A Scam-Free Vacation

A lost ID card, using unknown wireless connections, stolen smartphone, skimmers, or laptop theft can ruin that glow you acquired while you were away. You don’t want to have to deal with identity theft or lost devices. These tips from the FTC provide some peace of mind for vacationers.

Top 25 Most Dangerous Software Errors

SANS.org and Common Weakness Enumeration (CWE) have come up with the top 25 most dangerous critical coding errors that can lead to serious vulnerabilities in software. They are often easy to find and exploit. They are dangerous because they will frequently allow attackers to completely take over the software, steal data, or prevent the software from working at all. Although this list was compiled in 2011, the weaknesses listed are still the same today.

A run-down of the top 5:

  1. SQL Injection, ranked as number 1, is still the most common means of attack. For data-rich software applications, SQL injection is a way to steal the keys to the kingdom. A lot of software is all about the data: getting it into the database, pulling it from the database, massaging it into information, and sending it elsewhere for fun and profit. If attackers can influence the SQL that you use to communicate with your database, then suddenly all your fun and profit belongs to them. If you use SQL queries in security controls such as authentication, attackers could alter the logic of those queries to bypass security. They could modify the queries to steal, corrupt, or otherwise change your underlying data. They’ll even steal data one byte at a time if they have to, and they have the patience and know-how to do so. In 2011, SQL injection was responsible for the compromises of many high-profile organizations, including Sony Pictures, PBS, MySQL.com, security company HBGary Federal, and many others.
  2. OS Command Injection is next, and is where the application interacts with the operating system. Your software is often the bridge between an outsider on the network and the internals of your operating system. When you invoke another program on the operating system, but you allow untrusted inputs to be fed into the command string that you generate for executing that program, then you are inviting attackers to cross that bridge into a land of riches by executing their own commands instead of yours.
  3. The classic buffer overflow is third. Buffer overflows are Mother Nature’s little reminder of that law of physics that says: if you try to put more stuff into a container than it can hold, you’re going to make a mess. The scourge of C applications for decades, buffer overflows have been remarkably resistant to elimination. However, copying an untrusted input without checking the size of that input is the simplest error to make in a time when there are much more interesting mistakes to avoid. That’s why this type of buffer overflow is often referred to as “classic.” It’s decades old, and it’s typically one of the first things you learn about in Secure Programming 101.
  4. Cross-site scripting (XSS) is one of the most prevalent, obstinate, and dangerous vulnerabilities in web applications. It’s pretty much inevitable when you combine the stateless nature of HTTP, the mixture of data and script in HTML, lots of data passing between web sites, diverse encoding schemes, and feature-rich web browsers. If you’re not careful, attackers can inject Javascript or other browser-executable content into a web page that your application generates. Your web page is then accessed by other users, whose browsers execute that malicious script as if it came from you (because, after all, it *did* come from you). Suddenly, your web site is serving code that you didn’t write. The attacker can use a variety of techniques to get the input directly into your server, or use an unwitting victim as the middle man (Man-in-the-Middle Attack) in a technical version of the “why do you keep hitting yourself?” game.
  5. Missing authentication for critical function is fifth. In countless action movies, the villain breaks into a high-security building by crawling through heating ducts or pipes, scaling elevator shafts, or hiding under a moving cart. This works because the pathway into the building doesn’t have all those nosy security guards asking for identification. Software may expose certain critical functionality with the assumption that nobody would think of trying to do anything but break in through the front door. But attackers know how to case a joint and figure out alternate ways of getting into a system.

See the full list and learn mitigations and preventions for all 25.

Personal Certificates Renewal Time

Every year at MIT personal web certificates expire on July 31. Renewal is not automatic, so for continued access to MIT’s secure web applications, such as Atlas, WebSIS, COEUS Lite, and ePaystubs, be sure to renew your certificate.

When you obtain your personal certificate, if you haven’t changed your password for over a year, you will be prompted to do so as an additional security measure. You may want to review password strength requirements before choosing a new one.

Certificates obtained after June 30, 2014 are valid until July 31, 2015.

A Year After Sophos Was Released to MIT

There are over 14,000 MIT computers currently running Sophos Anti-Virus. Computers include those in the WIN domain and self-administered MIT hosts. If you aren’t familiar with Sophos, when installed, the software runs in the background, with little to no interruption to your work. When Sophos finds an infected file, the software alerts you and locks the file. You can delete the file, using the Sophos Quarantine Manager. Because the client communicates to the Sophos Management Console (administered by IS&T), various useful pieces of information, such as the status and health of the Sophos client on a machine is provided to the console.

Oracle Critical Patch Updates for July

This month’s Oracle Patch Update provides 113 new security fixes across a wide range of product families including: Oracle Database, Oracle Fusion Middleware, Oracle Hyperion, Oracle Enterprise Manager Grid Control, Oracle E-Business Suite, Oracle PeopleSoft Enterprise, Oracle Siebel CRM, Oracle Industry Applications, Oracle Java SE, Oracle Linux and Virtualization, Oracle MySQL, and Oracle and Sun Systems Products Suite.

As a reminder, Critical Patch Update fixes are intended to address significant security vulnerabilities in Oracle products and also include code fixes that are prerequisites for the security fixes. As a result, Oracle recommends that this Critical Patch Update be applied as soon as possible by customers using the affected products.

The Toughest Job in the Business World?

A recent NY Times article reports on the profession of the chief information security officer (CISO). This profession, which didn’t exist only a few generations ago, is not considered to be for the fainthearted. As the article describes, they must stay one step ahead of the criminal masterminds and keep close tabs on leaky vendors and reckless employees. In addition to putting out virtual fires and protecting data, they must also be skilled at communications and be experts in sophisticated technology.

Read the story in full at the NY Times.

Flash Player Updates & Microsoft Security Updates


Due to recent security vulnerabilities in Flash Player, Adobe has released version ( for Linux) this week for all platforms. All operating systems on the now out-of-date versions are vulnerable and recommended to update to the latest version. Additionally because of the severity of these vulnerabilities, Apple has blocked all out-of-date Flash Player plug-ins for OS X.

From Apple: “Due to security issues in older versions, Apple has updated the web plug-in blocking mechanism to disable all versions prior to Flash Player and”

Install or check your version of Flash Player in your browser here.

For assistance, contact the Help Desk at 617.253.1101 or helpdesk@mit.edu. You can also submit a request online.


Last week on Patch Tuesday, July 8th, Microsoft released six updates to address 29 security vulnerabilities.

Systems affected:

  • Internet Explorer (all supported versions)
  • Microsoft Windows (all supported versions)

There was also updated firmware for all Microsoft Surface tablets, labeled “System Firmware Update – 7/8/2014,” available via Windows Update, improving various hardware issues.

Read the story in the news.


Get every new post delivered to your Inbox.

Join 58 other followers