06. June 2010 · Comments Off on The End of Malware? Hardly. · Categories: Malware, Security-Compliance

Slate recently published an article entitled, “The End of Malware?” The sub-title is, “How Android, Chrome, and the iPad are shielding us from dastardly programs.” The premise trotted out the usual, Windows is insecure; Android, Chrome, and the iPad are more secure because they deploy sandboxing technology, i.e. restricting an application’s access to operating system resources.

While this may be a good thing, it is hardly the “end of malware.” Not even close.What the author is missing is the intent and motiviation of the bad guys. They go where the money is, i.e. where there is the opportunity to steal cash from people’s bank accounts, steal credit card information, steal intellectual property they can sell. At present, these opportunities are minimal on Android, Chrome, and iPads. Once there is critical mass for profitable hacking, you will definitely see an increase in exploits on these devices.

Now even with limited opportunities for profitable hacking we are starting to hear about vulnerabilities on these devices. Just yesterday I wrote about a Massive iPhone Security Issue where passcode protected content on the iPhone can be accessed by simply attaching the device to a computer running Ubuntu or OSX. Therefore, if you lose your iPhone, your passcode protection is useless.

If you need to hear more, check out the June 3 article in the Wall St. Journal, Dark Side Arises for Phone Apps. Here are some key quotes, first on Google:

In one incident, Google pulled dozens of unauthorized mobile-banking apps from its Android Market in December. The apps, priced at $1.50, were made by a developer named “09Droid” and claimed to offer access to accounts at many of the world’s banks. Google said it pulled the apps because they violated its trademark policy.

The apps were more useless than malicious, but could have been updated to capture customers’ banking credentials, said John Hering, chief executive of Lookout, a mobile security provider. “It is becoming easier for the bad guys to use the app stores,” Mr. Hering said.

And on Apple:

Apple vets applications before they appear in its App Store, but risks still exist. In July 2008, Apple pulled a popular game called Aurora Feint from its store after it was discovered to be uploading users’ contact lists to the game maker’s servers. More recently, it yanked hundreds of apps it said violated its policies, some out of security concerns.

In conclusion, while sandboxing is a good idea, there is no silver bullet when it comes to security.

04. June 2010 · Comments Off on Massive iPhone Security Issue · Categories: Security-Compliance, Vulnerabilities

ReadWriteEnterprise is reporting that:

Content stored on an iPhone 3GS with passcode protection can be accessed without the passcode simply by attaching the device to a computer running the latest version of Ubuntu or a Windows or OSX system running off the shelf software such as iPhone Explorer. This flaw was discovered by Bernd Marienfeld, an information security professional and blogger, last week. Recently, the enterprise has seen a steep increase in the adoption of the iPhone and iPad. But Apple will need to aggressively address security concerns such as these in order to gain and hold market share.

Read the whole article here.

04. June 2010 · Comments Off on SANS Twenty Critical Controls · Categories: Palo Alto Networks, Security Management, Security-Compliance

An important part of Cymbel’s approach to IT Security and Compliance leverages the SANS Twenty Critical Controls for Effective Cyber Defense: Consensus Audit Guidelines (20CC). We have embraced 20CC for the following reasons:

  • Comprehensiveness – All the major critical IT Security functions are covered.
  • Credentials – The document was generated by a strong group of experienced security professionals from government and industry.
  • Concreteness – The document provides very specific recommendations.
  • Automation – Fifteen of the twenty controls are readily automated.
  • Metrics – One or more simple, specific, measurable tests are provided to assess the effectiveness of each recommended control.
  • Phases – Each of the twenty controls have sub-controls which can be implemented in phases. In fact, each control describes at least one “Quick Win.” This lessens the potentially overwhelming nature of other security models.
  • Brevity – The current version of the document is only 58 pages as compared to other approaches which are spread over multiple books.
  • Price – The document is free.

If there is any weakness to the 20CC, it’s the consensus nature of it. However, in our opinion this weakness is only reflected in its understandable unwillingness to recommend a solution that would inure to the benefit of a single manufacturer. This is particularly reflected in the “Boundary Defense” control which recommends stateful inspection firewalls and separate Intrusion Prevention Systems.

For boundary defense, Cymbel recommends the only next-generation firewall on the market – Palo Alto Networks. That’s not just us saying it. Gartner said it in its 2010 Enterprise Firewall Magic Quadrant.

I would love to hear your opinions on the SANS Twenty Critical Security Controls.

04. June 2010 · Comments Off on Cymbel’s new website launch · Categories: Security-Compliance

Today, we at Cymbel are launching our new website. The purpose of the new site is to better express our vision and mission as a company to our existing clients and to potential clients considering Cymbel to help them meet security and compliance objectives.

Cymbel is an IT Solutions Provider, 100% focused on security and compliance. We were founded in 2000 and have just entered our eleventh year in business.

I can boil down our mission to seven words – help our clients rethink defense-in-depth. We are witnessing major changes in technology, threats, the economy and our clients’ business needs and compliance requirements. Due to these changes, the traditional approach to defense-in-depth is simply not effective. We have developed a next-generation architecture focused on applications, users, and data.

I would like to remind readers that this site is a work in progress. We decided to launch today because we felt we were far enough along that our clients and potential clients would benefit. We will continue making improvements in content and infrastructure.

Finally, we made sure that it’s easy for you the reader to provide feedback to us. If you would like more information on a topic or product, or if you disagree with any of  our opinions, we would love to hear from you.

26. May 2010 · Comments Off on · Categories: Security-Compliance

Cymbel is an Information Technology Solutions Provider, 100% focused on security and compliance. We help organizations rethink and re-implement defense-in-depth in response to changes in business needs, technology, threats, compliance requirements, and the economy. Benefits include:

  • Reduced IT Security risks
  • Reduced costs of meeting compliance requirements
  • Reduced IT Operations costs
  • Increased IT Service availability and performance
  • Improved IT alignment with business needs

Learn more: About Cymbel the company, and Cymbel’s Approach to Information Security.