Hackers fail to break into Via's StrongBox
$5,000 prize was at stake
IDG News Service - KUALA LUMPUR, Malaysia -- Hackers at a security conference here failed to break into Via Technologies Inc.'s StrongBox security application during a competition, Via officials said today, but the company gathered some valuable feedback from participants.
The Taiwanese microprocessor vendor offered a $5,000 prize to any hacker who could break into StrongBox, a secure virtual hard drive of up to 40GB designed to protect data from computer intruders. Announced on Tuesday, the application uses a combination of hardware-based SHA-1 and 256-bit AES encryption (see "Hack in the Box has a prize inside").
The company ignored a one-hour time-limit rule it had in place for the contest and allowed conference attendees as much time as they wanted to try to break into StrongBox.
One useful piece of advice Via took away from the show was regarding the password log-in. The software asks users to choose how many failed password attempts it should accept, with a maximum of five, before freezing out a user for an unspecified period of time.
But one hacker pointed out he could figure out a way to set the number at zero, giving a potential data thief unlimited tries to guess the correct password. Without such a limit, someone could use a custom CD with every word in the dictionary and word/number combinations to find the right password. Such CDs take only a few minutes to run.
Tim Brown, a marketing manager at Via, said the value of the contest was in the feedback and the publicity.
"These are very knowledgeable people, with a unique way of thinking," he said.
Via's contest gambit was risky. Hundreds of hackers had gathered at the Hack in the Box Security Conference to share information and learn more about security. It's the kind of show that attracts participants wearing T-shirts that say, "I read your e-mail," and one attendee who boasted it took him just minutes to get the hosting hotel's name and room number list, which enabled him to get a key to a room that was not his (it was a friend's) and to bill hotel Internet usage charges to his friend's room, for fun.
He insisted he would pay the friend back.
The StrongBox security application is designed for computers based on Via's C7 and C7-M processors that have the company's PadLock Security Engine. The company used a new Twinhead Corp. laptop, the Efio12BL, which uses a Via C7-M 1.5-GHz mobile processor, for the contest.
StrongBox was developed to showcase the hardware encryption capabilities of the C7 and C7-M processors and to offer a secure means of protectinginformation stored on a notebook computer in the event of loss or theft, according to the company.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts