Tag Archives: security

Google Glass and Tomorrow’s Security Concerns

If you haven’t heard, Google Glass, the latest gadget from the Silicon Valley giant, has set the media and tech world abuzz, with both admiration and controversy surrounding the device. Google Glass was released to the public last week and combines smartphone technology with wearable glasses that is reminiscent of something seen on Star Trek. Public, in this case, actually means beta testers (called Glass Explorers) who had to apply for the chance to purchase the spectacles in advance by writing a 50 word essay using the hashtag, #ifihadglass. Those chosen had the opportunity to purchase the device for $1,500 USD.

Along with the admiration of a device that appears to do everything, comes controversy.  The 8,000 individuals who were able to purchase the device were bound to a restrictive end user license agreement, in which the product would be deactivated and rendered useless if sold, loaned, or transferred to a third party. This was discovered after one winner decided to put his glasses on EBay and was contacted by Google. However, it appears there were no restrictions against modifying or rooting the device other than the loss of warranty and technical support.

Recently, James Freeman, a security researcher from the United States blogged about his acquisition of Google Glass from Google’s headquarters in Mountain View, California. His blog post set the press and Google scrambling after he posted a picture showing that he had rooted the device. Freeman wasn’t part of the Glass Explorer beta test, he simply had the privilege of purchasing the device as an attendee of Google I/O in 2012. His main motivation in purchasing Google Glass was device customization.  In order to make customize the device, he had to “jailbreak” or “root” it.

The foundation of Google Glass is Android 4.04. As with any operating system, there are publicly known vulnerabilities and exploits. In this case, the author analyzed an unnamed exploit which relies on a symlink traversal and a race condition to see if he could apply it to Glass. To gain full root access, Freeman realized he needed to open the Debug menu on Glass. The Debug menu is typically locked on smartphones and requires a PIN to access it, but this was not the case with Google Glass. Freeman discovered that the Debug menu on Glass was not locked down and allowed for easy access to the device:

“Even if you wear Glass constantly, you are unlikely to either sleep or shower while wearing it; most people, of course, probably will not wear it constantly: it is likely to be left alone for long periods of time. If you leave it somewhere where someone else can get it, it is easy to put the device into Debug Mode using the Settings panel and then use adb access to launch into a security exploit to get root.

The person doing this does not even need to be left alone with the device: it would not be difficult to use another Android device in your pocket to launch the attack (rather than a full computer). A USB “On-The-Go” cable could connect from your pocket under your shirt to your right sleeve. With only some momentary sleight-of-hand, one could “try on” your Glass, and install malicious software in the process.”

Although the vulnerability in Google Glass allows for anyone with malicious intent to install malware to their heart’s desires, it does require physical access to the device. As those in the security community know, while this vulnerability is a definite flaw security wise, if you can have physical access to a device, it is not completely secure. This is why Linux distributions have a single user mode for forgotten or lost root passwords. If you have physical access to the device or computer, it can be considered insecure.

Wearable devices will give malware authors another avenue to exploit, as evidenced by their transition from desktops to mobile devices. Enterprising and creative malware authors will always try to find a way to exploit a vulnerability in anything, and it will only be a matter of time before it happens.

In theory, Glass or any device that can be worn and used to record at the same time can have security implications. We might not be far away from clever ways for these devices to be used against us. For example, privacy risks such as being recorded inconspicuously wherever you are and theft possibilities, such as having your ATM PIN recorded. These problems just scratch the surface—the list of security concerns might be endless.

.pw URLs in Spam Keep Showing Up

Last week, Symantec posted a blog on an increase in spam messages with .pw URLs. Since then, spam messages with .pw URLs have begun showing up even more.
 

pw TLD blog update.png

Figure 1. .pw TLD spam message increase
 

Symantec conducted some analysis into where these attacks are coming from in terms of IP spaces. As expected, Symantec observed a large quantity of mail being sent from an IP range and then moving to another IP range. While this is an expected behavior, there was an interesting twist. There were multiple companies (with different names) hosting .pw spammers using the same physical address in Nevada. 

Examining messages found in the Global Intelligence Network, Symantec researchers have found that the vast majority of spam messages containing .pw URLs are hit-and-run (also known as snowshoe) spam. The top 25 subject lines from .pw URL spam from May 1, 2013 were:

  • Subject: For all the moms in your life on Mother’s Day.
  • Subject: Tax Relief Notification
  • Subject: Remove IRS Tax Penalties
  • Subject: Save on the most beautiful bouquets for Mom
  • Subject: Reusable K Cup for Keurig or single-brew coffee maker
  • Subject: Garden Today says, “By far the easiest hose to use”
  • Subject: HOME: Amazingly Strong water hose you can fit anywhere.
  • Subject: The LAST water hose you’ll ever need
  • Subject: No Hassle Pricing on Ford Vehicles
  • Subject: Own a NEW Ford for the Summer
  • Subject: May 1st Ford Clearance Event
  • Subject: Lasik- Safe, Easy, and Affordable
  • Subject: Safe, Easy, and Affordable Lasik
  • Subject: We work with the Biggest and Best Brands in Fashion
  • Subject: Whos the hottest? Post . Vote . Win
  • Subject: Are You and Your Business seen at a global scale?
  • Subject: Power your entire House, Pool and more with Solar Energy
  • Subject: Most EFFECTIVE way to treat Hypertension
  • Subject: Solar power slashes your electric bill in half
  • Subject: Global Business Registry for Networking Professionals
  • Subject: Finally, an EFFECTIVE fat shredding solution
  • Subject: Register with other professionals
  • Subject: Easiest Way To Lower Blood Pressure
  • Subject: Secret To Lowering Blood Pressure Naturally
  • Subject: Refinance Today, Save Tomorrow

In addition to creating anti-spam filters as needed, Symantec has been in contact with Directi and working with the registrar to report and take down the .pw domains associated with spam. Symantec believes that collaborating with the registrar is a more progressive and holistic approach to solving this problem.

Massive U.S. cyberattack planned by Anonymous

“In the cross hairs of anonymous” The hacktivist group Anonymous announced phase one of a massive cyberattack, called Op USA,  on U.S government and banking websites scheduled for next Tuesday, May 7. The White House, the NSA, and the FBI are included on a list of high profile government targets, and 133 financial institutions including the […]

The Hexadecimal URL Obfuscation Resurgence

For that past several days, Symantec has observed an increase in spam messages containing hexadecimal obfuscated URLs. Hexadecimal character codes are simply the hexadecimal number to letter representation for the ASCII character set. To a computer, he…

Certificados OpenSSL – Cómo y cuándo utilizarlos | Symantec

Certificados SSL: cómo y cuándo utilizar OpenSSL
 A la hora de proteger los sistemas de una empresa, el protocolo SSL (Secure Sockets Layer) se ha convertido en un arma esencial, pues cifra los datos que se transmiten por Internet y …

Selbst-signierte Zertifikate – Wann und wie verwenden | Symantec

Sinnvoller Einsatz von Open SSL: wo und wie?
 
SSL Zertifikate (Secure Sockets Layer) gehören zur Grundausstattung jedes Unternehmens für den Schutz seiner Systeme. Das Protokoll mit integrierter Datenverschlüsselung ist die Standar…

Le certificats auto-signés – Comment les utiliser | Symantec

OpenSSL : quand et comment ?

 

La technologie SSL – Secure Socket Layer – représente une arme redoutable pour toutes les entreprises qui souhaitent assurer la sécurité de leurs systèmes. En intégrant la cryptographie de données au protocole, elle s’impose comme la référence absolue en matière de sécurisation des communications par Internet.

Vos différentes recherches à travers les méandres de la sécurité en ligne vous ont certainement conduit un jour vers la célèbre bibliothèque libre de sécurisation des communications : OpenSSL (OpenSecure Socket Layer). Il se peut même que votre entreprise l’utilise – sans toutefois que vous en connaissiez réellement les mécanismes. Steve Marquess, de la OpenSSL Software Foundation, est d’ailleurs le premier à reconnaître sa complexité. En ce sens, il me confessait récemment : « Il est très difficile de décrire [un tel système de] cryptographie de manière succincte aux non-initiés ». Tous ceux qui ont un jour tenté d’approfondir le sujet vous le diront ! Après tout, nul besoin de connaître tous les rouages d’un outil pour pouvoir l’utiliser correctement. Pour autant, il pourrait vous être très utile de mieux savoir quand y avoir recours.

Qu’est-ce donc exactement que l’OpenSSL ? En substance, OpenSSL désigne une implémentation open source des certificats SSL et TLS (Transport Layer Security) – un utilitaire gratuit, compris dans la plupart des déploiements MacOS X, Linux, BSD et Unix. Une copie binaire est également disponible en téléchargement pour les environnements Windows.

Quelle est sa vocation exacte ? OpenSSL contient tout ce dont vous avez besoin pour créer votre propre autorité de certification privée. Écrite en langage C, la bibliothèque principale implémente les fonctions basiques de cryptographie et fournit diverses fonctionnalités utilitaires. Au menu : valeurs de hachage, cryptage et décryptage de fichiers, certificats et signatures numériques, et nombres aléatoires. Il s’agit également d’un outil de ligne de commande. Il peut donc effectuer les mêmes activités que l’API (interface de programmation applicative), avec en prime la possibilité de tester les serveurs et clients SSL.

Toutefois, les solutions open source manquent d’une véritable crédibilité et souffrent d’un déficit d’image auprès des utilisateurs finaux. Si bien que la question se pose : OpenSSL fait-il le poids face aux certificats émis par des autorités de certification (AC) reconnues ? Pour les applications commerciales et financières, la réponse est clairement « non ». Certes, l’utilisation de l’OpenSSL prend (surtout du point de vue financier)  tout son sens lorsque vous souhaitez créer et gérer votre propre certificat auto-signé pour un réseau interne. En revanche, si vous cherchez à instaurer une externe relation de confiance et à rassurer vos clients ou utilisateurs quant à votre dispositif de sécurité, il vous faudra prendre d’autres dispositions et surtout une certification reconnue.

Éditeur de solutions réputées dans le monde entier, Symantec a fait de la confiance son cœur de métier. Ses produits de sécurisation des sites Web intègrent une technologie SSL (et SSL EV) leader, ainsi que des fonctionnalités de gestion des certificats, de détection des vulnérabilités et d’analyse anti-malware. Avec Symantec, non seulement vous bénéficiez de nos savoir-faire en matière de sécurité, mais vous profitez également des faire-savoir que sont le sceau Norton Secured et la fonction Symantec Seal-in-Search. Résultat : vos clients se sentent en sécurité tout au long de leur expérience en ligne – des moteurs de recherche à l’acte d’achat, en passant par la navigation sur votre site.

Dans le monde de l’entreprise, il est d’usage de ne travailler qu’avec des personnes en qui vous avez totalement confiance. Dans l’univers de la sécurité en ligne, où les enjeux sont colossaux, ce précepte tient lieu de règle d’or.

Pour en savoir plus, téléchargez gratuitement notre document technique intitulé Les coûts cachés des certificats SSL autosignés

Self-Signed Certificates – How and When to Use Them | Symantec

How and when to use self-signed SSL Certificates
SSL – Secure Socket Layer – is a vital weapon in the armory of any organisation intent on ensuring its systems are safe. It is the standard behind ensuring secure communication on the Interne…