Fortify warns on modification risks from portable devices

The reason, says Richard Kirk, the security vendor's European director, is that whilst best practice principles are usually applied to a portable firmware-driven device - such as an electronic book reader - in terms of operating system and allied software, all of these principles tend to disappear out of the window when the device is `cracked' and effectively re-purposed.

Kirk's comments come as the Nook e-book reader - a low-cost device developed by Barnes & Noble last year - has been hacked to fully utilise the Android operating system.

Under the modifications, the e-book reader is effective turned into an Android operating system-based tablet PC complete with a free mobile connection.

"Although the Nook uses a customised version of the Android operating system, it also supports WiFi and 3G cellular, which means it has connectivity with all manner of systems via the Internet," said Kirk.

"This is why the e-reader - which has already been cracked to load the Pandora web-based music service, a Twitter application and a number of Facebook applications - has now been fully cracked to run most Android applications," he added.

According to Kirk, whilst this is potentially great news for home users of the Nook, it poses a significant security risk for companies interested in using the device for corporate purposes, since there is no way of knowing whether the newly installed software - as well as the operating system cracks - comply with security best practices.

These practices, he says, include the need for regular security testing to ensure software that is being developed is inherently secure.

The software industry, he explained, has been extolling the benefits of secure coding practices - so that developers do not keep introducing vulnerabilities - for many years now, as witnessed by his company's Fortify 360 application vulnerability checking service,

Most `home brew' software is excellent from a functional perspective he went on to say, but rarely complies with software development best practices when it comes to security, which is where the risk of using such cracked devices in a company environment enters the frame.

"You wouldn't expect an IT manager to allow unchecked third-party applications to be loaded onto company desktops, so why allow a modified e-reader into the office environment?" he said.

"The problem facing IT managers is that they have no way of knowing whether a portable device like the Nook, has been modified or not, which is why we believe that cracked devices like this pose a potentially serious security risk for companies of all sizes," he added.


What’s Hot on Infosecurity Magazine?