Tuesday, June 30, 2009

Around The Horn vol.1,129

'Iceman' pleads guilty in credit card theft case

By Elinor Mills

Max Ray Vision, aka "Iceman," pleaded guilty on Monday to two counts of wire fraud stemming from the theft of nearly 2 million credit card numbers and $86 million in alleged fraudulent purchases.

Vision faces up to 60 years ...

Michael Jackon Spam/Malware – RIP The King Of Pop

By Darknet on viruses

For people of my age and generation and I’d guess for most readers of Darknet, Michael Jackson would have had a great influence on our lives. The biggest news last week was most certainly his death, as usual the bad guys were extremely quick to capitalize on this and were sending out spam within hours of [...]

NAC Appliances Hardest Hit In Network Security By Economic Downturn, Report Says

Infonetics expects a struggling NAC appliance market to rebound big-time by 2013, to nearly $700 million

Botnets Churn Spam, Then Back Again

In Virus and Spyware

Botnets are behind the vast majority of the world's spam, according to MessageLabs.

Verified Identity Pass shuts down Registered Traveler lanes

Transportation Security Administration declines to comment on closure.

Web Filtering Company Reports Cyber Attack To FBI

The U.S.-based company that claims its programming code was unlawfully included in China's Green Dam software reports being targeted by a cyber attack.

Sony Begins Shipping PCs With Green Dam Filter

Company beats Chinese government's July 1 deadline, but Sony disclaims responsibility for any damage caused by the Web filtering software.

Sony Begins Shipping PCs With Green Dam Filter

Company beats Chinese government's July 1 deadline, but Sony disclaims responsibility for any damage caused by the Web filtering software.

ICANN Names Security Expert As CEO

Rod Beckstrom, former director of the U.S. National Cybersecurity Center, faces demands to make the US organization into an international body.

Generic Rootkit.d Strikes Again in New Variant

By Rachit Mathur on Rootkits and Stealth Malware

A few days ago I got a chance to look at a recent variant of the DNSChanger.ad. It drops a common rootkit that is mostly associated with FakeAlert and DNSChanger Trojans. Over a period of time the dropped sys file names have changed from tdss*.sys to seneka*.sys to skynet*.sys and so on. Our memory detection [...]

Symantec culls user data to spot unsafe programs

Symantec is to use the 'wisdom of the crowds' and introduce reputation-based security in the next version of its Norton Antivirus 2010 product.

Free tool provides real-time threat information

Intenet backbone company, Interoute has launched a free tool aimed at providing up-to-date information on security threats. The Internet Barometer draws on information provided by 22 sensors placed at strategic points on the Interoute backbone network and gives accurate information on the volume of threats on the Internet at any one time.

DiskShred offers mobile disk destruction service

One company is offering to resolve the perennial problem of how companies can securely dispose of old hard drives containing valuable commercial data, after it setup a mobile disk shredding service that will come to a customer's site and destroy old hard disks.

Chinese registrars need rapped on knuckles, expert says

A computer security expert is calling for action against two Chinese companies that he and other analysts allege are facilitating spam and cybercrime on the Internet.

Software not smart enough to sort human relationships

Internet search engines and software applications can catalog huge volumes of information, but they aren't smart enough to trace personal relationships between people, according to the executive chairman of World-Check, a company that maintains a database of individuals that banks and other companies might want to think twice about doing business with.

China bans virtual cash for real-world trade
Peer-to-peer transactions only

Officials in China are banning use of virtual money to buy real-world goods and services.…

Hip-hop site served child porn, police say
Unbeknownst to operator

Police in Switzerland have uncovered a child pornography ring that secretly used a hip-hop website to distribute illegal images to some 2,300 computers in 78 countries.…

Notorious phone phreaker gets 11 years for swatting
End of the (party) line

A notorious phone phreaker has been sentenced to more than 11 years in prison after admitting he took part in a scheme that hacked phone systems to fake emergency 911 calls that sent teams of heavily armed police to the home of unsuspecting victims.…

Mitnick site targeted in DNS attack on webhost
"Mantrained"

A website belonging to security expert Kevin Mitnick was compromised after hackers managed to access a domain name server maintained by the site's webhost and redirect visitors to pages that displayed pornographic images.…

FTC settles with scareware scammers on reduced terms
10 cents per victim? We've spent the rest

US consumer watchdogs at the Federal Trade Commission have agreed to settle a lawsuit against rogue security software distributors on reduced terms.…

Court reinstates ID theft charges in email hack case
Malicious gossip connected to suicide

US judges are grappling with the implications of a workplace email hacking case that led to the suicide of a local official.…

The human factor in laptop encryption
Lock down the business managers!

Hardly a day goes by without news of some laptop containing sensitive information about customers or staff getting lost or stolen. The latest high profile example is the Bord Gais burglary in Dublin in which an unencrypted laptop containing the bank details of 75,000 electricity customers was stolen. Hilariously, Bord Gais told the people affected that "data security and laptop encryption is a major priority for us". More practically, it urged the names to watch out for their bank accounts.…

Cyber security minister ridiculed over s'kiddie hire plan
'Naughty boys' nonsense

Security experts have strongly criticised suggestions by a government minister that former hackers might play a key role in Britain's newly announced cybersecurity strategy.…

Britney Spears dead hacked
TwitPic exploit suspected in celeb fake obit assault

Britney Spears's Twitter account has been hacked again - this time around the fake microblogging update falsely reported that the troubled warbler was dead.…

Special SANSFIRE 2009 Podcast Presentations - Mark Hofman, (Mon, Jun 29th)

Our fifth presentation is by one of our Handlers by the name of Mark Hofman. Mark is one of ha ...(more)...
Related Searches

Special SANSFIRE 2009 Podcast Presentations - Bojan Zdrnja, (Mon, Jun 29th)

Our fourth presentation is by one of our Handlers by the name of Bojan Zdrnja. Bojan actually ...(more)...

New Trojan stealing FTP credentials, attacking FTP websites

By Robert Westervelt

A new Trojan has collected up to 80,000 unique FTP server logins and is injecting malicious code into thousands of FTP websites.

MasterCard increases PCI compliance requirements for some merchants

By Marcia Savage

Company now requires merchants that process one million to six million transactions annually to have onsite assessment by a PCI QSA. Visa says it won't follow suit.

Motorola Timbuktu Pro Stack Based Buffer Overflow

Unisys Business Information Server Stack Buffer Overflow

Adobe Shockwave Player Director File Parsing Pointer Overwrite

Apple WebKit attr() Invalid Attribute Memory Corruption Vulnerability

Cisco Physical Access Gateway Denial of Service Vulnerability

Cisco ASA Web VPN Multiple Vulnerabilities

Microsoft Office Excel Malformed Records Stack Buffer Overflow (MS09-021)

Remote attackers can exploit this vulnerability by enticing target users to open a malicious Excel file.

Cisco Video Surveillance Products Denial of Service

Microsoft Excel Record Parsing Array Indexing Vulnerability (MS09-021)

Pivot Cross Site Scripting and HTML Injection

Apple Safari File Protocol Handler Information Disclosure and Denial of Service

Microsoft Excel String Parsing Integer Overflow Vulnerability (MS09-021)

Successful exploitation allows execution of arbitrary code.

HP OpenView Network Node Manager Execution of Arbitrary Code and DoS

IBM AIX ToolTalk Database Server Buffer Overflow Vulnerability

How Secure Is Apple`s Snow Leopard for the Enterprise?

NEWS ANALYSIS: Snow Leopard is being touted as a winner in the security space by Apple. But do its features really hold up? With the upcoming release of Microsoft Windows 7, business users might have a better chance to compare the security features of Apple to Microsoft.
- When it comes to the enterprise, security is a constant concern. Most companies have mission-critical data loaded onto employee notebooks walking out the door on a daily basis. At the office, malicious hackers are constantly trying to find ways to break into the network to access that data, ste...

Trojan Swipes FTP Credentials for Major Companies in Malware Attack

Security researchers are tracking a Trojan that has swiped as many as 88,000 FTP credentials for organizations such as Symantec, McAfee, Amazon, Cisco and the Bank of America. According to researchers at Prevx, the compromises are part of an operation that has been in business for more than two years.
- Security researchers have uncovered a cache of stolen FTP credentials belonging to a variety of corporations, including Symantec, McAfee, Amazon and the Bank of America. According to security vendor Prevx, a Trojan has swiped some 88,000 FTP credentials as of this morning. The FTP logins were d...

Veracode Takes Mobile Application Code Analysis to the Cloud

Veracode has added support for Windows Mobile applications to its Web-based code analysis service. Support for other platforms, including Google Android, is on the road map for later this year.
- Veracode has expanded its cloud-based SecurityReview service to help businesses improve security for mobile applications. The service, which analyzes application code for vulnerabilities, is now available for Windows Mobile applications. Support for BlackBerry and Google Android is expected to c...

Brief: Jackson searches resemble attack to Google

Jackson searches resemble attack to Google

Jackson's death unleashes barrage of online scams (AP)

In technology

AP - Minutes after any big celebrity dies, Internet swindlers get to work. They pump out specially created spam e-mails and throw up malicious Web sites to infect victims' computers, hoping to capitalize on the sudden high demand for information.

Chinese Registrars Need Rap on Knuckles, Expert Says (PC World)

In technology

PC World - A computer security expert is calling for action against two Chinese companies that he and other analysts allege are facilitating spam and cybercrime on the Internet.

SB09-180: Vulnerability Summary for the Week of June 22, 2009

Vulnerability Summary for the Week of June 22, 2009

Cisco Security Center: IntelliShield Cyber Risk Report

June 22-28, 2009

Report Highlight: Automated Control Systems Risks

FTP login credentials at major corporations breached (CGISecurity.com)
Blind Phone Hacker Gets 11-year Sentence

A blind 19-year-old teenager has been sentenced to more than 11 years in prison for making fake 911 'swatting' calls.

Twitter Gains Upper Hand on Latest Scam

An apparent phishing scam moving through Twitter this week appears to have been halted -- but not before numerous users were duped into exposing their information.

Real CEOs Don't Twitter -- Do They?

Top executives typically shun Twitter, Facebook, and other social networks but may be missing a bet, research says.

No comments:

Post a Comment

My Blog List