instance, anyone on campus can delete or register a Harvard network connection just knowing an individual's ID and last name. This would permit someone to illegally share files traceable to another person's identity.
A last name and ID are also the keys to choosing course sections and accessing the Student Employment Office's jobs database. Only an ID is required to access the Office of Career Services' MonsterTrak job listings database.
With a Harvard ID and birthday--obtainable by undergraduates through an online facebook, and more widely through websites like anybirthday.com--a user can post or download resumés on someone else's eRecruiting account or access the online UHS health insurance waiver form. Individuals can also activate an e-mail address for someone who is eligible for a Faculty of Arts and Sciences account but has not requested one.
Setting up all campus mail to forward to a different physical address requires the ID and the last four digits of a student's social security number--often obtainable by searching online directories like Lexis-Nexis and Accurint. Accessing mail forwarding would also show the individual's current Harvard address, which for a secure-flag student could result in the disclosure of their on-campus whereabouts."
Re:From a Harvard Student... -- patently false (Score:2)
As for the resume stuff, well, is that so different from having your resume up on Monster.com? Sure, it's the closed University system, but it's getting blasted to tons of potentia
Re:From a Harvard Student... -- patently false (Score:1, Insightful)
Or even just seeing what classes someone is taking and where??????
Imagnine this was NYU and it was people hacking in to see what classes Mary Kate & Ashley are taking so they can stalk them. Or worse, these people under FERPA being kidnapped for money. That's why they keep their info private, having that stuff out there is a major security risk for a lot of people.
Re:From a Harvard Student... -- patently false (Score:2)
Security Device (Score:1)
So...cool! They're installing Xserves?!?
CVS security? (Score:1)
http://sourceforge.net/projects/cvs-securi
Oh. Never Mind.
Figures (Score:1)
Joe Accounts (Score:1)
This is common practice in higher education (Score:2)