InfoSec News

A glitch in AT&T's Web site has exposed the e-mail addresses of more than 100,000 iPad buyers.
 
A glitch in AT&T's Web site has exposed the e-mail addresses of more than 100,000 iPad buyers.
 
Everything about the IBM BladeCenter H just screams IBM, from the mainframe-like aesthetics to the spartan management interface -- even the "H" model name. Severe-looking matte-black chassis notwithstanding, the BladeCenter H matches most of the major features of the Dell and HP blade systems but at a higher price. The BladeCenter also comes in smaller portions: IBM's slightly shorter chassis holds fewer blades than the Dell and HP enclosures.
 
Internet users have been hit by a widespread Web attack that has compromised thousands of Web sites, including Web pages belonging to the Wall Street Journal and the Jerusalem Post.
 
Cisco Systems is turning its small-business storage platforms into multipurpose devices with several features that might make easy additions to an IT architecture on a budget.
 
Brocade this week unveiled its converged data center architecture, and a raft of new products to support it.
 
If you're in the market for a new job, looking to gain exposure in your industry or searching for new clients, ranking high on LinkedIn search results is essential. These three simple tips will help keep you top of mind and at the top of search results.
 
A group of technology and telecom companies has launched a new broadband technical advisory committee that will look into ways to resolve net neutrality issues and other network management challenges.
 
Sprint Nextel has a lot riding on the HTC Evo 4G smartphone, so the carrier's admission that initial sales were less than Sprint reported on Monday disappointed some.
 
Google today attacked Apple's apparent decision to ban some third-party ad networks from collecting ad performance data on the iPhone and iPad.
 
Reader Nayana has two PCs on her home network--one running Windows XP, another running Windows 7. Curiously, the Windows 7 system won't let her access shared folders on the XP system, but it does work the other way around: she can access the Windows 7 folders from the XP machine.
 
Canonical is preparing a version of the Ubuntu OS for tablet computers as the company looks to extend its presence in the mobile space, a company executive said on Wednesday.
 
I subscribe to SearchSecurity at TechTarget and receive newsletters from them on a regular basis.It just so happens the one that Ireceived

today had an article abouthow Enterprise can prevent an attack due to PDF hacks. I justread through the article and found ita very good refresher

on best practices for protecting against anymalware spread by using any number of compromised attachments.



It is human nature I guess, that weopen attachments from folks we know and unfortunately even some we don't know.Often times these attachments

contain more than we bargained for. Because Adobe is onevery computer in the world (ok - maybe an exaggeration) it is a really big target. And

because it is a really big target there are a number of vulnerabilities associated with one component or another. The article from TechTarget states:



According to McAfee Inc. Avert Labs, as of Q1 2010, malicious malformed

PDF files are now involved with 28% of all malware directly connected to exploits.
Considering the number of different possible attack vectors this 28% is huge. The article goes through some very common sense tips for protecting

your organization.This article though focusing on misused PDF's can be used to protect against other potential attack vectors.



Some may say this is old news and common sense and I won't disagree.But sometimes the old makes things new again.



http://searchsecurity.techtarget.com/tip/0,289483,sid14_gci1513908,00.html?track=NL-422ad=769731asrc=EM_NLT_11739094uid=6115703

Deb Hale Long Lines, LLC (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
OS X's Fast User Switching makes it easy for multiple users to share one Mac. But it does have one flaw: If several users log in but then don't log out, you can end up with all of those accounts running in the background, sucking up system resources. But MacOSXHints.com reader Sesquipedalian figured out a way to automatically log out those idle users:
 
Microsoft's upgrade of Exchange and SharePoint Online is expected to last all year and many customers may see only a "preview" version of the technology in 2010.
 
Microsoft may be the biggest software company in the world, but like everyone else who does a deal with Apple, it too was sworn to secrecy.
 
For the second time in nine months, Microsoft has declined to patch a vulnerability in an older product because creating a fix was "infeasible."
 
Three IT staffing firms and an industry association have filed a lawsuit in federal court challenging a new USCIS rule requiring day-to-day oversight of offsite workers.
 
Cisco Systems announced its first line of network-attached storage devices for small businesses that need secure, easily configurable storage for both file and block-level data.
 
Microsoft is launching a new social search page that displays results from Facebook and Twitter, an executive announced at the Search Marketing Expo in Seattle.
 
Popular Web applications Twitter and Google Calendar are having performance and availability problems, the companies said separately.
 

Choosing an Infosec Consultancy
CIO
First off you need to decide why you actually need an infosec consultancy. Is it because the work can't be done in-house? Or there are confidentiality ...

 
File-sharing software maker LimeWire LLC said it still hopes to settle a dispute with the Recording Industry Association of America even as a federal court in New York appears set to shutter the company for enabling copyright infringement.
 
Postini, Google's suite of e-mail security, management and archiving services, encountered service disruptions on Tuesday afternoon and evening.
 
Twitter is testing a feature intended to make it more convenient and secure for end users to include shortened Web addresses, or URLs, in messages they post via the popular microblogging service and via its third-party applications.
 
Sucuri.net has released a report about a large number of sites that have been hacked and contain a malware script. A quick Google today indicates that

there are currently 111,000 sites still infected.It appears that this is only impacting websites hosted on Windows servers. The situation is being investigated.



For those who are hosting there websites on Windows IIS/ASP you may find more information here.
http://blog.sucuri.net/2010/06/mass-infection-of-iisasp-sites-robint-us.html
http://nsmjunkie.blogspot.com/2010/06/anatomy-of-latest-mass-iisasp-infection.html
Update:Paul at Sophos logs has released some additional information regarding this exploit and Infection. Thanks Paul.
http://www.sophos.com/blogs/sophoslabs/?p=9941
Deb Hale Long Lines, LLC (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
The research giant's latest data points suggest IT security spending will be stable in the near term, led by identity management, but most CIOs value other initiatives ahead of security.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

Gartner - Security - Business - Consultants - United States
 
The Jabra Cruiser ($70 as of June 5, 2010) is the latest car-friendly Bluetooth gizmo to promise hands-free use of your cell phone while driving, but the device's talents don't stop there. A new member of the Jabra Smart Series, which includes the Jabra SP700 Bluetooth car speakerphone, this shiny black device (which resembles a small, flattened-out flying saucer) can also transmit phone calls and play any music on your cell phone through your car's FM radio.
 
With its own iPhone application and a handful of comfort features, the $130 Sound ID 510 Bluetooth headset is a very customizable headset with audio quality that's consistent with other headsets in its price range.
 
The world of personal computing is changing. Judging from sales figures, laptops have long surpassed desktops as the dominant form of computer. The surge in netbook sales has shown that users are willing to sacrifice performance in the name of portability and price. More important, smartphones are now fully functional computers with a wide variety of applications and services that are rapidly gobbling up users' time and money. With laptops falling in price, premium netbooks rising in cost, and no-contract smartphones commanding $400 or more, the differences in price are not necessarily that great.
 
Dell said it plans to offer optional graphics processing units that would boost application performance on is new blade server.
 
Dell is set to roll out significant enhancements to its EqualLogic storage line on Wednesday, along with its first rebadged Juniper Networks products and other updates to its storage and networking lines, all part of a mission to carve out a place in the rapidly evolving world of enterprise data centers.
 
On June 5th Handler Guy posted a diary about a Security Advisor for Adobe Products.http://isc.sans.edu/diary.html?date=2010-06-05
We have received notification that a proof of concept (POC) has been found in malware taken from the wild and is currently being exploited.

For those that are Adobe users please patch before it is too late.
Thanks to our readers whobrought thistoour attention.
Update: For more information see US-CERT Technical Cyber Security Alert TA10-159A. http://www.us-cert.gov/cas/techalerts/TA10-159A.html
Thanks to those of you who have pointed out that I made a mistake in the Diary.It appears that there is not a patch available rather currently

just mitigation steps.It looks like the patch will be released for Flash Player soon and for Reader and Acrobat later in the month.
Deb Hale Long Lines, LLC (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Google's Android is pushed to be mobile software of choice for China and Taiwan at Beijing standards conference.
 
Apple released the latest version of its Safari browser, which patches 48 flaws, on Monday, the same day it unveiled the iPhone 4.
 
New BI and reporting features in SQL Server 2008 R2 hit the mark, but other additions leave SQL Server shops wanting more
 
Wave 4 of Microsoft's Windows Live Essentials is a grab-bag of useful but unrelated applications that are worth checking out.
 
Wave 4 of Microsoft's Windows Live Essentials is a grab-bag of useful but unrelated applications that are worth checking out.
 
Former top tech execs Meg Whitman and Carly Fiorina easily won the Republican party's nomination for California governor and U.S. senator, respectively.
 
EDS has agreed to pay a staggering $460 million to settle a long-standing lawsuit brought against it by U.K.-based British Sky Broadcasting Group PLC over a botched Customer Relationship Management project.
 
Apple CEO Steve Jobs promised deeper enterprise support with with its iPhone 4 and its iOS 4 software, noting better data protection, wireless application distribution and support for multiple Exchange e-mail accounts as well as SSL VPN security.
 
InfoSec News: 2010 ACM Cloud Computing Security (CCSW) - submission site is open: Forwarded from: Radu Sion <noreply (at) moon.crypto.cs.stonybrook.edu>
2010 ACM Cloud Computing Security Workshop (CCSW) at CCS
9 October 2010, Hyatt Regency Chicago http://crypto.cs.stonybrook.edu/ccsw10
Dear Colleagues,
The CCSW submission website is up! [...]
 
InfoSec News: State Department Anxious About Possible Leak of Cables to Wikileaks: http://www.wired.com/threatlevel/2010/06/state-department-anxious/
By Kim Zetter and Kevin Poulsen Threat Level Wired.com June 8, 2010
The State Department and personnel at U.S. embassies around the world are reportedly waiting anxiously to find out if an Army intelligence [...]
 
InfoSec News: Political firm fears sheikh's files were hacked: http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2010/06/07/MNIU1DQ1PL.DTL
By Carla Marinucci San Francisco Chronicle Chronicle Political Writer June 8, 2010
In a mysterious case of cyber-espionage, a leading California political consulting firm has asked U.S. [...]
 
InfoSec News: Military leaders warn of NK cyber attack: http://www.koreatimes.co.kr/www/news/nation/2010/06/113_67314.html
By Jung Sung-ki Staff reporter Korea Times 06-08-2010
Military leaders called North Korea's cyber threat "real," Tuesday, and said there was a high possibility it will conduct an attack on South [...]
 
InfoSec News: After Google hack, warnings pop up in SEC filings: http://www.computerworld.com/s/article/9177845/After_Google_hack_warnings_pop_up_in_SEC_filings
By Robert McMillan IDG News Service June 8, 2010
Five months after Google was hit by hackers looking to steal its secrets, technology companies are increasingly warning their [...]
 
InfoSec News: China faces increasing computer crimes: white paper: http://news.xinhuanet.com/english2010/china/2010-06/08/c_13339116.htm
English.news.cn 2010-06-08
BEIJING, June 8 (Xinhua) -- Computer crimes in China have been increasing in recent years, said a white paper titled "The Internet in China" issued on Tuesday. [...]
 
InfoSec News: Microsoft Patches IE Flaw Used In Attack That Bypassed Its Built-In Security Controls: http://www.darkreading.com/vulnerability_management/security/app-security/showArticle.jhtml?articleID=225500033
By Kelly Jackson Higgins DarkReading June 08, 2010
Among the 10 patches fixing 34 vulnerabilities that were released today by Microsoft is one that repairs a major hole in Internet Explorer that was used to help bypass the built-in security features in Windows 7 and Internet Explorer 8.
The memory corruption flaw, which was discovered and used by a Dutch researcher to win $10,000 in the March Pwn2Own hacking contest at the CanSecWest conference, was exploited along with another stage of attack on IE 8 to bypass Microsoft's much-lauded anti-exploit features, Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR).
Peter Vreugdenhil, the researcher who discovered the bug, didn't reveal the actual vulnerability he exploited in his hack, so Microsoft's MS10-035 security update today was the first time the nature of the flaw was made public: The memory corruption vulnerability could allow an attacker to take over the victim's machine due to the way IE tries to access incorrectly initialized memory. That memory can be corrupted by an attacker such that he can execute code on the logged-on user's machine.
Aaron Portnoy, manager of security research for HP TippingPoint, which sponsors the Pwn2Own contest, says this bug was at the heart of the Pwn2Own hack. "This was the crux of actually exploiting something -- this is the one that triggers memory corruption in IE," Portnoy says. "The other [part of the attack] was more for bypassing ASLR and DEP."
[...]
 

Posted by InfoSec News on Jun 08

http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2010/06/07/MNIU1DQ1PL.DTL

By Carla Marinucci
San Francisco Chronicle
Chronicle Political Writer
June 8, 2010

In a mysterious case of cyber-espionage, a leading California political
consulting firm has asked U.S. Attorney General Eric Holder to
investigate what it says appears to be computer hacking involving a
high-profile client, an ousted Middle Eastern sheikh, which the firm
says could...
 

Posted by InfoSec News on Jun 08

http://www.koreatimes.co.kr/www/news/nation/2010/06/113_67314.html

By Jung Sung-ki
Staff reporter
Korea Times
06-08-2010

Military leaders called North Korea's cyber threat "real," Tuesday, and
said there was a high possibility it will conduct an attack on South
Korean communication networks during the G-20 Summit to be held in Seoul
in November.

In a speech at a cyber security conference in Seoul, Minister of
National Defense Kim...
 

Posted by InfoSec News on Jun 08

http://www.computerworld.com/s/article/9177845/After_Google_hack_warnings_pop_up_in_SEC_filings

By Robert McMillan
IDG News Service
June 8, 2010

Five months after Google was hit by hackers looking to steal its
secrets, technology companies are increasingly warning their
shareholders that they may be materially affected by hacking attempts
designed to take valuable intellectual property.

In the past few months Google, Intel, Symantec and...
 

Posted by InfoSec News on Jun 08

http://news.xinhuanet.com/english2010/china/2010-06/08/c_13339116.htm

English.news.cn
2010-06-08

BEIJING, June 8 (Xinhua) -- Computer crimes in China have been
increasing in recent years, said a white paper titled "The Internet in
China" issued on Tuesday.

The white paper, issued by the Information Office of the State
Council,said the tendency of the combination of various traditional
crimes and computer crimes has become...
 

Posted by InfoSec News on Jun 08

http://www.darkreading.com/vulnerability_management/security/app-security/showArticle.jhtml?articleID=225500033

By Kelly Jackson Higgins
DarkReading
June 08, 2010

Among the 10 patches fixing 34 vulnerabilities that were released today
by Microsoft is one that repairs a major hole in Internet Explorer that
was used to help bypass the built-in security features in Windows 7 and
Internet Explorer 8.

The memory corruption flaw, which was...
 

Posted by InfoSec News on Jun 08

Forwarded from: Radu Sion <noreply (at) moon.crypto.cs.stonybrook.edu>

2010 ACM Cloud Computing Security Workshop (CCSW) at CCS

9 October 2010, Hyatt Regency Chicago
http://crypto.cs.stonybrook.edu/ccsw10

Dear Colleagues,

The CCSW submission website is up! Please submit your papers at
http://hotcrp.cylab.cmu.edu/ccsw10/

CCSW is back! The 2009 workshop was a tremendous success, with 80+
people in the audience, several sponsors (NSF,...
 

Posted by InfoSec News on Jun 08

http://www.wired.com/threatlevel/2010/06/state-department-anxious/

By Kim Zetter and Kevin Poulsen
Threat Level
Wired.com
June 8, 2010

The State Department and personnel at U.S. embassies around the world
are reportedly waiting anxiously to find out if an Army intelligence
analyst was telling the truth when he boasted that he had supplied
260,000 classified State Department diplomatic cables to the
whistleblower site Wikileaks.

If...
 
Google has introduced a new Web indexing system to provide users with more up-to-date search results, the company said Tuesday.
 
Five months after Google was hit by hackers looking to steal its secrets, technology companies are increasingly warning their shareholders that they may be materially affected by hacking attempts designed to take valuable intellectual property.
 

Internet Storm Center Infocon Status