• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • App Security Vendor Addresses XSRF Attacks

    February 15, 2011 Alex Woodie

    A Web application security company called Mykonos Software claims to have found an automated way to stop cross-site request forgery (XSRF) attack in their tracks. The new XSRF-fighting technology is included in the latest release of the company’s security appliance, which focuses on detecting attacks on Web applications and stopping them in real time.

    XSRF is a Web application vulnerability that allows hackers to trick victims’ Web browsers into unknowingly performing actions, such as logging onto a bank account or a initiating a trade in a brokerage account. The XSRF attacker takes advantage of the trust that a bank or brokerage website has for its users, and the fact that the victim’s Web browser stores cookies that automate the log-in process.

    The XSRF attack is initiated when a hacker gets a victim to unknowingly consume a malicious piece of code, often an HTML image file, or a segment of JavaScript, that’s downloaded to the victim’s Web browser from an Internet forum or other interactive website open to the public. This malicious code can be used to instruct the victim’s Web browser to request an action against the website associated with a cookie. The XSRF is often called a “one-click” attack, and is often exploited alongside cross-site scripting (XSS) vulnerabilities.

    The XSRF attack mechanism was first documented more than 20 years ago, but it can be difficult to detect, and leave users and their trusted websites wondering which party was the source of fraudulent transactions. While it’s not particularly difficult to block, some high-profile e-commerce companies have nevertheless succumbed to XSRF attacks, including Google, whose Gmail service was hacked in 2007 through the XSRF vulnerability, and NetFlix, which was subjected to an XSRF attack that resulted in changes to users’ movie rental queues.

    Recently, XSRF has been climbing out of the shadow of the XSS vulnerability and developing a nasty reputation of its own. The Open Web Application Security Project listed XSRF as the number five threat to Web application security in last year’s top 10 list. And according to David Koretz, president and CEO of Mykonos, the Department of Homeland Security has rated XSRF as more severe threat than most buffer overflows, “because there is no limit to its potential impact.”

    One surefire way to secure against the XSRF vulnerability is to make sure that Web developers architect and build their applications correctly, with all the proper checks and balances. (Of course, this is the same piece of advice that developers are given to avoid every other Web security vulnerability in the known universe, and you can see how far that’s gotten us?)

    Instead of relying solely on solid development techniques from the outset, practitioners of good security practices increase their odds of surviving the Web’s rough seas by installing secondary security check points. Whereas firewalls and intrusion-prevention systems (IPS) concentrate on network-level protocols, devices such as the Mykonos Security Appliance look at what’s going on with the application layer, which is where the majority of hacking is occurring.

    Last week, Mykonos announced that it has added new XSRF detection routines to its appliance. The Burlingame, California, company says its appliance automatically eliminates XSRF as an attack vendor for customers who use it. “This is another major milestone for Mykonos,” Koretz says.

    Mykonos claims its appliance is superior to other devices by the way it actively participates with Web activity, and how it analyzes hackers to determine their skill levels following the detection of an attack. The vendor says its software tracks hackers over time, and creates tailored defenses designed to thwart the hacker and his techniques.

    There is still much to be desired when it comes to Web application security. According to a recent report from the Ponemon Institute, the majority of organizations spend more time on coffee than securing Web applications.



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Help/Systems:  Robot/SAVE, complete backup and recovery for the i. FREE Webinar. Feb. 17
    looksoftware:  Integrate IBM i apps with web services. FREE Webcast. March 9
    System i Developer:  Upgrade your skills at RPG & DB2 Summit in Orlando, March 22-24

    IT Jungle Store Top Book Picks

    BACK IN STOCK: Easy Steps to Internet Programming for System i: List Price, $49.95

    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The iSeries Pocket Database Guide: List Price, $59
    The iSeries Pocket SQL Guide: List Price, $59
    The iSeries Pocket WebFacing Primer: List Price, $39
    Migrating to WebSphere Express for iSeries: List Price, $49
    Getting Started with WebSphere Express for iSeries: List Price, $49
    The All-Everything Operating System: List Price, $35
    The Best Joomla! Tutorial Ever!: List Price, $19.95

    Magic Software Shoots Skyward Again in Q4 Commands: Underused and Unappreciated

    Leave a Reply Cancel reply

Volume 11, Number 6 -- February 15, 2011
THIS ISSUE SPONSORED BY:

Software Engineering of America
Help/Systems
ASNA
Linoma Software
Shield Advanced Solutions

Table of Contents

  • TPS Delivers IBM i Version of MFT Solution
  • Hubspan Automates B2B from the Cloud
  • Linoma Adds Enterprise Features to MFT Offering
  • App Security Vendor Addresses XSRF Attacks
  • TrendMicro Claims Full Coverage of 64-Bit Domino with ScanMail
  • Vision Re-Brands HA Portfolio Under ‘Availability’ Moniker
  • Aldon Rolls Out Windows Version of Agile ALM Tool
  • Open Source COBOL-IT Tools to be Distributed by Speedware
  • Paessler Updates Network Monitor
  • FIS Sells Missouri Bank and Trust on IBM i Solution

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Meet The Next Gen Of IBMers Helping To Build IBM i
  • Looks Like IBM Is Building A Linux-Like PASE For IBM i After All
  • Will Independent IBM i Clouds Survive PowerVS?
  • Now, IBM Is Jacking Up Hardware Maintenance Prices
  • IBM i PTF Guide, Volume 27, Number 24
  • Big Blue Raises IBM i License Transfer Fees, Other Prices
  • Keep The IBM i Youth Movement Going With More Training, Better Tools
  • Remain Begins Migrating DevOps Tools To VS Code
  • IBM Readies LTO-10 Tape Drives And Libraries
  • IBM i PTF Guide, Volume 27, Number 23

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle