InfoSec News

You probably know if your PC is running Windows XP, Vista, or 7--but do you know which version of Windows it is? For example, is it XP Home? Windows 7 Ultimate? And is it the 32-bit or 64-bit variety?
 
The HP EliteBook 2740p adds a twist to the typical design of ultraportable laptops. As a notebook, this thin, light PC fits big performance into its small case, but that's not all. You can rotate the display to shift it into tablet mode. A pressure-sensitive stylus can do sketches on screen, or you can point with up to two fingers, enabling multitouch gestures. And this EliteBook supplies nearly every other expected feature, making it a versatile work machine for any portable situation.
 
If the word "smartphone" has ever struck you as ironic, you aren't alone. Thank your lucky stars these horrors didn't happen to you
 
It's moving in via the technology adoption life cycle and what might be termed the technology adaptation life cycle.
 
Depression-era bank robber Slick Willie Sutton is famous for saying that he robbed banks "because that's where the money is." If he were around today, he'd have other options.
 
If you loathe talking on the phone to automated speech recognition systems, take solace: scientists are working to make such systems more lifelike and less annoying.
 
The U.S. Federal Communications Commission has called off negotiations on a network neutrality compromise schedule for the coming days, saying the talks have not been fruitful enough.
 
-- Manuel Humberto Santander Pelez | http://twitter.com/manuelsantander | http://manuel.santander.name | msantand at isc dot sans dot org (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Security updates from Adobe will patch a critical flaw that was discussed at last week's Black Hat conference.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
The U.S. Agency for International Affairs is funding development of Sri Lanka's offshore outsourcing industry, with the goal of creating some 3,000 jobs in an area of the country that has been especially brutalized by civil war.
 
Microsoft today said it will deliver a record 14 security updates next week to patch a record-tying 34 vulnerabilities in Windows, IE, Office and Silverlight.
 
WiMax carrier Clearwire is likely to adopt LTE (Long-Term Evolution), and its decision will probably be known within a year, analysts said following the company's announcement on Wednesday that it will test the network technology.
 
Two senior U.S. lawmakers say they're "troubled" by the collection of personal data at many websites, and they want details on how much data 15 popular sites collect and what the sites do with the data.
 
IBM and Aetna-subsidiary ActiveHealth have collaborated to create a cloud-based clinical decision support engine that can analyze information in electronic medical records in order to deliver alerts, track patient treatment and offer best practices to physicians.
 
Mark Gibbs looked at the Samsung NB30 and decided it needed a better OS.
 
Microsoft will release 14 security bulletins this month, the most the software giant has ever released in one month.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

Microsoft - Security - Operating system - microsoftoffice - Windows XP
 
Adobe today said it plans to issue an emergency patch the week of Aug. 16 to fix a critical flaw in its Reader and Acrobat software.
 
Baidu, China's biggest search engine, is looking to expand its business overseas and is preparing to invest internationally, the company's chief executive said.
 
The Nexus One, the phone that was supposed to launch Google's online phone sales strategy, may not be available anymore from the search giant's online store, but Google is still selling it -- to developers.
 
Hiring for IT jobs continues on the upswing in the U.S. and Canada as recessionary gloom gives way to cautious optimism, according to employers, who cite networking, security, virtualization and database skills as among the most sought-after.
 
Amid a warning by German authorities of possible malicious use of a critical iPhone exploit, Apple said it has a fix ready and will deliver it in the next smartphone update.
 
Dell on Thursday announced the lightweight Inspiron M101z laptop with new technologies including Bluetooth 3.0 wireless capabilities and low-voltage processors from Advanced Micro Devices.
 
Financial services firms are recruiting more IT professionals this summer than a year ago, and they are looking for strong programming, database and operating system skills to keep their real-time banking and trading systems up and running.
 
Google today denied reports that it is in talks with Verizon for a deal that could undermine net neutrality.
 
Charlie Miller discovered a integer overflow error in CoolType.dll when parsing the maxCompositePoints field value in the Maximum Profile table of a TrueType font. PDFs containing specially crafted TrueType fonts can trigger this vulnerability.
Want more information? Check the following document from pages 51 to 58: http://securityevaluators.com/files/papers/CrashAnalysis.pdf
-- Manuel Humberto Santander Pelez | http://twitter.com/manuelsantander| http://manuel.santander.name| msantand at isc dot sans dot org (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
I've tried a handful of movie-listing apps, and generally they range from the comically bad to the merely competent. This app by Flixster, simply titled Movies, puts all the other apps to shame. Attractively designed, Movies has a smart interface that allows the user to discover what flicks are playing, and it includes plenty of other neat features, too.
 
Google's Android was expected to become the world's second most-used smartphone OS by 2012, after the Symbian OS, but now accelerating sales will help it get there this year, according to analysts.
 
Nokia has started beta testing a new service called Listings, which will be a digital marketplace where people in emerging markets can look for a job or buy or sell goods using their Nokia phone, the company said in a blog post on Thursday.
 
No IT certification currently available can gauge whether a professional understands how IT supports and complements the overall business.
 
Google today denied reports that it is in talks with Verizon for a deal that could undermine net neutrality.
 
A potential deal between Google and Verizon Communications on network neutrality may not carry much weight with the U.S. Federal Communications Commission, which has been trying to broker its own deal in recent weeks.
 
Lessons learned from the failure of Google Wave may help engineers at the company come up with a far better social networking offering to take on Facebook.
 
Invoking Exposé from the Dock, to view a single application's windows, is handy. But what if you want to view the windows of more than one application, without viewing them all? MacOSXHints.com reader kapeli explains how:
 
Children's toys are going more and more high-tech each year.
 
Russian password-cracking company Elcomsoft has released new software that can in some instances figure out the password used to encrypt backed-up iPhone data.
 
Google and Verizon are reportedly in talks over how to manage network traffic, an agreement that could influence how U.S. regulators view network neutrality, according to a report in Thursday's Wall Street Journal.
 
China Unicom plans to start selling iPhones with Wi-Fi capabilities sometime soon in August
 
A sophisticated worm designed to steal industrial secrets has been around for much longer than previously thought, according to security experts investigating the malicious software.
 
Microsoft on Wednesday updated its bare-bones preview of Internet Explorer 9 (IE9) for the last time, saying that the next release would be a beta build.
 
How bad is it? Worse than you think. Here's what the new breed of malware looks like -- and what you can do to stop it
 
In the not-so-distant future, cars with active safety systems and vehicle-to-vehicle communications will make driving safer than ever. Take a closer look with this interactive graphic.
 
In the not-so-distant future, cars with active safety systems and vehicle-to-vehicle communication will make driving safer than ever. One company has even set an ambitious goal for the year 2020: Make new cars that are so safe, nobody will die in one.
 
Indonesia is continuing to press Research In Motion (RIM) to allow monitoring of BlackBerry data for security reasons, a request made last year but renewed as the Canadian company feels similar pressure from other countries.
 

BankInfoSecurity.com

Why Banks are Losing the War
BankInfoSecurity.com
Grossman is a frequent speaker at industry events including the Black Hat Briefings, RSA Conference, ISACA, CSI, InfoSec World, OWASP, ISSA, and Defcon as ...

 
InfoSec News: Beijing hosts cyber-security conference: http://news.xinhuanet.com/english2010/china/2010-08/04/c_13429064.htm
By Wang Guanqun English.news.cn 2010-08-04
BEIJING -- Top cyber-security analysts are gathering in the Chinese capital for a summit to boost security in the sector, amid the increasing threat of computer hacking worldwide. [...]
 
InfoSec News: Location-based quantum crypto now possible, boffins say: http://www.theregister.co.uk/2010/08/03/location_based_crypto_breakthru/
By Dan Goodin in San Francisco The Register 3rd August 2010
Researchers say they have devised a foolproof way to encrypt messages that can be unlocked only by a recipient physically located in a [...]
 
InfoSec News: Hacker Spoofs Cell Phone Tower to Intercept Calls: http://www.wired.com/threatlevel/2010/07/intercepting-cell-phone-calls/
By Kim Zetter Threat Level Wired.com July 31, 2010
LAS VEGAS -- A security researcher created a cell phone base station that tricks cell phones into routing their outbound calls through his [...]
 
InfoSec News: Commerce Department Seeks Advice On Cybersecurity: http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=226500291
By Elizabeth Montalbano InformationWeek August 4, 2010
The Department of Commerce is looking for advice from businesses, academics and even the general public about how to maintain [...]
 
InfoSec News: DHS quietly dispatching teams to test power plant cybersecurity: http://www.computerworld.com/s/article/9180152/DHS_quietly_dispatching_teams_to_test_power_plant_cybersecurity
By Jaikumar Vijayan Computerworld August 4, 2010
The Department of Homeland Security (DHS) is quietly creating specialized teams of experts to test industrial control systems at U. [...]
 
InfoSec News: Private Facebook Data Becomes Big Business: http://www.pcworld.com/businesscenter/article/202285/private_facebook_data_becomes_big_business.html
By Tony Bradley PC World July 30, 2010
When a security researcher made personal profile information of more than 170 million Facebook users available to the public on BitTorrent--a [...]
 
InfoSec News: Police bust e-crime gang for online bank thefts: http://news.techworld.com/security/3234225/police-bust-e-crime-gang-for-online-bank-thefts/
By John E Dunn Techworld 04 August 10
UK and Irish police have today swooped on an international e-crime gang accused of attempting to steal money from up to 20,000 online bank [...]
 

Posted by InfoSec News on Aug 04

http://news.xinhuanet.com/english2010/china/2010-08/04/c_13429064.htm

By Wang Guanqun
English.news.cn
2010-08-04

BEIJING -- Top cyber-security analysts are gathering in the Chinese
capital for a summit to boost security in the sector, amid the
increasing threat of computer hacking worldwide.

About 300 participants from countries including the United States, Japan
and Australia are attending the two-day summit, which starts on
Wednesday...
 

Posted by InfoSec News on Aug 04

http://www.theregister.co.uk/2010/08/03/location_based_crypto_breakthru/

By Dan Goodin in San Francisco
The Register
3rd August 2010

Researchers say they have devised a foolproof way to encrypt messages
that can be unlocked only by a recipient physically located in a
specific place, solving a problem that has vexed cryptographers for
years.

The technique for position-based quantum cryptography is scheduled to be
presented at the 2010 IEEE...
 

Posted by InfoSec News on Aug 04

http://www.wired.com/threatlevel/2010/07/intercepting-cell-phone-calls/

By Kim Zetter
Threat Level
Wired.com
July 31, 2010

LAS VEGAS -- A security researcher created a cell phone base station
that tricks cell phones into routing their outbound calls through his
device, allowing someone to intercept even encrypted calls in the clear.

The device tricks the phones into disabling encryption and records call
details and content before they.re...
 

Posted by InfoSec News on Aug 04

http://www.informationweek.com/news/government/security/showArticle.jhtml?articleID=226500291

By Elizabeth Montalbano
InformationWeek
August 4, 2010

The Department of Commerce is looking for advice from businesses,
academics and even the general public about how to maintain
cybersecurity while fostering innovation in the commercial Internet
space.

In a Notice of inquiry (PDF), the department asks for comment about,
among other things, the...
 

Posted by InfoSec News on Aug 04

http://www.computerworld.com/s/article/9180152/DHS_quietly_dispatching_teams_to_test_power_plant_cybersecurity

By Jaikumar Vijayan
Computerworld
August 4, 2010

The Department of Homeland Security (DHS) is quietly creating
specialized teams of experts to test industrial control systems at U.S
power plants for cybersecurity weaknesses.

According to an Associate Press report today, DHS has so far created
four teams to conduct such assessments,...
 

Posted by InfoSec News on Aug 04

http://www.pcworld.com/businesscenter/article/202285/private_facebook_data_becomes_big_business.html

By Tony Bradley
PC World
July 30, 2010

When a security researcher made personal profile information of more
than 170 million Facebook users available to the public on BitTorrent--a
peer-to-peer file sharing site--many questioned why he did not attempt
to sell that information to an interested party. Names and profile data
on that many...
 

Posted by InfoSec News on Aug 04

http://news.techworld.com/security/3234225/police-bust-e-crime-gang-for-online-bank-thefts/

By John E Dunn
Techworld
04 August 10

UK and Irish police have today swooped on an international e-crime gang
accused of attempting to steal money from up to 20,000 online bank
accounts and credit cards in the countries.

Using initial estimates from the Metropolitan Police Central e-Crime
Unit (PCeU), the unnamed five men and one woman arrested are...
 
Acer's latest crack at combining Google's Android mobile software and Microsoft's Windows XP OS in the same netbook was unveiled at a computer show in Taipei on Thursday.
 
Wednesday's antitrust settlement between Intel and the U.S. Federal Trade Commission sends a strong message to IT companies not to exploit their dominance in a way that squashes competition or deprives consumers of choice, industry observers said.
 
I know a handful of people who suffer from netbook-buyer's remorse: they bought one of the inexpensive little machines, then stuck it in a closet when they discovered how sluggishly it ran Windows.
 
Clearwire plans to conduct trials of LTE (Long-Term Evolution) network infrastructure, the company announced Wednesday.
 

Internet Storm Center Infocon Status