Facebook Enlists Websense for Neighborhood Watch

Facebook, long a darling of cybercriminals looking to lure in unsuspecting cybersocializers, has partnered with content security vendor Websense to help protect members from links that lead to malware and malicious sites.

That may prove good news to corporations, where many IT managers consider employees’ use of social media a security threat but where few of them do much about it, a global survey by the Ponemon Institute has found.

In other security news, experts are suggesting an alternative to the security certificate, which cybercriminals have shown to be an imperfect safeguard.

Meanwhile, it seems that many types of HTC smartphones running Android have a vulnerability that leaves users wide open to having their data stolen.

Security experts have been warning about the danger of a mobile security tsunami since users began bringing in their own tablets and smartphones for use in the enterprise. HTC’s reportedly looking into the issue.

Facebook’s Doing It Better

Facebook has signed on Websense to protect the social networking site’s members from links that lead to malware and malicious sites.

When a Facebook member clicks on a link, that link will be checked against Websense’s database. If that link’s deemed to be malicious, the system will return a page that contains various choices — to continue at the member’s own risk, return to the previous screen, or get more information.

That level of security may prove useful to enterprises. A survey of more than 4,000 IT and IT security practitioners in 12 countries by the Ponemon Institute found 63 percent believe employees’ use of social media in the workplace constitutes a serious security risk.

Websense Facebook Security Alert

(click image to enlarge)

Further, 52 percent of the respondents experienced an increase in malware attacks because of employees’ use of social media.

However, only 29 percent of the respondents reported having the necessary security controls in place to deal with that risk.

That lag between implementing security controls and the level of security issues experienced by the respondents is due to the rapid increase in the use of Facebook, said Tom Clare, senior director of product marketing at Websense.

Systemic issues constitute other reasons for the lag.

IT buys in multi-year cycles for technologies including security, “so any innovations or disruptive growth areas between cycles become an area of concern,” Clare told TechNewsWorld.

“Also, as new areas like social media quickly evolve, the risk impact becomes visible, and security measures are frequently applied afterwards,” Clare said.

A Cert’s Just a Bunch of Electrons

Digital certificates have been used for years by the security-minded, but recent events, including the DigiNotar issue, have led some in the cybersecurity field to consider alternatives.

Security expert Moxie Marlinspike, for one, launched the Convergence Project at the Black Hat cybersecurity conference in August.

This offers a browser-add-on to replace the existing certificate authority infrastructure in a browser.

Normal browsers work by including trusted certificate authorities who have been listed by the browser vendors. When you go to a site protected by a digital certificate, the browser checks that certificate against the preapproved certificate authority that issued it.

However, certificates can be spoofed or stolen. For example, hackers recently broke into Dutch CA DigiNotar’s network and stole and issued rogue certificates.

“The system in its current shape suffers from two major weaknesses,” Ivan Ristic, director of engineering at Qualys, told TechNewsWorld.

“One is that any CA can sign any website, which means that a compromise of one CA will compromise the entire system,” Ristic continued. “The other major weakness is that it’s too easy for those with resources to perform stealth interceptions of someone else’s encrypted traffic.”

In the notary system, whenever you visit an SSL site, your browser talks to two or more remote parties, called “notaries,” and asks them whether they see the same certificate it does. If the answer’s yes, your browser trusts the site.

The key advantage of Convergence is that the user can decide whom to trust.

“The extremely paranoid can even build their own notaries,” Ristic pointed out.

The notary system will help deter man-in-the-middle attacks where a third party illicitly intercepts communications between two parties.

However, he admits that many questions still remain to be resolved.

Insecurity on the Go

The latest manifestation of mobile technologies security issues comes in the form of a problem HTC smartphones running Android are facing.

Expect more mobile security problems down the road.

IBM’s X-Force 2011 predicts that the number of exploits will double this year.

“That statistic is specifically about exploits for mobile devices,” Leslie Horacek, X-Force threat response manager, told TechNewsWorld.

An exploit is a script or piece of code that takes advantage of a vulnerability in an application, operating system or a service, Horacek said.

Richard Adhikari

Richard Adhikari has written about high-tech for leading industry publications since the 1990s and wonders where it's all leading to. Will implanted RFI chips in humans be the Mark of the Beast? Will nanotech solve our coming food crisis? Does Sturgeon's Law still hold true?

Leave a Comment

Please sign in to post or reply to a comment. New users create a free account.

More by Richard Adhikari
More in Malware

Technewsworld Channels