STE WILLIAMS

While Zuck squirmed, Reddit revealed it found and killed 944 Russian troll factory accounts

While Facebook CEO Mark Zuckerberg testified before the US Congress, Reddit confessed to its own Russian problem.

A post by CEO Steve Huffman, aka “Spez”, reported that the site has identified 944 accounts it thinks were run by the Internet Research Agency (IRA), the Russian “troll factory” whose staff have been indicted for alleged election meddling.

Spez wrote that of the 944, only 13 had “Karma” – reddit’s measure of community contributions – of over 10,000. 662 of the IRA accounts had zero karma, suggesting they were lurkers, not posters.

316 posts by the trolls-for-hire landed on /r/The_Donald/, the hyper-partisan, pro-Trump subreddit. 1,443 posts made it to /r/uncen/, a subreddit that offered news its moderators felt was not covered accurately elsewhere.

Spez wrote that while the accounts made it through Reddit’s defences, the site’s ongoing vigilance detected and destroyed most before the 2016 United States federal and presidential elections.

“Of the 282 accounts with non-zero karma, more than half (145) were banned prior to the start of this investigation through our routine Trust Safety practices,” he wrote. “All of these bans took place before the 2016 election and in fact, all but 8 of them took place back in 2015.”

“This general pattern also held for the accounts with significant karma: of the 13 accounts with 10,000+ karma, 6 had already been banned prior to our investigation—all of them before the 2016 election. Ultimately, we have seven accounts with significant karma scores that made it past our defenses.”

Make of that what you will!

Spez also revealed Reddit’s 2017 transparency report, which detailed the 310 requests the site received from government agencies last year. Of those, 79 requested the preservation of account information and 213 requested the prediction of account information.

The site also received “one order to conduct real-time monitoring of a Reddit user’s communications in 2017. This request was a Pen Register / Trap and Trace Order, which allows the government to obtain certain non-content information, such as ‘dialing, routing, addressing, or signaling information’.”

7,825 notifications of alleged copyright infringement came Reddit’s way in 2017, with 4,352 resulting in content removal.

Reddit has linked to all 944 accounts here and preserved them so we can all enjoy this moment in history. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/11/reddit_transparency_report/

Imagine you’re having a CT scan and malware alters the radiation levels – it’s doable

As memories of last May’s WannaCry cyber attack fade, the healthcare sector and Britain’s NHS are still deep in learning.

According to October’s National Audit Office (NAO) report (PDF), 81 NHS Trusts, 603 primary care organisations and 595 GP practices in England and Wales were infected by the malware, with many others in lockdown, unable to access patient data.

WannaCry’s upshot was to lock staff out of Windows computers, a bad way to learn the lesson that failing to patch old kit has consequences. But there was another, less obvious discovery: medical imaging devices (MIDs) such as Magnetic Resonance Imaging (MRI), Computed Tomography (CT) scanners, and digital imaging and communications (DICOM) workstations were badly disrupted, with serious knock-on effects for hospital workflow even when other systems had been restored.

In today’s NHS, and healthcare generally, MIDs matter out of all proportion to their numbers, with some hospitals relying on perhaps half a dozen to cope with large volumes of disease, cancer and pre and post-op operation diagnostics. “It’s hard to imagine life without them,” a hospital consultant who wished to remain anonymous told The Register.

Costing anything from £150,000 for smaller CT scanners to millions for the latest MRI designs, these turn out to be difficult to defend. Many in the NHS are controlled through applications run from vulnerable Windows XP or 7 PCs, the former reacting to WannaCry by blue-screening, effecting an inadvertent denial-of-service.

As the NAO noted: “This equipment is generally managed by the system vendors and local trusts are not capable of applying updates themselves.” The UK’s health sector security hand-holders NHS Digital confirmed to the NAO that manufacturer support was often poor, leaving trusts with few defensive options beyond isolating scanners from internal networks in ways that made accessing imaging data impractical.

Denial-of-Scanning

As far as anyone knows, WannaCry’s makers did all of this without even meaning to. What if they had set out to take down a hospital, or attack MIDs in a calculated way? The possibilities turn out to have been alarmingly underestimated.

For May Wang, co-founder and CTO of US IoT security firm ZingBox, the proof-of-concept attack on healthcare was Conficker in 2008, not WannaCry in 2017.

“You don’t hear about it but the impact of Conficker is actually bigger,” says Wang. “But because not everybody is reporting it, we don’t see that much impact in public.”

It’s a staggering thought: almost a decade after it infected hospitals around the world, including 800 PCs at a teaching hospital in Sheffield, a worm targeting a vulnerability in an obsolete version of Windows is still on healthcare’s to-do list.

ransomware

74 countries hit by NSA-powered WannaCrypt ransomware backdoor: Emergency fixes emitted by Microsoft for WinXP+

READ MORE

Researching the security of medical devices in 50 US hospitals, ZingBox discovered that, sure enough, MIDs contributed half of the high-risk security issues. The underlying cause? Almost all of these systems were being controlled through Windows workstations, often flaw-ridden versions going back to XP and even 98, which reflects the age of the scanning hardware.

“Because they’re using a full-blown OS, they have the capability to use a browser, download applications and to do lots of thing you are not supposed to do on an OS controlling an X-ray machine.”

In the US at least, hospitals often try to partially isolate MIDs on VLANS, a strategy which quickly degrades as more devices are plugged into the same network segment.

ZingBox found that only a quarter of the devices on VLANs were medical in nature with the remainder made up of PCs, printers, and mobile devices, all vulnerable to malware that could use them as a staging post to reach MID workstations.

Compounding this is the way the number of connected and IoT-enabled medical devices is growing faster than bio-medical IT staff can keep up, says Wang. In many cases, hospitals don’t even audit these devices, which makes protecting them hypothetical.

Ambulance chasing

Noticing the same vulnerabilities as ZingBox, researchers at Ben-Gurion University of the Negev in Israel decided to test out their hunch that MIDs could even be attacked directly by targeted malware.

The team’s preliminary findings were published in a report (PDF) in February, which identified CT scanners as the number-one risk. These expose patients to defined amounts of radiation, a setting controlled using a configuration file whose parameters are set from a workstation application.

The EternalBlue exploit was leaked in April, and the attack took place in May. Microsoft released a critical security update in March, even before the exploit was leaked, and it was still not enough to stop it.

“This file is basically a list of instructions that the control unit gives to the CT in order to tell it how exactly to perform the scan, including how to move the motors, the duration, the radiation levels and more,” says Tom Mahler, one of the report’s lead authors.

“By manipulating these files, an attacker can potentially control exactly how the CT will work. This could be very dangerous and lead to radiation overdose, injury and possibly death.”

Alternatively, attackers could attempt to mix up the scanning results, “causing mistreatment to the patient or vice versa”. In neither example would the CT operator necessarily be aware that something was awry.

Although MIDs from different manufacturers use custom scanning applications, tailoring an attack for any one of these would not be difficult, confirms Mahler.

Having tested 23 different proof-of-concept attacks on MIDs in a simulated environment, Mahler and colleagues Professor Yuval Shahar and biomedical expert Professor Yuval Elovici, have promised to demo at a security conference during 2018.

The research predates WannaCry, but that malware’s appearance served as a giant finger pointing to the weak protection of MIDs and medical devices in general.

“This attack demonstrated how quickly the development of cyber attack could be – the EternalBlue exploit was leaked in April, and the attack took place in May. Microsoft released a critical security update in March, even before the exploit was leaked, and it was still not enough to stop it.”

NHS hosptial photo, by Marbury via Shutterstock

Vast majority of NHS trusts have failed cyber security assessment, Brit MPs told

READ MORE

Adding weight, the research was conducted in conjunction with Israel’s largest healthcare provider, Clalit Health Services, whose head of imaging informatics is Dr Arnon Makori, who believes, if anything, that WannaCry has been underplayed.

“It was a global wake-up call for the whole healthcare world. I believe the impact was significantly higher than reported and many more devices and systems were affected,” he told The Register.

Makori blames a “lack of awareness by the manufacturing companies, conservative operating systems and device architecture and cost benefit considerations” that will only be fixed with “a whole new cybersecurity strategy”.

IoT infusion

The risks aren’t limited to MIDs, and recent ZingBox research outlines a load of security holes in the design of one brand of IoT-enabled infusion pump, a ubiquitous medical device used to deliver fluids into patients at their bedside.

Hard-coded credentials that could be changed at will, lousy encryption, even the ability to splash a ransom message explaining that the device had been locked – you name it, it’s all there.

That means, when we talk about healthcare security, we’re mainly talking about information leakage. And in this particular field, we’re actually talking about life and death, about interruptions of operations and patient safety, according to ZingBox.

What Wang and Mahler have uncovered is like a version of the panic over SCADA vulnerabilities in power stations – but worse.

“Medical devices are extremely valuable. You can ransom a person’s files and it is inconvenient. If you ransom a person’s life you will probably get as much money as you want,” says Mahler. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/11/hacking_medical_devices/

Breach at UK’s Great Western Railway: Commuters told to reset passwords

Great Western Rail is urging all customers to change their passwords after identifying a successful attack to access GWR.com accounts over the last week.

The train company said circa 1,000 accounts were directly affected out of more than a million, and has written to those customers and the Information Commissioner’s Office.

“We are now asking other account holders to do the same as a precaution against potential further attempts,” GWR told The Register p

“This kind of attack uses account details harvested from other areas of the web to try and catch out consumers with poor password habits. Sadly, it is the kind of attack that is experienced on a daily basis by businesses across the globe, and is a reminder of the importance of good password practice.

“We have acted quickly and decisively with our partners to protect our customers’ data, and have taken clear steps to stop it happening again.”

In a general email to account holders GWR said it has reset all GWR.com passwords as a precaution. “To ensure the security of your personal information you will need to do this when you next log in to the GWR.com website.

“You should use a unique password for each of your accounts for security, and we recommend you review all of your accounts for maximum security, and we recommend you review all your online passwords and change any that are the same.”

However, some customers who received the email were concerned the note might be from scammers.

The Register has asked GWR for further comment. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/11/great_western_rail_advises_customers_to_change_passwords_following_breach/

Want to terrify a city with an emergency broadcast? All you need is a laptop and $30

Researchers have uncovered a remote hijacking vulnerability present in the systems many cities and organizations are using to manage emergency sirens and alerts.

Dubbed SirenJack, the vulnerability would allow an attacker to remotely activate emergency alert systems manufactured by a company called ATI Systems. Bastille said it privately contacted ATI about the flaw and allowed the company a 90-day period to patch the flaw before disclosing.

ATI did not have a statement on the matter at the time of publication. The company has said it is working on a patch for the flaw and has said it is on standby to help cities concerned over the vulnerability.

sirens

Radio hackers set off Dallas emergency sirens at midnight as a prank

READ MORE

Bastille says the SirenJack flaw was actually an exploit of the way ATI transmits signals from its control stations to the sirens themselves. A Bastille researcher who was in San Francisco back in 2016 noticed that the city’s emergency sirens, tested every Tuesday at noon, did not have wired connections to a data feed.

After some digging, Bastille’s director of security research Balint Seeber found that not only do the sirens get their orders via radio transmissions, but the signals were also being sent over an unencrypted channel.

From there, Bastille researchers were able to devise a way to intercept those signals and replicate the emergency alert signal, effectively letting them activate the alarm sirens whenever they want. Bastille estimates that, in the wild, a hacker would be able to set off the alarms with little more than a PC and about $30 worth of handheld radio equipment.

Youtube Video

In addition to San Francisco, ATI’s hardware is believed to be used by authorities at One World Trade Center, Indian Point nuclear power station in NY, and West Point Military Academy.

“During emergencies, cell tower-based public alert systems have been shown to fail. Many citizens have ‘cut the cord’ and cannot be contacted via a reverse 911-phone system. Consequently, warning sirens play a crucial role as they are the only truly reliable method to alert a population en-mass of a public safety event,” Seeber says of the flaw.

“The SirenJack vulnerability underscores the need to make emergency alert systems stronger than ever, as hackers are constantly probing critical infrastructure, especially those using insecure RF-based protocols, to infiltrate and carry out potential attacks.” ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/11/awooga_sirenjack_lets_hackers_channel_their_inner_hawaii_ema/

SAP’s Business Client can own entire apps, DDOS them into dust

SAP has issued its April security update, which brings a waiting world news of ten patch-worthy problems.

The nastiest has a CVSS rating of 9.8 and impacts SAP’s Business Client, the desktop tool to access much of its wares.

Details of the problem are behind a registration wall, but according to ERP Scan, the vulnerability is a memory corruption bug that allows an attacker to inject crafted code into working memory. The outcome can be “complete control” over the application, denial of service, or remote code execution.

The company has also patched SAP Business One to fix the Apache vulnerability CVE-2017-7668. In this vulnerability, the Apache httpd 2.2.32 and 2.4.24 had a buffer overrun exploitable for denial-of-service.

There are three other high-rated vulnerabilities in the April fixes: two for Visual Composer 04s iviews (VCFRAMEWORK versions 7.00, 7.01 and 7.02 and VC70RUNTIME 7.30, 7.31, 7.40, 7.50), one of which is a code injection bug; and CVE-2018-2408 in SAP Business Objects, a session management bug that doesn’t implement password changes properly.

As the Mitre advisory noted: “In case of password change for a user, all other active sessions created using [the] older password continues to be active.”

The April patch set also includes seven patches rated merely medium, including a Blaze DB vulnerability dating back to 2009.

The full April bug list is here. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/11/sap_april_2018_security_update/

FIDO takes a bite out of passwords with two authentication standards

A pair of authentication standards published this week have received endorsement from Mozilla, Microsoft and Google: the WebAuthn API, and the FIDO Alliance’s Client-to-Authenticator Protocol.

The aim of WebAuthn and CTAP is to offer an authentication primitive that doesn’t rely on server-stored passwords, since a user’s fingerprint or even their unlock pattern is safer for both user and Web site owner.

Just before the WebAuthn API wrapped up after more than two years’ work, the World Wide Web Consortium (W3C) last month asked developers to start work on their implementations.

In typically-opaque language, the W3C said WebAuthn is “an API enabling the creation and use of strong, attested, scoped, public key-based credentials by web applications, for the purpose of strongly authenticating users.”

WebAuthn sees a user agent store public key credentials. The API is designed so that access to those credentials is handled in a way that preserves user privacy.

For example, a user is authenticated against their credentials (like fingerprint) entirely on their client device: WebAuthn tells the Web application the user is authenticated, but doesn’t send the credentials up to the server.

Credential protection is the job of “compliant authenticators” such as a trusted applet, TPMs (trusted platform modules) of SEs (secure elements) in the user’s environment. External elements like USB, Bluetooth, and NFC devices can also store credentials.

As the W3C explains in its document, the user agent (such as, for example, a phone) should let users store logins under multiple identities in a WebAuthn-compliant implementation.

In welcoming the completion of the standard, the FIDO Alliance notes that the WebAuthn API standard is part of its FIDO2 project (which WebAuthn and CTAP completed).

FIDO’s associated CTAP project sets down the detail of external authenticator behaviour (the Bluetooth, NFC and USB devices).

It covers the application protocol between the authenticator and the client, and the bindings of the protocol to different transport protocols (so, for example, the application developer doesn’t have to write communications code for USB and Bluetooth from scratch).

The standardisation effort is also an important part of FIDO’s goal of getting rid of passwords, since Web applications get a standard way to interact with biometric authentication in the same way as they would interact with a security key – and without passing the credentials upwards to the Web application.

As the FIDO announcement stated: “User credentials and biometric templates never leave the user’s device and are never stored on servers”. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/11/fido_takes_a_bite_out_of_passwords_with_two_authentication_standards/

It’s April 2018 – and Patch Tuesday shows Windows security is still foiled by fiendish fonts

Microsoft has released the April edition of its monthly security update, this time addressing a total of 63 CVE-listed vulnerabilities.

This month’s update includes critical fixes for the usual suspects: Windows, Edge, Internet Explorer, and Office, as well as one flaw Redmond previously fixed with an unscheduled update. You should install these fixes as soon as you can, if your system hasn’t already.

Just one of this month’s patches is for a zero-day flaw; CVE-2018-1034 is an elevation of privilege vulnerability in SharePoint that, when exploited via a poisoned web request, allows an attacker to run script with the security clearance of the current user. Microsoft says the most likely use for the bug would be cross-site scripting attacks.

Among the more serious bugs are a set of five remote code execution vulnerabilities in the graphics component of Windows and Windows Server (CVE-2018-1010, CVE-2018-1012, CVE-2018-1013, CVE-2018-1015, CVE-2018-1016). Each of those vulnerabilities would allow an attacker to pwn PCs via a specially-crafted font, in some cases by simply putting the font on a web page viewed by the target.

“Those of us who lived through Duqu always shudder a bit when we see font-related bugs, and these have me downright shivering,” writes Dustin Childs of the Zero Day Initiative.

“Since there are many ways to view fonts – web browsing, documents, attachments – it’s a broad attack surface and attractive to attackers.”

Script, script, and script again

The usual crop of scripting engine bugs were patched for Edge and Internet Explorer. The two browsers combined for 10 memory corruption and remote code execution scripting vulnerabilities, while Internet Explorer also saw fixes for four additional (CVE-2018-0870, CVE-2018-0991, CVE-2018-1018, CVE-2018-1020) memory corruption remote code vulnerabilities of its own.

Office, meanwhile, is getting fixes for a number of nasty bugs, including remote code execution flaws in VBScript (CVE-2018-1004), Excel (CVE-2018-0920,) and an information disclosure bug in apps that handle .RTF files (CVE-2018-0950).

Server admins will want to take note of the fix for CVE-2018-0957, an information disclosure flaw that allows nefarious VMs to view memory contents of the host system outside of the hypervisor.

March Meltdown madness!

Mad March Meltdown! Microsoft’s patch for a patch for a patch may need another patch

READ MORE

Also listed in the monthly update was the patch for CVE-2018-0986, a remote code flaw in Windows Defender that was traced back to an open-source archiving tool Microsoft forked years ago.

Childs notes that because Malware Protection Engine isn’t part of the monthly patch schedule, this shouldn’t be considered an ‘out of band’ fix. He is technically correct (the best kind of correct).

Microsoft even snuck in a hardware fix to the April updates. The patch load includes a fix for the Wireless 850 Keyboard to address a particularly nasty bug CVE-2018-8117 that lets an attacker bypass security checks with an old AES and record keystrokes or hijack and inject packets sent from the wireless keyboard to the PC.

And now you’re done with Windows…

Once you’ve installed the Windows updates, you’ll want to make sure you get this month’s fixes from Adobe.

They include an update to Flash Player that patches three remote code execution vulnerabilties and three information disclosure flaws. Microsoft has issued its own patch for the Internet Explorer version of Flash Player.

ColdFusion users will want to download an update to address five flaws; one remote code execution vulenrability, three information disclosure bugs, and a local privilege escalation flaw.

Adobe also kicked out fixes for three cross-site scripting bugs in Experience Manager, memory corruption and privilege elevation flaws in InDesign, information disclosure flaws in Digital Editions, and a Same Origin Method Execution flaw in the PhoneGap plugin. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/04/10/its_april_2018_and_windows_10_pwned_with_fonts/

HTTP Injector Steals Mobile Internet Access

Users aren’t shy about sharing the technique and payload in a new attack.

A new attack in the wild leans not on email nor ransom, but on YouTube, Telegram, and HTTP headers intended to confuse an ISP.

Researchers at Flashpoint found that hackers have developed HTTP injectors that gain them free Internet access on mobile phone networks — and that they’re trading these injectors like cents-off coupons at a neighborhood swap meet.

The most striking aspects of the attacks, which Flashpoint tracked on mobile networks in South America, the method of transmittal and ubiquity, not sophistication. 

Liv Rowley, an intelligence analyst at Flashpoint, says that Spanish and Portuguese chatter on Telegram first alerted her that something unusual was going on. “I was seeing all these people exchanging these HTTP inductor files, saying that you can get free Internet with them,” she says.

In the attacks, customers with pre-paid SIMs employ the HTTP injectors to confuse the captive portals carriers use to verify the balance on the SIM before allowing access to the network. With the portal confused, the user gets onto the Internet even when the balance on the SIM has dropped to zero. The current attack primarily targets carriers in Brazil and Colombia, though Flashpoint found evidence of the same mechanisms being used elsewhere.

“You can very easily find YouTube videos all sorts of languages from all different countries where people explain how these files are used, and they often will include a download link to one of these injector files as well,” Rowley says.

The openness of the information suggests a couple of factors to Rowley. First, she says, there’s not a huge risk for the users in getting caught. “A hallmark of Latin American cybercrime right now is that there’s not a lot of cybercrime legislation,” Rowley says, pointing out that individuals can often commit cybercrime and there’s no legal infrastructure in place to actually penalize them.

Next, the cybercriminals Flashpoint believes are behind the injectors gain access to the compromised infrastructure. Rowley says that it’s in their best interest to have a lot of other people using these techniques to create a bigger criminal “bait ball” in which the true criminals can get lost.

The creation and distribution of these HTTP injectors makes them unique, in Rowley’s view. “It’s an interesting ecosystem of people who are compromising infrastructure trickling down to people who are just getting something that they’re essentially being handed,” she says. The flow of the malware from technologically sophisticated creators to technologically unsophisticated willing users is unusual, and dangerous.

While this exploit certainly has a significant financial impact on the mobile carriers, Rowley sees the potential for greater harm in the future. The originating criminals are “exploiting other people who aren’t going to look critically at the files that they’re downloading or the apps that they’re downloading,” she says. “The potential is always going to be there for them to be exploiting somebody downstream.”

And the next payload, which could include anything from recruitment into a botnet to a cryptojacker, may have fewer benefits to the user and many more dangers for the Internet at large, according to Flashpoint.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the security track here. Register with Promo Code DR200 and save $200.

Curtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and … View Full Bio

Article source: https://www.darkreading.com/mobile/http-injector-steals-mobile-internet-access/d/d-id/1331498?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Pairing Policy & Technology: BYOD That Works for Your Enterprise

An intelligent security policy coupled with the right technology can set you up for success with BYOD.

By 2020, 90% of global enterprises will have implemented business processes that depend on a mobile device, according to Gartner. From both a security and a compliance perspective, this makes data governance more difficult. The bring-your-own-device (BYOD) trend is not about the mingling of corporate and personal devices, operating systems, and data for the convenience of employees; it’s a true business benefit that can be achieved only when policy and technology work together.

Strong Policies Reduce Risks
It’s critical to establish strict policies and a clear BYOD strategy to ensure that sensitive corporate assets aren’t carried away on workers’ personal devices and that the risks of BYOD don’t outweigh the rewards. Embracing BYOD — and having a strong plan that considers internal policy and technology — can help your organization take advantage of the trend’s benefits while reducing the dangers of shadow IT and related issues.

To take steps toward a strong BYOD plan, IT leadership should consider the cultural aspects of the organization, costs, regulatory issues, and associated risks to effectively expand mobility across the enterprise. Further, it’s important to establish and communicate, across the organization, guidelines or restrictions specifying which devices are authorized for use within the corporate infrastructure, and clearly defined business-use policies regarding ownership, reimbursement, security, support, and other expectations.

Consider these practices to ensure that policy and technology are working in unison:

1. Determine Approved Devices
Which devices are fair game for your BYOD policy? Your short list of approved devices should include the popular, enterprise-ready devices in common use. You may choose to approve specific devices, or specific operating systems, if they meet your baseline security requirements. Make your decisions based on the manageability of the OS and your application strategy. If you belong to a multinational organization, remember that devices vary from country to country.

2. Define Reimbursement Rules
The perception that a BYOD strategy will save you money by passing on the cost of hardware, and even monthly service, to the user is incorrect. There are many more cost-related items to consider when defining reimbursement rules. Some items to include in your BYOD policy are:

  • Device costs, including repairs, replacement, and insurance
  • Payment of voice and data plans, including roaming charges when an employee travels
  • Accessories and support

3. Specify Ownership Rights
Data is more important than ever, and a BYOD policy may test the effectiveness of your enterprise data management initiatives. Your policies should make clear that ownership of all corporate data on the devices and the applications your workers use in support of their role at your organization are your intellectual property. Allowing access to corporate data on personal devices means that your organization will be exposed to privacy laws, which vary significantly around the world, and are intended to protect the employee. Countries in the European Union have the most restrictive privacy laws and regulations, and as such, require more due diligence before rolling out a BYOD initiative.

4. Set Security Stance
Security postures cover both the physical security of a device and the data on it. Security policies should extend to cover jailbroken or rooted devices, malware, and lost or stolen devices. In the case of lost or stolen devices, companies must determine whether they would wipe only corporate data or all data on the device. Other tricky decisions, like whether to enable GPS tracking on devices, must be carefully considered. While this might assist in the recovery of a lost or stolen device, it may give employees an uneasy feeling and/or violate privacy regulations. 

5. Communicate Clear Expectations
Success or failure of any change management initiative relies on proper communication. Employees must understand the boundaries of the BYOD policy and the security measures necessary to keep corporate data safe. HR and IT must act jointly to communicate employee roles and responsibilities. This includes program onboarding and additional training at least once a year to reinforce or update your policy. Periodic changes to your organization’s policy should be expected. It’s imperative that employees are notified of any new policy changes and that they’re educated about the impact of those changes on how they use their devices for company business.

6. Establish Support Structure
You should establish clear guidelines about who is responsible for device and application troubleshooting as well as maintenance. Is your users’ corporate mail client crashing? If it’s an enterprise application, then your IT department probably will need to provide support to correct the problem. Did a user drop his or her laptop in the pool? Your IT department may need to provide a loaner unit to ensure business continuity. A proper support structure will ensure that devices are properly maintained and that your business is not negatively affected by a missing or damaged device. 

7. Develop Decommissioning Strategy
Because a device is personally owned, it will not be returned to the company when the employee leaves. Therefore, you must have an established policy for decommissioning employee devices. Before a user is allowed to conduct company business using his or her personal device(s), this policy must be clear to the device owner and strictly enforced to ensure the security of your corporate data. When developing your decommissioning strategy, consider what you want to do with the data contained on the device when the user leaves your organization. Determine who within your organization should get the data before you decommission the device. Do you want to save a copy of the data to a thumb drive, other storage device on your network, or in the cloud? Determine if the device will be selectively wiped of corporate-only data, or in the case of termination, wiped of all data. No one wants to have his or her device wiped of personal data when expecting only corporate data to be removed.

The benefits of BYOD to businesses and employees are many. To set up your organization for success with BYOD, now is the time to ensure that your policies and technology work in harmony so that BYOD works for all. 

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry’s most knowledgeable IT security experts. Check out the Interop ITX 2018 agenda here.

Peter Merkulov serves as Chief Technology Officer at Globalscape. He is responsible for leading product strategy, product management, product marketing, technology alliances, engineering, and quality assurance teams. Merkulov has more than 16 years of experience in the IT … View Full Bio

Article source: https://www.darkreading.com/endpoint/pairing-policy-and-technology-byod-that-works-for-your-enterprise/a/d-id/1331433?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Microsoft Issues Rare Patch for Wireless Keyboard Flaw

Patch Tuesday includes 67 fixes – the most critical of which are browser-related.

So much for a spring break: Microsoft today dropped 67 security patches in its April Patch Tuesday release, including one for a piece of one of its hardware devices, the Wireless Keyboard 850.

Hardware – and keyboard – patches are relatively rare, so the security bypass vulnerability Microsoft fixed today in the keyboard stood out among the typical security flaws, which included 24 critical bugs, 42 rated as important, and one as moderate. Microsoft rated the keyboard vuln (CVE-2018-8117) as “important.”

The flaw allows an attacker to reuse the keyboard’s AES encryption key in order to log keystrokes, or inject them into the affected keyboard devices. According to Microsoft, “an attacker could simulate keystrokes to send malicious commands into a victim’s computer” or “read keystrokes such as passwords sent by other keyboards for the affected devices.”

Such an attack would be no simple feat: it requires physical proximity, and the attacker would have to pilfer the encryption key from the vulnerable keyboard. The patch forces each wireless keyboard to generate a unique AES encryption key.

Dustin Childs, communications manager for ZDI, says keyboard patching is rare, mainly because most vendors of the hardware devices don’t have the update infrastructure like Microsoft has nor the ability to track them for updates. “Microsoft has the operating system where it can update” them, Childs notes. While the attack would require some finesse and sophistication, it’s still worth applying the patch in short order, albeit not as a top priority compared with other updates in this month’s patch batch, according to Childs.

“If I know I have this keyboard in my enterprise, I’m not going to ignore this patch,” he says, noting that open work environments would be more at risk of such an attack.

Microsoft didn’t detail how an attacker would steal the encryption key. But Jimmy Graham, director of product management at Qualys, says it appears to be a hardware or side-channel attack, based on the way Microsoft is blocking access to the key with the fix.

Graham points out that most of the critical bugs patched today have to do with browsers. He recommends those patches as priority for endpoints.

Microsoft also patched five critical flaws in the Windows Font Library that each allow remote code execution via Web or file-sharing attacks. Both Graham and Childs consider these patches priorities as well. “Browser [updates] are always important and near the top” as a priority, Childs says.

The Microsoft Graphics Remote Code Execution vuln flaws: CVE-2018-1010CVE-2018-1012CVE-2018-1013CVE-2018-1015, and CVE-2018-1016 could allow an attacker to tuck malicious code into fonts. Malicious fonts can be used in Web browsing and documents and attachments.

“According to Microsoft, these vulnerabilities can be exploited through a Web-based attack, meaning the user only needs to visit a malicious Web page. This could be through a compromised site or malicious ad server,” Qualys’ Graham says. “The other attack vector is file-based, meaning a document could be sent via email or through a fileshare that would run the exploit if opened.”

Childs says these flaws are reminiscent of the Duqu nation-state group’s methods. The attackers behind Duqu embedded the Duqu dropper into type fonts via the Win32k TrueType font parsing engine. “Fonts are everywhere, so always put these” vulns at a high priority, he says.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for an intensive Security Pro Summit at Interop IT X and learn from the industry’s most knowledgeable IT security experts. Check out the agenda here.Register with Promo Code DR200 and save $200.

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise … View Full Bio

Article source: https://www.darkreading.com/vulnerabilities---threats/microsoft-issues-rare-patch-for-wireless-keyboard-flaw/d/d-id/1331500?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple