Share |

InfoSec News

Acronis released the 11th version of its backup and recovery software, offering greater support for virtual machines and bare metal restores.
The widely publicized hack of Sony's computer networks is worse than previously thought, also affecting 24.6 million Sony Online Entertainment network accounts.
The Acer Iconia 6120 laptop is one of those marquee, "halo" products meant to draw attention to the brand as much as to satisfy everyday computing needs. In many ways it's a pretty ordinary 14-inch laptop. The standout feature, however, is its second 14-inch multitouch screen, which replaces the entire lower keyboard-and-touchpad deck. As high-concept products go, the Iconia is fairly affordable at $1199 (as of May 2, 2011). Still, at that price it isn't a very good deal, and you're better off choosing something a little more down to earth. Acer's dual-touch implementation of a Windows laptop is about as good as you could expect it to be, but it's just not a great idea in the first place.
VMware accidentally caused a second outage in its Cloud Foundry service after recovering from a previous issue.
The Pakistani programmer who dubbed himself "the guy who liveblogged the Osama raid without knowing about it" is also the guy who got his website hacked without knowing about it.
Couchbase has released a beta version of the CouchDB for the Apple iPhone.
Mozilla Firefox/SeaMonkey CVE-2011-0067 Information Disclosure Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey 'resource:' Protocol Directory Traversal Vulnerability
Mozilla Firefox/SeaMonkey CVE-2011-0065 Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2011-0079 Memory Corruption Vulnerability
Scammers are distributing fake security software aimed at the Mac by taking advantage of the news that al-Qaeda leader Osama Bin Laden has been killed by U.S. forces, a security researcher said today.
Mozilla Firefox/Thunderbird/SeaMonkey Cross-Domain JavaScript Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey HTML Iframe Tag Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey Use-After-Free Memory Corruption Vulnerability
Mozilla Firefox/Thunderbird/SeaMonkey HTML Frameset Tag Interger Overflow Vulnerability
NASA now says the earliest the space shuttle Endeavour might lift off is May 8.
Before President Barack Obama officially informed the country and the world that terrorist leader Osama bin Laden had been killed, Facebook and Twitter were abuzz with news and celebratory postings.
OpenMPT Multiple Remote Code Execution Vulnerabilities
Oracle Peoplesoft Enterprise CVE-2011-0856 Remote Vulnerability
Oracle Database and Enterprise Manager Grid Control Multiple SQL Injection Vulnerabilities
SAP is hoping to make customers' ERP (enterprise resource planning) projects more successful with a tool that can visualize the application's ultimate look and feel without having to write code, the company said Monday.
Cisco Unified Communications Manager 'xmldirectorylist.jsp' Multiple SQL Injection Vulnerabilities
This book excerpt examines several methods of desktop virtualization and describes how each is implemented. The pros and cons of each solution are discussed so that when the time comes to put a project plan together, you can make an informed decision and have a smoother transition to virtualized desktops.
The death of Osama Bin Laden is the latest event to spur malware makers and scammers into action.
Intelligence officials say a lack of Internet and telephone service at a Pakistani compound was a key reason to suspect Osama bin Laden was hiding there.
President Obama's late-night announcement of the death of Osama bin Laden by Navy SEALs triggered a massive amount of real-time comments, searches, social networking and video streaming. The traffic explosion bogged down news pages and for a while even crashed CNN's mobile news site.
Oracle Database Network Foundation CVE-2011-0806 Remote Denial of Service Vulnerability
Companies like Apple need to be more open and provide their users with choices.
RIM's BlackBerry PlayBook could have been good but, well, it just isn't.
What do you do when your Cloud doesn't have the language, library, or computational resources sufficient to handle your requirement? Grab what you need from another cloud, right? It's not always that simple.
Apache APR and APR-util Multiple Integer Overflow Vulnerabilities
A security team at CSIS Security Group discovered a crimeware toolkit targeting Mac OS X being sold on the black market. Researchers are also noting an increase in fake antivirus.

Add to digg Add to StumbleUpon Add to Add to Google
Research In Motion on Monday announced two new BlackBerry Bold smartphones that run on the new BlackBerry 7 operating system and include near field communication (NFC) support.<
Once regarded as IT-focused, enterprise architects are becoming integral to business strategy
European Union plans to “create ” have come under fire from civil liberties groups, with many saying that they only serve to highlight how far the bloc still has to go in understanding the modern online world.
Personal attention and hands-on involvement can make good IT managers great IT leaders
[ MDVSA-2011:081 ] kdenetwork4
Multiple Vendors libc/glob(3) GLOB_BRACE|GLOB_LIMIT memory exhaustion
[SECURITY] [DSA 2230-1] qemu-kvm security update
[ISecAuditors Security Advisories] XSS in Oracle AS Portal 10g

A new strain of malware going by the name of MACDefender is making the rounds - Fake Antivirus in a new disguise! It's dowloaded as a compressed ZIP containing JavaScript. In some cases users are directed to download this malware from a specific site, but there are reports that it's also showing up directly in Google Image Searches.

If you have Open Safe files after downloading enabled in Safari, downloading this file will auto-install this code.

In it's current incarnation, MACDefender shows up in the installed applications list, so can be uninstalled. If you have accidentally installed this, go ahead and uninstall it. I would not expect this uninstall option to be a good long term protection strategy. I'd suggest that OSX users disable Open safe files after downloading, and also invest in a reasonable anti-malware suite. Installing a real anti-malware package is also a good idea (no matter what the Apple Fans say ..)

As in all platforms, downloading any code from the internet that suggests anything like click here and we'll check you for malware or you have a virus, click here to clean your machine or click here to tune your computer to run faster is probably a really bad idea. Almost without exeption, these sites are enticing you to help install malware on your computer, not protect it.

More detail here ==
================ Update 1 =====================
ISCreader Andra reports that on some sites this malware is charging $99 via Paypal during the install.
I guess this malware is going with the direct-deposit route to pay back development costs !


Rob VandenBrink

(c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License.
CSISreports that a new do-it-yourself crimeware kit has surfaced for the OSX platform, being sold under the name Weyland-Yutani BOT (Interesting name choice, all the way back to the Alien film franchise).
The current version works on Firefox, but Safari and Chrome versions are coming. It's reported that the templates used are the same as for Zeus, so expect this to take off once it hits the mainstream.
More details here ==

Rob VandenBrink

Metafore (c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License.
Cisco Systems launched its first containerized data center on Monday, coming late to the party but offering some unique management features that could help set it apart from other vendors.
Facebook earnings are growing faster than previously expected, and are on track to exceed $2 billion this year, according to a Wall Street Journal report.
In previous columns I have repeatedly emphasized the importance of interoperability and the danger of security fragmentation. Security is so fragmented that it is often hard to discern between hype and reality.
SPIP Disconnect Database Unspecified Remote Denial of Service Vulnerability
Joomla! Multiple SQL Injection Vulnerabilities
The March launches of Internet Explorer 9 (IE9) and Firefox 4 failed to stop Microsoft's and Mozilla's decline in browser share, new Web usage data shows.
The stream of smartphone-related patent lawsuits -- more than 40 since the start of 2010 -- could be a sign of a healthy market, or a deterrent to innovation.
People go online to get information and discuss Osama bin Laden's death

Posted by InfoSec News on May 02

Forwarded from: ACM CCS 2011 <acmccs2011 (at)>

Apologies for multiple copies of this announcement.


Workshop on Security and Privacy in Smartphones and Mobile Devices
(SPSM) Recognizing smartphone security and privacy as the emerging area,
this workshop intends to provide a...

Posted by InfoSec News on May 02


The Secunia Weekly Advisory Summary
2011-04-21 - 2011-04-28
This week: 45 advisories

Table of Contents:

1.....................................................Word From Secunia

Posted by InfoSec News on May 02

Forwarded from: William Knowles <wk (at) infosecnews [dot] org>

Unless you've allegedly been living in a cave for the last 12 hours or
so, Usama Bin Laden, aka Usama Bin Muhammad Bin Ladin, Shaykh Usama Bin
Ladin, the Prince, the Emir, Abu Abdallah, Mujahid Shaykh, Hajj, the
Director was slain in his palatial hideout in Abbottabad, Pakistan early
Monday in a firefight with U.S. Joint Special Operations Command

Internet Storm Center Infocon Status