SQL injection insecurities: RIAA

As I was reading Digg early this morning, I stumbled upon this story that many SQL injection opportunities were uncovered by people hoping to defame the site. Through a simple query to drop entries or the tables themselves, the database was cleared of all custom data, leaving many of the pages on riaa.com devoid of any content. In addition, some variables in the php pages could be exploited to show custom content on the respective pages.

Continue reading

Posted in Current Events, Integrity | Comments Off on SQL injection insecurities: RIAA

Polish teen uses TV remote to derail trains

Covered on The Register, Telegraph.co.uk, and Slashdot.

Earlier this month, a 14-year-old in Poland used a modified TV remote control to directly interfere with rail junction controls in the city of Lodz. He obtained information on the operation of the junctions by trespassing in several train depots. In the end, he used his train remote to alter the switchings on several moving trams, causing some to derail and resulting in numerous passengers receiving minor injuries. The boy has been charged in juvenile court with endangering the public.

The youth’s particular attack on the system was made possible by the use of infrared signals to control track switches, which left them open to outside interference. Additionally, the lack of property security at railway depots allowed the attacker to obtain information about exactly how the switches interpreted their signals, rendering possible the direct manipulation of the switches. Continue reading

Posted in Current Events, Miscellaneous, Physical Security, Policy | Comments Off on Polish teen uses TV remote to derail trains

Shopping Cart for speedy check-out and advertisement

SummaryIn the future, a shopping cart may no longer be just an ordinary shopping cart. It can also be an outlet for advertisement, check-out, and many more. Using the shopping cart, customer can view today’s deal, products’ advertisements, on-sale items, and pay items at the same time without waiting at the check-out line. The newly designed shopping cart is a product of MediaCart, Microsoft, and Wakefern. Microsoft is in charge with providing targeted ads using its Microsoft Atlas technology and the sophisticated shopping cart is created by MediaCart. The current system will be put to test in ShopRite supermarket managed by Wakefern on the East Coast. The shopping carts will be equipped RFID tags to sense where the carts’ location in the supermarket. When a customer walks in a specific aisle, he or she can receive specific advertisement based on the RFID that the console received.An interesting feature that customer might enjoy is the online shopping list. You can list all your shopping item on the website and it will save it for you. Once you are at the supermarket, you will simply swipe in your member’s card and the list will appear. It’s a nice way to save a piece of paper or a post-it-note. At the end, all the data mines from customer will be useful for better advertisement and the supermarket’s improvement.Assets

  • Customer information. Every customer who wishes to use this new service has to become a member of the card loyalty program. Thus, their personal information is recorded and should be safeguarded against unnecessary use. In addition, their personal information will also include shopping pattern or other related information for better targeted advertisement.
  • Supermarket’s good will and reputation. Since the technology is fairly new, ShopRite will become the first supermarket to pioneer the application of this concept. It can become a major player of the future that gives a new shopping reputation with reliable system and good reputation.

Security Goal

  • Customer retention. The system intended for all customer to have a good experience while visiting the supermarket. Therefore, the advertisement or promotion/sale should be related to customer’s need. The customer will build up preference to the store because of the level of convenience and satisfaction. In the end, regular flow customer to the supermarket will ensure the regular flow of capital and open other venue for future investment.
  • Faster purchasing process. The new shopping cart system allows customers to bypass the checkout counter. Thus, they do not need to wait in line and waste their precious time. This convenience will give an added value to the supermarket and ensure availability of check out process anywhere and anytime.

Potential Adversaries

  • Rivals or competitors. The new system is giving a path for new way of shopping. If the technology attracts people’s attention, then many supermarkets might need to follow the step to stay in-trend. However, some supermarkets might not agree with this method and devise a plan to foil it.
  • Disgruntled worker. The new change in the supermarket might spark disapprovals within the company. Since the check-out counter is no longer necessary, then some employee can be let go. This fact can give a reason for desperate employees to get even.

Threats

  • RFID transmission. RFID chips will be used all across the supermarket area. A malicious user can view the RFID and perhaps devise a way to change the configuration the RFID or disable it. Then, customer might receive unrelated advertisement, which will reduce customer experience. In addition, malicious might even want to tamper or disable the RFID to make the system useless.
  • Database security. All of the advertisements should be stored in some kind of database that relates them to RFID tags. In the case of database tampering, the advertisement might not correlate with the correct advertisement. In worst case, customer will be bombarded with all type of advertisements (ex: adult advertisement).

Potential Weakness

  • Database tampering. The database for advertisement will need to be constantly updated for new advertisement. If the data is outdated, then the customer might get confuse. The problem can come for internal where the database could contain customer information. A lack of security can give a malicious user a chance to ruin the database and render the supermarket useless.
  • Wireless communication. The system in place relies heavily in wireless communication, starting from the RFID to the method of payment. Customers who need to pay the items can simply swipe their card on the shopping cart. It will then try to complete the transaction. The communication between the shopping carts with the payment server can be interrupted or even intercepted. Not to mention, the shopping cart might also store user information like their card member or recently used credit card.

Potential Defenses

  • Firewall and redundancy. All servers that host the supermarkets’ shopping cart should have a robust firewall and redundancy system to serve all customers. The firewall can be used to protect overall system against attacker. Redundancy to accommodate the users with advertisement even some of the servers went down either for maintenance or repair.
  • Encryption. In order to protect all wireless communication, encryption is really essential especially when concerning personal information. This means, all communication between the shopping cart and the servers must be encrypted.

RiskInterruption in the RFID transmission is a risk that the supermarket must bear. The RFID has been around for a long and people know the technology quite well. Thus, the possibility for tampering the RFID or change its configuration could be reasonable. Additional protection in the form of shielding of transmission leakage outside the supermarket and the transmission encryption might be needed.Database tampering might be an issue, especially the one that has the content of customer information, advertisements, process payment; and it can talk directly to the shopping cart. A complete and adequate protecting to secure customer data and daily transaction is necessary.ConclusionThe new shopping cart can give better customer satisfaction and better experience if the security permits it. Customers are exposed to risk where their personal information can be breached and exposed to others. Furthermore, they will be bombarded by many advertisements that are targeted to their preferences and habits. In short, the shopping cart will become more interactive to customer preferences in the expense of their information being mined and analyzed. It is a trade off that every customer might need to bear in mind when doing their shopping chore.If this method becomes popular, then we can expect all supermarkets to use this ‘smart’ shopping cart. Thus, the importance of maintaining privacy will invade our daily live when buying grocery.

Posted in Security Reviews | Tagged , , , , , | 5 Comments

Online Game Security

http://www.securityfocus.com/columnists/461/1

Recently, a freelancer named Federico Biancuzzi published a book with his co-author, Greg Hoglund, about exploiting online games’ vulnerabilities. The article is an interview with Federico. He talked about one of the vulnerabilities in MMORPG is the fact that the server stores states in the client machines to have these client machines do some of the computations. This allows adversaries to be able to hack within their own machines to gain various benefits. This is because virtual assets in games now days hold great values. Federico also mentioned various ways to improve the online game security. One of which was having the game architecture server-side focus.

Continue reading

Posted in Current Events | Tagged , , , | 9 Comments

Hackers Extort Utility Companies

Tom Donahue, the CIA’s top security analyst, announced this week that attackers hacked into the computer systems of foreign utility companies and held power grids hostage until their demands were met. In one case, they also caused a power outage that affected multiple cities. According to a Forbes.com article, the attacks occurred over the last two years, and an unknown amount of money was extorted.

Continue reading

Posted in Current Events | 2 Comments

MySpace is NotSafe

A recent article concerning user privacy on MySpace made it known there is a serious flaw in the social network’s security. The reported exploit of the bug allows anyone, not just MySpace account holders, to view private profiles and private photo galleries. Ideally, if a user marks their profile and pictures as private, only friends or individuals they allow to view their information should have access. It was mentioned in the article that URLs were modified to circumvent the privacy security installed on MySpace presently; this exploit is similar to Pablo’s demonstration of the duped CNN page using a modified URL.

As the article mentions, one reason this event came about is due to individuals posting on forums asking how to view these private profiles. Even more disturbing, however, is the fact that these individuals on the forums are targeting teens. It is also reported that this bug has been in circulation on forums for months now, and so it would seem likely that MySpace knew of the bug, but was too lazy to do anything about it. If they did not know, then ignorance is no excuse. From the high-level and brief description of the bug in the article, it seems this event and others like it could have been prevented altogether with a better system architecture to begin with. Since anyone is able to modify the MySpace URLs and input a user’s ID to gain access, it would seem MySpace does not check if the exploiter is logged in. If they do check this, then spoofing a user’s account credentials seems all too easy on MySpace.

Due to MySpace being one of the largest, if not the largest, social networking sites on the web, there is a potentially large societal impact due to this bug. Personal photos and information can be stripped from profiles and placed on other sites for who knows what reasons. Clearly this type of event is an invasion of privacy, and should be prevented from occurring as soon as possible. Not only is this type of act against the rules, it is against the wishes of the victims. How should these victims react? They signed up for a service expecting their information to be protected, but they received a vulnerable service which puts their information at risk. Should MySpace have to compensate individuals somehow due to harming their user base? User’s must pay the consequences when breaking the “Terms and Conditions” of a service oriented site, so should this swing the other way?

Posted in Current Events, Ethics, Privacy | Tagged , | Comments Off on MySpace is NotSafe

Monkey Brains In U.S. Make Robot Walk In Japan

Researchers at Duke University Medical Center have successfully used a monkey to control a robot. By putting the monkey on a treadmill and implanting electrodes into its brain, the movement of the robot in Japan matched the movements of the monkey in the U.S. The movement of the robot continued after the treadmill stopped, supposedly as the monkey was still thinking about walking. This research is motivated by the desire to help those severely paralyzed be able to walk again. Researchers hope to create robotic limbs that respond to users’ thoughts.

Continue reading

Posted in Current Events, Privacy | Comments Off on Monkey Brains In U.S. Make Robot Walk In Japan

Security Review: Apple’s Time Capsule

Given the iPhone’s myriad vulnerabilities and the unrest spawned by their high-profile discovery and exploitation, perhaps the security aspects of new Apple products, such as the Time Capsule, merit our consideration. The Time Capsule is a sleek wireless hard drive that doubles as a 802.11n Wi-Fi base station. Through the Time Machine application in OS X Leopard, the Time Capsule enables automated backup from multiple Macs to its 500GB or 1TB hard drive. Security features include WPA, WEP, MAC address filtering, and a NAT firewall. However, the amount of configuration needed for these security features is not specified on Apple’s website, and the emphasis is on a easy setup (“a matter of a few clicks”).

Continue reading

Posted in Security Reviews | Tagged , | 6 Comments

Define “Safe”…

An article in InformationWeek yesterday exposes the details of what McAfee’s ScanAlert product actually means by “Hacker Safe”. The ScanAlert product issues certifications that websites are safe from attack. However XSSed.com, a website dedicated to exposing Cross-Site Scripting attacks, gave InformationWeek a listing of 60+ Hacker Safe websites with open XSS vulnerabilities. In response to the accusations, ScanAlert representatives assert that ScanAlert certification does not consider XSS vulnerabilities as dangerous. The reason being the XSS attacks are entirely ‘client side’, meaning they do not allow the hacker access to the server, data, or customer information.

Continue reading

Posted in Current Events, Ethics | 3 Comments

AT&T Investigating Copyrighted Material Network Filter

In one of the more interesting stories to come out of the telecom industry in recent weeks, the New York Times is reporting that AT&T is currently in the testing phases of developing a network filter that will monitor their networks for copyrighted content. The company is reportedly in talks with content owners such as NBC Universal regarding incentives for the company to filter copyrighted material.

Continue reading

Posted in Current Events, Privacy | Comments Off on AT&T Investigating Copyrighted Material Network Filter