Vista SP1 with altered WGA Strategy, Nag instead of Disable

By robertm2 at 4:35 pm on February 10, 2008Comments Off on Vista SP1 with altered WGA Strategy, Nag instead of Disable

Adrian Kingsley-Hughes has a new blog posting over at ZDNet reviewing the changes  Microsoft made to its Vista WGA (Windows Genuine Advantage – its authenticity check for pirated software) with the SP1 update.  In a nutshell, it appears Microsoft has decided to be less intrusive and allow a deemed to be pirated copy of Vista to operate more normally, and instead, nag the user with minor annoyances.  For example, before the update, a thought to be pirated version would only be allowed to access Internet Explorer for 60 minutes before being logged out, or able to access documents on the disk only if booted up in Safe Mode.  With the SP1 update, they have replaced these with things such as having the desktop background image changing to black every hour, and a 15-second nag screen at login that you have to wait through.  One of the only logical reasons that I can think of as to why Microsoft would do this is that because the current WGA system wasn’t working and that perhaps they would flag too many legitimate users as having pirated software when they didn’t.  For example, their software keys could have been stolen from the owner whether unintentionally or not.  Seeing as to how easily Pablos was able to steal the key with his USB jump drive in the class demo, it seems like these types of things could be occurring frequently.

Filed under: Current EventsComments Off on Vista SP1 with altered WGA Strategy, Nag instead of Disable

Local Root Exploit for Linux 2.6 Discovered

By Brian at 12:39 pm on | 5 Comments

A new vulnerability has been discovered in the 2.6 Linux kernel that allows a local user to obtain a root shell. The bug description was posted within the last 24 hours, and includes exploit code that works on a large number of Linux installations, running kernels version 2.6.17 to 2.6.24.1.

Slashdot article here and bug reports here and here.

Filed under: Current Events5 Comments »

Toshiba’s New Random Number Generator

By dschen at 11:21 am on | 2 Comments

Toshiba has recently unveiled a new IC which is capable of generating 2 megabits/second of random bits. The IC utilizes analog noise generated by electrons trapped on a silicon nitride (SiN) layer of a transistor. The electrons randomly are bound and released from this SiN layer at a very high rate enabling the generation of 2Mb/s of random bits. This analog value is then fed to an analog-digital converter and the resulting output is the random number. Since this IC is so small it can be easily incorporated into even portable devices enhancing the strength of encryption available in portable devices.

Original article here

Filed under: Current Events2 Comments »

Security Review: Smart pillboxes, maybe too smart?

By dschen at 11:02 am on | 2 Comments

Recently an MIT research team has developed a smart pillbox to help combat the problem of patients failing to take their medication at prescribed intervals. This problem of over/underdosing of the drug by the patient accounts for ~10% of hospital visits every year. To combat this problem the MIT research team has developed a smart pillbox, the “uBox” which stores and dispenses two weeks worth of medication and alerts the user to take the medication with an alarm. In addition the box records the exact time that the pills are taken and prewvents over dosing by only dispensing medication once per day. The smart pillbox then also communicates with a second component, dubbed the “uPhone” which can download the patients dosing information and configure the pillbox. The uPhone also records patient data collected by special software including temperature, weight, symptoms and answers to diagnostic questions. This information is then forwarded to a centralized location over the air so doctors can analyze the dosage patterns and overall health of a patient to determine effectiveness of a treatment.

Assets:

  • Health of the patient, the primary goal of this pillbox is to help increase effectiveness of drug treatments.
  • Patient information, the uBox collects timing data while the uPhone collects other medical information that should be kept private.
  • Medication in the uBox, certain medications are quite expensive.
  • Patient’s privacy, a patient may not want to follow the treatment for some reason.

Potential Adversaries/Threats:

  • Drug companies might want to gain access to this information directly for purposes of increasing sales of a drug.
  • Insurance companies might want to gain access to the information to determine whether or not to insure a particular patient.
  • An enemy might want to harm the patient by over/under dosing the patient.
  • The patient might desire more or less drugs than prescribed.

Weaknesses:

  • The data collected by the uPhone is transmitted over the cell phone to some server, if this information isn’t encrypted before transmission then it could be easily accessed.
  • The programming of the uBox occurs via cell phone, what happens if say the communication protocol were discovered and the uBox could be programmed to do whatever an attacker wanted to do.
  • Collecting data on a cell phone, a very small device puts a large amount of information at risk, if the phone were lost/stolen an attacker could fabricate false information or access the data stored on the phone.
  • While the uBox dispenses the drugs a day at a time, it really doesn’t look like it provides that big of a defense against a physical attack (i.e. screwdriver, hammer, etc)

Potential Defenses:

  • Encryption of all the communications between the uBox, uPhone and server should all be encrypted. By encrypting these communications the data transmitted will be protected as well as the configuration of the uBox since only authorized users could program the uBox.
  • Have the uPhone only forward information to the server, ensure that no data is actually stored on the phone.
  • Strengthen the physical structure of the uBox, although a balance must be achieved between size and strength.

Conclusion:

The uBox/uPhone together look like a promising tool for dealing with drug delivery and effectiveness monitoring for doctors. However many measures must be taken to ensure the integrity and privacy of the data being transmitted between all the components of the system. As medical devices become increasingly connected with one another, the transmission of the data securely becomes the largest security issue being faced today.

Original article here

Filed under: Current Events,Security Reviews2 Comments »
« Previous Page