2007 in Security 50
An anonymous reader wrote in to say that "Heise Security did a year end review — for the upcoming year 2007. In their crystal ball they see P2P bots, (almost) crashing stock exchanges, dropping prices for zero day exploits and private mails of gmail users published on the google search engine." Speculatory and amusing.
private mails on google search engine (Score:5, Funny)
Oh noes! Everyone can see my spam now!
Re:Even worse: (Score:5, Funny)
Quartermaster Clerk: One Swedish-made penis enlarger.
Austin Powers: That's not mine.
Quartermaster Clerk: One credit card receipt for Swedish-made penis enlarger signed by Austin Powers.
Austin Powers: I'm telling ya baby, that's not mine.
Quartermaster Clerk: One warranty card for Swedish-made penis enlarger pump, filled out by Austin Powers.
Austin Powers: I don't even know what this is! This sort of thing ain't my bag, baby.
Quartermaster Clerk: One book, "Swedish-made Penis Enlargers And Me: This Sort of Thing Is My Bag Baby", by Austin Powers.
Re: (Score:2)
doesn't make a l
So... (Score:5, Insightful)
Yep, sounds like business as usual to me...
Re: (Score:1, Insightful)
Pay us more to protect your crap, keep us out of meetings, don't argue with us when we tell you your code is broken, let us build stuff that isn't a patch fix to the problem. Then you'll see security that surpasses the attacks we build to keep ourselves sane on the clock and after work.
and a happy new year (Score:1)
Re: (Score:2)
Terrorism IS porn - for some of us.
Vista (Score:5, Insightful)
Other than that, I think existing trends will continue. More development will be shifted from unsafe languages like C and C++ to Java, the
Re: (Score:2)
I'm not sure how enforceable the ClassPath exception is with Java, tho
Re:Vista (Score:5, Insightful)
Where there are fewer mistakes they can make; buffer overflows, memory leaks, and even, to some extent, injection vulnerabilities are common in C and C++ programs, but rare or absent in Java, C# and VB.NET programs.
``and continue to promote needless vendor lock-in, much to the dismay of the the open source community."
It's not as bad as it used to be. Java is being open source, and there are various implementations of
Vishfull thinking .. (Score:1, Interesting)
It's a tribute to the MS marketing department that the emergence of Vista is seen as a big security event. All the security features in Vista have already been inplimented in the other Operating Systems. The signed drivers feeture has already been hacked [com.com].
User Account Control: aka as SuDO under nix.
Protected mode Internet Explorer: on nix the browser runs as standard user and can only access the users home directory.
Windows De
Re: (Score:2)
It's a tribute to the MS marketing department that the emergence of Vista is seen as a big security event. All the security features in Vista have already been inplimented in the other Operating Systems.''
That's irrelevant in this case; what matters is that, in 2007, many more systems will have these features than in 2006.
``User Account Control: aka as SuDO under nix.''
Re: (Score:2)
Re: (Score:1)
> event. All the security features in Vista have already been inplimented in the other Operating
> Systems.
The difference is that people actually use Windows, which means that making it more secure would mean a decrease in the number of security problems. You'll probably see the next year or so featuring more attacks on the less popular OSs.
Re: (Score:2)
Re: (Score:2)
Don't get your knickers in a twist, but most other platforms haven't been caught with their pants down so readily.
Most notable is SlackSware Linux.
Sorry, I'll keep it shorts: I could not resist after seeing FTFA:
The brain was primed after that.
I know Brits spell things f
Re: (Score:3, Informative)
Other than that, I think existing trends will continue. More development will be shifted from unsafe languages like C and C++ to Java, the .NET languages, and the popular languages from the open source community. Exploits will continue to shift from buffer overflows and integer overruns to logic errors and injection vulnerabilities. More attacks will target web browsers. With increasing adoption of Unix-like OSes, perhaps we will see some exploits for these run wild, too.
Saying a language used to program
Re: (Score:2)
And like cars, some programming languages / runtime environments have better security features than others.
You are correct in that any errors in my code are, at the core, my fault, and not the fault of my development environment. But so what? Back her
Re: (Score:2)
I agree with everything you said. I too used to be quite the coder in C/C++, some big projects too. It comes down to having the time, the focus the management support but most errors can be removed. Not all mind you, just most. But many software coding places are slam it out, damn the torpedoes and make $$$ as fast as possible. Patch later... customers don't care they get a product that is full of holes...
Times will change though. Companies that don't write securable code and designs will eventually f
Re: (Score:1)
Re: (Score:2)
I'd like to think that Vista does dramatically improve security. Lord knows, there is room for dramatic improvements. But Microsoft is not loudly trumpeting improved Vista security as they (mistakenly) did Windows XP security. That leads me to believe that their own assessment might well be that
Re: (Score:2)
I think the big thing to happen to security in 2007 is Windows Vista. With increasing adoption, we will really get to see whether all the rewrites, new features, and bugfixes dramatically improve security...
(Emphasis added)
You must have missed the memo. Gates' pet "rewrite the kernel as managed code" project lunacy was written off after three years' work back in 04. (the reset [google.co.uk].) Mini-Microsoft said it was 12,000 man-years of work that was simply written off. I suppose it's a good thing (for Microsoft) that they retain the ability to recognise the writing on the wall and not subject the OS group devs to the deathmarch to end all deathmarches...
The Vista kernel currently pouring down the channel from Redm
This is great news! (Score:4, Funny)
Screw the rest of the world, if those would go away I'd consider 2007 a success.
Specula... (Score:1)
Re: (Score:2)
SFTI (Score:1)
re: 2007 in Security (Score:2, Insightful)
Re: (Score:1)
Re: (Score:2)
No, the key is to make the ISPs legally liable for preventing the viruses getting on/off your desktop and making an OS that don't get viruses from clicking on a URL or opening an attachment.
Re: (Score:3, Informative)
"Educating these users of what their Windows boxes may be barfing out 24/7 is they key to correcting the problem"
No, the key is to make the ISPs legally liable for preventing the viruses getting on/off your desktop and making an OS that don't get viruses from clicking on a URL or opening an attachment.
Making ISPs legally liable for viruses and regulating a users software is just one step closer to having "Big Brother" control our lives (this is one of MS's favorite games). I don't want my bandwidth throttled for packet inspection due to legalities caused by some other idiot surfing a pron site and blaming his ISP for the resulting problems. BTW, that OS you are talking about (that don't get viruses from clicking a URL...) is called Unix.
Re: (Score:2)
It isn't as if Big Brother isn't already reading out e-mails is it.
"I don't want my bandwidth throttled for packet inspection due to legalities caused by some other idiot surfing a pron site and blaming his ISP for the resulting problems"
Don't need to inspect your packets. Set up an organization that monitors the sources of spam and then informs the ISP. If the ISP takes no action then they can be fined or disconnected until they do take
Re: (Score:1)
Don't need to inspect your packets. Set up an organization that monitors the sources of spam and then informs the ISP. If the ISP takes no action then they can be fined or disconnected until they do take action. That would enthuse them greatly to take action against spam.
Yes, that would probably get the ISPs attention. As for the monitoring agency - that would be a full-time job requiring endless resources and storage databases, possibly equivalent to the CIA.
one of the simplest solutions is to block outgoing on port 25.
Blocking outgoing on port 25 is fine for the average home user (zombie bot central), but for us others it would cause unacceptable problems.
Re: (Score:2)
Not requiring endless resources, something like Spamhaus running in a number of centers. It would have real powers to deal with the worst offenders. Don't you think we need one by now. For me e-mail is becoming almost unusable, I have to selectively browse the subject line in each msg to make sure I don't miss any
Re: (Score:1)
Amusing? Try ridiculous. (Score:1)
Re: (Score:2)
Re: (Score:1)
& UNIX is BAD because it is OLD (Score:2)
So why is it that with security issues of all types, I do NOT see articles about why "UNIX is BAD".
Why is not the computer media in general noting more of the reason why choices involving UNIX variants are good.
We have had some very smart, very well thought out programming and systems which went into and then advanced UNIX, and it has now stood the test of time very very well, but a supermajority of mainstream PC press is simply a fan club for the
Re: (Score:2, Insightful)
Far Fetched (Score:2)
Some of this stuff seems a bit far-fetched:
While in 2006, DDoS attacks with botnets were mainly targeted at unwanted competitors, online betting offices and consumer protection sites, 2007 also saw large attacks launched on critical infrastructures. In April, the stock exchange nearly crashed, when a DDoS attack on the electronic trading system disconnected it from the Internet for several days, resulting in automated control programs loosing control and attempting to divest shares in a panic reaction.
Re: (Score:1)
But while I agree that the number of zombies may decline, I don't think the number of attacks will do so. This only means, that an infected PC is "worth" more and the bad guys will put more effort into staying unnoticed and keeping control. We already see that trend in the latest botnet clients like Spamthru: decentralized control infrastructure is beeing built, rootkits are used, rivals are removed and so on
bye, ju
And yes -- I am
Amazing (Score:1)
Google, security, data, 2007 and beyond (Score:1)