Security Watch

Defense Offense

There is a new, potentially more troubling break-in related to EMC Corp.'s RSA security keys, which thousands of banks use to secure their networks, Reuters reported May 26.

Processing Content

In March, hackers accessed important details about RSA's security devices.

The defense contractor Lockheed Martin Corp. of Bethesda, Md., reportedly experienced a major disruption to its internal network starting around May 21.

In a statement on its website, the company described the attack as "significant and tenacious."

The break-in was reportedly caused using compromised SecureID tokens from RSA, which Lockheed's 126,000 employees can use outside the firewall to access internal information. The tokens generate a onetime passcode that quickly expires.

"The company's information security team detected the attack almost immediately and took aggressive actions to protect all systems and data. As a result of the swift and deliberate actions taken to protect the network and increase IT security, our systems remain secure," said Lockheed Martin, one of the largest suppliers of weapons and weapons systems to the Department of Defense.

Social Insecurity

The Department of Health and Human Services website lists nearly 300 health care companies and organizations that have been the victims of breaches of unsecured health data of individual consumers. And in the last two years, the medical records of nearly 8 million people have been exposed, according to The New York Times in a May 30 story.

In many cases the exposures happen because health care companies do not encrypt data on their computers, or stem from human error, such as employees who leave data drives in unlocked vehicles or on public transportation. (Health care providers are required by law to inform their patients when information has been stolen.)

In many cases consumers' Social Security numbers are stolen along with personal information about their health. Social Security numbers can be used fraudulently to open bank accounts and obtain loans.

Milkin' Cookies

A security researcher in Italy has discovered a flaw in Microsoft Corp.'s Internet Explorer that could let hackers download PC users' cookies, possibly granting access to online bank accounts, CNet reported May 26.

The researcher discovered an exploit in all versions of the browser that run on Windows. The researcher chose to target social media site Facebook Inc., designing a page that required users to drag and drop items as a security challenge to enter the site.

In the process, the dummy site captured user credentials, which in turn allowed the researcher to log in to Facebook accounts.

Microsoft, of Redmond, Wash., told CNet it did not see much real-world threat from the discovered exploit because, it said, it requires too much user interaction.

"In order to possibly be impacted a user must visit a malicious website, be convinced to click and drag items around the page, and the attacker would need to target a cookie from the website that the user was already logged into," Microsoft said.

Phone Tree

A security flaw exists in electronics retailer Best Buy Co. Inc.'s mobile phone upgrade software, though the problem only applies to Sprint Nextel Corp.'s customers, according to a May 26 story on the technology blog Engadget.

When Sprint's phone customers log on to check their phone upgrade options, the software prompts them to plug in their cell phone number and ZIP code. With just that information, the software displays all other telephone numbers associated with the account.

That could be a problem for banks, since hackers could use the tool to determine alternate phone numbers for bank customers they are targeting.

The article pointed out that Verizon Communication Inc., AT&T Inc. and T-Mobile USA Inc. require further security before other numbers associated with their accounts are displayed through the upgrade tool.

Pot E-Trained

Makers of an open-source, virtual currency called Bitcoin have gotten some unwanted attention from the police, according to a May 24 story on Gawker Media's technology blog Gizmodo.

It turns out that the production of the currency, referred to as "mining," requires racks of computers that devour massive amounts of electricity.

To the police, who sometimes monitor electrical usage, this pattern of power consumption mimics what happens with pot growers, who use an abnormally high amount of electricity to grow their wares.

Gizmodo reports that more than one Bitcoin mining facility has been visited by police seeking to investigate further.

Security Watch is a weekly roundup of news and developments in data security and their impact on financial services companies.
Please e-mail us any comments, ideas, and suggestions about this column.


For reprint and licensing requests for this article, click here.
Bank technology
MORE FROM AMERICAN BANKER
Load More