Risk
9/4/2010
01:38 PM
George V. Hulme
George V. Hulme
Commentary
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Apple's Ping Stumble Highlights Systemic Security Problem

Within 48 hours of Ping's launch, Apple's foray into music social networks, more than one million users joined. Too bad, like so many other applications and services on the Internet, security was an afterthought, and those users were plagued with spam comments.

Within 48 hours of Ping's launch, Apple's foray into music social networks, more than one million users joined. Too bad, like so many other applications and services on the Internet, security was an afterthought, and those users were plagued with spam comments.Chester Wisniewski's blog post (anti-virus vendor Sophos), shows users getting inundated with "Get a free iPhone from . . . " spam because Apple failed to adequately authenticate users,or filter bogus URLs, in the new service:

Strangely, Apple seems to have anticipated a certain degree of malfeasance, as profile pictures that you upload will not appear until approved by Apple. They are likely filtering for other offensive content as well, so they probably have means in place they could use to stop the spam. Another problem that is likely to contribute to spam is that it is quite easy to create bogus accounts for the Ping service because no credit card or other positive identification is required to participate.

Coincidentally, the most common spam on Ping at the moment targets Apple itself. The attacks are nearly identical to survey spams we have blogged about on Facebook, Google and Twitter.

If half as many free iPads, iPhones and iPods were being given away as Ping comments might lead you to believe, there would be no reason to bother with going to an Apple store. But if you actually want an Apple device, my advice is to go out and buy one, as filling out surveys will likely only end in tears.

Our Thomas Claburn covered the Apple spam slip-up in some depth in his story Apple iTunes Ping Draws Spam, Complaints.

To its credit, Apple does appear to now be cleaning spam from its systems. However, Apple loses points for not seeing this coming. Spam that hawks gadgets and other wares is a big problem on Twitter, while in the early days of the now defunct Google Wave complaints of spam slowing the system surfaced, and we all know that comment spam is a big scourge on blogging sites.

Which brings us to a broader, much more important question: why is security, when it comes to just about any application or service deployed on the Internet, treated as the red-headed stepchild that is ignored until something bad happens?

Security was ignored when industry moved all of its back-end applications to the Web in the late 1990s and early 2000s - and Web application security is still abysmal, if not worse, today. Same is true with online credit card acceptance. It didn't take a genius of a futurist to predict that credit card thievery and fraud would follow commerce to the Internet in the late 1990s - and yet merchants and the credit card industry didn't do much to secure e-Commerce systems. It wasn't until 2005 when the Payment Card Industry Data Security Standard came into being - about a decade after online commerce started its growth.

It's because designing secure systems is a difficult (much harder than breaking them by comparison) additional step. It requires engineers step back and consider how the system they're building can possibly be infiltrated, abused and misused. And then design must be changed to mitigate those risks. And it also requires incremental layers of quality control - scanning for defects in design and code during development and as the application lives and changes in production.

That's, apparently, still too much to expect. Speaking of design defects, if you haven't yet, you should consider updating to iTunes 10 - the upgrade comes with a fix for a baker's dozen of separate software vulnerabilities.

One of the most recent, similar examples, of such security design fail and social networking site Twitter, which I covered earlier this summer in the post FTC Security Smackdown And Twitter's Hollow Excuses.

Despite its early security lapses, you can find me on Twitter, and follow my security and business observations throughout the day.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Latest Comment: LOL.
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6213
Published: 2014-04-19
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 Patch 1 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1833.

CVE-2013-6214
Published: 2014-04-19
Unspecified vulnerability in the Integration Service in HP Universal Configuration Management Database 9.05, 10.01, and 10.10 allows remote authenticated users to obtain sensitive information via unknown vectors, aka ZDI-CAN-2042.

CVE-2012-0871
Published: 2014-04-18
The session_link_x11_socket function in login/logind-session.c in systemd-logind in systemd, possibly 37 and earlier, allows local users to create or overwrite arbitrary files via a symlink attack on the X11 user directory in /run/user/.

CVE-2012-6646
Published: 2014-04-18
F-Secure Anti-Virus, Safe Anywhere, and PSB Workstation Security before 11500 for Mac OS X allows local users to disable the Mac OS X firewall via unspecified vectors.

CVE-2013-4279
Published: 2014-04-18
imapsync 1.564 and earlier performs a release check by default, which sends sensitive information (imapsync, operating system, and Perl version) to the developer's site.

Best of the Web