Share |

InfoSec News

The Asus Eee Pad Transformer TF101 Tablet doesn't stand on its own. But when paired with its matching keyboard dock, the Transformer morphs into a tablet that strikes an admirable balance between productivity and entertainment. At $399 for the 16GB Wi-Fi model (or $499 for the 32GB Wi-Fi model, prices as of May 6, 2011), the Transformer is the least expensive Android 3.0 tablet to date; and the smaller-capacity version bests Apple's iPad 2 by $100.
Skype plans to push out an important update to its Skype for Mac software next week that will fix a big that could be leveraged by hackers looking to build a self-copying worm program.
Index Engines announced on Friday that its e-discovery appliance has been integrated with EMC's Data Domain backup and deduplication product to allow searches for legal discovery and regulatory compliance purposes.
When I placed my order for the iPad 2, I don't know whether I was more excited for the device itself, or the Smart Cover that I ordered along with it. Apple's introductory video for the Smart Cover was positively drool-worthy. After nearly two months with my iPad 2 and its Smart Cover, though, I'm less convinced of the Smart Cover's awesomeness. I still like my Smart Cover, but I definitely don't love it.
Steve Jobs may hate the idea of using a stylus on his touchscreen devices, but the fact remains that some consumers simply prefer an intermediary accessory for interaction. Whether it's too cold outside for direct contact, you're worried about touchscreen germs, or you need a sketching tool, sometimes a stylus can be a good thing. Accessory manufacturers seem to agree, having produced a plethora of styluses for Apple's iOS devices.
VMware vCenter Server Unspecified Directory Traversal Vulnerability
IBM's Watson's impressive "Jeopardy!" win demonstrated the awesome strides in computing power and ingenuity, but just as impressive was the way in which Watson's creators attacked an avalanche of information to come out victorious.
[Editor's note: For reviews of other touchscreen styluses, see our review roundup.]
Although Microsoft has patched multiple DLL load hijacking vulnerabilities since last summer, Windows and Internet Explorer 9 (IE9) can still be exploited, a security company warned today.
A U.S. senator says he plans to introduce an online do-not-track bill.
OTRS Multiple Unspecified Cross-Site Scripting Vulnerabilities
Tinyproxy 'conf.c' Integer Overflow Security Bypass Vulnerability
[SECURITY] [DSA 2232-1] exim4 security update
[SECURITY] [DSA 2231-1] otrs2 security update
According to a Pure Hacking Blog Entry = http : // and TheRegister UK = http : //
There is a 0 Day exploit that exists for Skype on MAC. Windows and Linux are unaffected. Some best practices for Skype include setting your messages to only allow from Contacts. This does not protect you from infected contacts but it might help.

Please take measures to protect yourself. We are not aware of this being exploited in the wild and as most of us might use the operating system affected, we are both personally and professionally interested.

Richard Porter
--- ISC Handler on Duty
(c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License.
Online speculation is starting to pick up speed that Apple is looking to ditch Intel chips and move to ARM-based processors for its Mac line of laptops.
We recently interviewed Edward Schwartz, chief security officer for IT security firm NetWitness (recently acquired by RSA) to get his thoughts on the move to electronic medical records and the impact on the security and privacy of those records. During his extensive career, Schwartz has served in various executive positions for a number of security vendors including CTO of ManTech Security Technologies Corp, SVP of operations of Guardent Inc. and EVP of operations for Predictive Systems. Schwartz also worked as CISO at Nationwide Insurance.
We've already shared the results of our benchmark tests for the $1999 27-inch 3.1GHz Core i5 iMac, one of four new iMac configurations released by Apple this week. We've had the chance to finish testing the remaining three standard-configuration models, with our results showing a significant boost for the new iMacs over the models they replace. However, not much differentiates the performance of the four new iMacs among each other.
The FCC should investigate AT&T's new broadband caps and ask questions about why the company needs them, two broadband advocacy groups said.
Security vendor Sophos plans to buy Astaro, a maker of network security software.
Baggage weight restrictions are the bane of many international travelers, but you can eliminate 5 kilograms from your bags by replacing those bulky travel guides with travel apps on your smartphone or tablet.
Multiple Microsoft Products DLL Loading Arbitrary Code Execution Vulnerability
SpongeBob Square Pants Typing XML File Buffer Overflow Vulnerability
Apple won't let iPhone users update the smartphone's iOS over the air because it wants people regularly returning to iTunes, an analyst said today.
PastPass Friday backed off an order it issued yesterday calling for all users to reset their master passwords to the online password management system.
MuPDF Firefox Plugin 'pdfmoz_onmouse()' Function Stack Buffer Overflow Vulnerability
'libarchive' Multiple Remote Vulnerabilities
Sophos branches out into network security with its acquisition of Astaro, UTM vendor for the midmarket.

Add to digg Add to StumbleUpon Add to Add to Google
As NASA marks the 50th anniversary of the first U.S. manned space flight, IBM is celebrating the mathematicians and engineers who helped make it happen.
A group based in Hong Kong this week issued a report alleging continued Foxconn worker abuse, and questioned some of the promises made by the contract manufacturer to live up to its code of conduct.
Exim 'dkim_exim_verify_finish()' Remote Format String Vulnerability
Google's biggest developer platforms will take center stage at Google I/O next week.
Windows Defender isn't in Control Panel's list of uninstallers. Spiritchaser asked the Answer Line forum how to remove it.
We have received early notification that Microsoft is updating the method of guidance for patching. In 2008 Microsoft published its first Exploit Index to better guide customers on likelihood of getting Sploited. This new notification reflects a change in the index ratings.

Microsoft Exploit Index

Consistent exploit code likely

Inconsistent exploit code likely

Functioning exploit code unlikely

Reviewing the publication by Microsoft, I think they are saying:
1 - Code easy to create and or already created.

2 - Moderate to create or maybe a DoS and or that results are not consistent.

3 - They don't feel the risk is high.
As always, the Storm Center Handlers will continue to independently evaluate Microsoft Patch Tuesday for Reboot Wednesday and provide our guidance :) On their site, if you recall MS08-021 (Vulnerability in GDI Could (Did and does :) Allow Remote Code Execution)? MSFT rates that with an EIA of 1.
Also, in the notification they included early warning of a light patch month that includes a set of Office patches and 2003-2008 R2 set of server patches.

Finally, MSFT will be aggregating their Index into Current Software and older software.

As of this month, we are making some changes to the rating system to make vulnerability assessment more clear and digestible for customers. Specifically, we will be publishing two Exploit-ability Index ratings per vulnerability- one for the most recent platform, the other as an aggregate rating for all older versions of the software. --

Check out:
http : // -- Index Definition
http : // -- Original Notice

http : / / -- Advanced Notice

Richard Porter
--- ISC Handler on Duty (c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License.
On its own, the Asus Eee Pad Transformer TF101 Tablet doesn't look as if it's about to set the tablet wars on fire. But after spending time with the Transformer ($399 for the 16GB model, $499 for the 32GB version) and its matching keyboard dock, I think Asus is on to something.
Silently Pwning Protected-Mode IE9 and Innocent Windows Applications
VMSA-2011-0008 VMware vCenter Server and vSphere Client security vulnerabilities
Security Advisory: DNS BIND Security Advisory: RRSIG Queries Can Trigger Server Crash When Using Response Policy Zones
[USN-1111-1] Linux kernel vulnerabilities
Ubuntu 11.04, or "Natty Narwhal," has been out just a few days, but already it's being billed as possibly the most accessible and user-friendly Linux distribution ever. With its new Unity interface, the open-source operating system mimics what many people are used to in the mobile arena to create a simple, intuitive way to get things done.
Alcatel-Lucent reported growing revenue and a shrinking loss for the first quarter of 2011, helped by operators' need for more capacity in their fixed and mobile networks, the company said Friday.
Smartphone maker High Tech Computer signed a memorandum of understanding Friday with a group of Asian telecom service providers who will jointly buy equipment for mobile Internet from the Taiwanese company.
RETIRED: AlegroCart 'manufacturer_id' Parameter SQL Injection Vulnerability
The looming depletion of Internet addresses has split the networking world into "IPv4 diehards" and "IPv6 purists," but the real needs of businesses lie somewhere in between the views of these extremists, a Brocade Communications Systems executive said this week.
LastPass said Thursday that hackers did not obtain passwords linked to Xmarks, the browser synchronization service the company acquired last December.
Apple's latest iMac and MacBook Pro line-ups are optimized to squeeze more performance from solid-state drives.
To be of strategic use, BI systems need to be more forward-looking, said IT managers and analysts at the Gartner BI Summit in Los Angeles this week.
Evernote and Springpad both collect any and all digital info so that you can find it when and where you need it. How well do they work and which works better?
ISC BIND 9 RRSIG Query Type Remote Denial of Service Vulnerability
Sony appears to be close to ending a two-week long outage of its PlayStation Network. The company said late Thursday that it is in the final stages of internal testing of the new system, but it stopped short of saying when the popular online gaming service would resume operations.

Posted by InfoSec News on May 06

The Jerusalem Post

Israel has detected what appears to have been attempts to use
cyber-warfare to attack critical state infrastructure, outgoing Shin Bet
(Israel Security Agency) chief Yuval Diskin said on Wednesday.

Speaking to military reporters ahead of his scheduled retirement later
this month, Diskin said that the Shin Bet, which is responsible for...

Posted by InfoSec News on May 06

By Mathew J. Schwartz
May 05, 2011

Sony said that it's called in three computer security and forensics
firms to help investigate the data breaches that compromised the user
account information of more than 100 million of its customers. The firms
named by Sony are Data Forte, Guidance Software, and Protiviti.

Sony brought in some of those digital forensic...

Posted by InfoSec News on May 06

By Jaikumar Vijayan
May 5, 2011

LastPass, an online password management provider, is forcing its users
to change their master passwords after detecting what it described as a
"traffic anomaly" on one of its database servers.

In a blog post on Wednesday, LastPass said it first noticed a network

Posted by InfoSec News on May 06

# t2'11 - Call For Papers #
Helsinki, Finland
October 27 - 28, 2011

We are pleased to announce the annual t2'11 infosec conference, which
will take place in Helsinki, Finland, from October 27 to 28, 2011.

We are looking for original technical presentations in the fields of
information security. Presentations should last a minimum of 60 minutes
and a maximum of two hours and...

Posted by InfoSec News on May 06
May 05, 2011

North Korea's 1,000 or so hackers are as good as their CIA counterparts,
experts believe. Due to difficulties in expanding its conventional
weapons arsenal following the economic hardships during the 1990s, North
Korea apparently bolstered electronic warfare capabilities.

The regime opened Mirim University, now renamed Pyongyang...

Internet Storm Center Infocon Status