Feeds

Social sites' insecurity increasingly worrisome

'Fertile ground for malicious coders'

High performance access to file storage

It's not just MySpace that finds itself the focus of fraudsters, however.

Wikipedia, the online community encyclopedia, has also had to deal with such problems. The various Wikipedia sites that allow online users to add and edit content could open the door to potential malicious content, according to security experts.

That's almost what happened in November when a fake site masqueraded as a German version of Wikipedia hosting an entry on a variant of the MSBlast, or Blaster, computer worm. Instead, the web page attempted to compromise visitors' machines. While neither the site nor the content had been hosted on Wikimedia's servers, the phishing scam had such polish that it fooled at least one antivirus firm. The Wikimedia Foundation, the organisation that operates the Wikipedia sites, has seen the writing on the wall and taken steps to limit what users can do.

"We do not allow linking from executables," said Brad Patrick, general counsel for the Wikimedia Foundation. "The intent here is that we are always providing our readers with at least one additional step between us and any malicious content."

Even the virtual world of Second Life, which depends on user-created content to keep its economy going, has had to deal with virtual viruses, known as "grey goo."

For about about two hours on 19 November, the company that manages Second Life, Linden Lab, scrambled to contain an outbreak of Sonic the Hedgehog-esque gold rings. The objects spread within a region, slowing down the servers that maintain the Second Life world, or grid. It's the third major attack since September, each time the world has been overrun with quickly reproducing digital objects that have taken hours to clear out of the system.

Google, Wikimedia, and Linden Lab have all built defenses into their systems, and MySpace has hired former Microsoft investigator Hemanshu Nigam to beef up the social networking site's security.

"Specific to our own products and properties, including sites which host user generated content, we work constantly to prevent people from misusing our services to distribute malicious software," Barry Schnitt, spokesman for Google, stated in an email interview. "When we become aware of an instance where this happens, we take immediate action to limit user exposure."

That's good, but the companies need to attack the broad range of threats, rather than focus on, for example, child porn at the expense of malicious videos, said Websense's Hubbard.

"A lot of their security is geared towards child pornography, taking down content that they don't want on their site," Hubbard said. "They need to get more savvy and build up their security teams, because we are talking about hundreds of millions of pages changing daily."

And, at that rate, the risk will only likely increase, he said.

This article originally appeared in Security Focus.

Copyright © 2006, SecurityFocus

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.