Web 2.0 Threats and Risks for Financial Services 56
An anonymous reader writes "Companies are tuning into Web 2.0 but are simultaneously exposing their systems to next generation threats such as Cross site Scripting, Cross Site Request Forgery and Application interconnection issues due to SOA. With regard to security, two dimensions are very critical for financial systems — Identity and Data privacy. Adopting the Web 2.0 framework may involve risks and threats against these two dimensions along with other security concerns. Ajax, Flash (RIA) and Web Services deployment is critical for Web 2.0 applications. Financial services are putting these technologies in place; most without adequate threat assessment exercises."
Lessons from the past - Nobody really cares (Score:1, Interesting)
The lesson learned from that is that NOBODY cares. Even after they've been bitten (and sometimes bitten badly, with identify theft, and serious banking repercussions), they still want to use Windows. They prefer the Devil that they know, over some
Re: (Score:1)
Yeah. A big animated Flash logo. How can you possibly deploy a usable web service without a dancing logo?
(Obligatory) Nothing to see here. Move along.
honestly... (Score:4, Insightful)
keep it simple. for such ordinary tasks there does not have to be great interaction schemes or whatever comes to your mind. it just has to freaking work. and - it's even more secure the simple way? well, then don't tamper with it.
Re: (Score:3, Insightful)
Likewise the web presence. Whenever I see data change without a page load it creeps me out. It may be sexy looking, but for every piece of flashy 2.0 Ajax, there is a cost in terms of security.
Sad to say though, there are people out there who are so conditione
Re: (Score:2)
Sadly, my bank's ATM comes from Diebold, the famous company that we all know, and yes, there's no points for guessing that it runs on windows. I've seen it crash atleast a dozen times with BSODs and funny looking dialogs. I am farely sure that these machines can be reverse engineered, and I prefer using their web interface, which from the headers run on iplanet/solaris. Still I guess I co
Re: (Score:3, Informative)
Depending on your exact meaning of "old", you might be very, very wrong. Many ATMs do, in fact, run Windows [google.com].
Re: (Score:2)
In my mind, that's just obscene. When I talk about old, I mean super simple code, plain text on a black background, push this for your money, the end. Very simple. Practically unhackable. But build it on Windows, even tossing aside all the known problems with Windows, is HUGELY stupid. You're addin
Re: (Score:3, Insightful)
Now could someone please explain to me what cross site scripting is and why it is so hard to stamp it out.
Re: (Score:1)
Re: (Score:2)
Re: (Score:1)
For example, if an attacker hosts a malicious website, which contains a link to a vulnerable page on a client's local system, a script could be injected and would run with privileges of that user's browser on their system
1. Alice often visits a particular website, which is hosted by Bob. Bob's website allows Alice to log in with a username/password pair and store sensitive information, such as billing information.
2. Mallory observes that Bob's website contains a reflected XSS vulnerability.
3. Mallory crafts a URL to exploit the vulnerability, and sends Alice an email, making it look as if it came from Bob (ie. the email is spoofed).
4. Alice visits the URL provided by Mallory while logged into Bob's website.
5. The malicious script embedded in the URL executes in Alice's browser, as if it came directly from Bob's server. The script steals sensitive information (authentication credentials, billing info, etc) and sends this to Mallory's web server without Alice's knowledge.
Re: (Score:1)
One of the limits on active content (mostly Javascript, but it also applies to some others) is, that a script can only access pages originating from the same server. So a script from server A can change a picture or hide parts of a page which is also from server A, but it is not allowed to do that to stuff comming from server B.
A cross site scripting vulnerability now enables an attacker to do exactly
The real problem (Score:5, Insightful)
Re: (Score:2, Interesting)
Fuck it, I'm an old fart and I know it. I'm sure next time I c
Re:The real problem (Score:5, Insightful)
The real problem with TFA becomes apparent at the start of the second page:
That sentence alone confirmed what I'd been beginning to suspect by the end of the first paragraph: TFA is a mishmash of ill-informed technobabble penned for the purpose of allowing underqualified CTOs to give the impression that they are fully buzzword-compliant.
Re: (Score:2)
Re:The real problem (Score:4, Informative)
Re: (Score:2)
the only way to really prevent XSRF, that i can see, is having browsers disallow inter-domain POST requests, and making sure all important transactions must be initiated via a POST and not GET request.
Re: (Score:1)
I've said it before, I'll say it again: we went through the same thing with Windows 95+ and Outlook.
Masses: "Ooooo look at the shiny features!"
tiny voice in the distance: "But it's a security nightmare!"
Masses (louder): "Ooooo look at the shiny features!"
Unfortunately They are only part of the probl
set up a separate account (Score:2)
Re: (Score:2)
Re: (Score:2)
Yes, that's the case you need to be concerned about.
not the site itself.
How would the banking sites be vulnerable? They don't allow any kind of user content to be uploaded.
Re: (Score:2)
what i'm not confident about is the competency of the developers that put together the site i'm browsing.
Re: (Score:2)
It doesn't matter how competent/incompetent the banking developers may be, banking sites just don't have uploadable content.
Therefore, the XSS attacks you have to worry about (and the only ones you can control anyway) are the ones that use your browser. Those are real and often go undetected for a while before a patch becomes available.
Re: (Score:2)
pretty much every web-app has uploadable content. any time you fill out a form you're uploading content. every just by modifying the GET params, you could be uploading content that will display on the web page.
but that's not XSS [wikipedia.org], that's just a browser vulnerability. they do exist but i cant think of any cases i've heard of in the past that have had a chance at affecting me. XSS, o
Re: (Score:2)
Yup, but banking apps only show you what you have uploaded.
but that's not XSS, that's just a browser vulnerability.
Well, if a bug in your browser permits third party to be uploaded onto your bank's site (something fairly harmless in itself), then you may have a dangerous XSS. Using a separate account
The great web 2.0 (Score:1)
http://news.com.com/AJAX+gives+software+a+fresh+lo ok/2100-1007_3-5886709.html [com.com]
This is a little over two years ago, on the subject of Ajax...and Web 2.0/ other buzzwords/works seem to be plugged more on technological forums/media...Who wouldn't want to be hip..Especially when your information's rep
Web 2.0 not necessary for banks (Score:2, Insightful)
Why is this even being considered?
please buy my security solution .. (Score:4, Insightful)
Re:please buy my security solution .. (Score:5, Insightful)
I was there when a certain bank that better remains anonymous (not because of being innocent, but because they got more & better lawyers than me) jumped the train for online business. All the managers saw how much work could be put onto the customers and how much we can save by not having people come in and actually talk to the teller or drop transfer orders in our boxes. They'd do all themselves! And we can charge them for that! Good God, we need that! No matter the cost! Security? Aw heck, ignore that, who'd dare to attack a bank here (Seriously, that was actually the attitude towards it)? And even, what could go wrong? We got https, we got security certificates, our servers are kept tight by the best people money can buy...
The average annual damage for actual physical bank robberies is a tiny fraction by now of what online frauds cause. Especially since you get about 90-95% of the guys that come with a gun to your bank, while 90-95% of those coming online slip past you.
And now everyone's all over security and everyone wants it secure damn right now or else.... But you can't secure something that is inherently insecure. It was designed insecurely, it was created insecurely, it's run insecurely. Yes, the key attack point is the customer, not the bank, but all in all, the damage rests on the banks. Either they pay the damage, or they don't and word gets out, and everyone will stop using online banking. THAT damage, though, would be even higher!
So take my word for it, nobody will give a rat's rear about security until it's too late. Why should it be different this time?
Re: (Score:2)
This just in ... (Score:2)
Different meanings ... (Score:1)
CSRF and XSS FAQ's (Score:4, Informative)
The Cross Site Request Forgery FAQ [cgisecurity.com]
The Cross Site Scripting FAQ [cgisecurity.com]
How critical? (Score:2)
Urgently, pivotally critical, even.
An article without proof (Score:1)
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
XSS is a next generation threat? (Score:1)
Intranet (Score:1)
Summary (Score:2)
The rest is to fill 4 pages so there's somewhere for the adverts.
next generation threats debunked. (Score:1)
New? New how? All this scaremongering is making me feel like partying like its 1999 (obscure millenium bug reference)...again.
"Web 2.0" (I really can't stand the term), IMHO is largly considered to be the "next generation" sites using AJAX. AJAX is nothing new, its Javascript, XML and DHTML. The principal is EXACTLY the same as a webservice request (its just from a Javascript client).
So:
Write secure w
Buzz-words might be biggest threat for financials (Score:1)