Tuesday, June 9, 2009

Around The Horn vol.1,117

Twitter user says vacation tweets led to burglary

By Elinor Mills

Twitter user's tweets revealed he was out of town. Did that tip off a burglar?

Here's either a cautionary tale or an example of social-media paranoia. An Arizona man believes that his Twitter messages about going out of town led to a burglary at his ...

T-Mobile investigates possible security breach

By Marguerite Reardon

Updated at 2:30 p.m. PST with security source comment.

T-Mobile USA is looking into claims that a hacker has broken into its data bases and stolen customer and company information.

Someone anonymously posted the claims on the security mailing list Full Disclosure on Saturday. In that post, the ...

T-Mobile Investigating Claims It Was Breached

Online post offers sensitive data from wireless provider to the "highest bidder"

Tech Insight: How To Choose An Integrated Security Services Provider

New report guides enterprises in selecting a security service provider

Black Hat Founder Jeff Moss Appointed to Homeland Security Advisory Council

In Vulnerability Research

Jeff Moss, founder of the Black Hat and DefCon security conferences, was named to the Department of Homeland Security Advisory Council June 5.

Bill aims to speed frequent fliers through security

The TSA reauthorization legislation passed by the House has a provision that would strengthen the Registered Traveler program, a business group says.

Is Apple's iPhone 3GS Enterprise Ready?

The 3.0 software and iPhone 3GS offer incremental improvements for corporate deployments, but experts note some key elements are still missing.

Black Hat Founder Tapped To Advise Homeland Security

The fact that a former hacker will be palling around with other HSAC members shows that the government is casting a wide net for perspectives on cybersecurity.

Black Hat Founder Tapped To Advise Homeland Security

The fact that a former hacker will be palling around with other HSAC members shows that the government is casting a wide net for perspectives on cybersecurity.

Alleged T-Mobile Data Offered To Highest Bidder

A note offering the data for sale says that the company's databases, confidential documents, and financial documents were stolen.

China To Require Filtering Software On PCs

Starting July 1, PC makers will have to install pornography-blocking app Green Dam Youth Escort on all computers sold in China.

Air Force Names Cyberwarfare Commander

The 24th Air Force, which will likely be based at Lackland Air Force Base in Texas, will focus exclusively on cyberwarfare as part of the larger Air Force Space Command.

Federal CIO Kundra Looks Forward To Data.Gov 2.0

The upgrades to the site, which will be available in a few months, will feature new ways to find and use data, including the ability to tag data sets.

Homeland Security Names New Cybersecurity Officials

Philip Reitinger, who worked in cybersecurity for Microsoft and fought cybercrime for the Department of Justice, will help to coordinate cybersecurity efforts across the government.

Google Executive To Become Federal Deputy CTO

Andrew McLaughlin will find that he isn't the only ex-Google employee serving the Obama administration.

Obama Announces White House Cybersecurity Position

Names that have been bandied about include acting White House cybersecurity chief Melissa Hathaway and Microsoft VP Scott Charney.

White House Launching Transparency Blog

In a nod to openness and citizen participation in government, the Obama administration also will open White House blogs to public comments.

Obama Should Scrap Cybersecurity Czar, Analyst Says

Gartner expert says president's plan to protect nation's computing infrastructure won't work.

Anti-U.S. Hackers Infiltrate Army Servers

Exclusive: Defense Department investigators subpoena records from Google, Microsoft, and Yahoo in connection with ongoing probe.

Department Of The Interior Can't Locate Many PCs

The federal agency can't locate 20% of its computers and, because it has no encryption requirements, the missing PCs could be vulnerable to data theft or loss.

Obama, White House To Oversee Cybersecurity Leadership

The national security staff will include new positions for addressing cybersecurity, information sharing on terrorism, border security, and preparedness and response.

President Clinton Data On Hard Drive Lost By National Archives

The drive contains snapshots of the hard drives of departing administration officials, information that had been stored on 113 4-mm tape cartridges.

YouTube Launches U.S. Government Portal

The channel aggregates videos from the White House, CDC, NASA, and other federal agencies using a player that complies with government privacy regulations.

Poll: Companies still worried about open-source security

Businesses in North America and Europe remain broadly worried about the security of open-source software, according to new data from Forrester Research.

Spam drops 15 percent after FTC Pricewert takedown

The U.S. Federal Trade Commission's recent takedown of an Internet service provider thought to be a safe haven for spammers has reduced spam volumes, but only by a little.

Remove Sensitive Data Before You Sell an Old PC

Brian Ellis wants to know the best way to secure an old PC for a new owner.

Social Engineering: The Fine Art of BS, Face to Face

Social engineering expert Chris Nickerson reveals what criminals are looking for when it comes vulnerabilities in building security.

Social Engineering: 5 Security Holes at the Office

If you think the biggest threat to your sensitive information lies in network security, think again. Once a criminal is inside a building, there are limitless possibilities to what that person can access or damage. Take a look at your building's security. How easy is it to get inside?

T-Mobile investigates alleged data breach

T-Mobile is investigating a claim that a massive amount of internal data has been stolen from the telecommunication operator's servers, a company spokesman said Monday.

10 things you didn't know about cyberwarfare

Imagine a situation where a powerful country wants to annex its small neighbor, so it launches a week-long campaign of cyberattacks aimed at disrupting the financial, energy, telecom and media systems of its neighbor's biggest ally. A week later, the aggressor launches a full-scale cyberwar on its neighbor that includes air and naval defenses. With its ally's defenses weakened, the neighbor agrees to become a province of the aggressor in less than a week.

Verisign urges careful check of cloud security

SAS 70 - the auditing standard used by CPAs to evaluate the processing of transactions - is emerging as one of the key ways to evaluate cloud service provider security.

LxLabs boss found hanged after vuln wipes websites
Sensational development in VAserv megahack

The boss of Indian software firm LxLabs was found dead in a suspected suicide on Monday.…

Apple security is 'struggling,' researcher says
Laments lack of 'formal security program'

A well-known security consultant says Apple is struggling to effectively protect its users against malware and other online threats and suggests executives improve by adopting a secure development lifecycle to design its growing roster of products.…

Webhost hack wipes out data for 100,000 sites
Vaserv suspects zero-day virtualization vuln

A large internet service provider said data for as many as 100,000 websites was destroyed by attackers who targeted a zero-day vulnerability in a widely-used virtualization application.…

DOS attacks threaten mobile network security
Falling down

New types of denial of service attacks threatened the security of mobile data networks, a senior telecoms security researcher warned last week.…

Last.fm phish strikes a bum note
Crooks tune in to net unwary

Fraudsters have launched an attack which aims to trick Last.fm users into handing over their login credentials.…

Merrick Bank vs. Savvis Could Affect "Liability Dynamic" (June 3, 2009)

The lawsuit brought by Merrick Bank against Savvis raised important issues about compliance and liability.......

Judge Grants FTC Request for Temporary Restraining Order to Shut Down ISP (June 4, 2009)

A federal judge has issued a restraining order that shut down an Internet service provider (ISP) suspected of hosting spammers and other cyber criminals.......

Government Agencies Will Work with ICANN to Secure Internet (June 4, 2009)

The US Department of Commerce's National Telecommunications and Information Administration and the National Institute of Standards and Technology (NIST) will ask ICANN (The Internet Corporation for Assigned Names and Numbers) for help in deploying DNSSEC "at the authoritative root zone of the Internet" by the end of the year.......

NIST Releases Final Draft of Recommended Security Controls Document (June 4, 2009)

NIST has released the final public draft of Special Publication 800-53, Revision 3: Recommended Security Controls for Federal Information Systems and Organizations.......

DHS Names Three Cyber Security Officials (June 2, 2009)

While President Obama has yet to name the first White House Cyber Security Coordinator, DHS Secretary Janet Napolitano has named Philip Reitinger to be director of the National Cybersecurity Center (NCSC).......

Nominee Says DHS Will Retain Cyber Security Role (June 2 & 3, 2009)

Rand Beers, the nominee for Undersecretary of DHS's NPPD, said he was told by deputy national security adviser John Brennan that the yet-to-be-named cyber security coordinator will not diminish DHS's central role in federal cyber security operations.......

Microsoft and Adobe to Release Security Updates Next Week (June 4, 2009)

Microsoft will issue 10 security bulletins on Tuesday, June 9.......

RIM Issues Fix for BlackBerry PDF Vulnerability (June 3 & 4, 2009)

Research in Motion (RIM) has issued a patch for the Blackberry to address a vulnerability described in a security warning last week.......

Virginia Notifying Those Affected by Prescription Database Breach (June 4, 2009)

The state of Virginia is notifying 530,000 people by mail that their Social Security numbers (SSNs) may have been compromised in a computer security breach.......

Aviva Acknowledges Data Security Breach (June 3, 2009)

Insurance company Aviva, formerly known as Norwich Union, has notified the New Hampshire Attorney General of a breach that exposed sensitive customer information.......

Trojans Found Embedded in ATMs (June 3 & 4, 2009)

Researchers have found a group of Trojan horse programs that have been embedded in automatic teller machines (ATMs) in Eastern Europe.......

Phishers Target Outlook Users (June 3, 2009)

Reports are emerging of a phishing attack that targets Microsoft Outlook users.......

Sears Settles FTC Complaint Regarding Customer Internet Data Collection (June 4, 2009)

Sears has settled charges brought by the US Federal Trade Commission (FTC) regarding the company's failure to accurately describe the amount of information gathered by tracking software.......

Chinese Censors Blocking Tiananmen Anniversary Coverage (June 2, 2009)

Censors in China are apparently blocking access to Twitter, Flickr, Hotmail and Microsoft's live.......

3FN.net ISP shutdown interrupts spam campaigns

By Robert Westervelt

The shutdown of 3FN.net disrupted the Cutwail Botnet and may have reduced global spam volumes by 15%. But spam levels are expected to increase to pre-shutdown levels, experts say.

Twitter to Target Fake Pages

Twitter is experimenting with a service to verify the authenticity of accounts of high-profile users. The move comes after the microblogging service was sued by St. Louis Cardinals Manager Tony La Russa, saying someone posted comments under his name on a fake Twitter page.
- Twitter officials are working on a way to verify users of the microblogging service are who they say they are. In a blog post, Twitter co-founder Biz Stone said the company is experimenting in summer 2009 with a beta preview of a service it is calling, quot;Verified Accounts. quot; Details abo...

T-Mobile Continues to Investigate Hacker Data Breach Claims

Officials at T-Mobile are still investigating claims of a security breach made in a message on the Full Disclosure mailing list. In the message, hackers claimed to have breached T-Mobile's network and stolen customer and company data.
- T-Mobile is still investigating a claim that hackers swiped a large amount of data from the company's servers. On June 6, a message was posted on the Full disclosure mailing list in which attackers claimed to have hacked T-Mobile and stolen information. In the message, the alleged hackers ...

Unshrinking Shortened Web Links

In Safety Tips

Social networking are contributing to an explosion in the number of services that help people convert long URLs into tiny Web links. URL shrinking services are especially useful on sites that place a premium on brevity -- such as Twitter, which limits tweets to 140 characters. But few online communities have made it easy for users to tell where the shortened links will take them, a reality that could be advantageous to phishers and other cyber crooks. When I first began researching this subject, I was amazed to learn how many URL shortening services are available today (at least 90). Also, the lack of a built-in or standardized approach to URL shortening services within individual social networking sites adds complexity to the problem. For example, many Twitter users shorten long Web links with bit.ly, but Twitter users are just as likely to see Tweets with links shortened by the services

T-Mobile Investigating Data Breach Claims

In Misc.

Wireless phone giant T-Mobile said today it is investigating claims that hackers have broken in and stolen customer data and company proprietary information. On Saturday, June 6, someone anonymously posted to the Full Disclosure security mailing list claims that a broad range of internal T-Mobile data had been compromised and was being put up for sale to the highest bidder. "We have everything, their databases, confidental [sic] documents, scripts and programs from their servers, financial documents up to 2009. We already contacted with their competitors and they didn't show interest in buying their data - probably because the mails got to the wrong people - so now we are offering them for the highest bidder."

Brief: Data shows Grumblar still threatens

Data shows Grumblar still threatens

Counterintelligence Options for Digital Security

By Richard Bejtlich

As a follow-up to my post Digital Situational Awareness Methods, I wanted to expand on the idea of conducting counterintelligence operations, strictly within the digital security realm. I focus almost exclusively on counter-criminal operations, as opposed to actions against nation-states or individuals.

Spam Drops 15 Percent After FTC Pricewert Takedown (PC World)

In technology

PC World - The U.S. Federal Trade Commission's recent takedown of an Internet service provider thought to be a safe haven for spammers has reduced spam volumes, but only by a little.

Cisco Security Center: IntelliShield Cyber Risk Report

June 1-7, 2009

Report Highlight: Social Networking Facilitating Freedom of Speech

Universal 'Rubik's Cube' Could Become Pentagon Shapeshifter

By Noah Shachtman

Even by the standards of the Pentagon fringe science arm, this project sounds far-out: “” that can be ordered to “self-assemble or alter their shape, perform a function and then disassemble themselves.” But researchers back by Darpa are actually making progress on this incredible goal, Henry Kenyon at Signal magazine reports.

Troubleshoot Your Internet Connection

Your Internet service provider tells you that your service should provide "up to" 8 Mbps downstream. But then a Web-based speed tester tells you you're getting...

-- Aurora Report says ok haven’t changed things up in a while so here is a new feature I am going to try out.  The following section is dedicated to the results of a Google Alert.  Please comment as to whether this is helpful and more concise or on any other portions of this blog that you feel could be improved.

Google News Alert for: cybersecurity | information security | computer security

T-Mobile investigates possible security breach
CNET News - San Francisco,CA,USA
"The protection of our customers' information, and the safety and security of our systems, is absolutely paramount at T-Mobile," the company said. ...
See all stories on this topic

Black Hat Founder Tapped To Advise Homeland Security
InformationWeek - Manhasset,NY,USA
Moss used to work in information security for Ernst & Young and as a director of Secure Computing Corporation. Online, he goes by the handle Dark Tangent. ...
See all stories on this topic

iPhone OS 3.0 adopts some BlackBerry-like security
San Francisco Chronicle - CA, USA
iPhone OS 3.0 also does not appear to change the password security for iPhones, which are limited to four-digit numeric passwords. ...
See all stories on this topic

Clinton orders review of State Department security after arrests
CNN - USA
Diplomatic security officials "let it go for a while" to see what information might emerge. Myers was a senior European analyst in the State Department's ...
See all stories on this topic

CNET News

Browser security and privacy tips
CNET News - San Francisco,CA,USA
For a soup-to-nuts look at browser security, read the United States Computer Emergency Response Team's article Securing Your Web Browser. The information ...
See all stories on this topic

Information Security Veteran Joins Evolve IP
Business Wire (press release) - San Francisco,CA,USA
“We are thrilled to welcome Carl on board, and look forward to his contributions to our Information Security & Compliance Services business,” says Thomas ...
See all stories on this topic

Do 'I'm on vacation' posts pose security concerns?
San Jose Mercury News - CA, USA
Despite the fact that so many people share their vacation plans via the Internet, most Americans don't think private information is secure online. ...
See all stories on this topic

ExecutiveBiz

Cyber security review: Nine ideas on what it means to you
ExecutiveBiz - Washington,DC,USA
Now that the results of the 60-day cyber security review led by Melissa Hathaway are in, what's next? ExecutiveBiz recently brought that question to leading ...
See all stories on this topic

China Requires Censorship Software on New PCs
New York Times - United States
The software developers have ties to China's military and public security agencies, they point out, and Green Dam's backers say the effort is supported by ...
See all stories on this topic

LogLogic Named a “Leader” in Magic Quadrant for Security ...
Business Wire (press release) - San Francisco,CA,USA
“LogLogic has long been a leader in log management, and now we are proud to also be a leader in security information and event management (SIEM),” said ...
See all stories on this topic

Google Blogs Alert for: cybersecurity | information security | computer security

T-Mobile investigates possible security breach : News : Security ...
By zdnews-asia@cnet.com (Marguerite Reardon)
Kelly Todd, chief communications officer at the Open Security Foundation, said there wasn't enough information publicly available to determine at this time whether the breach is legitimate or not. .... on computer upgrades ...
ZDNet Asia Latest Tech News - http://www.zdnetasia.com/news/

Napolitano Swears in Hacker on Homeland Security Advisory Council ...
By By Matthew Harwood
Jeff Moss is Founder and Director of Black Hat and DEFCON Computer Hacker Conferences. Moss has also worked for Ernst & Young, LLP in their Information System Security division. Martin O'Malley is Governor of Maryland. ...
Security Management News & Analysis - http://www.securitymanagement.com/sania-mirza

Safeguard Business Unit Provides Security Services to Whitestone ...
By msadmin
2009 Safeguard Security Holdings, Inc. The information herein is subject to change without notice. Safeguard shall not be liable for technical or editorial errors or omissions contained herein. Safeguard Security Holdings, Inc. ...
1800blogger - http://www.1800blogger.com/

AVIRA Press Center - Avira presents updated security solutions at ...
The MailGate email security solution offers enhanced reporting functions: Statistics for blocked emails, additional information about the reasons email was blocked and the number of encrypted emails can now be logged in databases with ...
Avira - Latest Company News - http://www.avira.com/en/pages/pages.php?id_pag=100

National Journal Online -- National Security Experts -- How Can ...
He said that his own campaign computers had been hacked, that the rate of online crime is increasing, and that cyber intruders had penetrated the computer systems that control electrical power plants in the United States. Obama said it was time to start treating cyberspace for ... The Obama administration's 60-day cyber security review bit off more than it could chew - precisely as it was instructed to do - and the results were a good effort to achieve an impossible goal. ...
National Security Experts - http://security.nationaljournal.com/

Google Web Alert for: cybersecurity | information security | computer security

20% of IT Managers Admit to Cheating Information Security Resources
Names and Social Security numbers of 17214 on stolen computer · Social Security numbers and financial information of 597 sent to incorrect recipients ...

No comments:

Post a Comment

My Blog List