Archive for RB

Facebook is Biggest Social Networking Risk

Facebook is Biggest Social Networking Risk Data from anti-malware vendor Sophos2010 Security Threat Report (PDF) says Facebook is the leader in privacy risks, spam, and other malicious activity. 60 percent of the respondents to a Sophos survey identified Facebook as the biggest security risk in social networking, followed by MySpace (18%), Twitter (17%), and LinkedIn (4%).

It is not surprising that users regard Facebook as the top risk. Facebook’s over 500 million users, offer criminals a cornucopia of personal data to exploit. “Computer users are spending more time on social networks, sharing sensitive and valuable personal information, and hackers have sniffed out where the money is to be made,” said Graham Cluley, senior technology consultant for Sophos.

Criminals have focused their efforts on social media

Sophos’ research shows that criminals have focused their efforts on social networking users in the last 12 months creating an “explosion” in social networking spam and malware complaints. Sophos found that 57% of social network users were spammed on one of the sites, an increase of 70 percent compared to last year.  They also found 36%  of social network users reported being sent malware, a 70% increase over last year. “The dramatic rise in attacks in the last year tells us that social networks and their millions of users have to do more to protect themselves from organized cybercrime, or risk falling prey to identity theft schemes, scams, and malware attacks,” Sophos’ Cluley added.

Three things working against Facebook users

There are three things working against Facebook users, themselves, malware, and Facebook. Facebook users typically give away more private information to Facebook than other sites. Though most people’s profiles it is possible to find out their first, last, and maiden names, where they live, where they went to school, and even worse, historical information like where they lived in the past. A lot of this private information is required on many online credit checks, providing a boom for criminals looking to exploit a user’s credit history or steal their identity.

The most common malware used on social networks is Koobface. Koobface can target all the popular social portals, including Facebook, MySpace, Bebo, Friendster, Tagged, and Twitter. According to the report, Koobface is capable of, “... registering a Facebook account, activating the account by confirming an email sent to a Gmail address, befriending random strangers on the site, joining random Facebook groups, and posting messages on the walls of Facebook friends. Furthermore, it includes code to avoid drawing attention to itself by restricting how many new Facebook friends it makes each day.

Another threat is Facebook applications. Criminals can create malicious Facebook applications designed to steal information and they can find holes in pre-existing applications and exploit them. Legitimate Facebook apps will give away your information if you allow them to (as I have written about here and here). Once an app has permission it can harvest all the information in a Facebook profile and send it to criminals. Before users grant an application access to all of their information, they should Google the publisher to see if they are legitimate or not. Any application that starts doing anything strange or suspicious should be removed immediately.

Facebook has tried to address these risks by issuing a new privacy policy. However, Sophos’ Cluley called it a step backward, because the new settings are “encouraging many users to share their information with everybody on the internet.” According to Facebook only 35% of their users actually customized their settings leaving 65% who presumably didn’t change their settings and continue to share valuable data, which is then used to propagate spam and malware.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Do You Know Where Your IPv6 Is?

Do You Know Where Your IPv6 Is?Earlier, I covered the iSuppli announcement that nearly 3 out of every 4 people on Earth will soon own a mobile phone. Now, this factoid has some consequences. Johannes Ullrich, PhD, chief research officer for the SANS Institute is predicting that the arrival of new and upgraded IPv6-enabled operating systems, can open new and unrecognized security weaknesses in otherwise secure environments.

SANS Institute logo

Dr. Ullrich told Net Security, “One of the problems is the accidental implementation of IPv6. You may already have IPv6 on your network without knowing about or configuring it.” He continues, “Windows 7, OS X, and Linux enable it by default. In the last round of operating system updates, it has tended to be turned on by default.” Dr. Ullrich, who is currently responsible for the SANS Internet Storm Center (ISC), also highlights devices running Apple’s IOS such as iPhone as well as some Google Android devices come with IPv6 enabled by default.

Dr. Ullrich says that the growth of mixed IPv4 and IPv6 networks, sometimes without the knowledge of IT security teams, can introduce a variety of potential security risks. Attacks designed to exploit IPv6-enabled devices could also be missed by security teams not looking for  IPv6 traffic, “Many organizations will look at their own networks and not see a big problem staying on IPv4,” he explains.

According to Net Security, Ullrich believes that organizations have failed to grasp the full impact of a move to IPv6 or the amount of time needed to plan, test, and secure any migration strategy. Ullrich believes that it will take at least about a year for larger organizations to move over to IPv6. Although most modern routers and switches are capable, supporting SIEM, IDS, IPS, and monitoring tools will need reconfiguration. The application layer is more problematic according to the SANS Institute expert  “It is comparable to the Y2K problem, and there may well be many complex or custom applications that are affected by switching over that need to be tested.”

This gadget has been developed by Takashi Arano, Intec NetCore

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Who’s Suing Whom in the Telecom World?

Who's Suing Whom in the Telecom World?

Information is Beautiful has a great infographic showing who is suing who and the current state of telecommunications lawsuits. David McCandless at Information is Beautiful includes snippets of each lawsuit, which is helpful for understanding the overall picture. The diagram differentiates between ongoing and finished lawsuits with different arrows, while the size of the cubes represents the various company’s estimated revenue. In addition, if a company’s cube is red, it means its revenue is decreasing, while gray cubes represent companies with increasing revenues.

Who's Suing Whom?

The involved include a who’s who of the telecom industry:

  • Apple
  • Elan
  • Hitachi
  • HTC
  • Kodak
  • Microsoft
  • Motorola
  • Nokia
  • RIM
  • Samsung
  • Sharp
  • Sony Ericsson
  • Qualcomm

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Terabit Ethernet Developing

Terabit Ethernet DevelopingResearchers at the University of California, Santa Barbara (UCSB) are working on the next evolution of Ethernet – Terabit Ethernet. UCSB Professor of Electrical and Computer Engineering Dan Blumenthal told LightReading that the goal of the recently created Terabit Optical Ethernet Center (TOEC), is to create Terabit Ethernet (TbE) which runs at 1 trillion bits per second by 2015 and to follow it up with 100Tbit/s Ethernet by 2020.

Professor Blumenthal explained to LightReading that he wants the TOEC and its partners to produce something the industry can use, not a one-time lab experiment that only works with duct tape and glue. “We’re not talking about lab hero experiments,” Blumenthal told LightReading. The real-world focus of TOEC has helped attract partners like  Agilent Technologies Inc. (NYSE: A), Google (NASDAQ: GOOG), Intel Corp. (NASDAQ: INTC), Rockwell Collins Inc., and Verizon Communications Inc. (NYSE: VZ) to help with the research. I wrote about Intel’s TBPS efforts back in July.

Terabit Ethernet is hard

TOEC could probably use the help because developing TbE is looking like no simple task according to LightReading. Bob Metcalfe, Ethernet’s creator, and now a Polaris Venture Partners partner, speculated two years ago that a terabit standard might need a rethinking of everything, even the fiber itself.

Based on current UCSB research, professor Blumenthal speculates that TbE  may include:

  • Photonic integrated circuits (PICs) are a must.
  • Coherent receivers, but at a scale well beyond what’s being used for 100Gbit/s Ethernet. A likely candidate is 1,024-QAM: quadrature amplitude modulation (QAM) transmitting 10 bits per symbol, a scheme likely to require 100GHz electronics.
  • To make that coherent receiver energy-efficient, TOEC is “trying to move a lot of what’s in the digital signal processor into the optics,” Blumenthal says.
  • New materials for fiber-optics aren’t out of the question. “We won’t start out with that, but it’ll move in that direction,” Blumenthal says.
  • Other items on the TOEC shopping list include optical phase-locked loops, new semiconductor optical amplifiers (SOAs), and methods for drastically lowering on-chip optical losses.

The questions go beyond the optical layer. To make operations more synchronous padding and frame delineation were added to 10Gbit/s and 100Gbit/s Ethernet, Blumenthal pointed out. “Do we keep doing that? Or do we go purely asynchronous? We don’t know yet. …Once you put the word ‘Ethernet’ in there, it’s not about just transmission. It’s about being backward-compatible. That’s the beauty of Ethernet. We can’t lose that essence.

rb-

The need for TbE is real (I first wrote about Intel’s TbE efforts here) and being driven by video. More video is already riding over existing networks. “We’re going to need much faster networking to handle the explosion in Internet traffic and support new large-scale applications like cloud computing,” Professor Blumenthal told Physorg. Stuart Elby, Vice President of Network Architecture for Verizon told Physorg, “Based on current traffic growth, it’s clear that 1 Terabit per second trunks will be needed in the near future.”

Facebook is already looking at TbE in their data centers. PCWorld reports that at the Ethernet Alliance‘s Technology Exploration Forum, Donn Lee, a Facebook Engineer said, “… there is already a need for 1 terabit.” Facebook has so many servers, and those servers can process data so fast, that they could fill 64 Terabit Ethernet pipes in the backbone of one data center, Lee said.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Ann Arbor Icon Closed

The Ann Arbor landmark Village Corner market, better known as the VC to UM students has closed.

The Village Corner store at 601 S. Forest Ave. in Ann Arbor.

The store at the corner of South University and South Forest is scheduled to be demolished, along with the Student Campus bike shop and long-closed Bagel Factory (mmmm Fragel) to make room for “high-rise” student housing.

During my time on the University of Michigan campus, I made many trips to the VC for coffee, TP, and other necessities of student life.

U of M grad and VC owner Dick Scheer who has run the campus icon for 40 years with his wife, Sally, told the Detroit News that he plans to find a new spot for his store. Let’s hope so since much of the character of Ann Arbor is fading in my opinion.

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.