By Hank Schless, Senior Manager of Security Solutions at Lookout
This week is Fraud Awareness Week and the conversation is all about knowing how to best protect ourselves in a constantly evolving and quite scary cyberworld. According to the Better Business Bureau’s naughty list of the top 12 holiday shopping scams this Christmas season, the two most prevalent scams are misleading social media ads and social media gift exchange scams.
The Internet Crime Complaint Center’s (IC3) 2021 reported that non-payment or non-delivery scams cost people more than $337 million. Credit card fraud accounted for another $173 million in losses. Lookout, the leader in delivering integrated Security, Privacy, and Identity Theft Protection solutions, is here in time with the perfect gift for keeping your wallet and data safe this season.
Tips To Stay Safe This Holiday Season
Exercise Savvy Shopping
- If you’re purchasing from a company for the first time, do your research and check reviews.
- Verify the legitimacy of a buyer or seller before moving forward with a purchase. If you’re using an online marketplace check their feedback rating. Be wary of buyers and sellers with mostly unfavorable feedback ratings or no ratings at all.
Watch for “Red Flags” When Paying Online
- Avoid paying for items with prepaid gift cards. In these scams, a seller will ask you to send them a gift card number and PIN. Instead of using that gift card for your payment, the scammer will steal the funds, and you’ll never receive your item.
- Use a credit card when shopping online and check your statement regularly. If you see a suspicious transaction, contact your credit card company to dispute the charge.
Avoid Shipping Pitfalls
- Always get tracking numbers for items you buy online, so you can make sure they have been shipped and can follow the delivery process.
- Avoid buyers who request their purchase be shipped using a certain method to avoid customs or taxes inside another country.
Enable Security Protection To Block Shopping Scams & Threats
- Run security protection on your mobile devices – like Lookout’s security application – which is an app you can download from Google Play or the App Store. Security protection will automatically monitor and identify scam URLs in email, text messages, and on the web and block you from threats that can do harm.
- Gift Card Scams:
- CVS, Walmart & Home Depot
- The FTC reports that around $10 million a month has been lost globally to these scams.
- About one in four people who tell the FTC they lost money to fraud say they paid with a gift card.(1) In fact, gift cards have topped the list of reported fraud payment methods every year since 2018. During that time, people reported losing a total of nearly $245 million, with a median individual loss of $840.(2)
- https://www.kiplinger.com/personal-finance/603028/beware-of-gift-card-scams
All consumers can scan their email for FREE on Lookout’s website to learn about breaches that may have occurred & take action to secure their data.
NSA Releases Guidelines On Mitigating Software Memory Safety Issues
Posted in Commentary with tags NSA on November 15, 2022 by itnerdYesterday the NSA released released guidelines on how organizations can implement protections against software memory safety issues Here’s an snippet from the press release on the topic:
The “Software Memory Safety” Cybersecurity Information Sheet highlights how malicious cyber actors can exploit poor memory management issues to access sensitive information, promulgate unauthorized code execution, and cause other negative impacts.
“Memory management issues have been exploited for decades and are still entirely too common today,” said Neal Ziring, Cybersecurity Technical Director. “We have to consistently use memory safe languages and other protections when developing software to eliminate these weaknesses from malicious cyber actors.”
Microsoft and Google have each stated that software memory safety issues are behind around 70 percent of their vulnerabilities. Poor memory management can lead to technical issues as well, such as incorrect program results, degradation of the program’s performance over time, and program crashes.
I got commentary from Yotam Perkal, Director, Vulnerability Research at Rezilion on this guidance:
Regarding the NSA guidelines, it is true that the majority of exploitable vulnerabilities in languages such as C and C++, are due to memory issues. That said, these languages are still extremely widely used especially in applications that are performance oriented. In the latest StackOverflow developer survey, close to 40% of developers claimed to be using either C or C++ in their daily work, even in open source projects over 15% of the code is still written in these languages (see here). Hence, I don’t see them disappearing any time soon.
It is also important to note that even with a memory safe language, memory management is not entirely memory safe as most of these languages allow the developers the flexibility to perform potentially unsafe memory management tasks. Moreover, for an existing project, migration of code from one language to another isn’t a trivial task and requires skilled workforce in both the source and target language. So all in all I think while the recommendation is valid, I don’t believe it will be widely adopted.
Organizations that do have applications written in memory unsafe languages, should definitely take efforts to make sure they perform proper testing (SAST and DAST) as part of the development cycle in order to identify potential memory issues before code makes its way to production. They should also make sure to enable various binary hardening mechanisms such as ASLR, CFG, NX bit and others while compiling code written in memory unsafe languages.These mechanisms make potential exploitation far more complex. There are open-source tools that enable evaluation of binary hardening status for existing binaries such as checksec.sh.
For open-source projects, there is a possibility to check eligibility to enroll to Google’s OSS-Fuzz project which aims to make common open source software more secure and stable by performing automated fuzzing.
I would recommend that software developers read this guidance and take Mr. Perkal’s advice to make sure that their applications are less exploitable. Because these are dangerous times that we live in, and anything that one can do to minimize the risk of an application that can be exploited is a good thing.
Leave a comment »