text
stringlengths 0
118
|
---|
and vulnerabilities. Spurring people to download and install the updates on |
a regular basis is like pulling teeth. It is a chore for people to keep patching, |
especially given how much software we are using. |
Software companies also stop supporting old software, a move they refer |
to as “deprecating” a particular program. Unfortunately, but often for good |
reasons, people grow attached to old software and don’t want to abandon it. |
People often don’t have the financial resources to constantly upgrade their |
tools. Additionally, abandoning software might render certain data and files |
unusable. For example, if a person creates a video with a video editing |
program, the video source file could be incompatible with other programs. |
If the law holds software makers more responsible for the downstream |
consequences of poor security choices, then software would likely become |
more secure. More money would be invested in security. There would be |
more testing before launching software. More care might be taken when |
determining when to stop supporting updates and how best to safely |
transition people to new systems. |
We are not arguing that software must be perfect on security. But |
software should at least be up to a reasonable standard. With the |
proliferation of connected products and devices, so many things now have |
software in them and this software often has poor security. Without greater |
accountability, bad software can continue to flood the market and put us all |
at serious risk. |
Distributors |
Distributors are a group of actors that help distribute insecure products and |
services. They create places that appear safe—websites, platforms, online |
marketplaces—and they make it easy for individuals to find out about |
products and services and to purchase or use them. Unfortunately, |
distributors fail to adequately screen these products and services. It’s akin to |
supermarkets stocking their shelves with tainted food. |
Ad Networks |
Suppose you are a cautious Internet surfer. You don’t visit strange sites |
or anything that seems dubious or disreputable. You just go to mainstream |
news sites, large retailer sites, or the websites of big companies you know. |
You think you are safe . . . but we have bad news for you. |
Imagine you are on a popular website and you see an interesting ad. You |
click the ad and suddenly you are thrown into a digital hell. The ad sends |
you to a malicious site, which infects your computer with malware. |
This malady is known as “malvertising”—a mashed-up word for |
“malicious advertising.” Malvertising involves fake ads created by hackers |
and fraudsters. When you click on them, the ads take you to a phishing site |
or a site that will infect your computer with a virus. |
Many popular websites use ad networks to select and deliver ads. Ad |
networks are companies that serve ads on thousands of websites.22 Instead |
of websites themselves selling and arranging all the ads themselves, ad |
networks manage the sale of advertising opportunities. Many ads are |
submitted to the various ad networks, and the networks often don’t have |
time to examine each ad carefully—the system is highly automated. |
The online advertising ecosystem is a remarkably complex network. It |
involves “publisher sites, ad exchanges, ad servers, retargeting networks |
and content delivery networks (CDNs). Multiple redirections between |
different servers occur after a user clicks on an ad. Attackers exploit this |
complexity to place malicious content in places that publishers and ad |
networks would least expect.”23 |
A malicious ad might contain hidden coding that could allow a hacker to |
install a virus or infiltrate a computer or computer network. Once inside, the |
hacker can install ransomware or access data.24 |
But I only visit mainstream legitimate websites, you might think. I can’t |
be infected if I’m visiting only sites of large reputable companies. If you |
think this, you are wrong . . . very wrong. The list of mainstream companies |
that have had malicious ads on their site is quite long.25 The only way to |
completely protect yourself is to stay offline because there is little you can |
do to combat this issue. Many antivirus software programs aren’t updated |
fast enough to catch the ads. If you visit a site with a malicious ad, your |
computer can be infected almost instantly. Some of the ads require you to |
click, but some will do damage just by being loaded up when you visit the |
website. |
In 2017, fake Adobe Flash update ads were on Equifax’s website. When |
people clicked the ads, their computers became infected with adware.26 In |
2019, just one malvertiser was responsible for 100 million malicious ads.27 |
Malvertisers go to elaborate lengths to make themselves look like |
legitimate companies. They create slick websites, LinkedIn profiles, Twitter |
accounts, and more. These steps make it much trickier to use automation to |
identify them.28 |
Ultimately, it comes down to a tradeoff that advertisers must make. Ad |
networks can profit more by heavily automating their operations and having |
weaker monitoring for security. They can increase security but at a greater |
expense. They could also increase security by scaling down their business. |
The only way they will make choices favoring more security is if they have |
the right incentives. Currently, the incentives created by the market and the |
law, however, are for them to be less secure. |
Platforms |
In the 1980s, spending time at indoor malls was very popular. People felt |
safe there. The malls had security, the stores were mainstream and safe, and |
there were food courts. |
Today, online platforms present themselves as the digital world analogue |
to malls in the 1980s. The problem is that although they appear safe, they |
are not. Dangerous actors lurk there, and individuals visit at their own risk. |
If you go to the app store for Apple or Android, you can find a multitude |
of apps. Many look really neat, and it is so easy to download and use them. |
You might think that they are safe because they are in the store. But often |
they are quite risky. |
Many apps have terrible security. According to one study, 43 percent of |
Android apps and 38 percent of Apple apps had major security flaws.29 |
Another study found that 86 percent of mobile apps had a common security |
vulnerability that could open the door for hackers.30 |
These findings should come as no surprise because there are not many |
incentives for most app developers to prioritize security. They are more |
interested in creating what sells—exciting features and functions. Users |
don’t know enough about security to factor it into their decisions about |
using apps. Thus, there isn’t much market incentive to invest a lot of time or |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.