InfoSec News

Marius Haas, senior vice president and general manager of HP Networking, has had a good year. In 2010, Hewlett-Packard closed its acquisition of 3Com, dramatically expanding its networking portfolio and sales, and also continued to log progress with its own LAN products. In the company's fiscal fourth quarter, which ended Oct. 31, HP's networking revenue grew 227 percent with the former 3Com portfolio included. Even without the new offerings, sales grew 50 percent from a year earlier. This week, Haas took time to talk with IDG News Service about that growth and the company's vision for networking.
 
In the 1995 film "Hackers" the lead character downloads sensitive information to a floppy disk. Today, of course, advances in technology have yielded equally advanced security threats. Consider news reports in the past year about computers compromised by botnets. Businesses face daily threats from these and other cybersecurity dangers that are further enhanced by increased reliance on new business communications and computing tools.
 

Wikileaks is a symptom, not the disease
LubbockOnline.com (blog)
Even if Obama had given information security (I've learned most infosec experts hate "cyber") the effort he gave the healthcare bill we would at best be ...

and more »
 
The attacks against MasterCard by WikiLeaks supporters that knocked the credit card company's Web site offline today may have caused more problems for the card company than previously thought.
 
Hermetic Word Frequency Counter Advanced is a useful utility for analyzing the contents of your text files, either individually or in batch mode. In many ways, it's a friendly shell around common grep functionality. The default is to simply count the unique words in a file, and their frequency (common English words like a and the are normally not counted, though this can be changed). This alone has some utility for programmers, but the real power of this program comes in two features: The ability to scan an entire folder tree and the ability to look for and count specified patterns.
 
ISC BIND 'allow-query' Zone ACL Security Bypass Vulnerability
 
Two EMC employees were charged with stealing company equipment and distributing it to a local reseller, which then sold it over the Internet.
 
Gibbs looks at a book on Python and a couple of Bluetooth headsets that might be under your tree
 
phpMyAdmin Database Search Cross Site Scripting Vulnerability
 
Recently I noticed that whenever I downloaded a file in Firefox, the program turned into molasses--especially just after the download finished. The browser would literally freeze up for seconds at a time for about a minute after.
 
The main Web site of MasterCard was knocked offline today in a large DDoS attack apparently launched in retaliation for the credit card company's decision to cut off services to WikiLeaks.
 
An audit of a prominent Boston-based health care firm found serious lapses in employee security awareness.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
Although Google's latest version of Chrome proved faster than earlier editions in some JavaScript benchmark tests, the browser barely exceeded its predecessors in another, according to Computerworld's tests.
 
Motorola announced two rugged Wi-Fi-ready mobile computers for use in retail, manufacturing and health care.<
 
Middleware vendor Tibco announced Wednesday it has acquired CRM provider Loyalty Lab for $23 million.
 
As many as 120,000 federal workers at the U.S. Department of Agriculture will soon start using hosted e-mail and other applications provided by Microsoft as part of a deal announced Wednesday.
 
The just released Python 3.2 beta shows the language being tweaked for parallel programming
 
A new report calls on U.S. agencies to push for a universal, XML-based system to link electronic health records.
 
The main Web site of MasterCard was knocked offline today in a large DDoS attack apparently launched in retaliation for the credit card company's decision to cut off services to WikiLeaks.
 
Worldwide semiconductor revenue is expected to go up this year, with Samsung gaining ground on top semiconductor company Intel in market share, Gartner said in a study released Wednesday.
 

Infosec Certification: Debate Goes On
GovInfoSecurity.com (blog)
Our recently released paper, A Human Capital Crisis in Cybersecurity: Technical Proficiency Matters", provides an action plan to address the people portion ...

 
Gartner projects continued hot e-reader sales despite increasing competition from media tablets like Apple's iPad and Samsung's Galaxy Tablet.
 
Chinese customs officials last week arrested 14 women trying to smuggle 88 Apple iPads and 340 smartphones into the country, according to a report in a state-controlled newspaper Wednesday.
 
Intel CEO Paul Otellini on Wednesday said the company will make a splash in the tablet market next year, with some prominent PC makers preparing tablets based on the company's Atom chips.
 
PHP 'setSymbol()' Function Denial of Service Vulnerability
 
Exponent CMS Multiple Input Validation Vulnerabilities
 
A Google executive hinted this week that Nokia maybe evaluating the Android mobile OS for phones it will manufacture.
 
The main Web site of MasterCard was knocked offline today in a large DDoS attack apparently launched in retaliation for the credit card company's decision to cut off services to WikiLeaks.
 
Apple QuickTime JP2 Image Heap Buffer Overflow Vulnerability
 
Apple QuickTime Track Header (tkhd) Atoms Heap Buffer Overflow Vulnerability
 
=============== Rob VandenBrink Metafore (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Apple on Tuesday patched 15 vulnerabilities in its QuickTime media player for Windows and Mac OS X 10.5, aka Leopard.
 
Having a mobile strategy is becoming essential for retailers, as more and more shoppers use Web-friendly smartphones in stores and malls to compare prices, seek deals, read reviews and make purchases.
 
EncFS Flawed CBC/CFB Cryptography Implementation Weaknesses
 
Apple QuickTime (CVE-2010-3802) QTVR File Memory Corruption Remote Code Execution Vulnerability
 
Pidgin 'X-Status' Message Denial of Service Vulnerability
 
[USN-1029-1] OpenSSL vulnerabilities
 
Skype released an updated version of its Symbian client, which adds support for Nokia's N8, C7 and the E5, the company said.
 
Secunia Research: QuickTime Track Dimensions Buffer Overflow Vulnerability
 
www.eVuln.com : HTTP Response Splitting in WWWThreads (php version)
 
[USN-1028-1] ImageMagick vulnerability
 
The TDL4 rootkit, a variant of the Alureon rootkit, has been updated to target a zero-day vulnerability in the Windows Task Scheduler.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
Re: [Full-disclosure] Linux kernel exploit
 
[ MDVSA-2010:249 ] clamav
 
Kryptos Logic Advisory: Winamp 5.6 Arbitrary Code Execution in MIDI Parser
 
[ MDVSA-2010:248 ] openssl
 
InfoSec News: Call For Papers CFS NYC: Forwarded from: The Computer Forensics Show <fmanley (at) computerforensicshow.com>
CALL FOR PAPERS: The Computer Forensics Show
April 19-20, 2011 * New York City * NY
For some companies, it is not a question if one of their computers will be used as evidence in a legal matter, it is a question of when.
THE COMPUTER FORENSICS SHOW IS THE "DON'T MISS" EVENT OF THE YEAR FOR ALL LEGAL, ACCOUNTING, IT SECURITY, RISK MANAGEMENT, AND LAW ENFORCEMENT PROFESSIONALS
Forensic Trade Shows, LLC is proud to announce The Computer Forensics Show, April 19-20, 2011 in New York City, NY.
The event will highlight exhibits from some of the leading companies in the industry, complemented by a comprehensive conference program to provide attendees with important information about the latest technological advancement, ideas and practical information available today.
The Computer Forensics Show offers its speakers tremendous opportunities for exposure and recognition as industry leader. Your session will attract many technical professionals interested in learning from your example, expertise and experience. In appreciation of your contributions as a conference speaker, we provide the following benefits:
* Complementary speaker registration to the exhibition and full conference pass; * Complementary session passes for your colleagues to attend your session (upon request); * Presenters will receive three promotional conference passes to promote their session.
Please visit our speaker page from this year's show at http://www.computerforensicshow.com/speakers_panels.htm.
There are 6 main tracks in the conference:
Forensic Accounting - Fraud, Financial Investigations, Compliance, Best Practices, Litigation. Forensic accounting is the number one growing field in accounting today.
Legal (A) - EDD, including Litigation and Best Practice Issues.
Legal (B) - Emerging Technologies/Litigation, Data/Records Management, Reporting, and Privacy.
IT Security - For organizations that are just beginning to encounter security issues and deals with more broad issues effecting organizations today.
IT Security Advanced Track - Encompasses more complex and in-depth issues and can highlight the need for additional training.
Cyber-crime, Terrorism, and Information Warfare Track - Cyber crime and terrorism as it relates to Homeland Security, public and corporate policy, risk management, and the protection of our nation's critical infrastructures.
Additional classes will also be available to attendees: Computer Forensics - CCFE Boot Camp - 3 Days Cell Phone Forensics - 3 Days C4SEM-CJ-103 Identity Theft-Fraudulent Documents Credit: 3 C4SEM-SEC-105 Cyber Terrorism - Security Credit: 3
The Show's Conference Department is asking industry executives to submit brief abstracts on some current topics to be presented to attendees in a solo presentation or as part of a conference panel. If you are interested, please review the following guidelines and contact information, and note the submission deadlines for the conference.
Guidelines:
Formatting * Paper size - letter/8.5" width X 11.0" height. * Margins - top/bottom/left/right - 1". * Font - Times New Roman 11 point. * Paragraph Spacing - single spaced. * The submission should be sent in Microsoft Word.
The submission must include * The Presentation Title * Author Name(s) * Title * Company * Speaker Contact Information: Address * Phone Number * E-mail Address * Keywords (4-8 words)
* ABSTRACT* The presentation abstract should outline your presentation and what attendees would learn. Please remember that all the content must be strictly educational and marketing oriented papers will not be accepted. The presentation has to be oriented for: Accounting, Legal, IT Security, Risk Management, and Law Enforcement professionals.
* BIOGRAPHY* The speakers biography should be 60 to 100 words in paragraph form. These may include present position, titles, areas of professional expertise, experience, research interests, major publications, degrees, etc.
* Abstract and Biography information should not extend more than one page and will be used for our Show Guide and Website if speaking.
Please do not hesitate to include additional material regarding your presentation(s) for better evaluation.
The total presentation length is 75 minutes: speech ~ 50-60min; Q&A ~ 15-20min.
SUBMISSION DEADLINE: January 15th, 2011.
Submissions will be evaluated for originality, significance of the work, technical content, and interest to a wide audience. Speakers may also be grouped into panels when there are overlapping topics of interest.
Submissions should be in Microsoft Word and sent to Conference Coordinator at speaker at computerforensicshow.com. Please note that due to the expected volume of submissions, Forensic Trade Shows, LLC will only contact speakers who are selected.
By agreeing to speak, you grant one-time permission to Forensic Trade Shows, LLC to retain and publish a copy of your presentation. The copyright and all other rights to the presentation remain with the author(s). All rights to and use of The Computer Forensics Show name and logos are retained exclusively by its respective party.
A copy of the presentation materials should be submitted to us no later than March 4th, 2011. It should be sent in Microsoft PowerPoint (.ppt) format on the Computer Forensics Show template that will be provided to you prior to the conference. If you use any animation or active content, please include that as well. For reliability and security purposes, all presentations will be preloaded onto the presentation computers at the conference.
Note: Substitutions for speakers are only allowed under emergency circumstances, and tradeshow management must be immediately notified of any changes. All participants are selected at the discretion of show management.
Suggested topics include:
Accountant Malpractice Claims Anonymity and Proxies Authentication and Access Control Civil Litigation Class Action Disputes Computer Crime and Information Warfare Construction Solutions Corporate Governance Corporate Information Corporate Risk and Security Criminal Fraud and Deception Cases Cyber Forensics Damage Assessment Digital Forensic Case Studies Digital Forensic Processes and Workflow Models Digital Forensics and Internet Digital Law Digital Rights Management (DRM) Digital Signatures E-Discovery Employee Internet Abuse Employment and Family Law Cases Encryption and Decryption Environmental Litigation Financial Investigations and Forensic Accounting Forensics Accounting and the Internet Fraud Investigation General Commercial Disputes Identity Theft Industrial Espionage Insurance Claims and Digital Forensics Integrity of Archival Data Intellectual Property Claims International Risk and Investigations Intrusion Detection IT Security and Compliance Legal, Ethical and Policy Issues Mobile Forensics More General Criminal Cases Network Forensics New Firewall Technologies Portable Electronic Device Forensics Post-Acquisition Disputes Privacy and Data Mining Privacy issues in digital forensics Privacy Leakage Case Studies Privacy Policy Enforcement Security Education and Training Smart Card Applications Stealth Data Steganography Stylometric and Author Attribution Terrorist Use of the Internet Unauthorized Disclosure of Corporate Information
If you have any questions about The Computer Forensics Conferences, please send us an e-mail to info at computerforensicshow.com.
If you do not wish to receive news e-mails about the show, please send us an e-mail at remove at computerforensicshow.com.
 
InfoSec News: WikiLeaks could be thwarted by new State Dept. system: http://fcw.com/articles/2010/12/07/state-department-diplopedia.aspx
By GCN Staff Dec 07, 2010
As Secretary of State Hillary Clinton launched a damage control operation to world leaders after State Department diplomatic cables were published by the WikiLeaks website, the atmosphere was calm in the Office of eDiplomacy.
That’s because cables likes the ones leaked to WikiLeaks have been replaced by Diplopedia, a highly secure system by which ambassadors and their staffs can compare notes, pass tips and even offer candid observations on world leaders, Dayo Olopade, a political reporter, writes in The Daily Beast.
Olopade recently spoke with officials in the office of eDipolmacy about cybersecurity efforts in the wake of leak of the trove of classified and unclassified diplomatic cables that span 1966 to 2010.
A team of 60 people within eDiplomacy are working on ways to modernize the way American diplomats talk to each other confidentially.
Diplopedia is an online encyclopedia of foreign affairs information, according to the State Department. It is a wiki that can be edited with an Intranet Web browser that can be accessed by authorized State Department personnel. They can contribute their experience, knowledge and expertise in the form of articles, discussion or editing of material submitted by others.
[...]
 
InfoSec News: NASA sells PC with restricted Space Shuttle data: http://www.theregister.co.uk/2010/12/08/nasa_disk_wiping_failure/
By Dan Goodin in San Francisco The Register 8th December 2010
NASA officials failed to wipe sensitive agency data from computers before releasing them to the public, a violation of procedures that are [...]
 
InfoSec News: U.S. Bank allegedly concealed data breach: http://www.startribune.com/business/111499139.html
By DAN BROWNING Star Tribune December 7, 2010
A tiny mom- and daughter-owned company in Arizona is taking aim at U.S. Bank in a class-action lawsuit that alleges the bank failed to protect them and countless other online merchants from crooks who breached the bank's credit card database.
In a lawsuit filed last month in Hennepin County and removed to U.S. District Court in Minneapolis this week, the company Paintball Punks alleges that between August and December 2009, it received nine orders totaling $11,259.91 that were fraudulently billed to U.S. Bank-issued credit cards.
That's not a huge amount, but the potential client base from U.S. Bank's $16 billion credit card portfolio drew the attention of two major law firms that specialize in class-action cases. U.S. Bank said potential damages could exceed the $5 million threshold required under the Class Action Fairness Act of 2005.
The Arizona firm sells paintball supplies online. It claims that before it shipped out any merchandise, it took all the required steps to verify cardholders' identities, including checking the security codes on the backs of credit cards and cross-referencing the shipping addresses against the cardholders' billing addresses on file with the bank.
Even so, after the actual account holders disputed the charges, U.S. Bank tapped into Paintball Punks' bank account in what's known as a "chargeback" and recouped the money from the bogus transactions.
According to the lawsuit, Minneapolis-based U.S. Bank covered up a breach of its own security systems and shifted the cost of fraudulent charges onto merchants.
[...]
 
InfoSec News: Dope! Ad exec offers drugs to get his stolen laptop back: http://www.msnbc.msn.com/id/40558954/ns/local_news-philadelphia_pa/
By David Chang NBCPhiladelphia.com 12/7/2010
A Philadelphia man used his skills as an advertising executive to devise a unique way of getting back his stolen laptop.
Kurt Shore was about to pull out of the parking lot of his Manayunk office back in early November when he realized he had forgotten something inside.
Jetting back into the office for just a minute, Shore came back to find his MacBook computer stolen from the car.
Surveillance video captured the robbery on tape, showing a man breaking into the car seconds after Shore went back inside.
[...]
 
Babylon 'besextension.dll' DLL Loading Arbitrary Code Execution Vulnerability
 
Valentin reports that several sites related to the recent activity around Wikileaks and the prosecution of Julian Assange seem to be under DDOS, confirmed here ==http://www.bbc.co.uk/news/technology-11935539
The main Mastercard website is offline right now - note that this outage does not affect transaction processing. The Swedish prosecutors office was taken offline, they were back on around 12:30 GMT. Other sites that the attackers deem to be anti-Wikileaks are also affected.
Update:2010-12-08 20:34UTC Mastercard has released a statement about the DDOS
The attackers are rumoured to actually be asking for volunteers for the cause' in their activity. Since this activity is illegal in most countries, participating in these attacks may have legal implications. Readers should use caution, participation in something like this is NOTanything like donating to a charity - it's more like smashing windows and setting fires at a peaceful demonstration. Plus knowingly downloading code to participate in a botnet isn't the best move for the continued health of your workstation ...
If we see developments in this story, we'll update this post. Comments of course are welcome!
=============== Rob VandenBrink Metafore =============== (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Opera Software is targeting a large variety of mobile phones ranging from smartphones to less sophisticated feature phones that can connect to the Internet, as it aims at opportunities for its browser in emerging markets like India, the company's co-founder said.
 
Salesforce.com said on Wednesday it will acquire Heroku, a company that specializes in hosting applications based on the Ruby programming language, for $212 million.
 
Efforts to slow or halt the release of sensitive documents by WikiLeaks have only made the whstleblower site add strong protections from a potential takeover.
 
Google could face a lawsuit in China from a group of protesting advertising resellers who are now considering legal action against the company for terminating their contracts.
 
Organizations struggling to adopt IPv6 could get a hand from a new service offered by Verizon
 
The capability will be featured in JBoss Enterprise Business Rules Management System 5.1, due next year
 
Perhaps the best thing that will be said about 2010 and IT hiring is that large layoffs have tapered off and the overall trend seems to favor hiring.
 

Posted by InfoSec News on Dec 08

http://www.theregister.co.uk/2010/12/08/nasa_disk_wiping_failure/

By Dan Goodin in San Francisco
The Register
8th December 2010

NASA officials failed to wipe sensitive agency data from computers
before releasing them to the public, a violation of procedures that are
part of the plan to securely end the Space Shuttle program, an audit
released on Tuesday said.

Kennedy Space Center in Florida – one of four NASA sites with reported...
 

Posted by InfoSec News on Dec 08

http://www.startribune.com/business/111499139.html

By DAN BROWNING
Star Tribune
December 7, 2010

A tiny mom- and daughter-owned company in Arizona is taking aim at U.S.
Bank in a class-action lawsuit that alleges the bank failed to protect
them and countless other online merchants from crooks who breached the
bank's credit card database.

In a lawsuit filed last month in Hennepin County and removed to U.S.
District Court in Minneapolis this...
 

Posted by InfoSec News on Dec 08

http://www.msnbc.msn.com/id/40558954/ns/local_news-philadelphia_pa/

By David Chang
NBCPhiladelphia.com
12/7/2010

A Philadelphia man used his skills as an advertising executive to devise
a unique way of getting back his stolen laptop.

Kurt Shore was about to pull out of the parking lot of his Manayunk
office back in early November when he realized he had forgotten
something inside.

Jetting back into the office for just a minute, Shore came...
 

Posted by InfoSec News on Dec 08

Forwarded from: The Computer Forensics Show <fmanley (at) computerforensicshow.com>

CALL FOR PAPERS: The Computer Forensics Show

April 19-20, 2011 * New York City * NY

For some companies, it is not a question if one of their computers will
be used as evidence in a legal matter, it is a question of when.

THE COMPUTER FORENSICS SHOW IS THE "DON'T MISS" EVENT OF THE YEAR FOR ALL
LEGAL, ACCOUNTING, IT SECURITY, RISK MANAGEMENT,...
 

Posted by InfoSec News on Dec 08

http://fcw.com/articles/2010/12/07/state-department-diplopedia.aspx

By GCN Staff
Dec 07, 2010

As Secretary of State Hillary Clinton launched a damage control
operation to world leaders after State Department diplomatic cables were
published by the WikiLeaks website, the atmosphere was calm in the
Office of eDiplomacy.

That’s because cables likes the ones leaked to WikiLeaks have been
replaced by Diplopedia, a highly secure system by...
 
What does it take to go from 'we should move to the cloud' to a successful cloud computing strategy? This excerpt from Silver Clouds, Dark Linings offers advice on crossing cloud chasms and developing a successful roadmap.
 
Daniel Ellsberg, the man responsible for outing the now famous Pentagon Papers in 1971, and a group of ex-intelligence officers have thrown their weight behind WikiLeaks and its founder, saying the current attempt to label WikiLeaks' leaks as trivial compared to the Pentagon Papers is wrong.
 
Facebook is in breach of South Korean data privacy laws and needs to do a better job of getting consent from users when getting their personal information, a South Korean regulator said Wednesday.
 


Internet Storm Center Infocon Status