Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
UCS Invicta: Integrated Flash
Deploy flash memory technology to
deliver peak workload performance.

Find out more>>
Enterprise I.T.
Next Generation Data Center Is Here!
Average Rating:
Rate this article:  
Heartbleed Bug Could Disconnect Internet of Things
Heartbleed Bug Could Disconnect Internet of Things

By Jennifer LeClaire
April 10, 2014 10:11AM

    Bookmark and Share
One significant area that has been covered less in the industry press is the impact that the Heartbleed bug could have outside of the population of vulnerable Web servers. The impact to Web servers is a big deal. But consider what else might be impacted by the Heartbleed bug. Here's a hint: it's Internet of Things Day today.
 



Major technology vendors have been pressing hard on the Internet of Things (IoT), but the Heartbleed bug could bring a disconnect before the movement ever gains momentum.

About two weeks ago, Cisco, IBM, GE and AT&T launched the Industrial Internet Consortium, an open membership group that aims to break down technology silo barriers and drive better big data access with improved integration between digital and physical worlds. IoT believers were rejoicing.

Heartbleed is a wakeup call. Impacting most of the Internet, Heartbleed could give hackers access to user passwords and even trick people into using fake versions of popular Web sites. Security engineers at Codenomicon who found the bug, are reporting that the vulnerability is in the OpenSSL cryptographic software library. The weakness, they said, steals information typically protected by the SSL/TLS encryption used to secure the Internet.

Connecting Everything

We caught up with Ed Moyle, director of Emerging Business and Technology, ISACA, an international professional organization focused on IT governance, to get his thoughts on the IoT-Heartbleed connection. First, he told us it’s a monumental bug in that up to 66 percent of the Internet is potentially impacted, according to Netcraft data.

“One significant area that has been covered less in the industry press is the impact this issue could have outside of the population of vulnerable Web servers,” Moyle said. “Now clearly, the impact to Web servers is a big deal. But consider for a moment what else might be impacted by this. Here's a hint: it's Internet of Things Day today.”

Moyle explained that OpenSSL has a developer-friendly license, requiring only attribution for it to be linked against, copied and pasted or otherwise incorporated into a derivative software product. Of course, it’s also free. According to Moyle, all this makes it compelling for developers to use OpenSSL for anything that requires SSL functionality, including toasters to ICS systems, medical equipment, smoke detectors, remote cameras, consumer-oriented cable routers and wireless access points.

Weeds and Thorns

“The underlying reason for the wide reach of that problem is that the code for ASN1 parsing was reused and recycled so extensively in other products,” Moyle said. “Because ASN1 parsing is hard to do, finding code that does it already and incorporating it into derivate software is a huge timesaver.”

Likewise, he continued, SSL functionality is complicated to write -- it is advantageous to incorporate something that is already written, like OpenSSL, particularly when doing so doesn't incur additional cost to you or lock you in to a particular operating system platform, such as with OS-specific proprietary libraries. (continued...)

1  |  2  |  Next Page >

 

Tell Us What You Think
Comment:

Name:

Ulf Mattsson, CTO:

Posted: 2014-04-10 @ 11:35am PT
I agree that “Heartbleed Bug Could Disconnect Internet of Things”, but protecting your Data can be even worse. Do it before it’s too late. Applications will continue to expose your data via different vulnerabilities.
The Heartbleed situation is not the first issue with faulty software implementation that makes strong protocols vulnerable to attacks.

Regardless if the lack of boundary checking in this open source code software implementation was a result of bad coding or a government backdoor, it can execute code that exploit data in memory.

What can we do?

We cannot wait for better software development practices or for upgrading the networks from IPSEC v4 to v6. No, this is like boiling the ocean.

Should we go back to a version of the protocol implementation that did not have the issues resulting in changing our applications and lengthy testing? No. We are lucky if we did not upgrade too fast to new unproven versions or fixes.

Instead we can proactively protect sensitive data, even in memory, with modern approaches.

This will help against other attacks on data. We should expect that preaches will happen to us.

Another recent example is Bitcoin, a strong protocol, but with 146 malware types that are exploiting vulnerabilities in the open source implementation that was rushed to market.

This never ending issue is not a new issue.

Another infamous situation comes to memory.
Many years ago Netscape key management for SSL, another strong protocol, had a faulty software implementation that made it vulnerable to attacks.

This is a never ending issue. So, protect the data flow with modern approaches as data tokenization.

Ulf Mattsson, CTO Protegrity





 Enterprise I.T.
1.   BlackBerry Acquires Secusmart
2.   BlackBerry BES 10 Now Hosted
3.   Teaming Up: CIOs, IT Asset Managers
4.   Juniper DDoS for High-IQ Networks
5.   IBM Rolls Out Hybrid Cloud Services


advertisement
Backlash Stirs Against H-1B Visas
Debate over foreign workers continues.
Average Rating:
BlackBerry Acquires Secusmart
German security firm offers street cred.
Average Rating:
IBM Rolls Out Hybrid Cloud Services
Based on SoftLayer net infrastructure.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Canadian Government Charges China With Cyberattack
The government of Canada is not happy with China. Canadian officials have accused "a highly sophisticated Chinese state-sponsored actor" of launching a cyberattack on its National Research Council.
 
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 

Enterprise Hardware Spotlight
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 

Mobile Technology Spotlight
Android 'Fake ID' Puts Millions of Users at Risk
Having this fake ID is nothing to brag about, even if you are a minor. The “Fake ID” Android flaw drops malware into smartphone apps. It can steal credit card data and even take over your device.
 
FTC Wants Fix for 'Perfect Scam' of Mobile Cramming
The U.S. Federal Trade Commission has issued new guidelines to curb “mobile cramming,” a troublesome practice that adds unauthorized third-party charges to mobile phone bills.
 
Facebook: You Will Use Messenger, and You Will Like It
Starting this week, Facebook users with Android and iOS phones will be forced to use the separate Messenger app to send Facebook messages. Pending messages will still be visible in the main app.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.