Friday, September 18, 2009

Around The Horn vol.1,151

Chrome adds defence for cross-site scripting attacks, already busted

By Robert A. on XSS

"The 4.0.207.0 release uses a reflective XSS filter that checks each script before it executes to check if the script appears in the request that generated the page. Should it find a match, the script will be blocked. According to Chromium developer Adam Barth, the developers plan to post an academic...

WASC Distributed Open Proxy Honeypot Shows Brute Force Attacks Against Yahoo

By Robert A. on WASC

Fellow WASC officer Ryan Barnett has published findings pertaining to a distributed brute force attack against Yahoo's login pages as part of his findings for the WASC Distributed Open Proxy Honeypot Project . For those not aware of this project, Ryan leads an initiative where people run open relay proxies and...

CNET News - Security

Study: eBay, Yahoo among most trusted companies

By Elinor Mills

eBay is the most trusted company in terms of privacy, and Yahoo and Facebook are among the Top 10, according to a new report released on Wednesday.

Following eBay is Verizon, the U.S. Postal Service, WebMD, IBM, Procter & Gamble, Nationwide and Intuit, with Yahoo and Facebook in the ninth ...

Originally posted at InSecurity Complex

Norton 2010 in pictures

By Seth Rosenblatt

Norton Internet Security 2010

Symantec is betting heavily that program behavior is the future battlefront of security and is making a big push in its 2010 security program lineup with a behavioral engine called Quorum. Take a tour of Norton Internet Security 2010 in this slideshow, and keep in mind that the look is ...

Originally posted at The Download Blog

New scam adds live chat to phishing attack

By Elinor Mills

Updated 4 p.m. PDT throughout with minor additional details.

Online scammers have created a phishing site masquerading as a U.S.-based bank that launches a live chat window where victims are tricked into revealing more information, researchers at the RSA FraudAction Research Team said on Wednesday.

After a ...

Originally posted at InSecurity Complex

Web 2.0 security risks scrutinized

By Vivian Yeo

Web 2.0 sites that enable people to create content are increasingly used to carry out a wide range of attacks, according to a new security study.

Websense's State of Internet Security" (PDF), released Tuesday, notes that attackers are focusing their attention on interactive Web 2.0 elements. Some ...

Apple explains iPhone OS 3.1 Exchange changes

By Jim Dalrymple

iPhone and iPhone 3G users hit a roadblock last week trying to login to Exchange 2007 servers after upgrading to iPhone OS 3.1.

(Credit: Apple)

Because the problems began with the latest update, it may seem reasonable to assume that the update is to blame, but it's not. ...

Originally posted at News - Apple

Ads--the new malware delivery format

By Elinor Mills

Instead of hacking into major online sites to embed malware, malicious hackers are going in through the front door by exploiting security holes in systems for delivering ads.

It happened just days ago, for instance, to the Web site of The New York Times. The newspaper company informed readers on Sunday ...

Originally posted at InSecurity Complex

Cyberdefenses are misdirected, report says

By Manek Dubash

Organizations are finding it difficult to prioritize defense strategies against cyberattacks because most of them do not have an Internet-wide view of the attacks, according to a report from SANS Institute, the security training organization.

As a result, two security risks--Web applications and phishing--carry the greatest potential for damage, even ...

Rogue ad hits New York Times site

By Steven Musil

Updated at 5:50 p.m. PDT September 14 with explanation from The New York Times.

The New York Times' Web site is grappling with problems created by an "unauthorized advertisement," but it is unknown how the ads managed to appear on the site and whether the site had been ...

Hacker pleads guilty to ID thefts netting millions

By Elinor Mills

Albert Gonzalez

Albert Gonzalez

(Credit: U.S. Secret Service via Wikipedia)

A 28-year-old Miami man who made millions breaking into computer networks and stealing credit card numbers pleaded guilty on Friday and agreed to forfeit more than $2.7 million in restitution, as well as a condo, jewelry, and a car.

Albert ...

Originally posted at InSecurity Complex

CounterMeasures

Rik Ferguson blogs about security issues.

New York Times pushes Fake AV malvertisement.

By Rik Ferguson on web

Earlier today, the New York Times issued a warning over Twitter and also on the front page of the web site. The newspaper advised visitors that they had had reports from “some NYTimes.com readers” relating to a malicious pop-up window while browsing the site.   In the warning, the influential newspaper stated their belief that the pop-ups [...]

Darknet%20-%20Hacking,%20Cracking%20%26%20Computer%20Security

Darknet - The Darkside

Ethical Hacking, Penetration Testing & Computer Security

Flawfinder – Source Code Auditing Tool

By Darknet on static analysis tool

Flawfinder is a program that examines source code and reports possible security weaknesses (flaws) sorted by risk level. It’s very useful for quickly finding and removing at least some potential security problems before a program is widely released to the public. It’s a static analysis source code auditing tool. Flawfinder is specifically designed to be easy [...]

FreeBSD Local Root Escalation Vulnerability

By Darknet on vulnerabilities

It’s been a long time since we’ve heard about a problem with FreeBSD, partially because the mass of people using it isn’t that large and secondly because BSD tends to be pretty secure as operating systems go. It’s a pretty serious flaw this time with root escalation, thankfully it’s only a local exploit though and not [...]

4f: The File Format Fuzzing Framework

By Darknet on fuzzing-tool

4f is a file format fuzzing framework. 4f uses modules which are specifications of the targeted binary or text file format that tell it how to fuzz the target application. If 4f detects a crash, it will log crucial information important for allowing the 4f user to reproduce the problem and also debugging information important [...]

DarkReading - All Stories

DarkReading

Microsoft Gives Away Free Fuzzer, Secure Development Tool

More Security Development Lifecycle tools, ROI paper released

Defense Worker Arrested After Accessing Unauthorized Data

Defense employee charged with unauthorized access of terrorist system operated by Army, FBI

SANS Report: 60% Of All Attacks Hit Web Applications, Most In The U.S.

New attack data shows organizations are missing the mark in their security priorities as client-side application flaws, Web flaws dominate as attack vectors

DNS Cloud Security Services Arrive

OpenDNS offers new subscription-based secure DNS service, other vendors' DNS services to follow

Hacker Hits RBS WorldPay Systems Database

Romanian hacker says he discovered a SQL injection flaw on a WorldPay application, RBS says no merchant or cardholder data was compromised

DarkReading - Security News

DarkReading

Compound Profit Launches Revolutionary C-Media Mail Digital Marketing Engine

Prundo.com, a New Website, Helps Car Owners Save Money on Auto Repairs

eWeek Security Watch

Database Security Truths: Orgs Still Struggling to Herd Info

In Trojan attacks

Database security experts maintain that companies are still struggling mightily to understand where all of their critical data resides, and who has access to it.

SANS: Un-Patched Client Side Apps Taking Toll

In Vulnerability Research

Client side vulnerabilities are leaving many organizations open to targeted spear phishing and other attacks, according to experts with SANS.

Google Groups Gamed by Trojan

In Virus and Spyware

Attackers are using Google Groups to test new a new variation of Web 2.0 Trojan control.

Microsoft Backports Windows 7 Security Change to XP, Vista

In Virus and Spyware

Microsoft has backported changes it made to its AutoRun and AutoPlay functionality in Windows 7 to other versions of the operating system, including Windows Vista, Windows XP and Windows Server 2003 and 2008.

NYTimes.com Users Hit by Malicious Ad

In Phishing and Fraud

Some online readers of the New York Times were served a malicious advertisement over the weekend that tried to trick them into downloading bogus anti-virus software. The use of malicious ads on legitimate sites is just another tactic attackers are using to get their hands on your computers and your money.

Apple Fixes Adobe Flash Player Issue in Snow Leopard Upgrade

In Vulnerability Research

A week after security researchers raised concerns, Apple has updated Snow Leopard and stopped downgrading users to a vulnerable version of Adobe Flash Player. Apple also issued a massive update for older versions of the operating system this week.

Federal Computer Week: Security News

IG: DHS needs better management for OneNet

DHS needs better management for its project to consolidate its agencies' network infrastructures, the department's inspector general found.

Intell agencies plan to beef up cybersecurity

Stopping cyber threats is a top priority for intelligence agencies during the next four years, according to a new national strategy.

Kundra's great experiment: Government apps 'store front' opens for business

An online storefront where federal agencies can purchase cloud computing technology was launched today.

Video of Serena Williams' outburst could go viral—literally

The people who create vehicles for the surreptitious delivery of malware are nothing if not timely, as they demonstrated over the weekend by exploiting interest in tennis star Serena Williams.

Pressure builds on Obama to appoint cybersecurity coordinator

The co-chairmen of the House Cybersecurity Caucus say the continued absence of a White House cybersecurity coordinator impedes agencies' abilities to update their cyber policies.

Immigration agency to outsource disaster recovery plans

The Office of the CIO for U.S. Immigration and Customs Enforcement is looking for a contractor that can take over disaster recovery planning and management.

Report: ICE needs better database to track detainees

The DHS agency needs better information systems and database to track its 32,000 detainees and ensure good management, a report recommends.

Pointers: Recommended reading

Lessons learned from data breaches; Password hackers on the loose; the Internet and civic engagement; and Twitter guidelines.

NARA digs out of digital avalanche

The National Archives is under mounting pressure to help the federal government manage its rapidly growing store of electronic records.

NARA's top 10 management challenges

The Office of Inspector General recently listed what it considers the most significant challenges facing the agency.

NRC, FERC to cooperate on cybersecurity for nuke plants

Regulatory commissions will coordinate to protect nuclear power facilities.

Info Security News (isn) Mailing List

Carries news items (generally from mainstream sources) that relate to security.

IRS nearly resolves one security threat, receives incomplete on others

Posted by InfoSec News on Sep 17

http://www.nextgov.com/nextgov/ng_20090915_8372.php

By Jill R. Aitoro
NextGov.com
09/15/2009

The Internal Revenue Service showed mixed results in its effort to reduce security risks associated with laptops and a system that processes individual income tax returns, according to the...

Breaking in New Sport, Dutch Sweat Small Stuff

Posted by InfoSec News on Sep 17

http://www.nytimes.com/2009/09/16/world/europe/16amsterdam.html

By John Tagliabue
New York Times
September 15, 2009

AMSTERDAM -- People of this free-spirited Dutch city, known for its legal prostitution and easy marijuana, have found another pastime that flirts with convention and the...

Peiter Zatko for CyberSecurity Czar

Posted by InfoSec News on Sep 17

http://www.ipetitions.com/petition/mudge4cyberczar/

This petition is posted in support for the nomination of Peiter Zatko (aka mudge) to the President's post of Cybersecurity Chief. We've all seen how effective past efforts have been regarding this initiative, and realize the importance of...

Financial Crypto and Data Security 2010: Deadline Extended to September 23.

Posted by InfoSec News on Sep 17

Forwarded from: Radu Sion <sion (at) moon.crypto.cs.stonybrook.edu>

Dear Colleagues,

As requested by many of you, we are extending the main FC submission deadline to September 23, 11:59pm, pacific time. Please note that also the acceptance notification deadline is now extended to...

Safety first for IT executives in China

Posted by InfoSec News on Sep 17

http://www.crn.com.au/News/155836,safety-first-for-it-executives-in-china.aspx

By Sholto Macpherson
CRN.com.au
Sept 16, 2009

Senior executives in US IT companies have been advised by the US Government to follow extremely strict policies for visits to China which extend far beyond...

Health IT Data Breaches: No Harm, No Foul

Posted by InfoSec News on Sep 17

http://www.eweek.com/c/a/Health-Care-IT/Health-IT-Data-Breaches-No-Harm-No-Foul-293398/

By Roy Mark
eWEEK.com
2009-09-16

Data breach notification rules for health entities covered by the Health Insurance Portability and Accountability Act take effect Sept. 23. Under the rules issued by...

Microsoft Gives Away Free Fuzzer, Secure Development Tool

Posted by InfoSec News on Sep 17

http://www.darkreading.com/security/app-security/showArticle.jhtml?articleID=220000750

By Kelly Jackson Higgins
DarkReading
Sept 16, 2009

Microsoft continued efforts to spread its own secure software development program with today's release of a free fuzzer and tool for analyzing binary...

Computer network experts test security at conference

Posted by InfoSec News on Sep 16

http://www.greatfallstribune.com/article/20090915/NEWS01/909150313

By John S. Adams
Tribune Capitol Bureau
September 15, 2009

HELENA - Brad Smith, director of the Helena-based Computer Institute of the Rockies, says there's a global war going on every day, though most of us are...

USENIX LEET 10 Call for Papers Submissions Deadline Approaching

Posted by InfoSec News on Sep 16

Forwarded from: Lionel Garth Jones <lgj (at) usenix.org>

The Program Committee for the 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '10) invites you to contribute to your work.

Now in its third year, LEET continues to provide a unique forum for the...

UF has security breach involving safety program

Posted by InfoSec News on Sep 16

http://www.gainesville.com/article/20090914/ARTICLES/909149900/-1/ENTERTAINMENT?Title=UF-has-security-breach-involving-safety-program-

By Nathan Crabbe
The Chalkboard Blog
September 14, 2009

The University of Florida announced a security breach Monday involving information from the...

Intell agencies plan to beef up cybersecurity

Posted by InfoSec News on Sep 16

http://fcw.com/articles/2009/09/15/web-nis-cybersecurity.aspx

By Ben Bain
FCW.com
Sept 15, 2009

Enhancing cybersecurity is a mission objective for intelligence agencies during the next four years, according to an unclassified version of the 2009 National Intelligence Strategy released...

IB calls for block of VoIP services citing security concerns

Posted by InfoSec News on Sep 16

http://www.telegeography.com/cu/article.php?article_id=30092&email=html

TeleGeography's CommsUpdate
15 September 2009

India's Intelligence Bureau (IB) has reportedly called on the Ministry of Communications and Information Technology to block all internet telephony services in and out...

Security Pros Are Focused on the Wrong Threats

Posted by InfoSec News on Sep 16

http://bits.blogs.nytimes.com/2009/09/15/security-pros-are-focused-on-the-wrong-threats/

By Riva Richmond
Bits
New York Times
September 15, 2009

Corporate information technology departments are prioritizing the wrong threats to their computer systems, focusing on old problems and leaving...

The other iPhone lie: VPN policy support

Posted by InfoSec News on Sep 16

http://www.infoworld.com/d/mobilize/other-iphone-lie-vpn-policy-support-865

By Galen Gruman
InfoWorld
September 15, 2009

It turns out that Apple's iPhone 3.1 OS fix of a serious security issue -- falsely reporting to Exchange servers that pre-3G S iPhones and iPod Touches had on-device...

Heartland CEO: Credit card encryption needed

Posted by InfoSec News on Sep 15

http://www.networkworld.com/news/2009/091409-heartland-ceo-credit-card-encryption.html

By Grant Gross
IDG News Service
09/14/2009

Credit card transactions in the U.S. are often not encrypted, and credit card vendors, payment processors and retailers need to embrace an encryption...

Homeland Security to More Than Double Staff for Cyber Threats

Posted by InfoSec News on Sep 15

http://www.bloomberg.com/apps/news?pid=20601087&sid=ayDCHq5H0CH8

By Jeff Bliss
Bloomberg
Sept. 14, 2009

The Department of Homeland Security plans by next year to more than double the number of employees in one of its cyber-security units, a department official said today.

The...

Join USENIX in Baltimore, MD, November 1-6, 2009, for LISA 09!

Posted by InfoSec News on Sep 15

Join us in Baltimore, MD, November 1-6, 2009, for LISA '09.

At LISA '09, "Put Theory into Practice." Find all the practical information you'll need to succeed during our 6-day program, which includes: in-depth tutorials by experts such as Mark Burgess, David N. Blank-Edelman, and...

DHS to review report on vulnerability in West Coast power grid

Posted by InfoSec News on Sep 15

http://www.computerworld.com/s/article/9138017/DHS_to_review_report_on_vulnerability_in_West_Coast_power_grid?taxonomyId=17

By Jaikumar Vijayan
September 14, 2009
Computerworld

The U.S. Department of Homeland Security is looking at a report by a research scientist in China that shows how...

Pressure builds on Obama to appoint cybersecurity coordinator

Posted by InfoSec News on Sep 15

http://fcw.com/articles/2009/09/14/web-cyber-coordinator-urged.aspx

By Ben Bain
FCW.com
Sept 14, 2009

The co-chairmen of the House Cybersecurity Caucus are urging President Barack Obama to quickly make good on his pledge to appoint a cybersecurity coordinator.

Reps. James Langevin...

Samsung Prepares for Next Possible Cyberattack

Posted by InfoSec News on Sep 15

http://www.koreaittimes.com/story/5025/samsung-prepares-next-possible-cyberattack

By Daniel Ko
Korea IT Times
September 14th, 2009

After the July 7th DDoS attack, Samsung plans to create a defense against the next possible cyberattack. Planning to spend whatever it takes, Samsung is...

DNS Cloud Security Services Arrive

Posted by InfoSec News on Sep 15

http://www.darkreading.com/securityservices/security/vulnerabilities/showArticle.jhtml?articleID=220000275

By Kelly Jackson Higgins
DarkReading
Sept 14, 2009

One of the first cloud-based secure DNS services was launched today amid intensified concerns over locking down vulnerable Domain...

Korea to train 3,000 cyber sheriffs

Posted by InfoSec News on Sep 14

http://www.koreaherald.co.kr/NEWKHSITE/data/html_dir/2009/09/14/200909140072.asp

By Cho Chung-un
The Korea Herald
September 14, 2009

The government will train 3,000 "cyber sheriffs" by next year to protect the country from future cyber attacks, officials said yesterday.

Cyber...

Rogue ad hits New York Times site

Posted by InfoSec News on Sep 14

http://news.cnet.com/8301-1009_3-10351460-83.html

By Steven Musil
Security
CNet News
September 13, 2009

The New York Times Web site is grappling with problems created by "an unauthorized advertisement," but it is unknown how the ads appeared on the site and whether the Web...

Hacker Pleads Guilty In Major Credit Card Theft

Posted by InfoSec News on Sep 14

http://www.informationweek.com/news/security/intrusion-prevention/showArticle.jhtml?articleID=220000036

By Antone Gonsalves
InformationWeek
September 12, 2009

A hacker accused of stealing tens of millions of credit and debit card numbers in one of the largest computer break-ins in U.S....

Hacker Hits RBS WorldPay Systems Database

Posted by InfoSec News on Sep 14

http://www.darkreading.com/database_security/security/app-security/showArticle.jhtml?articleID=220000005

By Kelly Jackson Higgins
DarkReading
Sept 11, 2009

A Romanian hacker well-known for discovering SQL injection vulnerabilities in high-profile Websites has struck again -- this time on...

Linux webserver botnet pushes malware

Posted by InfoSec News on Sep 14

http://www.theregister.co.uk/2009/09/12/linux_zombies_push_malware/

By Dan Goodin in San Francisco
The Register
12th September 2009

A security researcher has discovered a cluster of infected Linux servers that have been corralled into a special ops botnet of sorts and used to distribute...

Ex-emergency dispatch agency director given 6 months jail for illegal background checks

Posted by InfoSec News on Sep 14

http://www.suntimes.com/news/24-7/1764493,illegal-background-checks-sentence-091109.article

BY DAN ROZEK
Staff Reporter
Chicago Sun-Times
September 10, 2009

Steven R. Cordes wanted to help his girlfriend keep tabs on who her teenage daughter was dating and hanging out with.

So...

Linux Advisory Watch - September 11th 2009

Posted by InfoSec News on Sep 14

+----------------------------------------------------------------------+ | LinuxSecurity.com Weekly Newsletter | | September 11th, 2009 Volume 10, Number 37 | | | |...

Non-Profit Targets Cyber-Security in Plants

Posted by InfoSec News on Sep 14

http://www.managingautomation.com/maonline/news/read/NonProfit_Targets_CyberSecurity_in_Plants_33037

By Stephanie Neil
MA Editorial Staff
September 12, 2009

The move from proprietary, non-networked control systems in the plant to off-the-shelf, open applications that share information...

Les Hinton to give evidence to Commons phone-hacking inquiry

Posted by InfoSec News on Sep 11

http://www.guardian.co.uk/media/2009/sep/10/les-hinton-phone-hacking

By Leigh Holmwood
guardian.co.uk
10 September 2009

The Commons culture, media and sport select committee has confirmed that former News International executive chairman Les Hinton will give evidence to its inquiry into...

Related Searches
on Ask.com

Les Hinton

Aural Messes: Lindsay Lohans Voicemail Life

Posted by InfoSec News on Sep 11

http://animalnewyork.com/2009/09/aural-messes-lindsay-lohans-voicemail-life/

By Bucky Turco
animalnewyork.com
September 10, 2009

In the spring of 2008, LiLo made the unfortunate decision to post her private information -- including her cellphone number- ac on Facebook which was soon...

Related Searches
on Ask.com

Lindsay Lohans

Apple unloads 47 fixes for iPhones, Macs and QuickTime

Posted by InfoSec News on Sep 11

http://www.theregister.co.uk/2009/09/11/apple_security_updates/

By Dan Goodin
The Register
11th September 2009

Apple has issued fixes for more than 47 security bugs in the Mac, iPhone and QuickTime media player, some that allowed attackers to take complete control of the underlying...

Related Searches
on Ask.com

QuickTime media player

Lax security left employees data vulnerable

Posted by InfoSec News on Sep 11

http://www.ajc.com/news/lax-security-left-employees-134909.html

By Aaron Gould Sheinin
The Atlanta Journal-Constitution
September 9, 2009

An audit of state government's accounting office found lax computer security that left thousands of state employees' personal information vulnerable...

Related Searches
on Ask.com

Atlanta Journal-Constitution

Printer makers mum on new security standard

Posted by InfoSec News on Sep 11

http://www.zdnetasia.com/news/security/0,39044215,62057613,00.htm

By Vivian Yeo
ZDNet Asia
September 09, 2009

New security guidelines that govern the features and use of devices such as printers, copiers and multifunction systems are available, but details about hardware compliant to...

NES to improve data safety

Posted by InfoSec News on Sep 11

http://news.scotsman.com/education/NES-to-improve-data-safety.5629254.jp

By LYNDSAY MOSS
The Scotsman
09 September 2009

NHS Education for Scotland (NES) has agreed to improve data security after the details of trainee doctors were left on a stolen laptop. The body informed the...

Related Searches
on Ask.com

Scotsman

Secunia Weekly Summary - Issue: 2009-37

Posted by InfoSec News on Sep 11

The Secunia Weekly Advisory Summary 2009-09-03 - 2009-09-10 This week: 73 advisories
========================================================================
...

How to measure security? NIST maps out the emerging field of IT metrology

Posted by InfoSec News on Sep 11

http://gcn.com/articles/2009/09/14/update-1-security-metrics-lacking-for-it-systems.aspx

By William Jackson
GCN.com
Sept. 10, 2009

Information technology security is a hot topic, but attention usually focuses on the lack of it. What is missing is an objective, quantifiable way to...

Related Searches
on Ask.com

William Jackson

Information technology security

InformationWeek Security News

InformationWeek

Consumers Accept Device Fingerprinting, Study Finds

By Thomas Claburn

To fight online fraud, consumers are warming to the idea of technology that identifies the device they're using.

Google Plans Private Government Cloud

By Thomas Claburn

As the government moves to adopt cloud computing and considers limited use of free consumer services, Google is trying to address lingering concerns about security and control in the cloud.

Google Plans Private Government Cloud

By Thomas Claburn

As the government moves to adopt cloud computing and considers limited use of free consumer services, Google is trying to address lingering concerns about security and control in the cloud.

Google Tops Bing, Yahoo In Bug Battle

By Thomas Claburn

A group of 1,100 software testers has rated Google the best search engine in terms of accuracy, speed, and relevance.

Google Tops Bing, Yahoo In Bug Battle

By Thomas Claburn

A group of 1,100 software testers has rated Google the best search engine in terms of accuracy, speed, and relevance.

Google Chrome Update Adds Speed, Themes, HTML 5

By Thomas Claburn

Browser Themes, faster JavaScript performance, and HTML 5 support can be found in the new stable release of Google Chrome.

Good Technology Adds Android Support

By Marin Perez

The company will also offer iPhone and Pre support to help companies whose employees use personal devices to access enterprise networks.

Good Technology Adds Android Support

By Marin Perez

The company will also offer iPhone and Pre support to help companies whose employees use personal devices to access enterprise networks.

IW500: Amazon CTO On Software Licensing, Cloud Security

By Mary Hayes Weier

Werner Vogels says EC2 customers should talk with software vendors about licensing -- something Amazon itself is already doing.

Government Embraces Cloud Computing, Launches App Store

By Thomas Claburn

Cloud computing is coming to government agencies, bringing the hope of cost savings, greater efficiency, and innovation.

IW500: Security Threats Pose New Challenges

By Mitch Wagner

New technologies such as cloud computing make security a challenge for enterprises, according to panelists at the <I>InformationWeek</i> 500 Conference.

IW500: Security Threats Pose New Challenges

By Mitch Wagner

New technologies such as cloud computing make security a challenge for enterprises, according to panelists at the <I>InformationWeek</i> 500 Conference.

Top Cyber Security Risks Revealed

By Thomas Claburn

A report issued by The SANS Institute finds enterprise security efforts focused on fixing low-priority flaws at the expense of serious application vulnerabilities.

Top Cyber Security Risks Revealed

By Thomas Claburn

A report issued by The SANS Institute finds enterprise security efforts focused on fixing low-priority flaws at the expense of serious application vulnerabilities.

InformationWeek 500: 20 Great Ideas To Steal

InformationWeek 500 innovators reveal some of their top projects. Could something similar work at your company? Let the brainstorming begin.

InformationWeek 500: 20 Great Ideas To Steal

InformationWeek 500 innovators reveal some of their top projects. Could something similar work at your company? Let the brainstorming begin.

Hacker Pleads Guilty In Major Credit Card Theft

By Antone Gonsalves

As part of his plea agreement, the 28-year-old agreed to forfeit more than $2.7 million and a Miami condo, 2006 BMW 30i, Tiffany diamond ring, and Rolex watches.

Hacker Pleads Guilty In Major Identify Theft

By Antone Gonsalves

As part of his plea agreement, the 28-year-old agreed to forfeit more than $2.7 million and a Miami condo, 2006 BMW 30i, Tiffany diamond ring, and Rolex watches.

Hacker Pleads Guilty In Major Identify Theft

By Antone Gonsalves

As part of his plea agreement, the 28-year-old agreed to forfeit more than $2.7 million and a Miami condo, 2006 BMW 30i, Tiffany diamond ring, and Rolex watches.

Popular News Topics Become Malware Bait

By Thomas Claburn

Curiosity about current events is being leveraged to spread malware.

Popular News Topics Become Malware Bait

By Thomas Claburn

Curiosity about current events is being leveraged to spread malware.

Google Groups Used To Direct Trojan Malware

By Thomas Claburn

Malicious software has been found looking to Google Groups for instructions on how to behave badly.

Gov 2.0: Roadblocks Remain For Transparency

By J. Nicholas Hoover

Speaking at the Gov 2.0 Summit, federal CIO Vivek Kundra said infrastructure upgrades will likely be required.

InSecurity Complex

Keeping tabs on flaws, fixes, and the people behind them.

Study: eBay, Yahoo among most trusted companies

By Elinor Mills

eBay is the most trusted company in terms of privacy, and Yahoo and Facebook are among the Top 10, according to a new report released on Wednesday.

Following eBay is Verizon, the U.S. Postal Service, WebMD, IBM, Procter & Gamble, Nationwide and Intuit, with Yahoo and Facebook in the ninth ...

New scam adds live chat to phishing attack

By Elinor Mills

Updated 4 p.m. PDT throughout with minor additional details.

Online scammers have created a phishing site masquerading as a U.S.-based bank that launches a live chat window where victims are tricked into revealing more information, researchers at the RSA FraudAction Research Team said on Wednesday.

After a ...

Ads--the new malware delivery format

By Elinor Mills

Instead of hacking into major online sites to embed malware, malicious hackers are going in through the front door by exploiting security holes in systems for delivering ads.

It happened just days ago, for instance, to the Web site of The New York Times. The newspaper company informed readers on Sunday ...

Hacker pleads guilty to ID thefts netting millions

By Elinor Mills

Albert Gonzalez

Albert Gonzalez

(Credit: U.S. Secret Service via Wikipedia)

A 28-year-old Miami man who made millions breaking into computer networks and stealing credit card numbers pleaded guilty on Friday and agreed to forfeit more than $2.7 million in restitution, as well as a condo, jewelry, and a car.

Albert ...

McAfee Avert Labs

Cutting edge security research as it happens.......

FakeAlert Malware Disguises as McAfee Product

By Abhishek Karnik on Uncategorized

“Illusion is needed to disguise the emptiness within.” – Arthur Erickson I thought this was the perfect quote for fake anti-malware software or FakeAlert threats. FakeAlert malware imposes an illusion of protection on its users, but all thats within is an empty hollow inside. It has become a common sight for malware to be spoofing program [...]

Searches for Patrick Swayze Info Could Lead to Malware

By Sam Masiello on Web and Internet Safety

Another celebrity death.  Another recycled scareware tactic attempting to lure users to download malware by telling them that their PC is infected with a virus.  We saw it after the deaths of Michael Jackson, Farrah Fawcett, and Natasha Richardson earlier this year.  Now the attention of cyber criminals has turned to Monday’s death of Patrick [...]

From Targeted PDF Attack to Backdoor in Five Stages

By Dennis Elser on Vulnerability Research

As reported by Adobe in July, a Flash vulnerability is being actively exploited by targeted attacks against Adobe Reader. Yes, embedding Flash movies in PDF documents is supported in Adobe Acrobat 9. The idea of allowing Flash movies to be displayed within PDFs isn’t bad if you like your documents spiced up with a bit [...]

Google Trends Suffering Abuse Today

By Craig Schmugar on Web and Internet Safety

Wouldn’t you know it. Just the other day I blogged about rogue anti-virus software makers selectively targeting certain hot search terms. Since then the majority of top terms lead to poisoned links within the top 10-20 search results. Recently there have been some news stories about attackers targeting specific topics or terms, but from what I’m seeing they [...]

New Version of McAfee FileInsight

By Micha Pekrul on Web and Internet Safety

Today we released the new version 2.1 of McAfee FileInsight. You can download your free copy from the Avert Tools site. FileInsight is a handy integrated tool environment for web site and file analysis. Hex editing, syntax highlighting, and it comes with several built-in decoders, built-in calculator, a disassembler, JavaScript scripting support, a Python-based plugin [...]
Related Searches
on Ask.com

Version of McAfee FileInsight

McAfee Gateway Anti-Malware

McAfee Virus Scan

ActiveX Control

DirectShow Video

Related Searches on Ask.com: Version of McAfee FileInsight , McAfee Gateway Anti-Malware , McAfee Virus Scan , ActiveX Control , DirectShow Video

Network World on Security

The latest security news, analysis, reviews and feature articles from NetworkWorld.com.

New phishing attack chats up victims

With many who bank online now wary of phishing attacks, criminals are adding fake live-chat support windows to their Web sites to make them seem more real.

Google buys reCAPTCHA to boost book scanning efforts

Google plans to accelerate its massive efforts to scan tens of millions of books and periodicals with the acquisition on Wednesday of a company called reCAPTCHA.

Social Networking a Tool for More Secure ID Management?

At Digital ID World 2009, a Facebook platform engineer says social networking sites can be used to actually improve identity and access management. Why wasn't he laughed off stage by the skeptical security crowd before him? Read on.

Attack E-mails Use Fake Shipping Confirmation Ruse

A triple-payload e-mail attack that uses a fake shipping confirmation notice with a supposed attached label is making the rounds, according to Webroot.

SANS: Security Ignores the Two Biggest Cyber Risks

Two major cyber risks dwarf all others, but organizations are failing to invest in the proper tools to mitigate them, choosing instead to focus security attention on lower risk areas, according to a report released Tuesday by SANS Institute.

Microsoft offers tools for secure app development

The tools help developers add security and privacy provisions into the development lifecycle, but their enterprise usefulness is unclear as they are only for C and C++

Unpatched Applications Are Top Cyber Security Risk

Unpatched client software and vulnerable Internet-facing web sites are the most serious cyber security risks for business. Lesser threats include operating system holes and a rising number of zero-day vulnerabilities, according to a new study.

Phishing attacks go down by 45 percent: Symantec

Symantec observed a 45 per cent decrease from the previous month in all phishing attacks, according to its September State of Phishing report.

The IA Professional's Toolkit Part 4

A common comment from engineering and technical personnel is that if we can't measure something, we can't manage it effectively.

The other iPhone lie: VPN policy support

The iPhone OS 3.1 fixed false reporting about Exchange policy adherence. It turns out that a similar flaw existed for VPN policies, too

Technology issues on back burner in US Congress

With a huge fight over health-care reform unresolved, many observers of technology-related legislation before the U.S. Congress have low expectations that major bills will be passed in the remainder of 2009.

Data Debauchery That Happens in Vegas Doesn't Stay There

Digital ID World 2009: Organizations collect as much data as possible on people to verify their trustworthiness as a potential employee or customer. Here's why the practice isn't working.

Web server attacks, poor app patching make for lethal mix

A dangerous combination of a massive increase in Web server attacks and poor patching practices is a major cause of concern for experts, according to a report issued today by several security organizations.

Cloud security through control vs.ownership

Cloud computing makes auditors cringe. It's something we hear consistently from enterprise customers: it was hard enough to make virtualization "palatable" to auditors; cloud is going to be even harder. By breaking the links between hardware and software, virtualization liberates workloads from the physical constraints of a single machine. Cloud takes that a step further making the physical location irrelevant and even obscure.

Internet scammers leap on Patrick Swayze’s death

Malware ghouls took just a few hours to begin preying on the death of actor Patrick Swayze with a new version of a familiar phony anti-virus scam.

Company hosting Joe Wilson fundraising site recovers from DDoS attack

A company providing online payment-processing services for U.S. Rep. Joe Wilson (R-S.C) is back online after being disrupted by a distributed denial-of service attack over the weekend.

ArcSight repurposes application to fight financial fraud

Security company ArcSight has retooled one of their event-monitoring products and created an appliance designed to detect fraudulent bank and brokerage transactions.

Companies patch OS holes, but biggest priority should be apps

Corporations appear to be much slower in patching their applications than their operating systems, even though attackers are mainly targeting application vulnerabilities, according to a new report based on data from TippingPoint, Qualys and the SANS Institute.

Businesses turn to DNS service to filter the Web

For National Veterinary Associates, the decision to block the Web was sealed with a virus.

New York Times tricked into serving scareware ad

Scammers tricked the New York Times' Digital Advertising department into placing a malicious ad for fake antivirus software on the NYTimes.com Web site over the weekend, the company confirmed Monday.

DHS to review report on vulnerability in West Coast power grid

The U.S. Department of Homeland Security is looking at a report by a research scientist in China that shows how a well-placed attack against a small power subnetwork could trigger a cascading failure of the entire West Coast power grid.

Cloud security survey can help shape best practices

You can make a difference deciding what aspects of cloud security get the most attention in upcoming recommendations about best practices.

Meet Google's 'Data Liberation Front'

You say you want a revolution? Google's hoping you do -- at least, when it comes to being able to take your cloud-stored data wherever you want.

The high cost of Internet (de)fame

If it seems like Notes From the Field is turning into the Notes From the Land of Internet Defamation and Anonymity, my apologies. But this is a topic that I've sunk my teeth into and now I can't seem to unsink them.

Rise in World Cup related phishing scams expected

Symantec is warning football fans to be wary of purchasing tickets online for next year's World Cup, following England's qualification into the tournament last week.

Apple missed security boat with Snow Leopard, says researcher

Apple missed a golden opportunity to lock down when it again failed to fully implement security technology that Microsoft perfected nearly three years ago in Windows Vista, a noted Mac researcher said today.

Windows Bug Enables PC Hijacking, Microsoft Warns

Microsoft last week issued an advisory warning that a bug discovered in Windows Vista, Windows Server 2008 and the release candidates of Windows 7 and Windows Server 2008 R2 could be used to hijack PCs.

Symark International buys BeyondTrust

Security vendor Symark International has bought BeyondTrust, a Portsmouth, New Hampshire, software company that sells a privilege access product similar to Symark's.

Researchers slam fickle iPhone anti-fraud feature

The iPhone's newest defense -- aimed at preventing users from reaching phishing sites -- is inconsistent at best, a security researcher said today, with some users getting warnings about dangerous links, while others are allowed to blithely surf to criminal URLs.

Gonzalez pleads guilty to TJX, other data heists

Albert Gonzalez, who was described by federal authorities as the mastermind of the massive data thefts at TJX Companies Inc., Heartland Payment Systems and other retailers, pleaded guilty to charges of conspiracy, wire fraud and aggravated identity theft.

Trojan hides its brain in Google Groups

Virus writers keep getting sneakier. In an effort to evade detection, they've begun hiding their command and control instructions in legitimate Web 2.0 sites such as Google Groups and Twitter.

Steganography meets VoIP in hacker world

Researchers and hackers are developing tools to execute a new data-leak threat: sneaking proprietary information out of networks by hiding it within VoIP traffic.

Astonishing E-Mail Messages You'll Never Open

Spamming is an underappreciated art form. In fact, "hated" may be a more accurate adjective. Like mimes in a public square, spammers seek to capture the attention of people who actively try to avoid them. Thus they must strike fast and hard, bewildering their prey with astonishing bombast, no-holds-barred familiarity, and too-good-to-be-true promises. Much depends on the effectiveness of their initial pitch--the e-mail header--and in exploiting that space, they put practitioners of haiku to shame, delivering their come-on to the rubes (that is, us) in a single line and usually in far fewer than 17 syllables.

Powerful tool to scour document metadata updated

A Spanish company has released an upgraded version of a powerful software application that can be used to perform intelligence gathering on a company's Web site and network.

Hacker Gonzalez pleads guilty to 20 charges

Hacker Albert Gonzalez, accused of masterminding the massive data thefts at BJ's Wholesale Club, TJX and several other retailers, has pleaded guilty to 19 charges related to computer hacking and credit card fraud, the U.S. Department of Justice said.

The%20Register

The Register - Security

Biting the hand that feeds IT

Mozilla catches half of Firefox users running insecure Flash
Adobe's upgrade blues

More than half of all Firefox users ran an unsafe version of Adobe's Flash Player, according to statistics collected last week as users installed the latest release of the popular open-source browser.…

What is your recession sales strategy?

Inmate 'fesses to prison computer hack
Jailbreaking the HR system

A former US inmate has pleaded guilty to hacking into the prison's computer system to obtain the personal data of more than 1,100 prison service workers.…

White hats release exploit for critical Windows vuln
Microsoft not immune to Immunity

White-hat hackers have released reliable code that remotely exploits a critical vulnerability in the Vista and Server 2008 versions of Microsoft's Windows operating system.…

The power of collaboration within unified communications

Microsoft security tools give devs the warm fuzzies
Testing times

Microsoft has released a general-purpose software tool for assessing the security of applications, part of a growing suite of free offerings designed to help third-party developers design safer programs.…

Looking at the threat landscape
It’s getting scary out there...

Regcast Be it Botnets or targeted attacks, increasingly sophisticated threats to your organisation are lurking just around the corner. Stay bang up to date on the latest techniques and how to best combat them by tuning into The Register’s Understanding The Threat Webcast.…

Case Study: WhatsUp keeps Legoland turnstyles ringing

Database containing 1.8m UK postcode locations leaks online
Knock, knock. Who's there?

An alleged copy of the UK postcode list has tipped up on WikiLeaks.…

Power grid takedown: a new how-to
Domino effect could short-circuit US West Coast

A well targeted attack against a small power grid subnetwork might result in a cascading failure across the entire US West Coast electricity grid, according to a Chinese academic.…

Firms fail to focus on most dangerous security threats
Web and client side bugs top peril index

Enterprises are focusing their information security efforts in the wrong areas, leaving themselves more open to hacking attacks and malware infections as a result.…

Trial set for 'botnet for hire' duo
Zombies R' Us

A federal judge has cleared the way for the trial of two men accused of waging a cyber attack on a webhosting company so they could demonstrate the effectiveness of their botnet to potential customers.…

Australia mulls botnet takedown scheme
Excuse me mate, but you're spewing spam

Australia is considering the adopting of a code that would oblige ISPs to contact, and in extreme cases perhaps even disconnect, customers with malware-infested computers.…

Swayze death exploited to serve up fake anti-virus
I've had the crime of my life

Miscreants have moved swiftly to establish malicious websites designed to rip off users searching for more information on the death of actor Patrick Swayze on Monday.…

Malware lingers months on infected PCs
Resident evil

Malware stays around on infected PCs far longer than previously thought, according to the latest research from Trend Micro.…

FreeBSD bug grants local root access
Trivial exploitation

A security researcher has uncovered a security bug in the FreeBSD operating system that allows users with limited privileges to take full control of underlying systems.…

Microsoft purges AutoRun from older Windows
Still (woefully) incomplete

Microsoft has finally removed a function from earlier versions of its Windows operating system that has been widely abused by miscreants to surreptitiously install malware on users' computers.…

MS insists bodged fix didn't spawn Windows crash risk
Teardrop Explodes

Microsoft has denied claims that an unpatched flaw in a file and printer sharing feature was inadvertently introduced when it fixed an earlier, less severe problem in the software back in December 2007.…

Trojan taps Google Groups as command network
alt.news.botnet.control

Hackers have programmed a Trojan that uses Google Groups newsgroups to distribute commands.…

New York Times pwned to serve scareware pop-ups
Gray Lady gets goosed

The New York Times was co-opted into pushing fake anti-virus malvertisements after hackers broke into its banner ad feed over the weekend.…

Linux webserver botnet pushes malware
Attack of the open source zombies

A security researcher has discovered a cluster of infected Linux servers that have been corralled into a special ops botnet of sorts and used to distribute malware to unwitting people browsing the web.…

International hacker buried $1m in backyard
Albert Gonzalez fortune forfeited

The international hacker who confessed to stealing tens of millions of payment card numbers amassed a fortune worth more than $2.7m, including more than $1m in cash buried in his backyard in Miami.…

Related Searches
on Ask.com

Albert Gonzalez

Scareware scumbags exploit 9/11
Obviously an inside job

Updated Fraudsters have set up websites supposedly containing info about 9/11 but actually geared towards running fake anti-virus (scareware) scams.…

RBS WorldPay downplays database hack reports
'No access to either merchant or cardholder accounts'

Updated RBS WorldPay and a hacker are at loggerheads over the seriousness of a supposed breach on websites run by the payment processing firm.…

Sky News election petition defaced by prankster hackers
Windbag windup

Computer hackers with a grudge made merry at the expense of Rupert Murdoch after infiltrating the Sky News website.…

Related Searches
on Ask.com

Rupert Murdoch

SANS%20RSS%20Feed

SANS Information Security Reading Room

Last 25 Computer Security Papers added to the Reading Room

Security Incident Handling in High Availability Environments

Category: Incident Handling

Paper Added: September 15, 2009

Investigative Tree Models

Category: Incident Handling

Paper Added: September 15, 2009

SANS%20Internet%20Storm%20Center,%20InfoCON%3A%20green

SANS Internet Storm Center, InfoCON: green

Why is Rogue/Fake AV so successful?, (Thu, Sep 17th)

Rogue AV programs have become increasingly common in last two years. We at the SANS Internet Storm C ...(more)...

SMB2 remote exploit released, (Wed, Sep 16th)

Last week Guy posted a diary (http://isc.sans ...(more)...

IETF Draft for Remediation of Bots in ISP Networks, (Wed, Sep 16th)

A new IETFdraft document focused on how ISP's may detect botnet infections by their subscriber ...(more)...

Review the security controls of your Web Applications... all them!, (Wed, Sep 16th)

Are you applying consistent security controls to all the input vectors of your Web Applications? Att ...(more)...

Wireshark 1.2.2 (and 1.0.9) is out!, (Wed, Sep 16th)

The Wireshark team has released a new version of the famous graphical traffic sniffer and protocol a ...(more)...

SANS releases new Cyber Security Risk Report, (Tue, Sep 15th)

SANS today released a new Cyber Security Risks report. The report used data from Tippingpoint, Qualy ...(more)...

Windows autoplay behavior updated (improved) , (Sun, Sep 13th)

Microsoft has delivered on their promise to backport the improved autoplay behavior in Win7 to older ...(more)...

Information Leakage in Cloud Computing, (Sun, Sep 13th)

An interesting paper was published this last week discussing ways of determining the physical system ...(more)...

Apple Updates, (Sat, Sep 12th)

Microsoft had their monthly patch day this past Tuesday. Mozilla released new versions of Fire ...(more)...

OSSEC version 2.2 available, (Sat, Sep 12th)

This past week version 2.2 of one of our favorite free HIDSproducts, OSSEC, was released ...(more)...

SANS%20RSS%20Feed

SANS NewsBites

All Stories From Vol: 11 - Issue: 72

Proposed Legislation in California Clarifies Breach Notification Requirements (September 11, 2009)

Legislation awaiting the governor's signature in California would require that data breach notification letters include specific information about the incident, including what type of information was compromised, and entities experiencing breaches that affect 500 or more individuals provide a copy of the notification letter to the state attorney general's office.......

Report Shows Taking Down Small Power Subnetwork Could Cause Significant Outages (September 14, 2009)

The US Department of Homeland Security (DHS) is taking a close look at a report from a Chinese research scientist that posits that "a well-placed attack against a small power subnetwork could trigger a cascading failure of the entire West Coast power grid.......

Australia's Internet Industry Association Issues Draft eSecurity Code (September 11 & 14, 2009)

Australia's Internet Industry Association (IIA) has published a draft of an eSecurity Code aimed at protecting citizens from online threats.......

DoD Analyst Charged With Unauthorized System Access (September 14, 2009)

A US Defense Department analyst has been charged with gaining unauthorized access to a protected computer or exceeding authorized access and obtaining classified information.......

Ads on New York Times Website Serving Up Scareware (September 14, 2009)

The New York Times has warned that rogue advertisements on its website were serving scareware over the weekend.......

Trojan Horse Program Uses Google Groups as Command and Control Channel (September 11 & 14, 2009)

The Grups Trojan horse program uses Google groups as a command and control channel.......

Microsoft Update Limits AutoRun Functionality (September 14, 2009)

Last month, Microsoft issued "an update that changes the AutoRun functionality in Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008.......

Linux Botnet (September 12 & 14, 2009)

A network of infected Linux servers is being used to distribute malware.......

Gonzalez Guilty Plea Settles Two of Three Indictments (September 11 & 12, 2009)

Albert Gonzalez has pleaded guilty to 20 charges of conspiracy, computer fraud, wire fraud, access device fraud and aggravated identity theft in connection to data thefts at TJX, BJ's wholesale club, OfficeMax, Barnes & Noble and other retailers.......

Attacker Claims to Have Exploited SQL Injection Vulnerability at RBS WorldPay (September 11, 2009)

A attacker claims to have exploited an SQL injection vulnerability in a web application to gain access to the RBS WorldPay database.......

Cyber Thieves Stole Payment Card Data From Indiana Bank Customers (September 11, 2009)

Investigators say that cyber thieves stole debit card numbers from customers of People's Saving and Trust Bank in Boonville, Indiana.......

Man Draws Six Month Sentence for Unauthorized Background Checks (September 10, 2009)

An Illinois man has been sentenced to six months in jail for abusing his position as director of a county emergency dispatch agency to conduct unauthorized background checks.......

Server Reliability Study (September 8, 2009)

An Information Technology Intelligence Corp.......

SearchSecurity.com

SearchSecurity: Security Wire Daily News

The latest information security news on IT threats, vulnerabilities and market trends from the award-winning SearchSecurity.com.

Experts rebuke programmers who use SQL injection as feature

By Robert Westervelt

Security experts point to online advertising campaigns that distributed faulty code to affiliates as the source of spikes in SQL injection attacks.

SANS: Application threats, website flaws pose biggest security threats

By Robert Westervelt

A new report from the SANS Institute calls flaws in client-side applications often the most ignored by IT professionals.

Brute force attacks target Yahoo email accounts

By Robert Westervelt

Attackers target a background Web services authentication application used by ISPs and Web applications to authenticate users.

Secure virtual desktop software enables remote client security

By Eric Ogren

Virtual desktops control endpoints and cut costs for an Atlanta-based financial company. The setup helps IT control core essentials and enforce acceptable use policy.

Melissa Hathaway urges more cooperation, government attention to cybersecurity

By Michael Mimoso

Former acting director for cyberspace Melissa Hathaway called for public-private cooperation on cybersecurity and pressed government to develop standards and foster innovation.

Symark acquires BeyondTrust

By Marcia Savage

Privileged access management provider expands beyond Unix and Linux environments to the Windows platform with acquisition.

DNSSEC deployment challenges can be overcome

By Robert Westervelt

Experts deploying DNSSEC across the .ORG domain share the issues encountered during the early-adoption of the technology. Key management remains an issue.

SecuriTeam.com

SecuriTeam

Welcome to the SecuriTeam RSS Feed - sponsored by Beyond Security. Know Your Vulnerabilities! Visit BeyondSecurity.com for your web site, network and code security audit and scanning needs.

Apple iPhone OS AudioCodecs Heap Buffer Overflow

The iPhone OS AudioCodecs library contains a heap buffer overflow vulnerability while parsing maliciously crafted AAC or MP3 files. The vulnerability may be exploited by an attacker to execute arbitrary code in the context of an application using the vulnerable library.

Protector Plus Local Privilege Escalation Vulnerability

Local privilege escalation vulnerability in Protector Plus antivirus software. Protector Plus range of antivirus products are known the world over for their efficiency and reliability.

Novell eDirectory Dhost Http Server Denial of Service Vulnerability

Novell eDirectory 8.8 SP5 is vulnerable to a denial of service attack. If a remote attacker sends Unicode strings with Http Request to "8028 port" ("8028" is the default port of Novell eDirectory Dhost Http Server), the attacker can cause the system to consume 100% of the CPU resources.

Apple QuickTime H.264 Nal Unit Length Heap Overflow Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Apple QuickTime FlashPix Sector Size Overflow Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Mozilla Firefox TreeColumns Dangling Pointer Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Mozilla Firefox. User interaction is required to exploit this vulnerability in that the target must visit a malicious page.

Security - RSS Feeds

Security - RSS Feeds

Fixing Security Flaws Isn't Just Microsoft's Responsibility

News Analysis: Microsoft gets hit hard with criticisms of its inability to adequately protect its users. But a recent study from the SANS Institute indicates users and software developers may also be at fault. It's time for IT managers and individual users to take responsibility for updating and patching all their applications and operating systems in a timely manner.
- In the world of PC computing, it's fashionable to beat on Microsoft for all the security issues that have plagued the space. Whether it's Apple mocking Windows security in its quot;I'm a Mac, I'm a PC quot; ads or countless security experts performing research on all the issues facing Windows, a...

Microsoft Releases Free Security Tools for Application Developers

Microsoft unveils a binary code analysis tool and a fuzzing program designed to help developers design secure applications.
- Microsoft on Sept. 16 unveiled two new tools to help developers build better security into their applications. The tools are available for download for free, and are designed to help developers extend Microsoft's SDL (Security Development Lifecycle) process into their organizations. The first o...

Google Buys ReCAPTCHA to Improve Security and Book Scanning

Google acquires ReCAPTCHA to improve security and bolster its book and newspaper scanning efforts.
- Google has acquired ReCAPTCHA, an open-source CAPTCHA service that the search engine giant will use to bolster security and its efforts to digitize books and newspapers. CAPTCHA technology is widely used to fight spammers by preventing them from using computers to automatically sign up for We...

New Apple iPhone Jailbreaking Tool Hits the Street

A new jailbreaking tool is available to allow users to unlock Apple iPhone OS 3.1. The tool was developed by the iPhone Dev-Team.
- The iPhone-Dev team has released a new tool to enable users to jailbreak and unlock Apple iPhone OS 3.1. With Pwnage Tool 3.1 for Mac OS X, users can jailbreak both iPhone 3G and the first editions of the iPhone and iPod Touch. The tool, however, does not support iPhone 3GS or the second or thir...

Lawmakers Pressure White House over Cyber-czar

Three months after President Obama promised in May to appoint a cyber-security czar, the co-chairs of the U.S. House Cybersecurity Caucus urge the White House to step up its efforts.
- Congress is beginning to grumble over President Obama's failure to appoint a cyber-security czar months after Obama promised he would do so. Obama issued his Cyberspace Policy Review on May 29 to great fanfare and pledged to name a cyber-czar, which he called a coordinator, to oversee the plan. ...

Top Cyber-Threats Tied to Application Patching Process

A new report from the SANS Institute, Qualys and TippingPoint underscores the fact that while the number of zero-day bugs is growing, the bigger threat comes from popular client-side applications such as Apple QuickTime and Adobe Reader.
- IT security has less to do with bracing for the inevitable zero-day vulnerability than some outside the industry may think. Truth be told, the biggest threats facing users and organizations today are unpatched client-side applications and unsecure Web programs - that is the message of a ...

Symark Buys BeyondTrust, Takes Its Name

Symark International announced today it acquired BeyondTrust to broaden its privileged access management portfolio to include Microsoft Windows desktops. Symark also announced it would now be known as BeyondTrust.
- Symark International has a new name and a new set of capabilities under its belt. The company announced today it has acquired BeyondTrust, and will henceforth be known by that name as it sharpens its focus by providing security and compliance for privileged user access for Microsoft Windows. Th...

Symantec: Google Groups Used to Send Commands to Malware

Symantec researchers have uncovered a Trojan using a private newsgroup within Google Groups as a command and control server. The move follows an attempt to use Twitter as a C C earlier this year.
- Symantec has uncovered a scheme to use a Google Groups newsgroup to sneak commands to malware on compromised computers. The move is another example of attackers looking for covert ways to communicate to their bots. Earlier this year, attackers were found using Twitter as a command and contr...

Apple iPhone OS 3.1 Phishing Protection Falling Short, Researchers Say

Security pros say the Apple iPhone OS 3.1's anti-phishing feature falls short, failing to block sites blocked by the desktop version of the Safari browser.
- The anti-phishing feature for the iPhone OS 3.1 isn't all it's cracked up to be, according to security researchers. For whatever reason, some researchers have found, phishing sites blocked by the desktop version of Apple Safari are not consistently blocked by the mobile version. Since Apple r...

Gonzalez Pleads Guilty to Massive Retail Hacks

The hacker who help mastermind cracking into the networks of TJX Companies, BJs Wholesale Club, OfficeMax, Boston Market, Barnes Noble and Sports Authority faces a minimum of 15 years and a maximum of 25 years in prison. The hacks netted more than 40 million credit and debit card numbers.
- Albert Gonzalez pleaded guilty Sept. 11 to hacking into the systems of major U.S. retailers including TJX Companies, BJs Wholesale Club, OfficeMax, Boston Market, Barnes amp; Noble and Sports Authority. More than 40 million credit and debit card numbers were stolen as a result of the hacking ac...

Security Fix

Brian Krebs on computer and Internet security

Data Breach Highlights Role Of 'Money Mules'

In Fraud

On Friday, Brunswick, Maine-based heating and hardware firm Downeast Energy & Building Supply sent a letter notifying at least 850 customers that the company had suffered a data breach. Downeast sent the notice after discovering that hackers had broken in and stolen more than $200,000 from the company's online bank account. The attack on Downeast Energy bears all the hallmarks of online thieves who have stolen millions from dozens of other businesses, schools and counties over the past several months. In every case, the thieves appeared more interested in quick cash than in pilfering their victims' customer databases. Nevertheless, the intrusions highlight an additional cost for victims of this type of crime: complying with state data breach notification laws. "This is something new to us, fortunately, but we have responsibilities under Maine statute to report these things to our customers and employees," said the company's president, John Peters, in an

Cyber Crooks Target Public & Private Schools

In Fraud

A gang of organized cyber criminals that has stolen millions from businesses across the United States over the past month appears to have turned its sights on public schools and universities. On the morning of Aug. 17, hackers who had broken into computers at the Sanford School District in tiny Sanford, Colorado initiated a batch of bogus transfers out of the school's payroll account. Each of the transfers was kept just below $10,000 to avoid banks' anti-money laundering reporting requirements, and went out to at least 17 different accomplices or "money mules" that the attackers had hired via work-at-home job scams. A school employee spotted the bogus payments on the morning of the 19th, when the school district learned that $117,000 had been siphoned from its coffers by cyber crooks. Sanford Superintendent Kevin Edgar said the school successfully reversed two of the transfers totaling $18,000, but that rest of the

Patches for Macs, and Advice for Mac Users

In New Patches

Apple last week released Mac OS X 10.6.1, the first security update for Snow Leopard users. Cupertino also issued a bundle of updates to fix more than 30 security flaws in its 10.4 and 10.5 OS X and OS X Server systems. Snow Leopard shipped with an outdated and insecure version of the Adobe Flash Player. The 10.6.1 update fixes that, patching at least nine vulnerabilities in Flash, and bringing the Snow Leopard Flash plug-in up to date with the current 10.0.32.18 version. The Tiger and Leopard security bundles also include the Flash update, along with security fixes for components like ColorSync and CoreGraphics. The updates are available through Software Update or via Apple Downloads. One final note: Over the weekend, a number of Security Fix readers who are also Mac users wrote in to ask for advice after being peppered with rogue anti-virus pop-ups. The readers complained they received

SecurityFocus

SecurityFocus News

SecurityFocus is the most comprehensive and trusted source of security information on the Internet. We are a vendor-neutral site that provides objective, timely and comprehensive security information to all members of the security community, from end users, security hobbyists and network administrators to security consultants, IT Managers, CIOs and CSOs.

Brief: iPhone anti-phishing sigs only slightly delayed

iPhone anti-phishing sigs only slightly delayed

Brief: Gonzalez pleads guilty to giant breaches

Gonzalez pleads guilty to giant breaches

Brief: Old patch introduced SMBv2 flaw, says finder

Old patch introduced SMBv2 flaw, says finder

TaoSecurity

Richard Bejtlich's blog on digital security and the practices of network security monitoring, incident response, and forensics.

Security Information and Event Management (SIEM) Position in GE-CIRT

By Richard Bejtlich

My team just opened a position for a Security Information and Event Management professional. This candidate will report to me in GE-CIRT but take daily direction from our SIM leader and our Lead Incident Handler. We're looking for a technical person who can not only administer our SIM, but also help our team implement our detection and response objectives and use cases in our SIM and related infrastructure.
This candidate will sit in our new Advanced Manufacturing & Software Technology Center in Van Buren Township, Michigan.
If interested, search for job 1087025 at ge.com/careers or go to the job site to get to the search function a little faster. I am available to answer questions on the role or forward them to our SIM leader. You can reach me by posting a comment here and providing an email address where I can contact you. Thank you.

Copyright 2003-2009 Richard Bejtlich and TaoSecurity (taosecurity.blogspot.com and www.taosecurity.com)

WindowSecurity.com

WindowSecurity.com

WindowSecurity.com provides Windows security news, articles, tutorials, software listings and reviews for information security professionals.

Windows 7 XP Mode: What are the Security Implications?

By deb@shinder.net (Deb Shinder)

What are the security implications of Windows 7's XP Mode?

Yahoo!%20News

Yahoo! News: Security News

Security News

Unpatched Applications Are #1 Cyber Security Risk (PC World)

In technology

PC World - Unpatched client software and vulnerable Internet-facing web sites are the most serious cyber security risks for business. Lesser threats include operating system holes and a rising number of zero-day vulnerabilities, according to a new study.

New York Times Tricked Into Serving Scareware Ad (PC World)

In technology

PC World - Scammers tricked the New York Times' Digital Advertising department into placing a malicious ad for fake antivirus software on the NYTimes.com Web site over the weekend, the company confirmed Monday.

Learning from the NY Times Attack Ad (PC World)

In technology

PC World - The NYTimes.com site warned Sunday that it had inadvertently displayed an "unauthorized advertisement" over the weekend that tried to use fake malware warnings to trick viewers into installing scareware.

NYTimes.com Warns of Malware on Site (PC World)

In technology

PC World - Online scammers have apparently found a new way to reach their marks:

Cyber criminals targeting small businesses (AP)

In technology

AP - Cyber criminals are increasingly targeting small and medium-sized businesses that don't have the resources to keep updating their computer security, according to federal authorities.

Patience, Grasshopper: Wait to Update Your Jailbroken iPhone to 3.1 (PC World)

In technology

PC World - If you have a jailbroken iPhone and were wondering if you should update to OS 3.1 via iTunes, do yourself a favor and just wait a few more days. As with every other major iPhone software update, 3.1 adds a slew of cool new features and bug fixes, as well as breaks the current jailbreak exploit. Nothing shocking here, as this cat-and-mouse game has been going on between Apple and the Dev-Team hackers since 1.1.1.

Trojan Hides Its Brain in Google Groups (PC World)

In technology

PC World - Virus writers keep getting sneakier. In an effort to evade detection, they've begun hiding their command and control instructions in legitimate Web 2.0 sites such as Google Groups and Twitter.

Hacker in payment card theft pleads guilty (Reuters)

In us

Reuters - A 28-year-old computer hacker pleaded guilty to some of the largest identity theft crimes on record on Friday and left a federal judge grappling with how to compensate millions of victims.

Hacker pleads guilty to huge theft of card numbers (AP)

In technology

Albert Gonzalez, 28, of Miami, Florida, seen in an undated U.S. law enforcement handout photo. REUTERS/U.S. Law Enforcement via Wired.com/HandoutAP - A computer hacker who was once a federal informant and was a driving force behind one of the largest cases of identity theft in U.S. history pleaded guilty Friday in a deal with prosecutors that will send him to prison for up to 25 years.

Hacker Gonzalez Pleads Guilty to 20 Charges (PC World)

In technology

PC World - Hacker Albert Gonzalez, accused of masterminding the massive data thefts at BJ's Wholesale Club, TJX and several other retailers, has pleaded guilty to 19 charges related to computer hacking and credit card fraud, the U.S. Department of Justice said.

Spanish security firm detects 'swine flu' computer virus (AFP)

In technology

Almost empty internet cafe in South Korea.Cyber criminals are taking advantage of swine flu fears with e-mails promising news on the illness which then infect computers with a virus, a Spanish computer security firm warned Friday.(AFP/File)AFP - Cyber criminals are taking advantage of swine flu fears with e-mails promising news on the illness which then infect computers with a virus, a Spanish computer security firm warned Friday.

Zero Day

Tracking the hackers

Phishers introduce 'Chat-in-the-Middle' fraud tactic

By Dancho Danchev on Spam and Phishing

Phishers don’t just want to “bank with you”, they also want to talk you into revealing the answers to your ’secret’ questions, next to more sensitive information that would help them gain access to your online bank account. A new ‘Chat-in-the-Middle’ fraud tactic was recently discovered by the RSA FraudAction Research Lab, according to which the [...]

Google + reCAPTCHA could raise bar in anti-bot, anti-spam battle

By Ryan Naraine on Web 2.0

Google buys an excellent crowd-sourcing tool and, by default, gets to raise the bar significantly in the fight against bots and spam.

The ultimate guide to scareware protection

By Dancho Danchev on Web 2.0

Throughout the last two years, scareware (fake security software), quickly emerged as the single most profitable monetization strategy for cybercriminals to take advantage of. Due to the aggressive advertising practices applied by the cybercrime gangs, thousands of users fall victim to the scam on a daily basis, with the gangs themselves earning hundreds of thousands [...]

9/11 related keywords hijacked to serve scareware

By Dancho Danchev on Web 2.0

Anticipating the logical peak of 9/11 related keywords on the 8th anniversary of the attacks, cybercriminals have hijacked the trending topic by occupying thousands of related keywords for the purpose of serving fake security software. None of the sites are currently marked as harmful by the SafeBrowsing initiative, due to the evasive tactics applied in the [...]

No comments:

Post a Comment

My Blog List