InfoSec News

Amazon plans over the next few weeks to roll out a software upgrade for its Kindle Touch e-reader that includes several useful enhancements via Wi-Fi. But why wait?
It has been a rallying cry against Microsoft Windows for years: to avoid malware and security issues, just stop using Windows. The mantra has traditionally been embraced by both Mac and Linux users, but as Mac OS X users deal with the fallout from the Flashback malware attack, some Linux supporters are turning the tired attack even against the Apple OS.
Twitter served notice to spammers earlier this month that it's beefing up its anti-spam measures, and it has filed a lawsuit against five "aggressive tool providers and spammers" to keep its feeds clean. How can you keep your business off of Twitter's radar while still conducting some form of commerce using the tool? These five tips can help.
Intel's upcoming Core i-series processors based on the Ivy Bridge architecture are being pitched at ultrabooks, but the company is now extending the chips to high-performance tablets with Microsoft's upcoming Windows 8 operating system.
Better late than never? Apple has released the third Java update in a week for Mac OS X, and this one contains the tool to remove the Flashback malware from infected systems. Beneath the belated fix to help users eradicate the threat, Apple has introduced a proactive approach to reducing security risk that other vendors should take note of.
A leaked Microsoft roadmap shows that the next version of Office won't ship until the first quarter of 2013, according to the Dutch developer who found the document.
Do you live in a highly connected neighborhood? Or is broadband home use rare, either because high-speed Internet access isn't available or people choose not to subscribe? Use this interactive map to find out about your area.
Lawyers for Megaupload, the U.S. Department of Justice (DOJ), Web hosting provider Carpathia Hosting and other groups fighting over who should maintain 1,100 servers formerly used by Megaupload should sit down and work out an arrangement, a U.S. judge said Friday.
Quest InTrust 'AnnotateX.dll' Uninitialized Pointer Code Execution Vulnerability
Invision Power Board Multiple Local File Include Vulnerabilities
ACC PHP eMail v1.1 - Multiple Web Vulnerabilites
All of the Internet Storm Center's active handlers are listed on https://isc.sans.edu/handler_list.html. Click a name to expand and see the handler's details. Click if you are Interested in How to become an Internet Storm Center Handler?

A picture of the handler will be on the left if available, otherwise a shadow avatar is shown.
If a handler has information posted on http://handlers.sans.edu/, there will be a link to their specific page. We are working towards migrating this site to the new layout and adding more features.
A list of the 5 most recent diaries written by the selected handler are listed and linked.
If the handler has a public Twitter handle, a direct link to their twitter.com page is listed.

Post suggestions or comments in the section below or send us any questions or comments in the contact form on https://isc.sans.edu/contact.html#contact-form.


Adam Swanger, Web Developer (GWEB, GWAPT)

Internet Storm Center https://isc.sans.edu (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

Reader Josh writes in with a good question: How does everyone deal with software whose vendor requires that the application and its install directories be excluded completely from Anti-Virus (AV) scanning ? Microsoft has some recommendations for AV exclusions of their own, as do the anti-virus companies themselves (example: McAfee), and googling a bit quickly shows that pretty much every software vendor has knowledge base articles that deal with making their particular tool invisible to AV.
- How do you keep track of the various approvedexclusions across servers in your company ?

- How do you make sure no malware is hiding or setting up shop in those excluded portions ?

- Any other comments you might have ..
If you have a couple of minutes before starting your weekend, please share in the comments below! (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Circadia is the very picture of minimalism--just straightforward mechanics, no bells and whistles. Actually, maybe just bells. But no whistles.
With a variety of new tablets hitting the market, some IT pros are hoping for a way to convert those tablets to support Windows 8 on ARM. But that may be easier said than done.
Re: Erronous post concerning Backtrack 5 R2 0day
[ MDVSA-2012:058 ] curl
[SECURITY] [DSA 2451-1] puppet security update
Adding to its already considerable line of analysis software and expertise, IBM announced Friday that it has acquired business intelligence software provider Varicent Software.
Apple has issued a rare public comment in response to the price fixing lawsuit filed against it and several large ebook publishers by the U.S. Department of Justice.
Maybe it's because I don't like change, or maybe it's because I hate it when software developers assume that everyone can figure out their cryptic icons, but I wasn't a fan of Gmail's recent makeover.
SAP published preliminary figures for its first-quarter results on Friday, showing revenue up 11% year on year, but margins shrinking with operating profit up only 6%.
VMSA-2012-0007 VMware hosted products and ESXi/ESX patches address privilege escalation
Erronous post concerning Backtrack 5 R2 0day
Re: Backtrack 5 R2 priv escalation 0day found in CTF exercise
APPLE-SA-2012-04-12-1 Java for OS X 2012-003 and Java for Mac OS X 10.6 Update 8
Effective security policies, not a mobile device management platform, will solve corporate mobile device security issues, according to a security expert.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
Oracle have released their announcement for the April 2012 Critical Patch Update, to be issued next Tuesday (Apr 17).
Several of the patch descriptions in the announcement are accompanied by the ominous words may be exploited over a network without the need for a username and password. Sounds like next Tuesday will be busy for administrators of Oracle databases and middleware products. (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
There is a wide spectrum of ways to create new websites, starting with solutions that require no coding at all, such as Weebly and WordPress, all the way to coding your website entirely by hand using a text editor like Vim. ExpressionEngine (various pricing, buy-only) is a serious content management system that sits close to Vim on that spectrum, and has a vibrant community of users and developers.
Onkyo's SBX-300 iOnly Bass Dock Music System is a speaker dock that works with any iOS device, including all models of the iPad, iPhone, and iPod touch, as well as the iPod classic and the second-generation-or-later iPad nano. Onkyo suggests a retail price of $249, but you can find it online for nearly a hundred bucks less.
PHP 'tidy_diagnose()' NULL Pointer Dereference Denial Of Service Vulnerability
Microsoft is battling to reduce the time it takes to approve and publish Windows Phone apps, and to improve the responsiveness of its developer portal App Hub, following complaints from developers, the company said in a blog post on Thursday.
Internet Corporation for Assigned Names and Numbers (ICANN) has postponed the last date for applications for new generic top-level domains (gTLDs) on its application system to April 20, after it detected a technical issue with the software.
Microsoft will begin charging developers to use the API (application programming interface) for its Bing search engine, the company announced Thursday.
Two days after Apple promised to decontaminate Macs infested with the Flashback malware, on Thursday the company delivered.
Prepaid smartphones were once both lower-cost and lower-quality, but lately they're becoming a viable alternative for many users.
When the Titanic set sail 100 years ago this month, it was a marvel of state-of-the-art technology that captured the world's interest.
Internet Storm Center Infocon Status