iGB North America magazine IGBNA Aug/Sep | Page 20

Compliance and Technology Patrick Barker revealed that the Microsoft auto update feature has been disabled on many Samsung personal computers. Naturally, auto update is there to reduce the amount of time an end user is exposed to any new exploits found on the Microsoft suite of products and is an important part of any security regime. Gmail, Hotmail, and Yahoo Mail. Symantec revealed an interesting social engineering attack on unsuspecting users of these accounts. The attacker only needs to know the victim’s email address and cell phone number for the attack to be attempted. Using the password recovery tool for these services, an attacker clicks the “forgotten password” link on the mail website. The mail provider offers an option for the user to receive a SMS PIN to reset the password. The real user receives a text message from their mail provider, the attacker then sends the user a text purporting to be from Google or whoever is the mail provider along the lines of “There has been unauthorised activity on your mail account, please reply with your authorisation code”. The account can then be compromised if the user replies to the attacker’s message with the PIN, enabling the attacker to reset the mail account password. Deja vu. Some older readers will remember the time when the US classed encryption software as a military product, effectively prohibiting the export of stronger encryption algorithms from the country. During the 90s this restriction resulted in many pieces of software having to be released in two versions; the domestic version having strong encryption and the international, or export, version having much weaker protection. Lobbying by civil libertarians during the 90s was successful in persuading the US Government to move the classification from the Munition List to the Commerce Control List, eventually leading to the full export of stronger encryption key lengths by the turn of the millennium. We are about to find ourselves in a very similar situation. The Wassenaar Arrangement, agreed by 41 nations covering most of Europe and the US, is intended to place export controls on arms and also Dual-Use Goods and Technologies. The Arrangement allows for certain interpretation by countries implementing the rules. So far the suggested drafting by the US seems to be leading us down the same path as we were in during the 90s, with certain code, encryption and exploits requiring a licence before being allowed to be exported or published. As was evidenced by the dumbing down of crypto in the 90s, these restrictions are bad for the security industry, consumers in general and particularly damaging for small security firms who may not have the resources in place to go through the lengthy licencing process in order to 20 | iGamingBusiness North America | Issue 20 | August/September 2015 commercially export their products. This concludes this edition of our security round up. Please do ensure that you take the time to check in with your system admins if your company uses any of the software mentioned above and do look out for your personal security if you own any of the devices or code. Justin Bellinger is Director of Strategy and Business Transformation at Sure CIIM, Channel Islands & Isle of Man. He has been integral in driving forward the company’s global iGaming strategy, and his portfolio includes some of the biggest brands [