Next big security threat: UPnP

It seems that nearly every month there’s a new security threat to a company’s networks and computer systems, it really never ends does it?. A lot of the recent threats have taken advantage of software bugs or glitches, but a recent warning from numerous security institutions takes aim at hardware found in every office and home.

At the end of January, numerous news and tech media services issued warnings about UPnP (Universal Plug and Play) enabled devices. This was taken to be a big issue because of the widespread adoption of these devices and the fact that many of them have little to no security measures, which could open whole systems to attacks. Many business owners and managers are wondering what exactly is UPnP and how it can open systems to attack.

UPnP defined
UPnP is a protocol or code that allows networked devices like laptops, computers, Wi-Fi routers, and many modern mobile devices, to search for and discover other devices connected to, or wanting to connect to, the same network. This protocol also allows these devices to connect to one-another and share information, Internet connection and media.

A good example of UPnP in use is your laptop. When you first connect your laptop to your router, you likely have to enter a password and maybe even the router’s network name. Without UPnP you would have to find the network and enter the password each time you want to connect to the Internet. With UPnP, your laptop can automatically connect whenever it’s in range.

Why is UPnP a security threat?
UPnP has been in use for the better part of seven years and has since come to be found in nearly every device that connects to the Internet – pretty much everything. While it was written for devices in the home e.g., Wi-Fi routers, many businesses also use these devices because they are often easier to set up and cost less than their enterprise counterparts.

Because of the sheer number of devices that use this protocol, and the fact that it’s engineered to respond to any request to connect to the device, it makes sense that this could be a security issue. A recent study tested the security of UPnP and revealed some interesting results.

Rapid7, the company that conducted the study, sent UPnP discovery requests to every routable IPv4 address. – IPv4 (Internet Protocol version 4) is a set of protocols for sending information from one computer to another on the Internet. A routable IPv4 address is one that can be contacted by anyone on the Internet. They found that over 80 million addresses used UPnP, and 17 million of these exposed the protocol that enables easy connection to the system or device. This can be easily exploited by hackers.

In other words, 17 million systems, many of which could be businesses, are open to attack through the UPnP device. This security threat opens networks to denial-of-service attacks which make resources, including the Internet, unavailable to the user. One example of a popular denial-of-service attack is a hacker making your website unavailable to others.

Can we do anything?
Most experts are recommending that you disable UPnP on your networked devices. The first thing you should do however is to conduct a scan for vulnerable UPnP devices on your network. Tools like ScanNow (for Windows) can help you search. For many, this is a daunting prospect, as the chance of creating more issues is just too great.

We recommend contacting an expert like ourselves, who can conduct a security analysis and advise you on steps you can take to ensure you are secure. So, if you are worried about the security of your systems, give us a call today. We may have a solution for you.

Published with permission from Source.

Office 2013 a tale of many versions

Office365_Feb12_AAt the end of January Microsoft released the much-awaited Office 2013. This release comes in two versions: Microsoft Office 2013 and Office 365. Office 2013 is the more traditional version of Office that you would buy at stores, while Office 365 is following a subscription based system. As usual, Microsoft has released many different versions of Office 2013 which could be confusing if you’re thinking about upgrading.


Money tight? Cut printing costs and save

One common business term thrown around with relish is overhead. In business this is usually known as ongoing expenses incurred in operating a business. This operating expense is something all companies have, and in tight economic situations it’s often one of the first costs managers try to decrease. One form of overhead not often looked at is printing costs. These can be extraordinarily high, but are also easy to decrease.


250,000 Twitter accounts no longer secure

Security_Feb13_AWith the increasing popularity of social media services, it’s not surprising that hackers are constantly testing the security a site and its users employ. From time-to-time the hackers are successful. For the most part, what the hackers do is either publish user passwords or bring the system down. The first big security breach of the year has just been reported.


Virtualization servers? Here's 5 tips!

In many tech circles the idea of virtualization – moving physical elements of existing business components onto virtual solutions – is a popular one. Among the different types of devices that can be virtualized, servers are the most common, and for many businesses the easiest and cheapest to go virtual. Are you looking to get more out of your servers?