Ex-Fannie Mae worker charged with planting computer virus

Found on The Examiner on Wednesday, 28 January 2009
Browse Computer

A fired Fannie Mae contract employee allegedly placed a virus in the mortgage giant's software that could have shut the company down for at least a week and caused millions of dollars in damage, prosecutors say.

The virus was set to execute at 9 a.m. Jan. 31, first disabling Fannie Mae's computer monitoring system and then cutting all access to the company’s 4,000 servers, Nye wrote. Anyone trying to log in would receive a message saying "Server Graveyard."

From there, the virus would wipe out all Fannie Mae data, replacing it with zeros, Nye wrote. Finally, the virus would shut down the servers.

Now that's an unhappy employee. Not that Fanny Mae could really go down any further.

MD5 Hack Interesting, But Not Threatening

Found on SecurityFocus on Sunday, 04 January 2009
Browse Computer

Considering that it took the original researchers four tries over at least a month to successfully accomplish their attack against the RapidSSL brand, we're fully confident that no malicious organization had the opportunity to use this information against RapidSSL, or any other certificate authority authorized by VeriSign.

As it happens the most expedient and safest method of mitigating the attack was to switch it out for SHA-1. We had been planning this migration to occur on RapidSSL in January 2009 anyway, so we had a high degree of confidence in accelerating that deployment.

For a migration that's been planned for years, several things are surprising: first of all, the switch to SHA-1, which has already been broken in theory and is not recommended as a secure hashing algorithm since 2005. Instead, they could have switched to the highest level of the SHA-2 class, SHA-512. Also, VeriSign was able to switch from MD5 to SHA-1 "about four hours later". Impressive for a migration that took years of planning. If it was so complex and scheduled for the end of January, how come it was so fast to switch? Especially on a rather sudden notice. I'm not saying that VeriSign is lying, but things like these just catch your attention. No matter if that's just PR talk or really a lucky coincidence: switching was good. Not perfect, but good.

Why Mirroring Is Not a Backup Solution

Found on Slashdot on Thursday, 01 January 2009
Browse Computer

Journalspace.com has fallen and can't get up. The post on their site describes how their entire database was overwritten through either some inconceivable OS or application bug, or more likely a malicious act. Regardless of how the data was lost, their undoing appears to have been that they treated drive mirroring as a backup and have now paid the ultimate price for not having point-in-time backups of the data that was their business.

I facepalmed real hard when I read on their site that the data is "automatically copied to both drives, as a backup mechanism". Although I understand the throubles they are in all too well, I don't feel sorry for them at all. I can't imagine how many times I've told people that mirroring is not a backup. Most of them won't learn until they went through it all. A USB drive costs just a few dollars. One would think at least that's an investment you're willing to make to safe your company. Granted that's not a perfect solution, but way better than nothing. Congrats to losing your six year old company because of an error any capable first term IT student could have protected you from. Now repeat: a RAID is not a backup.

25C3: MD5 collisions crack CA certificate

Found on Heise on Monday, 29 December 2008
Browse Computer

A security research team has used MD5 collision attacks to create a rogue Certificate Authority (CA) certificate. The certificate is trusted by all common web browsers and allows them to impersonate any website on the internet, including HTTPS secured banking and e-commerce sites.

The certificate can also be used to sign other certificates, which could allow attackers to carry out "practically undetectable phishing attacks".

The team found the following CAs still using MD5; RapidSSL, FreeSSL, TC TrustCenter AG, RSA Data Security, Thawte and verisign.co.jp. They collected 30,000 certificates and found 9,000 of them were signed with MD5 and of them, 97 per cent were issued by RapidSSL.

The fact that MD5 is not a trustworthy checksum is known for more than ten years by now. Still using it for crucial and security related purposes is inexcusable. Saying that nobody will go through the hassles of finding a collision ignores the energy the organized crime can release.

Sun Goes Beyond RAID in Its First Storage Appliance

Found on eWEEK on Sunday, 09 November 2008
Browse Computer

Code-named Amber Road, the rack-mounted 7000 line comes in 2TB, 44TB and 288TB options. All use the open-source ZFS file system and the DTrace system analysis tool and can be up and running in about 5 minutes, Sun claims.

All of the new unified storage systems include comprehensive data services at no extra cost, Fowler said. These include snapshots/cloning, restores, mirroring, optional RAID-5, optional RAID-6, replication, active-active clustering, compression, thin provisioning, CIFS (Common Internet File System), NFS (Network File System), iSCSI, HTTP/FTP and WebDAV (Web-based Distributed Authoring and Versioning).

And that's why ZFS wins.

Pushing paper out the office

Found on BBC News on Friday, 29 February 2008
Browse Computer

The idea of the paperless office has been around since the late 1970s but three decades on paper remains hugely popular.

One particular technology proving useful for this is Adobe's Portable Data Format.

About 15 years ago this started life as a simple way to preserve the look and feel of documents as they were passed between different operating systems and computers.

Another way to get rid of paper is to scan the documents and turn them into digital facsimiles. The relentless march of technology means today's scanners, even those found in the home, are more like the very expensive ones big corporations use.

It's fairly easy to reduce the need for paper drastically. I don't even have a printer installed anymore for at least 2 years now and never really missed it. But when there are still people around who print out every email just to read it and then throw it away, then the need for paper won't really change.

Ed Felten Defeats Hard Drive Encryption

Found on Techdirt on Thursday, 21 February 2008
Browse Computer

Felten and a group of colleagues have now shown that hard disk encryption is incredibly easy to beat. This should be a huge concern, considering how many people and organizations rely on data encryption to protect important data. In fact, with many of the "lost" hard drive stories over the past few years, many organizations have insisted the risk was minimal, since the data was all encrypted.

As the video notes, this won't work on some systems if the computer is turned completely off and the encryption package opens up before the operating system boots -- but otherwise, most systems are vulnerable.

This is indeed a problem. Under some circumstances, memory chips can still contain useful data even after 10 minutes without power. First of all, make sure that your computer won't boot from any external media, like CD-ROM or USB. Also, make it as hard as possible to remove the RAM.

RIAA boss: Move copyright filtering to users' PCs

Found on Ars Technica on Thursday, 07 February 2008
Browse Computer

Sherman's a sharp guy, and he's fully aware that filtering will prompt an encryption arms race that is going to be impossible to win... unless users somehow install the filtering software on their home PCs or equipment.

This means moving the filter out of the network and onto the edges (local machines), since it's at the edges that decryption and playback occurs.

Sherman knows it's a tough sell. "Why would somebody put that on their machine?" he asked rhetorically. "They wouldn't likely want to do that."

The only way to make it work is to mandate the filters or have ISPs mandate that users install them to get on the Internet. The consumer backlash from such a plan would be like the force of a thousand supernovas, and it's hard to visualize this happening.

Nobody would install it. The industry might talk MS into it, but this won't work on an open source OS like Linux (in fact, it would be a good PR). Even if for some reason the ISPs would be able to force users to install the filter, the protocol can be reverse-engineered to create fake filter applications that basically do nothing but pretend to be a valid filter if checked. To avoid that, filtering would have to be protected by law and that sounds a bit off (for now).

New Boeing 787 vulnerable to hacking

Found on The Inquirer on Saturday, 05 January 2008
Browse Computer

According to to the U.S. Federal Aviation Administration, the new Boeing 787 Dreamliner aeroplane may have a serious security vulnerability in its on-board computer networks that could allow passengers to access the plane's control systems.

The computer network for the Dreamliner's passengers, designed to give passengers in-flight internet access and entertainment, is connected to the plane's control, navigation and communication systems, the FAA report reveals.

More worryingly, there seems to be some confusion at Boeing as to what exactly the situation is, as Boeing spokeswoman Lori Gunter said the wording of the FAA document is misleading, and that the plane's networks don't completely connect. Why are you testing a new solution then?

Are they nuts? Next they will tell us that the navigation software runs on Windows. I wonder if nobody thought it might be a tad dangerous to wire the core and the entertainment system together. The next 9/11 can be done with just a laptop then (which easily passes the screening); or even safer, remote via Google Earth Flight Simulator.

Documents Reveal US Incompetence with Word

Found on Slashdot on Thursday, 17 May 2007
Browse Computer

The U.S. Coalition Provisional Authority, which formerly governed Iraq, accidentally published Microsoft Word documents containing information never meant for the public, according to an article in Salon. By viewing the documents using the Track Changes feature in Word (.doc), the author has been able to reconstruct internal discussions from 2004 which reflect the optimism, isolation and incompetence of the American occupation.

The editors kept pulling text from a document titled "Why Are the Attacks Down in Al-Anbar Province -- Several Theories."

That's why use plaintext files. No tracking, no surprises. Although I installed Open Office over 2 years ago, I never used it (well, the Excel clone was started 2 or 3 times).