AOL Profits On Ignorance

January 24, 2011

Apparently, something like 60% of AOL’s profits are coming from customer ignorance. About 80% of their income is from subscription fees, and 75% of those subscribers have cable or other broadband connections – meaning, essentially, they’re paying AOL for nothing but an @aol.com email address and a backup dialup account, presuming their computer has a modem.

That’s an interesting business model. But I don’t think it’s all that unusual – I can’t tell you how many times I’ve heard of things like maintenance or support contracts being paid for years after the specified hardware or software was taken out of service. If you’re in charge of that sort of thing at your business, it might be smart to take an audit of everything that’s still being billed and make sure that it’s still relevant.


Credit Union Breach

January 24, 2011

The Pentagon Federal Credit Union, the third-largest Credit Union in America, has suffered a security breach exposing the personal data of an unknown number of members. Their explanation is malware brought in on an infected laptop.

There was a time when you could depend on a firewall to protect your network, when data and work would stay in one place and something like this couldn’t happen. There was also a time when a city had a huge wall around it, with one or two gates. Now people have locks on their individual houses, but apparently, the computing world hasn’t caught up yet.


Resume of a Trojan Horse

January 24, 2011

The Internet Crime Complaint Center has a cautionary tale for prospective employers. An email attachment on a response to an online job posting was actually a Trojan Horse program, used to steal the financial credentials of the hiring company and defraud them of over a hundred thousand dollars.

It might be wise to have a dedicated machine or VM for handling untrusted attachments like that; at the very least, make sure that your antivirus software is up-to-date and use it to explicitly scan unknown attachments before opening.


Confidentiality of Work Email

January 24, 2011

An appellate court in California has ruled that attorney-client privilege does not apply to messages sent from a client using his or her corporate email account; the particular case was that of a young woman who felt that her employers had become hostile when learning of her pregnancy. The emails between her and her attorney were introduced at trial as evidence of her emotional state.

The emails were not considered confidential because the small business involved had a written policy declaring email to be monitored and intended for business use only. This is further proof of how important it is to have properly written and publicized security policies in a business environment.




Definition Monday: Information Security

January 24, 2011

Welcome to Definition Monday, where we define and explain a common technology or security concept for the benefit of our less experienced readers. This week: Information Security.

“I shall not today attempt further to define the kinds of material I understand to be embraced within that shorthand description; and perhaps I could never succeed in intelligibly doing so. But I know it when I see it.”

This famous quotation from Justice Potter Stewart is from the obscenity case of Jacobellis v. Ohio – the Justice is saying that he cannot come up with a succinct and simple definition of pornography, but he knows it when he sees it. If you will forgive the comparison, the same thing can often be said about Information Security.

It’s easy to tell when Information Security has failed. Credit card numbers stolen? Identity falsified? Web site defaced? “Secret” internal memos ended up on Wikileaks? These are all failures of Information Security, and most people would realize it – but that doesn’t get us any closer to a definition.

The classic definition of Information Security, the one that I generally work with, is simple: Information Security is the enforcement of the “CIA Triad” – Confidentiality, Integrity, and Availability.

Confidentiality means that only the proper people are allowed access to a piece of information. This is enforced via systems like Access Control Lists on files, encryption on data in transit, even relatively crude measures like locks on a file cabinet. If confidentiality is properly enforced, information is available to those who need it and (perhaps more importantly) not available to those with no right to it.

Integrity means that information cannot be modified without the caretakers of that information being aware of it. This is enforced with things like fingerprinting of data with hashes or digital signatures, auditing file access and modification, certificate hierarchies, and maintaining proper backups. Integrity means that you can be sure an email claiming to be from a bank or other trusted authority is actually from that entity.

Availability means that information is available when it is needed. It’s easy to maintain confidentiality and integrity on their own; carve the data into a stone tablet and drop it into the middle of a lake. The hard part is when you need to ensure that this information can be retrieved simply when it is needed. Availability is enforced with things like load-balanced server clusters, redundant network connections, UPSes and emergency generators, and “hot” or “warm” site disaster recovery plans.

Let’s take a look at how this triad applies to something commonplace – say, online banking. A bank’s website will require proper authentication before account details can be accessed; this is confidentiality. It will also maintain a proper balance in the account when money has not been deposited or withdrawn; that is, money will not magically appear or disappear, but rather will correspond to the sum of the debits and credits over time. This is integrity. Finally, the bank’s website will be available from the Internet 24 hours a day, 7 days a week, no matter what disasters befall the individual data centers hosting the site. This is availability. A proper Information Security plan, for your own company or for any other institution, must enforce the CIA Triad in order to be successful.


Websites for Sale

January 22, 2011

Ever wanted to have administrator access to a .edu or a .mil site? According to the blog at Imperva’s web site, now is your chance.

For prices ranging up to $499, you can purchase the credentials for full administrative access to a variety of sites. If you’d rather just have the PII (Personally Identifiable Information) instead, that’s also available.

Odds are good that this information and access was gathered using simple, automated, run-of-the-mill SQL Injection attacks and other simple web vulnerabilities. If your web site is running code written by amateurs, or even by seasoned programmers without the experience to write secure code on the web, you should probably look into a vulnerability assessment or code audit. After all, it’s better to find the hole yourself before the bad guys do, right?


IPv4 Exhaustion

January 22, 2011

The central IANA pool of IPv4 addresses is expected to run out any day now, when the last five /8 address spaces are distributed to the Regional Internet Registries. This means that anyone who wants to join the Internet with a permanent address will either need to buy one from an existing owner, or look into moving to IPv6 instead.

If your organization needs more addresses in the future and doesn’t have an IPv6 migration plan – you could be in serious trouble very soon. Time to start on your research.


Facebook Mining

January 21, 2011

A young man in Sacramento is facing up to six years in prison for using Facebook profile information to hack into email accounts, then searching the “sent mail” folders for compromising photographs.

It seems that the “security questions” that are intended to be used in the event of a forgotten password are often much, much easier to guess the answers to than the password they are equivalent to. As I recall, Sarah Palin’s email hack was the same sort of thing.


Cisco’s 2010 Report

January 21, 2011

Cisco’s report on security trends from last calendar year [Warning: PDF File] has been released, and it’s an interesting read. Among the highlights:

  • An increase in attacks targeting iOS and other mobile platforms. In the past, desktop and server Windows operating systems were the main target of attackers; it appears that they are now after the sensitive information on mobile devices as well.
  • An uptick in the use of Java as a mechanism for exploits, both as a language for writing tools and the JRE as a target.
  • For the first time in memory, global spam volumes were actually down this year (though the volume did increase in Europe)

If you’re interested in the current global landscape in information security, this report is definitely worth a quick read.


Rogue GSM

January 21, 2011

An interesting demonstration at Black Hat DC, proving how easy it is to create a fake GSM network and lure unsuspecting users into connecting to it.

From the article:

Ralf-Philipp Weinmann showed how to cobble together a laptop using open-source software OpenBTS and other low-cost gear to create a fake GSM transmitter base station to locate iPhones in order to send their owners a message. A number of iPhone users in the room expressed surprise that they had gotten a message asking them to join the network.

Weinmann, who is researching vulnerabilities in cellular networks, said that with the right equipment, the range for the rogue GSM station he built can be 35 kilometers.

Once someone is connected to a GSM station you own, of course, that means that their voice traffic will pass through it and can be easily recorded. Perhaps it’s time for an overhaul of the Clinton-era code underlying the GSM networks.