ISP’s Realizing the Benefits of Protecting End Users Against Web-Borne Malware Threats

No Gravatar

LINK

Protecting their end-users from malware is a good thing and TalkTalk seems to be leading the way in this respect. However, TalkTalk seems to be confined by the technology supplied by Huawei. By using Deep Packet Inspection, TalkTalk is limited by what they can examine and they must collect information in order to see what threats the sessions contain. Had Talk Talk known about Wedge Networks’ technology, they would see that a better way to implement a system like this would be to use Deep Content Inspection where the company can see the full threat picture without the need for collecting any customer information, even if the information is totally anonymous. The contentious privacy issues would not even come into play.

Posted in Latest Security News | Leave a comment

Industry Infrastructure Security: The Mouse, The Cat, and The Fears

No Gravatar

Today, our life is heavily dependent on the digital infrastructure surrounding us. It is no wonder that the news of the first real attack on industry control systems (here), the Stuxnet malware, spread through the media like a wild fire.  The news was pushed by a friend to my iPhone just hours after it was published.

This link  provides a more in depth description of this Stuxnet malware. It gets into a control network via your typical USB drives. It targets a SCADA system from Siemens called Simatic WinCC which runs on the Windows platform. Once the machine is infected, a Trojan detects if the machine is running Siemens’ Simatic WinCC software. It then uses a default password that is hard-coded into the software to access the control system’s Microsoft SQL database.

Many security related publications have elaborated deep concerns about the potential damage that this type of malware can do.  Just last year, in the so called Aurora Project, researchers affiliated with the US government were able to demonstrate how malicious instructions transmitted through the network can physically blow up a 27 ton power generator and cause profound damage. From here, it is easy for the security minded to connect the dots.

SCADA systems, Sensor networks, automated process control devices: there are more machine-to-machine systems than those used by users like you and me. It is a real challenge to secure the machine-to-machine systems. In the case of Stuxnet, since the SCADA system is not on the internet, to achieve timely security updates is not an easy task. In the case of the Aurora Project, the power generator was controlled by embedded systems with very limited computing power to provide self-defences such as firewalling and antimalware. The cost effectiveness and convenience offered by the internet provide huge poll to webify the machine-to-machine systems. More security issues will arise in the future.

How do we protect our critical infrastructure against attacks as demonstrated by the Aurora Project and as realized by Stuxnet? First, access to the machine-to-machine systems has to be tightly controlled. If possible, the USB drives should be disabled or not provided at all. Second, the means of continuously updating the security defence at the whole network level needs to be implemented, even if the network itself is not connected to the public internet. For example, the Wedge BeSecure provides a way to update its security signature once per hour in an offline mode, a feature that was requested by infrastructure operators to stop the transmission of malware such as Stuxnet in their private networks. Third, security policies need to be enforced at the application content level to block malicious instructions while allowing the good instructions to go through.

Posted in Latest Security News | 3 Comments

Today’s Patch Tuesday highlights Windows Help and Support Center can be a popular source of vulnerabilities

No Gravatar

Today’s Patch Tuesday marks two key events – the first, and for the first time Microsoft is able to provide a 33 day turn around patch to a zero-day attack.  And the second, is how protocol handlers can be a popular source of vulnerabilities.

This zero-day vulnerability was discovered by Google’s Zurich-based researcher Travis Ormandy and is common in the Windows Help and Support Center feature that is delivered with supported editions of Windows XP and Windows Server 2003.

For those technically inclined, you can read more about today’s Microsoft Patch Tuesday patches at the end of the message courtesy of Ryan Naraine here.  But for those of who you who want to quickly appreciate this vulnerability and to give you a feel for how serious this zero day attack is, in the address bar of your “Internet Explorer” browser, type in this command:

hcp://system/sysinfo/sysinfomain.htm?svr=<h1>test</h1>

You should find your browser prompting you to save a ‘file’ but in effect, invoking the Windows Help and Support Center.  In his posting Travis goes further to provide a script through which this exploit can be utilized to completely take over your Windows Server and you can read about it here.

This provides yet another case for why network based deep content malware inspection is required.  BeSecure Administrators can simply add a simple Regular Expression that blocks ‘hcp://” invocations.

Posted in Latest Security News | 2 Comments

Wedge Networks is Solution of Choice for Wmode

No Gravatar

Link

CALGARY, ALBERTA–(Marketwire – 07/06/10) – Wedge Networks Inc. (Wedge), a technology leader in high performance network-based web security solutions, announced today that its BeSecure Web Security appliance is the Network Security Appliance of choice for Wmode.

Wmode is a global leader in providing outsourced Mobile Content Distribution and Service Management for mobile operators, content publishers, media companies and advertising networks. It offers a complete suite of technologies and services as a managed service to enable mobile operators, MVNOs, content providers, media and brand companies to deliver a broad range of rich media content and services to their consumers. ClearMode, the first complete distribution solution for content and App Stores has been operated as a managed service since 2002, providing services for companies such as Orange, Rogers, Leap Wireless, Maxis, Videotron, etc.

Posted in Wedge News | Leave a comment

Hackers Vandalize 200 Websites, Cripple 150

No Gravatar

Link

Is YOUR website protected?

Posted in Latest Security News | Leave a comment

Critical PDF Reader Patch Fixes \’/Launch\’ Command Attack Vector

No Gravatar

Link

Posted in Latest Security News | Leave a comment

Hello To The Wedge Networks Community!

No Gravatar

Welcome!  Wedge Networks has started up its Social Media Presence with this Community Discussion Page where the Wedge Community (be it current customers, partners, followers, fans, evangelists) can come together to find out about the latest network security news and have open discussions about the wide variety of issues that are affecting the industry.  This site will keep you informed about the latest product news and happenings both within Wedge as well as in the community as a whole.  Again, welcome!  Feel free to browse, post articles of interest, and discuss topics that you consider relevant in this ever changing industry!!!

Posted in Wedge News | Leave a comment