skip to main | skip to sidebar

TechsVilla

HOUSE OF TECH FOR ZEALERS

  • TECH
  • GAME
  • BLOG
  • WINDOW
  • LINUX
  • APPLE
  • SECURE
  • MSN
  • TIPS
  • Expert: RSA security breach compromised key federal networks

    Monday, March 21, 2011

    A product many federal employees use to log on to computers and networks should be regarded as compromised, due to the infiltration of key information about the application during a cyberattack against manufacturer RSA, some security experts said.
    The Homeland Security Department -- the civilian agency that oversees commercial and government cybersecurity -- has relayed mitigation procedures to federal agencies that have installed RSA's SecurID tools, the department announced on Friday. A DHS official on Monday said the government is not recommending that agencies replace their SecurID products. The department is helping RSA and clients who control critical infrastructure deal with the threat to the devices, which are a single point of failure in the computer security ecosystem, according to some industry observers.
    Agencies "should consider them breached," said Tom Kellermann, a former World Bank computer specialist and now an executive at Core Security Technologies, a firm that lawfully penetrates its clients' systems to identify network weaknesses.
    SecurID, which verifies the identities of authorized users, consists of a token -- a portable physical object such as a smart card or USB drive that controls access to a system. The device displays a continuously changing code that the user enters, in conjunction with a personal identification number, or PIN, to log into a network through a process known as two-factor authentication.
    RSA officials said agencies should not stop using the SecurID products because the information the culprit gleaned is insufficient to launch an attack by itself. "To the best of our knowledge, whoever attacked RSA has certain information related to the RSA SecurID solution, but not enough to complete a successful attack without obtaining additional information that is only held by our customers," an RSA spokesman said in an e-mail.
    Federal SecurID clients include the Pentagon, Transportation Security Administration, State Department, Environmental Protection Agency, Census Bureau and a large agency the firm's website describes as "the government department responsible for tax."
    Kellermann said departments should deem any assets authenticated through SecurID with caution: "At this point you already have an insider in your house."
    A letter to customers that RSA posted Friday on its website does not disclose whether the hacker stole information about the formula that produces the constantly changing codes or other secret information. RSA Executive Chairman Art Coviello, who sent the message, did note that no personal information was evidently compromised.
    The so-called advanced persistent threat that RSA discovered is a breach designed to linger invisibly inside a network. The most specific details in the letter about the extent of the damage stated, "While at this time we are confident that the information extracted does not enable a successful direct attack on any of our RSA SecurID customers, this information could potentially be used to reduce the effectiveness of a current two-factor authentication implementation as part of a broader attack."
    Some cyber specialists suspect the "broad attack" would not take the form of a nationwide assault against critical systems that wreaks instant havoc on the economy or human lives. Rather, the perpetrator could create problems for system operators over time. SecurID is used by about 40 million people across more than 30,000 organizations worldwide, according to RSA.
    "The long-term financial impact of this attack has yet to be seen -- but it will be larger than what we've seen before," Kellermann said. "Imagine 30 percent of the people in your building losing their key fobs."
    The large government tax department that RSA services, according to a company case study, deployed SecurID on 10,000 employee laptops to protect sensitive data. EPA, in February, bought 800 SecurID authenticators, a notice on the government's procurement site FedBizOpps states. Recently, Census solicited maintenance support for about 10,000 SecurID users, according to another notice.
    The breach "undermines one of the most successful authentication systems out there," Kellermann said. "You have to assume that you are playing a game of chess that is 12 steps ahead of you."
    Rear Adm. Edward Masso, a former commander of the Navy Personnel Command who now researches cybersecurity issues at the Potomac Institute for Policy Studies, agreed that a strike on a computer services provider, such as RSA's parent company EMC Corp., represents a breakdown of network security.
    "When iconic institutions such as EMC and their RSA SecurID products become compromised, it affects all critical infrastructures and consumer confidence," he said. "Companies and agencies depend on network security to allow for capabilities such as teleworking, collaborative working environments from divergent locations and to ensure network services such as banking, energy, health and retail."
    Masso recommended RSA clients use strong passwords and change them frequently, as well as protect personal data on social networks. "For companies and for our government, it is imperative that they create a very secure architecture around a secure tunnel type solution that protects network infrastructure from a remote workstation, to the Internet, back to the workplace," he said.
    The company is offering customers new guidance on bolstering security to supplement instructions RSA published online Friday. "The online bulletin that we issued today is the latest element of our customer communication program, in this case, to provide more specific best practices and help customers prioritize the remediation steps," the spokesman said. "Customers should have confidence that the remediation steps we are providing are identical to those we have implemented across RSA's and EMC's business, with respect to our own RSA SecurID authentication system."
    Posted by Rajan Chatterjee at 6:12 PM Email This BlogThis! Share to X Share to Facebook

    0 comments:

    Post a Comment

    Newer Post Older Post Home
    Subscribe to: Post Comments (Atom)
    Powered by Blogger.
    • Home
    • TWEAK PC
    • MICROSOFT NEWS
    • CYBER SECURITY
    • APPLE
    • LINUX
    • WINDOWS
    • WEB DESIGNING
    • GAMING
    • TECHVISION

    TechsVilla Corner

    Loading...

    Blog Archive

    • ▼  2011 (156)
      • ►  April (5)
      • ▼  March (151)
        • PC won't boot up? How to find out why it so....
        • Mac OS X 10.7 Lion: what you need to know
        • In Depth: Our preview of the best of the new phone...
        • Kinect For Xbox 360 Hacked To Work With Sony PlayS...
        • Next Generation Xbox Hardware To Surface By 2015?
        • Tethered Jailbreak for iOS 4.3.1 Now Available (Bu...
        • iOS 4.3.1 Jailbroken Already Using PwnageTool. Her...
        • 3DS Crashing To “Black Screen Of Death”?
        • Panasonic And Partners Announce New M-3DI Active-S...
        • MIT Scientist Claims To Have Created Practical “Ar...
        • SSDs have been on my Amazon Wishlist for over ...
        • Windows Phone 7 gets copy and paste update
        • Windows 8: everything you need to know
        • The Only Secure Password Is the One You Can’t Reme...
        • Honeywell’s Home Automation Touchscreen: Security ...
        • How to research your users
        • Bulletstorm review
        • Homefront Review
        • Forza Motorsport 4: Capitalising on GT5's missteps?
        • Crash Time 4: The Syndicate Review
        • iPad 2 review Apple's new tablet is the best of i...
        • Firefox 4 review It's the best Firefox yet. Is it...
        • How Mozilla turned the corner with Firefox 4
        • Fly or Die: The Nintendo 3DS, Rockmelt, And Mobile...
        • Robocast Sues Apple For Infringing Its ‘Automated ...
        • Drunk On Licensing Fees And Patents, Microsoft Has...
        • http://techcrunch.com/2011/03/22/googlers-buy-more...
        • This tip will explain How to open a file manager o...
        • Social Media Risks: The Basics
        • 9 Dirty Tricks: Social Engineers' Favorite Pick-Up...
        • 3 reasons trustworthy sites can no longer be trusted
        • Facebook is biggest mobile malware threat, says se...
        • Malware exploding, especially on mobile devices
        • Local ethical hackers nurtured in Kenya
        • Mobile security moving to the forefront? Extending...
        • Expert: RSA security breach compromised key federa...
        • Anonymous Exposed: Hacker Group Infiltrated, Chat ...
        • How your operating system works
        • Libre Graphics Meeting: Cutting Edge Creative Tool...
        • Red Hat Announces EMEA Partner Summit: Dublin Ireland
        • Create a social media icon
        • Nintendo 3DS released
        • SPLIT/SECOND
        • HALO REACH
        • Assassin’s Creed: Brotherhood
        • SPIDER-MAN: SHATTERED DIMENSIONS
        • Apple: Judging an app by its icon
        • Master the Windows 7 Action Center
        • Share files between Windows Vista and Windows 7
        • Download and install the best gadgets
        • CES 2011: More details about the Windows Phone 7 u...
        • Netbook ultimate guide
        • Get more from email
        • Reinstall Windows For The Last Time
        • HTC Incredible S To Come In Strawberry Red?
        • The Magic Connector Unifies The Apple Wireless Key...
        • Every Super Nintendo Game Ever – Yours For $9999!
        • Prevent E-mail Disasters: 5 Tools to Protect You f...
        • Apple Tweaks In-App Purchase To Prevent Accidental...
        • Analyst: Non-iPad Tablets Will Be Collecting Dust ...
        • PS3 To Be Re-Secured by 3.60 Firmware
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • AT&T DSL Adopts 250GB Monthly Bandwidth Cap
        • Google Maps Can Now Locate EV Charging Stations
        • M-Edge’s Case Designer Lets You Customize Your iPa...
        • MicroCenter Takes Up To $200 Off MacBook Pro
        • Bang And Olufsen Bring 16 Speakers To The New BMW ...
        • Protect your home with your webca
        • 9 Steps to get Windows Vista help from your friend...
        • The Best Flash Sites Ever
        • Web fonts: the .net top 20
        • Best web design: How to create better layouts from...
        • Best Graphics/Design Tool
        • Best Digital Photo Management Tool
        • Best IRC Client Pidgin Honorable Mention/Runner Up...
        • Best Single Office Program
        • Best Office Suite
        • Best Microblogging Client
        • Best IM Client
        • Best E-mail Client
        • Best Web Browser
        • Best Desktop Environment
        • Best Mobile OSGoogle Android Honorable Mention/Run...
        • Best Distribution for Netbooks/Limited Hardware
        • Best Linux Distribution
        • Apples To Apples: Apple Inc. Files For Apple Corps...
        • Adobe Just Made Medialets Its Mobile Ad Server
        • Apple Keeps Right On Approving Amazon And Netflix ...
        • Study: Mobile Ad-Tracking Systems Are “Blind” To 8...
        • The Ever-Elusive Mobile Wallet: Why NFC Chips Are ...
        • It’s A Good Day To Be An iPad Competitor . . . Oh ...
        • Why Payments Are Hard, Even For Apple And Google
        • Dear Apple, Please Copy This Notification System F...
        • Explor, Touch-Based App Discovery To Get Around Th...
        • Adobe’s Wallaby Can’t Jump Very High
        • As Apple Ponders Their Subscription Ruling, Readab...
        • Video: Hands-On With An Engineering Prototype 64GB...
        • On Apple TV Special Apps, Sports, And The Slow Ble...

    Popular Posts Widget

    • SPIDER-MAN: SHATTERED DIMENSIONS
      RATINGS 4/5 Action Spider-Man: Shattered Dimensions Price       Rs 3,499 (PS3) PUBLISHER          Activision DEVELOPER         Beenox PLA...
    • Web fonts: the .net top 20
      Web fonts: the .net top 20 It’s easier than ever to get creative with typefaces. Elliot Jay Stocks picks 20 web fonts that demand your vis...
    • Mac OS X 10.7 Lion: what you need to know
      Steve Jobs and other senior Apple employees provided   a glimpse   into Mac OS X 10.7 'Lion', making clear Apple's philosophy re...
    • Wireframe tools: the top 10 solutions
      Create your next prototype the easy way with our guide to the best wireframing tools out there Every website design has to ki...
    • PC won't boot up? How to find out why it so....
      You press the power button and your PC won't boot up. What do you do next? Don't write it off just yet. The first thing to do when ...

    Total Pageviews

    Subscribe To

    Posts
    Atom
    Posts
    Comments
    Atom
    Comments

    About Me

    Rajan Chatterjee
    I m Student Of computer Scince Engineering and tech-savvy person have unlimit zeal for programming and technology
    View my complete profile

    Followers

    Copyright © 2010 TechsVilla | Blogger Templates by Splashy Templates
    Css Designed by Hot Website Templates