Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Monday, March 20, 2017

Lunch Talk: Jay Kaplan: Crowdsourcing Cybersecurity (at Stanford)

Entrepreneur Jay Kaplan, co-founder and CEO of Synack, describes how the idea of creating a cybersecurity service for enterprise businesses by crowdsourcing hackers went from sounding like a long shot to launching as a venture capital-backed startup. Kaplan, previously a senior analyst at the National Security Administration, talks about the virtues of government work and the nuances of “white hat” hacking.

Direct link to Youtube.


tags:network, security, enterprise, control

Thursday, November 06, 2014

The Internet of Things: malware threat to US energy infrastructure

Destructive "foreign" software is becoming a weapon of choice for covert international operations. For example, according to today's ABC report:


National Security sources told ABC News there is evidence that the malware was inserted by hackers believed to be sponsored by the Russian government, and is a very serious threat.

The hacked software is used to control complex industrial operations like oil and gas pipelines, power transmission grids, water distribution and filtration systems, wind turbines and even some nuclear plants. Shutting down or damaging any of these vital public utilities could severely impact hundreds of thousands of Americans.

In our book, Scalable Innovation, Chapter 3, we discuss in detail one of the system security inventions I made back in 2000, while at Philips Research. The invention, US Patent 7,092,861, aims to detect novel viruses that can target networked equipment in the home, office, or industrial cite (the patent is now owned by Facebook).


More than a decade ago, it was clear to us in the labs that the emerging Internet of Things creates new types of threats. Unless such threats are addressed through a broad, consistent industry and government efforts, our critical infrastructure will be highly vulnerable to vicious attacks that could dwarf in their destructive power the events of 9/11. Ideally, all existing industrial software has to be upgraded - a difficult, but essential task for the next two decades.

Thursday, August 07, 2014

Privacy is Dead, the Russian edition

The Russian Government has decreed that access to public Wi-Fi can be given only to those who submitted their passport data —name, address, DOB, etc. — to the service provider. The service provider is responsible for storing the personal information, including device identification and communications data, and forwarding it to the Russian Secret Service (FSB). 

Just imagine your local Starbucks or McDonalds tracking and recording their customers' personal info. That would be of great help to identity thieves. As if they need any.

tags: privacy, security

Thursday, January 30, 2014

Smartphone apps: mobile and insecure.

MIT Technology review writes:

A 2012 study of 13,500 Android apps by researchers in Germany found that only 0.8 percent used encrypted connections exclusively, and that 43 percent use no encryption at all. Last week mobile app security company MetaIntell reported that 92 percent of the 500 most popular Android applications communicated some data insecurely.

To move into the enterprise on scale, mobile devices and apps have to become secure. The same goes for mobile payments and NFC-based apps. Enhanced security requirements will demand more computing power, which many companies would not able to afford. As a result, secure cloud-based services will have an opportunity for long-term growth. Although before that, NSA surveylance issues have to be resolved, so that customers feel comfortable with having their vital data hosted externally.

tags: mobile, security, packaged, payload, control, business, enterprise

Wednesday, January 22, 2014

Facebook patents secure upgrade of a wireless mobile device.

Facebook got a nice patent (US 8,631,239) that covers a secure software upgrade of a wireless mobile device. According to the specification, the system uses a public key to authenticate the software delivered over the air (OTA).


Wireless connections are notoriously unsafe and prone to hacker interception. The Facebook solution enables a service provider to perform a reliable upgrade over an unreliable channel. It's highly likely that in the future most software upgrades, especially in the enterprise environment, will be done using this approach - simple and powerful!

Unfortunately,  the patent itself has an important flaw: it does not define the term "endpoint", which figures prominently in claim 1. Moreover, in Fig 1B it uses a different term "System Front End (120)."


As I noted several times before, the company's quality control over their patenting process seems to be spotty, at best. A simple document search would allow them to spot and fix the definition problem.
1. A method comprising, by one or more computing systems: executing software from a first partition of system memory; requesting an over-the-air (OTA) software update from an endpoint; receiving a manifest for the OTA update; downloading a payload pursuant to the manifest; installing the payload into a second partition of system memory; and rebooting, pursuant to the manifest, to the second partition of system memory, wherein rebooting to the second partition of system memory comprises authenticating a bootloader signature with a bootloader public key.
Brief system analysis: the manifest represents the "Aboutness"; encrypted software update - Packaged Payload; device  - Tool; a process that runs on the device to verify authenticity - Control; endpoint - Source; over-the-air channel - Distribution. Overall, it's a textbook example of system composition (Scalable Innovation, Chapter 2). To solve the problem, the inventors use Separation in Space - one of the key TRIZ principles.

Model-wise, it is quite similar to my patent US 7,529,806. They have a different payload, but the aboutness is managed and created for the same purpose. I should use the Facebook patent as a system analysis homework assignment in BUS 74 this summer.

In view of the Nortel patent and invention principles listed above, the Facebook patent can be attacked as "obvious."

tags: patent, invention, innovation, security, mobile, enterprise, system, model, aboutness

Monday, December 30, 2013

Cloud security: a new kind of an arms race in 2014

To me, the most interesting high-tech trend to watch in 2014 will be the competition between US government agencies, e.g. NSA, and US private high-tech companies, e.g. Google, Facebook, and others. Given the recent court decision, we can easily predict that the US government will continue intercepting, storing, and decrypting private and commercial electronic traffic. On the other hand, cloud companies like Google built their business on user trust and data security. They've already started the process of rethinking system security, including broad use of strong encryption algorithms.

An implicit assumption in the industry is that if the government can break into your data then any skilled hacker can do the same. In short, the deliberate weakening of security standards creates a direct threat to commercial cloud computing. As a result, we should see an arms race between the government and businesses in the area of digital security. Before, arms races were an exclusive domain of rival governments. Today, the global nature of the Internet brings a new category of players into the picture. We should expect exciting innovations ahead. Maybe even quantum computing will become a reality sooner, rather than later.


tags: innovation, internet, cloud, security, battle

Friday, October 11, 2013

Lunch Talk: TEDx, the battle for power on the Internet.

Bruce Schneier talks about the problem of control over data on the Internet.



In chapter 22 ("Seeing the Invisible: The System behind the New Internet") of our favorite book, we discuss the mechanism of Control that Internet users delegated to private companies in return for subsidized devices and services. Essentially, the users traded their long-term digital futures for short-term economic and status gains. In economics, it is called Future Discounting. Paradoxically, the original idea that on the web everything is free AND there are no strings attached to the content turned into a familiar trade-off: "free stuff with lots of strings attached." As usual, a recipe for success became a recipe for disaster.

Thursday, January 31, 2013

e-mail is a security black hole.


(NYT. Jan 31, 2013) SAN FRANCISCO — For the last four months, Chinese hackers have persistently attacked The New York Times, infiltrating its computer systems and getting passwords for its reporters and other employees. 
Security experts found evidence that the hackers stole the corporate passwords for every Times employee and used those to gain access to the personal computers of 53 employees, most of them outside The Times’s newsroom.
Over the course of three months, attackers installed 45 pieces of custom malware. The Times — which uses antivirus products made by Symantec — found only one instance in which Symantec identified an attacker’s software as malicious and quarantined it, according to Mandiant.

E-mail is a mature technology where bugs and security holes were all supposed to be extinguished. If e-mail servers at a major news institution cannot be protected from outside intruders, the situation with thousands of mobile apps is probably much worse.
The effectiveness of anti-virus software is quite pathetic - 44 our 45 malware pieces not detected.

tags: security, internet, control, mobile, communications


Sunday, September 09, 2012

A total war, the 21st century edition.

A white paper from Symantec (h/t CNet) details an ongoing large-scale e-spionage effort they call "The Elderwood Project." The company researchers believe that the same group, which (successfully) attacked Google through its China offices in 2009, is behind the current attacks,
The scale of the attacks, in terms of the number of victims and the duration of the attacks, are another indication of the resources available to the attackers. Victims are attacked, not for petty crime or theft, but for the wholesale gathering of intelligence and intellectual property. The resources required to identify and acquire useful information—let alone analyze that information—could only be provided by a large criminal organization, attackers supported by a nation state, or a nation state itself.


The report describes a specific technique they call "watering hole," when the attacker infects a target site and waits, as if in an ambush, until target users access the site.

Saturday, July 28, 2012

Lunch Talk: (@TED) All Your Devices Can Be Hacked.

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi's primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a book on his experiences since this event.


tags: lunchtalk, control, security, network

Saturday, June 23, 2012

The new level of sophistication in cyber attacks.

June 23, 2012. VBeat:

Security firm ESET discovered the malware, now called ACAD/Medre.A, around February and noted it was “military-grade.” The worm attacks AutoCad, a popular piece of software used by architects and engineers to draw up blue prints and other infrastructure plans. It targets computers running the Windows operating system to steal and e-mail out AutoCad “drawings.” These drawings are then received by an e-mail that ESET found to be based in China.

Industrial cyber-espionage is now entering the Efficiency stage. Malware makers know exactly what, when, and why they want to steal.

tags: s-curve, system, maturity, efficiency, control, detection, security, business

Saturday, June 02, 2012

LunchTalk: Dr. Regina Dugan, DARPA Cyber Colloquium

During the Colloquium, more than 700 cyber experts from industry, academia and the hacker community learned how since 2009, DARPA has been steadily increasing its cyber research. Its budget submission for fiscal year 2012 increased cyber research funding by $88M. Over the next five years, the Agency's proposed cyber research investment expects to grow from 8 to 12 percent of its top line. These investments are shifting to activities that promise more convergence with the threat and recognize the unique needs of DoD. Dugan explained, "in the coming years DARPA will focus an increasing portion of its cyber research on the investigation of offensive capabilities to address military-specific needs."

link

- More video is uploaded in 60 days that's been created in 60 years by 3 major US TV networks combined.
- 29 chemical companies were subjects of computer attacks to extract data on formulas and manufacturing processes.
- in 2004 proceeds from cyber crime exceeded proceeds from selling drugs.

tags: lunchtalk, quote, security, growth,s-curve



Monday, February 06, 2012

Internet cloud is becoming a utility.

Nocira, a startup founded by Martin Casado and Nick McKeown from Stanford University and Scott Shenker from University of California at Berkeley, is pushing for complete virtualization of network services.
Feb 5, 2012. VBeat -- It’s a new version of virtualization, but one for the whole network. With virtualizaiton software like VMware, a single computer can use translation software to behave as if it were dozens of different computers at once. Each “virtual machine” is a compartment within the computer that serves a particular user. But since that user isn’t using the computer, the computer can be rededicated to serve other users. It’s a more efficient way to use computers and serve users. The virtual machines can be created as needed to serve the demands of users within minutes.

Nocira's patent application Method and Apparatus for Implementing and Managing Virtual Switches  shows a translation layer sitting between user-level services and cloud hardware. When implemented, this should increase demand for computing power and memory inside the switching fabric. 

tags: cloud, networking, distribution, security

Wednesday, February 01, 2012

LunchTalk: (TED) Global Crime Networks

Journalist Misha Glenny spent several years in a courageous investigation of organized crime networks worldwide, which have grown to an estimated 15% of the global economy. From the Russian mafia, to giant drug cartels, his sources include not just intelligence and law enforcement officials but criminal insiders.

link

tags: lunchtalk, security, control, networking

Monday, January 30, 2012

Solera - another player in cloud security.

Solera Networks, a startup focused on real-time traffic analysis, got $20M from Intel Capital.
January 30, 2012. VBeat -- When hackers strike at company web sites, there is often no easy way to figure out what happened. Solera helps companies reconstruct exactly what transpired. The value of that data is often critical to figuring out who did it, much like the evidence found at a crime scene is often most critical in the first 48 hours. It’s important that network forensics be done instantaneously to give companies the best situational awareness possible.
In 2010, Intel acquired McAfee for $7.6B to beef up its offering of security software and services. Compared to that, the Solera investment looks like small potatoes, but it shows the general drive toward a more secure cloud. The web as we know it is dying, while mobile real-time networking proliferates. The demand for security in this new environment is going to be orders of magnitude greater than during the heydays of web.

tags: control, system, evolution, detection, security, internet, information, payload

Thursday, December 22, 2011

What's good for the Internet is good for spies.

These days, keeping a secret is almost impossible; almost being the key word here. And some people are willing to spend good money on playing the spy game on the Internet.
Dec. 22 (Bloomberg) -- Business is booming, with annual revenue of $3 billion to $5 billion growing as much as 20 percent a year, ISS organizer Jerry Lucas estimates. 

Back at the hotel, the night is young and the paranoia is deep.

Unlike typical trade shows, this one has no social events. No corporate-sponsored cocktail parties. No hospitality suites. Clients and suppliers don’t want to be seen with each other in public, and some countries bar their agents from mingling at the event because it’s a recruiting ground for spies seeking sources, organizer Lucas says.
Quantum computing, if it ever comes to a reasonable implementation, is going to be a game changer in this market. Maybe it already is.

Saturday, December 17, 2011

The latest numbers in the browser war of attrition.

Dec 16, 2011. CNet - ... numbers still show all versions of IE taking a total of 40.09 percent of the market, vs. 26.31 percent for all versions of Chrome. Firefox is at 25.07 percent, Apple's Safari is at 5.86 percent, and Opera gets 1.91 percent.

Today, browsers not only generate searches for Google and Microsoft, but, more importantly, track user online behavior.  We trust them with our passwords, messages, information habits, and much more. This intimate knowledge of users makes the internet giants fight the war of attrition over who is going to provide you with free software. It's scary even to think about how much the browser knows about you.

tags: security, privacy, battle

Thursday, December 15, 2011

Stealth drones: no longer invisible.

Communications security remains the weakest link in the new world of information gathering. 

(December 15, 2011. VBeat) - The US drone, which veered off course and landed in Iran, is said to have be hacked using a GPS spoofing attack.

Compromising the GPS system allowed the drone to “land on its own where we wanted it to, without having to crack the remote-control signals and communications,” the Iranian engineer told the Christian Science Monitor. This hid the operation from US engineers controlling the drone. At first, the unplanned landing was said to be the drone simply “veering off course” and flying into Iran


According to the engineer, the GPS system is one of the easiest to manipulate, making it a huge vulnerability that the United States was already aware of.

As I wrote before, avoiding radars with stealth technology is an old battle. The new battle is making communications secure and/or undetectable to the enemy.

tag: drone, control, security, military

Friday, December 02, 2011

Lunch Talk. Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon.



When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.

Wednesday, October 26, 2011

The 21st century Facebook Utopia.

Can you imagine a country of 800 million people successfully policed by just some 30 of them? No courts, no jails, no lawyers involved. For comparison, the United Nations recommends a minimum police strength of 222 per 100,000 people.
(26 October 2011. New Scientist. )Known as the Facebook Immune System (FIS), the massive defense network appears to be successful: numbers released by the company this week show that less than 1 per cent of users experience spam.
The system is overseen by a team of 30 people, but it can learn in real time and is able to take action without checking with a human supervisor.
It took just three years for FIS to evolve from basic beginnings into an all-seeing set of algorithms that monitors every photo posted to the network, every status update– indeed, every click made by every one of the 800 million users. There are more than 25 billion of these "read and write actions" every day. At peak activity the system checks 650,000 actions a second.
The only network bigger, Larus suspects, is the web itself. That makes Facebook's defense system one of the largest in existence.
 The efficiencies of the virtual world are totally unprecedented in human history. The Matrix is turning out to be a very cool place.

tags: virtual, synthesis, infrastructure, control, security, facebook,10x