Favorite security stories of the week

I curate the Dice Security Community. Here are my top ten stories from various security sources from around the Interwebs:

Why your small business needs a better firewall

When I set out to test a collection of new small business firewalls for Network World, I wanted to find a place that could illustrate their need. I was fortunate to find Mercury Labs, which despite their name is a video production and public relations company of about 10 people located in midtown St. Louis, not far away from my office. Over the course of a couple of weeks, I brought in several different unified threat management boxes to try out, including Check Point Software’s 640, Dell/Sonicwall’s NSA250MW, Elitecore Technologies’ Cyberoam CR35iNG, Fortinet’s FortiGate 100-D, Juniper Networks’ SSRX220H-POE, Kerio Technologies’ Control 1100, Sophos/Astaro’s UTM 220, and Watchguard Technolgies’ XTM330.

Mercury was instructive because before I got there, they didn’t really have a lot of protection on their Internet connection: the only device connected to their cable modem was an Apple Airport. Relying on NAT does not a firewall make. Over the course of my tests, they were intrigued to see the consistent number of attacks coming across the big bad Internet as we could capture them in real time. Think of a sewer line that is encased in clear plastic so you can see the flow of filth.

Several of the vendors sent in their techs to help me with the tests, something that I always welcome because we always find bugs in any product. In fact we found a killer bug in the top-rated product from Check Point. The tech was making some frantic calls back to his developers in Israel where they quickly found and fixed the bug and sent us the new firmware.

Small businesses have lots of choices when it comes to protecting their network. You can buy a home router for less than $50 from any number of consumer networking vendors, or you can spend more than $4,000 for one of the more than a dozen firewalls from the enterprise security vendors. The UTM products lie in between those price points.

The UTM products include more than just a firewall: there is intrusion detection and prevention, network-based anti-virus and anti-spam screening, virtual private network connections (VPNs), and content filtering on outbound Web browsing to prevent phishing and browser-based attacks.

I liked the Check Point UTM because it had a nice balance of simplicity and power, and it was also the cheapest of the boxes that I tested. It worked well on the mostly Mac network at Mercury, something not all of its competitors could claim. You can see a sample screen from Check Point’s box below.

chkpt dash

You can see lots more screencaps here. And you can read my review in Network World here.

My thoughts on the NSA leaks

Like many of you, I have been reading and watching a lot about the latest leaks about the NSA Prism program. It has been a fascinating weekend. I want to share with you some of my own sources if you want to learn more about what is going on, apart from the sensational news headlines.

Coincidentally, last week I finished reading Andy Greenberg’s excellent book, This Machine Kills Secrets. Greenberg is a reporter for Forbes and the book covers the rise and fall of Wikileaks over the past several years. Some of this information is also presented in another excellent work, the documentary film “We Steal Secrets” by Alex Gibney (you can watch it on Amazon here). Both the book and the movie bring up all sorts of ironies about the conduct of Manning, Assange, and Lamo. The movie draws heavily on AIM chat logs.

Fortunately, we have this exceptional 12 minute video interview of Edward Snowden, the NSA leaker. It is well worth your time to watch. He raises some interesting points about his motivations and worldview.

More coincidence: Manning’s trial started last week, and the daily transcripts are available here.

I have a small personal connection: I first began corresponding with Lamo many years ago, and then actually met him when he crashed on my sofa in 2002. He is a curious character (you can read my thoughts about him in one of my Web Informant columns here), and obviously conflicted about his decision to turn in Manning. This topic and other things are captured in a recorded audio interview I did with him two years ago for ReadWrite (the article is here and I have uploaded the mp3 recording here).

So what is really possible about this NSA program? Your first stop should be a blog post by Alex Stamos, the CTO of Artemis Internet. He has an interesting taxonomy of the various possibilities of what Prism can’t or can do, based on the various conflicting statements from government and computer industry principals. It is well worth reading.

Robert Graham’s excellent Errata Security blog has some interesting comments also about the various claims and counter-claims. Many years ago he wrote a piece of software that demonstrates how the government can listen to Internet traffic. He says, “The PRISM program isn’t all that we fear, but more than we find tolerable.”

He also suggests that we ask questions of the major computer software vendors, such as “Have you changed what user information you log at the request of law enforcement?” I would welcome that dialog and clarification.

In another post where he talks about the responsibilities of the NSA, Graham states, “The IRS hires people with high-school diplomas, the NSA hires Ph.D.s with military service.” He claims that the lowly NSA staffer is very scrupulous about their mission.

To get an idea of what is possible, you should check out a story Wired magazine ran last year about the NSA’s new and as yet incomplete data center south of Salt Lake City.

Finally, you should also follow what Bruce Schneier is posting. He is always a thoughtful and insightful security analyst, and in this post he writes about the need for whistleblowers to force our governments to be open and to keep abuses under control. He also has a long list of questions that he’d like to have answers to, and how much we really don’t know.

Is Prism one of those abuses of power? Maybe, and maybe we will never find out really what it does.

ITworld: Keep bad guys off your network by finding out where they live

The time is ripe to get started using location-based services in your enterprise. No matter that you have Foursquare check in fatigue: this is a different aspect, and something that is useful and worth the time and has direct business benefit. More businesses are using location services such as geofencing, or the ability to set particular geographic limits around a group of IP addresses or GPS coordinates, to focus their marketing efforts and better secure their networks. Using location services can help you do your job better and cut your company’s overhead without spending a lot of additional capital.

 

There are a lot of great case studies of the benefits of geofencing: Applebee’s and Outback Steakhouse restaurant chains are using it to more closely target their advertising messages and have seen an increase in customers. Shopping malls are producing display ads that eerily mimic those found in “Minority Report” that recognize you as you walk by. And many network administrators are finding that location services keeps the bad guys out of their networks, at least for the moment.

 

The vendors of typical IT products such as firewalls and intrusion detection appliances in most cases already include location services in their products. They make use of one of the third-party geofencing service providers to build in this feature into their products. You should take some time to understand the concept and make it an important part of your arsenal.

 

Why? Several reasons. First, geofencing can help you better understand who is coming to visit your corporate website and help you improve your content to match particular audiences, or customize your pages to particular locations. It can also be used to identify your potential threats or particular network traffic patterns that would otherwise be lost in a sea of terse log entries. They can produce powerful visualizations that can be used to illustrate top network bottlenecks, or where you need to add bandwidth to deal with network slowdowns. Geolocation services can help you track down the origin of email spam of particularly egregious offenders. And they are a helpful way to isolate particular customers or see which locations need additional marketing or sales resources too.

 

The technology does have one drawback, however: the location accuracy isn’t perfect, although the geolocation databases have improved over the past few years to be able to more closely map IP addresses to particular ZIP codes or specific locations. And in some situations, you will be overwhelmed with data whether you display it on a map or review it in a log file. Nevertheless, they do provide a good first cut at seeing what is going on in a number of situations.

 

Perhaps no better illustration of the power of geofencing and data visualization is that of crime mapping. When you see a crime map, it is abundantly clear what is going in your neighborhood: where are the break-ins and assaults, how close are they to your particular home, and other information. If you had the list of crimes in a tabular form it would take you a lot longer to understand what is going on.

The crime maps have spawned an entire new collection of civic hacking activities called crowdmapping where communities have taken public data and produced a series of powerful visualizations such as locations of street closures, public amenities, and emergency shelters.

 

But how can you track down crimes (or at least questionable activities) committed on your own network? Let’s first look at your website traffic. There are several public geolocation services, such as Geobytes and IP2Location, that can be added to Web servers to translate the IP addresses in your server logs into actionable location information. They make use of various domain registration information, reverse DNS lookups, and some intelligence about the particular Internet service provider that routes traffic to those addresses. Both services have documented APIs that can be used to work programmatically with a number of different Web languages, including Perl, Ruby and Php.

 

This is a good start, but what about something that you already are using, such as your network firewalls? Many of them, including Cisco’s ASA, Checkpoint Software and Palo Alto Networks, have integrated geofencing services. When you set up their firewall rules, you can exclude or monitor traffic based on the country of origin. This can be helpful if you examine your firewall logs and see unexpected and unwanted traffic, such as exploits, coming from these countries. For example, let’s say you are prohibited by law from doing business in certain export-controlled countries such as Cuba or North Korea. Wouldn’t you like to know if your staff is handling support requests from Cubans? This could be a good indication that your products are entering those countries through grey markets. That is where some geofencing work could be handy. Set up a firewall rule to report on these activities and you can easily find out.

 

Some of the firewall vendors have taken this a step further. They have integrated the geofencing with their own reputation management systems so they can tie in their protection and identify particular domains that are known to send malware or to be able to locate where lots of exploits originate. Here is an example using the McAfee Firewall and its TrustedSource.org reputation management service. You can select particular countries to deny or allow traffic, using a simple series of menus. McAfee comes with some preset groups, such as countries with US export controls.

With another security product, you can actually visualize one of your network attacks as the packets move across the planet from router to router and country to country. This is a feature found in Solera Networks DeepSee intrusion protection system, and they can take packet capture files from their system. When you bring up Google Earth, you see the routes moving back and forth. You can identify unusual traffic patterns and flag suspicious traffic from specific locations and then export them as Google Earth KML files.

 

In addition to the analytical value, this feature also can be impressive if you need to play the KML visualization for your management and show them how global the threats to your network might be. But network security isn’t the only collection of products that takes advantage of geofencing. Many of the dozens of social media network monitoring tools also come with this feature, which again can be used for visualizing trends in your Tweets or being able to watch for particular customer Facebook interactions paired with individual retail locations, for example. Again, these tools integrate the geofencing feature and allow you to use location as another filter to examine the collection of social media posts, just as you would use keyword searches or time of day filters in these products.

 

Many of the social media monitoring tools have this feature, including Expion, Simply Measured, Visible Technologies and Ubervu, just to name a few. Tracx takes this a step further. They have this neat heat map showing you the geolocation of the posts that you are analyzing, and how they are concentrated in particular areas. Again, this is useful for spotting trends or to track down particular groups of your customers that may have had a superior or inferior experience at one of your retail locations.

As you can see, it is time to take another look at geolocation services. Location is a lot more than a bunch of Foursquare check ins. It can be handy in a number of circumstances and help you be more effective at doing your job.

Favorite security stories of the week

Here are links to some of the more interesting security stories that I found around the Web. check out my Dice Security Talent Community for other links to important security resources.

1: Are Businesses Knowingly Infecting Their Web Visitors? (Dark Reading)

2: NetTraveler Cyber-Spying Campaign Swiped Data for Years(eWeek)

3:Botnets now routinely using P2P to evade detection, says Damballla (Techworld)

4: Maine may be first state to require a warrant for cellphone tracking (Network World)

5: Google’s certificate announcement contains a hidden surprise for Windows XP users (Sophs Naked Security)

6: How to secure your Facebook profile (Trend Micro Blog)

7: LinkedIn, Evernote Add Two-Factor Authentication (Information Week)

8: The secret to online safety: Lies, random characters, and a password manager (Ars Technica)

9: Google and the Zero-Day Conundrum (Fortinet Blog)

10: Get Set Null Java Security (FireEye Blog)

TakeDownCon worth attending

aaaaNationally-know security researchers and white-hat hackers came to the
Ameristar conference center outside of St. Louis this week as part of the first
TakeDownCon” conference, organized by computer security firm
Parameter Security along with Hacker U and EC-Council.org. I attended part of the first of
a two day event, along with about 200 others from around the region.
EC-Council and Hacker U both offer a large selection of security courses.

The conference included a keynote from Charlie Miller, who now works
for Twitter in their security department, talking about what he did to
hack near field communications (NFC) on two different smartphones.
Miller, who lives in the St. Louis area, has been known for his
exploits of the Mac OS and iOS and was probably the most engaging
speaker of the day. He showed us that hacking is a lot of preparation
and understanding the entire NFC protocol stack and how a phone
interacts with the radio tags and signals. The exploit also
demonstrated that even for a communications method that has relatively
low bandwidth of just a few hundred kilobits, it is possible to find a
way to control a phone’s Web browser by focusing on the interactions
of this protocol with the rest of the phone’s software.

Another presentation was from a very young Georgia Weidman who now has
her own firm Bulb Security. She was working for Neohaphsis but decided
to leave when she recently won a DARPA grant to build a new hacking
tool that she calls SPF for Smartphone Pentest Framework. This allows you to exploit smartphones that have been jailbroken by downloading special hacking code without the
phone owner’s knowledge, showing how a Bring Your Own Device policy
can backfire without proper controls.

Salvador Grec from NoVA Infosec spoke about the process he goes
through to analyze malware and presented dozens of different tools
that he uses to understand how malware operates to infect and take
over computer networks.

TakeDownCon was a solid collection of content and speakers and well
attended. You might want to put it on your calendar for next year.

Time to use two factor authentication

Last week Twitter became the latest to adopt additional security measures to protect logins using a second authentication factor, joining Apple iTunes, Google Apps, Facebook and others. The idea is to join something that you know, such as a password (that is often and unfortunately shared among other Web services) with something that only you have, such as your cellphone number or an app that runs on your phone.

It wasn’t all that long ago that the small “tokens” the size of key fobs were the sole method that could be used to protect logins. These devices generated a one-time password code that changed every 30 seconds or so automatically, and when you logged into one of your accounts you had to type in the right code that was shown on the device. But toting tokens is too much trouble: they get lost or you leave them at home when you need them elsewhere. A much better solution is to use your phone to generate these one-time codes. So I recently looked at several two factor security tools for a review that was published in Network World. These are tools that are used by enterprises to protect their entire collection of logins to a diverse set of applications, such as internal websites, client/server databases and Web apps. Of the eight tools, SecureAuth’s IdP came out on tops.

safenet token assortmentIn my review I looked at how easy it was to provision new users, what kind of apps you can protect with the tool, and what kinds of protective measures you can deploy for the additional authentication steps. There are many different kinds of tokens (as you can see from the picture above from SafeNet, one of the products that I tested), apart from the traditional key fob type: you can use SMS messages (which is what Twitter and Google use), you can download a special smartphone app that creates the one-time codes, you can use actual voice calls or send emails.

None of these tools are simple for an IT staff to setup, however. They have lots of moving parts and require security specialists from different parts of the IT infrastructure to coordinate their efforts.

The Twitter two factor authentication (they call it account verification)  is somewhat confusing: you have to go to Account, then check the box on Account Security to enable it. Then you have to ensure that your email address and phone numbers are added to your account.

Part of the bigger problem — not just for Twitter — is that all Web services vendors slipstream in their two factor authentication feature without you necessarily knowing about it. If you haven’t kept up with the vendor’s blog or if the feature hasn’t been widely reported, you don’t know it has been added. For example, Google added two factor to its Gmail accounts several years ago, but not initially to its hosted email accounts. Unless you are ultra paranoid or a security geek, chances are you don’t know about the feature.

Another part of the problem is that frankly, providing the second factor is annoying, an extra step to keep your account secure. Chances are that you won’t be very motivated to use it, unless your account has been compromised in the past, say the recent past. (See the use case of people doing backups after they lose their hard drives.) This is where the two factor tools that I reviewed come in handy: if your company has deployed one of these, it actually can making logging into your accounts easier rather than harder, using a single sign-on to authenticate you to multiple accounts. SecureAuth and Okta come out near the top in this area too.

Given the numerous and now infamous Twitter account compromises over the past couple of years, I am glad to see them deploy two factor authentication.While many of these could still have happened with the additional authentication, they are a good thing to deploy and if you have a corporate Twitter account, you should set this up soon. And if you haven’t yet set it up on your other Web accounts, take some time this week to do so.

Top 9 favorite security stories this week

I curate the security discussions page for Dice here, and each week choose my favorite security stories. Here is the current week’s list.

 

1. Even SMBs Should Look To Log Management For Security (Dark Reading)

2. Researchers Use Weezer Tune To Knock Defibrillators Offline (Security Ledger)

3. Cyber-Spying Campaign Traced Back to India (eWeek)

4. Twitter aims to become safer with two-step sign-in (Techworld)

5. Smartphones take center stage in two-factor authentication schemes (Network World)

6. NYPD detective charged with hiring email hackers to break into colleagues’ personal accounts (Sophos)

7. Dropbox Adopts Single Sign-On Technology (information Week)

8. Ready for Summer: The Sunshop Campaign (FireEye)

9. CMS Hacking in the EU (Imperva)

 

Network World: Secure Auth Tops in Two-Factor Tokens

SecureAuth options2We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install. That’s where two-factor authentication services come into play. I recently reviewed eight such tools, including Celestix’s HOTPin, Microsoft’s PhoneFactor, RSA’s Authentication Manager, SafeNet’s Authentication Service, SecureAuth’s IdP, Symantec’s Validation and ID Protection Ser- vice (VIP), TextPower’s TextKey and Vasco’s Identikey Authentication Server. SecureAuth (illustrated) came out on top.

You can read my review in Network World here.

You can download the various screenshots here.

And you can follow the Twitter handles of the various vendors here.

ITworld: Some quirky tech conferences worth attending

If you don’t want to go to Vegas for one of the mega-shows by IBM, Symantec, CA and whatnot, then perhaps you should consider one or more of the shows that I chronicle in my latest piece for ITworld. I tried to find conferences that you can actually learn something, and are small enough not to be overwhelming where you can spend some time meeting new people too.

You can read my article here.