![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Desktop Security Software Risks - Part 1
This is the second in a series of articles highlighting reasons why we need a new model for anti-virus and security solutions. Reason #2: the Desktop Security Software Risks The risks of placing software on the desktop are such that I will be breaking this article into two parts. Fundamentally we think of having software on our desktops as a good thing. I love downloading or installing new packages and seeing what new creative things people do to the user interface or what they do to make certain aspects of my life easier or more fun. But there are problems inherent with software that resides on the desktop, especially security software. All developers will know what I mean. First and foremost, desktop software can be reverse engineered. What's that mean? Have you ever inadvertently double-clicked on a file and had garbage show up or seen something that looks similar to this? http://www.checkinmyemail.com/Articles/image001.jpg The old hex dump. Programmers will know it well. We actually spend a good deal of time trying to read this stuff. Basically, if there are programs that can (and do) turn instructions like the following If UserBirthDate < "01/01/1960" then IsReallyOld = "Yes Else IsReallyOld = "No" End If into something like the picture above, then the reverse is true: people have developed software that can take that gobbeldy-gook in the picture above and turn it somewhat into the if-statement I wrote out. The reversing software won't know that I had an item called UserBirthDate, but it will know I was testing for a value of January 1, 1960 and it will be able to say that based on that value I set another item to Yes or No. So now we install our fool-proof anti-virus software on our desktop (or our firewall for that matter). Well, so too can a virus author. And that virus author or hacker will also have gotten a copy of the latest reverse-engineering software from his local hacking site. He now goes upon his task of reverse-engineering the software and then trying to decipher the results. It's not easy but it can be done. Unfortunately, vendors know this and understand this as an acceptable risk. The problem here is that your security software is at risk. If your vendor codes an error, the virus author can and will detect it. For example, if your vendor should exclude a file from scanning, it's possible the virus author will figure out which file (or type of file) that is and bury his code there. If the vendor excludes files from scanning or heuristics, it's possible that virus author will figure out a way to corrupt that file. That being said, there are other risks. As we have said, once software is on the desktop it affords virus authors an opportunity to reverse-engineer security software. The knowledge that reverse-engineering provides is invaluable to a virus author when building his next software attack. Third, virus authors can learn where the anti-virus vendors put there software and put the links to their software (directory folders, registry entries, etc.). This too is invaluable information. In fact, in some ways it teaches people intent on writing malicious software clues as to how to infiltrate the computers' operating system, where registry entries need to be made to force software to be loaded every time a computer is started, etc. This information is generally available all over the web and in manuals for operating systems, especially manuals on such subjects as the Windows Registry. But having the software teach you where things belong to be effective is powerful knowledge. Lastly, and perhaps most significantly, is the issue of forebearance. The anti-virus vendors usually know more about the potential exploits inherent in programs than virus authors but they are bound by the fact that should they try to prevent them before the exploits occur, they could be branded as irresponsible for teaching virus authors about these very exploits. For example, when Microsoft first released the macro capabilities of Word, anti-virus vendors immediately realized the potential for danger in macros, but they were handcuffed. If they released software that disabled macros before the first macro virus was ever released, they would signal to virus authors the inherent destructive powers of macros. They chose instead to wait, handcuffed by the limitations of desktop software. Until the Internet there really has been no better medium for delivering virus solutions than desktop software. It was relatively inexpensive to deploy (either market the software and sell it in stores or provide free downloads on bulletin boards and web sites). It is, however, expensive to keep updated in terms of time and effort, even with automated update systems. The Internet caused several things to happen: by becoming a powerful medium for sharing files, whole families of viruses disappeared practically overnight (boot sector viruses, for example); by becoming the option of choice for sharing files, it was easier to infect a single file and have thousands download it. A better solution is to place the security software in an offsite appliance of its own making. All Internet, intranet, networking connections flow through the appliance. Selling off the shelf hardware appliances with built-in security software is better than a desktop software solution but it still suffers -to a lesser extent- from the pratfalls that desktop software falls prey to. Even better is to create a service that a 3rd party vendor manages in a secure environment. In such an instance both the software and the hardware are away from the prying eyes of the malicious software authors. This further reduces the opportunity for malicious authors to discover the tricks and techniques employed by the security vendors to protect you. About The Author Tim Klemmer Tim Klemmer has spent the better part of 12 years designing and perfecting the first true patented behavior-based solution to malicious software.
MORE RESOURCES: Report: Ramming attack suspect was officer in PA security services The Times of Israel Documents show Security Costs for Nathan Fletcher ABC 10 News San Diego KGTV DL Security Incident | Department of Public Safety the Texas Department of Public Safety Remarks at a UN Security Council Briefing on Threats to ... United States Mission to the United Nations Online Briefing with Uzra Zeya, Under Secretary for Civilian Security ... Department of State How Chinese Private Security Companies in Africa Differ From Russia’s Voice of America - VOA News Lawmakers seek $75 million security grant for Milwaukee to host RNC Milwaukee Journal Sentinel WATCH: Dodgers fan gets crushed by security guard after running on field to propose to girlfriend CBS Sports NYC Ramps Up Security Again Ahead of Possible Grand Jury Action Against Trump, Police Sources Say NBC New York Ypsilanti man pleads guilty to making false statements on security ... WDIV ClickOnDetroit British Semiconductor Maker May Close Due To National Security Dispute With Chinese Parent Company Forbes NYC Ups Security Again After Trump Indictment, NYPD Orders Officers Report in Uniform - NBC New York Man arrested over secretly recording Republicans prompts Senate to change security policies NBC News USENIX Security ’22 – Johannes Wikner, Kaveh Razavi – ‘RETBLEED: Arbitrary Speculative ... Security Boulevard Mayor of Niagara Falls launches program to encourage more businesses to install security cameras WKBW 7 News Buffalo Murdaugh moved to protective custody at maximum security SC prison Live 5 News WCSC Underwood Condemns Republican Plan to Cut Food Security ... Lauren Underwood Commerce Department Outlines Proposed National Security ... US Department of Commerce Is there a second Supplemental Security Income payment this month? WJW FOX 8 News Cleveland Digest of Recent Articles on Just Security (Mar. 25-31) Just Security Senators Introduce Bipartisan Bill to Tackle National Security ... Senator Mark Warner Homeland Security Chief Mayorkas calls Ted Cruz’s comments ... The Texas Tribune China urges Apple to improve security and privacy The Register TikTok bills could dangerously expand national security state Responsible Statecraft TSA issues new cybersecurity requirements for airport and aircraft ... Transportation Security Administration Fact Sheet: Biden Administration's National Security Memorandum ... Homeland Security Russian Court Orders Wall Street Journal Reporter Evan ... The Wall Street Journal National security law’s effects undercut Hong Kong freedoms, says US report South China Morning Post FACT SHEET: President Biden’s Budget Strengthens Border ... The White House Biden Administration Announces Additional Security Assistance for ... Department of Defense S. Korea national security advisor resigns after alleged Blackpink White House invite blunder Yahoo News Why TikTok's security risks keep raising fears The Associated Press Why does US see Chinese-owned TikTok as a security threat? The Associated Press Feds Charge NY Man as BreachForums Boss “Pompompurin ... Krebs on Security TikTok CEO's Message to Washington: A Sale Won't Solve Security ... The Wall Street Journal Jenkins Security Alert: New Security Flaws Could Allow Code ... The Hacker News Officials are preparing security in case of Trump indictment The Associated Press Saudi Arabia Seeks U.S. Security Pledges, Nuclear Help for Peace ... The Wall Street Journal ChatGPT and LLMs: what's the risk - NCSC.GOV.UK National Cyber Security Centre General Michael Langley (USMC), Commander, U.S. Africa ... Department of Defense Profiles of the January 6th Inmates in the D.C. Jail Just Security New Biden Cybersecurity Strategy Assigns Responsibility to Tech ... The New York Times |
![]() |
![]() |
![]() |
RELATED ARTICLES
Lottery Scam, What It is and how to Avoid It? Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. An Open Door To Your Home Wireless Internet Network Security? This is not some new fangled techno-speak, it is a real tool to be used for the protection of your wireless internet network and LAN. African American SMBs have to realize that if your Internet connection is on 24/7 then your network, and it is a network that your computer is connected to, is at risk. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. All About Computer Viruses Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. Instant Messaging - Expressway for Identity Theft, Trojan Horses, Viruses, and Worms Never before with Instant Messaging (IM) has a more vital warning been needed for current and potential IM buddies who chat on line.John Sakoda of IMlogic CTO and Vice President of Products stated that,"IM viruses and worms are growing exponentially. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. How To Prevent Spyware Attacking Your Computer Spyware is software or hardware installed on a computerwithout a user's knowledge. It gathers information andreports it back to its source. Make Money Online - Defend Against The Latest Scam First, let's do a little recap'. As I stated in the first part of the article, "Make Money Online - The Latest Scam Disclosed", "refund policy scammers" affect the websites that make money online by selling digital products by buying the product and asking for refunds, while keeping the product. Passwords or Pass Phrase? Protecting your Intellectual Property Much has been said on the theory of password protection for files, computer login, and other network access. In the past we used a combination of letters, special characters, and other techniques to try and prevent unwanted or unauthorized access to our computers, resources, and networks. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. Whats All This I Hear About Firewalls? At this point, if you've got the whole "turning the computer on" thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. Delete Cookies: New-Age Diet or Common Sense Internet Security? No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them. Is Shopping Online For Your Horse Gifts Safe? Shopping for horse gifts or other gift items on the internetis quick, convenient and is probably safer than you think.However, you still need to be aware that it is essential tovigorously protect your privacy and financial informationwhen making purchases online. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. The One Critical Piece Of Free Software Thats Been Overlooked Can You Prevent Spyware, Worms, Trojans, Viruses,.. ![]() |
home | site map |
© 2006 |