Thursday, October 22, 2009

Around The Horn vol.1,156

Ars Technica - Security

4chan prank morphs into malware attack in Kanye death hoax

By jacqui@arstechnica.com (Jacqui Cheng) on scareware

companion photo for 4chan prank morphs into malware attack in Kanye death hoax

Fake celebrity death reports are nothing new to the Internet—a quick search shows that in just the last few years, there have been rumors spread about the death of Britney Spears, Michael Jackson (uh, before he actually died), Justin Timberlake, Will Farrel, Sean Connery, and more. But with the proliferation of malware, celebrity death rumors can take on new life if spammers pick up on the trend. That's what happened overnight—a fake report about the death of Kanye West, originating as a prank, got co-opted by those looking to exploit your computer.

Read the rest of this article...

Americans fear online robberies more than meatspace muggings

By hannibal@arstechnica.com (Jon Stokes) on tech_policy

companion photo for Americans fear online robberies more than meatspace muggings

A new survey shows, perhaps unsurprisingly, that more Americans are worried about being robbed online than they are about being mugged in real life. The bi-annual Unisys Security Index found that Americans fear fraudulent use of their personal credit and debit cards significantly more than they fear for their personal safety; and, in a change from the previous March survey, Americans fear for the nation's security even more than they do the security of their finances. Americans are also much more concerned about pandemic flu viruses than they are computer viruses, and they're a little less concerned about paying their bills than they were in the first half of the year.

Read the rest of this article...

One week of MSE: 1.5 million downloads, 4 million detections

By emil.protalinski@arstechnica.com (Emil Protalinski) on Windows

companion photo for One week of MSE: 1.5 million downloads, 4 million detections

Redmond has released data from the first week (between September 29 to October 6) of Microsoft Security Essentials (MSE) usage, the company's free, real-time consumer antimalware solution for fighting viruses, spyware, rootkits, and Trojans. The product was made generally available to consumers in 19 countries in eight languages, and in the first week Microsoft says it has seen well over 1.5 million downloads. "By the end of week two, we had exceeded 2.6 million downloads," a Microsoft spokesperson told Ars. Number of downloads is never equivalent to the number of installs though: the software giant can't say how many machines have the software installed, but it can weigh in on the number of infected machines.

Read the rest of this article...

Businesses fail to take basic steps to prevent ID fraud

By jtimmer@arstechnica.com (John Timmer) on security

companion photo for Businesses fail to take basic steps to prevent ID fraud

On Tuesday, we discussed how many organizations have password policies that don't take the actual properties of human beings into account, and thereby leave their computer systems at risk of malicious attack. In the UK, this week is National Identity Fraud Prevention Week, and a number of surveys of consumer and organizational behaviors are being released in conjunction with this attempt to raise awareness. Collectively, the information in these surveys show that an indifference to security measures is pervasive in many businesses.

We obtained the results of two surveys from the organization that is running National Identity Fraud Prevention Week. The first was produced by the UK's National Fraud Authority, which surveyed the employees of over 500 small businesses. The second was a survey of both consumers and office workers in Europe that was sponsored by Fellowes, which makes paper shredders. Obviously, that company has an interest in heightening awareness of potential security lapses, but the methods used seem fairly standard, and the results pick up national differences in attitudes towards security and identity theft.

Read the rest of this article...

Windows 7 testers invited to ongoing MSE beta program

By emil.protalinski@arstechnica.com (Emil Protalinski) on Windows 7

companion photo for Windows 7 testers invited to ongoing MSE beta program

Microsoft today sent out an e-mail to the Windows 7 beta program testing group that reveals some key information about Microsoft Security Essentials (MSE), the company's newly released, free, real-time consumer antimalware solution. First off, the e-mail explains that Microsoft is planning to roll out an ongoing beta program for MSE that will have new private beta builds and a much bigger number of testers. Secondly, the e-mail explains that the first group of invitees are participants of the Windows 7 beta program. Finally, Microsoft notes that those who are not selected to participate in the beta (those who get in will know by November 1, 2009) will have an opportunity to participate in a Customer Preview Program, available next year.

Read the rest of this article...

30 years of failure: the username/password combination

By jtimmer@arstechnica.com (John Timmer) on security

companion photo for 30 years of failure:  the username/password combination

A lot of the effort involved in establishing a secure computing environment focuses on technological solutions, from providing warnings about phishing attacks to blocking the propagation of botnets. But, as previous research has shown, security involves a significant human component. Nowhere is that more true than the item at the heart of basic security: the humble password. Here, our best practices—something that's not in the dictionary or written down, differs for every account, etc.—ignores basic research, which shows that humans have a limited capacity to associate random text with, well, just about anything. A new survey of institutional IT users provides a glimpse into just how bad the password situation is, with less than five percent of users managing to use best practices.

What is perhaps most striking about the new study, which is being published in the Proceedings of the Human Factors and Ergonomics Society, is its background section, which details just how long we've been aware of the password problem. It cites a study of Unix passwords from 1979, which showed that about 30 percent of the passwords were four characters or less, and about 15 percent being words that appear in the dictionary. Fast forward to 2006, when a separate survey of 34,000 MySpace passwords revealed that the most common were "password1", "abc123", "myspace1", and "password".

Read the rest of this article...

Simple script trips up Microsoft Security Essentials

By emil.protalinski@arstechnica.com (Emil Protalinski) on VBS

companion photo for Simple script trips up Microsoft Security Essentials

An Ars forum member by the name of adminfoo recently installed Microsoft Security Essentials (MSE) to see what all the fuss was about. To his surprise, the security solution quickly labeled him as a malware author. MSE apparently was not quite happy with a .VBS script he had written, and so he decided to dig deeper. His analysis prompted us to do some digging of our own.

After investigating, we've come to a few conclusions: this is a false positive (a file or program that is not dangerous but is detected as such), Microsoft needs to be much quicker to react to false positives (though this is the first one we've seen trip MSE up), and the company's new consumer solution is a much more complicated piece of software than most believe.

Read the rest of this article...

First Windows 7 security updates available

By emil.protalinski@arstechnica.com (Emil Protalinski) on Windows Server 2008 R2

companion photo for First Windows 7 security updates available

As expected, Microsoft today had its largest Patch Tuesday to date, and it includes the first security fixes for Windows 7 and Windows Server 2008 R2. The vulnerability in question could allow a denial of service attack via a maliciously crafted packet during the NTLM authentication process, as described in Security Bulletin MS09-059. Windows XP, Windows Server 2003, Windows Vista, and Windows Server 2008 are also affected, though XP and Server 2003 are only vulnerable if they have previously installed the non-security update described in KB968389.

Read the rest of this article...

How to break up in an online world—and avoid e-stalkers

By jacqui@arstechnica.com (Jacqui Cheng) on Twitter

companion photo for How to break up in an online world—and avoid e-stalkers

In this age of electronic communications and social networks, breaking up with someone can be even more of an ordeal than it has been in the past. A divorce or major breakup can be messy enough without the added reminders about what your ex is up to every hour of the day or who he or she is going out with on the weekends. Plus, there's always that risk that your ex is of The Crazy(tm) variety and is using your social networking updates to ensure that you cannot possibly move on with your life if he or she can help it.

For those who keep a tight leash on who has access to their Internet activities, the solution to this problem might seem obvious. Still, there are legions who don't immediately think of the laundry list of Internet ties to cut when they end up parting ways with a significant other. (We have even heard from several readers about dealing with this issue.) It's those people this guide is aimed at.

Read the rest of this article...

CGISecurity - Website and Application Security News

All things related to website, database, SDL, and application security since 2000.

Metasploit sold to Rapid7

By Robert A. on Security Tools

It was announced this morning that Rapid7 has purchased metasploit, and hdmoore! That is all. Rapid7 Announcement: http://www.rapid7.com/metasploit-announcement.jsp Metasploit Blog: http://blog.metasploit.com/2009/10/metasploit-rising.html Metasploit Blog: http://blog.metasploit.com/2009/10/joining-team.html More Coverage http://www.andrewhay.ca/archives/1085 http://blog.ianetsec.net/perspective/2009/10/nick-selby-metasploit-acquisition-shakes-up-the-pentest-landscape.html http://darkreading.com/vulnerability_management/security/management/showArticle.jhtml?articleID=220800067

OWASP Publishes Transport Layer Protection Cheat Sheet

By Robert A. on IndustryNews

"This article provides a simple model to follow when implementing transport layer protection for an application. Although the concept of SSL is known to many, the actual details and security specific decisions of implementation are often poorly understood and frequently result in insecure deployments. This article establishes clear rules which provide guidance...

WASC Announcement: 2008 Web Application Security Statistics Published

By Robert A. on WASC

The Web Application Security Consortium (WASC) is pleased to announce the WASC Web Application Security Statistics Project 2008. This initiative is a collaborative industry wide effort to pool together sanitized website vulnerability data and to gain a better understanding about the web application vulnerability landscape. The statistics was compiled from web application...

One character mistake knocks .se TLD offline

By Robert A. on IndustryNews

"What was essentially a typo last night resulted in the temporary disappearance from the Internet of almost a million Web sites in Sweden -- every address with a .se top-level down name. According to Web monitoring company Pingdom, which happens to be based in Sweden, the disablement of an entire top-level domain...

CNET News - Security

Microsoft fixing Bing bug that aided spammers

By Elinor Mills

Microsoft on Wednesday said it is fixing a bug in Bing that allowed spammers to bypass spam filters and distribute malicious links.

Researchers at Webroot Software discovered a spam campaign earlier this week that used the search engine's own redirection mechanism and a link-shrinking technique to send people to ...

Originally posted at InSecurity Complex

ChoicePoint to pay $275,000 in latest data breach

By Elinor Mills

ChoicePoint, one of the nation's largest data brokers, has been fined $275,000 by the U.S. Federal Trade Commission for a data breach that exposed personal information of 13,750 people last year.

In April 2008, ChoicePoint turned off a key electronic security tool that it used to ...

Originally posted at InSecurity Complex

Time Warner testing fix to hole in home router

By Elinor Mills

This is the SMC8014WG-S cable modem/Wi-Fi router provided to Time Warner cable customers that has a security hole.

(Credit: SMC)

Time Warner has rolled out a temporary patch and is testing a permanent fix for a security hole in a combination cable modem/Wi-Fi router that could allow anyone ...

Originally posted at InSecurity Complex

Leaking crypto keys from mobile devices

By Elinor Mills

Security researchers have discovered a way to steal cryptographic keys that are used to encrypt communications and authenticate users on mobile devices by measuring the amount of electricity consumed or the radio frequency emissions.

The attack, known as differential power analysis (DPA), can be used to target an unsuspecting victim ...

Originally posted at InSecurity Complex

CIA to start spying on social media?

By Don Reisinger

Visible Technologies, a company that monitors online social activity and packages the findings for clients, has forged a "strategic partnership" with In-Q-Tel, the CIA's not-for-profit investment arm, to give the organization insight into social media.

The deal was first reported on Monday by Wired.

According to Visible Technologies, In-Q-Tel ...

Originally posted at Webware

Podcast: Symantec says beware of rogue security software

By Larry Magid

If you've ever gotten a pop-up message warning that your PC is infected, it could very well be an advertisement for rogue software that can do a lot of harm and absolutely no good.

Symantec has just issued a report saying that the company has "detected over 250 distinct

...

Originally posted at For the Record

Windows 7 security in pictures

By Seth Rosenblatt

Security in Windows 7

See what security features are new and improved in Windows 7 in this slideshow, emphasizing what you can do from the Action Center's security tools.

Originally posted at Windows 7 Insider

Gartner: Loosen up on social networks, security

By Stephen Shankland

ORLANDO, Fla.--OK, IT managers, it's time to loosen up.

That's how analysts advised Gartner Symposium attendees here Monday, arguing that corporate computing departments shouldn't block social networking and that security shouldn't completely lock down communications with the outside world. And even if information technology authorities want to shut down such activity, they can't.

Gartner analyst Carol Rozwell

Carol Rozwell, a Gartner vice president

(Credit: Stephen Shankland/CNET)

"Banning access to social media from the corporate network is futile," said Carol Rozwell, a Gartner vice president. "The world we live in is digitally enabled and socially connected."

The advice reflects the transformation of the information technology world as the Internet steadily pervades more and more corners of everybody's life. Although the Gartner event historically has concerned itself with matters such as justifying the expense of a new enterprise resource management computing system, the broadening show reflects the growing scope of work that IT managers face.

Overall, companies must acknowledge that not everything is under control of their own top-down administration, said Peter Sondergaard, senior vice president of research at Gartner.

"We're moving from control to greater autonomy," Sondergaard said. Managers also must find an appropriate place on the spectrums of in here vs. out there and owned vs. shared.

...

Originally posted at Deep Tech

Part 2: Q&A with Jeff Moss on computer hacking

By Elinor Mills

Jeff Moss

(Credit: Darington Forbes)

Like many young hackers, Jeff Moss got his start copying computer games, learned how to program, and began to explore the world through a modem.

Unlike many young hackers, Moss has managed to turn his computer and social-networking skills into a business. He founded Defcon, ...

Originally posted at InSecurity Complex

Firefox blocks insecure .Net add-on--awkwardly

By Stephen Shankland

Mozilla on Friday disabled a Microsoft plug-in for Firefox called the .Net Framework Assistant because of a security problem--then scrambled to give people with patched systems an override option.

Mike Shaver, Mozilla's vice president of engineering, announced the first step late Friday night on his blog. "It's recently ...

Originally posted at Deep Tech

AVG Free 9 in pictures

By Seth Rosenblatt

AVG Free 9--photos

Most of what's new in AVG Free 9 is under the hood, with the security vendor talking up speedier scan times. There's also a new identity protection feature that's free to people in the United States.

Also in this slideshow, I show an easy ...

Originally posted at The Download Blog

Kaspersky CEO: You need an Internet 'passport'

By Vivian Yeo

Eugene Kaspersky once told a competitor to his face: "I will eat you."

Eugene Kaspersky

(Credit: Kaspersky Lab)

The co-founder and CEO of Kaspersky Lab was certainly not into cannibalism, but was hell-bent on winning over the majority market share his competitor had in the company's base in Russia. ...

Q&A: Defcon's Jeff Moss on cybersecurity, government's role

By Elinor Mills

Jeff Moss, founder of Black Hat and Defcon.

(Credit: Darington Forbes)

As a hacker and organizer of Defcon, an event where computer security vulnerabilities and exploits are routinely unveiled, Jeff Moss seemed an unusual choice when he was named to the Homeland Security Advisory Council in June.

But his background and lack of government experience brings a fresh, outsider's perspective to a public sector plagued by a fast-changing threat landscape, perpetual turf wars, and bureaucratic inertia.

With National Cyber Security Awareness Month under way, CNET News discussed with Moss his new role, his thoughts on the national ID card debate, and how the government wants to use social media sites for public emergency alerts. This edited interview is the first of two parts. Part two will run on Monday.

Q: So, how's it going on the Homeland Security Advisory Council?
Moss: It's going pretty well, it's pretty exciting actually. Recently we did a recommendation, I'm sure you read about it, the homeland security color codes. There are the five color codes. Normally the country is on like yellow or orange. I think we've only been to red once. But we've never been to the two lowest, blue and green. So the system was up for review. It turns out that the color codes work really well for industry and government. They have procedures in place. They do things automatically when the color codes are changed. It is actually successful for them but for the third group that uses them, civilians, it actually doesn't work well at all.

Right. We don't understand it. We're like, what does it mean? Is it real?
Moss: How does it give us any actionable information? How should we change our behavior based on it? That's what came out of the report was that it's very hard for civilians to do anything with it and it causes confusion, and it's the No. 1 source of ridicule. The system needs to stay because it's valuable for the other two groups, but it needs to change was the conclusion of the report. So they had a couple of recommendations and one was to just get rid of the two lowest colors because honestly we've never been at them; make the new normal orange. Three levels is probably more realistic than having five. The U.K. doesn't have five either, I think they have three.

...

Originally posted at InSecurity Complex

AVG Free 9 offers speed, lacks etiquette

By Seth Rosenblatt

CORRECTED October 15, 2009, 11:45 a.m.:The default search choice is not changed, as was mistakenly reported earlier. Also, it's not the user's home page that gets changed, but the new tab page. I've clarified the nonmandatory nature of the LinkScanner toolbar, and added information ...

Originally posted at The Download Blog

Podcast: Symantec researcher on biggest Patch Tuesday ever

By Larry Magid

...

Originally posted at For the Record

Google's Postini suffers prolonged e-mail delays

By Tom Krazit

As of 2:15 p.m. Tuesday e-mail delivery had started to return to normal for some Postini customers, although problems remained.

(Credit: Screenshot by Tom Krazit/CNET)

Some customers of Google's Postini e-mail security product experienced significant problems Tuesday, with reports of hours-long delays in e-mail delivery that ...

Originally posted at Relevant Results

Adobe fixes 28 holes in Reader and Acrobat

By Elinor Mills

Adobe on Tuesday released a security bulletin that includes fixes for 28 vulnerabilities in Adobe Reader and Acrobat, including a critical hole that has reportedly been exploited in the wild in limited attacks.

Affected software includes version 9.1.3 of Reader and Acrobat; Acrobat 8.1.6 for Windows, ...

Originally posted at InSecurity Complex

AVG LinkScanner can detect malicious short URLs

By Lance Whitney

URL shorteners may be handy for your tweets on Twitter. But they're also known security holes since they don't display the actual address of your destination. A free tool from security vendor AVG may provide a solution.

AVG has updated its free LinkScanner tool to detect malicious pages ...

Critical Windows 7 holes fixed in record Patch Tuesday

By Elinor Mills

Microsoft released a record number of 13 bulletins for 34 vulnerabilities on Patch Tuesday--and the first critical update for Windows 7--as well as fixes for zero-day flaws involving Server Message Block (SMB) and Internet Information Services (IIS).

The most severe of the three SMB flaws, which were first reported last month, ...

Originally posted at InSecurity Complex

Internet breaks in Sweden after DNS maintenance error

By Elinor Mills

A problem during routine maintenance of Sweden's top-level domain, .se, took down the Internet for the country for about an hour on Monday night.

Basically, the .se registry used an incorrectly configured script to update the .se zone, Sweden-based Pingdom, which monitors Web site performance, wrote in a blog post ...

Originally posted at InSecurity Complex

McAfee releases new security suite for Macs

By Lance Whitney

Updated 1:45am PST Tuesday with pricing information.

McAfee has released a new security suite designed to help businesses better handle security for their growing segment of Macintosh computers.

Targeting small to large companies, McAfee Endpoint Protection for Mac provides antivirus and antispyware features, ...

Barracuda snags Purewire in Web security play

By Elinor Mills

Security appliance maker Barracuda Networks has acquired Purewire, a Web security-as-a-service provider, the companies were set to announce on Tuesday.

The acquisition gives Barracuda the SaaS offering, but also adds to its security researcher and threat detection capabilities, the company said.

The companies did not disclose terms of the deal. ...

Originally posted at InSecurity Complex

CounterMeasures

Rik Ferguson blogs about security issues.

Searching for news of Kanye West’s Death leads to malware

By Rik Ferguson on web

Demonstrating the speed with with criminals now captialise on internet memes, criminals are using the strength of a prank/rumour to push malware.   A rumour started this morning that Kanye West had been killed in a “bizarre car accident”, the origin of this rumour has apparently been traced back to the 4chan message boards (although that blog posting appears [...]

More cybercrime as a service.

By Rik Ferguson on web

Yet more proof, if any were needed, of the firmly established underground criminal economy in the form of Scanning-as-a-Service.   Illicit competition for Virustotal has appeared in the form of a Russian website offering automated malware scanning-as-a-service to help their malware continue to fly under the radar of pattern-based detection.   Virustotal is an award-winning, entirely legitimate service that [...]

Darknet%20-%20Hacking,%20Cracking%20%26%20Computer%20Security

Darknet - The Darkside

Ethical Hacking, Penetration Testing & Computer Security

Retarded E-mails – Credit Cards, Coins, Bombs & More!

By Darknet on spammers

Ah it’s that time of the year again when all the back to skoolers have some mad l33t knowledge and wanna h4×0r the planet or something. Hmmm website hacking, sounds simple eh? thriller wrote: hai i would like to know website hacking how?……… sedn to my mail Ok I’m following up up to the exploding part? Not quite...
Read the full post at darknet.org.uk

Origami – Parse, Analyze & Forge PDF Documents

By Darknet on pdf security

origami is a Ruby framework designed to parse, analyze, and forge PDF documents. This is NOT a PDF rendering library. It aims at providing a scripting tool to generate and analyze malicious PDF files. As well, it can be used to create on-the-fly customized PDFs, or to inject (evil) code into already existing documents. Features Create PDF [...]
Read the full post at darknet.org.uk

Firefox Blocks Microsoft .NET Framework Assistant Add-on

By Darknet on windows presentation foundation

This is an interesting development, I noticed the pop-up on my Firefox yesterday. The reason however wasn’t security it was ‘instability’. It’s a fair move by Mozilla though as the add-on can cause security vulnerabilities in Firefox outside of their control. They can’t fix the software, so the best thing they can do...
Read the full post at darknet.org.uk

Naptha – TCP State Exhaustion Vulnerability & Tool

By Darknet on tcp security

The Naptha vulnerabilities are a type of denial-of-service vulnerabilities researched and documented by Bob Keyes of BindView’s RAZOR Security Team in 2000. The vulnerabilities exist in some implementations of the TCP protocol, specifically in the way some TCP implementations keep track of the state of TCP connections, and allow an attacker...
Read the full post at darknet.org.uk

Deep Packet Inspection Engine Goes Open Source

By Darknet on packet inspection

This is great news, especially for open source tool developers. Deep packet inspection is an extremely niche area and requires great expertise (and a lot of R&D of course). I hope a new project can spawn from this, it has many interesting applications. I think it’d be a good addition to Wireshark and IDS projects like [...]
Read the full post at darknet.org.uk

VIPER Lab’s VAST Live Distro – VoIP Security Testing LiveCD

By Darknet on voip-security-testing

VAST is a VIPER Lab live distribution that contains VIPER developed tools such as UCsniff, VoipHopper, Videojak, videosnarf, ACE, Warvox, and more. Along with VIPER tools and other essential VoIP security tools, it also contains tools penetration testers utilize such as Metasploit, Nmap, Netcat, Hydra, Hping2 etc. This distribution is a work in...
Read the full post at darknet.org.uk

UK Government To Launch ‘Hack Idol’

By Darknet on uk hacking contest

Now this should be interesting, perhaps they should turn it into a hacking based reality TV show? From the description though it looks more centered around defense than offense and perhaps should be called ‘System Administrator Idol’. Not quite so catchy though is it. Well at least they doing something to try and nurture talent in the...
Read the full post at darknet.org.uk

DarkReading - All Stories

DarkReading

DHS Secretary Says Cabinet-Level IT Position Unnecessary

cybersecurity, DHS, Homeland Security, Janet Napolitano, Obama, President Obama, cyber czar

Botnet Unleashes Variety Of New Phishing Attacks

Attackers use phony messages of system upgrades, Outlook updates, and Microsoft Conficker 'cleanup tool,' to spread malware

Security Software's New Form Factor: Free

Emerging security vendors take markets by storm by offering free versions of their software

Integrating WAFs And Vulnerability Scanners

Sharing vulnerability scanning data with a WAF could expedite process of shielding Web apps from newly discovered vulnerabilities, but also open the door for false positives

DIY: Defending Against A DDoS Attack

Proactive self-defense can make DDoS attacks less painful and damaging

Cost, Strength Of Security Drive Users Toward SaaS Offerings

New Dark Reading report offers a look at the strengths, weaknesses of security software-as-a-service offerings -- and how to choose the right provider

Patch Tuesday Is Microsoft's Biggest Ever

Microsoft issues 13 security bulletins disclosing 34 Windows vulnerabilities

Enterprises Continue To Struggle With Vulnerability Management

New Dark Reading report offers a look at how to find -- and fix -- security flaws in enterprise infrastructure

Five Ways To Meet Compliance In A Virtualized Environment

RSA, VMware unite security compliance and virtualization in new best practices guidelines

DarkReading - Security News

DarkReading

Verizon Business to Help Strengthen Network Security for NATO

Perimeter E-Security Launches Archive Manager to Address Federal Email Compliance and Maintain Business Operations During a Disaster

Online Sales of E Cigarettes Expected to Rise Over the Holidays

Suspect Detection Systems Inc. Sells Additional Cogito Interrogation Units to Federal Agency in Latin America

eWeek Security Watch

Diving Deep on Fake AV

In Spam

Phony AV programs that attempt to infect end users with malware have become an industry unto themselves, according to a new research report from Symantec.

Spam Uses Conficker Fear to Push Malware

In Virus and Spyware

Spammers are using a fake alert about the Conficker worm to scare users into downloading malware.

Password Strength Needs a Boost

In Privacy

Weak passwords continue to plague organizations, according to new research from academia.

Bad Actors Largely Unchecked in Cybercrime Efforts

In Virus and Spyware

Cybercriminals aren't slowing down as law enforcement and Web regulators have failed to find ways to stop them, experts observe.

Hot Spam: Targeted Phishing, Brand-Jacking

In Trojan attacks

Targeted spam and non-phishing brand abuse lead the way in this month's spam report published by McAfee's AVERT Labs.

USAF Report: Cyber War Not Under Radar

In Virus and Spyware

Governement-funded researchers are calling for greater consideration to be given to cyber-war, but not in terms of immediate investment.

Google Provides Malware Info to Webmasters to Improve Security

In Malware

Google has added a new feature to Webmaster Tools to provide more detailed information about malicious content it detects on the sites in its massive search index.

Federal Computer Week: Security News

Senate passes DHS IT funding increase

The Senate has passed legislation to fund the Homeland Security Department that has increases for major information technology programs. The House also approved the measure.

Federal student aid data isn't secure, IG says

The Education Department's student aid program risks unauthorized data loss or access problems if the department doesn't improve its information security, a new report says.

Napolitano asks public's help with cybersecurity

Homeland Security Secretary Napolitano said today cybersecurity is a shared responsibility and urged private persons to get involved.

Secret Service plans IT reboot

The Secret Service seeks information from companies as it prepares to modernize its information technology infrastructure.

SSA needs more planning for data systems upgrades, GAO says

The SSA is exchanging data more than one billion times a year and needs to do more to prepare for an increasing data exchange caseload, the GAO says.

Army cooks up new technology in AKO lab

A new test lab for the Army Knowledge Online and Defense Knowledge Online (AKO/DKO) Web portal gives service officials a safe and efficient way to test new applications and technologies for the site.

What you can do on AKO

Here are some of the features on the Army Knowledge Online and Defense Knowledge Online (AKO/DKO) Web portals.

Finding common cause

The global terrorist threat, brought to U.S. soil on 9/11, has not gone away. And it now includes the ever looming war in cyberspace.

Spam-borne malware surged in September

Spam messages that contained malicious attachments hit a high of 4.5 percent last month, a ninefold increase over the amount sent in August.

NASA info security controls are broken, GAO concludes

A GAO study found that an incomplete information security program has left weaknesses in NASA networks and information systems that could leave it open to disruption or penetration. But the space agency says improvements in security controls are being made.

Cyber warfare: Sound the alarm or move ahead in stride?

Military leaders and analysts say evolving cyber threats, which some believe could produce a "digital Hurricane Katrina," will require the Defense Department to work more closely with experts in industry.

Some key events in the history of cyber warfare

Track the timeline of significant cybersecurity attacks.

Recommended reading: Robots, Luddites and social media

Security gets scarier still; When IT workers are Luddites; Get to know your Nobel winners; How to win friends in social media

DHS agencies don't sustain info security programs, IG says

The Homeland Security Department's agencies must improve execution of the department's information security policies on a year-round basis, procedures and practices, DHS' inspector general said.

DHS would get more IT dollars under unified funding measure

A Senate-House committee wants to give the Homeland Security Department more money for several large information technology programs in fiscal 2010.

Leaders commended for contributions to info security

The sixth annual 2009 Government Information Security Leadership Awards were given by (ISC)2, an association that certifies information security professionals.

IRS wins some, loses a few in fight against identity theft and data loss

The IRS recorded more than 51,000 cases of taxpayer identity theft in 2008 and paid out $15 million in fraudulent refunds, and a GAO report finds that internal information security weaknesses constitute some of the most significant challenges faced by the agency.

Lawmaker urges Obama to appoint cybersecurity coordinator

President Barack Obama should quickly appoint a cybersecurity coordinator to ensure computer defense efforts are coordinated, a House member who oversees cybersecurity programs said today.

Info Security News

Carries news items (generally from mainstream sources) that relate to security.

Time Warner Cable Exposes 65, 000 Customer Routers to Remote Hacks

Posted by InfoSec News on Oct 22

http://www.wired.com/threatlevel/2009/10/time-warner-cable/
By Kim Zetter
Threat Level
Wired.com
October 20, 2009
A vulnerability in a Time Warner cable modem and Wi-Fi router deployed
to 65,000 customers would allow a hacker to remotely access the device's
administrative menu over the internet, and potentially change the
settings to intercept traffic, according to a blogger who discovered the
issue.
Time Warner acknowledged the problem...

Nonprofit Air Force Association recruits youth for cyber war games

Posted by InfoSec News on Oct 21

http://www.thedailytell.com/2009/10/nonprofit-air-force-association-recruits-youth-for-cyber-war-games/
By John Zorabedian
The Daily Tell
October 19, 2009
The nonprofit Air Force Association announced that 200 high schools from
44 states in the U.S., South Korea and Japan will participate in the
largest high school cyber defense competition ever staged starting
November 7.
Called CyberPatriot II, the war games are a way to promote careers...

What Did The Moon Scientist Want To Tell The Israelis? Some Clues

Posted by InfoSec News on Oct 21

http://politics.theatlantic.com/2009/10/what_did_the_moon_scientist_spy_tell_the_israelis_some_clues.php
Politics
Edited by Marc Ambinder
The Atlantic
Oct 19 2009
There's nothing like a good, diverting spy scandal. The FBI today
arrested an eminent space scientist, Stewart David Nozette, and charged
him with espionage. He allegedly agreed to sell information about
American nuclear weapons to an operative of Israel's Mossad -- only the...

DHS Secretary Says Cabinet-Level IT Position Unnecessary

Posted by InfoSec News on Oct 21

http://www.darkreading.com/security/government/showArticle.jhtml?articleID=220700409
By Kelly Jackson Higgins
DarkReading
Oct 20, 2009
The secretary of the Department of Homeland Security (DHS) today
basically dismissed the concept of a cabinet-level IT position for
technology and cybersecurity, noting that IT networks and services
underlie most operations today.
DHS Secretary Janet Napolitano delivered an unprecedented Web address
this...

ChoicePoint to pay $275,000 in latest data breach

Posted by InfoSec News on Oct 21

http://news.cnet.com/8301-27080_3-10379722-245.html
By Elinor Mills
InSecurity Complex
CNet News
October 20, 2009
ChoicePoint, one of the nation's largest data brokers, has been fined
$275,000 by the U.S. Federal Trade Commission for a data breach that
exposed personal information of 13,750 people last year.
In April 2008, ChoicePoint turned off a key electronic security tool
that it used to monitor access to one of its databases and failed...

NSA Director Tapped For Cyber Command

Posted by InfoSec News on Oct 21

http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=220700278
By J. Nicholas Hoover
InformationWeek
October 20, 2009
President Obama has, as expected, nominated National Security Agency
director Lt. Gen. Keith Alexander to be promoted to the rank of general
and assigned as commander of the new United States Cyber Command.
The Cyber Command, announced this summer, will be in charge of
cyberwarfare and the...

Top US scientist accused of trying to spy for Israel (fwd)

Posted by InfoSec News on Oct 20

http://www.telegraph.co.uk/news/worldnews/northamerica/usa/6380288/Top-US-scientist-accused-of-trying-to-spy-for-Israel.html
By Toby Harnden in Washington
Telegraph
19 Oct 2009
Stewart Nozette, 52, developed an experiment that fuelled the discovery
of water on the south pole of the moon, and held a special security
clearance at the United States Department of Energy on atomic materials.
He has been charged with .attempted espionage for...

Part 2: Q&A with Jeff Moss on computer hacking

Posted by InfoSec News on Oct 20

http://news.cnet.com/8301-27080_3-10377162-245.html
By Elinor Mills
InSecurity Complex
CNet News
October 19, 2009
Like many young hackers, Jeff Moss got his start copying computer games,
learned how to program, and began to explore the world through a modem.
Unlike many young hackers, Moss has managed to turn his computer and
social-networking skills into a business. He founded Defcon, the first
major hacker conference and the largest in...

Classified Info on Dangerous Chemicals Hacked

Posted by InfoSec News on Oct 20

http://www.koreatimes.co.kr/www/news/nation/2009/10/113_53708.html
The Korea Times
10-17-2009
Hackers stole classified information on dangerous chemicals in their
raid on the South Korean army computer network in what was believed to
be an attack by North Korea, Yonhap News Agency reported Saturday,
quoting government officials.
The Chemicals Accident Response Information System, used by 589 South
Korean government agencies including fire...

VoIP hack suspect fugitive extradited back to US

Posted by InfoSec News on Oct 20

http://www.theregister.co.uk/2009/10/19/hack_extradition/
By John Leyden
The Register
19th October 2009
A Venezuelan hacking suspect arrested in Mexico last February on
computer hacking and fraud charges faces a court appearance in New
Jersey on Tuesday, following his extradition to the US last week.
Edwin Pena, 26, a former Miami resident, fled from US justice in August
2006 two months after he was bailed on charges of hacking into phone...

Medical Records: Stored in the Cloud, Sold on the Open Market

Posted by InfoSec News on Oct 20

http://www.wired.com/threatlevel/2009/10/medicalrecords/
By Kim Zetter
Threat Level
Wired.com
October 19, 2009
When patients visit a physician or hospital, they know that anyone
involved in providing their health care can lawfully see their medical
records.
But unknown to patients, an increasing number of outside vendors that
manage electronic health records also have access to that data, and are
reselling the information as a commodity....

Botnet Unleashes Variety Of New Phishing Attacks

Posted by InfoSec News on Oct 20

http://www.darkreading.com/security/vulnerabilities/showArticle.jhtml?articleID=220700200
By Kelly Jackson Higgins
DarkReading
Oct 19, 2009
The massive Zbot botnet that spreads the treacherous Zeus banking Trojan
has been launching a wave of relatively convincing phishing attacks
during the past few days -- the most recent of which is a phony warning
of a mass Conficker infection from Microsoft that comes with a free
"cleanup...

NASA info security controls are broken, GAO concludes

Posted by InfoSec News on Oct 19

http://gcn.com/articles/2009/10/16/nasa-info-security-controls-broken.aspx
By William Jackson
GCN.com
Oct 16, 2009
Key information technology systems at NASA have weaknesses in several
critical areas that could lead to those systems being compromised,
according to the Government Accountability Office.
Although controls are being implemented as part of a risk-based
information security program, required under the Federal Information...

Ex-Ford Engineer Indicted For Allegedly Stealing Company Secrets

Posted by InfoSec News on Oct 19

http://www.darkreading.com/insiderthreat/security/attacks/showArticle.jhtml?articleID=220601211
By Kelly Jackson Higgins
DarkReading
Oct 16, 2009
Yet another major corporation may have been the victim of one of its own
stealing trade secrets: A former Ford Motor engineer has been indicted
for allegedly stealing thousands of sensitive documents from the company
and copying them onto a USB drive before taking a job with another auto
company....

38 Oracle security patches coming next week

Posted by InfoSec News on Oct 19

http://www.computerworld.com/s/article/9139500/38_Oracle_security_patches_coming_next_week?taxonomyId=17
By Robert McMillan
October 16, 2009
IDG News Service
After a record-setting week of Microsoft and Adobe security patches,
Oracle is gearing up for a major update of its own next week.
Next Tuesday, the database vendor will release its quarterly Critical
Patch Update, which "contains 38 security vulnerability fixes across
hundreds...

Q&A: Defcon's Jeff Moss on cybersecurity, government's role

Posted by InfoSec News on Oct 19

http://news.cnet.com/8301-27080_3-10376447-245.html
By Elinor Mills
InSecurity Complex
CNet News
October 16, 2009
As a hacker and organizer of Defcon, at event at which computer security
vulnerabilities and exploits are routinely unveiled, Jeff Moss seemed an
unusual choice when he was named to the Homeland Security Advisory
Council in June.
But his background and lack of government experience brings a fresh,
outsider's perspective to a...

PayChoice Suffers Another Data Breach

Posted by InfoSec News on Oct 18

http://voices.washingtonpost.com/securityfix/2009/10/paychoice_suffers_another_data.html
By Brian Krebs
Security Fix
The Washington Post
October 15, 2009
Payroll services provider PayChoice took its Web-based service offline
for the second time in a month on Wednesday in response to yet another
data breach caused by hackers.
Moorestown, N.J. based PayChoice, provides direct payroll processing
services and licenses its online employee...

CanSecWest 2010 CALL FOR PAPERS (deadline Nov 30, conf. Mar 22-26) and PacSec (Nov 4/5) Selections

Posted by InfoSec News on Oct 18

Forwarded from: Dragos Ruiu <dr (at) kyx.net>
We extend our apologies if you are inconvenienced by multiple copies of
this messages.
We would like to announce the PacSec 2009 Paper Selections, and the
opening of the 2010 CanSecWest Call For Papers. Given the proximity of
the Winter Olympics in Vancouver one month before the conference, we
would advise all planning to attend to make travel preparations well in
advance for next year......

Linux Advisory Watch - October 16th 2009

Posted by InfoSec News on Oct 18

+----------------------------------------------------------------------+
| LinuxSecurity.com Weekly Newsletter |
| October 16th, 2009 Volume 10, Number 42 |
| |
| Editorial Team: Dave Wreski <dwreski () linuxsecurity com> |
| Benjamin D. Thomas <bthomas () linuxsecurity...

Secretary to address Cybersecurity on Tuesday

Posted by InfoSec News on Oct 18

Forwarded from: Jeff Moss <jmoss (at) blackhat.com>
"Tuesday, October 20 2009, 11:00 a.m. EDT, Secretary Napolitano will
deliver a live webcast address about the urgent need to counter the
threat of cyber attacks, and the shared responsibility in staying safe
online. Visit www.dhs.gov on Tuesday to watch this live address.
Increasing the general public's awareness about computer and online
risks is a critical part of...

Home sec puts McKinnon extradition on hold

Posted by InfoSec News on Oct 18

http://www.theregister.co.uk/2009/10/18/mckinnon_delay/
By Team Register
The Register
18th October 2009
The Home Office has agreed to a delay in extradition proceedings for
Pentagon hacker Gary McKinnon while Home Secretary Alan Johnson and
government lawyers reconsider evidence in the case.
Washington has been demanding McKinnon go on trial in the US for
breaking into Pentagon computer systems back in 2002. He has never
denied tapping...

DHS agencies don't sustain info security programs, IG says

Posted by InfoSec News on Oct 15

http://fcw.com/articles/2009/10/15/web-dhs-inspector-general-fisma.aspx
By Ben Bain
FCW.com
Oct 15, 2009
Homeland Security Department agencies don.t sustain their information
security programs year-round or perform continuous monitoring to
maintain systems. accreditations and action plans, according to DHS
Inspector General Richard Skinner.
The IG's findings come from an annual independent evaluation of the
department's information...

Has Delta been hacking?

Posted by InfoSec News on Oct 15

http://www.chron.com/disp/story.mpl/business/steffy/6666406.html
By LOREN STEFFY
The Houston Chronicle
Oct. 14, 2009
It started a couple of months ago with a laptop that inexplicably
crashed.
Then, someone altered the password on Kate Hanni's desktop computer and
when she finally got into it, the files were corrupted.
Microsoft's tech support said she'd been hacked. A few weeks later, all
her e-mail disappeared, and AOL told her the same...

New Fake Antivirus Attack Holds Victim's System Hostage

Posted by InfoSec News on Oct 15

http://www.darkreading.com/vulnerability_management/security/antivirus/showArticle.jhtml;jsessionid=FIWCQFEV0MTMDQE1GHRSKHWATMY32JVN?articleID=220601022
By Kelly Jackson Higgins
DarkReading
Oct 15, 2009
Attackers have added a new twist to spreading fake antivirus software:
holding a victim's applications for ransom.
Researchers discovered a Trojan attack that basically freezes a user's
system unless he purchases the rogueware, which goes for...

Best cyber offense is a good defense, RAND report says

Posted by InfoSec News on Oct 15

http://news.cnet.com/8301-13639_3-10375164-42.html
By Mark Rutherford
Military Tech
CNet News
October 15, 2009
A new RAND Corporation report suggests the U.S. may be better off
playing defense and pursuing diplomatic, economic, and prosecutorial
efforts against cyberattackers, instead of making strategic cyberwarfare
an investment priority.
The study comes as the U.S. military fires up its new unified Cyber
Command (USCYBERCOM) program...

Secunia Weekly Summary - Issue: 2009-42

Posted by InfoSec News on Oct 15

========================================================================
The Secunia Weekly Advisory Summary
2009-10-08 - 2009-10-15
This week: 48 advisories
========================================================================
Table of Contents:
1.....................................................Word From...

With botnets everywhere, DDoS attacks get cheaper

Posted by InfoSec News on Oct 15

http://www.computerworld.com/s/article/9139398/With_botnets_everywhere_DDoS_attacks_get_cheaper?taxonomyId=17
By Robert McMillan
October 14, 2009
IDG News Service
Cyber-crime just doesn't pay like it used to.
Security researchers say the cost of criminal services such as
distributed denial of service, or DDoS, attacks has dropped in recent
months. The reason? Market economics. "The barriers to entry in that
marketplace are so low you...

Advertising - j4m - Call for Sponsors

Posted by InfoSec News on Oct 15

Forwarded from: Ralf Braga <ralfbraga (at) gmail.com>
Just4Meeting - Network and Security Workshop very technical -
Cascais/Portugal - 25-27th - June - 2010 (*Invitation Only*)
This version is aimed at professionals who are directly linked to the
area of Information Security, Incident Response, Pentests, Security
Assessment and has short time of response to bring the best conclusion
to your customers, boss or manager. Applied by...

Bloggers howl after conference snoops on 'secure' network

Posted by InfoSec News on Oct 15

http://www.theregister.co.uk/2009/10/15/sector_network_monitoring_bruhaha/
By Dan Goodin in San Francisco
The Register
15th October 2009
Organizers of last week's SecTor security conference collected names,
passwords, and all other traffic passing over two Wi-Fi networks
provided to attendees, including one that was encrypted, the event's
director has confirmed.
Borrowing a page from the Wall of Sheep at the Defcon hacker conference
each...

DHS Web sites vulnerable to hackers, IG says

Posted by InfoSec News on Oct 13

http://fcw.com/articles/2009/10/09/dhs-web-sites-vulnerable-to-hackers-ig-says.aspx
By Alice Lipowicz
FCW.com
Oct 09, 2009
The Homeland Security Department's most popular Web sites appear to be
vulnerable to hackers and could put department data at risk of loss or
unauthorized use, according to a new report from DHS Inspector General
Richard Skinner.
An audit of cybersecurity for DHS' nine most frequently visited Web
sites found that...

InformationWeek Security News

InformationWeek

Secret Service To Revamp Ailing IT Systems

By J. Nicholas Hoover

In an effort to avoid 'mission failure,' the agency plans to deploy new storage systems, virtualize servers, modernize databases, and expand mobile and wireless capabilities.

Web 2.0 Summit: PayPal's Platform Plans

By Thomas Claburn

With talk of the death of cash, PayPal president Scott Thompson painted a rosy future for payments delivered through mobile devices.

Web 2.0 Summit: PayPal's Platform Plans

By Thomas Claburn

With talk of the death of cash, PayPal president Scott Thompson painted a rosy future for payments delivered through mobile devices.

Google Search Appliance Gets Smart

By Thomas Claburn

Corporate searchers can now look forward to more relevant search results, thanks to improvements in the Google Search Appliance.

Google Search Appliance Gets Smart

By Thomas Claburn

Corporate searchers can now look forward to more relevant search results, thanks to improvements in the Google Search Appliance.

NSA Director Tapped For Cyber Command

By Phil Hippensteel

Lt. Gen. Keith Alexander will be in charge of cyberwarfare and the security of military networks.

NSA Director Tapped For Cyber Command

By J. Nicholas Hoover

Lt. Gen. Keith Alexander will be in charge of cyberwarfare and the security of military networks.

Mozilla Restores Blocked Microsoft Extension For Firefox

By Thomas Claburn

A controversial Firefox extension is working again after being blocked as a security risk over the weekend.

Mozilla Restores Blocked Microsoft Extension For Firefox

By Thomas Claburn

A controversial Firefox extension is working again after being blocked as a security risk over the weekend.

Facebook, Twitter Join Google In Net Neutrality Battle

By Thomas Claburn

New rules governing online communication are expected later this week and Internet companies are making sure their concerns are heard.

Full Nelson: The Growing Threat Of Cyberwarfare

By Fritz Nelson

Many more casualities will pile up, but policy and agreements will prove meaningless against today's anonymous cyberwarrior.

Full Nelson: The Growing Threat Of Cyberwarfare

By Fritz Nelson

Many more casualities will pile up, but policy and agreements will prove meaningless against today's anonymous cyberwarrior.

Global CIO: In Oracle Vs. SAP, IBM Could Tip Balance To SAP

By Bob Evans

Column about Oracle needing a lot of allies beyond Salesforce.com since it plans to compete with both IBM and SAP.

Global CIO: In Oracle Vs. SAP, IBM Could Tip Balance To SAP

By Bob Evans

Column about Oracle needing a lot of allies beyond Salesforce.com since it plans to compete with both IBM and SAP.

Global CIO: In Oracle Vs. SAP, IBM Could Tip Balance

By Bob Evans

Column about Oracle needing a lot of allies beyond Salesforce.com since it plans to compete with both IBM and SAP.

NASA Told To Plug IT Security Holes

By J. Nicholas Hoover

The space agency has suffered hundreds of security incidents, including malware, data breaches, stolen laptops, and bot nets, according to the GAO.

NASA Told To Plug IT Security Holes

By J. Nicholas Hoover

The space agency has suffered hundreds of security incidents, including malware, data breaches, stolen laptops, and bot nets, according to the GAO.

Google Tips For Burying Ugly Search Results

By Thomas Claburn

To manage your search engine reputation, Google suggests saying less is more, except when saying more is more.

Google Tips For Burying Ugly Search Results

By Thomas Claburn

To manage your search engine reputation, Google suggests saying less is more, except when saying more is more.

Laptop Theft Nets Data On 800,000 Doctors

By Thomas Claburn

The stolen laptop contained personal data on nearly every physician in the country.

Laptop Theft Nets Data On 800,000 Doctors

By Thomas Claburn

The stolen laptop contained personal data on nearly every physician in the country.

Mozilla Launches Plugin Check To Secure Firefox

By Thomas Claburn

Browser security suffers when plugins aren't up-to-date. So Mozilla has developed a Web-based plugin update checker.

Mozilla Launches Plugin Check To Secure Firefox

By Thomas Claburn

Browser security suffers when plugins aren't up-to-date. So Mozilla has developed a Web-based plugin update checker.

Adobe Fixes 29 Flaws In Acrobat And Reader

By Thomas Claburn

At least one of the vulnerabilities addressed is being actively exploited.

Google Postini Customers Fuming About Outage

By Thomas Claburn

E-mail delivery problems dogged Google's Postini on Tuesday, and the company's business customers are demanding better communication.

Google Postini Customers Fuming Over Outage

By Thomas Claburn

E-mail delivery problems dogged Google's Postini Tuesday, and the company's business customers are demanding better communication.

Google Postini Customers Fuming Over Outage

By Thomas Claburn

E-mail delivery problems dogged Google's Postini Tuesday, and the company's business customers are demanding better communication.

Google Postini Customers Fuming Over Outage

By Thomas Claburn

E-mail delivery problems dogged Google's Postini Tuesday, and the company's business customers are demanding better communication.

Google Postini Customers Fuming Over Outage

By Thomas Claburn

E-mail delivery problems dogged Google's Postini Tuesday, and the company's business customers are demanding better communication.

AT&T Bolsters Managed Security Services

By Marin Perez

The carrier's offerings aim to provide enterprise customers with security threat analysis and customizable device management.

AT&T Bolsters Managed Security Services

By Marin Perez

The carrier's offerings aim to provide enterprise customers with security threat analysis and customizable device management.

Apple Acknowledges Snow Leopard Bug

By Antone Gonsalves

The flaw, which may delete personal data, is related to a change in the way the operating system handles guest accounts.

Microsoft Releases Mammoth Security Patch

By Thomas Claburn

The company's 13 security bulletins set a record and bring Windows 7 its first official fixes.

Cyberwar Readiness Recast As Low Priority

Preparedness for cyberwar should have a place in U.S. defense planning, but resources are better spent on bolstering potentially vulnerable infrastructure, according to think tank RAND.

Cyberwar Readiness Recast As Low Priority

Preparedness for cyberwar should have a place in U.S. defense planning, but resources are better spent on bolstering potentially vulnerable infrastructure, according to think tank RAND.

T-Mobile, Microsoft Promise $100 Gift Card For Lost Data

By Thomas Claburn

But most customers will see their data restored, the two companies hope.

InSecurity Complex

Keeping tabs on flaws, fixes, and the people behind them.

Microsoft fixing Bing bug that aided spammers

By Elinor Mills

Microsoft on Wednesday said it is fixing a bug in Bing that allowed spammers to bypass spam filters and distribute malicious links.

Researchers at Webroot Software discovered a spam campaign earlier this week that used the search engine's own redirection mechanism and a link-shrinking technique to send people to ...

ChoicePoint to pay $275,000 in latest data breach

By Elinor Mills

ChoicePoint, one of the nation's largest data brokers, has been fined $275,000 by the U.S. Federal Trade Commission for a data breach that exposed personal information of 13,750 people last year.

In April 2008, ChoicePoint turned off a key electronic security tool that it used to ...

Time Warner testing fix to hole in home router

By Elinor Mills

This is the SMC8014WG-S cable modem/Wi-Fi router provided to Time Warner cable customers that has a security hole.

(Credit: SMC)

Time Warner has rolled out a temporary patch and is testing a permanent fix for a security hole in a combination cable modem/Wi-Fi router that could allow anyone ...

Leaking crypto keys from mobile devices

By Elinor Mills

Security researchers have discovered a way to steal cryptographic keys that are used to encrypt communications and authenticate users on mobile devices by measuring the amount of electricity consumed or the radio frequency emissions.

The attack, known as differential power analysis (DPA), can be used to target an unsuspecting victim ...

Part 2: Q&A with Jeff Moss on computer hacking

By Elinor Mills

Jeff Moss

(Credit: Darington Forbes)

Like many young hackers, Jeff Moss got his start copying computer games, learned how to program, and began to explore the world through a modem.

Unlike many young hackers, Moss has managed to turn his computer and social-networking skills into a business. He founded Defcon, ...

Q&A: Defcon's Jeff Moss on cybersecurity, government's role

By Elinor Mills

Jeff Moss, founder of Black Hat and Defcon.

(Credit: Darington Forbes)

As a hacker and organizer of Defcon, an event where computer security vulnerabilities and exploits are routinely unveiled, Jeff Moss seemed an unusual choice when he was named to the Homeland Security Advisory Council in June.

But his background and lack of government experience brings a fresh, outsider's perspective to a public sector plagued by a fast-changing threat landscape, perpetual turf wars, and bureaucratic inertia.

With National Cyber Security Awareness Month under way, CNET News discussed with Moss his new role, his thoughts on the national ID card debate, and how the government wants to use social media sites for public emergency alerts. This edited interview is the first of two parts. Part two will run on Monday.

Q: So, how's it going on the Homeland Security Advisory Council?
Moss: It's going pretty well, it's pretty exciting actually. Recently we did a recommendation, I'm sure you read about it, the homeland security color codes. There are the five color codes. Normally the country is on like yellow or orange. I think we've only been to red once. But we've never been to the two lowest, blue and green. So the system was up for review. It turns out that the color codes work really well for industry and government. They have procedures in place. They do things automatically when the color codes are changed. It is actually successful for them but for the third group that uses them, civilians, it actually doesn't work well at all.

Right. We don't understand it. We're like, what does it mean? Is it real?
Moss: How does it give us any actionable information? How should we change our behavior based on it? That's what came out of the report was that it's very hard for civilians to do anything with it and it causes confusion, and it's the No. 1 source of ridicule. The system needs to stay because it's valuable for the other two groups, but it needs to change was the conclusion of the report. So they had a couple of recommendations and one was to just get rid of the two lowest colors because honestly we've never been at them; make the new normal orange. Three levels is probably more realistic than having five. The U.K. doesn't have five either, I think they have three.

...

Adobe fixes 28 holes in Reader and Acrobat

By Elinor Mills

Adobe on Tuesday released a security bulletin that includes fixes for 28 vulnerabilities in Adobe Reader and Acrobat, including a critical hole that has reportedly been exploited in the wild in limited attacks.

Affected software includes version 9.1.3 of Reader and Acrobat; Acrobat 8.1.6 for Windows, ...

Critical Windows 7 holes fixed in record Patch Tuesday

By Elinor Mills

Microsoft released a record number of 13 bulletins for 34 vulnerabilities on Patch Tuesday--and the first critical update for Windows 7--as well as fixes for zero-day flaws involving Server Message Block (SMB) and Internet Information Services (IIS).

The most severe of the three SMB flaws, which were first reported last month, ...

Internet breaks in Sweden after DNS maintenance error

By Elinor Mills

A problem during routine maintenance of Sweden's top-level domain, .se, took down the Internet for the country for about an hour on Monday night.

Basically, the .SE registry used an incorrectly configured script to update the .se zone, Sweden-based Pingdom, which monitors Web site performance, wrote in a blog post ...

Barracuda snags Purewire in Web security play

By Elinor Mills

Security appliance maker Barracuda Networks has acquired Purewire, a Web security-as-a-service provider, the companies were set to announce on Tuesday.

The acquisition gives Barracuda the SaaS offering, but also adds to its security researcher and threat detection capabilities, the company said.

The companies did not disclose terms of the deal. ...

McAfee Avert Labs

Cutting edge security research as it happens.......

Windows 7 Beaten to the Punch by Spam

By David Marcus on Web and Internet Safety

The release of Microsoft’s next major operating system, Windows 7, is at hand. It’s timely to remind everyone that we have seen Windows 7 spam for a few months. Anything on this scale from Microsoft is too big a lure for spammers and cybercriminals to ignore. (I would be stunned if they didn’t take advantage.) [...]

Russian Spam on YouTube

By Paras Gupta on Spam and Phishing

We had earlier blogged about spammers abusing different social networking websites and taking full advantage to host their spam on them. Recently researchers at McAfee Labs came across a new spam campaign in which yet another big social networking website, YouTube, is being abused. As we know, YouTube is a video sharing website on which users [...]

Cybercrime Organizations Turn to ‘Mafia-Style’ Structure

By Francois Paget on Web and Internet Safety

In Las Vegas during this month’s McAfee FOCUS 09 conference, I listened to various speakers in the Threats and Trends track. They explained how cybercrime was now managed by individuals driving their groups according to highly professional business models. One of the most interesting talks was made by my colleague Dirk Kolberg, who presented on Innovative [...]

ASCII Art Spam Strikes Back

By Sharath Veerabhadraswamy on Web and Internet Safety

Spammers are always looking for techniques that can beat the spam filters. We have seen various techniques for spamming–like obfuscating words, embedding text in images, spoofing urls, abusing social networking sites, and many other techniques for spam to avoid getting caught. One of these techniques is ASCII art, an artful way of representing an image using [...]

Obama Nobel Prize Spam Links to Malware and Drive-By Attacks

By Sam Masiello on Web and Internet Safety

Just when I thought we weren’t going to see any spam campaigns related to the recent announcement of United States President Barack Obama being awarded the Nobel Peace Prize, I was proven wrong. Spammers rarely disappoint when a juicy news story hits. It’s like attracting flies to honey. This spam campaign calls into question whether Obama deserved to [...]

Latest PDF Zero Day Leads to Exploit Egg Hunt

By Jon Paterson and Dennis Elser on Zero-Day

Client-side exploitation continues to be a popular attack vector. Another zero-day attack has targeted Adobe Acrobat Reader to infiltrate customer networks. The currently unpatched exploit opens the door to code execution when a victim simply reads a malicious PDF document. This JavaScript code is viewable only if the stream had been unpacked, as can be seen [...]

McAfee Labs and the International Spy Museum

By David Marcus on Zero-Day

Surrounded by a network of neon lights across the ceiling, walls of computer screens lit with grave headlines regarding our country’s digital dependence–drinking water, sewer systems, banks, government systems, all vulnerable to an electrical grid outage–I introduced my wife and my sixteen-year-old daughter to our latest McAfee endeavor, an exhibit contributor in the new International [...]

Network World on Security

The latest security news, analysis, reviews and feature articles from NetworkWorld.com.

Coffins in the mail are a trick of the cybercrime trade

There's never been a better time to get involved in cybercrime.

Two out of five at risk from Wi-Fi hijacking

Two out of five web users are at risk of having their Wi-Fi connection hijacked, says TalkTalk.

75% of Brits against cutting off illegal downloaders

Nearly three-quarters of Brits are against the government's plan to cut off internet access of those suspected of illegal file-sharing, says the Open Rights Group.

Consumers should clean up their act on personal security

PC users leave too many clues fore hackers - and social networking sites make the problem worse warns a researcher

Gartner on cloud security: 'Our nightmare scenario is here now'

Virtualization and cloud computing shaking up the old order, and the customary control is slipping away from security managers as the revolution unfolds.

Experts see forecast worsen for cybercrime

Law enforcement agencies can count a few recent victories against cybercriminals, but agents say the battle against them isn't getting any easier.

Understanding and implementing information security metrics

One of the cornerstones of the scientific method is measurability: a focus on defining the ways of counting or measuring aspects of reality that we hope will be strongly associated with the phenomena we are trying to understand.

Researchers see Gumblar attacks surge again

Security researchers are seeing a resurgence of Gumblar, the name for a piece of malicious code that is spread by compromising legitimate but insecure Web sites.

Iconix settles charges of violating children's privacy law

Iconix Brand Group, which sells clothing for children and teens under several brands, will pay a US $250,000 civil penalty to settle U.S. Federal Trade Commission charges that it violated a law prohibiting companies from collecting and using children's personal information without parental permission.

Scientist who found water on moon arrested for espionage

Stewart Nozette, a scientist who once worked on the Star Wars missile defense project, has been arrested in connection with an attempt to sell top secret information to a foreign intelligence agency.

Five Reasons Windows XP Has About a Year to Live

Windows XP, still strong after eight years, may die sooner than you think in the enterprise, Forrester says. From support concerns to deployment flexibility, here are some factors speeding XP's demise.

Profile of an IT forensics professional

A snapshot look at the IT forensics profession from the perspective of Rob Lee, an IT forensics expert at Mandiant.

Baited and duped on Facebook

When CIO Will Weider encouraged employees at Ministry Health Care and Affinity Health System in Wisconsin to use Facebook to spread the word about new programs and successful projects, he was surprised at the result: Few did so.

How hackers find your weak spots

While there are an infinite number of social engineering exploits, typical ones include the following:

ChoicePoint to pay fine for second data breach

Data broker ChoicePoint, the victim of a 2004 data breach affecting more than 160,000 U.S. residents, has agreed to strengthen its data security efforts and pay a fine for a second breach in 2008, the U.S. Federal Trade Commission said Monday.

Scams & shams: The trouble with social networks

It's hard to understand who in their right mind would want to incur the wrath of "Triple H," the intimidating superstar of professional wrestling. But when a poser created a fraudulent MySpace account in Triple H's name, it wasn't the wrestler that the perpetrator had to contend with.

Public cloud vs. internal social networks

Jaime Gesswein says it's his job to be paranoid.

Hijacked Web sites attack visitors

Here's the scenario: Attackers compromise a major brand's Web site. But instead of stealing customer records, the attacker installs malware that infects the computers of thousands of visitors to the site. The issue goes unnoticed until it's exposed publicly.

Mozilla unblocks one sneaky Microsoft add-in

Mozilla has unblocked one of the two Microsoft-made add-ons that put Firefox users at risk from attack and will probably unblock the second in the next 48 hours, the company's head of engineering said today.

BT's Web 2.0 security strategy

In 2006, just as the first tweet was being Twittered, BT Global Services launched an effort to keep its customers and 112,000 employees safe in a new world of Web-based communities and other interactive sites.

Symantec: Rogue Security Software is Big Business for Crooks

The bogus ads are everywhere. A pop-up tells you: "Your computer may be infected" and urges you to download security software that will scan your computer for viruses, protect it from future infection or both. The problem is most of these products are scams that give you software which is useless. In some cases, the software is even dangerous because it downloads malicious code onto your computer.

CIA Building Secure Cloud-based System

The secretive CIA, one of the U.S. government's strongest advocates of cloud computing, believes an internal cloud can make the agency's IT environments more flexible and secure.

Microsoft issues first Windows 7 patches

Microsoft's massive security update last week included patches for nine Windows 7 vulnerabilities, far fewer than were issued for Windows Vista and Windows XP.

Mozilla unblocks Microsoft add-on for Firefox

Mozilla has now unblocked a Microsoft add-on thought to pose a danger due to a software vulnerability, but a second add-on remains blocked, the organization said on Sunday.

Symantec calls 'SpywareGuard' and 'AntiVirus' top scareware threats

Fake security software "SpywareGuard" and "AntiVirus" are said to be the top two scareware programs out of about 250 fake security programs detected, according to a Symantec report.

A Guide to Windows 7 Security

Until now, Windows Vista was the most secure version of the Windows operating system. Windows 7 picks up where Vista left off, and improves on that foundation to provide an even more secure computing experience. Microsoft also incorporated user feedback about Vista to enrich the user experience and to ensure that the security features are intuitive and user-friendly. Here's a look at some of the more significant security enhancements in Windows 7.

Scareware earns cybercriminals £850,000 a year

Cybercriminals are earning as much as £858,000 a year out of scareware, says Symantec.

Mozilla blocks Microsoft's sneaky Firefox plug-in

Mozilla has blocked the Microsoft-made software -- an add-on dubbed ".NET Framework Assistant" and a plug-in named "Windows Presentation Foundation" -- that had put Firefox users at risk from attack.

Mozilla blocks Microsoft's sneaky Firefox plug-in

Mozilla late Friday blocked the Microsoft-made software that had put Firefox users at risk from attack.

Windows 7 Migration: Four Planning Tips

As you plan for your enterprise Windows 7 deployment, you can also clean house and improve efficiency. Here's a look at four key areas to consider.

Week in security: NASA fails, Microsoft sneaks, Zeus phishing, cyber security fiction?

A look back at the week's biggest security-related news stories.

Ex-Ford engineer charged with trade secret theft

A former product engineer at Ford Motor Co. has been charged with stealing sensitive design documents from the auto maker worth millions of dollars.

Microsoft's free AV got 1.5 million downloads in first week

Microsoft registered more than 1.5 million downloads of its free antivirus software in the week after it shipped.

PayChoice breached for the second time this month

For the second time this month, PayChoice Inc., a large online provider of payroll processing services, has had to shut down its online portal because of a security breach.

Microsoft, Sidekick, and other high-tech disasters

The Sidekick soap opera continues today, with the report that maybe Microsoft didn't lose all of the Sidekick subscribers' personal data after all. That's good news, naturally. But we're still waiting to hear the official account of what exactly went wrong at Danger Inc.

Obama calls on Americans to help with cybersecurity

U.S. President Barack Obama has urged Americans to help guard against cyberattacks in a first-of-its-kind video published on the White House Web site.

38 Oracle security patches coming next week

After a record-setting week of Microsoft and Adobe security patches, Oracle is gearing up for a major update of its own next week.

Sneaky Microsoft plug-in puts Firefox users at risk

An add-on that Microsoft silently slipped into Mozilla's Firefox last February leaves that browser open to attack, Microsoft's security engineers acknowledged earlier this week.

Fake antivirus attacks PCs with ransom demand

The Fake antivirus phenomenon has taken an unpleasant turn with the discovery of a Windows program that not only cons users into buying an unnecessary license but appears to lock files and applications on the victim's PC.

Hacked Facebook apps lead to fake antivirus software

New applications are turning up on Facebook. Unfortunately, some of them are fake antivirus programs.

Online libel case stirs up free speech debate

An Illinois politician's attempt to unmask the identity of an e-mail poster who allegedly made disparaging remarks about her teenage son in an online forum is stirring a debate about free speech rights on the Internet.

Global State of Information Security Survey Methodology

How we got the numbers.

Mozilla will let rival browsers run Firefox security tool

Mozilla plans to let people running rivals' browsers use Firefox's new plug-in update service, company officials said today.

Why Security Matters Now

Today's most compelling technologies are giving you the biggest security headaches. Social networking sites such as Twitter, Facebook and LinkedIn enhance collaboration and help your company connect with customers, but they also make it easier than ever for your employees to share customer data and company secrets with outsiders.

Microsoft Sidekick Debacle & the Cloud: Lessons Learned

This week's cloud tempest is the very visible breakdown of Microsoft's Danger storage service for the T-Mobile Sidekick phone. An apologetic email (as reported by TechCrunch) first went out from Microsoft to users noting that all data had been lost with no way to recover it. Apparently, it now seems that some or most of the data will be recovered, which is, of course, good news. I don't know that Microsoft has provided any formal explanation of what went wrong, but most of the speculation I've seen identifies a failed SAN upgrade with no data backup available as the cause for the data loss.

Storage pros worry about putting data in the cloud

Cloud storage platforms need to mature before they are enterprise-ready, particularly for customers in highly regulated industries.

How data security can vaporize in the cloud

While cloud computing services offer a way to lower costs and offload basic server and storage maintenance to companies that purport to have expertise, it also presents dramatic security and legal challenges that should be considered before signing up.

L.A. critics of Google cloud services need a little perspective

A consumer group protesting the use of Google cloud services by the City of Los Angeles says the company is speaking out of both sides of its mouth about security, but the complaint may be overblown.

Five Problems Keeping Legacy Apps Out of the Cloud

Did you think all those legacy apps would just float up into someone else's cloud infrastructure? Management, licensing and migration concerns highlight the list of troubles that vendors are now trying to address.

U.S. Dept. of Education ties desktop encryption to employee ID cards

The Department of Education’s desktop encryption rollout links the cryptographic process to employees’ government-issued smart cards.

With botnets everywhere, DDoS attacks get cheaper

Cyber-crime just doesn't pay like it used to.

Opera delivers Unite beta, touts in-browser P2P

Opera Software today released the beta of Opera Unite, a platform for authoring peer-to-peer (P2P) and Web server-based applications that it believes will reinvent the Web.

In six years of Patch Tuesdays, 400 security bulletins, 745 vulnerabilities

Microsoft's massive security update for October marked the completion of the sixth year of the company's move to a monthly patch release schedule.

To boost security, Mozilla launches plugin checker

Mozilla developers have launched a new online tool that tells Firefox users whether popular add-on components such as Java or QuickTime are up to date.

Microsoft patches last major ATL bugs

Microsoft yesterday wrapped up a months-long job of patching a critical bug it accidently introduced in a crucial code "library," one of the researchers who uncovered the flaw said today.

2009: The year your data died

For a while there it looked like 2009 would be remembered as the Year of the Dead Celebrity. But Michael, Farrah, Walter, Ed, and all the rest may have to move over. This is rapidly becoming the Year the Data Died.

Facebook applications at risk from attack

A number of Facebook applications, including one called CityFireDepartment, has been hacked and tries to attack site visitors’ computers via unpatched Adobe software vulnerabilities, a researcher says.

Delta Air Lines sued over alleged e-mail hacking

Delta Air Lines is being sued for allegedly hacking the e-mail account of a passenger rights advocate supporting legislation that would allow access to food, water and toilets during long delays on the tarmac.

McAfee security offering targets networks with Macs

McAfee has announced McAfee Endpoint Protection for Mac, a security product aimed specifically at businesses with Macs on their networks.

The Patch Tuesday Survival Guide

Overwhelmed by Tuesday's security patch avalanche from Microsoft and Adobe? Here's a collection of articles that will help you approach patch management with sanity.

More web users reporting child pornography

More web users than ever are reporting incidences of child pornography images on the web, says the Internet Watch Foundation (IWF).

Federal gov't releases response to Privacy Act

The Federal Government has released its first response to a comprehensive review of Australia's privacy laws in the digital age.

How Dow Trains Towns to Handle Hazmat Situations

How prepared are emergency responders to deal with a chemical spill that could have serious health an environmental implications? The answer to that varies widely depending on the size of the community and the budget of the emergency departments. That's where a program called TRANSCAER comes in.

Ad-Aware Pro: More Tools, Network Protection

The Ad-Aware series of products have long been known primarily for Ad-Aware Free, a famous and free piece of anti-spyware software. But Lavasoft's products include for-pay Ad-Aware Plus and Pro versions as well. Designed primarily for businesses, Ad-Aware Pro (various pricing; $40 for a one-year, single-user license) includes anti-virus, network protection, and a variety of advanced tools. The Pro version is the most comprehensive program in the lineup.

Sidekick meltdown is a cloud security issue

Anyone considering cloud computing and data security has to take pause at the colossal mistake at Microsoft/Danger over the weekend.

Ad-Aware Free Protects Against Rootkits

Ad-Aware Free has long been one of the most popular spyware killers on the planet, and with good reason. It's simple to use, does an excellent job of detecting and killing spyware, and stays out of your way as much as possible. The fact that it's free for personal home use doesn't hurt, either.

Ad-Aware Plus Adds Features Above Free Version

The Ad-Aware series of products have long been known primarily for Ad-Aware Free, the free piece of anti-spyware software. But it also has the for-pay Ad-Aware Plus ($27 for a one-year, single-user license) as well, which includes anti-virus capabilities.

Cyber criminals find new ways to attack

Cyber criminals are finding new ways to steal information, including infecting legitimate Web sites with Trojans and creating rogue software packages that look legitimate but contain malware, cybersecurity experts warned.

AVG upgrades free security tool to scan shortened URLs

AVG has added a feature to its LinkScanner Web security product that scans shortened URLs, which can often blindly lead users into a malicious software attack.

Free tool protects Twitter users from malware hiding behind tiny URLs

AVG Technologies is offering a free tool to protect Twitter users from malicious sites that lurk behind shortened URLs.

ID fraud crime surges by a third

The number of victims of ID fraud in the UK rose by a third in 2009 compared to the previous year, said the CIFAS.

Google to send detailed information about hacked Web sites

In an effort to promote the "general health of the Web," Google will send Webmasters snippets of malicious code in the hopes infected Web sites can be cleaned up faster.

The%20Register

The Register - Security

Biting the hand that feeds IT

Crypto spares man who secretly video taped flatmates
Police can't crack code

An Australian man who set up an elaborate network of hidden cameras to spy on his flatmates has escaped jail time after police were unable to crack the encryption scheme protecting his computer.…

Former FBI agent slams defence tactics in McKinnon case
Suggests hacker should have taken his medicine

Updated A former FBI legal officer who handled controversial plea bargaining negotiations with Gary McKinnon has attacked the tactics adopted by the hacker’s defence team.…

Kanye West death prank used to sling scareware
But Beyonce had one of the best hoaxes of all time

Rumours of the death of rapper Kanye West in a car crash became fodder for fake anti-malware scams on Tuesday.…

Auto thief foiled by guardian satellite
OnStar and the case of the aborted car jack

A 21-year-old man was arrested Sunday after the 2009 Chevrolet Tahoe he is accused of carjacking was electronically disabled as he sped away from two police cruisers.…

Man posed as teen lesbian to snare girl's nude photos
Before killing faux lesbian and posing as her mother

A Maryland man has admitted he posed as a teenage lesbian to trick a 15-year-old girl he met online into sending him sexually explicit photos.…

iPhones and social networking add to IT security headaches
A security admin's life is not a happy one

RSA Europe 2009 The flood of consumer devices such as iPhones into the enterprise and workers giving away snippets of potential sensitive information via social networking sites have emerged as new threats in the information security landscape.…

Data collector charged $275,000 for leaking personal data
$20 a head. 13,750 heads

One of world's biggest collectors of consumer data has agreed to pay $275,000 after federal authorities accused it of exposing the personal information of 13,750 people.…

Top NASA scientist busted for leaking satellite intel
Key networks not secured

A former NASA scientist who helped discover evidence of water on the moon has been arrested on charges he tried to sell Israel classified information about US military satellite systems.…

Scareware Mr Bigs enjoy 'low risk' crime bonanza
It's like a licence to steal, a licence to do anything

RSA Europe 2009 Cybercriminals are growing rich by franchising out scareware distribution operations.…

VoIP hack suspect fugitive extradited back to US
And you may tell yourself: this is not my 40' boat

A Venezuelan hacking suspect arrested in Mexico last February on computer hacking and fraud charges faces a court appearance in New Jersey on Tuesday, following his extradition to the US last week.…

MS claims early success for freebie security scanner
Americans stuffed with Trojans, Brazilians hit by worms

Redmond estimates 1.5 million users downloaded its freebie security scanner software during its first week of availability earlier this month.…

Thousands of sites loaded with potent malware cocktail
'Ugly can of worms'

Cybercriminals have laced about 2,000 legitimate websites with a potent malware cocktail that surreptitiously attacks people who browse to them, a security researcher warned Friday.…

Security boss calls for end to net anonymity
Kaspersky's online police state

The CEO of Russia's No. 1 anti-virus package has said that the internet's biggest security vulnerability is anonymity, calling for mandatory internet passports that would work much like driver licenses do in the offline world.…

Tabloid hack scum face jail
Oh no!

Journalists and private investigators who illegally obtain and trade in personal information will face jail sentences under planned changes to the Data Protection Act.…

UK taxpayers hit by wave of tax refund scam mail
80,000 in September, 10,000 in a single day in October

HMRC has warned taxpayers to be on their guard against a new slew of phishing attacks touting fake tax rebates.…

Survey: Call centre data standards 'routinely ignored'
Poor practice creates 'vast reservoir of sensitive data'

More than 95% of call centres were found to store customers' credit card details in recordings of phone conversations in breach of industry rules, according to a survey conducted by a call recording technology company.…

Bloggers howl after conference snoops on 'secure' network
Network insecurity 101

Organizers of last week's SecTor security conference collected names, passwords, and all other traffic passing over two Wi-Fi networks provided to attendees, including one that was encrypted, the event's director has confirmed.…

Trojan plunders $480k from online bank account
Windows and online banking - Just say no

A Pennsylvania organization that helps develop affordable housing learned a painful lesson about the hazards of online banking using the Windows operating system when a notorious trojan siphoned almost $480,000 from its account.…

Delta hacked my email, says passenger rights chief
That's absurd, says Delta

An airline passenger rights advocate is accusing Delta Air Lines of hacking into her computer and e-mail accounts to sabotage her organization's attempts to mandate basic services during flight delays.…

Mozilla service detects insecure Firefox plugins
Slated for browser embedding

Mozilla has introduced a service that checks Firefox browser plugins to make sure they don't have known security vulnerabilities or incompatibilities.…

Microsoft's Patch Tuesday fixes record number of flaws
SSL spoof bug finally put to rest

Microsoft on Tuesday patched a record number of security holes in its Windows operating systems and other software, a haul that included at least one security flaw that was already under attack in the wild.…

Adobe relieves Reader and Acrobat update blues
Plus fixes for 29 security bugs

Adobe Systems has introduced a new software updater for its Reader and Acrobat applications, one of several additions released Tuesday to protect users against a growing wave of malware attacks.…

Google shares malware samples with hacked site admins
Seeing is believing

Google has rolled out a feature that provides webmasters of compromised sites with samples of malicious code and other detailed information to help them clean up.…

Michigan airport grounds website over malware risk
Fly-by download threat

An airport in Michigan reportedly took down its website late on Monday in response to a computer virus risk.…

Polish government cyberattack blamed on Russia
Round up the usual suspects

A largely unsuccessful attack on Polish government systems last month reportedly originated in Russia.…

Maradona's website hacked after last-gasp Argentina victory
Peruvian miscreants leave him crying in the rain

Peruvian hackers have reacted to the country's dramatic defeat to Argentina on Saturday by defacing the site of Argentinian manager Diego Maradona and dubbing him a cry-baby.…

SANS%20RSS%20Feed

SANS Information Security Reading Room

Last 25 Computer Security Papers added to the Reading Room

PCI DSS and Incident Handling: What is required before, during and after an incident

Category: Compliance

Paper Added: June 16, 2009

Content Monitoring Issues ? Legal and Otherwise

Category: Compliance

Paper Added: April 23, 2009

SANS%20Internet%20Storm%20Center,%20InfoCON%3A%20green

SANS Internet Storm Center, InfoCON: green

Cyber Security Awareness Month - Day 22 port 502 TCP - Modbus, (Thu, Oct 22nd)

Modbus Protocol is a messaging structure developed by Modicon in 1979. It is used to establish ...(more)...

Truecrypt 6.3 released, (Thu, Oct 22nd)

from their version history notes: Full support for Windows 7. Full support for Mac OS X ...(more)...

Cyber Security Awareness Month - Day 21 - Port 135, (Wed, Oct 21st)

Welcome to day 21. Today we will talk about port 135 ...(more)...

Rapid7 purchases Metasploit, (Wed, Oct 21st)

Woke up this morning to find the news in my inbox, that Vulnerability Management companyRapid7 ...(more)...

WordPress Hardening, (Wed, Oct 21st)

Today one of our readers sent an interesting post from the developers of WordPress. It is ab ...(more)...

WASC 2008 Statistics, (Tue, Oct 20th)

The Web Application Security Consortium (WASC)released last Friday the 2008 statistics, compil ...(more)...

Oracle Critical Patch Update (CPU) - October 2009, (Tue, Oct 20th)

Today, October 20, Oracle releases its quarterly CPU. There are lots of vulnerabilities DBAs must ac ...(more)...

Cyber Security Awareness Month - Day 20 - Ports 5060 & 5061 - SIP (VoIP), (Tue, Oct 20th)

Ports 5060 and 5061, both on TCPand UDP, are associated to the Session Initiation Protocol (SI ...(more)...

Scam Email, (Mon, Oct 19th)

New week, new scams. Two emails showed up on our ISCscam radar this morning ...(more)...

Cyber Security Awareness Month - Day 19 - ICMP, (Mon, Oct 19th)

ICMP, the Internet Control Message Protocol, was originally designed (RFC 792, 1981) to conv ...(more)...

Backed up, lately ?, (Mon, Oct 19th)

At first, when a pal of mine called to rant about the new tendency of his OS to go hasta la Vi ...(more)...

Computer Security Awareness Month - Day 18 - Telnet an oldie but a goodie, (Sun, Oct 18th)

I mentioned to my collegue that I would be writing a Handler diary today about telnet, his ear ...(more)...

Unusual traffic from Loopback to Unused ARIN address, (Sat, Oct 17th)

Lode sent in some unusual traffic he is seeing from one of his servers. The traffic is Protoco ...(more)...

Mozilla disables Microsoft plug-ins?, (Sat, Oct 17th)

A couple of readers have indicated that this evening when they started Firefox it disabled the Micro ...(more)...

Cyber Security Awareness Month - Day 17 - Port 22/SSH, (Sat, Oct 17th)

Welcome to CSAMDay 17! Today is brought to you by Secure Shell (SSH) commonly deployed o ...(more)...

Disable MS09-054 patch, or Firefox Plugin?, (Fri, Oct 16th)

The .NET Framework 3 ...(more)...

Multiple Vulnerabilities in Cisco Wireless LAN Controllers, (Fri, Oct 16th)

The title pretty much says it all. Please check out the Cisco advisory here ...(more)...

Cyber Security Awareness Month - Day 16 - Port 1521 - Oracle TNS Listener, (Fri, Oct 16th)

By default when you install Oracle the TNS Listener is on tcp port 1521. It handles network requests ...(more)...

VMWare updates ESX , (Fri, Oct 16th)

A duo announcements by VMWare highlight a new patch, and an updated one fixing their enterprise offe ...(more)...

Cyber Security Awareness Month - Day 15 - Ports 995, 465, and 993 - Secure Email, (Thu, Oct 15th)

Email has become a mainstay for both businesses and individuals. It seems a day does not go by ...(more)...

Yet another round of Viral Spam, (Thu, Oct 15th)

Reports are coming in today regarding another round of spam attempting to spread malicious programs ...(more)...

Check your email servers - blackholes.us DNSBL is dead, (Wed, Oct 14th)

Aaron let us know about a discussion thread on the NANOGmailing list about issues with the bla ...(more)...

New variation of SSL Spam, (Wed, Oct 14th)

We've received numerous emails about this already today. This is an update to a diary we did e ...(more)...

Odd Apache/MSIE issue with downloads from ISC, (Wed, Oct 14th)

This diary is a bit unusual in that the problem here is very close to home, the ISC/DShield website. ...(more)...

Cyber Security Awareness Month - Day 14 - port 514 - syslog, (Wed, Oct 14th)

Often times, if hackers or worms break into your computer, they will try to delete the logs on the l ...(more)...

Adobe Reader and Acrobat - Black Tuesday continues, (Tue, Oct 13th)

It ain't justMicrosoft . ...(more)...

Microsoft October 2009 Black Tuesday Overview, (Tue, Oct 13th)

Overview of the October 2009 Microsoft patches and their status. # ...(more)...

www.remote-exploit.org seems to be down at the moment - Thanks to all that wrote in to let us know., (Tue, Oct 13th)

...(more)...

Cyber Security Awareness Month - Day 13 Proxies (TCP 3128, 8080 & ......), (Tue, Oct 13th)

Proxy servers are used to manage access to the Internet in companies. It is a tool to check, c ...(more)...

McAfee Spam Report, (Mon, Oct 12th)

In many enterprises, spam prevention and abuse handling is a function of ITSecurity and less o ...(more)...

SANS%20RSS%20Feed

SANS NewsBites

All Stories From Vol: 11 - Issue: 83

ChoicePoint to Pay US $275,000 to Settle FTC Complaint Over Second Data Breach (October 19, 2009)

Data broker ChoicePoint has agreed to pay US $275,000 in fines to settle a US Federal Trade Commission (FTC) complaint stemming from an April 2008 data security breach.......

UK ISP Demonstration Aims to Reveal Problems with Proposal to Cut Filesharers' Connections (October 16, 2009)

UK Internet service provider (ISP) TalkTalk staged a demonstration of how easily owners of wireless connections could be wrongly accused of illegal filesharing.......

Scareware Locks Apps on Infected PCs (October 15 & 19, 2009)

A new variant of scareware has been detected that not only inundates users with exhortations to purchase phony antivirus software called "Total Security 2009," but that also locks users out of nearly all applications until they purchase the disreputable product.......

UK Police Granted Right to Retain Data on Old Convictions (October 19, 2009)

A UK court of appeals has ruled that police may retain data on previous criminal convictions, even if those convictions are minor ones and are many years old.......

South Korean Chemical Accident Response Information System Breached (October 19, 2009)

Attackers reportedly obtained a password for South Korea's Chemical Accident Response Information System (CARIS) in March and used it to access the system and steal information about manufacturers of toxic chemicals and about toxic substances.......

Oracle's Quarterly Critical Patch Update Scheduled for October 20 (October 16 & 19, 2009)

On Tuesday, October 20, Oracle will release its scheduled quarterly Critical Patch Update to address 38 vulnerabilities in 21 product lines.......

Former Ford Engineer Arrested for Alleged Theft of Trade Secrets (October 16, 2009)

A former Ford Motor Company engineer has been indicted on charges of theft of trade secrets, attempted theft of trade secrets and unauthorized access to protected computers.......

GAO Report Finds Security Weaknesses at NASA (October 16 & 19, 2009)

According to a report from the Government Accountability Office (GAO), there are weaknesses in NASA's information technology systems that could be exploited to gain unauthorized access to those systems.......

ENISA Names New Director (October 16, 2009)]

Dr.......

Postini Delivery Problems Vex Users (October 13, 14 & 15, 2009)

Users of email security and archiving service Postini were frustrated last week when the service began experiencing significant delivery problems.......

Finland Declares 1Mb Broadband Access a Legal Right (October 14 & 15, 2009)

The Finnish government has enacted a law making 1Mb broadband Internet access a legal right.......

Microsoft Releases Bumper Crop of Bulletins (October 13 & 14, 2009)

Microsoft released a record 13 security bulletins on Tuesday, October 13.......

More Breach Woes at PayChoice (October 15, 2009)

Online payroll services provider PayChoice has taken its onlineemployer.......

Schwarzenegger Nixes Data Breach Notification Bill (October 13 & 15, 2009)

California Governor Arnold Schwarzenegger has vetoed legislation that would have required data breach notification letters to include more specific information about each incident.......

Guilty Pleas in Natwest Phishing Case (October 15, 2009)

Four people have pleaded guilty to conspiracy to defraud and money laundering for their roles in a phishing scheme that targeted Natwest online banking customers.......

Missing Flash Drive Holds Virginia Adult Ed. Student Information (October 15, 2009)

Virginia Department of Education officials have acknowledged that a missing flash drive contains personally identifiable information of more than 103,000 former adult education students.......

Most Sidekick Data Recovered (October 15, 2009)

According to a Microsoft executive, "most if not all" of the Sidekick data believed to have been lost last week has been recovered.......

Alleged VoIP Hacker Extradited (October 15, 2009)

Edwin Pena is being extradited from Mexico to the US to face charges related to the theft and resale of voice over Internet protocol (VoIP) services.......

Mozilla Releases Plug-In Check Service for Firefox (October 14, 2009)

Mozilla now has a service that checks to make sure that Firefox users are running the most recent versions of browser plug-ins.......

Adobe Security Update Fixes Nearly 30 Flaws (October 13 & 14, 2009)

Adobe's scheduled quarterly security update for October addresses nearly 30 security flaws in Adobe Reader and Acrobat.......

Rising Online Banking Theft Spurs New Recommendations (October 12 & 14, 2009)

The Clampi Trojan horse program infected computers at the Cumberland County (PA) Redevelopment Authority, allowing cyber thieves to steal nearly US $480,000 from the organization's bank account.......

Malware Infection Prompts Michigan Airport to Take Website Offline (October 12 & 13, 2009)

The Gerald R.......

One Third of Japanese Web Sites Have Flaws That Enable Unauthorized Access (October 16, 2009)

Japan's largest security organization, NRI SecureTechnologies, just published an English translation of its authoritative annual study of web site security issues and trends in Japan.......

Sidekick Outage Causes Data Loss and Outrage (October 10 & 12, 2009)

A server failure appears to be responsible for a massive data loss affecting T-Mobile Sidekick customers.......

Researchers Claim Botnet Steals Revenue from Google, Yahoo! and Bing (October 9, 2009)

Researchers at Click Forensics claim they have found a new botnet (the "Bahama botnet") that is draining advertising revenue from Google, Yahoo! and Bing by sending part of it to smaller networks.......

Apple Acknowledges Bug in Snow Leopard Causes Data Loss (October 12, 2009)

Apple has acknowledged a problem with its Mac OS X 10.......

Security Software Locates and Wipes Stolen NHS Computers (October 12, 2009)

Four laptop computers stolen from an NHS Trust have been recovered.......

Google Fixes Android DoS Flaws (October 12, 2009)

A pair of flaws in the Google Android mobile platform could be exploited to create denial-of-service conditions.......

Maine Supreme Court to Decide Hannaford Liability (October 9 & 12, 2009)

The Maine Supreme Court will decide whether or not retailers that fail to protect consumers' payment card data will be required to compensate those people for the time they spend correcting any problems that arise from a data security breach.......

Twitter Suspended Researcher's Account for Mentioning Malicious URL (October 9 & 12, 2009)

Twitter blocked F-Secure's chief researcher officer Mikko Hypponen from accessing his account for two days last week for including a malicious link in one of his communications.......

Inspector General Finds Security Gaps in Some DHS Public-Facing Websites (October 9, 2009)

According to a report from US Department of Homeland Security (DHS) Inspector General Richard Skinner, a number of popular department websites are vulnerable to attacks and could allow DHS data to be lost or used without proper authorization.......

Federal Reserve Bank Employee Pleads Guilty to Fraud and Identity Theft (October 6 & 7, 2009)

A former Federal Reserve Bank of New York employee has pleaded guilty to bank fraud and aggravated identity theft.......

Federal Charges Filed Against Former DuPont Scientist (October 6, 2009)

A former DuPont research scientist is now facing federal criminal charges for allegedly trying to steal trade secrets from the company.......

SearchSecurity.com

SearchSecurity: Security Wire Daily News

The latest information security news on IT threats, vulnerabilities and market trends from the award-winning SearchSecurity.com.

DLP technology challenges security costs

By Eric Ogren

Data leakage prevention requires more than just flipping a switch. If not implemented properly, DLP could return alerts that stymie business units and increase operational costs

Metasploit Project acquired by vulnerability management firm Rapid7

By Neil Roiter

The popular Metasploit Framework remains a free and open source hacking tool. Creator HD Moore joins Rapid7 as CSO, Metasploit architect.

Breach forces payroll service provider PayChoice to shut down again

By Neil Roiter

PayChoice, a payroll service provider, took its service offline for the second time in a month in response to a data breach.

Analyst DLP study finds maturity, ranks top DLP vendors

By Robert Westervelt

A Burton Group study identified the leaders in the data leakage prevention market and found some enterprises deploying the technology to educate end users about security policies.

Phishing protection begins with training, antiphishing evangelist

By Eric Ogren

IT organizations can take a lesson from marketers by sending three phishing education emails to users before the holiday season.

Enterprise botnets contain thousands of malware variants

By Robert Westervelt

Smaller and contained on company networks, enterprise botnets pose a greater danger because they are difficult to detect and remove, according to new research.

Adobe fixes 29 flaws in Acrobat, Reader

By Robert Westervelt

Critical Adobe flaws could cause the applications to crash, enable an attacker to take full control of a victim's machine.

Microsoft addresses critical SMBv2 flaw, fixes record number of flaws

By Robert Westervelt

Microsoft addressed three critical vulnerabilities in Windows Server Message Block. Thirteen bulletins addressed a record 34 flaws.

Barracuda acquires Purewire expanding Web security reach

By Robert Westervelt

The acquisition broadens Barracuda's delivery model for URL filtering and securing Web applications through software as a service (SaaS) and hybrid approaches.

Phishing attacks to remain a major problem, say security experts

By Robert Westervelt

The recent FBI raid halting an international phishing ring highlights the problem of eradicating phishers. Password management and two-factor authentication help reduce the risk.

SecuriTeam.com

SecuriTeam

Welcome to the SecuriTeam RSS Feed - sponsored by Beyond Security. Know Your Vulnerabilities! Visit BeyondSecurity.com for your web site, network and code security audit and scanning needs.

Microsoft IIS FTP Service Code Execution and DoS Vulnerability

The vulnerabilities could allow remote code execution (RCE) on systems running FTP Service on IIS 5.0, or denial of service (DoS) on systems running FTP Service on IIS 5.0, IIS 5.1, IIS 6.0 or IIS 7.0.

Microsoft GDI+ Multiple Vulnerabilities

These vulnerabilities in GDI+ could allow remote code execution if a user viewed a specially crafted image file using affected software or browsed a Web site that contains specially crafted content.

Microsoft .NET Common Language Runtime Multiple Vulnereabilities

The vulnerabilities could allow remote code execution on a client system if a user views a specially crafted Web page using a Web browser that can run XAML Browser Applications (XBAPs) or Silverlight applications, or if an attacker succeeds in persuading a user to run a specially crafted Microsoft .NET application. The vulnerabilities could also allow remote code execution on a server system running IIS, if that server allows processing ASP.NET pages and an attacker succeeds in uploading a specially crafted ASP.NET page to that server and executing it, as could be the case in a Web hosting scenario.

Microsoft Active Template Library ActiveX Controls Multiple Vulnerabilities

This security update resolves several privately reported vulnerabilities in ActiveX Controls for Microsoft that were compiled with a vulnerable version of Microsoft Active Template Library (ATL). The vulnerabilities could allow remote code execution if a user loaded a specially crafted component or control.

ActiveX Active Template Library Initialization Vulnerability

The vulnerability that affects ActiveX controls that were compiled using the vulnerable version of the Microsoft Active Template Library (ATL) could allow remote code execution if a user views a specially crafted Web page with Internet Explorer, instantiating the ActiveX control.

Internet Explorer Multiple Remote Code Execution Vulnerabilities

The vulnerabilities could allow remote code execution if a user views a specially crafted Web page using Internet Explorer.

Windows Media Player ASF File Remote Code Execution

The vulnerability could allow remote code execution if a specially crafted ASF file is played using Windows Media Player 6.4. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user.

Windows Media Runtime Remote Code Execution

The vulnerabilities reported could allow remote code execution if a user opened a specially crafted media file or received specially crafted streaming content from a Web site or any application that delivers Web content. An attacker who successfully exploited these vulnerabilities could gain the same user rights as the local user.

Windows Vista and Windows Server 2008 SMBv2 Remote Code Execution

Server Message Block Version 2 (SMBv2) could allow remote code execution if an attacker sent a specially crafted SMB packet to a Windows Vista or Windows Server 2008 computer running the Server service.

Adobe RoboHelp Server Arbitrary File Upload and Execute Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerability installations of Adobe RoboHelp Server. Authentication is not required to exploit this vulnerability.

Cisco Unified Communications Manager Express Vulnerability

Cisco IOS devices that are configured for Cisco Unified Communications Manager Express (CME) and the Extension Mobility feature are vulnerable to a buffer overflow vulnerability. Successful exploitation of this vulnerability may result in the execution of arbitrary code or a Denial of Service (DoS) condition on an affected device.

Security - RSS Feeds

Security - RSS Feeds

Windows 7 Security Story May Appeal to Enterprises

Microsoft Windows 7 has a number of new security features designed to appeal to enterprises. But will they do the trick?
- Microsoft Windows 7 is on its way tomorrow, Oct. 22, and it is bringing with it a set of security features Microsoft clearly hopes will appeal to enterprises. The Windows 7 security story has three main chapters that have received a fair amount of attention: DirectAccess, BitLocker To Go a...

10 Ways Windows 7 Will Be More Secure than Vista

News Analysis: With Windows 7's Oct. 22 release just one day away, the focus in the debate over whether the new OS is better than its predecessor is turning to security. Will it be more secure than Windows Vista? If the sheer number of security features is any indication, you bet.
- Windows 7's Oct. 22 launch is just a day away. But whether or not it will be more secure than Windows Vista is still up for debate. Will it be as secure as Vista? Will it be more secure? At this point, the opinions are flying. I believe that Windows 7 will be more secure than its predecessor....

Rapid7 Acquires Metasploit to Improve Security Testing

Rapid7 has acquired Metasploit to bring the open-source project's database of reliable exploits to bear in Rapid7's vulnerability management and penetration testing offerings.
- Security testing and vulnerability management vendor Rapid7 has made a bid to deepen its pen testing capabilities with the acquisition of the Metasploit. The terms of the deal were not disclosed, but the acquisition brings the open source penetration testing framework into Rapid7s portfolio and ...

DHS Secretary: Cyber-security Requires Partnerships, User Awareness

DHS Secretary Janet Napolitano says it will take the combined efforts of vigilant users, government and the private sector to secure the country's cyber-infrastructure.
- U.S. Department of Homeland Security Secretary Janet Napolitano called on the general public to play a role in improving cyber-security. In a speech Oct. 20, Napolitano said home users have to do their part to ensure the safety of their own computers to prevent them from becoming bots that can be u...

McKinnon Extradition Delayed as U.K. Officials Consider Evidence

Gary McKinnon's battle against extradition to the U.S. on hacking charges took yet another twist Oct. 19 when British officials agreed to hear psychiatric evidence about McKinnon. McKinnon has been fighting extradition since his arrest in 2002 for hacking into U.S. military and NASA computers.
- Gary McKinnon, a hacker charged with breaking into Pentagon computers, has had his extradition to the United States put on hold again as British officials weigh psychiatric evidence. According to the BBC, the British Home Office has agreed to consider the evidence about McKinnons medical c...

How to Align VPN Planning to Enterprise Security, Mobility Requirements

There are many VPN choices available today, but not all VPNs are created equal. Performance, scalability, compatibility and central management are just a few of the criteria enterprises should consider before selecting a secure VPN solution. Depending upon each enterprise's security and mobility requirements, every VPN choice has its advantages and disadvantages. Here, Knowledge Center contributor Jörg Hirschmann offers a technological and organizational checklist that enterprises should consider before implementing a VPN solution.
- VPNs are an essential part of IT security policy in many enterprises. Unfortunately, with the variety of mobile device applications available today, empowering remote worker efficiencies while preventing risky network behavior is a challenge. Businesses are struggling to find a one-size-fits-all app...

Mozilla Re-enables Microsoft Add-on for Firefox

Mozilla opted to block Microsoft's .NET Framework Assistant add-on for users of Mozilla's Firefox browser Oct. 16 due to security concerns. Now, after receiving additional information from Microsoft, the Mozilla re-enables the add-on.
- Mozilla has backtracked on its move to disable a Microsoft add-on tied to a security vulnerability. After placing the Microsoft .NET Framework Assistant on a block list due to concerns about a Microsoft vulnerability (CVE-2529), Mozilla said Oct. 18 it will re-enable the . NET Framework Assista...

LABS GALLERY: Dell R710 PowerEdge Has Virtualization Squarely in Its Sights

The Dell R710 PowerEdge data center server racks up compute and memory in a tidy package, offering UEFI (Unified Extensible Firmware Interface) as an option instead of BIOS to help with embedded system adminstration. Adding UEFI to physical systems could be a stepping stone toward more effective management of physical and virtual system resources. By Cameron Sturdevant
- ...

GAO Finds NASA Networks Vulnerable to Attack

Despite increased efforts to ensure that network controls are appropriately designed and operating effectively, the Government Accountability Office reports that NASA has not yet fully implemented key parts of its information security program.
- According to a report from the Government Accountability Office released Oct. 15, quot;NASA [does] not consistently implement effective controls to prevent, limit and detect unauthorized access to its networks and systems. quot; While the report found that quot;NASA has made important progress ...

Symantec Reveals Rogue Antivirus Pulling Massive Profits

Symantec took a look at the underground market for rogue security software in a new report. Some of the sales affiliates make staggering profits, with the top earners averaging $23,000 a week during Symantec's 12-month study.
- Symantec shined the light on the massive profits pulled in by rogue security software scams on the Web. Such software, often referred to as "scareware," has gotten more attention in the past year as scammers continue to enjoy success tricking users into shelling out big bucks. In a report titled ...

REVIEW: Dell R710 PowerEdge Raises Server Bar

The Dell R710 PowerEdge 2U rack-mount server is a worthy combination of compute and performance power, and the first system I've seen that provides an alternative to BIOS for power-on system setup and configuration. Many of the Dell R710 PowerEdge's most compelling characteristics are driven by the need to optimize the data center for virtualization tasks.
- The Dell R710 PowerEdge 2U rack-mount server is a worthy combination of compute and performance power, and the first system I've seen that provides an alternative to BIOS for power-on system setup and configuration. Dell ships the R710 PowerEdge with BIOS as the default but with UEFI (Unifi...

Mozilla Blocks Microsoft Firefox Add-ons for Security

Mozilla disables two Microsoft add-ons for Firefox to thwart a vulnerability that allows an attacker to take over Windows machines. The security flaw was fixed by Microsoft in the latest Patch Tuesday update.
- Mozilla is blocking the use of two Microsoft add-ons installed silently on Windows computers with .NET Framework 3.5 Service Pack 1. Mozilla is blocking the Microsoft .NET Framework Assistant and Windows Presentation Foundation components in light of a vulnerability that attackers can use to impac...

Gumblar Botnet Resurfaces to Target Windows Users, ScanSafe Says

Compromised Websites are now being used to host malware exploiting Adobe software and Microsoft Windows security flaws. The move is the latest twist in the Gumblar attack campaign ScanSafe uncovered in May.
- The Gumblar botnet is back with a new trick up its sleeve. The goal, however, remains the same to steal FTP credentials and other data. Gumblar first made the news in May, when attackers compromised legitimate sites and sent visitors on to a malicious site that infected their PCs with malware. N...

LABS GALLERY: Crossbeam X80 Security Switch Is Versatile, Scalable

The Crossbeam X80 is an enterprise- and carrier-grade chassis-based security switch with stellar firewall performance and a solid set of high-availability features. Businesses that need a flexible, high-speed security switch will find the $500,000 price well worth it, for the X80's ability to consolidate many security functions and still push traffic at 40G bps is unrivaled in today's market.
- ...

Microsoft Talks Federal Government Cloud Computing Security

Microsoft executive Teresa Carlson suggests that security for the cloud, particularly in the context of the federal government, starts with imposing strict security and privacy standards on the operation of data centers. Recent surveys indicate that security remains a top concern for IT administrators in both government and private enterprise.
- Cloud computing may be increasingly vital to cost-efficient government IT, but concerns over security remain as prevalent in federal agencies' considerations for adopting the cloud as they are in the enterprise or SMBs. A Microsoft executive, meanwhile, is claiming in a recent blog post that securit...

REVIEW: Crossbeam X-Series Platform Consolidates Security Functions

The Crossbeam X-Series Platform is a modular Ethernet switch targeted at the enterprise and carrier market. eWEEK Labs tested the the Crossbeam X80 model, and found that it will be a good bet for businesses that need a flexible, high-speed security switch. The $500,000 price tag is well worth it given the ability of the platform to consolidate many security functions and still push traffic at 40G bps.
- Every enterprise network is built on a switched Ethernet foundation. Its difficult to estimate just how many Ethernet switches are out there, but, according to Infonetics Research, devices worth $3.4 billion were shipped in Q2 2009. If any piece of network gear might be as widely deployed as the Et...

Database Security Shortcomings Raise Red Flags

A recent survey of 316 members of the Independent Oracle Users Group paints a troubling picture of database security. As it turns out, respondents this year have taken a number of steps back when it comes to protecting sensitive data, even as a higher percentage reported experiencing data breaches. The key issues failure to manage privileged access, a lack of encryption and an over-reliance on manual or ad hoc approaches to database security. Overall, the level of security has slipped when compared with last years survey. Whether its due to not enough being spent on security or policy enforcement, the survey shows IT professionals have their work cut out for them.
- ...

Adobe Patches Reader, Acrobat Security Vulnerabilities

Adobe Systems swats several bugs in Adobe Reader and Acrobat, including a zero-day flaw that is being targeted by attackers. The Adobe Reader and Acrobat 9.2 and 8.1.7 updates include the beta version of a new update and deployment tool, as well as a new capability enabling users to block specific JavaScript API calls.
- Adobe Systems has swatted a zero-day bug affecting Adobe Reader and Acrobat that was being exploited in targeted attacks. The vulnerability, described by Adobe as critical, is one of several Adobe fixed today in the Oct. 13 security update. According to Adobe, the vulnerability is a heap overflo...

Windows 7 Security Holes Plugged in Massive Microsoft Patch Tuesday

Microsoft releases its biggest Patch Tuesday update ever, bundling fixes for 34 vulnerabilities in a baker's dozen of security bulletins. Most of the bulletins deal with security issues in Windows, including six bulletins affecting Windows 7.
- Microsoft issued a massive Patch Tuesday update Oct. 13 to address 34 vulnerabilities across its products. The vulnerabilities are covered by 13 security bulletins, and span Microsoft Windows, Internet Explorer, Office, Silverlight, Forefront, Developer Tools and SQL Server. Eight of the bullet...

Barracuda Networks Buys Purewire for SAAS

Barracuda Networks has purchased Purewire to expand its software-as-a-service story. Purewire was launched last year and specializes in Web security in the cloud.
- Barracuda Networks has acquired security software-as-a-service vendor Purewire in a bid to build out its cloud-based platform. The financial details of the deal were not disclosed. Purewire was launched in 2008, and has sought to make a mark offering Web security in the cloud. Bringing that tech...

No comments:

Post a Comment

My Blog List