Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/27/2011
11:39 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

WatchGuard: Worst Applications For Security

The fastest-growing threat to corporate networks is Web-based social media applications

SEATTLE (January 25, 2011) – WatchGuard Technologies Highlights / News Facts: According to WatchGuard security researchers, the fastest growing threat to corporate networks is web-based social media applications. These applications can seriously compromise network security, expose sensitive data, and create productivity drains on employees. There are many reasons why social media applications can pose risk to any size business. Here are a few:

* Productivity Loss: Various research organizations have reported that the United States loses billions of dollars a year due to lowered productivity, as a result of time sinks such as social media sites. Although social media sites can be used for collaboration and rich communications, IT administrators often lack the ability to manage and control business productivity web applications vis-a-vis gaming web applications. * Data loss: With most US states enacting mandatory data breach disclosure laws, businesses are increasingly concerned about data leakage, whether accidental or malicious. Unfortunately, the attributes that make social media sites a fantastic communication medium also make them a potential risk for information and privacy leakage. By having application control capabilities, administrators reduce risks associated with accidental as well as malicious data loss. * Malware and Attack vector: WatchGuard predicts that social networks will become the leading malware vector over the next few years for three reasons:

1. Social media sites breed a culture of trust. The whole point of social media is to interact with others. Typically interactions are with people considered to be “friends”, which implies trust. Meanwhile, social media sites do not have any technical means to validate that the people you are interacting with really are who they say they are. This environment of trust creates an ideal scenario for social engineers to utilize. 2. Many Social media sites suffer from technical vulnerabilities. While Web 2.0 technologies provide many benefits, they also harbor many security vulnerabilities. The complexity of Web 2.0 applications can lead to imperfect code, which introduces some social network sites to Web application vulnerabilities, such as SQL injection and cross-site scripting (XSS) attacks. Furthermore, the whole concept of allowing untrusted users to push content onto social media sites conflicts with traditional security paradigms. Simply put, this means social media sites are more likely to suffer from web vulnerabilities than less complex and less interactive web sites. 3. Hugely Popular. According to online analytics firm, Compete, Facebook is now the 2nd most popular Web destination after Google. Many other social networks, such as Twitter and YouTube, follow closely behind. Attackers are attracted to this popularity because they know it means that they can get “return on investment” for their attacks.

For these reasons, the following applications are deemed to be the most risky according to WatchGuard research:

1. Facebook: Facebook is surely the most dangerous social media site today, largely based upon its popularity. With a 500+ million user following, Facebook offers a fertile attack surface for hackers. Add in the potential technical concerns, such as a questionable, open App API and now you have a recipe for disaster. 2. Twitter: One would assume that very little damage could be done in 140 characters, but this is an incorrect assumption. In some cases, Twitter’s short form posts lead to new vulnerabilities such as URL shorteners. While URL shorteners can help save space in Twitter posts, they can also help hackers hide malicious links. Furthermore, Twitter suffers from many Web 2.0 and API related vulnerabilities that allow various attacks and even Twitter worms to propagate among its users. 3. YouTube: Because it is one of the most popular online video sites, attackers are drawn to targeting YouTube. Hackers often create malicious web pages that masquerade as YouTube video pages. Additionally, attackers like to spam the comment section of YouTube videos with malicious links. 4. LinkedIn: LinkedIn bears more burden than other social media sites; it is business oriented. Thus, it makes a more attractive target to attackers, as LinkedIn is highly trusted. Because most users leverage LinkedIn to form business relationships or find jobs, they tend to post more valuable and potentially sensitive information to this social network. 5. 4chan: 4chan is a popular image board, a social media site where users post images and comments. 4chan has been involved in many Internet attacks attributed to “anonymous,” which is the only username that all 4chan users can obtain. Some of 4chans image boards contain the worst depravities found on the Internet. Many hackers spam their malware to the 4chan forums. 6. Chatroulette: Chatroulette is an up-and-coming site that allows webcam owners to connect and chat with random people. The nature of this anonymous webcam system makes it a likely target for Internet predators.

Keywords: Network security, Facebook, WatchGuard, Application Control, LinkedIn, Twitter, YouTube, 4chan, Chatroulette, hackers, social networks, security attacks, social media, predators, Internet Quotes: “Now more than ever, businesses need security tools to manage the myriad of web applications that flow in and out of corporate networks,” said Eric Aarrestad, Vice President of Marketing at WatchGuard. “With WatchGuard Application Control, administrators can selectively allow, block, or restrict access to applications based on a user’s department, job function, and time of day, and generate reports on usage. This keeps unproductive, inappropriate, and risky applications off-limits.” About WatchGuard Application Control: WatchGuard Application Control is a fully integrated security subscription for all WatchGuard XTM appliances. It enables IT administrators to monitor and control access to web and business applications to enforce policy, and protect productivity and network bandwidth. Only WatchGuard delivers this unprecedented level of application control in an affordable, all-in-one network security solution. http://www.watchguard.com/docs/brochure/wg_application-control_ds.pdf About WatchGuard Technologies, Inc. Since 1996, WatchGuard' Technologies, Inc. has been the advanced technology leader of business security solutions, providing mission-critical protection to hundreds of thousands of businesses worldwide. The WatchGuard family of wired and wireless unified threat management appliances, messaging, content security and SSL VPN remote access solutions provide extensible network, application and data protection, as well as unparalleled network visibility, management and control. WatchGuard products are backed by WatchGuard LiveSecurity' Service, an innovative support, maintenance, and education program. WatchGuard is headquartered in Seattle and has offices serving North America, Europe, Asia Pacific, and Latin America. To learn more, visit http://www.watchguard.com/.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Lessons from COVID-19 Cyberattacks: Where Do We Go Next?
Derek Manky, Chief of Security Insights and Global Threat Alliances, FortiGuard Labs,  7/2/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-3931
PUBLISHED: 2020-07-08
Buffer overflow exists in Geovision Door Access Control device family, an unauthenticated remote attacker can execute arbitrary command.
CVE-2020-15600
PUBLISHED: 2020-07-07
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
CVE-2020-15599
PUBLISHED: 2020-07-07
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
CVE-2020-8916
PUBLISHED: 2020-07-07
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to res...
CVE-2020-12821
PUBLISHED: 2020-07-07
Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.