rc3.org

Strong opinions, weakly held

Tag: security (page 6 of 7)

Links from February 3rd

A few links from the past few days.

Data breach notification laws

Bruce Schneier argues that data breach notification laws are a good idea. I’d agree. I was working on an application that stored personal information when the ChoicePoint breach was reported, and it changed the way I thought about how much data we should archive. As Schneier points out, most identity theft results from computers belonging to individuals being compromised, but companies that deal in bulk amounts of user data should be particularly responsible when it comes to safeguarding that data. Without such laws, I don’t think they’d be as careful.

A practical perspective on security

Via Bruce Schneier:

Remember, if it’s in the news don’t worry about it. The very definition of news is “something that almost never happens.” When something is so common that it’s no longer news—car crashes, domestic violence—that’s when you should worry about it.

How Twitter was exploited

Now it can be told (apparently). The Twitter abuse that I posted about yesterday resulted from a Twitter employee giving their password to a third party service. Someone then used that password to access Twitter with administrative rights and amuse themselves.

Part of the problem here is that the credentials required to access your account through the API are the same as those required to access the site through the Web interface. But the other lesson here for developers is that you should really split up the administrative features of your application and the end user features into separate accounts. They probably shouldn’t even use the same interface. That may be more painful for users but it eliminates a lot of risks. And of course employees should know better than to hand out their passwords to random Web sites.

Update: Turns out the password in question was guessed, not phished. Either way, it’s an argument for separating the administrative functions from the standard user interface.

Update on Twitter phishing

Looks like the Twitter phishing attacks over the weekend led to some hilarious results.

Phishing on Twitter

There’s a phishing scheme being run against Twitter users right now. It looks like the objective is the collection of more Twitter passwords, but I’d expect that there is some other fraudulent angle as well that is perhaps yet to be revealed. In any case, avoid clicking on links in direct messages and if you’ve given your password to a third party service, you may want to change it.

Putting airport security to the test

Bruce Schneier and Atlantic Monthly writer Jeffrey Goldberg travelled around the country testing the limits of airport security. If you read Schneier’s blog, none of their findings will surprise you, but the article is entertaining nonetheless.

Here’s an example:

On another occasion, at LaGuardia, in New York, the transportation-security officer in charge of my secondary screening emptied my carry-on bag of nearly everything it contained, including a yellow, three-foot-by-four-foot Hezbollah flag, purchased at a Hezbollah gift shop in south Lebanon. The flag features, as its charming main image, an upraised fist clutching an AK-47 automatic rifle. Atop the rifle is a line of Arabic writing that reads THEN SURELY THE PARTY OF GOD ARE THEY WHO WILL BE TRIUMPHANT. The officer took the flag and spread it out on the inspection table. She finished her inspection, gave me back my flag, and told me I could go. I said, “That’s a Hezbollah flag.” She said, “Uh-huh.” Not “Uh-huh, I’ve been trained to recognize the symbols of anti-American terror groups, but after careful inspection of your physical person, your behavior, and your last name, I’ve come to the conclusion that you are not a Bekaa Valley–trained threat to the United States commercial aviation system,” but “Uh-huh, I’m going on break, why are you talking to me?”

Using games for terrorist collaboration

A defense researcher has created a hypothetical scenario that envisions how terrorists might conspire to commit a terrorist attack using World of Warcraft.

Fighting censorship with banner ads

James Fallows writes about uptake of Hot Spot Shield in China. It’s a tool that tunnels your Web traffic through a VPN so that people can’t snoop on your Internet traffic, and is supported by ads that it inserts when you load Web pages. Among other things, it enables users in China to circumvent the Great Firewall and view Web pages that are otherwise blocked. (I wonder how long it will be before the Chinese government blocks access to anchorfree.com from inside the firewall so that people can’t download Hot Spot Shield?)

Ruby Gems as an attack vector

Tim Bray warns of the dangers of Ruby Gems as an attack vector. The risk is that basically anyone can create a Gem and make it available using the gem installer.

I’ll say that this is why real systems administrators detest the various packaging schemes that scripting languages offer. It’s generally a much better practice to manage libraries through the operating system’s centralized packaging system — Red Hat’s RPM, FreeBSD Ports, Debian/Ubuntu’s APT, and so forth. Administrators who want to go beyond the vendor-approved repositories for packages are free to do so, but packages from the vendor list can be installed with relative confidence.

Who knows what to expect from packages from CPAN, PEAR, RubyForge, and the like? (This also ties into my longer argument about why developers are the natural enemy of the systems administrator, but I’ll get into that some other time.)

Older posts Newer posts

© 2024 rc3.org

Theme by Anders NorenUp ↑