Risk

9/4/2010
01:38 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Apple's Ping Stumble Highlights Systemic Security Problem

Within 48 hours of Ping's launch, Apple's foray into music social networks, more than one million users joined. Too bad, like so many other applications and services on the Internet, security was an afterthought, and those users were plagued with spam comments.

Within 48 hours of Ping's launch, Apple's foray into music social networks, more than one million users joined. Too bad, like so many other applications and services on the Internet, security was an afterthought, and those users were plagued with spam comments.Chester Wisniewski's blog post (anti-virus vendor Sophos), shows users getting inundated with "Get a free iPhone from . . . " spam because Apple failed to adequately authenticate users,or filter bogus URLs, in the new service:

Strangely, Apple seems to have anticipated a certain degree of malfeasance, as profile pictures that you upload will not appear until approved by Apple. They are likely filtering for other offensive content as well, so they probably have means in place they could use to stop the spam. Another problem that is likely to contribute to spam is that it is quite easy to create bogus accounts for the Ping service because no credit card or other positive identification is required to participate.

Coincidentally, the most common spam on Ping at the moment targets Apple itself. The attacks are nearly identical to survey spams we have blogged about on Facebook, Google and Twitter.

If half as many free iPads, iPhones and iPods were being given away as Ping comments might lead you to believe, there would be no reason to bother with going to an Apple store. But if you actually want an Apple device, my advice is to go out and buy one, as filling out surveys will likely only end in tears.

Our Thomas Claburn covered the Apple spam slip-up in some depth in his story Apple iTunes Ping Draws Spam, Complaints.

To its credit, Apple does appear to now be cleaning spam from its systems. However, Apple loses points for not seeing this coming. Spam that hawks gadgets and other wares is a big problem on Twitter, while in the early days of the now defunct Google Wave complaints of spam slowing the system surfaced, and we all know that comment spam is a big scourge on blogging sites.

Which brings us to a broader, much more important question: why is security, when it comes to just about any application or service deployed on the Internet, treated as the red-headed stepchild that is ignored until something bad happens?

Security was ignored when industry moved all of its back-end applications to the Web in the late 1990s and early 2000s - and Web application security is still abysmal, if not worse, today. Same is true with online credit card acceptance. It didn't take a genius of a futurist to predict that credit card thievery and fraud would follow commerce to the Internet in the late 1990s - and yet merchants and the credit card industry didn't do much to secure e-Commerce systems. It wasn't until 2005 when the Payment Card Industry Data Security Standard came into being - about a decade after online commerce started its growth.

It's because designing secure systems is a difficult (much harder than breaking them by comparison) additional step. It requires engineers step back and consider how the system they're building can possibly be infiltrated, abused and misused. And then design must be changed to mitigate those risks. And it also requires incremental layers of quality control - scanning for defects in design and code during development and as the application lives and changes in production.

That's, apparently, still too much to expect. Speaking of design defects, if you haven't yet, you should consider updating to iTunes 10 - the upgrade comes with a fix for a baker's dozen of separate software vulnerabilities.

One of the most recent, similar examples, of such security design fail and social networking site Twitter, which I covered earlier this summer in the post FTC Security Smackdown And Twitter's Hollow Excuses.

Despite its early security lapses, you can find me on Twitter, and follow my security and business observations throughout the day.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11506
PUBLISHED: 2018-05-28
The sr_do_ioctl function in drivers/scsi/sr_ioctl.c in the Linux kernel through 4.16.12 allows local users to cause a denial of service (stack-based buffer overflow) or possibly have unspecified other impact because sense buffers have different sizes at the CDROM layer and the SCSI layer.
CVE-2018-11507
PUBLISHED: 2018-05-28
An issue was discovered in Free Lossless Image Format (FLIF) 0.3. An attacker can trigger a long loop in image_load_pnm in image/image-pnm.cpp.
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.