...extra points for Ethical Hackers!
Millions
of student exams, tests and data exposed?
September 26, 2011 by admin
On September 19, Darren Pauli reported:
Multiple zero-day
security vulnerabilities have been found in the world’s most
popular educational software – holes that allow students to change
grades and download unpublished exams, whilst allowing criminals to
steal personal information.
Vulnerabilities in
the Blackboard Learn platform have the potential to affect millions
of school and university students and thousands of institutions
around the world.
The platform is
used by the United States military to train soldiers.
After several
weeks of investigation by university IT managers, security
professionals and SC Magazine, Blackboard Learn has acknowledged it
is sending a security advisory to customers to address the issue.
Read more on CRN.
On September 22, Blackboard responded
to the concerns on their blog. Jessica Finnefrock writes, in part:
So how does that
finding contrast with some of the headlines you may have read? Put
simply: although these issues are important, and we’re committed to
fixing them quickly, most of them could only have a limited impact at
the class level, do not seriously threaten the overall institution or
system data, and – most importantly – there have
been no client reports of exploitation of any of these
vulnerabilities. [Did they know they should be testing? Bob]
Most of the issues raised are common to lots of Web applications,
not just Blackboard Learn. That doesn’t make them less important –
but it is important to understand that their scope and potential
impact are generally low.
What are the
issues exactly? Most involve common attacks like phishing. To give
you an example, a successful exploit would require an authenticated
user with a valid login to create a malicious website and then create
a link within Blackboard to that website. The user would need to
convince another user to actively click on a suspicious link and
provide their user credentials again. These issues do not involve
actual system break-in or data vulnerabilities such as SQL
injections.
What’s the risk?
While the exploits could enable access to another user’s account,
a successful attack is not highly probable, requires significant user
intervention, and even then exposure would be limited to only
functions which may be performed by the impacted user. These issues
would not allow access to the entire system for grades or other
system-wide information. The likelihood of an administrator account
being compromised is low, and any attempted malicious actions would
be logged and traceable.
Read more on Blackboard.
An easy but unverifiable conclusion. I
would be much more concerned if a “Single point of failure” was
being addressed...
Data
Security: SK Communications Data Breach Due To “Cheap” Foreign
Antivirus Software
September 25, 2011 by admin
Sang Lee provides a follow-up on the SK
Communications hack that affected 35 million South Koreans, covered
previously on this
blog:
According to South
Korean media, the Korean Committee on Culture, Sports, Tourism,
Broadcasting & Communications released a report yesterday noting
that, of the 50 or so antivirus software available in the Korean
market, SK Comm used Norton from Symantec.
Per the articles
covering the issue, the specific malware that caused the SK Comm
breach was detected by five particular antivirus solutions. Norton
was not part of that group of five. However, it appears that Norton
is less expensive than some solutions that were tested.
This prompted
the Committee to slam SK Comm for using “cheap” foreign antivirus
software and accused it of being pennywise and pound foolish.
And by slammed SK Comm I mean they brought in the CEO and told it to
his face.
Read more on AlertBoot.
Every new technology is adopted with no
thought of the lessons learned using earlier technologies. Therefore
we always start with no security, no backups, no privacy, etc.
USA
Today's Twitter account falls victim to hackers
The same group that hacked NBC News'
Twitter account on September 9 and sent
tweets about a bogus attack on Ground Zero apparently grabbed
hold of USA Today's Twitter feed today and fired off a clutch of
messages.
The taunting tweets from someone
claiming to be The Script Kiddies asked if Twitter had the courage to
suspend the group again and encouraged Twitter users to vote for the
next account to be hacked.
(Related) “SmartPhones are much more
that “phones” but since we never secured phones, why bother
securing SmartPhones?
How
security is becoming a must-have on smartphones (Inside Apps)
When writing a weekly column about the
apps business, it's easy to get caught up on the new opportunities,
capabilities and trends emerging from this burgeoning area. It's
equally easy, however, to forget that they come alongside new
threats.
These threats, which include rogue apps
that can swipe your personal data or steal passwords for your bank
accounts, are real and they're growing.
A study conducted by security software
provider McAfee found that the
amount of malicious software, also known as malware, targeting
Android had jumped 76 percent since the previous quarter, a
remarkable rise in just three months. At the same time, Android
had surpassed Symbian as the most often attacked mobile platform.
(Related) Think of this as a threat
that many managers won't be able to match to a technology they are
using!
From
the man who discovered Stuxnet, dire warnings one year later
… Like the Hiroshima
bomb, Stuxnet demonstrated for the first time a dangerous capability
– in this case to hackers, cybercrime gangs, and new cyberweapons
states, he says in an interview.
With Stuxnet as a "blueprint"
downloadable from the Internet, he says, "any
dumb hacker" [...and imagine what the good ones can do. Bob]
can now figure out how to build and sell cyberweapons to any
hacktivist or terrorist who wants "to put the lights out"
in a US city or "release a toxic gas cloud."
This should cause a kerfuffle. Or
perhaps those who drank the Kool-Aid just don't care?
Logging
out of Facebook is not enough (Updated)
September 25, 2011 by Dissent
Nik Cubrilovic writes:
Dave Winer wrote a
timely piece this morning about how Facebook
is scaring him since the new API allows
applications to post status items to your Facebook timeline without a
users intervention. It is an extension of Facebook
Instant and they call it frictionless sharing. The
privacy concern here is that because you no longer have to explicitly
opt-in to share an item, you may accidentally share a page or an
event that you did not intend others to see.
The advice is to
log out of Facebook. But logging out of Facebook only de-authorizes
your browser from the web application, a number of cookies (including
your account number) are still sent along to all requests to
facebook.com
. Even if you are logged out,
Facebook still knows and can track every page you visit.
The only solution is to delete every Facebook cookie in your browser,
or to use a separate browser for Facebook interactions.
Read more on Nik
Curbrilovic Blog and do note his update where he reports that he
contacted Facebook a few times about this issue over the past year
and got no response.
Is this a deceptive business practice
under the FTC Act? Wouldn’t the average user believe that if they
are logged out, their data are not being sent back to Facebook.com?
UPDATE: Facebook
denies these allegations. See their statement to The
Register.
(Related)
Facebook:
‘We don’t track logged-out users’
September 26, 2011 by Dissent
Richard Chirgwin reports:
Facebook has
attempted to shoot down claims that it leaves cookies on users’
machines even after they log out of the social network. The response
came after an Australian blogger alleged the site can still snoop on
your web surfing after you’ve signed out. [See previous
coverage on PogoWasRight.org here
- Dissent]
[...]
However, Facebook
doesn’t agree. Whether or not Cubrilovic’s claim that he
notified Facebook without response during 2010 is accurate, he
certainly got a hair-trigger response from Facebook this time.
In a comment on
Cubrilovic’s blog, a Facebook engineer – identifying himself as
staffer Gregg Stefancik – said that “our cookies aren’t used
for tracking”, and that “most of the cookies you highlight have
benign names and values”.
“Generally,
unlike other major internet companies, we have no
interest in tracking people,” [None? Bob] the insider
added.
Read more on The
Register.
No comments:
Post a Comment