InfoSec News

This upcoming Tuesday Microsoft is releasing two bulletins addressing three vulnerabilities in Windows. Detailed information can be found in the advance notification bulletin.

The first bulletin affects Windows Vista and has been classified as Important
The second bulletin affects all supported versions of Windows and has an aggregate of Critical

Microsoft indicated it will not be releasing a fix for the vulnerability affecting Windows Graphics Rendering Engine (Security Advisory 2490606) or the vulnerability affecting Internet Explorer (Security Advisory 2488013).
[1] http://blogs.technet.com/b/msrc/archive/2011/01/06/advance-notification-service-for-the-january-2011-security-bulletin-release.aspx
-----------
Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot org (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
According to PandaLabs 2010 Annual Report, In 2010, have created and distributed one third of all viruses that exist. These means that 34% of all malware ever created has appeared -and been classified by our company- in the last twelve months. [1]
They have noticed a rise in malware distributed via popular social media like Facebook and Twitter as well as Linkedln and Fotolog. Activist attacks have been on the rise as well including coordinated DDoS against popular websites in support of Wikileaks. PandaLabs believe that most of the trends of 2010 will continue in 2011 including [...] an increase in the threats to Mac users, new efforts to attack 64-bits systems and new zero-day exploits. [1]


[1] http://press.pandasecurity.com/wp-content/uploads/2010/05/PandaLabs-Annual-Report-2010.pdf
-----------
Guy Bruneau IPSS Inc. gbruneau at isc dot sans dot org (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Hardware companies are preparing for the future launch of Microsoft's Windows OS on Arm but have differing views of what kinds of devices the OS will actually go into.
 
Webkit SVG Out of Bound Array Denial of Service Vulnerability
 
The Wall Street Journal is reporting that Verizon Wireless plans to announce on Tuesday that it will start offering the Apple iPhone.
 
Google Chrome prior to 7.0.517.44 Multiple Security Vulnerabilities
 
Could Microsoft's risky bet of choosing its client version of Windows over Windows Phone 7 as the OS for tablets pay off in the end?
 
Careless coding and a lax review process by Apple could make it pretty simple to steal certain select applications from the brand new Mac App Store that launched yesterday.
 
The U.S. Department of Commerce launches an office focused on trusted ID technology.
 
Verizon Wireless will expand its LTE network to more than 175 cities by the end of this year, the company revealed at the International Consumer Electronics Show that has also seen aggressive network plans by AT&T and T-Mobile USA.
 
WebKit HTML 'Link' DNS Pre-Fetching Security Bypass Vulnerability
 
Oracle and a subsidiary are facing facing a IP theft lawsuit that appears quite similar to Oracle's successful lawsuit against SAP.
 
iPad 2 mockups from accessory manufacturers at CES show a device with 128GB of capacity, which could allow the tablet to encroach even further into laptop territory.
 
Reader discussions and comments on the hottest Computerworld stories for the week of January 3, 2010.
 
A reader noticed ICMP echo request packets attempting to enter

their network yesterday with the IP timestamp option set. Upon

closer inspection, the payload of the ICMP echo contained a

URL which was http://iplane.cs.washington.edu/



That link lead to a University of Washington research project site that measures

Internet path performance. Based on their website they have been doing this since 2006.

They are employing IP options in their echo request packets which many folks may

noticed in their IPS/IDS logs.



Echo requests with timestamp option allow you to do things like:

Measuring link attributes: Existing techniques for

measuring loss rate, bandwidth capacity and available

bandwidth are employed in a scalable and efficient manner to

characterize the properties of all inter-cluster links in the

measured topology.



If your interested in jitter for example a few pings with TS allows for fairly simple jitter computation.

If you see some of ICMP 8:0 with ip opts that includes TimeStamp you might want to capture some packets and look inside to see if it came from this research project.
TimeStamp replies are considered dangerous as they might be used to defeat time based authentication protocols.

http://www.nessus.org/plugins/index.php?view=singleid=10114 (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
A preview of our Friday coverage from the Consumer Electronics Show in Las Vegas.
 
Facebook reportedly generated $1.2 billion in revenue in the first nine months of 2010, according to a document distributed by Goldman Sachs that leaked today.
 
Ford Motor Company debuted its first all-electric vehicle, the Focus Electric, at the 2011 International Consumer Electronics Show Friday. It is one of five new electrified vehicles that will be available in North America and Europe by 2013.
 
CES 2011 has delivered the goods on tablets, mobile phones, next-gen PCs and much more. What's the highest-impact news from the show?
 
GNU glibc 'regcomp()' Stack Exhaustion Denial Of Service Vulnerability
 
CUDA drivers/Linux security hole
 
GNU libc/regcomp(3) Multiple Vulnerabilities
 
call for participation
 
Re: Joomla! 1.0.x ~ 1.0.15 | Cross Site Scripting (XSS) Vulnerability
 
Verizon Wireless is expected to get the iPhone early this year, but what about Sprint Nextel, the nation's third-largest carrier?
 
Oracle is conducting a cloud computing road show that will hit roughly 80 cities around the world, according to its web site.
 
StageTracker 'SetList' File Buffer Overflow Vulnerability
 
RoomWizard Default Password Security Bypass And Information Disclosure Vulnerabilities
 
[USN-1040-1] Django vulnerabilities
 
[USN-1039-1] AppArmor update
 
[USN-1037-1] ifupdown update
 
[USN-1038-1] dpkg vulnerability
 
A group of Hollywood studios and technology companies has come up with a system for buying digital movies and TV shows that's supposed to do away with the problem of content being locked to a narrow set of devices by the company that sold it.
 
Almost a year to the day since Polaroid said it was signing on Lady Gaga as its creative director, the popular singer unveiled on Thursday the fruits of her labor at the imaging company.
 
Google has taken a step to stop legitimate e-mail messages sent by its Apps customers from getting caught in spam filters.
 
InfoSec News: Police Publish Images of Two Sought in Codebreaker’s Death: http://www.wired.com/threatlevel/2011/01/codebreakers-death/
By Kim Zetter Threat Level Wired.com January 6, 2011
In an effort to identify two people who may be connected to the mysterious death of a top British codebreaker, authorities have published images of a man and woman who entered his apartment building weeks before his death.
Gareth Williams, 31, was found dead and naked in a North Face duffel bag in the bathtub of his flat last August. The sports bag was padlocked on the outside.
The two, said to be in their 20s and of Mediterranean appearance, were let in to Williams’ building by another tenant in late June or July. They told the tenant they had keys to Williams’ flat but indicated they knew him as Pier Paolo.
Williams, described by those who knew him as a “math genius,” worked for the U.K.’s Government Communications Headquarters (GCHQ) helping to break coded Taliban communications, among other things. He was just completing a year-long stint with MI6, Britain’s secret intelligence service, when he died. The flat where he lived was part of a network of flats registered to an offshore front company and rented out to GCHQ workers.
[...]
 
InfoSec News: Utah's $1.5 billion cyber-security center under way: http://www.deseretnews.com/article/705363940/Utahs-15-billion-cyber-security-center-under-way.html
By Steve Fidel Deseret News Jan. 6, 2011
CAMP WILLIAMS -- Thursday's groundbreaking for a $1.5 billion National Security Agency data center is being billed as important in the short [...]
 
InfoSec News: Bad job switches and hard feelings: http://blogs.csoonline.com/1324/bad_job_switches_and_hard_feelings
By CSO Salted Hash IT security news analysis, over easy! 2011-01-06
Some readers saw our "What it's like to make the wrong job switch" [1] story as a slam against IOActive. That's unfortunate. [...]
 
InfoSec News: Hackers find new way to cheat on Wall Street -- to everyone's peril: http://www.infoworld.com/d/the-industry-standard/hackers-find-new-way-cheat-wall-street-everyones-peril-699
By Bill Snyder Tech's Bottom Line January 06, 2011
High-frequency trading networks, which complete stock market transactions in microseconds, are vulnerable to manipulation by hackers [...]
 
InfoSec News: Secunia Weekly Summary - Issue: 2011-01: ========================================================================
The Secunia Weekly Advisory Summary 2010-12-30 - 2011-01-06
This week: 21 advisories [...]
 
StageTracker Denial of Service Vulnerability
 
The sale of iTunes accounts that have reportedly been hacked has yet to be stopped by Apple or the Chinese e-commerce site hosting the sellers.
 
Intel will integrate DirectX 11 graphics technology in its next generation of laptop and desktop chips based on the Ivy Bridge architecture, a company executive said on Thursday.
 

BankInfoSecurity.com

Persistence: Trait Giving Infosec Leaders a Headache
BankInfoSecurity.com
Persistence is the admirable trait of an increasing number of hackers in the coming year, if anything hackers do can be deemed admirable. ...

and more »
 
Whatever your budget, there's a videoconferencing option that could benefit your business. We explore a range of options.
 
Whatever your budget, there's a videoconferencing product that could benefit your business. We explore a range of options to help you find the right fit.
 

Posted by InfoSec News on Jan 07

http://www.deseretnews.com/article/705363940/Utahs-15-billion-cyber-security-center-under-way.html

By Steve Fidel
Deseret News
Jan. 6, 2011

CAMP WILLIAMS -- Thursday's groundbreaking for a $1.5 billion National
Security Agency data center is being billed as important in the short
term for construction jobs and important in the long term for Utah's
reputation as a technology center.

"This will bring 5,000 to 10,000 new jobs during its...
 

Posted by InfoSec News on Jan 07

http://blogs.csoonline.com/1324/bad_job_switches_and_hard_feelings

By CSO
Salted Hash
IT security news analysis, over easy!
2011-01-06

Some readers saw our "What it's like to make the wrong job switch" [1]
story as a slam against IOActive. That's unfortunate.

The article was about Erin Jacobs switching jobs and discovering the
move wasn't right for her. One of the main points she tried to make was
that she left IOActive on good...
 

Posted by InfoSec News on Jan 07

http://www.infoworld.com/d/the-industry-standard/hackers-find-new-way-cheat-wall-street-everyones-peril-699

By Bill Snyder
Tech's Bottom Line
January 06, 2011

High-frequency trading networks, which complete stock market
transactions in microseconds, are vulnerable to manipulation by hackers
who can inject tiny amounts of latency into them. By doing so, they can
subtly change the course of trading and pocket profits of millions of
dollars in...
 

Posted by InfoSec News on Jan 07

========================================================================

The Secunia Weekly Advisory Summary
2010-12-30 - 2011-01-06

This week: 21 advisories

========================================================================
Table of Contents:

1.....................................................Word From...
 

Posted by InfoSec News on Jan 07

http://www.wired.com/threatlevel/2011/01/codebreakers-death/

By Kim Zetter
Threat Level
Wired.com
January 6, 2011

In an effort to identify two people who may be connected to the
mysterious death of a top British codebreaker, authorities have
published images of a man and woman who entered his apartment building
weeks before his death.

Gareth Williams, 31, was found dead and naked in a North Face duffel bag
in the bathtub of his flat last...
 
Piwik Unspecified Cross-site scripting and Unspecified HTML Injection Vulnerabilities
 
Django Password Reset Mechanism Remote Denial of Service Vulnerability
 
Microsoft will issue two security bulletins, addressing a critical vulnerability affecting all versions of WIndows.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 


Internet Storm Center Infocon Status