tssci security

Pondering over the iPhone

|thumb_img_2472.jpg|I passed up a chance to get an iPhone last week because I couldn't spare the time to wait in line for it. I was headed to New Hampshire to stay up at Lake Winnipesaukee with some friends and watch the NASCAR Modified, Busch, and Nextel Cup races at NHIS in Loudon.

During our long drive, I started asking myself questions about the iPhone in regards to security and the concerns I have with it and other "smart" phones. Below were just a bunch of the questions I had, and is by no means comprehensive. Most could or have probably already been answered, but here goes anyway.

Wireless

Encryption

Authentication

Security

Tracking

Applications

Services

Hardware

Attack Vectors

Suggested reading this week

I've been real busy lately, but I came across several blogs and articles this week that I'd like to share, Andrew Hay style. =)

CEO Crime & Punishment -- Ben Horowitz, CEO of Opsware Inc., shares his thoughts on what entices executives to commit white collar crime. Is it for money? Or is there some other reason?

Warren Buffet once said that "marrying for the money probably isn't a good idea in any case, but if you are already rich, it makes no sense at all." The variation that applies to CEOs is "robbing investors probably isn't a good idea in any case, but if you are already rich, it makes no sense at all."

The Mainframe Conundrum -- There are many systems that power our economy, our infrastructure, and life on Earth -- mainframes, that are powered by COBOL, IBM Assembly, and others that also empower security mechanisms like RACF that researchers in the security community seem to have skipped. I've thought about the state of mainframe security and other critical systems, and it could be scary. I know machines that cannot accept a password longer than 8 alphanumeric characters, that power entire businesses. The amount of people who are skilled in systems like VAX/VMS, TPF, z/OS is dwindling... Who will review the critical applications that run on them?

Most large organizations have a 30-40 year investment in their applications and they're not going to re-write in a Johnny come lately language like Java or C# just because we can't review old code. There are literally billions of lines of COBOL out there, and it ... runs the world. There should and MUST be a way we can review this code.

Analyzing the Facebook Platform, three weeks in -- Marc Andreessen comments on the succesful launch of the Facebook API, that allows developers to create applications that add functionality to Facebook, but doesn't replace it. In it, he brings up the account of one successful application that took off in a viral sense, originally being hosted on two servers, now requires a couple hundred to keep up with the load users have put on it. "Success kills" is one way of looking at it. The developers of Facebook surely put a lot of time and effort into the design of the system. We'll see soon enough how the API stands up security-wise and the applications people write.

Maryland Professor Creates Desktop Supercomputer Prototype -- Uzi Vishkin, with the help of his students has created a prototype that utilizes 64 processors working in parallel, and is hundreds of times faster in some cases than modern desktop computers. I look forward to the advancements they make in this sector.

Red Hat Linux gets Top Government Security Rating -- Another Slashdot posting, I know, but the comments are worth reading. There's a lot that I forgot about or didn't know regarding the multitude of ratings various agencies can award systems that meet specified criteria. After reading the comments, I flipped through the Orange Book to refresh my memory. It's old, but still good!

Blog post to watch:

Joanna: We Can Detect Bluepill. Let Us Prove It! and We're ready for the Ptacek's challenge! -- I'm a huge fan of the research both Joanna Rutkowska and the guys over at Matasano have put out. Things will definitely get interesting as Black Hat nears... exciting :D

Got pwned today

Several people in the corporate IT security group where I'm interning this summer have been working hard on creating a program to educate users on the company's acceptable use policies and some basic security awareness. They've done a great job and the stuff they came up with looks top notch. During lunch they're out talking to other employees, answering their questions and even handing out nice Kingston DataTraveler Secure Privacy edition usb thumb drives. (too bad they only work on Windows, anyone get them running in Linux??)

Anyways, back to me getting owned... One of the other interns I work with asked me to go print something off for her because she was busy answering questions and things like that. At first I was a bit hesistant, not knowing what exactly I was going to print. I was going back to my desk anyways, but she told me I could print it from one of the computers at the table not too far away. I assumed she didn't have a printer set up there or something. Sure enough, I plug the usb drive she gave me and up comes the "meltdown" program, which makes the screen look all mushy. Had I taken it to my desk, I would have been safer because Autorun was disabled, but still... that was embarrassing.

Yup... If you haven't noticed by now, women have no problems social engineering men.

We'll revoke your blogging privileges

If you have too many tags, scripts, ads, etc on your site. Thanks to Tyler for saying what we've all been wanting to say.

Just look at this.

SSN misuses

These two stories are interesting.. I wonder if Adam from Emergent Chaos has seen them:

The most misused SSN of all time was (078-05-1120). In 1938, wallet manufacturer the E. H. Ferree company in Lockport, New York decided to promote its product by showing how a Social Security card would fit into its wallets. A sample card, used for display purposes, was inserted in each wallet. Company Vice President and Treasurer Douglas Patterson thought it would be a clever idea to use the actual SSN of his secretary, Mrs. Hilda Schrader Whitcher.

« Newer entries — 31 — Older entries »

blog comments powered by Disqus