Study Finds IE7 + EV SSL Won't Stop Phishing 84
An anonymous reader writes "Stanford University and Microsoft Research have published a study that claims that the new Extended Validation SSL Certificates in IE7 are ineffective (PDF). The study, based on user testing, found that EV certificates don't improve users' ability to detect attacks, that the interface can be spoofed, and that training users actually decreases their ability to detect attacks. The study will be presented at Usable Security 2007 next month, which is a little late now that the new certificates are already being issued."
Re: (Score:2)
Re: (Score:2)
it goes something like this:
sudo apt-get.....
or
sudo yum....
Re: (Score:1)
Re: (Score:2)
This is really not accurate a
Re: (Score:1)
So the multi-billion-dollar monopolist has finally matched the efforts of a rag-tag team of hackers who just wanted to play nethack on their pee-see.
Yaaaay, Microsoft!
Re: (Score:2)
You're not counting all the reports published by Linux distributors against any of the thousands of programs that make up an average Linux distribution against all the reports Microsoft publishes against the core Windows OS, are you? MS Word alone has 3 or 4(?) unpatched vulnerabilities atm., iirc.
This really isn't an IE problem (Score:4, Insightful)
Re: (Score:3, Funny)
Did you even read the summary?
that training users actually decreases their ability to detect attacks
With user training they are even more worthless!
Re:This really isn't an IE problem (Score:4, Interesting)
If you read the paper the actual "worse when trained" only referred to sites where the phising toolbar notification was not displayed and not really as a function of EVA;
and really, reading a help file is hardly trainingRe: (Score:2)
As they say, a fool and his money are soon parted. If you get scammed by a phisher, I've got not pity for you. And mayb
Re: (Score:2)
Re: (Score:3, Insightful)
And in some cases its possible to overwrite the address bar. In others its possible to corrupt DNS caches. There are subtle mispellings that are tricky to catch, and new domain names that look legit but aren't, like www.paypalsecurity.com (PayPal pays companies like Cyveillance to monitor for such bogus registrations). And whule it hasn't happened yet to my knowledge, the real coup will be gaining control of the DNS rec
Re: (Score:2)
No, I think the gist here is that people need to be at least somewhat responsible for their personal information. For example, if I get mugged when walking around in a bad neighborhood at night while wearing my finest leather coat, then I do share some responsibility. I should know better and take reas
Re: (Score:2)
Of course on the other hand, the four colour glossies have told every user so many times that it was easy, and safe, and secure, and whatnot, that a lot of them probably believe it by now.
I sometimes think the ones who are the most to blame are the marketing and IT companies. They are the ones who systematically work at convincing gullible users that the broken products they peddle are easy
Re:This really isn't an IE problem (Score:5, Insightful)
Re: (Score:1)
Re: (Score:2)
Why? Why, you ask?
Ask why every geek doesn't have ANY common sense.
Everything is a "technical problem" to a geek - and the only thing that matters is a "technical solution" - not whether the "solution" is actually worth a shit to anybody else being forced to use it.
Just "solve it" and move on to the next "interesting technical problem."
This - along with human nature - is why the greatest philosopher of the 20th Century, Woody Allen, once summed up the human condition - which applies doubly to the IT industr
How do you initiate a Picture in Picture attack? (Score:3, Interesting)
Let us imagine that we have an email message that takes us to a phishing site. But instead of taking us to a Web page we get a web page within the Web page. Is the user likely to notice? I suspect so.
The experiments don't test that scenario, instead they test the scenario where the user has a browser open with a PIP browser already there. This is a rather easier lay
Re: (Score:1)
With user training they are even more worthless!
The real problem is that users look at the lock or the green bar only when reminded to do so. Phishing sites don't remind them, and most of them use no cert at all.
This will NOT protect anyone, and will cost folk a fortune. We've always used certs in the $35-$40 range; I guess now we'll be using certs costing ten times that much :( .
With no real benefit.
Jeff
Re: (Score:1)
Re: (Score:1)
On the other hand, the "homograph" attack (Fig 5) where the attacker spawns a window with all the adorners hidden and provides their own copies of the URL field, etc... is already addressed in Safari which uses the window title bar itself to display the "lock icon". If the indicator is in a part of the "chrome" where the content can never be, it's much harder to spoof... (it's surprising that the article doesn't suggest such an approach as a solution to this).
Isn't a homograph attack where the URL is visually similar to the legitimate site (such as www.paypa1.com instead of www.paypal.com). In this case, the problem is not the fact that the "lock icon" or any of the other extended validation is part of the "chrome", but that the font used to render the URL can also be used to render visually similar URLs. As far as I am aware, with IE7, an address bar (and the SSL information) is always shown on popup windows negating the attack you described.
Re: (Score:1)
#5 of the "Six Dumbest Ideas in Computer Security" (Score:2)
So called "User Education" is a silly idea. Simply put as the editorial highlights, if it was going to work, it would have worked by now. On the other hand this seems like an issue with IE itself where IE should never be asking "Is this okay?" in the first place.
On the one hand, users shouldn't be doing this and falling prey to phishing. On the other hand, why is IE enabling it to happen? Throwing up another "Do you want to do this? Yes/No
Re: (Score:2)
Protect your information (Score:3, Interesting)
Always ask yourself why they need it, and do you trust them to secure your information.
In Canada right now their are two separate [www.cbc.ca] credit card [www.cbc.ca] breaches under investigation. This isn't even a phishing thing, this is just plain old sloppy security.
I suspect that there are many other breaches that haven't been detected and or reported. So I strongly recommend that you refuse to give out personal information to these locations. Don't sign up for rewards cards, don't let them collect your address, and phone, and SSN, when you buy a t-shirt. They don't need it! And I don't trust them.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
I concur. I always give out false addresses whenever some website asks for mine.
On an unrelated note, has anyone noticed how slow Amazon are in delivering things?
Re: (Score:2)
A while back at the grocery store, I was offered the loyalty card. The cashier handed me a card and an application and said "fill this out at home and mail it in". Since I already had the card, I didn't bother mailing anything in, and the card is still working three months later. They can track my purchases, but only to an anonymous number. Of course, I pay with my credit card so they already have my name anyway ...
Re: (Score:1)
Re: (Score:3, Funny)
Re: (Score:2)
The best thing you can do is never give out your information. Protect it like you're a secret agent. Protect it against torturous interrogation. Protect it to point of taking that suicide pill hidden as the third button on your shirt.
Always ask yourself why they need it, and do you trust them to secure your information.
In Canada right now their are two separate [www.cbc.ca] credit card [www.cbc.ca] breaches under investigation. This isn't even a phishing thing, this is just plain old sloppy security.
I suspect that there are many other breaches that haven't been detected and or reported. So I strongly recommend that you refuse to give out personal information to these locations. Don't sign up for rewards cards, don't let them collect your address, and phone, and SSN, when you buy a t-shirt. They don't need it! And I don't trust them.
In that light, here are some handy tools for the justifiably paranoid:
Of course, if you're too paranoid to use option 4, just keep all your cash in your mattress and buy prepaid credit cards when you want to shop online.
what and who. (Score:2)
But your advice is correct: do
User Education (Score:5, Insightful)
Any problem that relies solely on user education/training is doomed to failure because most users don't care or don't want to be trained. They just want it to work
Re: (Score:1)
Re:Microsoft final Monopoly (Score:1)
I am sure Microsoft would be happy of your proposal
Basically what you say is to give Bill Gates the key of the entire Internet (since the web is the internet now)
Let's Stop and Think Moment (Score:1)
Or you're teaching skills are worth absolute *shit*
Re: (Score:2)
Did you bother to RTFA? The teaching skills aren't the problem. The training the people went through was basically reading the on-line docs that come with IE7 since that's all the training the vast majority of users will ever have access to. It's the poorly written on-line help that is the problem. The on-line docs apparently say something to the effect of "this is what a phishing site will look like", so that's what the users expect to see when they vi
Re: (Score:2)
Just look up the definition of stupid. "Lacking ordinary quickness or keenness of mind". Meaning they either don't know how to learn the skills or simply don't care and ignore their teacher. You meet a lot of these people. Getting angry at the teacher might be justifiable, but as long as the information is presented, and the student wants to learn, there will likely be some skills picked up.
Don't buy them (Score:1)
No shit. Really? (Score:5, Informative)
These "EV certificates" are a joke. If you've been in the industry 5 years or more, you know that the pitch surrounding these certs is 100% identical to the pitch used to sell regular, commercial-CA-signed certs 5 years ago.
Users are right to be confused. When connecting to "consumer" applications from home they might see the IE green bar, but then they go to work and get used to seeing the IE red bar to connect to all their partners' "B2B" websites all day. (Lots, if not most companies seem to use self-signed certs or give out IP addresses to connect to rather than hostnames that match with a valid CA-signed cert for business-to-business web applications.)
Re: (Score:1)
Most B2B shops i know here in switzerland use a cert signed by a well-known CA.
However, most internal IT like webmail (Outlook Web Access or Lotus), etc. uses internals CAs, which are only recognized on managed machines (Active Directory, Novell, whatever).
You mean to tell me (Score:1)
Re: (Score:1)
Nothing is secure! (Score:4, Informative)
Re: (Score:2)
Re: (Score:2)
They? They? I think you'll find that the reason all of this is insecure is that the companies have worked hard and long to protect themselves against their own stupidity. Just try suing a bank for giving out a loan in your name to an impersonator and ruining your credit record. Hell, try suing the credit bureaus for telling the bank that some criminal was you, or for continuing to damage your reputation by leaving these things on your record for years af
Re: (Score:2)
One of the problems with it from the American Fascist perspective is it implements some security features that would change the way they collect data about idividual banking activities. Spying on your citizens on a national scale is tricky IT busin
Re: (Score:2)
Phishers and scammers are not detered by "strong" passwords.
Asking for and receiving a password via phishing or scamming is just as easy for a password that is one character between and a million characters. Even with special characters, upper lower case, whatever.
Re: (Score:2)
1. I am worried about security. Please make me jump through hoops before logging in. I am tech savvy. Tough authenticaion? Bring it on.
2. I am not a very tech savvy customer. Please make it easy to log in.
Why look at it purely from Fidelity's point of view? What about the customer whose account gets compromised and has to jump through the hoops to get the account and money restored? I suspect you do not m
One-sided study (Score:2)
Re: (Score:2)
You must be new here...
*sigh* (Score:4, Interesting)
What's unfortunate here is that since Microsoft, via IE7, made the attempt to protect users from phishing, now they have some degree of responsibility to fix what they never can. Don't claim that you will fix something if you cannot.
Re: (Score:1)
So, if many of you argue this problem as an educational one, you're only partly right. It's also a problem of abse
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
Re: (Score:1)
Should you need higher assurance, check out StartCom's Class 2 certificates or the Web-of-Trust [startssl.org] where a notary must be Class 2 validated to start with...And certainly no extortion there...
SSL or EV? (Score:1)
PayTrust handles it right... image gallery (Score:1)
They recently implemented an excellent anti-phishing measure: An image and a phrase.
They had a gallery of 100+ images. I chose a specific one -- an image of mars. They also gave you a phrase. I chose "ALL HAIL XENU!!".
Now, it asks for username
Oh, man, it doesn't get better than this! (Score:2)
Now you can't even TRAIN users to use Windows securely!
Oh, this is too much! I'm crapping on myself laughing!
Somebody put Microsoft out of business NOW! Please!
Protection Racket (Score:1)
9 test subjects is not nearly enough (Score:1)