Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Metaforic Extends Security Protection System to BlackBerry 10 Applications

Software security firm Metaforic on Tuesday announced added support for applications running on BlackBerry 10 to its software protection portfolio.

Software security firm Metaforic on Tuesday announced added support for applications running on BlackBerry 10 to its software protection portfolio.

San Jose, California-based Metaforic’s technology would allow developers to automatically inject the company’s “software immune system” protection into the BlackBerry OS applications to create secure, self-defending software, Metaforic said Jan. 15. The immune system ensures the app can defend itself from targeted malware, repackaging, code tampering, or other attacks and unauthorized modifications.

Metaforic LogoMetaforic approaches software security differently from other companies. Instead of looking at it from an IT perspective, where the goal is to try to keep attackers out of the network and applications, Metaforic focuses on making software strong enough to withstand attacks, Metaforic CEO Dan Stickel told SecurityWeek. Software is generally used in a “hostile environment,” with a myriad of threats such as worms and malware, and almost never is run on a “pristine” operating system, Stickel noted.

“The reality is, we don’t live in a software Eden anymore,” Stickel said.

Recall what happened in early 2011 when attackers breached Nasdaq’s Directors Desk application, which was used to discuss stock information and company financial data. While the seriousness of the attack was initially downplayed, Nasdaq later admitted the attackers had modified the application and had eavesdropped on financial conversations.

“Nasdaq said, ‘Oops. The software was modified that we didn’t know about,’” Stickel said.

Software applications needed to learn from the world of biology and inherently defend against malware and hackers trying to modify the code to do something it wasn’t designed to do, Stickel said. The immune system technology ensures code integrity.

Developers using Metaforic’s software protection technology can inject thousands of interlocking, self-referencing checks into the application source code, Metaforic said. The self-checking anti-tamper system can defend itself from targeted malware that changes application logic, attempts to repackage applications with malicious malware (common with mobile apps), source code tampering, man-in-the-middle attacks, and attempts to sabotage digital signatures and encryption keys.

An attacker would have to first remove each check manually before it would be possible to modify the code. “There’s no known way to get around. There’s no secret key” to bypass the protections and modify the code, Stickel said.

Advertisement. Scroll to continue reading.

The developer can specify what kind of response is appropriate to various threats. The application can attempt to repair any problems it finds, report problems to various locations, or terminate the execution of the program.

The software immune system injected directly into the application while it is being built means security is part of the software’s makeup, Stickel said.

Metaforic’s mobile software immune system “gives users one of the most secure, integrated mobile computing experiences and provides a highly effective and efficient methodology to harden applications to defend themselves against the latest and most malicious attacks,” Stickel said. With mobile support, Metaforic is able to protect software from the inside out, even in high-risk environments where there are no other third-party security products deployed or user devices have been rooted or jailbroken, the company said.

Metaforic already supports a wide range of platforms, including iOS, Android, Linux, Windows and Mac OS X.

Nintendo also uses the technology to harden its licensing systems to protect DS games from piracy. Financial institutions use Metaforic to ensure that their mobile applications security and internal back-office software have not been compromised. Device manufacturers use Metaforic to ensure hardware such as network routers and medical devices have not been tampered with.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...