Mobile Security Awareness on the Rise… Finally

BBC released a report this week which highlighted the ease of creating and implementing malicious code on a Smartphone. Mark Ward, BBC Technology Correspondent, self admitted programming novice and Tyler Shields a developer from Veracode teamed up to create a basic game that would steal contact information, private text messages , location information and then send it to a specific e-mail address.

Here is the scary part; the spyware took up 250 lines of the 1500 line program, were all legitimate programming and were hard to detect from official programs as mobiles are constantly accessing sensitive information.

With information such as this, it will only be a matter of time before Mobile Security becomes the next big thing. Or is it only a matter of time before we realize it IS the big thing?

Mobile security issues are becoming more apparent as Smartphone users are beginning to understanding how quickly and easily their personal information can be stolen from the very device they use on an intimate level everyday. From day planners, to passwords, to private conversations, Smartphones hold a goldmine of information for hackers looking to make bank.

Posted in Industry News | 1 Comment

Wedge Networks Partners With Leading Canadian Security VAR – Access 2 Networks Ltd.

Wedge Networks is pleased to announce its partnership with network security specialist Access 2 Networks (A2N) headquartered in Mississauga, Ontario, Canada.

 “A2N brings a new level of security expertise to our channel partner ecosystem; one that I am positive that our customers would appreciate,” says Hongwen Zhang, President and CEO of Wedge Networks, the leader in high performance web security solutions. “I am impressed with their people, their focus on customer service, and their position in the marketplace. All in all, we are proud to bring on A2N as a Wedge Partner and look forward to working closely with them to bring our solutions to A2N’s world class customers.”

“Our focus and dedication towards Network Security Solutions enables us to have discussions about security challenges with many of Canada’s leading institutions and corporations. I am seeing an emerging market for High Performance Malware Protection Solutions, and, as Wedge Networks is a performance leader in Web Security, partnering with them becomes a logical step for us. As an industry we need to design solutions that tightens our Malware defenses while maintaining the bandwidth requirements of today and tomorrow, both at the network perimeter and within the corporate infrastructure.” explains Frank Rondinone, Founder and CEO of A2N.

 For more information on Access 2 Networks please visit www.access2networks.com .

For more information on Wedge Networks please visit www.wedgenetworks.com .

Posted in Wedge News | 1 Comment

Wedge Networks Breaks Performance Barriers With The Industry’s First 10Gbps Deep Content Inspection Platform For Cloud And Telco Edge Applications

Leader in Web Security Unveils BeSecure 2080 a 10 Gigabit Throughput DCI Appliance

CALGARY, AB. July 28, 2010 – Wedge Networks Inc. (Wedge), the leader in high performance network-based web security solutions, announced today, the World’s first 10 Gigabit per second Deep Content Inspection Platform, the BeSecure NDP-2080. Pushing the performance and accuracy boundaries for network inspection and integration, the BeSecure NDP-2080 is purpose- built for Service Providers and Telcos.

Wedge Networks is again leading the industry by delivering a performance powerhouse combining the NDP-2080 hardware with Wedge’s patented SubSonic Engine technology, allowing for a solution that can truly handle the requirements for high bandwidth networks.

With the NDP-2080 driving the performance, Wedge’s Deep Content Inspection-based solutions, which use comprehensive signatures that span both mobile and fixed devices, heuristics and reputation-based databases, provide the industry’s highest accuracy in malware detection. The BeSecure 2080 truly shatters the industry misconception that Deep Content Inspection is not suitable for Telco and ISP networks because of the latency introduced. With Wedge’s new flagship product, these high bandwidth providers now have a viable security solution.

“Network performance is critical. Devices that provide security services need to be able to keep up with the networks they are installed in. Wedge is committed to providing constant innovation to maintain its performance leadership in Deep Content Inspection.” said Dr. Hongwen Zhang, President and CEO of Wedge Networks. “The BeSecure 2080 has been developed to provide our customers with a robust, high performing, high accuracy solution that looks to fulfill network security requirements into the future but that is available today.”

Key technical features of the BeSecure 2080 include:
• Enhanced multi-CPU/multi-core support using Intel’s new generation of Nehalem six (6) core processors with real-time scheduling to deliver high performance and robustness for deep content inspection functions;
• Optimized network stack to support sustained 10Gbps throughput of content-inspected traffic with sub-millisecond latencies;
• Standards-based (IEEE 802.3ad) network integration to support aggregation of 1Gbps trunks for Telco-edge or cloud services deployments
• Stealth routing to enable plug & play network integration allowing for lower total cost of ownership (TCO);
• New OWASP-10 Malware Threat Detection for Server Farm Protection;
• SubSonic patented optimization algorithms for content recognition technology which delivers 30 times performance improvement over conventional approaches;
• Industry’s highest accuracy in malware detection using comprehensive signatures that span both mobile and fixed devices, heuristics and reputation-based databases.

With great interest expressed by early adopter customers, Wedge is now taking pre-orders on its new flagship NDP-2080 product. For information on the BeSecure 2080 and other Wedge products, visit:
www.wedgenetworks.com/products.html

Posted in Wedge News | Leave a comment

And it is not just the antenna…

The new iPhone 4.0 is a piece of art, a handheld device which Andrew Berg of Wireless Week elegantly termed as ‘beautifuly flawed‘.  Surprisingly, another report that went out un-noticed by mainstream media, unless you are in the Security business, rated Apple as the company with the most security vulnerabilities in its software, surpassing Oracle and even Microsoft in the last 5 years.  This is shown by the now highly quoted, yet highly disputed, graph:

Secunia - Reported Security Vulnerabilities by Vendor, 2005 - 2010.

Secunia - Reported Security Vulnerabilities by Vendor, 2005 - 2010.

But it is not just the iPhone or Apple platforms that are going to see a surge in malware attacks due to these documented vulnerabilities.  Kaspersky made this critical prediction in December 2009:

An increase in attacks on iPhone and Android mobile platforms. 2010 promises to be a difficult time for iPhone and Android users. The first malicious programs for these mobile platforms appeared in 2009, a sure sign that they have aroused the interest of cybercriminals. The only iPhone users currently at risk are those with compromised devices; however the same is not true for Android users who are all vulnerable to attack. The increasing popularity of mobile phones running the Android OS combined with a lack of effective checks to ensure third-party software applications are secure, will lead to a number of high-profile malware outbreaks.

There are three reasons why this prediction will hold and mobile devices are the next target for malicious attacks.  First, newer, more accessible platforms and applications – and the vulnerabilities highlighted above – will open the doors to malicious attacks on and from mobile devices. And second, many of us are using our iPhones and Android Smartphones in the same way we use our PCs.  We shop, surf the web, email, text, Twitter, Facebook and download on our phones.  Thirdly, our phones house so much of our personal information – contacts, calendars, emails, texts, pictures and more – making them a valuable target for malware writers and malicious hackers. 

So if you are the Chief Security Officer for your Enterprise or Service Provider, mobile devices are at your network’s perimeter and you will need to consider “edge” security solutions  (which are typically transparent inline network traffic scanning solutions) – solutions that will protect your end-users’ mobile devices from malware attacks, and in so doing protecting your network infrastructure from attacks launched from compromised mobile devices.  

You heard it here first – it is not just the antenna.

Posted in Latest Security News | 11 Comments

ISP’s Realizing the Benefits of Protecting End Users Against Web-Borne Malware Threats

LINK

Protecting their end-users from malware is a good thing and TalkTalk seems to be leading the way in this respect. However, TalkTalk seems to be confined by the technology supplied by Huawei. By using Deep Packet Inspection, TalkTalk is limited by what they can examine and they must collect information in order to see what threats the sessions contain. Had Talk Talk known about Wedge Networks’ technology, they would see that a better way to implement a system like this would be to use Deep Content Inspection where the company can see the full threat picture without the need for collecting any customer information, even if the information is totally anonymous. The contentious privacy issues would not even come into play.

Posted in Latest Security News | Leave a comment

Industry Infrastructure Security: The Mouse, The Cat, and The Fears

Today, our life is heavily dependent on the digital infrastructure surrounding us. It is no wonder that the news of the first real attack on industry control systems (here), the Stuxnet malware, spread through the media like a wild fire.  The news was pushed by a friend to my iPhone just hours after it was published.

This link  provides a more in depth description of this Stuxnet malware. It gets into a control network via your typical USB drives. It targets a SCADA system from Siemens called Simatic WinCC which runs on the Windows platform. Once the machine is infected, a Trojan detects if the machine is running Siemens’ Simatic WinCC software. It then uses a default password that is hard-coded into the software to access the control system’s Microsoft SQL database.

Many security related publications have elaborated deep concerns about the potential damage that this type of malware can do.  Just last year, in the so called Aurora Project, researchers affiliated with the US government were able to demonstrate how malicious instructions transmitted through the network can physically blow up a 27 ton power generator and cause profound damage. From here, it is easy for the security minded to connect the dots.

SCADA systems, Sensor networks, automated process control devices: there are more machine-to-machine systems than those used by users like you and me. It is a real challenge to secure the machine-to-machine systems. In the case of Stuxnet, since the SCADA system is not on the internet, to achieve timely security updates is not an easy task. In the case of the Aurora Project, the power generator was controlled by embedded systems with very limited computing power to provide self-defences such as firewalling and antimalware. The cost effectiveness and convenience offered by the internet provide huge poll to webify the machine-to-machine systems. More security issues will arise in the future.

How do we protect our critical infrastructure against attacks as demonstrated by the Aurora Project and as realized by Stuxnet? First, access to the machine-to-machine systems has to be tightly controlled. If possible, the USB drives should be disabled or not provided at all. Second, the means of continuously updating the security defence at the whole network level needs to be implemented, even if the network itself is not connected to the public internet. For example, the Wedge BeSecure provides a way to update its security signature once per hour in an offline mode, a feature that was requested by infrastructure operators to stop the transmission of malware such as Stuxnet in their private networks. Third, security policies need to be enforced at the application content level to block malicious instructions while allowing the good instructions to go through.

Posted in Latest Security News | 3 Comments

Today’s Patch Tuesday highlights Windows Help and Support Center can be a popular source of vulnerabilities

Today’s Patch Tuesday marks two key events – the first, and for the first time Microsoft is able to provide a 33 day turn around patch to a zero-day attack.  And the second, is how protocol handlers can be a popular source of vulnerabilities.

This zero-day vulnerability was discovered by Google’s Zurich-based researcher Travis Ormandy and is common in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003.

For those technically inclined, you can read more about today’s Microsoft Patch Tuesday patches at the end of the message courtesy of Ryan Naraine here.  But for those of who you who want to quickly appreciate this vulnerability and to give you a feel for how serious this zero day attack is, in the address bar of your “Internet Explorer” browser, type in this command:

hcp://system/sysinfo/sysinfomain.htm?svr=<h1>test</h1>

You should find your browser prompting you to save a ‘file’ but in effect, invoking the Windows Help and Support Center.  In his posting Travis goes further to provide a script through which this exploit can be utilized to completely take over your Windows Server and you can read about it here.

This provides yet another case for why network based deep content malware inspection is required.  BeSecure Administrators can simply add a simple Regular Expression that blocks ‘hcp://” invocations.

Posted in Latest Security News | 2 Comments

Wedge Networks is Solution of Choice for Wmode

Link

CALGARY, ALBERTA–(Marketwire – 07/06/10) – Wedge Networks Inc. (Wedge), a technology leader in high performance network-based web security solutions, announced today that its BeSecure Web Security appliance is the Network Security Appliance of choice for Wmode.

Wmode is a global leader in providing outsourced Mobile Content Distribution and Service Management for mobile operators, content publishers, media companies and advertising networks. It offers a complete suite of technologies and services as a managed service to enable mobile operators, MVNOs, content providers, media and brand companies to deliver a broad range of rich media content and services to their consumers. ClearMode, the first complete distribution solution for content and App Stores has been operated as a managed service since 2002, providing services for companies such as Orange, Rogers, Leap Wireless, Maxis, Videotron, etc.

Posted in Wedge News | Leave a comment

Hackers Vandalize 200 Websites, Cripple 150

Link

Is YOUR website protected?

Posted in Latest Security News | Leave a comment

Critical PDF Reader Patch Fixes \’/Launch\’ Command Attack Vector

Link

Posted in Latest Security News | Leave a comment