Saturday, February 28, 2009

Distilled vol.1,3 - CAG

A few weeks back in early January I summarized the CSIS recommendation to the President for improving Cyber Security.  That article can be found at the Aurora Report blog located here:  http://aurorareport.blogspot.com/2009/01/distilled-vol11-securing-cyberspace-for.html.

Now as time has progressed and President Obama has been inaugurated he has begun to review what to do about our national cybersecurity posture.  His first step was to request a 60 day review of Cyber Security lead by Melissa Hathaway see interview here: http://www.schneier.com/blog/archives/2009/02/melissa_hathawa.html.


The Consensus Audit Guidelines have recently been posted for comments here http://www.sans.org/cag/print.php and are summarized below:


A consortium of US federal agencies have drawn up a list of critical security controls they hope will serve as a gold standard for cybersecurity.


The Consensus Audit Guidelines (CAG) list is part of larger plans to apply the CSIS Commission report on cybersecurity as a blueprint for making information security systems more secure.
Although these controls were drawn up by federal agencies they might be applied across diverse industry sectors from retailing, to banks, defense contractors and government agencies. The list resembles the guideline drawn up by the credit card industry for adherence to the PCI DSS, at least at first sight. Experts involved in the scheme argue that CAG is far more ambitious.


Critical security controls


1.    Hardware audit.
2.    Inventory of authorized and unauthorized Software.
3.    Secure configurations for computers and servers
4.    Secure configurations of network kits such as firewalls and routers.
5.    Boundary defense
6.    Maintenance of audit logs
7.    Application software security
8.    Application of administrative privileges
9.    Access controls based on need to know
10. Continuous vulnerability testing and remediation
11. Dormant account monitoring and control
12. Anti-malware defenses
13. Limitation and control of ports, protocols and services
14. Wireless device control
15. Data leak protection
16. Secure network engineering
17. Red team exercises
18. Incident response capability
19. Data recovery
20. Security Skills Assessment and Training


The CAG concept Monday garnered backing from the National Security Agency, the Department of Homeland Security, various divisions with the Defense Department, the Department of Energy, the Department of Transportation, the Government Accountability office, MITRE Corp. and the SANS Institute.
Though agencies are restive about FISMA, Gilligan says they are intent on bringing agency inspector generals — as well as NIST and Congress — on board to prove CAG will work. To that end, agencies are working to set up "pilot sites" in their production networks where they can demonstrate how CAG controls would work in practice. "We want real-world examination of this for feedback," Gilligan notes.

The CAG alliance wants feedback on how its guidelines mesh with other government and industry security-compliance efforts, such as the Health Insurance Portability and Accountability Act (HIPAA) guidelines from the Department of Health and Human Services or the Payment Card Industry data standards.

Hope you find this information pertinent and useful.

Friday, February 27, 2009

Around The Horn vol.1,52

Security News

8:36 PM (52 minutes ago)

Caching bugs exposed in second biggest DNS server

from The Register - Security

Birthday Paradox stumps djbdns

For years, cryptographer Daniel J. Bernstein has touted his djbdns as so secure he promised a $1,000 bounty to anyone who can poke holes in the domain name resolution software.…

2:36 PM (6 hours ago)

Camelot dismisses lottery website hack claims

from The Register - Security

Unu strikes again

Camelot maintains the National Lottery website it runs is secure, following the publication of a supposed breach on an underground hacking forum.…

8:36 AM (12 hours ago)

Chinese internet surveillance boss arrested for bungs

from The Register - Security

Anti-virus intrigue

A top Chinese censor has been arrested over suspicions he took millions in bribes to help a local anti-virus firm to crush a competitor.…

7:36 AM (13 hours ago)

Second rogue Facebook app bewilders users

from The Register - Security

Poisoned mushrooms and spam

Scoundrels have created another rogue Facebook application, the second to hit the social networking site in less than a week.…

12:44 PM (8 hours ago)

5 Facebook Scams: Protect Your Profile

from Network World on Security by Jr Raphael

Beny Rubinstein knows computer security. An employee of a Seattle-area tech giant with 20 years of IT experience under his belt, Rubinstein has seen a side of the industry that most people will never know. He holds a degree in computer engineering, and - oh yeah - he just got scammed out of $1100 on Facebook.

12:44 PM (8 hours ago)

Most Oracle database shops don't mandate security patch use

from Network World on Security by Jaikumar Vijayan

A continuing lack of corporate mandates to quickly install Oracle's security patches may be leaving many Oracle database installations exposed to vulnerabilities for extended periods of time, according to survey results released on Wednesday.

12:44 PM (8 hours ago)

How to Achieve More 'Agile' Application Security

from Network World on Security by Kevin Coleman

Application security has become a critical component of all software development efforts. It includes all measures taken throughout the software development lifecycle to prevent programming flaws from being exploited. The flaws that creep in during the requirements, design, development, deployment, upgrades, or maintenance stages of applications become the basis of cyber attacks.

9:04 AM (12 hours ago)

Obama Budget Eyes Boost to Cybersecurity Funds

from Wired Top Stories by Reuters

WASHINGTON (Reuters) - The budget proposed by President Barack Obama includes funding aimed at improving the security of U.S. private and public computer networks.

"The threat to federal information technology networks is real, serious and growing," said an outline of the budget proposal for fiscal 2010 that begins October 1 and released by the Obama administration on Thursday.

The document called for $355 million in funding for the Department of Homeland Security to make private and public sector cyber infrastructure more resilient and secure.

The money would help support the operations of the National Cyber Security Division, as well as initiatives under the Comprehensive National Cybersecurity Initiative, according to the document.

In addition, the administration said it would put "substantial" funding for cybersecurity efforts into the national intelligence program, but gave no details since that funding is kept secret.

That money would be used for "an integrated and holistic approach to address current cybersecurity threats, anticipate future threats, and continue innovative public-private partnerships," it said.

1:39 PM (8 hours ago)

Smartphones Need Smart Security

from PC World Latest Technology News

Half of all global manufacturers report mobile malware infections, third-party application problems, and spam attacks.

Other News

6:44 PM (2 hours ago)

Oracle to Release Major Enterprise Manager Upgrade

from PC World Latest Technology News

Oracle is introducing a major upgrade to its Enterprise Manager platform on Tuesday.

12:39 PM (9 hours ago)

10 Reasons to Avoid Office 2007

from PC World Latest Technology News

Upgrading is inevitable, but migration will be much easier if you're aware of and address these concerns.

Around The Horn vol.1,51

Alerts

4:38 AM (34 minutes ago)

Obama e-health plan: Health IT leaders weigh in

from Network World on Security by Lucas Mearian

President Obama, in his joint speech to Congress this week, emphasized that he wants electronic health records to be established for all Americans over the next five years. His recently passed American Recovery and Reinvestment Act earmarked US$19 billion for health information technology spending, $17 billion of which is designated for incentive payments for Electronic Health Record use beginning in 2011. To date, only about 25% of the nation's 5,000 hospitals have rolled out electronic health records systems, and only a small fraction of physician practices have done the same.

Security News

3:36 PM (4 hours ago)

Seven Must-Have Firefox Security Add-Ons

from CGISecurity - Website and Application Security News by Robert A.

"Ensuring that the browser is up to date can help minimize security risks, but perhaps the most interesting feature of Firefox from a security perspective is the possibility of enhancing the browser's security with the addition of browser extensions or add-ons. Of course any add-ons risks adding new vulnerabilities, but if...

3:36 PM (4 hours ago)

Google Blackhat SEO Hack

from CGISecurity - Website and Application Security News by Robert A.

"Today’s aggressive and spooky abuse of trusted giants reveals just how sophisticated and manipulative these guys have become. By following Google Trends, and with some sharp SEO skills to take advantage of Google’s famed real-time indexing, Scammers are directly targeting Google’s search results, trusted by as many as 70 percent of...

5:36 PM (2 hours ago)

Tweet hackers reopen Twitter vuln

from The Register - Security

Clickjack tit-tat

Twitter's tit-for-tat struggle against clickjackers continues.…

11:34 AM (8 hours ago)

Cambridge security boffins slam banking card readers

from The Register - Security

'Optimised to fail'

Card readers for online banking are inherently insecure, according to a new study by Cambridge security researchers.…

7:34 AM (12 hours ago)

Miley Cyrus hacker in MySpace spam ringtone scam

from The Register - Security

TrainReq invites surfers to vote on own punishment

A teenager already suspected of breaking into the Gmail account of actress Miley Cyrus and swiping candid pictures also hacked into MySpace profiles of other celebrities.…

8:04 AM (11 hours ago)

Acunetix Web Vulnerability Scanner - Voted WindowSecurity.com Readers' Choice Award Winner - Web Application Security

from WindowSecurity.com by info@WindowSecurity.com (The Editor)

Acunetix Web Vulnerability Scanner was selected the winner in the Web Application Security category of the WindowSecurity.com Readers' Choice Awards. Defiance Threat Management System and SecureIIS Web Server Protection were first runner-up and second runner-up.

12:54 PM (6 hours ago)

Study: Hackers still enjoy vandalizing Web sites

from Network World on Security by Jeremy Kirk

A study of 57 Web site hacks from last year showed that 24% were aimed at defacing a site rather than financial gain.

12:54 PM (6 hours ago)

UK declines to prosecute hacker wanted in US

from Network World on Security by Jeremy Kirk

British authorities said Thursday they won't prosecute a hacker who would prefer to face trial in his own country rather than face extradition to the U.S.

12:54 PM (6 hours ago)

1Password updated for Safari 4 beta

from Network World on Security by Peter Cohen

Apple's release of a public beta version of Safari 4, a new version of their Web browser, has spurred Agile Web Solutions to offer 1Password 2.9.9, an update to their password management software. A free upgrade for all paid 1Password customers, 1Password 2.9.9 costs $40.

12:54 PM (6 hours ago)

MessageLabs: Spammers pull at the heart in February

from Network World on Security by Subatra Suppiah

The start of February saw Internet spam levels rise to as high as 79.5 per cent of all e-mails due to a spike in botnet activity and spammers leveraging the financial crisis and Valentine's Day, according to MessageLabs.

5:03 PM (2 hours ago)

Brief: Adobe updates Flash, advises on Acrobat

from SecurityFocus News

Adobe updates Flash, advises on Acrobat

6:46 PM (1 hour ago)

Stop Worms From Automatically Spreading, Easily

from PC World Latest Technology News

Security experts recommend turning off Autorun to guard against worms and other malware. Here's an easy way to do it.

2:06 PM (6 hours ago)

How to Defend Against Drive-By Downloads

from PC World Latest Technology News

Here's the lowdown on a product that can keep your PC safe.

12:06 PM (8 hours ago)

Hackers Use Gmail IM Service to Steal Login Details

from PC World Latest Technology News

Hackers are sending phishing emails to Gmail users via the Google Talk instant messaging system, Sophos has revealed.

4:38 AM (34 minutes ago)

Scammers abuse Google Trends to poison search results

from Network World on Security by Gregg Keizer

Cyber crooks are using one of Google's own tools to poison search results with links that spread fake security software, a researcher said Thursday.

4:38 AM (34 minutes ago)

Getting network baselining right

from Network World on Security by Tim McCreery

Baselining involves recording network traffic and performance, saving it for future reference and/or reviewing it to see traffic patterns. Once baselines are saved, they can be used as a benchmark with which to compare other traffic patterns.

4:38 AM (34 minutes ago)

New software to check virtual security policy

from Network World on Security by Maxwell Cooter

A British company has developed software to help customers check that their security policies have been followed accurately within VMware environments.

11:02 PM (6 hours ago)

Deja Vu - Web Apps , (Fri, Feb 27th)

from SANS Internet Storm Center, InfoCON: green

From FTC File No. 082 3113, the highlight is the Deja Vu, ymmv ...(more)...

11:19 PM (5 hours ago)

Considering ITIL? , (Fri, Feb 27th)

from SANS Internet Storm Center, InfoCON: green

...(more)...

9:03 PM (8 hours ago)

Cisco Security Advisory, (Fri, Feb 27th)

from SANS Internet Storm Center, InfoCON: green

Yesterday Cisco released a Security Advisory forMultiple Vulnerabilities in the Cisco ACE Appl ...(more)...

9:07 PM (8 hours ago)

It's not always about money; sometimes hackers just hate you

from Ars Technica - Front page content by jhruska@arstechnica.com (Joel Hruska)

The commercialization of the malware industry is a major trend we at Ars have followed, but the Web Hacking Incident Database (WHID)'s 2008 annual report indicates that economics remains but one factor among many. Unlike most security reports, WHID samples a very small group of real-world, nonrandom attacks. There were 57 such incidents in 2008, 49 in 2007, and a total of 294 from 1999-2008. The organization changed its inclusion criteria in 2006; the current report only includes data from 2007 as reference material.

Thursday, February 26, 2009

Around The Horn vol.1,50

Alerts

Feb 25, 2009 (18 hours ago)

Cisco Unified MeetingPlace Web Conferencing Authentication Bypass Vulnerability

from Cisco Security Advisories

Cisco Unified MeetingPlace Web Conferencing servers may contain an authentication bypass vulnerability that could allow an unauthenticated user to gain administrative access to the MeetingPlace application. Cisco has released free software updates that address this vulnerability.

Feb 25, 2009 (18 hours ago)

Cisco ACE Application Control Engine Device Manager and Application Networking Manager Vulnerabilities

from Cisco Security Advisories

Multiple vulnerabilities exist in the Cisco Application Networking Manager (ANM) and Cisco Application Control Engine (ACE) Device Manager applications. These vulnerabilities are independent of each other. Successful exploitation of these vulnerabilities may result in unauthorized system or host operating system access.

Feb 25, 2009 (18 hours ago)

Multiple Vulnerabilities in the Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine

from Cisco Security Advisories

The Cisco ACE Application Control Engine Module and Cisco ACE 4710 Application Control Engine Cisco ACE Module and Cisco ACE 4710 Application Control Engine contain multiple vulnerabilities that, if exploited, can result in any of the following impacts:

 

Security News

6:46 PM (11 hours ago)

Microsoft Security Advisory (968272): Vulnerability in Microsoft Office Excel Could Allow Remote Code Execution

from Microsoft Security Content: Comprehensive Edition

Revision Note: February 25, 2009: Added Open XML File Format Converter for Mac to the affected software listed in the Overview section. Also, corrected the mitigating factors for the Web-based attack scenario.Summary: Microsoft is investigating new public reports of a vulnerability in Microsoft Office Excel that could allow remote code execution if a user opens a specially crafted Excel file. At this time, we are aware only of limited and targeted attacks that attempt to use this vulnerability.

6:46 PM (11 hours ago)

Microsoft Security Advisory (967940): Update for Windows Autorun

from Microsoft Security Content: Comprehensive Edition

Revision Note: Advisory publishedSummary: Microsoft is announcing the availability of an update that corrects a functionality feature that can help customers in keeping their systems protected. The update corrects an issue that prevents the NoDriveTypeAutoRun registry key from functioning as expected.

Feb 25, 2009 (12 hours ago)

Fuzzing for Fun and Profit

from CGISecurity - Website and Application Security News by Robert A.

"Many different resources define fuzzing many different ways. I believe this definition is more suiting than most: "Fuzzing is targeting input and delivering data that is handled by a target with the intent of identifying bugs."Fuzzing can occur theoretically where ever input is possible.There are two kinds of fuzzing: "dumb" and...

Feb 25, 2009 (13 hours ago)

Apple goes public with security in Safari 4

from CGISecurity - Website and Application Security News by Robert A.

"Apple announced on Tuesday the public availability of its next browser, Safari 4, seemingly adding a host of new security features to the program along with speedier Javascript processing and additional eye candy, such as cover flow. The security features are not new, however. The company quietly added anti-malware and phishing...

6:47 PM (11 hours ago)

Google Trends Abused to Serve Malware

from McAfee Avert Labs by Craig Schmugar

The other day a worm, often referred to as “Error Check System” was spreading on Facebook.  In fact if you searched for information on this threat, your search results were poisoned to lead unsuspecting victims to a site that attempts to install a rogue anti-spyware Trojan.  Some folks blogged that this search connection was “too much of a coincidence“, and that the Facebook part of the threat was a “red herring“.  I do not believe this is the case, and here’s why.

9:34 PM (8 hours ago)

Hacking contest offers $10,000 for iPhone exploit

from The Register - Security

Pwn2Own your smartphone

An annual hacker competition planned for next month has setting its sights on Apple's iPhone and four other smart phones in a contest that will pay cash prizes of $10,000 to anyone who can break in to the mobile devices.…

Feb 25, 2009 (12 hours ago)

Microsoft aims 'non-security' update at gaping security hole

from The Register - Security

Disabling Autorun once and for all

Microsoft is delivering a Windows software update designed to quash once and for all the difficulty of disabling Autorun, a feature that allows the spread of malware through CDs, USB, and other removable media.…

Feb 25, 2009 (17 hours ago)

Fraud linked to US payment processor breach

from The Register - Security

Malware on servers to blame (again)

US credit unions are reporting a security breach affecting credit and debit card numbers involving a payment processor firm. Neither the name of the company at the centre of the snafu nor how many records might be involved has been disclosed.…

Feb 25, 2009 (21 hours ago)

Gmail phishing attack hits on heels of outage

from The Register - Security

Oh the humanity

Gmail users, still swooning from the extended outage on Tuesday, were hit with a widespread phishing attack hours after the blackout.…

Feb 25, 2009 (23 hours ago)

What are the security threats?

from The Register - Security

Sophisticated Malware or just People?

"Security", as the first article in this series points out, can always be found near the top of the list of concerns of every IT manager and IT director. Unfortunately the same subject can also manage to not quite make it onto the more important list of things to do something about now.…

Feb 25, 2009 (20 hours ago)

Controlling Service Security Using Windows Server 2008 (Part 2)

from WindowSecurity.com by (Derek Melber)

Expanding on the previous article, this time focusing on security settings as well as real time updating of the services and their accounts.

Feb 25, 2009 (19 hours ago)

Using Group Policy to Negate Conflicker on Windows

from WindowSecurity.com by (Derek Melber)

Different methods you can use to help secure a desktop from being infected with the ConFlicker worm.

4:53 AM (1 hour ago)

Bluetooth is not a dental condition

from Network World on Security by M. E. Kabay

Computer scientists Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the NIST has collaborated with John Padgette, an associate at Booz Allen Hamilton to write a new Special Publication entitled "Guide to Bluetooth Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried via these wireless systems.

4:53 AM (1 hour ago)

ConSentry's new correlation features help spot trouble

from Network World on Security by Tim Greene

Recently, ConSentry added more analysis tools to management software for its intelligent switches that make them more of a general troubleshooting tool than just NAC devices.

4:53 AM (1 hour ago)

FCC threatens fines on data protection rules

from Network World on Security by Nancy Gohring

The U.S. Federal Communications Commission may fine 600 operators for failing to properly file annual reports proving that they protect customer data.

4:53 AM (1 hour ago)

SEC, FTC investigating Heartland after data theft

from Network World on Security by Robert McMillan

Federal agencies, including the U.S. Federal Trade Commission and the U.S. Securities and Exchange Commission, have begun investigating Heartland Payment Systems following a massive data breach at the payment processing company.

Feb 25, 2009 (17 hours ago)

Sneaky New Virus Spreads via Ads

from Network World on Security by Brennon Slattery

Hackers infiltrated popular tech business site eWeek.com yesterday using Google's DoubleClick banner ads as a vehicle. Websense caught the malicious coding and published its results, which spurred eWeek to scour its code and remove all phony advertisements.

4:53 AM (1 hour ago)

Gmail's one-two punch: Phishers attack after outage

from Network World on Security by Sharon Gaudin

Gmail users were hit with a double whammy Tuesday.

4:53 AM (1 hour ago)

WiMax system warns drivers of dense fog on dangerous roads

from Network World on Security by Matt Hamblen

A 12-mile stretch of highway in California's Central Valley that has been the scene of deadly car crashes due to thick fog now has a wireless warning system to alert drivers.

Feb 25, 2009 (17 hours ago)

Adobe patches Flash vulnerabilities for three platforms

from Network World on Security by Jeremy Kirk

Adobe Systems has updated its Flash multimedia software to eliminate five flaws affecting Windows, OS X and Linux systems.

Feb 25, 2009 (17 hours ago)

Fight Malware on the Smartphone

from Network World on Security by Robert Vamosi

As more and more people bring personal technology into the workplace-most often smartphones--malicious code writers are beginning to take notice and target these weak points of entry. In its 2009 Cyber Threat Report, the Georgia Tech Information Security Center cited the possibility of botnets moving from the desktop to the smartphone within the year. A few enterprise security vendors are not waiting.

Feb 25, 2009 (17 hours ago)

Survey: Economy Forces Many to Slash, Freeze Security Staff

from Network World on Security by Joan Goodchild

Current economic conditions are having a negative impact on the majority of security budgets, according to a survey conducted by CSO. Many respondents indicated hiring freezes or staff reductions were necessary due to the financial crisis.

Feb 25, 2009 (17 hours ago)

PCI council ranks security risks, milestones

from Network World on Security by Tim Greene

Businesses shouldn't let financial pressures put PCI-security compliance on the back burner, and the PCI Security Standards Council has devised has devised a 12-step program to help merchants get there.

Feb 25, 2009 (17 hours ago)

Microsoft renews Vista anti-crack campaign

from Network World on Security by Gregg Keizer

Starting this week, Microsoft Corp. will feed Windows Vista Ultimate users an update that sniffs out pirated copies, a company manager said Tuesday.

4:01 AM (2 hours ago)

SSLstrip - HTTPS Stripping Attack Tool

from Darknet - The Darkside by Darknet

This tool provides a demonstration of the HTTPS stripping attacks that was presented at Black Hat DC 2009. It will transparently hijack HTTP traffic on a network, watch for HTTPS links and redirects, then map those links into either look-alike HTTP links or homograph-similar HTTPS links. It also supports modes for supplying a favicon which [...]
Read the full post at darknet.org.uk

Feb 25, 2009 (23 hours ago)

Hackers Targeting Xbox Live Players with DoS Attacks

from Darknet - The Darkside by Darknet

Well the day has come when money-minded botnet owners have turned their services towards online gaming. For a small fee (USD20) you can get someone to set you up with the software to ‘boot’ people from the Xbox Live network. It’s always been a problem in gaming, if something can get hold of your IP address [...]
Read the full post at darknet.org.uk

Feb 25, 2009 (16 hours ago)

AutoRun disabling patch released, (Wed, Feb 25th)

from SANS Internet Storm Center, InfoCON: green

Microsoft released a patch to correct the disable autorun registry key enforcement. ht ...(more)...

Feb 25, 2009 (21 hours ago)

Targeted link diversion attempts, (Wed, Feb 25th)

from SANS Internet Storm Center, InfoCON: green

It's always hard to convince people of how easy well targeted attacks penetrate trough our defenses. ...(more)...

Feb 25, 2009 (14 hours ago)

Brief: Apple goes public with security in Safari 4

from SecurityFocus News

Apple goes public with security in Safari 4

Another credit card processor breached, fraud extent unknown

from Ars Technica - Front page content by jhruska@arstechnica.com (Joel Hruska)

Just last month, we covered how the payment processor Heartland Payment Systems had inadvertently exposed up to 100 million credit cards in the largest known data breach to date. In that case, the thieves were able to obtain customers' magnetic strip information; the thefts themselves were likely responsible for a surge in credit card fraud we saw last year. The Heartland problem should have been a wakeup call to all credit card payment processors, but an as-yet-unidentified company must have been asleep at the wheel. There's a growing body of evidence indicating that a second data breach has already occurred.

Feb 25, 2009 (15 hours ago)

Spammers using Yahoo to bait phishing hooks

from Ars Technica - Front page content by jhruska@arstechnica.com (Joel Hruska)

If there's an economic, social, or political event happening in the world, you can bet spammers will leap upon it as an attack vector. It therefore comes as no surprise that January's grim harvest of corporate Q4 results led to a surge in recession-themed e-mails in February. The overall volume of spam sent in February actually decreased slightly (1.3 percent) compared to January, but topics such as "Affordable brand name watches," "Get 15 percent off these," and "Cheaper than you can imagine" dominated subject fields.

Feb 25, 2009 (19 hours ago)

FCC fines telcos for blowing off data protection reports

from Ars Technica - Front page content by ml@lasarletter.net (Matthew Lasar)

It turns out that the Federal Communications Commission actually meant it when the agency warned that phone companies must regularly inform the Commission how they keep the calling records of consumers secure. On Tuesday the FCC proposed fining over 600 of them $20,000 apiece for not filing an annual report on their efforts to protect Customer Proprietary Network Information. CPNI includes the numbers subscribers call, when they call them,and the particular services they use, such as voice mail or call forwarding.

12:34 AM (5 hours ago)

How Perverse Incentives Drive Bad Security Decisions

from Wired Top Stories by Bruce Schneier

An employee of Whole Foods in Ann Arbor, Michigan, was fired in 2007 for apprehending a shoplifter. More specifically, he was fired for touching a customer, even though that customer had a backpack filled with stolen groceries and was running away with them.

Feb 25, 2009 (16 hours ago)

Microsoft Office Vulnerability Affects Excel for Mac

from PC World Latest Technology News

Microsoft is investigating a new vulnerability in Excel that could allow remote code execution if a user opens an infected...

Other News

Feb 25, 2009 (16 hours ago)

Desktops Will Move to the Cloud, VMware Exec Says

from PC World Latest Technology News

The desktop is one the areas ripe for moving into the cloud and the driver will be lower operational costs, says a VMware...

Wednesday, February 25, 2009

Around The Horn vol.1,49

Alerts

Feb 24, 2009 (17 hours ago)

New Excel Trojan Hits the Net

from McAfee Avert Labs by Shinsuke Honjo, Geok Meng Ong

– Update Feb 24, 10:15 PDT –
Microsoft has released a security advisory for this issue (CVE-2009-0238):
http://www.microsoft.com/technet/security/advisory/968272.mspx

Many versions of Excel are vulnerable, including 2000, 2002, 2003, 2007, 2004/2008 for Mac, Excel Viewer/Excel Viewer 2003.

A trojan exploiting an unpatched Microsoft Excel vulnerability has been reported from the field. McAfee Avert Labs has confirmed that Microsoft Excel 2007 and 2003 are affected.  Other versions may also be impacted.

McAfee DAT files identify known malicious Excel spreadsheet files as Exploit-MSExcel.r trojan, and dropped files as BackDoor-DUE trojan in the 5534 DATs.

As with the initial Exploit-PDF.i threat, current attacks are very targeted and limited. When succesfull, it installs a backdoor that attempts to connect a remote site port 80 and waits for commands.

The mitigation for this infection is to block unknown TCP connections. However, one of the best protection methods is to remain vigilant against Excel files from untrusted sources or sent at an unexpected time until a security update is available.

4:52 AM (1 hour ago)

After CERT warning, Microsoft delivers AutoRun fix

from Network World on Security by Robert McMillan

Microsoft is pushing out a software update to some Windows users that fixes a bug in the Windows AutoRun software, used to automatically launch programs when DVDs or USB devices are introduced to the PC.

Feb 24, 2009 (18 hours ago)

Attackers targeting unpatched vulnerability in Excel 2007

from Network World on Security by Jeremy Kirk

Microsoft's Excel spreadsheet program has a 0-day vulnerability that attackers are exploiting on the Internet, according to security vendor Symantec.

4:34 AM (2 hours ago)

Preview/Iphone/Linux pdf issues, (Wed, Feb 25th)

from SANS Internet Storm Center, InfoCON: green

ISC had a few readers write in to let us know that the recent PDF/JBIG issues were cropping up on ot ...(more)...

10:02 PM (8 hours ago)

Adobe flash player patch, (Wed, Feb 25th)

from SANS Internet Storm Center, InfoCON: green

A few readers wrote in to point out the fact that adobe released a new flash update today. It ...(more)...

10:02 PM (8 hours ago)

Adobe Acrobat pdf 0-day exploit, No JavaScript needed!, (Wed, Feb 25th)

from SANS Internet Storm Center, InfoCON: green

So there is a brief blog post linked below that highlights the fact that the new adobe PDF vulnerabi ...(more)...

Feb 24, 2009 (16 hours ago)

Microsoft Releases Security Advisory 968272 Relating To A Vulnerability In Office Excel, (Tue, Feb 24th)

from SANS Internet Storm Center, InfoCON: green

This day just keeps getting better and better. ...(more)...

Feb 24, 2009 (21 hours ago)

Gmail Access Issues Early This AM, (Tue, Feb 24th)

from SANS Internet Storm Center, InfoCON: green

Greetings and welcome to Tuesday, Feb 24th. A number of our readers have written in to repo ...(more)...

Feb 24, 2009 (12 hours ago)

Brief: Attacks prompt Microsoft to fix Excel flaw

from SecurityFocus News

Attacks prompt Microsoft to fix Excel flaw

Security News

Feb 24, 2009 (17 hours ago)

What Have We Learned From Past Virus Infections?

from McAfee Avert Labs by Vinoo Thomas

The year 2009 has so far have a been hectic one for anti-virus vendors and IT administrators alike, “thanks” to two prolific malware families: W32/Conficker and W32/Virut. Malware researchers and field engineers have literally burned the midnight oil to ensure networks are protected against these threats.

Some of the organizations that were hit with these infections had the latest Microsoft updates installed but still got infected. During the post-mortem of the outbreaks, one glaring mistake stood out.

Administrators routinely attend to distress calls from users whenever they have an issue with their machines. By habit, the admins tend to log onto the affected workstation using their own accounts—which have domain-administrator privileges. For a moment, let us assume the suspicious user’s workstation was infected with W32/Conficker. What could possibly go wrong from here?

Feb 24, 2009 (15 hours ago)

Malware Riding On The Tides Of The Economic Crisis

from McAfee Avert Labs by Micha Pekrul

A new spam run is on the loose, misusing the global Economic Crisis as its social-engineering vector. Consumers looking for a bargain should take care, since the bad guys exactly want to fool people trying to save some money these days. Spam mails promoting bargains, which could help in the recession, are hitting the inboxes right now.

6:31 AM (15 minutes ago)

Excel Trojan targets unpatched flaws

from The Register - Security

Another day, another zero-day threat

Virus authors have reportedly created a Trojan that exploits an unpatched vulnerability in a range of versions of Excel.…

12:30 AM (6 hours ago)

Banking app vuln surfaces 18 months after discovery

from The Register - Security

Patch procrastination bares 24 sites

As a security auditor for 11 years, Adriel Desautels has written his share of vulnerability advisories, but never one like the one he issued Tuesday for a software package made by a small Vermont company called Cambium Group.…

Feb 24, 2009 (14 hours ago)

Adobe Flash vulnerable to remote-execution exploit

from The Register - Security

Attack of the killer Shockwaves

Updated Already under the gun for a critical hole in its ubiquitous Acrobat Reader, Adobe's security team has pushed out a fix for another serious vulnerability, this one in the company's Flash animation software.…

Feb 24, 2009 (15 hours ago)

Google's DoubleClick spreads malicious ads (again)

from The Register - Security

Lingering threat still not contained

Google's DoubleClick ad network has once again been caught distributing malicious banner displays, this time on the home page of eWeek.…

Feb 24, 2009 (17 hours ago)

Auction tools firm roots out malware infection

from The Register - Security

Trojan goes under the hammer at Auctiva.com

Auction tools site Auctiva.com has cleaned up its systems after it became the unwitting participant in a malware attack late last week.…

Feb 24, 2009 (19 hours ago)

Unofficial patch plugs 0-day Adobe security vuln.

from The Register - Security

Mind the gap

Updated Security researchers have developed an unofficial patch for a zero-day Adobe Acrobat and Reader vulnerability that's become the subject of hacker attacks.…

Feb 24, 2009 (21 hours ago)

Lads from Lagos crack cabinet minister's webmail account

from The Register - Security

Person in peril scam follows mystery Hotmail hack

Advanced fee fraudsters have broken into the webmail account of UK Justice Secretary Jack Straw to mount an audacious, and potentially politically embarrassing, scam.…

Feb 24, 2009 (19 hours ago)

Rogue Facebook app creates malign buzz

from The Register - Security

Sting in the tail

A Facebook application using misleading messages spread quickly over the weekend. The application itself did no harm beyond making a mess but may be part of an indirect attempt to attract surfers towards sites promoting scareware packages.…

Feb 24, 2009 (18 hours ago)

Remove a Virus or Other Malicious Infection

from Network World on Security by Lincoln Spector

A particularly malicious program infected Kentuckyearl's computer. He asked the Answer Line forum how to get rid of it.

4:52 AM (1 hour ago)

Laid-off Workers as Data Thieves?

from Network World on Security by Bill Brenner

When the depths of the economic crisis became clear last September, public relations firms started using it as an opportunity to drum up publicity for their security vendor clients. One PR flak even started her e-mail pitch to me with an admission that the IT angle was a stretch.

4:52 AM (1 hour ago)

Gov't CIO survey: Cybersecurity still needs work

from Network World on Security by Grant Gross

Cybersecurity continues to be a top concern among U.S. government CIOs, but agencies are still falling short of achieving good security results, according to a new survey of top government IT officials.

4:52 AM (1 hour ago)

VeriSign: We will support DNS security in 2011

from Network World on Security by Carolyn Duffy Marsan

VeriSign has promised to deploy DNS Security Extensions – known as DNSSEC – across all of its top-level domains within two years.

Feb 24, 2009 (22 hours ago)

WMAT Released - Web Mail Auth Tool For Testing Web Mail Logins

from Darknet - The Darkside by Darknet

WMAT is Web Mail Auth Tool that provide some essential functions for testing web mail logins, written in python with support of pyCurl. How it works? It is very simple, You give WMAT file with usernames, file with passwords, URL of web mail app and chose pattern for attack. Patterns are XML files that define post/get fields, [...]
Read the full post at darknet.org.uk

Feb 24, 2009 (13 hours ago)

Hackers Exploit Excel 'Zero-Day' Flaw

from PC World Latest Technology News

Microsoft confirms critical bug as attacks target Asian government offices, corporations.

Feb 24, 2009 (18 hours ago)

Are Alternative PDF Readers Vulnerable to Acrobat Exploit?

from PC World Latest Technology News

Symantec discovered a vulnerability in Adobe Acrobat Reader that can be exploited by specially targeted Trojans.

Feb 24, 2009 (22 hours ago)

Attackers Targeting Unpatched Vulnerability in Excel 2007

from PC World Latest Technology News

Microsoft's Excel spreadsheet program has a 0-day vulnerability that attackers are already exploiting on the Internet...

Other News

'Plug Computers' May Web-Enable Hard Drives

from PC World Latest Technology News

Marvell Technology touts a computer that is smaller and cheaper than a netbook.

Feb 24, 2009 (22 hours ago)

VMware Adds to Cloud Strategy

from PC World Latest Technology News

VMware has security for its cloud OS, an API for integrating internal and external clouds, and improved management features in...

8:59 PM (10 hours ago)

Marvell Plans $100 Computer Inside a Wall Plug

from Wired Top Stories by Priya Ganapati

Marvell is planning a new category of computers called plug computers that resemble cellphone chargers but pack a hefty punch. They won't have a display but can be used as a home server or a network-attached storage device.

Feb 24, 2009 (14 hours ago)

Marvell's SheevaPlug Linux PC fits in its power adapter

from Engadget by Joseph L. Flatley

Marvell has the technology and the vision, and if the company gets its way the world will soon be overrun by lilliputian Linux machines. Hiding in wall warts and the like, these guys will begin quietly taking over tasks that we once relegated to servers and desktop machines. To this end, the company has just announced that they'll be making the SheevaPlug dev kit available. This is the platform that PogoPlug is based on, consisting of a 1.2GHz Kirkwood processor, 512MB flash storage, 512MB DRAM, a Gigabit Ethernet port, and USB 2.0. This bad boy supports many standard Linux 2.6 kernel distributions, and the whole thing plugs directly into a standard wall socket, drawing "less than one tenth of the power of a typical PC" while in use. Currently available for $99, the company says that it anticipates a price drop to $49 "in the near future."

Tuesday, February 24, 2009

Around The Horn vol.1,48

Alerts

Feb 23, 2009 (19 hours ago)

SB09-054: Vulnerability Summary for the Week of February 16, 2009

from US-CERT Cyber Security Bulletins

Vulnerability Summary for the Week of February 16, 2009

And the Oscar goes to..., (Mon, Feb 23rd)

from SANS Internet Storm Center, InfoCON: green

ISC reader Gary wrote in to let us know that searching for oscar presenters and os ...(more)...

 

Security News

Feb 23, 2009 (13 hours ago)

Protect Your Site With URL Rewriting

from CGISecurity - Website and Application Security News by Robert A.

Bryan Sullivan over at Microsoft has published a lengthy article on the advantages of URL writing to prevent certain types of attacks. "Tim Berners-Lee once famously wrote that "cool URIs don't change." His opinion was that broken hyperlinks erode user confidence in an application and that URIs should be designed in...

Feb 23, 2009 (19 hours ago)

CERT Advisory VU#435052: An Architectural Flaw In Transparent Proxies

from CGISecurity - Website and Application Security News by Robert A.

For the past year in my spare time I've been researching a flaw involving transparent proxies and today CERT has published an advisory for this issue. If you have a vulnerable proxy on your intranet NOW is the time to patch (details of affected vendors in the cert advisory). QBIK New...

Feb 23, 2009 (yesterday)

The Multi-Principal OS Construction of the Gazelle Web Browser

from CGISecurity - Website and Application Security News by Robert A.

I was reading slashdot and saw that Microsoft has released a paper outlining a new secure browser architecture. From the abstract"Web browsers originated as applications that people used to view static web sites sequentially. Asweb sites evolved into dynamic web applications composing content from various web sites, browsershave become multi-principal operating...

Feb 23, 2009 (13 hours ago)

Running Windows Malware in Linux

from McAfee Avert Labs by Lokesh Kumar

For the unaware, Wine is an application that enables users to run Windows applications on Unix like computers. Like many users, I use Wine on my Linux machine to run a couple of Windows applications I cannot do without. I could run these applications either on a virtual machine, or even dual boot with Windows and Linux, but running them in wine is just easier.

6:21 AM (23 minutes ago)

Anti-mafia cops want Skype tapping

from The Register - Security

Euro search for tech solution

A European Union agency is investigating how to snoop on crooks using Skype and other Voice over Internet Phone services to avoid traditional police wiretaps.…

9:18 PM (9 hours ago)

Crypto hash boffins trip on buffer overflow

from The Register - Security

Corvair of computer languages strikes again

Two of the programs submitted in the first round of a competition to find the next cryptographic hash standard contain buffer overflow errors that could make them prone to crashes and security problems.…

Feb 23, 2009 (15 hours ago)

Former staff swipe confidential company data

from The Register - Security

Scruples? They've heard of them

More than half - 59 per cent - of US workers made redundant or who left their job last year admitted swiping confidential corporate data, such as customer list, before they left, a new study claims.…

Feb 23, 2009 (15 hours ago)

Feds forge gold standard for cybersecurity

from The Register - Security

Modest revolution

A consortium of US federal agencies have drawn up a list of critical security controls they hope will serve as a gold standard for cybersecurity.…

Feb 23, 2009 (15 hours ago)

Proxy server bug exposes websites' private parts

from The Register - Security

By the dozen

Updated Computer networks that use proxy servers to automatically redirect browser connections should be on the lookout for a serious architectural flaw that could allow attackers to remotely access intranets and other website resources that are normally off limits, security experts are warning.…

Feb 23, 2009 (21 hours ago)

Conficker variant dispenses with need to phone home

from The Register - Security

Stealth variant Sidesteps MS-led takedown effort

Virus authors have released a new variant of the infamous Conficker (Downadup) worm with enhanced auto-update features.…

Feb 23, 2009 (22 hours ago)

Making IT security matter

from The Register - Security

Not just an end in itself

Tech Panel Last year, Freeform Dynamics surveyed the attitudes of tech professionals into IT security.…

4:48 AM (1 hour ago)

Cell phone security

from Network World on Security by M. E. Kabay

Computer scientists Wayne Jansen and Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST) have written a new (October 2008) Special Publication entitled "Guidelines on Cell Phone and PDA Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried on these devices.

4:48 AM (1 hour ago)

NAC deemed a money-making business

from Network World on Security by Tim Greene

There have been two acquisitions over the past weeks that involved NAC vendors.

4:48 AM (1 hour ago)

Adobe flaw has been used in attacks since early January

from Network World on Security by Robert McMillan

A dangerous and unpatched vulnerability in Adobe's PDF-reading software has been around a lot longer than previously realized.

Feb 23, 2009 (yesterday)

Manageability problems

from Network World on Security by David Newman and Joel Snyder

Our woes with Network and Security Manager began when we tried to use it to manage the SRX 5800. With eight years of experience using NSM in Opus One’s labs, we were looking forward to the unification of JunOS and ScreenOS management. We started out needing to change IP addresses, a common enough task. For a ScreenOS system, this takes three clicks: two clicks to see a summary interfaces and IP addresses, and third to begin editing.

Feb 23, 2009 (yesterday)

Fed agencies push new security audits

from Network World on Security by Ellen Messmer

Several federal agencies today expressed backing for the "Consensus Audit Guidelines," a set of proposed 20 cybersecurity controls, that could end up as network and application security requirements for federal agencies and their contractors.

Feb 23, 2009 (yesterday)

Enterprise Provisioning vs. Federated Provisioning

from Network World on Security by Dave Kearns

When last we spoke I left you thinking about deprovisioning both your people from apps you don't control or your apps from people you don't control. It's a big issue with software-as-a-service (SaaS) and federated provisioning. It was the Burton Group's Ian Glazer who said: "...there should be no reason why deprovsioning from an application like Salesforce.com is any harder than deprovisioning from LDAP." And, in truth, maybe it isn't.

4:48 AM (1 hour ago)

The Grill: Jeannette M. Wing on the hot seat

from Network World on Security by Gary Anthes

Jeannette M. Wing is a pioneer in a new discipline called "computational thinking," a term she coined. Computational thinking applies the problem-solving methods of computer science to other disciplines. She's also an authority on "formal methods," mathematically-based techniques for specifying and verifying the correctness of computer hardware and software.

4:48 AM (1 hour ago)

Officer faces court for accessing restricted data

from Network World on Security by Darren Pauli

A 28-year-old police officer will appear in court next month charged with unauthorised access to sensitive police data. The male officer, attached to a Specialist Command, was served with a Court Attendance Notice last week and faces a charge of accessing restricted data held in a police computer. He will appear at Downing Centre Local Court on Thursday March 26.

4:48 AM (1 hour ago)

Starbucks sued after laptop data breach

from Network World on Security by Robert McMillan

A Chicago-area Starbucks employee has brought a class-action lawsuit against the coffee retailer, claiming damages from an October 2008 data breach.

4:48 AM (1 hour ago)

Another payment processor said to suffer data breach

from Network World on Security by Jaikumar Vijayan

Just weeks after Heartland Payment Systems Inc. disclosed what may be one of the largest breaches of payment card data thus far, news is emerging of what could be another major breach involving a payment processing company.

Feb 23, 2009 (17 hours ago)

EBay auction tool Web site infected with malware

from Network World on Security by Jeremy Kirk

A Trojan horse lurking on servers belonging to Auctiva.com, a Web site offering eBay auction tools, infected people's PCs last week.

Feb 23, 2009 (17 hours ago)

Cutting Through the Fog of Cloud Security

from Network World on Security by John Edwards

Daniel Flax, CIO at New York-based investment banking and financial services firm Cowen and Co. , relies on cloud computing to automate his company's sales activities. While he's satisfied with cloud technology's potential to lower upfront costs, decrease downtime and support additional services, he admits that he has had to work hard to get a handle on the emerging technology's security weaknesses . "Security is one of the things we've had to come to grips with," he says.

Feb 23, 2009 (17 hours ago)

Legalize cell phone jammers?

from Network World on Security by Mike Elgan

Jamming a cell phone is illegal in the U.S. Very illegal. And not just by ordinary citizens. It's illegal for theater and restaurant owners to jam calls, and even state and local police or prison officials. The U.S., in fact, has the strictest laws in the world against jamming cell calls.

Feb 23, 2009 (17 hours ago)

Controversial data-security rules slow to take hold in state

from Network World on Security by Jaikumar Vijayan

Massachusetts officials this month gave companies a second reprieve on complying with new regulations aimed at any entity that stores the personal data of state residents. They also softened a particularly contentious provision requiring businesses to ensure that third parties handling such data are in compliance with the rules.

Feb 23, 2009 (17 hours ago)

Computer Thefts Prompt Security Check at Nuke Lab

from Network World on Security by Jaikumar Vijayan

Los Alamos National Laboratory last week launched a monthlong effort to ensure that computers taken off-site by employees fully comply with the nuclear research facility's information security policies.

Feb 23, 2009 (17 hours ago)

Three months, three breaches at Florida university

from Network World on Security by Jaikumar Vijayan

For the second time in three months, the University of Florida in Gainesville has acknowledged a major data breach -- and a statement posted on the University's Web site indicates that there was a third, less public, breach discovered by the school during the same period.

Feb 23, 2009 (17 hours ago)

BigFix hits rivals with 50 percent price chop

from Network World on Security by John E. Dunn

Tough times could be driving increased competition in enterprise software with the news that BigFix is to undercut its rivals' patch management renewal licensing by up to 50 percent.

Feb 23, 2009 (yesterday)

Hackers Target 0-Day Vulnerability In Adobe PDF Reader & Acrobat

from Darknet - The Darkside by Darknet

Another flaw in the Adobe product suite! It seems like PDF is turning into a complex animal, complexity of course always brings more security issues. It was only back in February last year when there was a bug in Adobe Reader, and almost exactly a year later another one. This time it’s a zero-day just hit and [...]
Read the full post at darknet.org.uk

Feb 23, 2009 (17 hours ago)

Turf War, (Mon, Feb 23rd)

from SANS Internet Storm Center, InfoCON: green

Malware which comes with its own hosts file to install in \system32\drivers\etc\hosts is ...(more)...

Feb 23, 2009 (18 hours ago)

Brief: Another payment firm breached, details few

from SecurityFocus News

Another payment firm breached, details few

Feb 23, 2009 (19 hours ago)

Brief: Attackers exploit unpatched Acrobat flaw

from SecurityFocus News

Attackers exploit unpatched Acrobat flaw

Feb 23, 2009 (22 hours ago)

2009-02-23 - Consensus Audit Guidelines: Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance

from SANS Press Room

Consensus Audit Guidelines: Twenty Most Important Controls and Metrics for Effective Cyber Defense and Continuous FISMA Compliance

Feb 23, 2009 (22 hours ago)

2005-08-25 - GIAC Honors Paper

from SANS Press Room

GIAC Honors Paper Computer Forensics Investigation Analyze an Unknown Image

Feb 23, 2009 (22 hours ago)

2005-04-07 - Press Release: New Standard for GIAC Certification and Upgrades To SANS On-Line Training

from SANS Press Room

Press Release: New Standard for GIAC Certification and Upgrades To SANS On-Line Training

11:10 PM (7 hours ago)

E-voting security fixes will get us nowhere without stats

from Ars Technica - Front page content by jtimmer@arstechnica.com (John Timmer)

The recent American Association for the Advancement of Science meeting included a session entitled "Science for Public Confidence in Election Fairness and Accuracy" and, as might be expected, computer science made a significant appearance. Ed Felten of Princeton, whose work in the area we've covered extensively, spoke and emphasized the limits of what computer science can do, and how the ultimate goal should be to ensure that electronic voting systems are verifiable and auditable. Of course, that raises the question of what you do with the auditing information, which is where Arlene Ash, a biostatistician at Boston University's School of Medicine, came in. It turns out that we already have excellent statistical tools for detecting problematic patterns of voting—the legal system just chooses to ignore them.

Feb 23, 2009 (15 hours ago)

Citibank tries to wire $27 million to Nigerian scammers

from Ars Technica - Front page content by jhruska@arstechnica.com (Joel Hruska)

Last week, we covered a so-called Nigerian scam in which a group of thieves eschewed the standard approach of pretending to be your great-grandmother's sister's former roommate, and instead went directly after state coffers. Now there's news that some would-be fraudsters are turning up their collective noses at the thought of robbing a mere state, and are instead going after entire countries. Given the severity of jail sentences and the dim view federal judges take of those who would steal the wealth of nations, the grand-scale carnival shysters are playing an extremely high-stakes game.

Feb 23, 2009 (14 hours ago)

Visa, MasterCard Issue New Breach Warning

from Wired Top Stories by Kim Zetter

Financial institutions are alerted to yet another successful hack attack on a credit and debit card processor. Not surprisingly, nobody's identifying the company at fault.

Feb 23, 2009 (13 hours ago)

Faux Facebook App May Harbor Malware

from PC World Latest Technology News

The fake application attempt to steal personal information for ID fraud.

Other News

Feb 23, 2009 (19 hours ago)

Ubuntu Will Target Cloud Computing With October Release

from PC World Latest Technology News

Ubuntu will target cloud computing with October release, company CEO says.

Sunday, February 22, 2009

Around The Horn vol.1,47

Alerts

-- Aurora Report is posting this link as an alert because the repercussions of the proposed bill while noble, could require us to drastically change our tracking of web logs and network architecture.

12:16 PM (5 hours ago)

The Internet Safety Act of 2009, (Sun, Feb 22nd)

from SANS Internet Storm Center, InfoCON: green

One of our readers, Alan, wrote in wanting to start a discussion about the proposed Internet S ...(more)...

Security News

Microsoft responds to Xbox Live denial-of-service attack

from Ars Technica - Front page content by jhruska@arstechnica.com (Blake Snow)

Beating someone over Xbox Live usually results in nothing more than a string of expletives, but some users are reporting that they're now getting kicked off the network by sore losers using a denial-of-service attack, which bombards your Internet connection with bogus data until it drops out.

1:31 PM (4 hours ago)

Three Ways Twitter Security Fails

from PC World Latest Technology News

Security experts warn of holes in the popular microblogging service.

10:31 AM (7 hours ago)

Researcher Shows How to Hack SSL

from PC World Latest Technology News

The Secure Sockets Layer protocol commonly used to protect Websites can be thwarted.

Saturday, February 21, 2009

Around The Horn vol.1,46

Alerts

Feb 20, 2009 (yesterday)

TA09-051A: Adobe Acrobat and Reader Vulnerability

from US-CERT Technical Cyber Security Alerts

Adobe Acrobat and Reader Vulnerability

1:02 AM (20 hours ago)

SSL attack announced at Blackhat DC, (Sat, Feb 21st)

from SANS Internet Storm Center, InfoCON: green

Moxie Marlinspike presented a way to attack SSL communication during Blackhat conference in DC this ...(more)...

 

Security News

12:37 PM (8 hours ago)

Kaminsky calls for DNSSEC deployment

from The Register - Security

Political hot potato

ARLINGTON, VA. -- Dan Kaminsky's second act has begun: Pushing the adoption of the DNSSEC security standard for the domain-name system.…

Feb 20, 2009 (yesterday)

State bill would turn RFID researchers into felons

from The Register - Security

If white hats are outlawed...

The sponsor of a controversial bill before the Nevada legislature has promised to introduce amendments after security experts and civil libertarians warned it would make felons of people studying privacy threats involving RFID, or radio frequency identification.…

Feb 20, 2009 (yesterday)

Symantec dismisses blind SQL hack claims

from The Register - Security

'It's just an error message'

Symantec's website has been given the once-over by the same Romanian hacking group that exposed security problems with websites run by Kaspersky Lab, F-Secure and Bitdefender earlier this month.…

Feb 20, 2009 (yesterday)

'Sexy View' SMS malware targets Symbian devices

from The Register - Security

Signed, Sealed, Delivered (You're pwned)

Bad sorts have created a malware targeted at Symbian mobile phones that comes signed with an apparently valid Symbian Certificate.…

4:47 AM (16 hours ago)

Permanent fix needed for DNS security issues, Kaminsky warns

from Network World on Security by Jaikumar Vijayan

Seven months after the disclosure of a fundamental design flaw in the Domain Name System protocol that was discovered by security researcher Dan Kaminsky , industrywide efforts to address the DNS problem have made considerable headway, according to Kaminsky.

Feb 20, 2009 (yesterday)

Adobe flaw heightens risk of encountering malicious PDFs

from Network World on Security by Jeremy Kirk

Security companies are warning of a new flaw in two Adobe Systems programs that could compromise a PC merely by opening a malicious PDF file.

Feb 20, 2009 (yesterday)

Bradford's NAC Director gives pipeline firm more control

from Network World on Security by Tim Greene

Mark MacDonald was looking for NAC because he had trouble controlling outside contractors that need to connect to the Enbridge Gas Distribution corporate network in Ontario, Canada.

4:47 AM (16 hours ago)

Novell aquisition bolsters ID governance portfolio

from Network World on Security by Tom Jowitt

Novell has quietly bolstered its ID governance portfolio after acquiring the technology assets of a tiny British company and signing a 'perpetual' licensing deal with California-based ActivIdentity.

Feb 20, 2009 (yesterday)

Researcher shows new SSL Web site hack

from Network World on Security by John E. Dunn

A researcher has found a convincing way to hack the SSL protocol used to secure logins to a range of Web sites, including e-commerce and banking sites.

4:47 AM (16 hours ago)

Adobe Acrobat, Reader vulnerability affects Mac

from Network World on Security by Dan Moren

Nothing wakes you up faster than a security vulnerability for a major piece of software. Adobe announced on Thursday that they'd found a wee bug in Acrobat and Reader versions 7 through 9. Just a tiny little critical buffer overflow hole that could let a malicious attacker take control of your computer.

4:47 AM (16 hours ago)

Microsoft: Online gamers still a top malware target

from Network World on Security by Robert McMillan

What's the most common type of malware on the Internet? Viruses? Botnet code? How about password-stealing worms, designed to victimize online gamers?

Feb 20, 2009 (yesterday)

DShield Web Honeypot Project - Alpha Version Released

from Darknet - The Darkside by Darknet

For those of you who are not familiar with DShield (where have you been? under a rock?) it’s a Cooperative Network Security Community. Basically what that means is they collect firewall logs and map out the trends. Like when there was a worm going around that bruteforced SSH2 you could see a spike in port 22 [...]

Feb 20, 2009 (yesterday)

Feds Propose Storing Internet User Data for 2 Years

from Wired Top Stories by David Kravets

Congress is pondering a bill that would retain individuals' internet-surfing data for two years, a measure one privacy expert said was "creepy."

7:22 PM (2 hours ago)

Scam Antivirus App Spreads Malware

from PC World Latest Technology News

Promoters of the virus are even seeding fake product reviews promoting the supposed antivirus app.

Feb 20, 2009 (yesterday)

Malware Troubles? Start from Square One

from PC World Latest Technology News

The only way to truly come clean: Back up your data, format your hard drive, and begin again

Feb 20, 2009 (23 hours ago)

Conficker Spawn, Recession Smackdown

from PC World Latest Technology News

A new version of Conficker has turned up and could portend even more malevolent uses of that already-nasty malware...

Feb 20, 2009 (yesterday)

Adobe Acrobat, Reader Vulnerability Affects Mac

from PC World Latest Technology News

Nothing wakes you up faster than a security vulnerability for a major piece of software. Adobe announced on Thursday that...

Feb 20, 2009 (yesterday)

Adobe Reader Suffers Targeted Zero-day Attacks

from PC World Latest Technology News

Symantec today reported finding a new, unpatched flaw that is being actively targeted by poisoned .pdf files.

My Blog List