The Week That Was – 9/17/2012

We’ve got a bumper crop this week.  There are the obligatory links to the GoDaddy affair.  I get the distinct feeling that the GoDaddy event was not nearly as sensational as the security community would have liked.  Still it’s a sad commentary when your best PR move was to claim self-inflicted gunshot wound to the foot.   [11], [12]

It looks like the fine folks who brought us the BEAST attack have now given us CRIME.  Juliano Rizzo and Thai Duong have developed yet another attack against SSL.  This one is a side channel attack focusing on compression ratios.  Does this make anyone else feel nervous about the protocol holding the global e-commerce system together?  [4], [5]

There is an interesting article about BMW being sued for a weakness in their technology for creating ignition keys.  Car thieves figured this one out and started stamping out their own keys.  This is a new twist on an old problem. I’m just not sure if the problem is copying hard keys or copying mag stripe data.  [3]

I’ll wrap it up with some mobile device articles.  It looks like Apple’s cryptosystem for iOS devices have crossed a threshold.  Is iOS good enough for enterprise security now?  [2]  Also, there is research suggesting around half of Android devices contain known software weaknesses.  [19]   That in turn drive the growing underground economy for installing applications on mobile devices.  [17]

As always, I’d love to hear from you in the comments!

Link Dump

[1]
A. Savvas, “20% of IT staff admit to accessing unauthorised executive data,” Computer World, 12-Sep-2012. [Online]. Available: http://www.computerworlduk.com/news/security/3380528/20-of-it-staff-admit-accessing-unauthorised-executive-data/. [Accessed: 12-Sep-2012].
[2]
“Apple phones are AES-tough, says forensics expert,” Phys.org. [Online]. Available: http://m.phys.org/news/2012-08-apple-aes-tough-forensics-expert.html. [Accessed: 13-Sep-2012].
[3]
B. Yirka, “BMW forced to respond to BBC report showing its cars at easy risk of being stolen,” Phys.org, 14-Sep-2012. [Online]. Available: http://phys.org/news/2012-09-bmw-bbc-cars-easy-stolen.html. [Accessed: 14-Sep-2012].
[4]
D. Fisher, “CRIME Attack Uses Compression Ratio of TLS Requests as Side Channel to Hijack Secure Sessions,” ThreatPost, 13-Sep-2012. [Online]. Available: http://threatpost.com/en_us/blogs/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312. [Accessed: 13-Sep-2012].
[5]
CRIME vs startups. 2012.
[6]
“Developing a Capability Framework for a Healthy and Resilient Cyber Ecosystem Using Automated Collective Action.” U.S. Department of Homeland Security, National Protection and Programs Directorate in conjunction with U.S. Department of Commerce, National Institute of Standards and Technology, 10-Sep-2012.
[7]
G. Keizer, “Elite hacker gang has unlimited supply of zero-day bugs,” Computer World, 07-Sep-2012. [Online]. Available: http://www.computerworld.com/s/article/print/9231051/Elite_hacker_gang_has_unlimited_supply_of_zero_day_bugs?taxonomyName=Malware+and+Vulnerabilities&taxonomyId=85. [Accessed: 10-Sep-2012].
[8]
P. Reitinger, “Enabling Distributed Security in Cyberspace: Building a Healthy and Resilient Cyber Ecosystem with Automated Collective Action.” Department of Homeland Security, 23-Mar-2011.
[9]
T. B. Lee, “FCC defends its ‘trojan horse’ approach to net neutrality,” Ars Technica, 13-Sep-2012. [Online]. Available: http://arstechnica.com/tech-policy/2012/09/fcc-defends-its-trojan-horse-approach-to-net-neutrality/. [Accessed: 13-Sep-2012].
[10]
A. Sternstein, “Get ready for computers worldwide to automatically smother cyber strikes – Nextgov.com,” NextGov, 10-Sep-2012. [Online]. Available: http://www.nextgov.com/emerging-tech/2012/09/get-ready-computers-worldwide-automatically-smother-cyber-strikes/57977/. [Accessed: 11-Sep-2012].
[11]
D. Goodin, “GoDaddy outage makes websites unavailable for many Internet users (Updated),” Ars Technica, 10-Sep-2012. [Online]. Available: http://arstechnica.com/security/2012/09/godaddy-outage-makes-websites-unavailable-for-many-internet-users/. [Accessed: 11-Sep-2012].
[12]
J. Dohnert, “GoDaddy outage not caused by hackers,” V3.co.uk, 11-Sep-2012. [Online]. Available: http://www.v3.co.uk/v3-uk/news/2204723/godaddy-says-outage-was-not-caused-by-hackers. [Accessed: 12-Sep-2012].
[13]
M. Mimoso, “Google Adds Online Malware Scanner VirusTotal To Security Lineup,” ThreatPost, 07-Sep-2012. [Online]. Available: http://threatpost.com/en_us/blogs/google-adds-online-malware-scanner-virustotal-security-lineup-090712. [Accessed: 11-Sep-2012].
[14]
L. Constantin, “Leaked Apple UDIDs were stolen from digital publishing firm,” Computer World, 10-Sep-2012. [Online]. Available: http://www.computerworld.com/s/article/print/9231150/Leaked_Apple_UDIDs_were_stolen_from_digital_publishing_firm?taxonomyName=Cybercrime+and+Hacking&taxonomyId=82. [Accessed: 11-Sep-2012].
[15]
Sendatsu, “Looking inside your screenshots,” OwnedCore – World of Warcraft Exploits, Hacks, Bots and Guides. 16-Dec-2012.
[16]
A. Sternstein, “Pact sends highly sensitive spy agency data to the cloud,” NextGov, 12-Sep-2012. [Online]. Available: http://www.nextgov.com/cloud-computing/2012/09/pact-sends-highly-sensitive-spy-agency-data-cloud/58049/. [Accessed: 13-Sep-2012].
[17]
D. Walker, “Pay-per-install pays big bucks in the mobile world,” SC Magazine US, 12-Sep-2012. [Online]. Available: http://www.scmagazine.com/pay-per-install-pays-big-bucks-in-the-mobile-world/article/258731/. [Accessed: 13-Sep-2012].
[18]
J. Baker, “Permanent cybersecurity team established for EU institutions,” Computerworld, 12-Sep-2012. [Online]. Available: http://www.computerworld.com/s/article/9231209/Permanent_cybersecurity_team_established_for_EU_institutions. [Accessed: 13-Sep-2012].
[19]
D. Fisher, “Research Shows Half of All Androids Contain Known Vulnerabilities,” ThreatPost, 13-Sep-2012. [Online]. Available: http://threatpost.com/en_us/blogs/research-shows-half-all-androids-contain-known-vulnerabilities-091312#comment-121763. [Accessed: 14-Sep-2012].
[20]
T. Wilson, “Security Skills Shortage Creates Opportunities For Enterprises, Professionals,” Dark Reading, 11-Sep-2012. [Online]. Available: http://www.darkreading.com/security/security-management/240007115/security-skills-shortage-creates-opportunities-for-enterprises-professionals.html. [Accessed: 12-Sep-2012].
[21]
N. Silver, “Sept. 9: Call It as You See It,” FiveThirtyEight. 10-Sep-2012.
[22]
G. O’Gorman and G. McDonald, “The Elderwood Project.” Symantec, 2012.
[23]
Symantec Security Response, “The Elderwood Project,” Symantec Connect Community. 07-Sep-2012.
[24]
D. Zaruk, “The inherent negativity of risk,” The Risk-Monger, 11-Sep-2012. [Online]. Available: http://risk-monger.blogactiv.eu/2012/09/11/the-inherent-negativity-of-risk/. [Accessed: 11-Sep-2012].
[25]
C. Brook, “University of Miami Hospital Confirms Second Patient Info Breach This Year,” ThreatPost, 12-Sep-2012. [Online]. Available: http://threatpost.com/en_us/blogs/university-miami-hospital-confirms-second-patient-info-breach-year-091212. [Accessed: 13-Sep-2012].
[26]
G. Peterson, “What Identity And Access Management Can Learn From Car Talk,” Dark Reading, 10-Sep-2012. [Online]. Available: http://www.darkreading.com/blog/240007019/what-identity-and-access-management-can-learn-from-car-talk.html. [Accessed: 11-Sep-2012].

 

Leave a Reply

%d bloggers like this: