Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/27/2011
11:39 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

WatchGuard: Worst Applications For Security

The fastest-growing threat to corporate networks is Web-based social media applications

SEATTLE (January 25, 2011) – WatchGuard Technologies Highlights / News Facts: According to WatchGuard security researchers, the fastest growing threat to corporate networks is web-based social media applications. These applications can seriously compromise network security, expose sensitive data, and create productivity drains on employees. There are many reasons why social media applications can pose risk to any size business. Here are a few:

* Productivity Loss: Various research organizations have reported that the United States loses billions of dollars a year due to lowered productivity, as a result of time sinks such as social media sites. Although social media sites can be used for collaboration and rich communications, IT administrators often lack the ability to manage and control business productivity web applications vis-a-vis gaming web applications. * Data loss: With most US states enacting mandatory data breach disclosure laws, businesses are increasingly concerned about data leakage, whether accidental or malicious. Unfortunately, the attributes that make social media sites a fantastic communication medium also make them a potential risk for information and privacy leakage. By having application control capabilities, administrators reduce risks associated with accidental as well as malicious data loss. * Malware and Attack vector: WatchGuard predicts that social networks will become the leading malware vector over the next few years for three reasons:

1. Social media sites breed a culture of trust. The whole point of social media is to interact with others. Typically interactions are with people considered to be “friends”, which implies trust. Meanwhile, social media sites do not have any technical means to validate that the people you are interacting with really are who they say they are. This environment of trust creates an ideal scenario for social engineers to utilize. 2. Many Social media sites suffer from technical vulnerabilities. While Web 2.0 technologies provide many benefits, they also harbor many security vulnerabilities. The complexity of Web 2.0 applications can lead to imperfect code, which introduces some social network sites to Web application vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. Furthermore, the whole concept of allowing untrusted users to push content onto social media sites conflicts with traditional security paradigms. Simply put, this means social media sites are more likely to suffer from web vulnerabilities than less complex and less interactive web sites. 3. Hugely Popular. According to online analytics firm, Compete, Facebook is now the 2nd most popular Web destination after Google. Many other social networks, such as Twitter and YouTube, follow closely behind. Attackers are attracted to this popularity because they know it means that they can get “return on investment” for their attacks.

For these reasons, the following applications are deemed to be the most risky according to WatchGuard research:

1. Facebook: Facebook is surely the most dangerous social media site today, largely based upon its popularity. With a 500+ million user following, Facebook offers a fertile attack surface for hackers. Add in the potential technical concerns, such as a questionable, open App API and now you have a recipe for disaster. 2. Twitter: One would assume that very little damage could be done in 140 characters, but this is an incorrect assumption. In some cases, Twitter’s short form posts lead to new vulnerabilities such as URL shorteners. While URL shorteners can help save space in Twitter posts, they can also help hackers hide malicious links. Furthermore, Twitter suffers from many Web 2.0 and API related vulnerabilities that allow various attacks and even Twitter worms to propagate among its users. 3. YouTube: Because it is one of the most popular online video sites, attackers are drawn to targeting YouTube. Hackers often create malicious web pages that masquerade as YouTube video pages. Additionally, attackers like to spam the comment section of YouTube videos with malicious links. 4. LinkedIn: LinkedIn bears more burden than other social media sites; it is business oriented. Thus, it makes a more attractive target to attackers, as LinkedIn is highly trusted. Because most users leverage LinkedIn to form business relationships or find jobs, they tend to post more valuable and potentially sensitive information to this social network. 5. 4chan: 4chan is a popular image board, a social media site where users post images and comments. 4chan has been involved in many Internet attacks attributed to “anonymous,” which is the only username that all 4chan users can obtain. Some of 4chans image boards contain the worst depravities found on the Internet. Many hackers spam their malware to the 4chan forums. 6. Chatroulette: Chatroulette is an up-and-coming site that allows webcam owners to connect and chat with random people. The nature of this anonymous webcam system makes it a likely target for Internet predators.

Keywords: Network security, Facebook, WatchGuard, Application Control, LinkedIn, Twitter, YouTube, 4chan, Chatroulette, hackers, social networks, security attacks, social media, predators, Internet Quotes: “Now more than ever, businesses need security tools to manage the myriad of web applications that flow in and out of corporate networks,” said Eric Aarrestad, Vice President of Marketing at WatchGuard. “With WatchGuard Application Control, administrators can selectively allow, block, or restrict access to applications based on a user’s department, job function, and time of day, and generate reports on usage. This keeps unproductive, inappropriate, and risky applications off-limits.” About WatchGuard Application Control: WatchGuard Application Control is a fully integrated security subscription for all WatchGuard XTM appliances. It enables IT administrators to monitor and control access to web and business applications to enforce policy, and protect productivity and network bandwidth. Only WatchGuard delivers this unprecedented level of application control in an affordable, all-in-one network security solution. http://www.watchguard.com/docs/brochure/wg_application-control_ds.pdf About WatchGuard Technologies, Inc. Since 1996, WatchGuard' Technologies, Inc. has been the advanced technology leader of business security solutions, providing mission-critical protection to hundreds of thousands of businesses worldwide. The WatchGuard family of wired and wireless unified threat management appliances, messaging, content security and SSL VPN remote access solutions provide extensible network, application and data protection, as well as unparalleled network visibility, management and control. WatchGuard products are backed by WatchGuard LiveSecurity' Service, an innovative support, maintenance, and education program. WatchGuard is headquartered in Seattle and has offices serving North America, Europe, Asia Pacific, and Latin America. To learn more, visit http://www.watchguard.com/.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-3350
PUBLISHED: 2019-11-19
masqmail 0.2.21 through 0.2.30 improperly calls seteuid() in src/log.c and src/masqmail.c that results in improper privilege dropping.
CVE-2011-3352
PUBLISHED: 2019-11-19
Zikula 1.3.0 build #3168 and probably prior has XSS flaw due to improper sanitization of the 'themename' parameter by setting default, modifying and deleting themes. A remote attacker with Zikula administrator privilege could use this flaw to execute arbitrary HTML or web script code in the context ...
CVE-2011-3349
PUBLISHED: 2019-11-19
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
CVE-2019-10080
PUBLISHED: 2019-11-19
The XMLFileLookupService in NiFi versions 1.3.0 to 1.9.2 allowed trusted users to inadvertently configure a potentially malicious XML file. The XML file has the ability to make external calls to services (via XXE) and reveal information such as the versions of Java, Jersey, and Apache that the NiFI ...
CVE-2019-10083
PUBLISHED: 2019-11-19
When updating a Process Group via the API in NiFi versions 1.3.0 to 1.9.2, the response to the request includes all of its contents (at the top most level, not recursively). The response included details about processors and controller services which the user may not have had read access to.