Hackers fail to break into Via's StrongBox
$5,000 prize was at stake
IDG News Service - KUALA LUMPUR, Malaysia -- Hackers at a security conference here failed to break into Via Technologies Inc.'s StrongBox security application during a competition, Via officials said today, but the company gathered some valuable feedback from participants.
The Taiwanese microprocessor vendor offered a $5,000 prize to any hacker who could break into StrongBox, a secure virtual hard drive of up to 40GB designed to protect data from computer intruders. Announced on Tuesday, the application uses a combination of hardware-based SHA-1 and 256-bit AES encryption (see "Hack in the Box has a prize inside").
The company ignored a one-hour time-limit rule it had in place for the contest and allowed conference attendees as much time as they wanted to try to break into StrongBox.
One useful piece of advice Via took away from the show was regarding the password log-in. The software asks users to choose how many failed password attempts it should accept, with a maximum of five, before freezing out a user for an unspecified period of time.
But one hacker pointed out he could figure out a way to set the number at zero, giving a potential data thief unlimited tries to guess the correct password. Without such a limit, someone could use a custom CD with every word in the dictionary and word/number combinations to find the right password. Such CDs take only a few minutes to run.
Tim Brown, a marketing manager at Via, said the value of the contest was in the feedback and the publicity.
"These are very knowledgeable people, with a unique way of thinking," he said.
Via's contest gambit was risky. Hundreds of hackers had gathered at the Hack in the Box Security Conference to share information and learn more about security. It's the kind of show that attracts participants wearing T-shirts that say, "I read your e-mail," and one attendee who boasted it took him just minutes to get the hosting hotel's name and room number list, which enabled him to get a key to a room that was not his (it was a friend's) and to bill hotel Internet usage charges to his friend's room, for fun.
He insisted he would pay the friend back.
The StrongBox security application is designed for computers based on Via's C7 and C7-M processors that have the company's PadLock Security Engine. The company used a new Twinhead Corp. laptop, the Efio12BL, which uses a Via C7-M 1.5-GHz mobile processor, for the contest.
StrongBox was developed to showcase the hardware encryption capabilities of the C7 and C7-M processors and to offer a secure means of protectinginformation stored on a notebook computer in the event of loss or theft, according to the company.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts