STE WILLIAMS

US power grid the target of ‘numerous and daily’ cyber-attacks

The US electricity grid is under near constant attack from malware and cyber-criminals, yet most utility companies implement only the barest minimum of security standards, according to a new report released by Congressmen Ed Markey (D-MA) and Henry Waxman (D-CA).

“National security experts say that cyber attacks on America’s electric grid top the target list for terrorists and rogue states, yet we remain highly vulnerable to attacks,” Markey said in a statement. “We need to push electric utilities to enlist all of the measures they can now, and push for stronger standards in Congress that will keep our economy and our country safe from cyber warfare.”


Among the report’s findings, more than a dozen utilities surveyed said their systems were under “daily,” “frequent,” or “constant” attack, with one claiming to be the target of around 10,000 attempted cyber-attacks each month.

Yet although the companies admitted to being the targets of attacks, most said they complied only with mandatory cyber-security standards set by the North American Electric Reliability Corporation (NERC).

Only 21 per cent of investor-owned utilities, 44 per cent of municipal or cooperatively-owned utilities, and 62.5 per cent of federally-owned utilities said they had taken any additional, voluntary “Stuxnet measures,” as the report terms them.

Stuxnet, as most Reg readers will recall, was the mysterious malware that infected supervisory control and data acquisition (SCADA) systems in plants related to Iran’s nuclear enrichment facilities in 2010. Many security researchers believe it was a targeted attack initiated by the US government – and if the US can do it, then so can its enemies.

The report calls out the power grid as a particularly high-profile target for attacks because of its critical importance to industry and infrastructure. According to the report, power outages and disturbances are estimated to cost the US economy between $119bn and $188bn per year, with individual events costing $10bn or more.

“Cyber-attacks can create instant effects at very low cost, and are very difficult to positively attribute back to the attacker,” the report states. “It has been reported that actors based in China, Russia, and Iran have conducted cyber probes of U.S. grid systems, and that cyber-attacks have been conducted against critical infrastructure in other countries.”

By way of example, the report cites the 2012 malware attack on Saudi Aramco, Saudi Arabia’s massive, state-run oil company, which infected some 30,000 computers.

To help harden US infrastructure against such attacks, Markey and Waxman would like to see Congress grant the Federal Energy Regulatory Commission (FERC) additional authority to draft and enforce cyber-security standards among power utility companies.

The report points out that although President Obama signed an executive order in February 2013 identifying critical infrastructure areas and establishing a voluntary cyber-security framework, only an act of Congress can empower agencies to police the standards.

The full text of the report is available here. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/23/us_power_grid_cyber_attack_report/

SCADA security is better and worse than we think

AUSCERT 2013 First the good news: for all the known vulnerabilities that exist in the SCADA world, exploiting them in a way that can actually “shut down a power plant” is harder than most people (particularly including media) realise.

That’s the reassuring view put forward by Mark Fabro of Lofty Perch, in his spot at this year’s AusCERT 2013.


That’s because even though in a fairly short time the number of known vulnerabilities in programmable logic controllers (PLCs) has gone from zero to 171, turning the existence of a vulnerability into a successful exploit is a much more complex task than merely launching an attack against the individual device.

The industry, he said, is “stuck in a bit of a funk” thinking that one vulnerability will bring down whole systems – chiefly because we forget that one of the main points of SCADA systems is to present information to an operator.

If an operator sees systems starting to raise alarms or doing things that aren’t in his operational manual, Fabro said, it’s expect the operator to take some sort of action, or at least investigate what’s going on. So to go from “here’s a vulnerability in one system” to “here’s a nationwide blackout” takes a lot more effort than we believe.

However, Fabro said, as attackers become more sophisticated and learn ore about both the SCADA systems and their control environments, the likelihood of more dangerous SCADA-based attacks increases.

A key part of defending against those attacks that may occur, he said, is to start with a thorough understanding of the “kill chain” – the number of steps and scenarios an attacker is forced to step through to achieve what they want.

Breaking into a system, finding its control system, presenting false information to an operator, and then exploiting the attack doesn’t sound too difficult. However, to attack the bulk power system, Fabro said “the attack tree we’ve built contains 143,000 scenarios the attacker would need to get by”, and if any one of those fails, “he can’t get in”.

And if you’re spotting a pattern emerging, you’re right: the operator isn’t just an important point of defence, but also the biggest weakness.

“Time and time again people are the vector, the kill-chain’s tipping point is at people,” he said. “An individual who was tricked and had done something inappropriate – clicked on the link in the e-mail, let someone into the facility.”

It points to a difficult cultural problem in defending industrial control systems, because in trying to instil a new security culture, “the people you’re risking upsetting are the ones you’re relying on to run the system.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/23/scada_security/

Footy lovers hit in Wembley playoff card snatch scam

Provider Ticket Zone is continuing a joint investigation with Brentford Football Club after it emerged that card details used to buy tickets for the League One playoff final last weekend were subsequently used for fraudulent purchases.

Yeovil beat Brentford 2-1 to reach The Championship on Sunday, piling on further misery for many Bees’ supporters who had been stung by the fraudulent purchases. Fan Derek Abbey first heard of the apparent scam on a Bees’ forum before discovering £380 in fraudulent Oyster Card payments had been deducted from his account, the BBC reports.


Reg reader Faisal told us he was also hit.

“It appears that fraudsters were able to access my online banking account and I don’t think it was my PC that was compromised,” he said.

These cases were far from isolated, prompting Brentford and Ticket Zone to launch a joint investigation. Initial forensic work points to a “man in the middle” attack rather than a problem on Ticket Zone’s systems or something linked to malware on consumers’ PCs, the latest statement on the investigation explains.

Brentford Football Club is continuing its investigation to find out why some card details of those using Ticket Zone to purchase tickets for the npower League One Play-Off Final were compromised.

The Club learned last week that some cardholder data from those buying tickets for the match online had been used fraudulently.

An investigation was immediately launched and initial forensic work pointed to a “man in the middle” attack.

An independent investigation of Ticket Zone’s systems and those of the specialist online queuing company, Queue-it, is now underway and the Police Active Fraud Department have been informed about the security incident and are also investigating.

An investigation as serious as this will not, unfortunately, be resolved quickly.

Brentford FC acknowledged a “great deal of inconvenience has been caused to supporters” and promised it “will not rest until the full details of what has happened have been made public”. It encouraged fans to report problems to Ticket Zone, the official club online sales ticketing partner.

An earlier statement, issued shortly after complaints began and the investigation was launched last week, states that Ticket Zone does not store customer card data.

Ticket Zone does not store customer card data at any point and all information is stored in a secure token system that is approved and provided by its banking partner.

Further examinations have also been undertaken in conjunction with the Danish IT company, Queue-it, who provided the front-end queuing system ahead of the Ticket Zone site.

Once again, all systems are shown as clean.

However, following an investigation, it has been noted that a small number of attempts to access the site from unknown web destinations have arrived through unauthorised links shared via social media sites.

Ticket Zone has commissioned forensic specialists to assist their own technical teams with the on-going investigations.

All investigations point towards a MITM “man in the middle” attack intercepting internet traffic prior to landing on the queuing site.

An attack like this would allow a fraudulent third party to record key strokes as they are being made on the customer’s own browser.

When this occurs, neither the customer or Ticket Zone is aware that fraudulent data capture is taking place behind the scenes.

The crime has been reported to the Police via Active Fraud UK and they are now investigating this on Ticket Zone’s behalf.

Supporters of Bradford City buying tickets through Ticket Zone for the League Two play-off final may also have been hit by fraud, according to local reports in Yorkshire. The pattern of fraud seems to be much the same as in the Brentford case, with one Bradford fan getting hit with a £900 fraudulent PayPal charge and another getting stung for £50 in scam mobile phone top-up charges. The fraud involving Bradford City fans have also become the subject of a police investigation, the Bradford Telegraph Argus reports.

Bradford City FC, which gained promotion to League One in a League Two play off final at Wembley last Saturday, is yet to comment on the matter.

Ticket Zone is yet to respond to our request to comment on the matter. We’ll update this story as and when we hear more. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/23/play_off_final_credit_card_fraud_probe/

Big Brother security tech gets $20m

Skyhigh Networks has trousered $20m from VC firms keen on the security company’s tech for snooping on corporate networks and locking down banned apps.

The $20 megabuck Series E investment round was led by Sequoia Capital along with pre-existing investors Greylock Partners, the company announced on Tuesday.


By scanning networking traffic from logs from firewalls, proxies, and web security gateways, the company’s tech can sniff out network traffic that matches up with any of its 2,000 or so profiled cloud apps. It can then rank the security of them via 30 different factors and even let admins shut access to those apps that may warrant security concerns.

In the past Skyhigh told us that one of its customers found upon installing the agent-based snooping technology that it was using 46 cloud storage services within its own organization.

To coincide with the funding Skyhigh announced its 30-in-30 challenge, which guarantees that the company’s tech will “uncover “at least 30 unknown cloud services in use by their organization in 30 minutes”.

This round of funding brings the company’s total investment to date to $26m. The money will go on expanding the company’s engineering teams in Cupertino, USA, and Banaglore, India, and hiring people for sales and marketing roles in US, Europe and Asia.

The company is currently at 62 employees and hopes be at 100 by close of 2013 and 200 by 2014, Skyhigh Networks’ chief executive Rajiv Gupta told us. “Hiring will be approximately evenly split across sales, marketing, and engineering,” he said.

As for the company’s technology, the $20m will go on a broad swathe of improvements to its discovery, analysis and control strands. The $20m investing comes alongside Blue Coat gobbling network packet surveillance firm Solera Networks, whose tech offers a more granular traffic-view of security rather than app-view. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/22/skyhigh_networks_funding/

Press exposure of Federal data security hole leads to legal threats

An investigation into a security slip that left the identity information for over 170,000 users of a US federal government program publicly available online has led to accusations of hacking and legal threats.

The Scripps News investigative team spent the last month studying companies running Lifeline, a federal program to supply cheap fixed or mobile phone access for low-income households. Lifeline was set up by President Reagan and is paid for by a $2.97 surcharge on telecoms bills.


The team found that two of the commercial companies in the scheme, TerraCom and affiliate YourTel America, had cached application forms for Lifeline on unsecured web servers – forms containing names, Social Security numbers, dates of birth, and details of other government programs potential users were registered for.

“Every single piece of information that we either viewed, or used to view records, was all 100 per cent publicly accessible,” reporter Isaac Wolf told The Register. “It was all freely posted online and was not password protected.”

In a video showing the exploit, Wolf found a large chunk of private data simply by searching Terracom’s site on Google for a particular file type. Page two of the search results showed a Lifeline application form on plain view and a domain search of the site revealed more files on public view.

Before publishing the story, Scripps got in contact with the companies involved and asked for an interview. While the security hole was quickly fixed and users’ data password-protected, the investigative team received not an interview but a legal letter threatening prosecution under the Computer Fraud and Abuse Act (CFAA).

The letter, which refers to the investigative team as the “Scripps Hackers,” claims they used the GNU Wget code to download the files from the web. It claims the team tried (unsuccessfully) to break into password-protected accounts at its Vcare hosting company, and says downloading 19,000 application forms and 120,000 proof files does not show “solely journalistic intent.”

The controversial CFAA legislation – introduced in 1986, before the World Wide Web even existed – was the legislation used to prosecute internet activist Aaron Swartz. It’s currently under review in Congress, although politicians are looking to extend its reach, rather than reforming the law.

Under a strict interpretation of the CFAA, lying about your age on a dating site could be criminal as well as stupid, and a clever lawyer might argue that a script like Wget constitutes an attempt to hack a site. If so, then jail time and fines can be levied.

“A digital forensics investigation by TerraCom has revealed that the news service used sophisticated computer techniques and non-public information to view and download the personal information of applicants,” TerraCom COO Dale Schmick told The Register in an email. “The news service had to identify non-public directories in TerraCom’s computer system and decipher sophisticated URL addresses that included sequences of 14 random numbers to download the 170,000 files they now have in their possession.”

A TerraCom spokesman said that the team used knowledge that was well beyond simple internet searches, because the investigators also got information by fiddling with URL data to fish for unprotected information.

The company accepts responsibility for the security breach and has fixed the issue, the spokesman told El Reg, but is in “ongoing discussions” with federal and state regulators and law enforcement about the case. Scripps Scripps News denies that it accessed any non-public records and points out that TerraCom has declined numerous interview requests to go over the evidence.

If charges are brought, then the knock-on effect for security researchers could be severe. Normally El Reg would assume the Scripps team could beat the charges, but in this judicial climate there’s always the possibility it won’t. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/22/lifeline_hole_terracom_hacking_threats_scripps/

Twitter locks down logins by adding two-factor authentication

Twitter has joined the growing number of companies offering two-factor authentication to prevent logins being stolen – a fate several high-profile users of its service have suffered recently.

A new checkbox is being added to the Settings pages of Twitter accounts to enable the new feature. When checked, an SMS message containing an authentication code will be sent to a nominated phone before allowing access to the user’s account, so long as the phone’s carrier supports the function.


“With login verification enabled, your existing applications will continue to work without disruption,” Twitter’s security team manager Jim O’Leary said in a blog post.

“If you need to sign in to your Twitter account on other devices or apps, visit your applications page to generate a temporary password to log in and authorize that application.”

Security is a sensitive topic for Twitter at the moment, thanks to a series of attacks on media sources from the self-styled Syrian Electronic Army (SEA). The hacking group has been hijacking accounts for the last few months to push pranks and propaganda – a tactic that doesn’t so much terrorize as mildly inconvenience.

The Dow suffered a blip after the SEA pwned AP’s Twitter feed and put out a message about a terrorist attack on the White House. Other hijackings targeted Reuters (repeatedly), AFP, the BBC, and Al-Jazeera, and Twitter was forced to tell the world’s hacks to sort themselves out. Then The Onion got hit.

Fight ire with satire

Unlike its companions in the media, The Onion published a full rundown of the tactics and their source, with advice on how to stop this happening in the future. According to its tech support team, the site was hit by a triple-pronged assault on the Google accounts of its staff.

Emails started to appear in Onion inboxes reading “Please read the following article for its importance,” and containing a link appearing to lead to a Washington Post piece. The emails weren’t spammed out to all staff, just trickle-fed to look like background noise, the tech team recounts.

One employee fell for it (there’s always one) and his account was used to forward it on to more staff. This time two staff fell for it, since the source was trusted, but one of them had the passwords for the site’s social media accounts.

After discovering the first attack, the tech team sent out a company-wide email warning everyone to change their passwords ASAP. But the hackers had already found an orphaned account and used it to spam out the same link, this time masquerading as a password reset button. Two more employees, one with the Twitter login details, got hijacked.

At this point, The Onion‘s editorial team got into the fight, publishing a number of stories lampooning the incident with headlines like “Syrian Electronic Army Has A Little Fun Before Inevitable Upcoming Deaths At Hands Of Rebels.”

This taunting was too much, and the SEA began using the Twitter feed to post a barrage of propaganda, odd false headlines, and the usual anti-Israel rants. Using the information gained from the posts, the IT team then pushed the red button and forced an email reset on every account.

No lessons learned

But despite the warnings, the SEA attacks have carried on being successful, with the Daily Telegraph and Financial Times both temporarily losing control of their social networking feeds in the last week. It’s hardly the hacking Hollywood blockbusters are made of, but sources familiar with the project said the resultant fuss had led to a faster deployment of two-factor.

Twitter is not the first to make two-factor an option, and it had better not be the last. The technology isn’t perfect and can still be subverted, but it’s a useful protection when the attackers prefer to harvest the low-hanging fruit (as a rule). Some companies, based on current form, should get implement Twitter’s system immediately. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/22/twitter_adds_two_factor_authentication/

Facebook teens’ kimonos

Teenaged kids are handing out more private information on social media than ever before, with little thought for the consequences, a not-so-surprising survey has found.

Teens are carelessly giving away phone numbers, pictures and other sensitive data using their Facebook accounts, the report by the Pew Foundation pointed out.


Ten times more teens now make their phone number available online than had done so in 2006, while the number posting an email address has almost doubled, said Pew.

At the same time, 40 per cent of adolescents have not set up the full privacy settings on Facebook to shutter their stuff from the prying eyes of teachers, advertisers, employers or paedos. About 14 per cent do not bother to use any privacy settings at all, the survey found.

Some 33 per cent of respondents said they were Facebook friends with someone they had never met in person and about one in six said they had been scared by contact with a weird stranger online. More girls than boys were made nervous during a stranger interaction and kids that live in rural settings were also more likely to have encountered someone online that made them uneasy.

The results will be immediately obvious to anyone unlucky enough to have even a passing acquaintance with a member of the teenage horde.

Kids are spending more time on Facebook and Twitter than in previous years, although there is proof that use of Zuckerberg’s sociable advertising platform may have reached a plateau, because the number of teens visiting the site everyday has not changed since 2011, at about 25 per cent, with 40 per cent visiting Facebook several times a day.

The report said: “In focus groups, many teens expressed waning enthusiasm for Facebook. They dislike the increasing number of adults on the site, get annoyed when their Facebook friends share inane details, and are drained by the “drama” that they described as happening frequently on the site.

“The stress of needing to manage their reputation on Facebook also contributes to the lack of enthusiasm. Nevertheless, the site is still where a large amount of socialising takes place, and teens feel they need to stay on Facebook in order to not miss out.”

Teenagers post the following information on their profiles, according to the Pew Foundation:

91 per cent post a photo of themselves, up from 79 per cent in 2006.

71 per cent post their school’s name, up from 49 per cent.

71 per cent post the city or town where they live, up from 61 per cent.

53 per cent post their email address, up from 29 per cent.

20 per cent post their cell phone number, up from 2 per cent.

Researchers also found:

92 per cent post their real name to the profile they use most often.

84 per cent post their interests, such as movies, music, or books they like.

82 per cent post their birth date.

62 per cent post their relationship status.

24 per cent post videos of themselves.

Parents’ main concern is still the classic pre-digital stranger danger, only now it’s a creepy man behind a webcam they’re nervous about, rather than the candy-clutching car driver.

However, one in four parents are concerned about advertisers’ access to their children’s private information.

Researchers also carried out dozens of interviews with teenagers, leaving in the hundreds of times they used the word “like” in their sentences.

One 13-year-old boy summed up why grown-ups are right to be concerned. “I usually just hit allow on everything [when I get a new app]. Because I feel like it would get more features. And a lot of people allow it, so it’s not like they’re going to single out my stuff. I don’t really feel worried about it.”

Another girl added: “At first, when I got a Facebook, I was worried about my privacy settings, and my parents were too. And then, after I had it for a while, I wasn’t really worried as much. So then I took most of them off.”

However, about half of teens have decided not to post something because it might make them look bad in future and just four per cent said they had posted something that caused a problem for themselves or their family.

Some 802 teens were surveyed during the making of the report, which is called Teens, Social Media and Privacy and was released today. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/22/facebook_privacy_pew_foundation/

Camby cash crypto-coders Cronto chomped on pronto by Vasco

Swiss software firm Vasco has bought Cambridge-based banking security specialist Cronto in a deal valued at up to £14.5m.

Vasco will pay $19.3m (€15m, £12.7m), and a further $2.6m (€2m, £1.8m) depending on future earnings, to get its hands on the British upstart’s malware-defeating technology. Its software attempts to shield online transactions from any eavesdropping or interfering Trojans lurking on bank customers’ PCs. Germany’s Commerzbank AG and Switzerland’s Raiffeisen bank use the tech – also known as photoTAN – to combat fraud.


Cronto began life in 2005 as a University of Cambridge spin-out, and offers either a mobile application or a dedicated device to scan a “CrontoSign” image shown by a bank’s website during a transaction.

Details about the payment are encoded in the picture and, when extracted by the app or device, the information is shown on the phone or handheld for the customer to manually check. If all the details are correct, the image data is used by the app or device to generate an authorisation code, which is typed into the bank website for the financial institution to process and confirm the transaction – having generated the image, the bank will know which authorisation code to expect.

This is supposed to ensure that any miscreant’s attempt to alter a payment on the user’s PC (such as changing the destination account number) is detected: the correct authentication code required to confirm a money transfer is only known to the bank and the customer, not the PC which may be compromised.

Thus, the technology is said to thwart man-in-the-browser attacks, as used by the infamous ZeuS banking Trojan and other data-intercepting malware, as well as phishing and other methods of social engineering.

The CrontoSign system will eventually be merged into Vasco’s MyDigipass corporate security platform. The Swiss biz is best known for its two-factor authentication for secure email login and such stuff, which competes with gear from the likes of RSA Security. The Cronto deal will allow it to branch out to become a business-to-consumer authentication services provider.

In a canned statement, Dr Elena Punskaya, Cronto’s co-founder and CTO, added: “The combination of the experience and RD capacity will allow Cronto and Vasco to continue to identify new opportunities and implement the market vision, taking advantage of Cronto’s position in Cambridge, UK – an undisputed centre in the global innovation landscape.” ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/22/vasco_crontosign_buy/

Embedded systems vendors careless says Metasploit author

AusCERT 2013 One of the reasons we can’t have nice things like a secure Internet is that vendors of consumer kit can’t be bothered.

That’s the conclusion The Register reaches after listening to a presentation by HD Moore, author of Metasploit and now chief research officer at Rapid7, at the AusCERT 2013 security conference today.


Moore told delegates that while systems administrators might be doing a decent job of protecting their systems (actually, too many aren’t – they leave things like default passwords open, for example), it becomes almost irrelevant in the face of the threats created by modems, routers, phones, because vendors of embedded systems in general just don’t care.

“You can probably own five percent of the total Internet without even blinking,” Moore said.

Without detailing Moore’s entire research methodology, he presented the results of a large-scale scan of the IPv4 address space, looking at TCP and UDP services, and turning up “endemic” vulnerabilities.

While people leaving unauthenticated Telnet open to the world is just stupid, he held his harshest criticisms for the way embedded systems manufacturers seemed happy to sling insecure systems into the world and, even with known vulnerabilities, decline to issue fixes.

UPnP remains, unsurprisingly, a big vector. “Two out of the top three UPnP stacks are exploitable,” Moore said – representing 63 percent of the devices in which UPnP is visible to the outside world. Then there’s Web servers, many of them embedded, and vulnerable SNMP systems.

Of SNMP, he noted that there are 75 million vulnerable systems worldwide (in Australia, oddly, the most common being a Campbell Scientific soil data logger), and he asserted that six percent of all Cisco devices visible on the Internet offered SNMP read access – making user ID and password exposures a cinch.

The length of the supply chain in the embedded/consumer system market is also problematic: the embedded software might ship from one vendor, be turned into a module by a second vendor, integrated into a finished system by a third, and branded by a fourth – none of which seem willing to protect end users who may not even own the vulnerable product (for example because it’s a cable modem).

“We’re going to have some really nasty incident … then there’ll be a knee-jerk reaction” before things are fixed, he said. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/22/unpatched_embedded_system_threats/

Blue Coat gobbles CCTV-for-network-traffic maker Solera

Web security outfit Blue Coat Systems is buying Big Data security, intelligence and analytics firm Solera Networks.

Solera’s DeepSee platform offers security analytics and forensic capabilities to help defend against advanced persistent threats (APTs) and targeted malware attacks. Solera has created a type of CCTV system for network traffic that records a detailed record of packets, flows and files across corporate systems.


This data can be mined by customers to identify and resolve APTs using the various analysis tools built into Solera’s platform. DeepSee will be added to Blue Coat’s existing web-based threat intelligence roster, so customers can proactively block threats and rapidly identify, respond to and recover from any data breach or similar security incident.

Blue Coat’s premise is that malware infection on corporate systems is more or less inevitable. The trick to beating them, according to Blue Coat, is to rapidly detect and block the spread of malware-based attacks using a combination of network traffic analysis and forensic tools. Other companies, such as SourceFire, share Blue Coat’s vision.

Applying Big Data techniques to try to make sense out of security threats is a route that has also been taken by RSA Security and IBM, as The Register‘s security desk previously reported.

To identify threats hidden in encrypted traffic, Solera integrated its DeepSea platform with SSL technology from Netronome, which Blue Coat acquired earlier this month. Blue Coat also launched an SSL Visibility appliance on Tuesday, marking the first fruits of its Netronome purchase. The tie-in allows enterprises to analyse and block threats hidden in encrypted traffic.

Solera’s customers are the US Departments of Energy, Homeland Security and Defense, Hitachi, Qualcomm, Overstock.com and Zions Bank. Blue Coat started out as a provider of web security, URL blocking and WAN optimisation products.

The deep packet inspection capabilities of its products have proved to be of interest not just to corporates, but to ISPs and government in countries with patchy records on human rights, including Bahrain, Burma (Myanmar), China, Saudi Arabia, and Venezuela.

Use of Blue Coat’s censorware technology by these countries prompted campaign group Reporters Without Borders to categorise Blue Coat as one of five “Corporate Enemies of the Internet” back in March.

Financial terms of Solera’s acquisition by Blue Coat, which was announced on Tuesday, were not disclosed. ®

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2013/05/22/blue_coat_buys_solera/