Hackin9

InfoSec News

In one of the latest atacks by a group know as AYYILDIZ who has over 12,000 total defacement's on h-zone has hacked and defaced a turkish website with one clear message, they are ready for cyber war.


 

TechNewsDaily

Hackers Get Copy of Symantec AntiVirus Source Code
TechNewsDaily
The tech-news website InfoSec Island stated that the code appeared to come from Norton AntiVirus 2006, a consumer product, confirming the hacker group's initial claims. Infosec Island reporter Anthony Freed passed on to Paden a segment of the source ...
Hackers Claim Breach Of Norton Antivirus Source Code; Experts Say Claims Are ...Dark Reading
Hackers expose Norton's Antivirus source codeGMA News
Indian hacker lords have Symantec antivirus codePhysOrg.com
Register -New Scientist (blog)
all 151 news articles »
 
Many of our readers use Data Loss Prevention products as a mechanism to identify sensitive data-at-rest on workstations, servers, databases and similar. Earlier today, I stumbled across an open source application known as OpenDLP. I professionally recommend that users have a DLP product in your toolkit. As many of the tools are commercial in nature, this product may be a excellent choice for home use (or at least when you head home for holidays and are asked to fix the family computer).
While reviewing information on the OpenDLP website, I saw that the developers released a new version of OpenDLP and a virtual machine OpenDLP that corrects a small number of glitches.
More information on this product is available at code.google.com/p/opendlp/ . Any of our readers use this product and able to comment on how well it works, false positives and the like?

Scott Fendley ISC Handler (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Twitter has had a busy past three months, launching a redesign, an open-source Android security tech, and Tweetdeck as a Web application. Now it's offering a way to make your website or blog more interactive with easy-to-embed tweets that require using just one line of code or a link to add.
 

New York Times

Hackers Claim Breach Of Norton Antivirus Source Code; Experts Say Claims Are ...
Dark Reading
"Symantec can confirm that a segment of its source code has been accessed," a spokesman told the publication InfoSec Island. "Symantec's own network was not breached, but rather that of a third party entity. We are still gathering information on the ...
Hackers expose Norton's Antivirus source codeGMA News
Indian hacker lords have Symantec antivirus codePhysOrg.com
Hackers Get Copy of Symantec AntiVirus Source CodeSecurityNewsDaily
Register -New Scientist (blog) -Naked Security
all 150 news articles »
 
For those who weren't watching on Thursday, Google released a new revision of Chrome. There were a small number of high severity security issues which were corrected in version 16.0.912.75. More information on these bugs is located at googlechromereleases.blogspot.com/2012/01/stable-channel-update.html.
Most Chrome users will receive the newest version automatically. However, many Enterprise customers may change the update policy to disable this feature. We would recommend that these customers push the update after any appropriate testing.

Scott Fendley ISC Handler (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Reader Deborah has a Toshiba laptop running Windows 7. A few weeks ago, the system starting treating the DVD-ROM drive as a mere CD-ROM drive. It could play and burn CDs, but wouldn't have anything to do with DVDs.
 
Microsoft disappointed some Windows Phone users on Friday by saying it would stop providing specifics about who will get software updates and when, and announcing vaguely that a new update is "available to all carriers that request it."
 
The attack which if you have not heard yet had leaked over 400k total credit cards with one intention, to disrupt the bank system and cause the Israeli government trouble and incur costs from having to destroy many cards and remake them.


 
We have been contacted by @jargon7 who admits they are just starting out and this is one of the first hacks they have done, all websites admin have been contacted so most likely the accounts have been disabled; but as we have seen humans are common to use the same password everywhere.


 
The future of TV is going to be pretty awesome. The addition of compute power, apps and Internet access are inevitable for TVs over the next few years and Google and Apple will be at the forefront, writes columnist Mike Elgan.
 
Litmus Logic Co-Founder Selected for Proven Track Record With Large Scale Cyber Defense Strategies and Credentialing Programs. He will be speaking about the unique nature of transformational cyber security initiatives and the imperatives to successfully execute the sweeping investments that leading companies and government agencies are making to remain effective in combating cyber crimes


 
Hi All, In about 45minutes at 10PM EST, Australian Time I will be updating the site alot which may result in some downtime. Be assured that i will get this done ASAP, and publishing will resume shortly after. Regards, Lee


 
Internet Storm Center Infocon Status