Re: [SC-L] SearchSecurity: Badware versus malware

2012-05-11 Thread Ben Laurie
On 8 May 2012 07:18, Gary McGraw  wrote:
> hi sc-l,
>
> What’s worse, bad software or malicious software?  In fact, what’s the 
> difference?
>
> My second column for SearchSecurity is all about that.  Read it today.  And 
> pass it on.
> http://searchsecurity.techtarget.com/opinion/Gary-McGraw-Eliminating-badware-addresses-malware-problem
>
> Bottom line: Talking about malware may be more fun and entertaining than 
> talking about endless security bugs, but if we’re going to combat malware we 
> have to start with the badware vector.

Fixing badware universally would plug one hole - and it's certainly a
hole worth plugging. But it won't eliminate malware - it seems it is
not hard to persuade users to install it for you, for example.

>
> gem
>
> company www.cigital.com
> podcast www.cigital.com/silverbullet
> blog www.cigital.com/justiceleague
> book www.swsec.com
>
> ___
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
> as a free, non-commercial service to the software security community.
> Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
> ___

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


[SC-L] MoST 2012 (SPW) registration

2012-05-11 Thread Larry Koved
On behalf of the workshop co-chairs and program chair, we would like to 
invite you participate in the Mobile Security Technologies (MoST) 
Workshop.

The workshop will be held at the The Westin St. Francis Hotel, San 
Francisco.

Workshop registration site: 
http://www.regonline.com/Register/Checkin.aspx?EventID=1072068 

MoST is part of the Security and Privacy Workshops (SPW)
event (http://www.ieee-security.org/TC/SPW2012/),
co-located with the IEEE Security & Privacy Symposium.
Note that participants may take advantage 
of a "workshop pass", i.e. move between all workshops that day. This 
includes the W2SP, MoST, and WSCS workshops.

Mobile Security Technologies (MoST) brings together researchers, 
practitioners, policy makers, and hardware and software developers 
of mobile systems to explore the latest understanding and advances 
in the security and privacy for mobile devices, applications, and systems.

Consult the workshop website (http://www.mostconf.com) for additional 
details,
including the workshop schedule.

Hotel information is available:
http://ieee-security.org/TC/SPW2012/hotels.php 

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___


Re: [SC-L] SearchSecurity: Badware versus malware

2012-05-11 Thread Goertzel, Karen [USA]
In other words, flaws and defects caused through developer error, ignorance, 
negligence etc. can be exploited to cause harm. So even if one could prevent 
actual intentional malicious inclusions in software, one hasn't eliminated the 
problem of exploitable flawed logic.

The megachallenge, of course, is looking for what one doesn't actually know is 
there. Which is why software security testing is so hard.

===
Karen Mercedes Goertzel, CISSP
Lead Associate
Booz Allen Hamilton
703.698.7454
goertzel_ka...@bah.com

"I love deadlines. I like the whooshing sound they make as they fly by."
- Douglas Adams


From: sc-l-boun...@securecoding.org [sc-l-boun...@securecoding.org] on behalf 
of Peter G. Neumann [neum...@csl.sri.com]
Sent: 08 May 2012 11:30
To: Gary McGraw
Cc: Secure Code Mailing List
Subject: Re: [SC-L] SearchSecurity: Badware versus malware

The differences are marginal.
> What's worse, bad software or malicious software? ...

My book has a pervasive theme:
  Many things that could happen accidentally could be triggered
intentionally.
  Many things that happen intentionally could be triggered accidentally.

Trying to reduce one without the other may be foolhardy in most realistic
threat models.

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates
___