Wednesday, September 9, 2009

Around The Horn vol.1,148

MS09-049 - Critical: Vulnerability in Wireless LAN AutoConfig Service Could Allow Remote Code Execution (970710) - Version:1.0

Severity Rating: Critical - Revision Note: V1.0 (September 8, 2009): Bulletin published.Summary: This security update resolves a privately reported vulnerability in Wireless LAN AutoConfig Service. The vulnerability could allow remote code execution if a client or server with a wireless network interface enabled receives specially crafted wireless frames. Systems without a wireless card enabled are not at risk from this vulnerability.

MS09-048 - Critical: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution (967723) - Version:1.0

Severity Rating: Critical - Revision Note: V1.0 (September 8, 2009): Bulletin published.Summary: This security update resolves several privately reported vulnerabilities in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening service. Firewall best practices and standard default firewall configurations can help protect networks from attacks that originate outside the enterprise perimeter. Best practices recommend that systems that are connected to the Internet have a minimal number of ports exposed.

MS09-047 - Critical: Vulnerabilities in Windows Media Format Could Allow Remote Code Execution (973812) - Version:1.0

Severity Rating: Critical - Revision Note: V1.0 (September 8, 2009): Bulletin published.Summary: This security update resolves two privately reported vulnerabilities in Windows Media Format. Either vulnerability could allow remote code execution if a user opened a specially crafted media file. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

MS09-046 - Critical: Vulnerability in DHTML Editing Component ActiveX Control Could Allow Remote Code Execution (956844) - Version:1.0

Severity Rating: Critical - Revision Note: V1.0 (September 8, 2009): Bulletin published.Summary: This security update resolves a privately reported vulnerability in the DHTML Editing Component ActiveX control. An attacker could exploit the vulnerability by constructing a specially crafted Web page. When a user views the Web page, the vulnerability could allow remote code execution. An attacker who successfully exploited this vulnerability could gain the same user rights as the logged-on user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

MS09-045 - Critical: Vulnerability in JScript Scripting Engine Could Allow Remote Code Execution (971961) - Version:1.0

Severity Rating: Critical - Revision Note: V1.0 (September 8, 2009): Bulletin published.Summary: This security update resolves a privately reported vulnerability in the JScript scripting engine that could allow remote code execution if a user opened a specially crafted file or visited a specially crafted Web site and invoked a malformed script. If a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

A parent's quick guide to content blocking technologies

By ars@lasarletter.net (Matthew Lasar) on parental control devices

companion photo for A parent's quick guide to content blocking technologies

The Federal Communications Commission's long awaited Report to Congress on Parental Control Technologies for Video or Audio Programming is finally out. The report compiles almost a year's worth of comments from industry and public interest groups on the state of content filtering technology, and what does it conclude? By golly, the FCC says it needs to issue another study! The next one will be about why more parents don't use the wide range of content filtering apps and gizmos that are currently available.

Read the rest of this article...

Learn how to protect yourself from identity theft

By jacqui@arstechnica.com (Jacqui Cheng) on trustedID

companion photo for Learn how to protect yourself from identity theft

Identity theft is big business, and it keeps getting bigger as more and more information about us floats around in an ever data-obsessed society. From every swipe of your credit card to every time you go to the doctor, doors are opened for thieves to snatch information and use it to their advantage. And, as the name implies, it's not just about fraudulent charges showing up on your bank account, either. At worst, you could find that someone has been using your social security number for years to work various jobs or, as in one Chicago teenager's recent experience, you could even get thrown in jail because a thief using your identity had a warrant out for his arrest. "Oops" doesn't even begin to describe it.

Most Americans know the basic principle of checking their credit reports once a year. Every US citizen can now get a free report from the three major credit bureaus every year to ensure everything is right on their accounts. However, that's the extent of most of our knowledge, and only addresses one facet of identity theft (financial institutions). It turns out there are a number of other preventative measures that can be taken, especially if you're the paranoid type.

Read the rest of this article...

New flaw can crash Windows Vista and Server 2008 remotely (Updated)

By emil.protalinski@arstechnica.com (Emil Protalinski) on Windows Vista

companion photo for New flaw can crash Windows Vista and Server 2008 remotely (Updated)

Redmond is investigating reports that a newly discovered flaw in Microsoft's implementation of the Server Message Block 2 (SMB2) protocol, an extension of the conventional server message block protocol, can be exploited to remotely crash and restart computers running Windows Vista or Windows 7. The attack does not require authentication, but port 445 of the target system must be open, and on Windows it is open by default. Laurent GaffiƩ, who discovered the vulnerability, has contacted Microsoft, noting that the only solution he can think of is to turn off the SMB feature and close port 445.

Read the rest of this article...

Ruby on Rails vulnerability affects Twitter; IE8 immune

By segphault@arstechnica.com (Ryan Paul) on security

companion photo for Ruby on Rails vulnerability affects Twitter; IE8 immune

A cross-site scripting (XSS) vulnerability that was patched on Thursday in Ruby on Rails affected several widely used Web services including the popular Twitter microblogging website and Basecamp, a project management tool created by 37Signals from which the Ruby on Rails framework originated.

Security researcher Brian Mastenbrook uncovered the bug when he was conducting a serendipitous test of unicode handling in Twitter. He discovered that he could circumvent the site's string sanitization mechanism and inject a JavaScript payload. It falls into the category of a non-persistent or "type 1" XSS vulnerability.

Read the rest of this article...

Securing the .edu top-level domain with DNSSEC

By nate@arstechnica.com (Nate Anderson) on DNSSEC

companion photo for Securing the .edu top-level domain with DNSSEC

DNS security continues its slow march to the root servers with today's announcement that the educational top-level domain ".edu" will roll out the DNSSEC protocol for testing this month, with a full deployment to follow by March 2010.

The domain name system (DNS) resolves Internet addresses like arstechnica.com into a numerical IP address—but the ancient DNS protocol provides little to no security. Hackers have figured out ways to poison the DNS cache, redirecting users who think they're visiting one site to another, quite different site. The insecurity of this fundamental piece of Internet architecture has been a boon for phishers and other miscreants, and the problems have been recognized for years.

Read the rest of this article...

Microsoft Patch Tuesday for September 2009: five bulletins

By emil.protalinski@arstechnica.com (Emil Protalinski) on Patch Tuesday

companion photo for Microsoft Patch Tuesday for September 2009: five bulletins

According to the Microsoft Security Response Center, Microsoft will issue five Security Bulletins on Tuesday, and it will host a webcast to address customer questions on the bulletin the following day (September 9 at 11:00am PST, if you're interested). All five of the vulnerabilities are rated "Critical," and they all earned their rating through a remote code execution impact, meaning a hacker could potentially gain control of an infected machine. At least two of the five patches will require a restart.

Read the rest of this article...

3.3% of PCs with ESET antivirus block a threat each day

By emil.protalinski@arstechnica.com (Emil Protalinski) on ESET

companion photo for 3.3% of PCs with ESET antivirus block a threat each day

ESET is known as the creator of one of the better security software solutions, and recently the organization has done more research into what its customers are seeing. The company's virus lab receives over 100,000 new pieces of malware every day. The big conclusion? There are more malware authors than ever and their technologies to rapidly create new variants of malicious code are getting better.

While you stifle your yawn (since you're not really surprised), here's a statistic ESET discovered that you probably couldn't have come up with yourself: 3.3 percent of the computers running ESET's antivirus detect and block at least one threat every day. The calculation was made using the company's ThreatSense.Net monitoring system, which gathers statistics on malicious activity on customer computers running ESET software.

Read the rest of this article...

Microsoft: IIS vulnerability under limited attacks (Updated x2)

By emil.protalinski@arstechnica.com (Emil Protalinski) on Internet Information Services

companion photo for Microsoft: IIS vulnerability under limited attacks (Updated x2)

A hacker has posted code on his Milw0rm website that could be used to attack a system running Microsoft Internet Information Services (IIS) server and install unauthorized software on it. The good news is that the attack appears to work only on older versions of IIS—versions 7.x are not affected. The flaw resides in the File Transfer Protocol (FTP) software used by IIS to transfer large files, meaning that FTP must be enabled for an attack to be succesful. The risk posed by this vulnerability isn't completely clear yet, but Microsoft says it is looking into the issue.

Read the rest of this article...

MS09-048: Vulnerabilities in Windows TCP/IP Could Allow Remote Code Execution

By Robert A. on Vulns

Microsoft has just published a remote vulnerability in the windows TCP/IP stack. "This security update resolves several privately reported vulnerabilities in Transmission Control Protocol/Internet Protocol (TCP/IP) processing. The vulnerabilities could allow remote code execution if an attacker sent specially crafted TCP/IP packets over the network to a computer with a listening...

Apache.org Incident Report For 8/28/2009 Hack

By Robert A. on IndustryNews

From the report "Our initial running theory was correct--the server that hosted the apachecon.com (dv35.apachecon.com) website had been compromised. The machine was running CentOS, and we suspect they may have used the recent local root exploits patched in RHSA-2009-1222 to escalate their privileges on this machine. The attackers fully compromised this...

Cross-protocol XSS with non-standard service ports

By Robert A. on XSS

i8jesus has posted an entry on smuggling other protocol commands (such as ftp) in HTML forms, as well as edge case situations where running a tcp service (in this case ftp on a non standard port) can result in more XSS abuse cases. While not likely still worth a read. "Most...

Microsoft: Windows 7 not affected by latest flaw

By Ina Fried

Microsoft issued a formal security advisory late Tuesday on a reported zero-day flaw in Windows Vista and Windows Server 2008. However, the software maker also said that the flaw does not affect the final version of Windows 7, contrary to earlier reports.

"Microsoft is investigating new public reports of a ...

Originally posted at Beyond Binary

Microsoft issues critical Windows patches

By Ina Fried

Microsoft on Tuesday issued five critical Windows-related updates as part of its monthly Patch Tuesday release.

While the issues affect different versions of Windows differently, Microsoft said none of the issues apply to the final version of Windows 7, which Microsoft wrapped up in July.

The five bulletins address eight ...

Originally posted at Beyond Binary

Windows 7, Vista zero-day flaw reported

By Tom Espiner

Microsoft said on Tuesday that it is investigating reports of a zero-day vulnerability affecting Windows 7 and Vista.

The flaw in Windows 7 could allow an attack which would cause a critical system error, or "blue screen of death," according to researcher Laurent Gaffie.

Gaffie wrote in his blog that ...

Norton calls on Quorum for 2010

By Seth Rosenblatt

Symantec is betting heavily that program behavior is the future battlefront of security and is making a big push in its 2010 security program lineup with a behavioral engine called Quorum.

Debuting Wednesday, both the basic Norton AntiVirus 2010 and the more robust Norton Internet Security 2010 will use Quorum, ...

Originally posted at The Download Blog

WordPress blogs falling prey to worm

By Jennifer Guevin

A worm is circulating that can post malware and spam to some WordPress blogs using outdated versions of the blogging software, according to a post by Matt Mullenweg, founding developer of WordPress.

The worm can be tough to catch, as Mullenweg explains: "it registers a user, uses a security bug (...

Microsoft reports attacks using IIS vulnerability

By Stephen Shankland

A vulnerability in Microsoft's software for housing Web sites is now being used for "limited attacks" on the servers it's running on, the company said Friday.

Microsoft disclosed the Internet Information Services (IIS) vulnerability on Monday and said Friday it's still working on a security update to ...

Originally posted at Deep Tech

Symantec: Posted code enables VoIP spying

By Larry Magid

Along with keyloggers that track what you type, now we have to worry about malicious software that listens in on our voice over Internet Protocol conversations.

Gerry Egan

(Credit: Joris Evers/CNET)

A Symantec security blog on Thursday disclosed a new Trojan horse, Tojan.Peskyspy "that records VoIP communications, specifically ...

Originally posted at Safe and Secure

Microsoft issues advisory on server flaw

By Ina Fried

Microsoft on Tuesday issued a security advisory for a Web server flaw that was made public on Monday.

The flaw affects certain versions of Microsoft Internet Information Services product, but to be exploited it requires a user to have the FTP function enabled. The flaw could allow an attacker to

...

Originally posted at Beyond Binary

Microsoft investigating newly reported IIS flaw

By Ina Fried

Microsoft on Monday said it is looking into a report of a flaw in some versions of its Internet Information Services product that could allow an attacker to gain control of a system.

In a statement, a Microsoft representative said the company "is investigating new public claims of a possible ...

Originally posted at Beyond Binary

Trend Micro launches new security tracking tool

By Sam Diaz

This was originally posted at ZDNet's Between the Lines.

It used to be that an IT administrator could warn employees about opening attachments from unknown sources or clicking on links from unknown e-mail senders as the first line of defense against spam, malware, and other bad stuff on the ...

ZoneAlarm's 2010 suites include encryption

By Seth Rosenblatt

Best known for its ZoneAlarm firewall, Check Point Software has announced updates for ZoneAlarm's more full-featured security suites. Available in two versions, ZoneAlarm Internet Security 2010 gives users a robust firewall, antivirus and antispyware, and parental control package for $50, while ZoneAlarm Extreme Security 2010 adds Web browsing protection, ...

Originally posted at The Download Blog

What price your child’s safety?

By Rik Ferguson on web

  This is often thorny question for parents to consider. How intrusive should my monitoring of my children’s internet activity be? How can I be sure that I am helping them to stay safe online and still maintain their sense of independence and, perhaps more importantly, the privacy which is so important to kids as they are growing up? [...]

Cisco & Microsoft Patch TCP Stack DoS Exploit

By Darknet on vulnerability

A fairly serious flaw that was announced in October 2008 by Outpost24 (and apparently discovered way back in 2005), has finally been patched by the major players Cisco and Microsoft. So far Redhat has offered a workaround for the flaw and Juniper has responded that their equipment is not vulnerable. It could be that Juniper doesn’t [...]

SWFScan – Free Flash Application Security Scanner

By Darknet on web-application-security

HP SWFScan is a free tool developed by HP Web Security Research Group, which will automatically find security vulnerabilities in applications built on the Flash platform. HP is offering SWFScan because: Their research shows that developers and increasingly implementing applications built on the Adobe Flash platform without the required security expertise. As a result, they are seeing a [...]

UK Has The Worst Internet Security In Europe

By Darknet on uk internet security

Interesting story for our British readers, seems like back in Old Blighty people are a bit lax when it comes to keeping their security software up to date. Not only that, from the other aspects of the survey it seems UK is generally lacking in cybersecurity awareness and education with people not deleting dodgy files and [...]

MySqloit – SQL Injection Takeover Tool For LAMP

By Darknet on web-application-security

MySqloit is a SQL Injection takeover tool focused on LAMP (Linux, Apache, MySQL, PHP) and WAMP (Windows, Apache, MySQL, PHP) platforms. It has the ability to upload and execute metasploit shellcodes through the MySql SQL Injection vulnerabilities. Attackers performing SQL injection on a MySQL-PHP platform must deal with several limitations and constraints. For example, the lack [...]

Apache.org Hacked Using Remote SSH Key

By Darknet on vulnerabilities

Apache.org has been hacked quite a number of this times, last week it happened again and the whole infrastructure was down for a few hours while they sorted out what had happened and how to remedy it. Apparently one the remote SSH keys was compromised allowed attacked to upload code, the scary part is they could [...]

Graudit – Code Audit Tool Using Grep

By Darknet on programming security

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. It’s comparable to other static analysis applications like RATS, SWAAT and flaw-finder while keeping the technical requirements to a minimum and being very flexible. Usage Graudit supports several options and tries to follow [...]

University Research Exposes Potential Vulnerabilities In Cloud Computing

"Cross-VM attacks" could threaten sensitive data in cloud computing environments, researchers say

DNSSEC Secures Another Domain

The .edu domain will adopt DNSSEC in March of next year amid more concern over Domain Name System security

Tech Insight: XSS Exposed

Pervasive Web application vulnerability is often misunderstood -- with dangerous consequences

Jury Exacts $32M Penalty From ISPs For Supporting Criminal Websites

California jury exacts $32 million in damages from ISPs that purportedly supported Websites dealing in fraud

Social Networks Fight Back

How major social networks MySpace and Facebook are building up security -- and where their weakest links remain

SQL Vulnerability Leaves Passwords In The Clear, Researchers Say

Researchers say vulnerability in Microsoft SQL Server could unnecessarily expose passwords to system administrators, hackers

Five Ways To Meet Compliance In A Virtualized Environment

RSA, VMware unite security compliance and virtualization in new best practices guidelines

Flaw In Sears Website Left Database Open To Attack

Business-logic flaw in Sears Web application vulnerable to brute-force attack

'Freakshow' Provides Inside Look At Real Malware Behind Big Breaches

Forensics specialists who investigated hacks of a hotel chain, casino, and restaurant share details on sophisticated malware used to successfully steal confidential data from those organizations

IT Pros Question Effectiveness of Anti-Malware

In Virus and Spyware

IT pros are worried about the ability of traditional defenses to stop attacks, according to a new study backed by advocates of applications whitelisting.

Symantec Goes Under the Hood of Waledac Botnet

In Spam

A Symantec researcher has released a new paper outlining the operations of the Waledac botnet, laying bare what has kept the botnet going strong.

Compromised Computers Host an Average of 3 Malware Families

In Trojan attacks

Research from security company ESET underscores the level of cooperation among attackers working to infect users. The presence of multiple malware families shows cyber-crooks are increasingly paying criminal networks to have their malware installed on compromised PCs.

Smartphone Users Ignoring Security Risks

In Spam

A new survey of 1,000 smartphone users conducted by Trend finds that people are not yet sensitive to matters of mobile security, while threats to handheld devices do appear to be on the rise.

Koobface Crew Keeps Foot to Floor

In Web 2.0

Koobface continues to spread its tentacles using the same old template and shows no signs of slowing down, security experts have observed.

New PowerPoint Attacks Hit Old Flaw

In Virus and Spyware

A new wave of attacks are taking aim at an old .PPT vulnerability, highlighting the inability of many users to keep up with vendor-issued security updates.

Zeus Trojan Purveyors Change Tactics

In Trojan attacks

New research from RSA into the Zeus Trojan shows that the malware has been surging of late as its purveyors continue to adopt new techniques.

Report: Government secrecy down slightly in 2008

An annual report says government secrecy decreased slightly in the last year of the Bush administration.

One appeal fails, another pending today for E-Verify

The U.S. Chamber of Commerce and other plaintiffs have filed another appeal in attempt to stop the E-Verify rule from going into effect today for federal contractors, according to a media report.

FCC buying emergency notification system

The FCC is buying an emergency notification system to keep in touch with responder agencies and taking other steps to improve its disaster communications capabilities, its chairman said today.

U.S. and Mexico talk safety across the fence

U.S. and Mexican officials announced an agreement to set up a cross-border network to enhance safety and law enforcement at the border.

Top 5 challenges for the cyber coordinator

President Barack Obama's pledge to appoint a cybersecurity policy coordinator at the White House has drawn cheers, a few jeers and a long to-do list.

Experts disagree on effect of E-Verify's expiration

The authorization for the E-Verify employment verification program expires three weeks after it is set to cover federal contractors.

Top 5 stories at the FCW.com watercooler

FCW.com readers, on the whole, might be more civil than most people who post comments on mainstream Web sites but they are no less passionate.

CMS considers contractors for identifier program

The Centers for Medicare and Medicaid Services is considering using contractors to operate a national system for assigning health providers unique identifying numbers.

Groups ask court to delay E-Verify despite ruling

The organizations trying to stop the E-Verify rule from covering federal contractors have filed for an injunction to delay enforcement from beginning Sept. 8.

Who is sending mysterious laptops to governors?

The FBI is investigating unsolicited laptop computers sent to several governors’ offices.

DHS needs to plug some cybersecurity holes, audit finds

The DHS Inspector General recommends improving the department's coordination of cybersecurity for critical control systems.

Joint Forces Command to test new network encryption

Unisys's Stealth technology is intended to allow separate secure virtual communities to coexist on a single network.

Court: Federal contractors covered by E-Verify rule

A judge upheld the Homeland Security Department's E-Verify electronic employment verification rule for federal contractors starting Sept. 8.

Experts debate expansion of president’s cybersecurity powers

Existing laws already give the president broad discretion on how to respond to cyberattacks, despite language in a Senate bill that proposes giving the president specific powers during such events, expert says.

Health IT group to offer security certification to vendors

The Health Information Trust Alliance will certify security products against its Common Security Framework as the government moves to establish an infrastructure, national standards and privacy requirements for the handling of electronic health care records.

Indo-Israeli Cyber Warfare against Pakistani nuclear program

Posted by InfoSec News on Sep 9

http://www.asiantribune.com/news/2009/09/08/indo-israeli-cyber-warfare-against-pakistani-nuclear-program

By Farzana Shah
Asian Tribune
2009-09-09

After sea, land and air warfare, traditional arch rivals India and Pakistan are now facing each other in another arena. With evolution of...

How a Phishing Attack Exposed an Energy Company to Hackers

Posted by InfoSec News on Sep 9

http://www.eweek.com/c/a/Security/How-a-Phishing-Attack-Exposed-an-Energy-Company-to-Hackers-183328/

By Brian Prince
eWEEK.com
2009-09-08

In an interview with eWEEK, the Intrepidus Group reveals some of the details behind a malware attack that exposed critical systems at an energy...

University Research Exposes Potential Vulnerabilities In Cloud Computing

Posted by InfoSec News on Sep 9

http://www.darkreading.com/securityservices/security/management/showArticle.jhtml?articleID=219700098

By Tim Wilson
DarkReading
Sept 08, 2009

Users of cloud computing infrastructures should be aware that their sensitive data could be potentially leaked, a group of university researchers...

Unpatched Microsoft bugs raise red flags

Posted by InfoSec News on Sep 9

http://www.computerworld.com/s/article/9137731/Unpatched_Microsoft_bugs_raise_red_flags?taxonomyId=17

By Robert McMillan
September 8, 2009
IDG News Service

Microsoft has released its security updates for the month of September, but a couple of unpatched flaws have some security experts...

Website exposes sensitive details on military personnel

Posted by InfoSec News on Sep 9

http://www.theregister.co.uk/2009/09/08/ridematch_website_vulnerability/

By Dan Goodin in San Francisco
The Register
8th September 2009

Programming errors on a website that helps commuters carpool to work are exposing sensitive information of workers for hundreds of employers in...

ASIO officers met whistleblowers in pancake parlour

Posted by InfoSec News on Sep 8

http://www.theaustralian.news.com.au/story/0,25197,26029093-5001561,00.html

By Cameron Stewart
The Australian
September 05, 2009

A PANCAKE Parlour restaurant and a cafe in the Block Arcade in central Melbourne are unlikely places to discuss claims of Chinese espionage.

But these were...

Court Allows Woman to Sue Bank for Lax Security After 26, 000 Stolen by Hacker

Posted by InfoSec News on Sep 8

http://www.wired.com/threatlevel/2009/09/citizens-financial-sued/

By Kim Zetter
Threat Level
Wired.com
September 4, 2009

An Illinois district court has allowed a couple to sue their bank on the novel grounds that it may have failed to sufficiently secure their account, after an...

Wi-fi an easy target for terrorists?

Posted by InfoSec News on Sep 8

http://www.timesnow.tv/Wi-fi-an-easy-target-for-terrorists/articleshow/4326496.cms

5 Sep 2009

In a city like Bangalore, India's Silicon Valley, the Internet has become indispensable with millions of e-mails sent daily, electronic transactions made and data transferred. But how secure is...

Experts: Hackers might view summit as a chance to make a statement

Posted by InfoSec News on Sep 8

http://www.pittsburghlive.com/x/pittsburghtrib/news/pittsburgh/s_641856.html

By Mike Cronin
TRIBUNE-REVIEW
September 6, 2009

Duquesne Light and Alcosan, two of Western Pennsylvania's largest utilities, are working to ensure a potential attack to their computer systems during the G-20...

Wordpress problem: Hackers break into Robert Scobles blog, delete posts

Posted by InfoSec News on Sep 8

http://venturebeat.com/2009/09/05/hackers-break-into-robert-scobles-blog-and-delete-older-posts/

By Dean Takahashi
Venture Beat
September 5, 2009

Uber blogger Robert Scoble said today that hackers broke into his blog and deleted about two months' worth of postings -- leang to findings...

Defense Security Command seeks approval to expand cybersecurity personnel

Posted by InfoSec News on Sep 8

http://english.hani.co.kr/arti/english_edition/e_national/374918.html

The Hankyoreh
Sept. 4, 2009

The Defense Security Command (DSC), the Ministry of National Defense's (MND) counterintelligence arm, is proposing the creation of a cyberdefense organization under its command, and is...

Who is sending mysterious laptops to governors?

Posted by InfoSec News on Sep 4

http://www.fcw.com/Articles/2009/09/02/FBI-investigates-mysterious-laptops.aspx

By Doug Beizer
FCW.com
Sept 02, 2009

Who is sending unsolicited laptop computers to governors' offices, and why?

The FBI is investigating the unexpected deliveries that were sent to governors' offices in at...

Nations web access cut after Telstra outage

Posted by InfoSec News on Sep 4

http://www.smh.com.au/technology/technology-news/nations-web-access-cut-after-telstra-outage-20090903-f8uz.html

By Georgina Robinson
smh.com.au
September 3, 2009

Telstra's national internet network went down for an hour today, the company says.

The outage affected all Telstra home and...

Government Develops Korean e-Government Model

Posted by InfoSec News on Sep 4

http://www.koreaittimes.com/story/4865/government-develops-korean-e-government-model

By Chung Myung-je
Korean IT
September 2nd, 2009

Cyber security has emerged as a matter of significant concern. The government is determined to drastically increase the portion of cyber security policies,...

Breaching Fort Apache.org - What went wrong?

Posted by InfoSec News on Sep 4

http://www.theregister.co.uk/2009/09/03/apache_website_breach_postmortem/

By Dan Goodin in San Francisco
The Register
3rd September 2009

Administrators at the Apache Software Foundation have pledged to restrict the use of Secure Shell keys for accessing servers over their network...

Prince William and Harrys mobile phones may have been hacked

Posted by InfoSec News on Sep 3

http://www.telegraph.co.uk/news/newstopics/theroyalfamily/6128186/Prince-William-and-Harrys-mobile-phones-may-have-been-hacked.html

By Chris Irvine
Telegraph.co.uk
02 Sept 2009

Detective Chief Superintendent Philip Williams, from the Metropolitan Police, raised the possibility at the...

Court allows suit against bank for lax security

Posted by InfoSec News on Sep 3

http://www.computerworld.com/s/article/9137451/Court_allows_suit_against_bank_for_lax_security?taxonomyId=17

By Jaikumar Vijayan
September 2, 2009
Computerworld

A couple whose bank account was breached can sue their bank for its alleged failure to implement the latest security measures...

DHS needs to plug some cybersecurity holes, audit finds

Posted by InfoSec News on Sep 3

http://fcw.com/articles/2009/09/02/dhs-needs-to-improve-cybersecurity-efforts-for-control-systems-ig-says.aspx

By Alice Lipowicz
FCW.com
Sept 02, 2009

The Homeland Security Department is should improve its cybersecurity programs for some major control systems, according to a new report...

How to Succeed in a Two-Faced IT Security Job Market

Posted by InfoSec News on Sep 3

http://www.csoonline.com/article/501117/How_to_Succeed_in_a_Two_Faced_IT_Security_Job_Market

By Bill Brenner
Senior Editor
CSO
September 01, 2009

More companies have hired CSOs and CISOs in response to an ever-increasing regulatory compliance load. They are spending less on outsourcing...

Raytheon to buy BBN, a firm that helped create Net

Posted by InfoSec News on Sep 2

http://www.boston.com/business/technology/articles/2009/09/02/raytheon_to_buy_bbn_a_firm_that_helped_create_net/

By Hiawatha Bray
The Boston Globe
September 2, 2009

Raytheon Co. has struck an agreement to buy BBN Technologies, a privately held Cambridge firm that played a vital role in...

UK Parliament website hack exposes shoddy passwords

Posted by InfoSec News on Sep 2

http://www.theregister.co.uk/2009/09/01/uk_parliament_hacked/

By Dan Goodin in San Francisco
The Register
1st September 2009

A vulnerability in the website of the UK Parliament appears to be exposing confidential information, including unencrypted login credentials, a Romanian hacker...

5 More Indicted in Probe of International Carding Ring

Posted by InfoSec News on Sep 2

http://www.wired.com/threatlevel/2009/09/westernexpress/

By Kim Zetter
Threat Level
Wired.com
September 1, 2009

Five eastern European men were indicted in New York on Monday as part of an international ring allegedly responsible for at least $4 million in credit card theft.

The ring,...

Bill would give president emergency control of Internet

Posted by InfoSec News on Aug 31

http://news.cnet.com/8301-13578_3-10320096-38.html

By Declan McCullagh
Politics and Law
CNET News
August 28, 2009

Internet companies and civil liberties groups were alarmed this spring when a U.S. Senate bill proposed handing the White House the power to disconnect private-sector...

Financial Crypto and Data Security 2010: speakers and workshops [deadline: September 15]

Posted by InfoSec News on Aug 31

Forwarded from: Radu Sion <sion (at) moon.crypto.cs.stonybrook.edu>

Financial Cryptography and Data Security Tenerife, Canary Islands, Spain
25-28 January 2010

http://fc10.ifca.ai

Financial Cryptography and Data Security is a major international forum for research, advanced...

Indonesian Hackers Launch Independence Day Attack on Malaysian Web Sites

Posted by InfoSec News on Aug 31

http://thejakartaglobe.com/home/indonesian-hackers-launch-independence-day-attack-on-malaysian-web-sites/327111

The Jakarta Globe
31 August 2009

A ring of Indonesian hackers on Monday claimed to have attacked a list of more than 120 Web sites as retribution for Malaysia's alleged theft...

Skype spy Trojan escapes into wild

Posted by InfoSec News on Aug 31

http://news.techworld.com/security/3200665/skype-spy-trojan-escapes-into-wild/

By John E. Dunn
Techworld UK
28 August 09

Only days after Swiss programmer Ruben Unteregger released the source code for a Trojan he wrote three years ago to hack Skype phone calls, the inevitable has...

ITL Bulletin for August 2009

Posted by InfoSec News on Aug 31

Fowarded from: "Lennon, Elizabeth B." <elizabeth.lennon (at) nist.gov>

ITL BULLETIN FOR AUGUST 2009 REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH NATIONAL SECURITY AND NONNATIONAL SECURITY SYSTEMS  
Shirley...

Accused TJX Hacker Agrees to Guilty Plea -- Faces 15 to 25 Years

Posted by InfoSec News on Aug 31

http://www.wired.com/threatlevel/2009/08/gonzalezguiltyplea/

By Kim Zetter
Threat Level
Wired.com
August 28, 2009

Accused TJX hacker, Albert Gonzalez, has accepted a plea agreement with prosecutors in Boston that will put an end to cases that authorities have described as one of the...

Game server admins arrested for Chinese DNS attacks

Posted by InfoSec News on Aug 31

http://arstechnica.com/web/news/2009/08/game-server-admins-arrested-for-chinese-dns-attacks.ars

By Jacqui Cheng
Ars Technica
August 28, 2009

A denial of service attack that took down Internet access in parts of China earlier this year has been attributed to an over-enthusiastic game...

Microsoft Fixes Eight Flaws, But Three Remain Open

By Thomas Claburn

The September patch set from Microsoft has fallen a bit short, leaving three zero-day vulnerabilities open to be exploited

Rolling Review Wrap-Up: Data Loss Prevention

By Randy George

From enterprise data discovery to stopping leaks on endpoints and the network, DLP tools are ready.

Rolling Review Wrap-Up: Data Loss Prevention

By Randy George

From enterprise data discovery to stopping leaks on endpoints and the network, DLP tools are ready.

Practical Analysis: Time For A New Way Of Thinking About IT Risk

By Greg Shipley

A colleague joked that a time capsule from 2000 would hold warnings against the hacking techniques Gonzalez used. His victims aren't laughing.

CIO Profiles: Ken Silva, Senior VP And CTO Of VeriSign

This security pro sees huge potential for virtualization.

Microsoft Expands IIS Vulnerability Warning

By Thomas Claburn

Following up on a Security Advisory published earlier this week, Microsoft has added IIS 7.0 to the list of vulnerable configurations

FBI Investigates Laptops Sent To Governors

By Antone Gonsalves

State officials fear the unsolicited computers could contain malware meant to penetrate the security of state or federal networks.

FBI Investigates Laptops Sent To Governors

By Antone Gonsalves

State officials fear the unsolicited computers could contain malware meant to penetrate the security of state or federal networks.

Apple's Snow Leopard Downgrades Flash Security

By Thomas Claburn

Users of Apple's Snow Leopard Mac OS X operating system upgrade are being advised to install, or reinstall, the latest version of Adobe's Flash player.

VMware CTO Details Future Of Virtualization

By Charles Babcock

Speaking at VMworld, Stephen Herrod foresees virtual data centers recovering from disaster before users realize a disaster has occurred. 

Privacy Group Coalition Urges Data Regulation

By Thomas Claburn

Ten consumer and privacy groups are urging Congress to limit the way online information can be used for advertising and profiling.

Microsoft IIS Zero-Day Vulnerability Reported

By Thomas Claburn

Exploit code affecting the FTP module for certain versions of Microsoft IIS has been posted online. US-CERT recommends taking countermeasures.

Wikipedia Considers Coloring Untested Text

By Thomas Claburn

Registered Wikipedia users may soon have access to software that colors text deemed untrustworthy.

Apple Snow Leopard Security Criticized

By Thomas Claburn

Mac users are getting new security features with the arrival of Apple's Mac OS X 10.6, known as "Snow Leopard." But security vendors see Apple's security enhancements as lightweight.

5 Security Lessons From Real-World Data Breaches

We break the code of silence on data breaches to show how criminals operate -- and how you can thwart them.

DDoS Response: Part 2

By Francois Paget on Vulnerability Research

In my post “DDoS Response: Part 1,” I started an analysis on combating distributed-denial-of-service attacks. In this post, Part 2, I shall examine solutions for private networks. To proactively prevent attacks on private networks, one solution is to hide the legitimate paths from attackers and to periodically change the topology of the network. Source-address filtering, secret [...]

DDoS Response: Part 1

By Francois Paget on Vulnerability Research

Distributed-denial-of-service (DDoS) attacks can be conducted in various ways (by SYN flood, UDP flood, Teardrop Attack, Ping of Death, Smurfing, Mail Bombing, etc.).  DDoS attacks can exploit vulnerabilities in software running on the victim’s machine or via sending a higher volume of traffic than the victim’s system can handle. The attacks can target resources (such [...]

Task Manager Still Working? Can You Change Your Windows Password?

By Karthik Raman on Malware Research

Update of September 3: Some detections of this Trojan were on a component of a commercial application. For this reason we’ve updated the detection type to “potentially unwanted program” (PUP). Customers who see files that exhibit the behavior discussed in the Threat Library for QTaskMgr-1 should submit the file to McAfee Avert Labs. In anti-virus research, [...]

Huawei hits back at spy claims

Networking vendor Huawei has released a public refutation of a recent media report that alleged it was being investigated by the Australian Security Intelligence Organisation (ASIO) for possible espionage.
Related Searches
on Ask.com

Verizon launches mobility services for large firms

Verizon Business today announced Managed Mobility Solutions, a new service for large multinational businesses that provides security for mobile devices and mobile expense management.

Microsoft Patches Critical MP3 Flaw

Today's Patch Tuesday fixes from Microsoft include six critical bulletins that head off potential attacks involving poisoned media files and Web pages, along with wireless and TCP/IP security holes. An under-attack FTP flaw remains unfixed.

Microsoft: Patching Windows 2000 'infeasible'

Microsoft took the unusual step today and skipped patching one of the vulnerabilities addressed in its monthly security update, an omission that leaves users running Windows 2000 Server Service Pack 4 vulnerable to attack.

Seven Deadly Sins of Building Security

You've got a few security guards and your CCTV system is up to snuff. You've got your building security covered, right? Think again. While many organizations are taking the steps to ensure their building is secure, many are ignoring basic pieces of the puzzle that is physical security in and around a facility.

FanCheck developer defends app, says it's not malware

The controversial and popular FanCheck application for Facebook carries no viruses and is completely safe and legitimate, according to its creator.

Unpatched Microsoft bugs raise red flags

Microsoft has released its security updates for the month of September, but a couple of unpatched flaws have some security experts wondering if the software company will be forced to release an emergency patch sometime in the month ahead.

Group of authors opposes Google book settlement

More than two dozen authors and publishers have filed an objection to a proposed settlement that would allow Google to digitize and sell millions of books, saying that the agreement ignores important privacy rights of readers and writers.

Sophos: Searches about Fan Check app can lead to malware

Malicious hackers are setting up malware-infested Web sites that falsely claim to remove a virus from a new Facebook application called Fan Check, security vendor Sophos is warning.

Symantec adds Quorum antimalware analysis to consumer security software

Symantec unveils the 2010 editions of its flagship antimalware consumer software, Norton AntiVirus and Norton Internet Security, adding a new type of malware detection and analysis it calls Quorum.

Close to Patch Tuesday, new flaw surfaces

As Microsoft prepares to release patches, researchers said they've seen exploit code for a new flaw that puts organizations using Vista and Windows 7 at great risk.

25% of all fraudulent online purchases made in County Durham

Nearly a quarter of all internet purchases made using a stolen credit cards last year took place in Shildon in Country Durham, says The 3rd Man.

Online travel takes off with EV SSL security

The image of organised crime rings running rampant across the Internet, creating legitimate-looking Web sites to lure cash from unsuspecting consumers, has many would-be customers scurrying back to the relative safety of the retail store environment.

'Generation Y-pay?' refuses to pay for downloads

Less than one in two 16 to 34 years olds believe they should pay to download TV and movies from the web, says The Industry Trust for IP Awareness (Itipa).

Small English town outpaces others in likely online fraud

A town in England with a modest population of 10,000 or so has chalked up the highest percentage of online transactions flagged as fraudulent by a U.K. security analyst.

European banks warned: brace for rise in cash machine fraud

Banks are likely to see cash-machine fraud rise unless steps are taken to improve their cash-machine infrastructure, the European Network and Information Security Agency (ENISA) has warned.

Vormetric's agent-based approach provides strong key management across all apps

The Vormetric Data Security Expert Security Server is not a direct competitor to the Thales and Venafi systems. Rather than managing keys used by other certificate authorities or encryption solutions, it manages its own encryption solution across multiple systems.

Federal IT strategy, hope over reality

Well, that ugly, ill-conceived bill from Senator Rockefeller, now called the "Cybersecurity Act of 2009", has reappeared and if it passes someone is going to get saddled with the job of making it happen. Who will be the lucky guy and can he succeed?

Microsoft Promises IIS Bug Patch

Microsoft said it is working on a patch for a bug in its popular Web server software, but experts say it's unlikely that the company will field a fix fast enough to make this week's regular Patch Tuesday release.

Firefox adds Flash plug-in update protection

Mozilla's next update for Firefox, slated to ship Tuesday, will check for outdated versions of Flash Player, a frequent target of hackers, the company said on Friday.

Oracle delays security updates for user conference

Oracle database administrators who are worried they might have to skip Oracle's user conference next month to fiddle with security updates can relax. Oracle is cutting them a break and releasing its next set of patches a week later than planned.

Old Flash for Snow Leopard, and Firefox Gets Fake Flash

Here's a sneaky one for you. According to Sophos, a piece of spyware is masquerading as a Flash player plug-in for Firefox. Its installation screen looks legit (per examples in the Sophos post), and it will even show up thereafter in the list of Firefox extensions as "Adobe Flash Player 0.2."

Microsoft: Cyber-crooks exploiting unpatched IIS bug

Microsoft says that cyber-criminals are starting to exploit an unpatched bug in its IIS server software that was made public earlier this week.

Patch scramble throws Adobe updates off schedule

July was a tough month for Adobe Systems' security team. So tough, in fact, that the company's second-ever quarterly patch release will arrive a month late, Adobe's security chief said Thursday.

UK has the worst internet security in Europe

Brits are lax at updating their security software, compared to their European counterparts, says PC Tools.

Snow Leopard 'downgrades' Flash to vulnerable version

Apple shipped an out-of-date -- and vulnerable -- version of Adobe Flash Player with its newest OS, Snow Leopard, security companies have warned.

What is Antivirus 2010?

Lonerlady asked the Answer Line forum about this very insistent program that wants to download itself and protect her computer.

Microsoft to deliver five critical Windows patches next week

Microsoft today said it will deliver five security updates on Tuesday, all affecting Windows and all ranked "critical," the company's highest threat rating

Has your sensitive data leaked into the wild?

Most organizations have data security policies designed to keep sensitive information from becoming publicly available. Still, you’d be surprised at the kind of information that makes its way out into the open, either accidentally or intentionally. Financial records, customer account information, product plans and roadmaps. Do you know what information your company is exposing? New “data leak detection” (not prevention) technology from Exobox Technologies can tell you what is in the public eye, and where it is.

Apple ships vulnerable Flash version with new Mac OS

Mac users may be surprised that versions of Apple's latest operating system, Snow Leopard, also installs an older version of Adobe System's Flash player, potentially putting them at a higher security risk.

Half of Brits use same passwords online

Nearly half of all Brits use the same password to log in to their online banking account as their social networking account, says CPP.

'Digital tatoos' ignored by 33% of under 25s

A third of web users under 25 claim they don't care about their 'digital tattoo' and the items they post online, says Symantec.

Brits are worst in Europe at online security

Brits are lax at updating their security software, compared to their European counterparts, says PC Tools.

Turn an Old Floppy Into a Password Safe

Think back. Wayyy back. Remember floppy disks? If you're like me, you've probably got a box of them in a closet, serving absolutely no practical use. (When was the last time you owned, or even used, a computer with a floppy drive?)

Microsoft promises patch for critical Web server bug

Microsoft yesterday said it is working on a patch for a bug in its popular Web server software, but it's unlikely the company will field a fix fast enough to make next week's regular release, a security expert predicted.

Five indicted in long-running cybercrime operation

New York prosecutors indicted five Eastern European men on Monday in an extensive credit-card fraud operation that netted the defendants at least US$4 million from some 95,000 stolen card numbers.

Security vendor Marshal8e6: Call us M86 Security

Web and messaging security products provider Marshal8e6 this week announced a name change to M86 Security.

The Wacky World of WiFi

In honor of the 802.11n WiFi standard getting close to arriving after wandering through the desert for 40 years, let's look at wireless. Our focus today is on helping you WiFi better, even if it means doing less WiFi.

Anti-phishing training adds attachments to mix

After launching an anti-phishing training system a year ago, Intrepidus Group has followed up with a new version that adds targeted email attacks using attachments to the model.

French Pirate Party will fight for parliamentary seat

The French Pirate Party will present a candidate in an upcoming interim election for a vacant seat in the National Assembly, it announced Tuesday.

BitDefender’s top 10 e-threats for August

Trojans total half of security vendor BitDefender's top 10 e-threats for August.

Pseudonymous critic impugns integrity of all security professionals

In a recent response to an article on hiring hackers, a pseudonymous critic calling itself "Secure network..." posted a comment entitled "so called hacking and security professionals." It started with the run-on sentence, "Of course someone calling them selves[sic] a ‘security Professional’ would be upset, it's job security they're losing...."

Is your health privacy at risk?

The year's worst health information breaches, which compromised millions of patient records, show just how vulnerable health privacy is to hacker attacks.

After code released, Microsoft to patch IIS bug

One day after a security researcher published attack code for a flaw in Microsoft's IIS server software, Microsoft said it plans to patch the issue.

Facebook agreement with Canada will impact everyone

If having an affect on 250 million users around the world weren't enough, upcoming changes to Facebook Inc.'s privacy policies and practices are likely to spawn a chain reaction among all the other major social media sites, impact business marketing practices and address everyone who doesn't have a Facebook account.,"

Privacy, consumer groups want news laws to protect Web users

A coalition of 10 U.S. privacy and consumer groups has called for new federal privacy protections for Web users, including a requirement that Web sites and advertising networks get opt-in permission from individuals within 24 hours of collecting personal data and tracking online habits.

How to Succeed in a Two-Faced IT Security Job Market

More companies have hired CSOs and CISOs in response to an ever-increasing regulatory compliance load. They are spending less on outsourcing as economic conditions prompt them to handle more security tasks in-house.

Instant messaging speeds up data theft danger

One of the more sophisticated pieces of malware in circulation has been given an upgrade that lets cybercriminals act even faster after they've stolen data from a PC.

Catbird reports whether cloud security meets compliance standards

Catbird is adding a feature to its security platform that gives cloud users a reading on how well their data use complies with specific regulatory requirements.

Symantec warning: Spam targeting your achy breaky heart

The information security gurus at Symantec Corporation have seen it fit to warn us all that spammers are now looking to con troubled lovers into parting with their personal information, at the very least, in return for a reversal of fortunes in their relationships. The company issued a five-point advisory for consumers to Computerworld Singapore on Tuesday, September 1, 2009:

RSA publishes virtualization security, compliance guidelines

RSA today published security and compliance recommendations for virtualization products. The guidelines focus primarily on optimizing use of management and security tools available from VMware parent company EMC and EMC's RSA security division.

Privacy Office approves laptop searches without suspicion

Travelers arriving at U.S. borders may soon be confronted with their laptops, PDAs, and other digital devices being searched , copied and even held by customs agents -- all without need to show suspicion for cause.

Judge won't lower $5M bail for SF IT administrator

A Bay Area man who has spent nearly 14 months in jail after refusing to hand over administrative passwords to San Francisco's city network is likely to remain incarcerated after a county judge denied his motion for reduced bail on Monday.

Unpatched flaw could take down Microsoft's IIS server

A hacker has posted code that could be used to take over a system running Microsoft IIS (Internet Information Services) server.

3Com to blend security brains, enterprise brawn

3Com plans to integrate intrusion prevention technology from its TippingPoint subsidiary into networking gear from its H3C division as part of a strategy to deliver streamlined secure networks at less cost and power consumption than marquee vendors.

Microsoft: Upgrade Messenger or else

Microsoft will force an upgrade on users of its Windows Live Messenger instant messaging software in September to plug a hole the company introduced when a programmer added an extra character to a code library.

Skype spy Trojan escapes into wild

Only days after Swiss programmer Ruben Unteregger released the source code for a Trojan he wrote three years ago to hack Skype phone calls, the inevitable has happened - someone has released it as a compiled piece of 'faux' malware.

Companies put security on back burner in dash to virtualise

Companies are putting security on the back burner in the rush to virtualise their data centres. That's according to applications delivery vendor F5 which conducted a survey of more than 100 decision makers about their virtualisation plans.

Crossing Borders with Laptops: Facts and Tips

Earlier this week, the U.S. Department of Homeland Security made it clear that border crossing officials could continue to search any device that can store electronic media without any suspicion of wrongdoing.

AJAX widget security enabled

In an upgrade to one of its core technologies, the OpenAjax Alliance, an industry group formed to boost interoperability in the AJAX space, on Monday is offering OpenAjax Hub 2.0, featuring capabilities for secure interaction between JavaScript widgets.

Skype Wiretapping Trojan Publicly Released

The Swiss creator of a Skype Trojan that can intercept calls made using the VoIP program has released the Trojan's source code online in an attempt to allow for its widespread detection.

New cloud infrastructure service focuses on security

OpSource on Friday announced a new cloud computing infrastructure service that it says meets the security and management needs of enterprises more effectively than rival offerings.

Microsoft, Cisco issue patches for newfangled DoS exploit
Relief for industry-wide TCP attack

Microsoft and Cisco have issued updates that protect against a new class of attack that requires very little bandwidth and can leave servers and routers paralyzed even after a flood of malicious data has stopped.…

Website exposes sensitive details on military personnel
Required by law

Programming errors on a website that helps commuters carpool to work are exposing sensitive information of workers for hundreds of employers in Southern California, including at least one military installation.…

What US Homeland Security collects about you
Inside your terrorist score

Any time a person crosses the US border, the Department of Homeland Security assigns travelers with a "risk assessment" score to divine their likelihood of any involvement with a terrorist cell or criminal activity.…

Byrne's naked shorting crusade outs Yahoo! security vuln
From Wikimadness to cross-site scripting

Patrick Byrne's unrelenting crusade against naked short selling has uncovered a gaping security hole in Yahoo!'s ever-popular message boards.…

Adobe and Oracle postpone quarterly patches
Schtop! This security update isn't ready yet

Adobe and Oracle are both planning to delay their quarterly patch releases, albeit for different reasons.…

UK.biz lax on web app security
SQL injection problems getting worse

Web application security among UK corporates is getting worse, according to audits carried out by CESG-accredited security consultancy NTA Monitor.…

Facebook Fan Check scareware begets malign ware-scares
How very meta

Searching for information about a supposed virus threat affecting Facebook might itself be hazardous.…

Worm wiggles through weary WordPress
Spam-friendly malware spanks Scoble blog

Hackers are exploiting older installations of WordPress to distribute blog comment spam and disguise links to malware-contaminated sites.…

EU urges wise-up to combat rampant ATM crime
Don't stand so close to me

The rise in ATM-related crime has prompted a EU security agency to urge consumers to be more careful about withdrawing money from cash machines.…

Firefox to warn users of insecure Adobe Flash
By popular demand

Upcoming versions of Mozilla's Firefox browser will automatically warn users running versions of Adobe's Flash Media Player that contain known security bugs, according to a published report.…

New IIS attacks (greatly) expand number of vulnerable servers
Microsoft's webserver even easier to exploit

Attackers have begun actively targeting an unpatched hole in Microsoft's Internet Information Services webserver using new exploit code that greatly expands the number of systems that are vulnerable to the bug.…

Faux Facebook 'friend' takes US woman for $4,000
Crooks impersonate UK Immigration

A US woman has been stung for $4,000 via a fraudulent Facebook "friend in peril" scam.…

Conficker borks London council
Dirty USB shuts systems for days

Updated An Ealing council employee infected the UK local authority's IT systems with the Conficker-D worm after he plugged an infected USB into a work computer, causing tens of thousands of pounds in damages in the process.…

Man arrested for £1m online tax fraud
London cybercrime network under investigation

Police investigating a complex online fraud which scammed more than a million pounds from taxpayers have arrested a man in London.…

MS fuels up five critical Windows fixes
Black Tuesday likely to skip relief for IIS zero-day

Microsoft plans to release five critical update bulletins next Tuesday, all critical, in the September edition of its regular Patch Tuesday update cycle.…

McAfee false alert snares innocent JavaScript files
I didn't do it

Faulty virus definition updates from McAfee that flagged legitimate JavaScript files as potentially malign caused a headache for some sysadmins earlier this week.…

Month of Facebook flaws gets underway
Every day a different hole

A security researcher has vowed to reveal technical details of a series of cross-site scripting vulnerabilities involving Facebook applications during September.…

Apple security lags (again) with critical Java patches
A month late, an OS short

Comment Apple is once again playing security catch-up to the rest of the computing world, this time with an update for the Leopard version of its Mac operating system that patches critical holes in Java that were fixed on competing systems 29 days ago.…

Breaching Fort Apache.org - What went wrong?
Open-sourcers put locks on keys

Administrators at the Apache Software Foundation have pledged to restrict the use of Secure Shell keys for accessing servers over their network following a security breach on Monday that briefly forced the closure the popular open-source website.…

Anti-spam smackdown finds best junk filter
McAfee spanks all comers in early tests

McAfee has claimed the crown in a run-off of anti-spam products organised by Virus Bulletin, the independent security certification body.…

Snow Leopard forces silent Flash downgrade
Bundled insecurity bungle

Apple has bundled a vulnerable version of Flash with Snow Leopard.…

Yorkshire start-up aims to shake up telecoms security
Syphan leaps funding gap for Silicon Dale

UK-based security appliance firm Syphan aims to shake up telecoms security from an unlikely base in Skipton, North Yorkshire.…

Microsoft confirms IIS bug gives complete server control
But only if ...

Microsoft has confirmed a vulnerability in its Internet Information Services webserver and spelled out the conditions under which it can be exploited to give an attacker complete control of the server on which it runs.…

Microsoft rejects call to fix SQL password-exposure risk
Unpatched and staying that way

Microsoft is butting heads with a company that provides software for database security over a weakness in SQL Server that can expose user passwords to anyone with administrative access to the program.…

Men far worse than women on password security
And Brits rubbish at updating software

Women are more password savvy than blokes, according to a new survey.…

Azerbaijani donkey bloggers face seven years' jail
Trumped up charges are a pain in the ass

A pair of Azerbaijani bloggers, who posted a satirical YouTube vid featuring a donkey, face up to seven years' jail on what human rights organisations are calling trumped-up charges.…

Four arrested in China over net-paralysing gaming spat
DDoS kerfuffle between rivals causes web chaos

Chinese police have arrested four gamers who allegedly launched denial of service attacks that disrupted internet communications across the country back in May.…

MS warns of forced Messenger update
More fallout from ATL snafu

Microsoft has outlined plans to push a mandatory Windows Live Messenger upgrade in order to plug a security hole related to a vulnerable code library.…

UK Parliament website hack exposes shoddy passwords
Lights on, no one home

Updated A vulnerability in the website of the UK Parliament appears to be exposing confidential information, including unencrypted login credentials, a Romanian hacker wrote on his blog.…

The power of collaboration within unified communications

Buggy home routers expose O2 customers to hijacking
O2 looking in to it

Updated If you get your internet service from O2, there's a good chance Paul Mutton can remotely log in to your router and make configuration changes that surreptitiously allow him to access computers on your network.…

Spyware ad-on targets Firefox fans
Fake Flash bash

Miscreants have created an item of spyware targeted at Firefox users.…

5 men named in racket that netted $4m in stolen card data
All aboard the Western Express Cybercrime Group

Prosecutors in Manhattan have named five additional men from Eastern Europe in an alleged scheme that pilfered $4m using more than 95,000 stolen credit cards.…

Malware thrown on California bush fires
Scareware burns incautious surfers

California bush fires that have destroyed 50 homes and ten commercial buildings - and claimed the lives of two firefighters - have become the latest lure for malware scams.…

Microsoft says US is top malware target
The United States of infected PCs

Windows users based in the United States are the most likely to benefit from Microsoft's malicious software removal tool, which has removed malware from nearly 2.2 million US machines, more than the other nine top countries combined.…

IIS bug gives attackers complete server control
Linux and Chrome flaws too

A hacker has uncovered a previously unknown bug in Microsoft's Internet Information Services webserver that in some cases gives attackers complete control of vulnerable machines.…

US health-care debate clogged world's inboxes
Pharma-spam cashes in

When the US debates health care reform, the world's inboxes get clogged with health-related spam.…

Mac OS X Malware Analysis

Category: Forensics

Paper Added: September 8, 2009

Possible DDOS on gov.au sites starting tonight? , (Wed, Sep 9th)

The group anonymous, who were reported to be responsible for the attack on scientology sites now hav ...(more)...

Bug Fixes in Sun SDK 5 and Java SE 6, (Tue, Sep 8th)

Sun released 17 bug fixes for JDK 5 Update 21. There are no new security vulnerabilities fixes part ...(more)...

Microsoft September 2009 Black Tuesday Overview, (Tue, Sep 8th)

Overview of the September 2009 Microsoft patches and their status. # ...(more)...

Cisco Security Advisory TCP DoS, (Tue, Sep 8th)

ISC reader Kurt reported that Cisco has released an advisory affecting TCP State Manipulation which ...(more)...

Microsoft Security Advisory 975191 Revised, (Tue, Sep 8th)

We wrote about the new IIS FTP service vulnerabilities when the exploit code became public in diary ...(more)...

Vista/2008/Windows 7 SMB2 BSOD 0Day, (Tue, Sep 8th)

We have received a report from Tyler that a vulnerability affecting Microsoft SMB2 can be remotely c ...(more)...

Anybody recognize these packets?, (Tue, Sep 8th)

Ihave been looking at a packet trace sent in by a reader, and have reached a dead end. He has ...(more)...

Seclists.org is finally back, (Mon, Sep 7th)

The 4 day outage at seclists.org/insecure ...(more)...

Request for packets, (Mon, Sep 7th)

One of our loyal readers, Jon, sent an e-mail this morning that he was seeing some unusual traffic.& ...(more)...

Encrypting Data, (Mon, Sep 7th)

One of the challenges that any security professional is sure to face revolves around encryption and ...(more)...

Critical Infrastructure and dependencies, (Sat, Sep 5th)

Critical infrastructure is a term used by governments to describe assets that are essent ...(more)...

SANS Network Security 2009 @Night Classes, (Sat, Sep 5th)

If you are coming to San Diego in a few days for SANS Network Security 2009, be sure to check out th ...(more)...

SeaMonkey Security Update, (Fri, Sep 4th)

SeaMonkey is an 'all-in-one' Internet suite for users. SeaMonkey 1 ...(more)...

So, you updated your Flash did you?, (Fri, Sep 4th)

Helpfully Snow Leopard downgrades it for you. If you had upgraded to Flash version 10 ...(more)...

Vulnerabilities (plural) in MS IIS FTP Service 5.0, 5.1. 6.0, 7.0, (Fri, Sep 4th)

Microsoft has published an advisory on multiple vulnerabilities in the Microsoft FTP services bundle ...(more)...

Fake anti-virus, (Fri, Sep 4th)

Matt wrote in with the following: It might be a good idea to make end users aware that the fa ...(more)...

RealVNC Remote Auth Bypass?, (Thu, Sep 3rd)

We had an interesting submission from one of our readers today. He thinks there might be a pro ...(more)...

seclists.org Outage, (Thu, Sep 3rd)

It appears that seclists.org is offline ...(more)...

Telstra Outage, (Thu, Sep 3rd)

We had a couple of reports that Telstra (Australia) was down earlier today. Still not sure wha ...(more)...

Incident Response Pre Planning Return On Investment, (Wed, Sep 2nd)

I had an interesting conversation the other day with a good friend regarding the merits of having sp ...(more)...

Happy Birthday, Internet!, (Wed, Sep 2nd)

It all started 40 years ago today, when a couple of computers were connected by a long gray cable in ...(more)...

Gmail Down, (Tue, Sep 1st)

We had several ISC readers reporting that Gmail is down. Gmail will be providing updates here under ...(more)...

Opera 10 with Security Fixes, (Tue, Sep 1st)

Opera 10 for Windows has been released. It provides several new and improved features ...(more)...

Microsoft IIS 5/6 FTP 0Day released, (Mon, Aug 31st)

We are aware of a new 0-day exploit that was posted on Milw0rm today. According the exploit ...(more)...

How do I recover from.....?, (Sun, Aug 30th)

One of our readers, Scott F., yesterday submitted to the ISC that he had been notified in early July ...(more)...

Judge Allows Couple to Sue Bank for Inadequate Data Security (September 2, 2009)

A District Court Judge in Illinois has ruled that an Indiana couple may sue Citizens Financial Bank for negligence.......

TJX Reaches Settlement with Banks Over Breach (September 2 & 3, 2009)

TJX Cos.......

Five Indicted in International Card Fraud Scheme (September 1 & 2, 2009)

Five men have been indicted in connection with the theft of more than US $4 million using nearly 100,000 stolen payment card numbers.......

Microsoft to Issue Five Bulletins on September 8 (September 3, 2009)

Microsoft will release five security bulletins on Tuesday, September 8.......

Snow Leopard Installs Older, Unsecure Version of Flash (September 3, 2009)

Apple's recently released Mac OS X 10.......

UK ISP O2 Acknowledges and Provides Fix for Router Vulnerability (September 3, 2009)

A security flaw in routers provided to customers of UK Internet service provider (ISP) O2 could be exploited to gain access to these devices and make configuration changes that allow attackers access to computers on the network.......

Firefox Will Warn Users Running Out-of-Date Versions of Flash (September 3, 2009)

Firefox 3.......

Missing Navy Hospital Laptop Holds Personally Identifiable Information of 38,000 (September 2, 2009)

A missing US Navy laptop computer contains personally identifiable information of 38,000 individuals.......

Microsoft Acknowledges IIS Vulnerability (Update) (September 1 & 2, 2009)

Microsoft has investigated reports of a security flaw in its Internet Information Services (IIS) web server and has said it will release a fix for the remote code execution vulnerability as soon as it is ready.......

Eircom Will Block Access to The Pirate Bay; UPC Will Not (September 1, 2009)

Irish ISP Eircom has acknowledged that as of September 1, subscriber access to The Pirate Bay website and related IP addresses will be blocked.......

Spyware Aimed at Firefox Users (September 1, 2009)

Malware that purports to be an update for Adobe Flash Player is actually spyware that logs Firefox users' Google queries.......

Judge Denies Bail Reduction for San Francisco City Network Admin (August 31, 2009)

A county judge in California has denied a request to reduce bail for a former network administrator being held on charges of locking users out of a city computer network.......

Revised Legislation Still Gives President Power to Shut Down Portions of the Internet (August 28 & 31, 2009)

Proposed legislation introduced in April gave the President the power to "declare a cybersecurity emergency and order the limitation or shutdown of internet traffic to and from a compromised federal government or critical infrastructure information system or network.......

Facebook Will Strengthen Privacy Practices (August 27 & 28, 2009)

In response to an investigation launched by Canada's Office of the Privacy Commissioner, Facebook has agreed to give users more control about the information they share with third-party applications.......

Phishing Attacks Diminishing (Study) (August 27, 2009)

A report from IBM indicates that phishing attacks appear to be declining.......

Gonzalez Reaches Plea Agreement But Still Faces Additional Charges (August 29, 2009)

Albert Gonzalez has agreed to plead guilty to 19 counts of wire fraud, conspiracy, aggravated identity theft, and money laundering.......

Four Arrested in Connection with Chinese Internet Outage (August 28, 2009)

Police in Foshan, Guangdong Province (China) have arrested four people in connection with a denial-of-service attack that caused Internet outages in parts of the country earlier this year.......

Directives Clarify Some Laptop Border Search Policies (August 27 & 28, 2009)

Two new directives from the US Department of Homeland Security (DHS) regarding laptop border searches do not address the issue of whether laptop owners can be compelled to surrender passwords and encryption keys to allow authorities to examine the devices' contents.......

Proof-of-Concept Code Published for IIS Vulnerability (August 31, 2009)

Proof-of-concept exploit code has been published for a vulnerability in Microsoft's Internet Information Services (IIS) server.......

Microsoft to Push out Mandatory Live Messenger Upgrades (August 31, 2009)

In September, Microsoft plans to push out a mandatory upgrade for certain Windows Live Messenger users to fix a vulnerability in an Active Template Library (ATL).......

Apache.org Offline Due to SSH Remote Administration Key Compromise (August 28, 2009)

The Apache.......

Social Engineering Pen Test Prompts National Warning (August 28, 2009)

A social engineering portion of a sanctioned penetration test of computer systems at an unnamed credit union prompted the National Credit Union Administration (NCUA) to issue a warning to all federally insured credit unions.......

Microsoft repairs Windows media, TCP/IP vulnerabilities

By Robert Westervelt

Microsoft released five critical updates fixing a serious flaw in the Windows Media Format Runtime engine and TCP/IP processing errors that could crash Web and mail servers.

Attackers target Microsoft IIS; new SMB flaw discovered

By Robert Westervelt

New exploit code targets a zero-day flaw in Microsoft Server Message Block, a protocol used by Windows to communicate messages to printers and other devices on a network.

Microsoft five critical updates won't include IIS

By SearchSecurity.com Staff

A patch repairing a critical zero-day flaw in Microsoft's IIS Web server will not be ready in time for Patch Tuesday, the software giant said.

Schneier-Ranum Face-Off: Is Perfect Access Control Possible?

By Bruce Schneier and Marcus Ranum

Security experts Bruce Schneier and Marcus Ranum debate whether perfect access control is possible.

Security threats to virtual environments less theoretical, more practical

By Michael S. Mimoso

The demonstration of a hacking tool at Black Hat that allows attackers to escape from virtual machines to attack their guest OS elevates the seriousness of security threats to virtualization.

Truth, lies and fiction about encryption

By Adrian Lane and Rich Mogull

Encryption solves some very straight-forward problems but implementation isn't always easy. We'll explain some of the common misperceptions so you'll understand your options.

2009 Information Security magazine Readers' Choice Awards

By Information Security magazine, SearchSecurity.com staff

For the fourth consecutive year, Information Security readers voted to determine the best security products. A record 1721 voters participated this year, rating products in 17 different categories.

Microsoft issues IIS FTP advisory, exploit code circulates

By SearchSecurity.com Staff

Exploit code is circulating for the FTP zero-day flaw in Microsoft IIS Web server.

At VMworld 2009, companies focus on virtual desktops for security

By Eric Ogren

While security is not a major theme at VMworld 2009, companies are turning attention to virtual desktop infrastructures to improve security and address remote employees.

Unpatched vulnerability discovered in Microsoft SQL Server

By Michael S. Mimoso

Database security vendor Sentrigo today released some detail about a flaw discovered a year ago in Microsoft SQL Server that exposes passwords stored in memory as cleartext. Microsoft is not planning to patch this flaw. Sentrigo released a free utility that will erase cleartext passwords from memory. Updated to include comments from Microsoft.

Security fundamentals remain focus of virtualization deployments

By Robert Westervelt

Companies are avoiding virtualization security technologies until the market matures and established security vendors address threat mitigation and compliance issues.

Skype Trojan records VoIP communications

By SearchSecurity.com Staff

Called the first wiretap Trojan, Peskyspy, targets Skype conversations by intercepting and recording audio between the Skype application and the victim's audio device. 

VMware Frame Buffer Parameter Heap-Based Buffer Overflow Vulnerability

The VMware movie decoder contains the VMnc media codec that is required to play back movies recorded with VMware Workstation, VMware Player and VMware ACE, in any compatible media player. The movie decoder is installed as part of VMware Workstation, VMware Player and VMware ACE, or can be downloaded as a stand alone package.

yTNEF/Evolution TNEF Attachment Decoder Plugin Multiple Vulnerabilities

Transport Neutral Encapsulation Format (TNEF) is a proprietary e-mail attachment format used by Microsoft Outlook and Microsoft Exchange Server. A plugin for Evolution exists that provides basic support for TNEF encoded e-mails. This plugin uses the ytnef library (libytnef) for processing TNEF messages. It borrows code from the ytnef program, which is a program to work with procmail to decode TNEF streams (winmail.dat attachments). These applications share code and are, because of this, both affected by the issues described in this document. yTNEF & the Evolution TNEF Attachment decoder plugin are affected by several directory traversal and buffer overflow vulnerabilities. The directory traversal vulnerabilities allow attackers to overwrite or create local files with the privileges of the target user. Exploiting the buffer overflow vulnerabilities allows for arbitrary code execution with the privileges of the target user.

Asterisk IAX2 Call Number Resource Exhaustion

The IAX2 protocol uses a call number to associate messages with the call that they belong to. However, the protocol defines the call number field in messages as a fixed size 15 bit field. So, if all call numbers are in use, no additional sessions can be handled.

Dnsmasq Heap Overflow and Null-pointer Dereference on TFTP Server

Dnsmasq is a lightweight DNS forwarder and DHCP server. A vulnerability has been found that may allow an attacker to execute arbitrary code on servers or home routers running dnsmasq[1] with the TFTP service enabled ('--enable-tfp').

OpenOffice.org Word Document Table Parsing Integer Underflow

OpenOffice.org 3 is the leading open-source office software suite for word processing, spreadsheets, presentations, graphics, databases and more. A vulnerability was discovered in OpenOffice.org, which can potentially compromise a user's system.

JSFTemplating Mojarra Scales and GlassFish Application Server File Disclosure Vulnerability

The JSFTemplating FileStreamer functionality is vulnerable to file disclosure and also allows an attacker to retrieve directory listings of the whole server. Furthermore Mojarra Scales and the GlassFish Application Server Admin console are using vulnerable components too.

Microsoft ATL/MFC ActiveX Security Bypass Vulnerability

Microsoft's Component Object Model (COM) was designed to allow interoperability between disjointed software components. Remote exploitation of a logic flaw vulnerability in Microsoft Corp.'s ATL/MFC ActiveX code, as included in various vendors' ActiveX controls, could allow attackers to bypass ActiveX security mechanisms.

Microsoft ATL/MFC ActiveX Information Disclosure Vulnerability

Microsoft's Component Object Model (COM) was designed to allow interoperability between disjointed software components. It is a standardized interface solution to the programming dilemmas involved in object oriented programming, distributed transactions, and inter-language communications. Remote exploitation of an information disclosure vulnerability in Microsoft's ATL/MFC ActiveX template, as included in various vendor's ActiveX controls, allows attackers to read memory contents within Internet Explorer.

Microsoft IIS FTP Server Stack Based Overrun Vulnerability

Microsoft IIS servers that allow anonymous write access to the FTP server are vulnerable to a stack based overrun. IIS5 and to some degree IIS6 are susceptable.

Xerox WorkCentre LPD daemon Denial of Service

The Xerox WorkCentre 7132 multifunction is the affordable transition to the next level of productivity for your office. One easy-to-use device offers powerful printing, copying, scanning, and faxing. During a brief assessment performed for Xerox WorkCentre 7132 it was discovered that LPD daemon implementation contains a weakness related to robustness of LPD protocol handling. Attacker can crash the whole device with a relatively simple attack. Recovering from the denial-of-service condition requires power cycling the device.

ProShow Gold Buffer Overflow Vulnerabilities

ProShow Gold allows you easily create photo and video slide shows on DVD, PC and Web. Vvulnerabilities in the software related to the processing of ProShow Slideshow s project files ( .psh ). This vulnerability permits hackers to execute malicious code on users systems.

Microsoft ATL/MFC ActiveX Type Confusion Vulnerability

Remote exploitation of a type confusion vulnerability in Microsoft Corp.'s ATL/MFC ActiveX code as included in various vendors' ActiveX controls, could allow an attacker to execute arbitrary code within Internet Explorer (IE). Microsoft's Component Object Model (COM) was designed to allow interoperability between disjointed software components. It is a standardized interface solution to the programming dilemmas involved in object oriented programming, distributed transactions, and inter-language communications. Microsoft's Active Template Library (ATL) is a set of C++ templates that simplify developing COM objects.

Subdreamer CMS SQL Injection Vulnerabilities

Subdreamer is a content management system, which is written in PHP and uses MySQL as its database backend. There are vulnerabilities in two integration modules in Subdreamer. Both Invision Power Board 2 and phpBB3 integration modules have this vulnerability.

Oracle Database Server Resource Manager Buffer Overflow

To exploit this vulnerability it is required to have ALTER SYSTEM privilege. Exploitation of this vulnerability allows an attacker to execute arbitrary code. It can also be exploited to cause DoS (Denial of service) killing the Oracle server process.

Microsoft Fixes Critical Windows Vulnerabilities in Patch Tuesday Updates

Microsoft fixes several critical vulnerabilities in Microsoft Windows in September's Patch Tuesday release. All five of the security bulletins are rated critical, including one that addresses a vulnerability in the JavaScript engine that affects several versions of Windows.
- Microsoft released five critical security bulletins Sept. 8 to cover issues in Microsoft Windows that company officials said could allow hackers to remotely execute code. None of the vulnerabilities are known to be under attack at this time. Still, two of the bulletins address vulnerabilities t...

How a Phishing Attack Exposed an Energy Company to Hackers

The Intrepidus Group reveals some details behind a malware attack that exposed critical systems at an energy company. Using a Microsoft zero-day vulnerability and a bit of social engineering, hackers compromised a workstation and threatened critical SCADA systems, the security vendor says.
- It began with an e-mail sent to an employee at an energy company, and ended with a security breach that exposed critical systems to outside control. This is an-all-too common scenario, and just one example of the types of threats targeting not only critical infrastructure but organizations ge...

Microsoft Warns IIS Vulnerability Is Under Attack

Microsoft reports that a zero-day vulnerability in Internet Information Services is now the subject of limited attacks. Exploit code for the IIS vulnerability is known to have been circulating publicly for the past several days.
- Microsoft officials are reporting limited attacks targeting a zero-day vulnerability in the FTP service in Internet Information Services. The IIS vulnerability warning follows the release of new exploit code that can be used to create a DoS (denial of service) condition on Windows XP and Windows...

Microsoft Readies 5 Critical Windows Updates for Patch Tuesday

Microsoft is preparing to release five critical security bulletins Sept. 8 for Patch Tuesday. The five bulletins target vulnerabilities in Microsoft Windows, and do not include a fix for a bug affecting Internet Information Services the company has warned about.
- Microsoft is prepping five critical security bulletins for the Patch Tuesday release Sept. 8. All five are classified as remote code execution vulnerabilities in Microsoft Windows. The bulletins cover various editions of the operating system, ranging from Windows 2000 to Windows Server 2008. T...

Apple Ships Vulnerable Adobe Flash with 'Snow Leopard,' Sophos Reports

Apple is silently downgrading users of Mac OS X 10.6, code-named Snow Leopard, to an old, vulnerable version of Adobe Flash Player. According to Sophos, users who upgrade to Snow Leopard are left with Adobe Flash Player Version 10.0.23.1, which is known to be susceptible to attacks.
- Apple is pushing out an older, vulnerable version of Adobe Flash Player with its quot;Snow Leopard quot; operating system upgrade, according to Sophos. Snow Leopard, aka Mac OS X 10.6, hit the streets Aug. 28 with much fanfare about promised performance improvements. Apple also generat...

Marshal8e6 Renamed M86 Security

Marshal8e6 changes its name to M86 Security as it pushes a Web and messaging security focus. The company announces the change along with plans for two upcoming products that bring together technology from recent mergers and acquisitions.
- Security vendor Marshal8e6 is sporting a new name and a new bag of integrated products bringing its technology together with technology from recently acquired Avinti. The new name M86 Security is meant to reflect the companys focus on Web and messaging security, and is the second name change fo...

Energy Sector in Danger of Cyberattack

A former Department of Homeland Security official is warning that the nations energy grid could be opening itself up to crippling cyberattacks. Greg Garcia, former Assistant Secretary of Cyber Security for Homeland Security, told Ziff-Davis Enterprise in an exclusive video interview that the energy industrys move to embrace so-called smart grid technology could allow hackers to disrupt our critical infrastructure in new and very dangerous ways.

Microsoft Downplays SQL Server Database Vulnerability

Microsoft is disputing the severity of a vulnerability found in its SQL Server database that security researchers say exposes administrative passwords. The vulnerability, uncovered by Sentrigo, can be exploited remotely in SQL Server 2000 and 2005.
- Microsoft is downplaying a SQL Server security flaw that could be exploited by someone with administrative privileges to see users' unencrypted passwords. The vulnerability was discovered last year by database security vendor Sentrigo when one of their researchers noticed that the uniqu...

Virtualization Security in Spotlight During VMworld

With VMworld in full swing, virtualization security is at the tip of some people's tongues. Based on a new paper from RSA and some user surveys, IT pros are advised to keep security high on their list of concerns when it comes to virtualized environments.
- In some ways, the virtualization security market may be in a good news, bad news situation. The good news: More tools are appearing that focus on securing virtual environments. The bad news: Many may not be making their way into the IT infrastructure. A survey by Nemertes Research found that onl...

Microsoft Investigates IIS Zero-Day Security Vulnerability

Microsoft is investigating reports of a vulnerability affecting Microsoft Internet Information Services' FTP module after exploited code surfaced on the Web. The vulnerability could be leveraged by an attacker to execute arbitrary code, officials at US-CERT warn.
- Microsoft officials are investigating reports of a zero-day bug affecting Microsoft Internet Information Services in response to the appearance of exploit code on the Internet. The exploit, which targets a FTP server remote stack overflow, was published Aug. 31 on Milw0rm.com. According to US-C...

Revised Bill Still Gives Obama Unprecedented Cyber-security Powers

After receiving a hailstorm of criticism for his first version of the Cybersecurity Act of 2009, Sen. Jay Rockefeller revises the legislation to encounter even more criticism. In both versions, the controversy rests on the president's ability to shut down private Internet networks in the case of a national emergency.
- Sen. Jay Rockefeller's revised Cybersecurity Act of 2009 is creating as much controversy as his original effort in April did. Both versions give the president unprecedented authority to shut down private Internet networks in the case of a cyber-security emergency. The original draft bill gave ...

Future Firefox to Nag Users on Insecure Plug-ins

In Safety Tips

Mozilla says that the next version of Firefox will warn users if they are running insecure, outdated versions of the Adobe Flash Player, as part of a nascent effort to work with vendors of the most popular browser plug-ins to ensure users aren't falling behind on important security updates. Beginning with Firefox 3.5.3 and Firefox 3.0.14, Mozilla will warn users if their Flash plugin is out-of-date. Mozilla said it is starting with Flash because if its ubiquity, but also in response to recent studies showing as much as 80 percent of users are running old versions of Flash. "Mozilla will work with other plugin vendors to provide similar checks for their products in the future," the company said on its Security Blog. "Keeping your software up to date remains one of the best things you can do to keep yourself safe online, and Mozilla will continue to look for ways

Microsoft Fixes Eight Security Flaws

In New Patches

Microsoft today pushed out software updates to plug at least eight critical security holes in computers powered by its various Windows operating systems. The patches are available through Windows Update or via Automatic Updates. The flaws were addressed in a bundle of five patches, each of which earned Microsoft's most dire "critical" rating, meaning they are serious enough that attackers could break into systems without any help from users. One particularly dangerous flaw covered by this month's patch batch is a problem with the way Windows handles Javascript. While this flaw stems from a faulty component of the Windows operating system, it would most likely be exploitable through Internet Explorer versions 6, 7 and 8, said Wolfgang Kandek, chief technology officer at software security provider Qualys. The flaw resides in every version of Windows except Windows 7. In fact, none of the vulnerabilities patched today affect Windows 7, Kandek said.

More Business Banking Victims Speak Out

In Web Fraud 2.0

Since our story about Eastern European cyber crooks targeting small to mid-sized U.S. businesses ran last week, I've heard from a few more victims. Eerie similarities in their descriptions of how they were robbed suggest the bulk of this crime may be the work of one or two gangs. David Johnston, owner of Sign Designs, Inc., a Modesto, Calif.-based company that makes and installs electric signs, said his company lost nearly $100,000 on July 23, when crooks used the company's credentials to log in to its online banking account and initiate a series of transfers to 17 accomplices at seven banks around the country. "Our daily limit on these transactions was $100,000, and [the thieves] took just $47 short of that amount," Johnston said. "What we're looking at really is the bank robber of 2009. They don't use a gun, they have lots of helpers, their [profits] are huge, and

Apple Updates Java, Backdates Flash

In New Patches

Apple Thursday shipped an update to plug a slew of critical security holes in its version of Java for Leopard systems (OS X 10.5). In other Apple patch news, it appears those who have updated to the latest version of OS X -- 10.6/Snow Leopard -- received an insecure version of the Adobe Flash player. The Java update brings Mac's version of Java to 10.5 Update 5, and fixes at least 16 security flaws in the program. Users can grab the patch through Software Update or directly from Apple Software Downloads. Mac users who have upgraded to Snow Leopard should be aware that the current version of the installation disc comes with an outdated version of Flash -- version 10.0.23.1. Snow Leopard users can upgrade to the latest version -- 10.0.32.18 -- by visiting the Flash Player Download Center.

What To Do When Scareware Strikes

In Safety Tips

Mrs. Krebs and I were enjoying a relaxing, quiet morning last Saturday in our living room -- silently bonding with our respective laptops propped on our knees -- when she nearly jumped off of the sofa, shouting, "Uh oh! It's one of those fake virus things popping up! WhatdoIdo!?!?" It occurred to me as I reached for her computer that most people probably wouldn't know what to do should they stumble across a hacked or malicious site that tries to frighten and corral visitors into downloading and purchasing some rogue anti-virus product (a.k.a. "scareware"). The misleading pop-ups and animations about supposed security and privacy threats are unnerving, to be sure, and can be awfully convincing to the unwary. Typically, they are the result of scripts stitched into legitimate, hacked Web sites, or into banner ads that scam artists stealthily submit to some online ad networks. It is tempting to try

Getting Friended By Koobface

In From the Bunker

You know you've attracted the attention of online troublemakers when they start using their malicious software to taunt you by name. Such is apparently the case with the latest version of Koobface, a worm that spreads on Facebook, Twitter and other Web 2.0 sites and turns infected systems into bots that can be used for a variety of improper and possibly criminal purposes. According to an analysis performed on the malware by researchers from the University of Alabama at Birmingham, the latest version references a domain that begins with an expletive and ends with ...briankrebs.com (if you figure it out please DO NOT visit this Web site, as you could pick up a malicious program). I suppose I should be flattered, as I'm in good company: According to the researchers, this Koobface variant also forces infected systems to call out to another domain that drops an expletive in the middle

Brief: WordPress warns of wayward worm

WordPress warns of wayward worm

Brief: Snow Leopard users suffer Flash back

Snow Leopard users suffer Flash back

Brief: Microsoft warns of IIS flaw

Microsoft warns of IIS flaw

Brief: Judge dismisses everyone-a-hacker case

Judge dismisses everyone-a-hacker case

Brief: Security tools snarl Snow Leopard update

Security tools snarl Snow Leopard update

Extreme Asymmetry in Network Attack and Defense

By Richard Bejtlich

As usual, Gunter Ollmann posted a great story on the Damballa blog titled Want to rent an 80-120k DDoS Botnet? He writes:
[T]his particular operator is offering a botnet of between 80k and 120k hosts capable of launching DDoS attacks of 10-100Gbps – which is more than enough to take out practically any popular site on the Internet. The price for this service? $200 per 24 hours – oh, and there’s a 3 minute try-before-you-buy.
Someone please tell me how much it costs to provision equipment and services sufficient to sustain network operations during a 10-100 Gbps DDoS attack. I bet it is much more than $200 per day. This extreme level of asymmetry demonstrates another reason why intruders have the upper hand in network attack and defense.
Situations like this remind me that an insurance model might work. Insurance works when many contribute but few suffer simultaneous disasters. Perhaps organizations could buy insurance policies to cover losses due to DDoS, rather than provision for the disaster? Or do organizations already do that? I know some work with companies like Prolexic specifically to mitigate DDoS, but how about with insurers?

Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)

Securing Application Execution with Microsoft AppLocker

By (Chris Sanders)

A deep dive into AppLocker, Microsoft's new feature for Windows 7 and Windows Server 2008 R2.

FanCheck Developer Defends App, Says It's Not Malware (PC World)

In technology

PC World - The controversial and popular FanCheck application for Facebook carries no viruses and is completely safe and legitimate, according to its creator.

Sophos: Searches About Fan Check App Can Lead to Malware (PC World)

In technology

PC World - Malicious hackers are setting up malware-infested Web sites that falsely claim to remove a virus from a new Facebook application called Fan Check, security vendor Sophos is warning.

Close to Patch Tuesday, New Flaw Surfaces (PC World)

In technology

PC World - As Microsoft prepares to release patches, researchers said they've seen exploit code for a new flaw that puts organizations using Vista and Windows 7 at great risk.

Symantec Announces Norton 2010, 'Quorum' Tech (PC Magazine)

In technology

PC Magazine - Symantec has announced the new line of Norton 2010 security products, which promise to deliver a revolutionary approach to fighting cyber crime.

Privacy bill would set rules for online marketing (AP)

In technology

AP - Here is a look at some of the things that Rep. Rick Boucher, chairman of the House Energy and Commerce Subcommittee on Communications, Technology and the Internet, hopes to put in a bill governing Internet advertising.

Congress weighs landmark change in Web ad privacy (AP)

In technology

AP - The Web sites we visit, the online links we click, the search queries we conduct, the products we put in virtual shopping carts, the personal details we reveal on social networking pages — all of this can give companies insight into what Internet ads we might be interested in seeing.

Microsoft: Cyber-crooks Exploiting Unpatched IIS Bug (PC World)

In technology

PC World - Microsoft says that cyber-criminals are starting to exploit an unpatched bug in its IIS server software that was made public earlier this week.

Old Flash for Snow Leopard, and Firefox Gets Fake Flash (PC World)

In technology

PC World - Here's a sneaky one for you. According to Sophos, a piece of spyware is masquerading as a Flash player plug-in for Firefox. Its installation screen looks legit (per examples in the Sophos post), and it will even show up thereafter in the list of Firefox extensions as "Adobe Flash Player 0.2."

Virtual Detectives Stalk In-Game Spammers (PC Magazine)

In technology

PC Magazine - Gamers competing against rivals around the globe in online multiplayer games have a new force protecting them—teams of virtual detectives.

Virtual detectives stalk in-game spammers (Reuters)

In technology

Reuters - Gamers competing against rivals around the globe in online multiplayer games have a new force protecting them -- teams of virtual detectives.

Wiretapping Skype calls: virus eavesdrops on VoIP (AP)

In technology

AP - Some computer viruses have a crude but scary ability to spy on people by logging every keystroke they type. Now hackers and potentially law enforcement have another weapon: a virus that can eavesdrop on voice conversations that go over computers instead of a regular phone line.

Five Indicted in Long-running Cybercrime Operation (PC World)

In technology

PC World - New York prosecutors indicted five Eastern European men on Monday in an extensive credit-card fraud operation that netted the defendants at least US$4 million from some 95,000 stolen card numbers.

Instant Messaging Speeds up Data Theft Danger (PC World)

In technology

PC World - One of the more sophisticated pieces of malware in circulation has been given an upgrade that lets cybercriminals act even faster after they've stolen data from a PC.

The Broadband Revolution = Webcam Exhibitionists (PC Magazine)

In technology

PC Magazine - They're everywhere. If we can't make the webcam girls go away, can we at least get them to stop spamming every single Web site?

Unpatched Flaw Could Take Down Microsoft's IIS Server (PC World)

In technology

PC World - A hacker has posted code that could be used to take over a system running Microsoft IIS (Internet Information Services) server.

Making Sense of the Snow Leopard Security Debate (PC World)

In technology

PC World - Snow Leopard is out and users seem generally satisfied with the latest version of the Mac OS X operating system. The release hasn't come without some controversy though, part of which has been the debate over the malware protection features Apple included in Snow Leopard.

Microsoft patches gaping Windows worm holes

By Ryan Naraine on Vulnerability research

Microsoft today released a peck of patches to cover at least seven documented worm holes in the Windows operating system. The most serious of the vulnerabilities addresses could lead to remote code execution complete system takeover attacks.

Firefox to run checks for Adobe Flash patch

By Ryan Naraine on Pen testing

Starting with the upcoming releases of Firefox 3.5.3 and Firefox 3.0.14, Mozilla will warn users if their version of the popular Adobe Flash Player plug-in is out of date

Microsoft FTP in IIS vulnerability now under attack

By Ryan Naraine on Zero-day attacks

Less than a week after the publication of exploit code for a critical vulnerability in the FTP Service in Microsoft Internet Information Services (IIS), attackers are now launching in-the-wild attacks against Windows users.

Scareware goes Green

By Dancho Danchev on Spyware and Adware

Malicious pseudo-environmentalists have come up with a new social engineering tactic aiming to improve the profit margins of their fake antivirus software releases - by promising to donate $2 from every purchase for saving the Amazonian green forests. The new scareware template branded as “Green-AV Premier Edition 3.0” is pitched as the “World’s First Antivirus Which [...]

Patch Tuesday heads-up: Five 'critical' bulletins on tap

By Ryan Naraine on Patch Watch

Microsoft's September batch of security updates will include fixes for a multiple "critical" vulnerabilities affecting the Windows operating system.

Apple plugs 15 Java for Mac security holes

By Ryan Naraine on Patch Watch

Apple today released a new version of Java for Mac to plug a total of 15 documented security vulnerabilities that could lead to remote code execution attacks via rigged Web pages.

Opera browser (finally) gets an auto-updater

By Ryan Naraine on Patch Watch

The Opera Web browser has undergone a minor security makeover with one significant improvement — the ability to update itself when patches are released. The latest browser update will, by default, notify the user about available updates in very much the same way Mozilla Firefox handles automatic patching. From the changelog: Users can specify that snapshot build releases [...]

Snow Leopard ships with vulnerable Flash Player

By Ryan Naraine on Patch Watch

Apple's new operating system comes with an outdated version of Flash Player that exposes Mac users to hacker attacks.

Microsoft confirms IIS zero-day flaw; Exploit code published

By Ryan Naraine on Windows Vista

Microsoft late Tuesday confirmed the publication of exploit code for a serious code execution vulnerability in the FTP Service in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0.

Firefox add-on spies on Google usage, search results

By Ryan Naraine on Patch Watch

Security researchers have intercepted a fake Flash Player update creating a Firefox add-on that spies on a target user's Google search results.

Microsoft to push 'mandatory' Live Messenger security patch

By Ryan Naraine on Windows Vista

Microsoft plans to force a mandatory Windows Live Messenger upgrade later this month to fix a security vulnerability that exposes Windows users to remote code execution attacks.

No comments:

Post a Comment

My Blog List