Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

11/18/2011
12:40 PM
Grant Moerschel
Grant Moerschel
Commentary
Connect Directly
Twitter
RSS
E-Mail
50%
50%

App Freedom Vs. Corporate Security

IT has to walk a fine line when securing user-owned mobile devices.

You can't prevent employees from snapping up iPads and Droid phones, even if you wanted to. Sixty-five percent of respondents to our InformationWeek 2011 Mobile Device Management and Security Survey predict that the number of employee-owned devices accessing company data will increase. What you can do is use your leverage when they want to connect to business systems by asking them to run mobile device management (MDM) software, which can enforce corporate policies and provide features such as device tracking and remote wiping.

Even though it's a fair trade, IT must still tread carefully, because the enterprise is permitting access by a device it doesn't own. A key challenge is to craft policies that provide adequate security assurance while at the same time respecting the owner's personal application and usage choices. After all, users who shell out hundreds of dollars for slick new tablets are going to install whatever applications they want.

The tension between ownership and protection often boils over when IT tries to push policies that whitelist or blacklist apps in response to attackers unleashing malicious software that targets mobile platforms.

Dangerous Markets

This problem is particularly acute for Android, which has an enormous user base and a flexible app market. Tim Wyatt, principal security engineer at Lookout Mobile Security, says Android's open application distribution model allows apps to be pulled from multiple markets--including repackaged versions of legitimate apps. Malware is also on the Android Market itself. For example, according to Lookout's research, when DroidDreamLight emerged as a threat, it was found to be repackaged in 20 utility, nine porn, and five game apps in the Android Market. To make matters worse, the Android model relies on a user's ability to evaluate the permissions an app is requesting at install time.

Apple imposes stricter control over its own app market, but it's not a foolproof system. For instance, security researcher Charlie Miller developed a proof-of-concept malware app, called InstaStock, that made it into Apple's App Store--at least for a limited time.

So what's an IT policymaker to do? Risk-averse organizations will likely insist on tight policies that include app whitelisting and accept that they'll get pushback from users. Those with more liberal policies or that offer personal-device access to only nonsensitive data may elect to sidestep the issue, for now. Our advice: No matter your policy, use an app malware detection system, available from vendors such as McAfee, Symantec, and smaller players such as Lookout, that can be pushed as a mandatory installation via an MDM platform.

As with conventional antivirus packages for PCs, vendors for mobile platform AV must be able to demonstrate accurate detection and fast updates. If something is discovered, anti-malware systems should warn IT. Most MDM systems will allow you to quarantine an infected device until it's remediated.

Grant Moerschel is co-founder of WaveGard, a consulting firm. Write to us at [email protected].

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11976
PUBLISHED: 2020-08-11
By crafting a special URL it is possible to make Wicket deliver unprocessed HTML templates. This would allow an attacker to see possibly sensitive information inside a HTML template that is usually removed during rendering. Affected are Apache Wicket versions 7.16.0, 8.8.0 and 9.0.0-M5
CVE-2020-13179
PUBLISHED: 2020-08-11
Broker Protocol messages in Teradici PCoIP Standard Agent for Windows and Graphics Agent for Windows prior to 20.04.1 are not cleaned up in server memory, which may allow an attacker to read confidential information from a memory dump via forcing a crashing during the single sign-on procedure.
CVE-2020-8918
PUBLISHED: 2020-08-11
An improperly initialized 'migrationAuth' value in Google's go-tpm TPM1.2 library versions prior to 0.3.0 can lead an eavesdropping attacker to discover the auth value for a key created with CreateWrapKey. An attacker listening in on the channel can collect both 'encUsageAuth' and 'encMigrationAuth'...
CVE-2020-9244
PUBLISHED: 2020-08-11
HUAWEI Mate 20 versions Versions earlier than 10.1.0.160(C00E160R3P8);HUAWEI Mate 20 Pro versions Versions earlier than 10.1.0.270(C431E7R1P5),Versions earlier than 10.1.0.270(C635E3R1P5),Versions earlier than 10.1.0.273(C636E7R2P4);HUAWEI Mate 20 X versions Versions earlier than 10.1.0.160(C00E160R...
CVE-2020-9403
PUBLISHED: 2020-08-11
In PACTware before 4.1 SP6 and 5.x before 5.0.5.31, passwords are stored in a recoverable format, and may be retrieved by any user with access to the PACTware workstation.