Tuesday, March 24, 2009

Around The Horn vol.1,69

Thinking about Cost-Per-Application and VM Density

By vmtn@vmware.com (VMTN) on Technical Information

We announced a new calculator today, one that helps you start to look at the "cost per application" view of virtualization. This particular application isn't designed to measure total cost of ownership or total ROI, just what it costs you...

CanSecWest Pwn2Own: Would IE8 have been exploitable had the event waited one more day?, (Tue, Mar 24th)

Safe Internet web browsing experiences - a concept that tends to sometimes get

Software Maker Helps Companies Thwart Computer Security Threats (Investor's Business Daily) (Yahoo Security)

    Stuck In The Middle, Security Departments Turn To Outsourcing

    Studies say more corporations are outsourcing security as a way to fight myriad threats, lower overall costs

    Charlie Miller Does It Again At PWN2OWN

    By Darknet on tipping point

    You right remember in March last year we posted about Charlie Miller at the PWN2OWN contest owning the MacBook Air in under 2 minutes. Guess what? He’s done it again! This time though he’s even faster clocking in at under 10 seconds. No one else stood a chance. He walked off with the prize again, $5000 [...]

    Worm breeds botnet from home routers, modems
    More than 100,000 hosts invaded

    Security researchers have identified a sophisticated piece of malware that corals consumer routers and DSL modems into a lethal botnet.…

    Government Keeping Its .Gov Domain Names Secret

    Despite a presidential promise of openness in government, GSA officials decline to release the full list for fear of cyberattack.

    Time To Get Serious About HIPAA

    If your company qualifies as a covered entity under HIPAA, now is a good time to review your compliance efforts and fill in any gaps -- before the feds come calling.

    Mandiant Appliance Accelerates Incident Response

    MIR gets to the heart of system compromises, but its forensic tools are limited.

    Napera N24 Offers Turnkey NAC For SMBs

    Appliance provides a range of security features for Microsoft nets, but lacks in-depth reporting.

    Facebook's New Openness Exploited By Scammers

    The rogue message leads to a Facebook application link that spams a victim's friend list with the same warning message, and possibly harvests personal information.

    Hack An iPhone, Win $10,000

    In TippingPoint's DVLabs contest, hackers also have the option of trying to execute a successful exploit against a Web browser.

    Facebook Opens Site Rules To User Voting

    "The Facebook Principles" and "Statement of Rights and Responsibilities" may signal a shift in social networking best practices.

    Spy Agency May Get More Cybersecurity Duties

    The National Security Agency should assume a greater role in defending the nation against cyberattacks, President Obama's intelligence chief told Congress Wednesday.

    Marvell Unveils 'Plug Computing' Platform

    The tiny SheevaPlug computer provides always-on home network services, such as backup and file sharing, for a tenth of the power used by a regular desktop.

    Microsoft Warns Of Zero-Day Excel Exploit

    The vulnerability in Excel could allow an attacker to execute malicious code, if a user opens a specially crafted Excel file.

    Meraki Launches 802.11n Access Point

    The networking startup is trying to differentiate its products by having a lower price point and offering a hosted solution for network management.

    VMware Adds To Data Center Operating System

    vCenter Server Heartbeat and vShield, launched at VMware's user group meeting, bring the company closer to supplying the data center operating system via its virtual machine management capabilities.

    IT Security Remains Top Government CIO Priority

    Those surveyed by TechAmerica say they'd also put IT infrastructure and management at the top of the list, including improvements in governance and standardization.

    Top 20 Cybersecurity Defenses Proposed

    The government-private organization guidelines are expected to become baseline best practices for computer security.

    Five Years On, Can-Spam Gets Help

    The right mix of technical measures can keep most unwanted e-mail out of customers' in-boxes.

    Music, TV Industries Call For Stronger Intellectual Property Protections

    A trade group found that Russia, China, and other countries aren't adequately protecting copyrights in the global digital distribution of music and video.

    Adobe Warns Of Critical Vulnerability In Acrobat, Reader

    Users are advised to disable JavaScript until Adobe releases a patch, which may not occur for more than two weeks.

    'Sexy View' Malware Targets Symbian

    The worm targets Symbian OS S60 3rd Edition handsets, and it can send a user's contacts, phone number, and other sensitive information to a remote server.

    Black Hat: Google Gears Offline Data Vulnerable

    Google defends its product after a demonstration of a Web service-based attack using a cross-site scripting vulnerability.

    Black Hat: Security Pro Shows How To Bypass SSL

    Moxie Marlinspike captured 16 credit card numbers, seven PayPal logins, and 300 other miscellaneous secure login sessions in only 24 hours.

    Forensic Science System In U.S. Needs Overhaul

    Digital evidence examiners have no agreed-upon certification program or list of qualifications, in addition to other issues, a report to Congress points out.

    Microsoft Internet Explorer 7 Vulnerability Being Exploited

    Cyber criminals are using a malicious Microsoft Word file distributed through spam to attack an exploit Microsoft patched last week.

    Sun Delivers Open Source Protocol For Encrypted Devices

    The communications protocol aims to help Sun's users and business partners more flexibly handle encryption keys while sidestepping costly licensing fees.

    Google Wins Street View Privacy Lawsuit

    A Pennsylvania judge said Google didn't violate the Boring family's privacy rights by taking pictures of their residence from a private road and publishing the images online.

    About-Facebook: Zuckerberg Relents On Privacy Rules

    Social networking site's CEO reverses course on new polices that drew fire from users.

    Cisco Adds Security Apps To Home Wireless Routers

    The hardware includes an antivirus application and can provide reports on user control violations.

    Three Arrested For Using Stolen Heartland Credit Card Numbers

    Heartland Payment Systems, which handles about 100 million payment transactions per month, reported in January that its network was compromised by malware in 2008.

    Facebook's Terms Of Use Draw Protest

    Mark Zuckerberg clarifies for users that once they delete their accounts, friends will still retain their posts.

    Prosecutors Reduce Charges Against The Pirate Bay

    Prosecutors acknowledge that the file-sharing site on trial in Sweden for allegedly infringing on film and music copyrights didn't copy files.

    C-Level Executives Weigh In On Information Security

    Our survey results show CXOs "get it." Here's how to turn that common focus into stronger security.

    Android Security Vulnerability Exposed

    The bug lies in the media server of the browser, and it could potentially enable hackers to gain control of the audio and video function of an Android handset like the T-Mobile/HTC G1.

    25 Things Facebook Couldn't Keep Secret In Court

    Redacted portions of a PDF transcript from a court hearing to determine Facebook's settlement with ConnectU were revealed.

    Microsoft Offers $250,000 Bounty For Worm Authors

    The company has formed a cybersecurity posse with technology companies, academic organizations, and Internet infrastructure firms to dismantle the Conficker/Downadup worm's infrastructure.

    FAA Computers Hacked, Employee Data At Risk

    Two of the 48 files on the compromised server held the personal information of more than 45,000 individuals, the agency said.

    Stimulus Bill Will Stimulate Health IT Adoption, Jobs

    The $21 billion for health IT programs in the U.S. economic stimulus bill will create career opportunities and fuel educational programs for professionals to acquire a mix of technology and clinical expertise.

    Identity Thieves Face Pay Cut

    While the number of fraud incidents is rising, criminals are earning less for each crime they commit.

    BlackBerry Maker Acquires Certicom For $106 Million

    Certicom's cryptography software has been adopted by the U.S. National Security Agency for government communications.

    RIM Issues BlackBerry Security Advisory

    Vulnerabilities in the BlackBerry Application Web Loader ActiveX control could allow an attacker to execute code remotely or cause Microsoft Internet Explorer to crash.

    Microsoft Patch Tuesday Brings Four Fixes For Eight Flaws

    The updates address vulnerabilities in Internet Explorer, Microsoft Exchange, SQL Server, and Visio.

    Obama's Plans For Cybersecurity Draw Praise

    Tech industry leaders say the administration "gets it" when it comes to protecting nation's computing infrastructure.

    Social Networking Sites Ink Safety Pact

    The online communities will work together to protect the interests of minors.

    Windows Worm Didn't Ground French Planes, Official Claims

    The planes had been grounded following a Conflicker worm infection that had spread last month throughout the French nonsecured internal naval network called Intramar.

    What is Nortel up to?

    In all the bankruptcy noise surrounding Nortel, it's easy to miss that the company has bought up the intellectual property of Identity Engines, whose portfolio adds up to a NAC package.

    Cold-boot attacks change the data leakage landscape

    Until 2008, the consensus had been that there would be no practical way to remove a RAM chip from a computer system without losing all contained data. However, last July, researchers published a paper about something quite amazing: most RAM chips maintain their data for several seconds without any power, thus allowing a channel for data leakage from any computer to which an attacker has physical access.

    Slack audits facilitate corporate fraud

    Up to 70 percent of corporate fraud is committed by employees and occurs because of broken processes, according to consulting firm Deloitte.

    Conficker's next move a mystery to researchers

    Security researchers are in the dark about what will happen next week when the newest variant of Conficker, 2009's biggest worm by a mile, begins trying to contact its controllers.

    White collar crimes burnt by extreme fingerprinting

    Corporate crime scenes could be cleaned up in minutes, not hours, thanks to locally developed technology that uses extreme heat to reveal fingerprints.

    Worm breeds botnet from home routers, modems

    Posted by InfoSec News on Mar 24

    http://www.theregister.co.uk/2009/03/24/psyb0t_home_networking_worm/

    By Dan Goodin in San Francisco
    The Register
    24th March 2009

    Security researchers have identified a sophisticated piece of malware
    that corals consumer routers and DSL modems into a lethal botnet.

    The "psyb0t"...

    Nearly all firms suffer losses after cyber attacks

    Posted by InfoSec News on Mar 24

    http://www.techworld.com/security/news/index.cfm?newsID=113225

    By Joan Goodchild
    CSO (US)
    24 March 2009

    Nearly all organisations have been hit by cybercrime with some 98
    percent reporting tangible loss after being hit by criminals. In
    addition, 46 percent have experienced downtime as a...

    Senator says his office computers were hacked

    Posted by InfoSec News on Mar 24

    http://fcw.com/articles/2009/03/23/web-cybersecurity-legislation.aspx

    By Ben Bain
    FCW.com
    March 23, 2009

    Three lawmakers are writing a bill designed to expand the cybersecurity
    workforce and bolster collaboration between the public and private
    sectors. Authors include Sen. Bill Nelson...

    No comments:

    Post a Comment

    My Blog List