Category Archives: Security

Company tries to fire IT admin for 2 cent loss

Yahoo! News says a firm can’t fire a man charged with a 1.8 cent theft

A German company that fired a man for the theft of 1.8 euro cents (two U.S. cents) worth of electricity had no grounds for sacking him, a court ruled, dismissing the firm’s appeal against his reinstatement.

Network administrator Oliver Beel lost his job after charging his Segway, a two-wheeled electric vehicle, at work in May 2009. After he connected the vehicle to the firm’s power source for 1-1/2 hours, his boss asked him to remove it.

Twelve days later Beel found himself without a job.

They might have had a better chance if they had a policy specifically against charging vehicles. Then some kind of violation could have been claimed. Instead the court highlighted that employees charged cell phones and other devices without penalty.

Free Laundry! Stored Value Card Password Fail

ihack ? iam has posted a highly amusing and detailed analysis of Web Laundry (In)Security

Ok, now we just need to guess the write 7 password. The password is 24 bits… That gives us 16,777,216 attempts to brute force it. At 4 attempts per card that will take 4,194,304 cards or 2,097,152 cards on average… There must be an easier way… My next idea was to sniff the traffic between the reader and card to get an idea of what kind of data is being passed back and forth, then after wading through the paper above, implement the algorithm to crack the cipher itself. Then I found this little diddy in the datasheet

[…]

Surely you would think the engineer(s) implementing this weren’t negligent enough to leave the default password… you would be wrong.

This is very much along the same lines as my presentation at The Next HOPE on Keypad Entry Systems. Start with the most basic tests and you will be surprised how quickly things fail, even things sold as “Unmatched Security and Cutting Edge Technology”.

CSA gives CoC (certificate of competency)

Pay them just $195 and the Cloud Security Alliance (CSA) says they are willing to certify you as competent.

The CSA is perhaps most infamous for a remap of other standards to its own. Not satisfied with existing maps of NIST, ISO, HIPAA, FISMA, PCI, etc. they happily added a new column to the mix and called it…the CSA cloud control matrix. This immediately begged the question why be ISO or PCI certified when you can be CSA instead? Why adhere to Requirement 10 of PCI DSS when you can now adhere to CSA 15? Who needs ISO 6 when you have CSA 5?

They said it was to make things easier but now it sounds more difficult. I mean they might be implying that it is so hard that without a test you could be considered incompetent. Oh, wait, never mind. I just read the test, administered by Cosaint, is to demonstrate a “rudimentary understanding of cloud security“.

Marketing questions should be expected:

In which three ways can we distinguish cloud computing from traditional outsourcing?

The universal customer perspective is also on the test:

What is the key aspect of a cloud provider’s SAS 70 Type II audit statement a customer should review to determine if it meets customer requirements?

However, my favorite section of the test is on cloud grammar:

Why do communications between multiple virtual machines often evade tradition security monitoring systems?

If you do not know english well enough to find this obvious flaw…no CoC for you!

Who can resist this bargain? The test sounds like a no brainer! Act now because pricing goes up to $295 in 2011.

Just to clarify the CSA seems to refer to it as the Certificate of Cloud Security Knowledge (CCSK) test but also the CSSK, while elsewhere I found it called a CoC test.

The latter of the three just rolls off the tongue, so to speak. If they are lucky, everyone might want their CoC. A CCSK, on the other hand, has the unfortunate overlap with clear cell sarcoma of the kidney, the second most common kidney tumor in children. I do not think anyone really wants CCSK.

Water Filter In a Tea Bag

A researcher from Stellenbosch University in South Africa claims to have developed a water filter the size of a tea bag. It thus can be fitted under the cap of a bottle. This significantly reduces the cost and inconvenience of water quality, as reported by BBC News

“We cover the tea bag material with nano-structured fibres, and instead of tea inside the tea bag, we incorporate activated carbon.

“The function of the activated carbon is to remove most of the dangerous chemicals that you would find in water.”

He says that the function of the fibres is to create a filter where harmful bacteria is physically filtered out and killed.

The BBC does not mention what quantity and speed of water can be filtered by a single bag. Those are the usual metrics but each bag is meant to be used only for a single serving just like tea.

The inventor, “past executive vice-president of global network of water professionals the International Water Association and a member of Coca-Cola’s global panel of water experts”, emphasizes the importance of decentralized solutions to help those most in need of water security.

A water security risk index of 165 nations, released by UK-based risk consultancy firm Maplecroft in June found that African and Asian nations had the most vulnerable water supplies, judged by factors such as availability of drinking water, demand per capita and dependence on rivers that flow through other countries. [Professor Eugene] Cloete adds that more than 90% of all cholera cases are reported in Africa, and 300-million people on the continent do not have access to safe drinking water.

“The ‘tea bag’ filter can show the way forward, as it represents decentralised, point-of-use technology. “It can assist in meeting the needs of people who live or travel in remote areas, or people whose regular water supply is not treated to potable standards. “As it is impossible to build purification infrastructure at every polluted stream, we have to take the solution to the people,” he notes.