SlideShare a Scribd company logo
Security risks & vulnerabilities in
              Skype



                   Kelum Senanayake
Introduction


    Skype proclaims that it provides a secure
    method of communication.

    Hundreds of millions of people have chosen to
    use Skype, often on the basis of this assurance.

    But there are some security risk and
    vulnerabilities of Skype.
The user interface does not display a "real
Skype username" in the contact list


    Skype's interface relies on the use of full names
    on the contact list rather than unique user
    names.

    It easy to impersonate other users and
    introduces substantial security risks.

    Average users are easily tricked as a result.
Skype's software downloads are not
delivered over a HTTPS / SSL connection


    Downloads may be tampered with by a third
    party.

    China has been known to produce its own
    Trojan-infected version of Skype.

    Users are exposed to interception,
    impersonation and surveillance.
Skype could provide a backdoor entry

    Skype allows users to establish direct connections with each other.

    It's also "port agile"
          −     If a firewall port is blocked Skype will look around for other
                open ports that it can use to establish a connection.

    If you put Skype behind a firewall or NAT layer, 99% it will work without
    any special configuration.

    Skype could provide a backdoor entry into secure networks for Trojans,
    worms, and viruses.

    It could also provide a channel for corporate data to be freely shared
    between users without any of the usual security considerations.
Skype's proprietary protocol


    Skype uses a proprietary protocol instead of a
    standard one such as the SIP.

    This makes it an unknown from the point of view of
    the vulnerabilities that might be there.

    Every nonstandard application can add
    unnecessary risks to your environment.

    In the end no one really knows what all is built into
    such an application.
References


[1] Privacy International, "Skype Called Answer Mounting Security
   Concerns", [Online]. Available:
   https://www.privacyinternational.org/article/skype-called-
   answer-mounting-security-concerns.[Accessed: Oct. 31, 2011].



[2] Jaikumar Vijayan, "Does Skype Face Security Threat?",
   [Online]. Available:
   http://www.pcworld.com/article/123279/does_skype_face_secur
   ity_threat.html.[Accessed: Oct. 31, 2011].

More Related Content

PDF
Re solution - corona virus cyber security infographic
PDF
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
PPTX
Accessibility Clickjacking, Devastating Android Vulnerability
PPTX
Internet security and privacy
PDF
Endpoint Security
PPTX
Intel McAfee DeepSAFE Technology
PPTX
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
PDF
Venkasure Antivirus + Internet Security
Re solution - corona virus cyber security infographic
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Accessibility Clickjacking, Devastating Android Vulnerability
Internet security and privacy
Endpoint Security
Intel McAfee DeepSAFE Technology
Kaspersky Security for Mac - Comprehensive Protection for the Mac OS X Enviro...
Venkasure Antivirus + Internet Security

What's hot (20)

PDF
The fundamentals of Android and iOS app security
PDF
Acronis Active Protection: A Way To Combat Ransomware Attack
PPTX
How to Add Advanced Threat Defense to Your EMM
PDF
iOS and Android security: Differences you need to know
PPTX
Cloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks
PPTX
Web security
PDF
Is Security Optional20100608
PDF
Chapter 1, Transformasi antivirus
PPTX
Secure Your Mobile Apps
PPTX
Web appsec and it’s 10 best SDLC practices
PPTX
Computer viruses
PPTX
Wordpress security
DOCX
CLASS VII COMPUTER SECURITY
PPTX
F5 Networks- Why Legacy Security Systems are Failing
PPTX
Network basic security
PPTX
iOS Security: The Never-Ending Story of Malicious Profiles
PDF
Internet explorer tech support call 1 866-757-9494
PDF
Cisco umbrella overview
PDF
Web App Se Saidi Scan
PDF
The World Against the Bad, Cisco AMP Solution to the Rescue
The fundamentals of Android and iOS app security
Acronis Active Protection: A Way To Combat Ransomware Attack
How to Add Advanced Threat Defense to Your EMM
iOS and Android security: Differences you need to know
Cloud Attacks: A Live Simulation of Cloud MIsconfiguration Attacks
Web security
Is Security Optional20100608
Chapter 1, Transformasi antivirus
Secure Your Mobile Apps
Web appsec and it’s 10 best SDLC practices
Computer viruses
Wordpress security
CLASS VII COMPUTER SECURITY
F5 Networks- Why Legacy Security Systems are Failing
Network basic security
iOS Security: The Never-Ending Story of Malicious Profiles
Internet explorer tech support call 1 866-757-9494
Cisco umbrella overview
Web App Se Saidi Scan
The World Against the Bad, Cisco AMP Solution to the Rescue
Ad

Viewers also liked (18)

PDF
EJB 3.0 - Yet Another Introduction
PDF
Node.js Introduction
PDF
Couchbase - Yet Another Introduction
PDF
What you need to know about GC
PDF
A Searchable Symmetric Key Cipher System
PDF
Attacking Turkish Texts Encrypted by Homophonic Cipher
PPTX
Gırgır sunum
PDF
Searchable Encryption
PPT
Secure Data Sharing in Cloud (SDSC)
PDF
Analysis of Searchable Encryption
PPTX
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
PDF
Searchable Encryption Systems
PDF
How to Share a Secret
PDF
Search on encrypted data
PDF
GPU Programming with Java
PDF
The NFS Version 4 Protocol
PDF
Knight's Tour
PPTX
Cloud security ppt
EJB 3.0 - Yet Another Introduction
Node.js Introduction
Couchbase - Yet Another Introduction
What you need to know about GC
A Searchable Symmetric Key Cipher System
Attacking Turkish Texts Encrypted by Homophonic Cipher
Gırgır sunum
Searchable Encryption
Secure Data Sharing in Cloud (SDSC)
Analysis of Searchable Encryption
Discrete Logarithmic Problem- Basis of Elliptic Curve Cryptosystems
Searchable Encryption Systems
How to Share a Secret
Search on encrypted data
GPU Programming with Java
The NFS Version 4 Protocol
Knight's Tour
Cloud security ppt
Ad

Similar to Security Risks & Vulnerabilities in Skype (20)

PPTX
Pegasus Spyware - What You Need to Know
PDF
pegasus-whatyouneedtoknow-160916194631 (1).pdf
PPTX
iOS-Application-Security-iAmPr3m
PDF
INFOSEC_UAB_2016_Conference_Chemerkin_Yury.pdf
PDF
Ios Application Security The Definitive Guide For Hackers And Developers Davi...
PPTX
Umbrella DUO Multi-Factor Authentication
PPTX
Kali Linux - Falconer - ISS 2014
PDF
Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...
PPTX
Final project slideshare
PPTX
Final project slideshare
PPTX
Web security: concepts and tools used by attackers
PPTX
Kali Linux - CleveSec 2015
PDF
Cybersecurity-NSIC.pdf
PDF
Debunking the Myths of SSL VPN Security
PDF
Drupal Security Seminar
PDF
Estratégia de segurança da Cisco (um diferencial para seus negócios)
PPTX
Web Application Security
PDF
Pangolin whitepaper
PDF
Secure codingguide
PPTX
Cybersecurity Awareness Session by Adam
Pegasus Spyware - What You Need to Know
pegasus-whatyouneedtoknow-160916194631 (1).pdf
iOS-Application-Security-iAmPr3m
INFOSEC_UAB_2016_Conference_Chemerkin_Yury.pdf
Ios Application Security The Definitive Guide For Hackers And Developers Davi...
Umbrella DUO Multi-Factor Authentication
Kali Linux - Falconer - ISS 2014
Presentation : CIO challenges by AJ.Prinya ในงานสัมมนาผู้บริหารไอที เมื่อวันท...
Final project slideshare
Final project slideshare
Web security: concepts and tools used by attackers
Kali Linux - CleveSec 2015
Cybersecurity-NSIC.pdf
Debunking the Myths of SSL VPN Security
Drupal Security Seminar
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Web Application Security
Pangolin whitepaper
Secure codingguide
Cybersecurity Awareness Session by Adam

Recently uploaded (20)

PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Electronic commerce courselecture one. Pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
SOPHOS-XG Firewall Administrator PPT.pptx
Electronic commerce courselecture one. Pdf
NewMind AI Weekly Chronicles - August'25-Week II
Programs and apps: productivity, graphics, security and other tools
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Advanced methodologies resolving dimensionality complications for autism neur...
Tartificialntelligence_presentation.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
Assigned Numbers - 2025 - Bluetooth® Document

Security Risks & Vulnerabilities in Skype

  • 1. Security risks & vulnerabilities in Skype Kelum Senanayake
  • 2. Introduction  Skype proclaims that it provides a secure method of communication.  Hundreds of millions of people have chosen to use Skype, often on the basis of this assurance.  But there are some security risk and vulnerabilities of Skype.
  • 3. The user interface does not display a "real Skype username" in the contact list  Skype's interface relies on the use of full names on the contact list rather than unique user names.  It easy to impersonate other users and introduces substantial security risks.  Average users are easily tricked as a result.
  • 4. Skype's software downloads are not delivered over a HTTPS / SSL connection  Downloads may be tampered with by a third party.  China has been known to produce its own Trojan-infected version of Skype.  Users are exposed to interception, impersonation and surveillance.
  • 5. Skype could provide a backdoor entry  Skype allows users to establish direct connections with each other.  It's also "port agile" − If a firewall port is blocked Skype will look around for other open ports that it can use to establish a connection.  If you put Skype behind a firewall or NAT layer, 99% it will work without any special configuration.  Skype could provide a backdoor entry into secure networks for Trojans, worms, and viruses.  It could also provide a channel for corporate data to be freely shared between users without any of the usual security considerations.
  • 6. Skype's proprietary protocol  Skype uses a proprietary protocol instead of a standard one such as the SIP.  This makes it an unknown from the point of view of the vulnerabilities that might be there.  Every nonstandard application can add unnecessary risks to your environment.  In the end no one really knows what all is built into such an application.
  • 7. References [1] Privacy International, "Skype Called Answer Mounting Security Concerns", [Online]. Available: https://www.privacyinternational.org/article/skype-called- answer-mounting-security-concerns.[Accessed: Oct. 31, 2011]. [2] Jaikumar Vijayan, "Does Skype Face Security Threat?", [Online]. Available: http://www.pcworld.com/article/123279/does_skype_face_secur ity_threat.html.[Accessed: Oct. 31, 2011].