Hackin9
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Cody Wilson, founder of Defense Distributed, contests claims his 3D printed gun isn't safe and will try to continue to make 3D gun plans available.
 
PowerbyProxi is demonstrating two new chargers to handle larger mobile devices by offering more than twice the power of its previous technology.
 
Apple today said the public can try out early versions of the OS X Yosemite operating system, the first time since 2000 the company has let large numbers of outsiders get an early look at an upcoming Mac OS.
 

A Massachusetts man who reportedly illegally accessed the cell phone of socialite Paris Hilton 10 years ago has agreed to serve four years in federal prison for a more recent hacking spree that targeted computer networks around the country, including those belonging to law enforcement organizations that stored sensitive data and communications.

Cameron Lacroix, 25, of New Bedford, Massachusetts, submitted a written agreement to plead guilty to two counts of computer intrusion and one count of access device fraud, documents filed in Boston federal court alleged. Over a two-year span beginning in May 2011, the man pursued a hacking spree that targeted a multitude of groups, prosecutors said. One of the hacked networks belonged to a local Massachusetts police department and exposed an e-mail account belonging to the unidentified department's chief of police. Lacroix is also accused of repeatedly penetrating the defenses of other law enforcement computer servers containing sensitive information, including police reports, intelligence reports, arrest warrants, and sex offender information.

Another prong of his alleged two-year hacking spree was the Bristol Community College. Prosecutors said Lacroix breached the college's servers on multiple occasions from September 2012 to December 2013 so he could change his grades and those of two other students. Lacroix allegedly used stolen login credentials belonging to three instructors to gain illegal access. The man is also accused of obtaining and possessing payment card data for more than 14,000 unique account holders. As part of the plea agreement, Lacroix is expected to be sentenced to four years in prison to be followed by three years of supervised release.

Read 1 remaining paragraphs | Comments

 
Apple CEO Tim Cook and one of his top lieutenants today outlined the next iterations of the company's critical iOS and the less-important OS X before enthusiastic developers.
 
While practices to speed programming have been around for a decade, only recently have they caught the eye of the enterprise manager looking for a competitive edge. Now, IBM is updating its Bluemix portfolio of cloud services to help companies save time in deploying new applications by using these new programming methodologies.
 
SAP is hoping to grab a bigger piece of the money its customers spend on cloud-based software by creating a new series of industry-specific services.
 

By now many you have already read the reporting on Brian Krebs on the Gameover Zeus (GOZ) and Cryptolocker takedowns (or more accurate, disruptions). You can read the US Justice Department's court documents here which include a named suspect behind the operation of GOZ. This is the result of large-scale multijurisdictional law enforcement cooperation and work from the private sector.  The TL;DR version is that as of this moment, Gameover Zeus has been disrupted and can no longer control clients.  In the case of Cryptolocker, new victim machines can no longer communicate with command and control (C2s) servers which means files will not be encrypted.  If your files are already encrypted, these is no change as once the files are encrypted there is no other communication that is necessary with the C2s unless you are paying the ransom. This, unfortunately, is likely temporary in nature (between 2 weeks and 6 months depending on the specific circumstances).

One thing that would be helpful is that if you observe new GOZ or Cryptolocker infections, please write in with details so they can be analyzed.

Thanks!

--
John Bambenek
bambenek \at\ gmail /dot/ com
Bambenek Consulting

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
What's it like being one of the first brands to use Facebook's auto-play video ads? Progressive and its agency Arnold tells CIO.com the entire experience was easy, liberating and even a 'breathe of fresh air.'
 
Given the current prevalence of mobile devices, especially smartphones, it comes as no surprise that they are becoming more and more entwined with everyday aspects of our lives. We don't just use them to make calls, to text, or to browse the internet anymore. We can use them to do just about anything, and that includes using them as a means to provide our credentials.
 
Three U.S. tech worker groups have launched a labor boycott of IBM, Infosys and Manpower, saying the companies have engaged in a pattern that discourages U.S. workers from applying for U.S. IT jobs by tailoring employment ads toward overseas workers.
 

Security researchers have discovered vulnerabilities in a widely used WordPress extension that leaves sites susceptible to remote hijacking.

WordPress-powered sites that use the All in One SEO Pack should promptly install an update that fixes the privilege escalation vulnerabilities, Marc-Alexandre Montpas, a researcher with security firm Sucuri wrote in a blog post published Saturday. Administrators can upgrade by logging in to the admin panel, selecting plug-ins, and choosing the All in One title. The just-released version that fixes the vulnerabilities is 2.1.6.

The worst of the attacks made possible by the bugs can allow attackers to inject malicious code into the admin control panel, Montpas warned. Malicious hackers could then change an admin's password or insert backdoor code into the underlying websites. People could also remotely tamper with a site's search engine optimization settings. To exploit the bugs, attackers need only an unprivileged account on the site, such as one for posting reader comments. In some cases, the privilege escalation and cross-site scripting bugs in All in One SEO are combined with another vulnerability that Montpas didn't elaborate on.

Read 2 remaining paragraphs | Comments

 
The U.S. Department of Justice, working with law enforcement agencies in other countries, revealed Monday a multinational effort to disrupt Gameover Zeus, a 2-year-old botnet employing an estimated 500,000 to 1 million compromised computers.
 
 
 
The emerging Tizen OS has attracted few radical types, just as other open source platforms like Android did in their early days.
 
A packet capture showing Cupid attacking a wireless network.

It just got easier to exploit the catastrophic Heartbleed vulnerability against wireless networks and the devices that connect to them thanks to the release last week of open source code that streamlines the process of plucking passwords, e-mail addresses, and other sensitive information from vulnerable routers and connected clients.

Dubbed Cupid, the code comes in the form of two software extensions. The first gives wireless networks the ability to deploy "evil networks" that surreptitiously send malicious packets to connected devices. Client devices relying on vulnerable versions of the OpenSSL cryptography library can then be forced to transmit contents stored in memory. The second extension runs on client devices. When connecting to certain types of wireless networks popular in corporations and other large organizations, the devices send attack packets that similarly pilfer data from vulnerable routers.

The release of Cupid comes eight weeks after the disclosure of Heartbleed, one of the most serious vulnerabilities to ever hit the Internet. The flaw, which existed for more than two years in OpenSSL, resides in "heartbeat" functions designed to keep a transport layer security (TLS) connection alive over an extended period of time.

Read 5 remaining paragraphs | Comments

 
If you haven't been living under a rock, you've heard pundits proclaim the death of the PC. As consumers move to tablets and stop buying laptops and desktops, and as companies pinch IT budgets even harder than they have in the past, it's easy to paint a doomsday scenario for hardware. Even the hardware companies play into this myth -- look no further than AMD to see weakness portrayed. For many, it seems, hardware has lost its sexiness.
 
With Apple poised to introduce its next version of OS X within hours, the current edition, Mavericks, will end its career this fall powering almost three-fourths of all Macs, a validation of Apple's decision last year to give away the operating system.
 
GNU Libtasn1 CVE-2014-3467 Multiple Denial of Service Vulnerabilities
 
GNU Libtasn1 'asn1_read_value_type()' Function Denial of Service Vulnerability
 
GNU Libtasn1 CVE-2014-3468 Remote Code Execution Vulnerability
 
GnuTLS 'gnutls_handshake.c' Memory Corruption Vulnerability
 
It means a lot when two competitors actually cooperate, as Microsoft and Salesforce.com have agreed to do in a 'global, strategic partnership.' But to whom does it mean a lot -- and will anything tangible emerge?
 
After experimenting with high altitude balloons, Google is now also looking use a fleet of low-earth-orbit satellites to bring Internet access to remote regions of the world.
 
LinuxSecurity.com: New mariadb packages are available for Slackware 14.1 and -current to fix security issues. [More Info...]
 
LinuxSecurity.com: Multiple vulnerabilities have been found in Fail2ban, the worst of which allows remote attackers to cause a Denial of Service condition.
 
LinuxSecurity.com: Multiple vulnerabilities have been found in libarchive, some of which may allow execution of arbitrary code.
 
LinuxSecurity.com: A vulnerability has been found in D-Bus which allows local attackers to gain escalated privileges.
 
LinuxSecurity.com: Security Report Summary
 
LinuxSecurity.com: Security Report Summary
 
LinuxSecurity.com: Security Report Summary
 
LinuxSecurity.com: Security Report Summary
 
LinuxSecurity.com: Security Report Summary
 
The Apple world that long saw its company deliver innovative products like the iPhone and iPad has shown some uneasiness in recent months.
 
If a leader doesn't let anyone else shine, no one will engage.
 
As Windows XP continued its decline, users who deserted the obsolete operating system shifted to Windows 7, not the newer Windows 8, more circumstantial evidence that commercial customers, not consumers, now drive PC sales.
 
If you've ever seen the science-fiction classic "Aliens," you might wonder when powered exoskeleton suits will help us do battle against nasty extraterrestrials.
 
Taiwanese PC maker Asus has added laptop to the forms that its latest Transformer phone-tablet hybrid can adopt -- potentially taunting Microsoft and Google once again with the device's ability to run both Windows and Android.
 
Although Apple watchers expect the company to boost the iPhone's screen size this fall, demand for a very large display is actually weak among iPhone owners in China -- and even weaker in the U.S.
 
Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling
 
Cheap Android tablets can be hard to differentiate, but Dell wants to ratchet up the quality with its $199 Venue 8 tablet, which has new features like wireless charging and a full high-definition screen.
 
The Linux-based Ubuntu OS is finding its way into tablets with Dell's latest Inspiron hybrids, which can function as tablets and laptops.
 
Apache Struts 'CookieInterceptor' Security Bypass Vulnerability
 
Taiwan's Gigabyte is fitting a 3200 by 1800 screen on its latest gaming laptop, making it among the growing number of vendors adding so-called "3K" displays to their PC products.
 
In the gold rush for wearables, the key to success is invisibility and long battery life. ARM is pursuing the development of tiny processors that fit the profile.
 
Ford will begin offering its AppLink voice control system in additional Asian markets and bring its emergency assistance technology to Taiwan, the company said Monday at the Computex trade show in Taipei.
 
Samsung introduced Monday its first smartphone built around the Tizen operating system, with a TV running the OS planned for next year.
 
Cisco Unified Web and E-Mail Interaction Manager XML External Entity Injection Vulnerability
 
Internet Storm Center Infocon Status