Saturday, January 17, 2009
Around The Horn vol.1,12
Alerts
12:17 AM (8 hours ago)
Investigating and Verifying domains to block (Conficker.B/Downadup.B), (Sat, Jan 17th)
from SANS Internet Storm Center, InfoCON: green
As most of us know, investigation and verification of data plays a critical role in protecting our a ...(more)...
Jan 16, 2009 (16 hours ago)
Conficker.B/Downadup.B/Kido: F-Secure publishes details pertaining to their counting methodology of compromised machines, (Fri, Jan 16th)
from SANS Internet Storm Center, InfoCON: green
Some of our readers have pointed out that more media attention is being given to the rather alarming ...(more)...
Security News
Symantec boss on US Commerce Secretary shortlist
from The Register - Security
Even money shot
Symantec boss John Thompson is on a two-person shortlist to fill the role of the next US Commerce Secretary, the final unfilled vacancy in President-elect Barack Obama's cabinet.…
Jan 16, 2009 (14 hours ago)
Superworm seizes 9m PCs, 'stunned' researchers say
from The Register - Security
Downadup goes up and up
Downadup, the superworm that attacks a patched vulnerability in Microsoft Windows, is making exponential gains if estimates from researchers at F-Secure are accurate. They show 6.5 million new infections in the past four days, bringing the total number of machines it has compromised to almost 9 million.…
Jan 16, 2009 (20 hours ago)
McKinnon's lawyers hope UK prosecution will derail extradition
from The Register - Security
Will change of administration mean change of venue?
Pentagon hacker Gary McKinnon has secured a potential lifeline in his long-running fight against extradition to the US on hacking charges.…
4:59 AM (3 hours ago)
Obama plans to keep his BlackBerry
from Network World on Security
President-elect Barack Obama told CNN today he had a plan to "hang onto" his beloved BlackBerry, but did not explain how he would overcome legal and security concerns..
4:59 AM (3 hours ago)
TelePresence returns at Mumbai hotel
from Network World on Security by Stephen Lawson
Video meeting rooms at the Taj Mahal Palace & Tower in Mumbai have been reopened following November's deadly terrorist attack and armed standoff at the luxury hotel.
4:59 AM (3 hours ago)
Protecting Against the Rampant Conficker Worm
from Network World on Security
Businesses worldwide are under attack from a highly infectious computer worm that has infected almost 9 million PCs, according to antivirus company F-Secure.
4:59 AM (3 hours ago)
Conficker Worm Attack Getting Worse: Protect Yourself
from Network World on Security
Millions of Windows computers have been infected by a new computer worm dubbed "Conficker." The situation is "not getting better," but rather is "getting worse," according to security software vendor F-Secure.
4:59 AM (3 hours ago)
Russians start selling Wi-Fi encryption cracker
from Network World on Security
The Russian security company that caused a stir some months by talking up its cracking tool for recovering Wi-Fi encryption keys, has started selling its software to all-comers in a specially packaged product.
4:59 AM (3 hours ago)
Secure Software: 'See No Evil' is Not a Strategy
from Network World on Security
It has been written that data is the new gold, the new oil, the new currency, and even the new crown jewels. It has become very popular to write about, and to capitalize upon, data as the new medium through which commerce is done. Unfortunately, while gold is typically transported in high security vehicles between highly secured facilities, and while no expense is spared in protecting national money supplies from theft and forgery, data is not managed this way, it is handled by software. This is software written twenty years ago for mainframes in sealed rooms, or software written by brilliant but unseen open source programmers to provide low-cost high-grade functionality, or software written by individuals with little formal secure programming training, looking to improve user experience and corporate profitability. Every major organization, enterprise, and government in the world relies on software, and there is virtually no consensus on what it means to have secure software, how to
Jan 16, 2009 (19 hours ago)
Symantec releases patch for application delivery program
from Network World on Security
Symantec and the U.S. Computer Emergency Readiness Team are warning about a serious vulnerability within the company's AppStream product, used for steaming applications from a central server to thin-client desktops, though a patch has been released.
4:59 AM (3 hours ago)
Aruba updates WLAN management software
from Network World on Security by John Cox
New version of AirWave wireless management software adds tools so retailers can monitor compliance with the latest payment-card industry (PCI) security standards.
4:59 AM (3 hours ago)
'Amazing' worm attack infects 9 million PCs
from Network World on Security
Calling the scope of the attack "amazing," security researchers at F-Secure Friday said that 6.5 million Windows PCs have been infected by the "Downadup" worm in the last four days, and that nearly 9 million have been compromised in just over two weeks.
Jan 16, 2009 (19 hours ago)
Asian executives face jail in U.S. for fixing LCD prices
from Network World on Security by John Ribeiro
Four current and former executives from LG Display in South Korea and from Chunghwa Picture Tubes in Taiwan have agreed to plead guilty and serve jail terms in the U.S. for participating in a conspiracy to fix prices in the sale of TFT-LCD panels, according to the U.S. Department of Justice.
Jan 16, 2009 (19 hours ago)
UK Ministry of Defence stung by rapidly spreading virus
from Network World on Security
The U.K. Ministry of Defence is in the midst of an electronic fight with a computer virus that rapidly spread through its computer networks starting Jan. 6.
Jan 16, 2009 (15 hours ago)
Brief: Single drive wipe protects data, research finds
from SecurityFocus News
Single drive wipe protects data, research finds
Jan 16, 2009 (15 hours ago)
Brief: Oracle's patch overshadows Microsoft's light fix
from SecurityFocus News
Oracle's patch overshadows Microsoft's light fix
Jan 16, 2009 (15 hours ago)
Chris Wysopal: Time to Take the Theoretical Seriously
from SecurityFocus News
Time to Take the Theoretical Seriously
Jan 16, 2009 (18 hours ago)
Conficker worm spikes, infects 1.1 million PCs in 24 hours
from Ars Technica by jhruska@arstechnica.com (Joel Hruska)
The Conficker worm is back with a vengeance, infecting over one million systems in the past 24 hours. The refined version of this malware scans networks for weakly protected machines and actively attempts to spread itself via USB thumb drives. Neither feature was present in the original version, and so far, the attack is working.
Jan 16, 2009 (14 hours ago)
Russian Firm Offers Wi-Fi Encryption Cracker
from PC World Latest Technology News
The technique behind the software, which can decipher WPA/WPA2-PSK passwords, is just a few months old. And now it has a price -- nearly $1,000.
Jan 16, 2009 (14 hours ago)
Conficker Worm Attack Getting Worse: Here's How to Protect Yourself
from PC World Latest Technology News
The biggest computer worm outbreak in years shows no sign of abating as the numbers of impacted PCs climb.
Jan 16, 2009 (14 hours ago)
Protecting Against the Rampant Conficker Worm
from PC World Latest Technology News
The Conficker worm, aka Downadup, has infected millions of PCs worldwide. Here's how to protect yourself.
Jan 16, 2009 (14 hours ago)
Downadup Worm Bores into 9 Million PCs
from PC World Latest Technology News
Finnish security firm says Downadup (aka Conficker) worm has done most of its damage in the past four days.
-- Aurora Report says I think we better take conficker/downadup seriously - patch, patch, patch.
Subscribe to:
Post Comments (Atom)
My Blog List
-
-
'Outer Range' Season 2 on Prime Video: Release Date and Time - CNET - Josh Brolin stars as Wyoming rancher Royal Abbott in season 2 of the sci-fi series.4 hours ago
-
'Outer Range' Season 2 on Prime Video: Release Date and Time - CNET - Josh Brolin stars as Wyoming rancher Royal Abbott in season 2 of the sci-fi series.4 hours ago
-
'Cyberattack' shutters Christie's website days before $840M art mega-auction - Going once, going twice, going offline Christie's website remains offline as of Monday after a "technology security issue" shut it down Thursday night – j...9 hours ago
-
How Did Authorities Identify the Alleged Lockbit Boss? - Last week, the United States joined the U.K. and Australia in sanctioning and charging a Russian man named Dmitry Yuryevich Khoroshev as the leader of the ...17 hours ago
-
Anybody knows that this URL is about? Maybe Balena API request?, (Wed, Feb 7th) - Yesterday, I noticed a new URL in our honeypots: /v5/device/heartbeat. But I have no idea what this URL may be associated with. Based on some googleing, I ...3 months ago
-
Best EDR Of The Market (BEOTM) – Endpoint Detection and Response Testing Tool - BestEDROfTheMarket is a naive user-mode EDR (Endpoint Detection and Response) tool designed to serve as a testing ground4 months ago
-
My Last Email with W. Richard Stevens - In the fall of 1998 I joined the AFCERT. I became acquainted with the amazing book *TCP/IP Illustrated, Volume 1: The Protocols* by W. Richard Stevens...10 months ago
-
Comic for March 12, 2023 - Dilbert readers - Please visit Dilbert.com to read this feature. Due to changes with our feeds, we are now making this RSS feed a link to Dilbert.com.1 year ago
-
87% of Container Images in Production Have Critical or High-Severity Vulnerabilities - At the inaugural CloudNativeSecurityCon, DevSecOps practitioners discussed how to shore up the software supply chain.1 year ago
-
Vulnerability Summary for the Week of November 29, 2021 - Original release date: December 6, 2021 High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info abb -- rtu50...2 years ago
-
AA21-336A: APT Actors Exploiting CVE-2021-44077 in Zoho ManageEngine ServiceDesk Plus - Original release date: December 2, 2021 Summary *This joint Cybersecurity Advisory uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (AT...2 years ago
-
20 years of CGISecurity: What appsec looked like in the year 2000 - Just realized that 20 years have passed since I started this site to learn more about web security threats. What 'appsec' looked like in 2000 OWASP didn't ...3 years ago
-
Ransomware: Why one city chose to the pay the ransom after falling victim - Posted by InfoSec News on Aug 12 https://www.zdnet.com/article/ransomware-why-one-city-chose-to-the-pay-the-ransom-after-falling-victim/ By Danny Palmer Z...3 years ago
-
What the newly released Checkra1n jailbreak means for iDevice security - There are reasons to embrace it. There are reasons to be wary of it. Here's the breakdown.4 years ago
-
Privacy and Mobile Device Apps - Original release date: July 9, 2019 | Last revised: November 15, 2019 What are the risks associated with mobile device apps? Applications (apps) on your sm...4 years ago
-
44CON 2018 - 12th-14th September, London (UK) - Posted by Steve on Feb 28 44CON 2018 is the UK's best annual Security Conference and Training event. The conference spans 2.5 days with training on the 1...6 years ago
-
Cryptopp Crypto++ 5.6.4 octets Remote Code Execution Vulnerability - Crypto++ (aka cryptopp and libcrypto++) 5.6.4 contained a bug in its ASN.1 BER decoding routine. The library will allocate a memory block based on the leng...6 years ago
-
V2V Communications security considerations - The future of vehicles, road infrastructure and driving are changing. We are progressing with vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) ...7 years ago
-
vTech – ignorance is no defence (and neither are weasel words) - This morning, Troy Hunt published a blog post alerting to a recent change in the Terms & Conditions published by children’s toy manufacturer vTech. The cha...8 years ago
-
DOJ probing claims U.S. drug agency 'collaborated' with NSA on intelligence - The U.S. Justice Dept. said it was "looking into the issues" raised by an Reuters story, that one of its law enforcement agencies collaborated with the NSA...10 years ago
-
-
-
-
-
-
-
-
-
No comments:
Post a Comment