Hackin9

IceWEB Announces Halodata International as Distributor & Reseller Partner for ...
DailyFinance
... Security Distribution and Consultancy Services company focusing solely on Data security solutions for corporate customers. Holding various distributorships of innovative InfoSec solutions , Halodata International and its sister concern, Halodata ...

 
How did you do on our server-virtualization quiz?
 
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

California and Metro Washington DC – Top Destinations for Cyber Security Talent
Dark Reading
“Industry, academia, and government need to do more to create a clear and comprehensive career path in cyber security starting as early as middle school,” said Diane Miller, Director, InfoSec and Cyber Initiatives, Northrop Grumman Corporation, which ...

and more »
 
LinuxSecurity.com: Multiple vulnerabilities were discovered in the dissectors for DVB-CI, GSM A Common and ASN.1 PER and in the Netmon file parser. For the oldstable distribution (squeeze), these problems have been fixed in [More...]
 
LinuxSecurity.com: Updated ruby193-ruby packages that fix one security issue are now available for Red Hat OpenShift Enterprise 1.2.2. The Red Hat Security Response Team has rated this update as having moderate [More...]
 
LinuxSecurity.com: Updated rubygem-passenger packages that fix two security issues are now available for Red Hat OpenShift Enterprise 1.2.2. The Red Hat Security Response Team has rated this update as having moderate [More...]
 
LinuxSecurity.com: Updated nss and nspr packages that fix two security issues, various bugs, and add enhancements are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...]
 

Smartphones running Microsoft's Windows Phone operating system are vulnerable to attacks that can extract the user credentials needed to log in to sensitive corporate networks, the company warned Monday.

The vulnerability resides in a Wi-Fi authentication scheme known as PEAP-MS-CHAPv2, which Windows Phones use to access wireless networks protected by version 2 of the Wi-Fi Protected Access protocol. Cryptographic weaknesses in the Microsoft-developed technology allow attackers to recover a phone's encrypted domain credentials when it connects to a rogue access point. By exploiting vulnerabilities in the MS-CHAPv2 cryptographic protocol, the adversary could then decrypt the data.

"An attacker-controlled system could pose as a known Wi-Fi access point, causing the victim's device to automatically attempt to authenticate with the access point and in turn allowing the attacker to intercept the victim's encrypted domain credentials," the Microsoft advisory warned. "An attacker could then exploit cryptographic weaknesses in the PEAP-MS-CHAPv2 protocol to obtain the victim's domain credentials."

Read 3 remaining paragraphs | Comments

    


 
Samsung today announced that it has begun mass producing the industry's first three-dimensional Vertical NAND flash memory, which breaks through the current scaling limit for existing NAND flash technology.
 
Smartphones have strong trade-in value, sometimes as much as hundreds of dollars.
 
Devon IT today said that later this month it will begin shipping its USB memory stick, which plugs into an HDMI monitor or display and allows it to be used as a virtual desktop computer.
 
Amazon.com founder and CEO Jeff Bezos has announced a surprise plan to buy The Washington Post for US$250 million in cash.
 
Samsung has laid the groundwork for its potential entry into the much-hyped smartwatch market, by filing an application for a U.S. trademark on the name 'Samsung Galaxy Gear.'
 
Trendnet TEW-812DRU CVE-2013-3098 Cross Site Request Forgery Vulnerability
 
A page displayed by trojanized app found by Trend Micro.
Trend Micro

Researchers have unearthed another malicious app exploiting a critical vulnerability in Google's Android OS that allows attackers to inject malicious code into legitimate programs without invalidating their digital signature.

The threat poses as an update for the official Android app available to customers of NH Nonghyup Bank, one of South Korea's biggest financial institutions, according to a blog post published Friday by researchers from antivirus provider Trend Micro. By exploiting the so-called master-key vulnerability in the mobile OS, this malware bears the same cryptographic signature found in the legitimate release, even though the update contains malicious code that uploads user credentials to a remote server.

The good news is that the app verification tool Google released in Android 4.2 late last year flags these malicious apps. And according to this recent post, Google developers have added the protection to earlier versions and turned it on by default. The verification tool checks the authenticity of apps downloaded both from the official Google Play marketplace and alternative sources as well. As an added safety measure, users should avoid these alternative marketplaces unless there's a strong case for doing otherwise.

Read 1 remaining paragraphs | Comments

    


 
RubyGems rgpg 'gpg_helper.rb' Remote Command Injection Vulnerability
 

FireEye to become newest public infosec company
SC Magazine
FireEye to become newest public infosec company. Network security company FireEye has announced plans to file for an initial public offering to raise up to $175 million in stock. The Milpitas, Calif.-based firm, founded in 2004, expects to trade under ...

and more »
 
A Wisconsin IT professional has filed a lawsuit against Indian outsourcing firm Infosys alleging that the company discriminates against U.S. job applicants in favor of South Asians for jobs in the U.S.
 
Windows' share of the tablet market grew slightly in the second quarter, as shipments also ticked up in the face of a slow-down by tablets overall, researcher IDC said today.
 
Oracle has introduced a new software package for its Exalytics high-performance analytics appliance that in some cases, will be mandatory.
 
Registration is now open for the fourth in a series of workshops to bring together representatives from government, industry and academia to establish a voluntary Cybersecurity Framework that will help reduce risks to critical ...
 
Intel has posted information on its website about new tablets for the education market with 10-inch and 7-inch screens, Atom chips and the Android OS code-named Jellybean.
 

Mobile Threat Monday: Smurfs 2, Black Hat, and Beyond
PC Magazine
Android malware SW2. Just because practically the entire infosec community decamped to Las Vegas for the annual Black Hat security conference and DEF CON hacker jamboree last week does not mean we can stop worrying about malicious mobile apps.

and more »
 

Roughly two weeks after it first acknowledged the problem, Apple has restored many of the services that were taken offline when its developer site servers were accessed by an "intruder" on July 18. Developers can once again access iOS and OS X betas, view prerelease documentation, download certificates, and watch videos from Apple's Worldwide Developer Conference (WWDC) sessions just as they could before the security breach. Apple today sent out an update via e-mail to registered developers regarding the remaining services.

"We plan to reinstate most of the remaining services this week: Xcode automatic configuration as well as access to license agreements, TSIs, program enrollments, and renewals in Member Center," the company said. The message went on to reiterate that the status page that Apple created about a week after the breach remains the most up-to-date source of information, and developers whose program subscriptions were set to expire during the outage would continue to have their subscriptions extended. Membership renewal is one of the services that remains down, and extending these developers' subscriptions guarantees that their apps won't be delisted from Apple's various app stores.

Following the breach, Apple promised that it would be performing an "overhaul" of its developer systems, including security updates and a rebuilding of the company's database. In its initial status updates on the security breach Apple promised that no "sensitive" information had been accessed, but as always we recommend a password change and two-factor authentication for any registered Apple developer whose information may be at risk.

Read on Ars Technica | Comments

    


 

Attackers exploited a recently patched vulnerability in the Firefox browser to uncloak users of the Tor anonymity service, and the attack code is now publicly circulating online. While the exploit was most likely designed to identify people alleged to have frequented a child porn forum recently targeted by the FBI, anonymity advocates say the code could be used against almost any Tor user.

A piece of malicious JavaScript was found embedded in webpages delivered by Freedom Hosting, a provider of "hidden services" that are available only to people surfing anonymously through Tor. The attack code exploited a memory-management vulnerability, forcing Firefox to send a unique identifier to a third-party server using a public IP address that can be linked back to the person's ISP. The exploit contained several hallmarks of professional malware development, including "heap spraying" techniques to bypass Windows security protections and the loading of executable code that prompted compromised machines to send the identifying information to a server located in Virginia, according to an analysis by researcher Vlad Tsrklevich.

Discovery of the exploit came as the FBI reportedly sought the extradition of Freedom Host founder on child porn charges. Word of 28-year-old Eric Eoin Marques's arrest also came as members of the Tor Project reported the disappearance of a "large number" of hidden service addresses used by Freedom Hosting. The confluence of the three events has prompted speculation that the de-anonymizing exploit is the work of the FBI or another organized group targeting child pornographers.

Read 4 remaining paragraphs | Comments

    


 
Re: Joomla core <= 3.1.5 reflected XSS vulnerability
 
Huawei B153 3G/UMTS router WPS weakness
 
Joomseller "Events Booking Pro" and "JSE Event" reflected XSS
 
Joomla com_sectionex v2.5.96 SQL Injection vulnerabilities
 

Record Breaking Black Hat USA 2013 Wraps
Dark Reading
“As the international InfoSec community continues to grow, along with threats to the global information infrastructure, the time is right for Black Hat to bring a security event of this caliber back to Asia,” said Ford. Celebrating 14 years, Black Hat ...

and more »
 
Nearly 10% fewer tablets of all brands shipped in the second quarter compared to the first, with Apple's iPad line showing the biggest decline, IDC said today.
 
Feedly today followed through on a promise earlier this year and launched a paid version of its RSS service.
 
LinuxSecurity.com: Updated owncloud package fixes security vulnerabilities: XSS vulnerability in Share Interface (oC-SA-2013-029). Authentication bypass in user_webdavauth (oC-SA-2013-030). [More...]
 
LinuxSecurity.com: New gnupg and libgcrypt packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue. New libgpg-error packages are also available for Slackware 13.1 and older as the supplied version wasn't new enough to compile the fixed version of libgcrypt. [More Info...]
 
LinuxSecurity.com: Several vulnerabilities have been discovered in the Chromium web browser. CVE-2013-2881 [More...]
 
LinuxSecurity.com: It was discovered that otrs2, the Open Ticket Request System, does not properly sanitise user-supplied data that is used on SQL queries. An attacker with a valid agent login could exploit this issue to craft SQL queries by injecting arbitrary SQL code through manipulated URLs. [More...]
 
The latest Web technologies can be used to build a secure and distributed file storage system by loading a piece of JavaScript code into users' Web browsers without them knowing, a researcher demonstrated Sunday at the Defcon security conference in Las Vegas.
 
Samsung plans to announce a new Galaxy device -- probably the Note III -- on Sept. 4 in Berlin, according to an invitation sent to reporters on Monday.
 

Record Breaking Black Hat USA 2013 Wraps
Stockhouse
"As the international InfoSec community continues to grow, along with threats to the global information infrastructure, the time is right for Black Hat to bring a security event of this caliber back to Asia," said Ford. Celebrating 14 years, Black Hat ...

and more »
 
 
I’m always searching to find facts and figures on the effectiveness of security measures on phishing attacks, which is harder that it would first seem. This is all is in aid of framing a picture to the boss on why to spend money, energy and resources on this most insidious and highly successful type of attack. That makes it very important to understand what happens towards your company, then you’re industry sector and, finally, how other non-related sectors are doing to create an impact that is meaningful to management. There’s already a number of great human awareness training to turn people in to phishing sensors [1], but let's stick to technical controls for alerting on phishing attacks. 
 
One of my favourites to providing that global view is the Anti-Phishing Working Group (APWG), which does a marvellous job of providing quarterly reports [2] as part of its goal to blunt the damage phishing attacks inflict. So now you’ve got some data points to wow management with how bad phishing globally and it covers different sectors, so how you go about getting some data on phishers targeting your company? 
 
Having an understanding of the phishing problem you face can be hard to fully comprehend. Looking to your own inbox or even that of your company’s mail abuse tracking system is probably missing out on the bigger picture, due lack of visibility: it may have already been blocked up stream, be targeted at your customers, or a number of other reasons and you never get to see the full scope of the phishing attacks. This means you may have to work with external vendors or third parties to tell you what they’re seeing, but that could be a waste of money. So what other option do you have? Glad you asked. 
 
One neat option is DMARC [3], which stands for "Domain-based Message Authentication, Reporting & Conformance", and it has raised debates in bars, meeting rooms and forums on its value and effectiveness, but is worth discussing. In a nutshell "DMARC makes it easier for email senders and receivers to determine whether or not a given message is legitimately from the sender, and what to do if it isn't." Let’s jump the “Well, it has to be configured properly first” argument that normally ignites impassioned ranting [4] and move to the utopia where it's working properly and suddenly you've got reporting that provides decent visibility on one channel of attack the phishers use against your DMARC protected domains. As an added bonus the reporting includes the IP addresses of the botnets/remailer/specific attacker send the email from which allows possible attribution or it to be added to your known bad IP lists.
 
The DMARC guide [5] makes this is pretty easy to get the results back and I've have great reporting for the personal domains I own, but then wondered how this stacks up for the big players and how it does actually reduce the impact of real phishing; then I stumbled over a report by Agari [6]. From reading between the lines and pleasantly coloured graphics, it paints DMARC as a solid defense and reporting mechanism to filter out one line of attack and provides some actionable information on a certain format of phishing attack. 
 
Most of us have come to the realization that despite the technical controls we put in place, a well-crafted phishing email is likely to be opened by the nice person sitting in front of the keyboard. Who doesn’t want to see the salaries for the entire department or a piano-playing kitten? Here’s the but…but if technical controls can drop a percentage of emails bearing the aforementioned kitties getting to the nice people then why the heck not implement it?
 
DMARC isn’t a silver bullet to phishing, can be circumvented by smarter attackers and may have technical factors that means it doesn’t work for your company, but it can provide insight in to attacks you never had before. Anything that makes it harder for a phisher to target your company, friends or family and gives you more visibility in to attacks is worth putting in place or at least reading the specification and making the decision for yourself.
 
As always, if you have any suggestions, insights or tips please feel free to comment.
 
 
[1] http://www.securingthehuman.org/
[2] http://www.apwg.org/resources/apwg-reports/ 
[3] http://www.dmarc.org/
[4] http://www.merriam-webster.com/dictionary/rant 
[5] http://www.dmarc.org/faq.html#s_6 
[6] http://agari.com/2013/07/31/agari-releases-its-2013-email-trustindex-second-quarter-edition/ 
 
 
Chris Mohan --- Internet Storm Center Handler on Duty
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Patent company files a complaint against T-Mobile USA for allegedly infringing a patent related to cell phone geolocation.
 
libproc-processtable-perl '/tmp/TTYDEVS' Insecure Temporary File Creation Vulnerability
 
Squid 'idnsALookup()' Function Remote Buffer Overflow Vulnerability
 

California and Metro Washington DC - Top Destinations for Cyber Security Talent
MarketWatch (press release)
"Industry, academia, and government need to do more to create a clear and comprehensive career path in cyber security starting as early as middle school," said Diane Miller, Director, InfoSec and Cyber Initiatives, Northrop Grumman Corporation, which ...

and more »
 

IceWEB Announces Halodata International as Distributor & Reseller Partner for ...
Wall Street Journal (press release)
... Security Distribution and Consultancy Services company focusing solely on Data security solutions for corporate customers. Holding various distributorships of innovative InfoSec solutions , Halodata International and its sister concern, Halodata ...

and more »
 
Startup Crossbar emerged from stealth mode Monday to announce its version of RRAM (resistive random-access memory), a new type of memory that could be a successor to flash storage and DRAM.
 
HP LaserJet Pro printers remote admin password extraction
 
Joomla core <= 3.1.5 reflected XSS vulnerability
 
WebCalendar Multiple Security Bypass Vulnerabilities
 
Workplace join, work folders and other new Windows Server 2012 R2 features help beleaguered IT staffers manage the jungle of end user devices.
 
PernixData, a startup founded by VMware veterans, says its software can turn server-based flash storage into a resource shared across a standard VMware cluster of as many as 32 systems.
 
Local authorities in China are investigating two electronics suppliers linked with Apple and also reportedly HTC of dumping heavy metals in the country's rivers after watchdog groups accused them of damaging the environment.
 
Twitter has revised its guidelines around abusive behavior following bomb and rape threats made against several prominent female users of the service in the U.K.
 
A large number of websites shielded by an anonymizing service vanished from the Internet on Saturday, an action that may be linked with an arrest of a man in Ireland.
 
Premier 100 IT Leader Thaddeus Arroyo also answers questions on becoming a leader and skills for the future.
 
Apple has warned some long-time users of its iCloud online storage and syncing service that the free 20GB of storage given them two years ago will disappear at the end of September.
 
PuTTY SSH handshake heap overflow
 

IT Network Architect – Cyber Security - Permanent - Basingstoke
TechWeekEurope UK
No matter what your role; architect, pen tester, infosec consultant, all of our staff have their monthly quota in the Cyber Simulator to make sure that all of our cyber security experts remain at the very top of their game when it comes to combating ...

 
Rgpg 0.2.2 Ruby Gem Remote Command Injection
 
FTP OnConnect v1.4.11 iOS - Multiple Web Vulnerabilities
 
Google Chrome CVE-2013-2883 Use After Free Remote Code Execution Vulnerability
 
Google Chrome CVE-2013-2886 Multiple Unspecified Security Vulnerabilities
 
Google Chrome CVE-2013-2884 Use After Free Remote Code Execution Vulnerability
 
SEC Consult SA-20130805-0 :: Vodafone EasyBox Default WPS PIN Algorithm Weakness
 

2013最新人気ゴルフクラブセット通販。r11 アイアン、ドライバー、セレクトニューポート2、フェアウェイウッド等のゴルフ用品先行発売。人気ゴルフクラブセット激安で購入、数量限定スーパーセール開催中!ゴルフ用品全国送料無料、お早めに購入してください。

 
withU Music Share v1.3.7 iOS - Command Inject Vulnerability
 
[slackware-security] gnupg / libgcrypt (SSA:2013-215-01)
 
[SECURITY] [DSA 2732-1] chromium-browser security update
 
[SECURITY] [DSA 2733-1] otrs2 security update
 

Researchers demo new IPv6 attack against Windows 8 PCs
ComputerworldUK
Due for full disclosure at the DEF CON 21 conference, the attack's design isn't new - the similar Stateless Address Auto Configuration (SLAAC) principle was demonstrated at Infosec in 2011 - but extends it to Windows 8 segments for the first time ...

 
Internet Storm Center Infocon Status