In light of the recent Flashback Trojan that infected an estimated 600,000 Mac users last month, industry experts are discussing Apple’s security. The perception has always been that Apple’s OS is more secure than Microsoft’s. This was led by the misconception that Apple computers could not be infected with viruses. Of course, this isn’t and never was true. But the idea that Apple is 10 years behind Microsoft in security is stretching things a bit. This item from The Verge lays the ground work:
A Flashback trojan, that affected more than 600,000 OS X users earlier this month, has industry experts discussing Apple’s response to Mac malware and its future prospects on security related issues. Eugene Kaspersky, CEO and co-founder of security company Kaspersky Lab, believes that Apple is “10 years behind Microsoft in terms of security.” Citing the relative success of the Flashback infections in an interview with CBR, Kaspersky predicts that cyber criminals will progress to create “more and more” malware in the future.
Kaspersky goes on to say that Apple will face the same problems that Microsoft did 10 or 12 years ago. I disagree. Here’s why (from the same article):
Mountain Lion, the company’s upcoming OS X operating system due in summer, includes a new Gatekeeper feature that, by default, restricts applications from running unless they are from the Mac App Store or identified developers. There is an optional switch to enable all apps again, but it’s clear this timely feature is designed to prevent malware from executing.
I’ll be watching this from the front row now that Casa Harthun is 3/5 Apple, and I’ll certainly keep you posted.
I sent this out to my entire staff at the school the other day after a staff member alerted me:
There is an email floating around that warns you to “Validate” an email account. The email is a phishing scam that attempts to get you to visit a form and input your email details including your password. If you receive an email similar to the one below, delete it immediately!
You have exceeded the limit of 23432 storage on your mailbox set by your WEBCTSERVICE/Administrator, and you will be having problems in sending and recieving mails Until You Re-Validate. To prevent this, please click on the link below to reset your account.
Failure to do this, will result in limited access to your mailbox Warning !!! Do not send your username and password via email.
Last week, I started to get emails in my Yahoo! mail, purportedly from Amazon.com, about a cancellation of my order. I figured these were bogus and confirmed this when my wife got identical emails. I decided to dig a bit deeper to see what they really were all about. Here’s a recent one:
Dear Customer, Your order has been successfully canceled. For your reference, here's a summary of your order: You just canceled order 111-219-44774 placed on May 5, 2012. Status: CANCELED _____________________________________________________________________ 1 "Araby"; 2003, Second Edition By: Rachel Armstrong Sold by: Amazon.com LLC _____________________________________________________________________ Thank you for visiting Amazon.com! --------------------------------------------------------------------- Amazon.com Earth's Biggest Selection http://www.amazon.com ---------------------------------------------------------------------
The order number and URL for Amazon both linked to a URL pointing to a Canadian drugstore site pitching those familiar male enhancement drugs. Here’s a partial screen shot:
Fortunately, there’s nothing malicious in this URL. It’s just scam drug spam. Put it where it belongs: in the trash.
WARNING: Adult (almost) content. I’m going to say nothing more about this, but you have to watch this video.
Have a great week!
From Wikipedia: “The IEEE-1394 interface, developed in late 1980s and early 1990s by Apple as FireWire, is a serial bus interface standard for high-speed communications and isochronous real-time data transfer. The 1394 interface is comparable with USB and often those two technologies are considered together, though USB has more market share.”
FireWire has some inherent security issues due its ability to communicate by direct memory access (DMA). In many implementations, this is done in hardware without direct operating system intervention which “can be a security or media rights-restriction risk if untrustworthy devices are attached to the bus.” What to do about it? From Wikipedia:
…high-security installations will typically either purchase newer machines which map a virtual memory space to the FireWire “Physical Memory Space” (such as a Power Mac G5, or any Sun workstation), disable relevant drivers at operating system level, disable the OHCI hardware mapping between FireWire and device memory, physically disable the entire FireWire interface, or opt not use FireWire hardware.
My simple take on it is that if you aren’t using it, disable it. Sure, a FireWire hack would require physical access to your system and isn’t a remote access threat. Nevertheless, it is a door and should be locked. You lock the doors to your house, don’t you?
Bruce Schneier is an internationally renowned security technologist and author. Described by The Economist as a “security guru,” he is best known as a refreshingly candid and lucid security critic and commentator. When people want to know how security really works, they turn to Schneier.
The man knows of which he speaks: in 1992, he developed the Blowfish encryption algorithm, a keyed, symmetric block cipher that is still in use today.
His first bestseller, Applied Cryptography, explained how the arcane science of secret codes actually works, and was described by Wired as “the book the National Security Agency wanted never to be published.”
So, if he says something isn’t right, I’m willing to listen. And he says that airline security isn’t right. He recently debated former TSA Administrator Kip Hawley on the “Economist” website. You can find the debate here.
In his latest issue of CRYPTO-GRAM, his monthly security newsletter (subscribe free here), he summarizes his position and points out what I consider illogic that pervades our entire government. Schneier is highly critical of the measures in place today and suggests that airports are effectively rights-free zones. I suggest that such things are reactions to irrational fear; perpetrated by insane men that would have us all believe that terrorists are waiting in every public venue to kill us all. That’s absolutely ridiculous. You don’t have to look into it very far to see:
Kip Hawley doesn’t argue with the specifics of my criticisms, but instead provides anecdotes and asks us to trust that airport security — and the Transportation Security Administration (TSA) in particular — knows what it’s doing.
He wants us to trust that a 400-ml bottle of liquid is dangerous, but transferring it to four 100-ml bottles magically makes it safe. He wants us to trust that the butter knives given to first-class passengers are nevertheless too dangerous to be taken through a security checkpoint. He wants us to trust the no-fly list: 21,000 people so dangerous they’re not allowed to fly, yet so innocent they can’t be arrested. He wants us to trust that the deployment of expensive full-body scanners has nothing to do with the fact that the former secretary of homeland security, Michael Chertoff, lobbies for one of the companies that makes them. He wants us to trust that there’s a reason to confiscate a cupcake (Las Vegas), a 3-inch plastic toy gun (London Gatwick), a purse with an embroidered gun on it (Norfolk, VA), a T-shirt with a picture of a gun on it (London Heathrow) and a plastic lightsaber that’s really a flashlight with a long cone on top (Dallas/Fort Worth).
His summary of the harms done post-9/11 by increased “security” measures is spot-on: “That we allow governments to do these things to us — to effectively do the terrorists’ job for them — is the greatest harm of all.”
“We have met the enemy and he is us.”
Fake antivirus, also known as scareware, rogue antivirus and scamware, is one of most common threats you will encounter on the web today. You’ve probably seen it before, and if you’re smart, you didn’t fall for the scam. The tactic this junk uses is to lure users to malicious sites and then scare them with fake threat warnings in an attempt to get them to pay for fake – and useless – threat removal tools.
Unfortunately the tactics these criminals use are highly effective against the average user who doesn’t know any better; this is why the scams are so prevalent – they make a tremendous amount of money for the criminals. For this reason, they are not going to go away any time soon and you need to know everything you can about how to keep this threat off of your network and away from your users.
Sophos has released a white paper entitled “Stopping Fake Antivirus: How to Keep Scareware off Your Network.” It contains a wealth of information and tips on how to combat this threat. I highly recommend your download and read it.
I immediately downloaded it and checked it out. I’m impressed. This will save me hours of work coming up with my own campaign and presentation for our employee Lunch-n-Learns.
One of the things I really like about this campaign is the each email tip links to a short video on the topic. Here’s the first one in the series, “Don’t Get Tricked:”
[kml_flashembed movie="http://www.youtube.com/v/rLO4EKvJbEM" width="425" height="350" wmode="transparent" /]
I highly recommend you check this out.
I love crossword puzzles. I’ve been doing them my whole life. My wife loves Sudoku puzzles. I can beat her any day at crossword; she slaughters me at Sudoku. This lead me to an interesting realization about passwords: People tend to remember things they have an affinity for. Corollary: People are competent using tools they understand.
So, using crossword as an example, why not use one as a password generation matrix? You could fill it in with random characters, or you could solve the puzzle (in pencil, of course) and then randomly substitute numerals, upper/lower case letters and symbols.
Take a highliter and mark off an 8, 10 or 12 character password. Make it 16 characters if that makes you feel better. When you are done using that password, mark it out in red ink and highlight another one. Use your imagination. Think. Get creative. Fill in those boxes with whatever comes to mind.
(Note: Someone recently told me that they had searched the web and found that I write a lot about passwords. I asked them if they had read any of the articles. They had not. I asked why. They told me that they had their own system and didn’t need to read about it. I asked them about their “system.” I won’t tell you what they told me. I write about this subject a lot in the hope that someday, maybe, someone will realize that passwords can be fun and will start doing fun things to generate secure passwords…)
A client called today saying that his remote login quit working on his laptop. When he would type in the URL of the Remote Web Workspace login for Microsoft Small Business Server 2011, he would get the dreaded “Internet Explorer cannot display the web page” message. I tried every suggestion that Microsoft had come up with:
- Delete browsing history
- Reset IE to defaults
- Edit two different registry keys
- Clear SSL cache
- Delete and re-add certificate
- Flush DNS
- Check HOSTS file
- Check DNS settings
- Disable Add-ons
- Set Advanced settings to prompt for any active content
Nothing worked. I even upgraded to IE9 and reset it. No joy there, either. So we got another fellow on the line from the company who had recently migrated my client’s server to the cloud to see if it could be related to going virtual. He basically ran down the list with me and verified that nothing worked.
We kept going back to Trusted Sites because, naturally, we want the lowest possible security settings so everything would be allowed. Logical, right? Well, forget logic. It doesn’t apply here (and sometimes doesn’t in things Microsoft).
We set up a Webex and the other tech started looking around. We went right back to Trusted Sites and looked. Everything looked right; so the tech deleted the URLs from the Trusted Sites list and voila! It was all good. Like I said, forget logic.
Sometimes you just have to do what seems the most counter-intuitive.