Hackin9
A flood of updates to databases inside Internet routers caused intermittent outages on Wednesday and connectivity issues for companies, but experts expect the long-forecasted hiccup to be resolved soon.
 
Microsoft has added some new smarts to its Bing search engine that lets you phrase queries in a way that feels more natural.
 
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

Brit infosec firm lets hackers think they've stolen something
Register
Security strategies generally concentrate on keeping the bad guys out, but British security outfit ClearSwift has stumbled upon another approach: if the bad guys get in, let them out with something. But scrub it clean on the way out the door ...

 
Ryan Lackey (left) holds up a prototype PORTAL travel router during his Def Con presentation with Marc Rogers (right).
Sean Gallagher

The news over the past few years has been spattered with cases of Internet anonymity being stripped away, despite (or because) of the use of privacy tools. Tor, the anonymizing “darknet” service, has especially been in the crosshairs—and even some of its most paranoid users have made a significant operational security (OPSEC) faux pas or two. Hector “Sabu” Monsegur, for example, forgot to turn Tor on just once before using IRC, and that was all it took to de-anonymize him. (It also didn’t help that he used a stolen credit card to buy car parts sent to his home address.)

If hard-core hacktivists trip up on OPSEC, how are the rest of us supposed to keep ourselves hidden from prying eyes? At Def Con, Ryan Lackey of CloudFlare and Marc Rogers of Lookout took to the stage (short their collaborator, the security researcher known as “the grugq,” who could not attend due to unspecified travel difficulties) to discuss common OPSEC fails and ways to avoid them. They also discussed their collaboration on a set of tools that promises to make OPSEC easy—or at least easier—for everyone.

Called Personal Onion Router To Assure Liberty (PORTAL), the project is a pre-built software image for an inexpensive pocket-sized “travel router” to automatically protect its owner’s Internet traffic. Portal provides always-on Tor routing, as well as “pluggable” transports for Tor that can hide the service’s traffic signature from some deep packet inspection systems.

Read 12 remaining paragraphs | Comments

 
Cisco Systems will cut as many as 6,000 jobs over the next 12 months, saying it needs to shift resources to growing businesses such as cloud, software and security.
 

Apple today released updates for Safari 6.x and 7.x . The patches fix 7 vulnerabilities and are available for versions of OS X back to 10.7.5 (Lion). [1]

The bulletin released by Apple is very vague and only talks about "memory corruption issues" but states that some of these vulnerabilities may lead to arbitrary code execution. The vulnerabilities affect WebKit, Apple's browser library, and may affect other products as well.

With this update, the latest versions of Safari are 6.1.6 and 7.0.6.

[1] http://support.apple.com/kb/HT6367

---
Johannes B. Ullrich, Ph.D.
STI|Twitter|LinkedIn

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Microsoft Internet Explorer CVE-2014-2827 Remote Memory Corruption Vulnerability
 
Microsoft Internet Explorer CVE-2014-4058 Remote Memory Corruption Vulnerability
 
Microsoft Internet Explorer CVE-2014-4056 Remote Memory Corruption Vulnerability
 
Microsoft Internet Explorer CVE-2014-4052 Remote Memory Corruption Vulnerability
 
Forrester has cut its worldwide IT spending forecast for this year, saying growth will be 3.3 percent in U.S. dollars, rather than 6.2 percent. Total spending will be $2.2 trillion.
 
Cisco Systems posted fiscal fourth-quarter revenue and earnings that were roughly flat from a year earlier as the company works through what Chairman and CEO John Chambers called "a tough environment."
 
Microsoft Internet Explorer CVE-2014-2820 Remote Memory Corruption Vulnerability
 
Microsoft Internet Explorer CVE-2014-2818 Remote Memory Corruption Vulnerability
 
Adobe Flash Player and AIR CVE-2014-0540 Unspecified Memory Corruption Vulnerability
 
Developing a mobile test to quickly detect the presence of the deadly Ebola virus in a patient has become a priority for medical technologists.
 
Throughout Japan, an army of workers stands ready to ensure important messages are delivered as quickly as possible. But they don't work in data centers maintaining email servers. They deliver telegrams.
 
A lawsuit filed in Tennessee earlier this month has resurfaced questions about a bank's responsibility in protecting customers against cyberheists.
 

From performance issues at hosting provider Liquid Web to outages at eBay and LastPass, large networks and websites suffered a series of disruptions and outages on Tuesday. Some Internet engineers are blaming the disruptions on a novel technical issue that impacts older Internet routers.

At the heart of the issue, the growth of routable networks on the Internet overwhelmed the amount of memory set aside in infrastructure hardware, typically routers and switches, that determines the appropriate way to route data through the Internet. For the first time, the lists of routable networks—also called border gateway protocol (BGP) tables—surpassed a significant power of two (two to the 19th power or 512K). Many older routers limit their use of a specialized, and expensive, type of memory known as ternary content-addressable memory (TCAM) to 512K by default.

When the tables outgrew the space allotted for them, the routers shut down or slowed.

Read 10 remaining paragraphs | Comments

 
Cisco Unified Communications Manager and Unified Presence Server SQL Injection Vulnerability
 
Attachmate Reflection FTP Client ActiveX Control CVE-2014-0606 Remote Code Execution Vulnerability
 
Attachmate Reflection FTP Client ActiveX Control CVE-2014-0605 Remote Code Execution Vulnerability
 
F5 Networks ARX Data Manager CVE-2014-2949 SQL Injection Vulnerabilitiy
 
Oracle has pushed out a major update to its E-Business Suite of applications, in a move that underscores the company's challenge of meeting customer needs while also persuading them to adopt its next-generation Fusion cloud software.
 
 
WordPress Multiple Security Vulnerabilities
 
GNU glibc '__gconv_translit_find()' Function Memory Corruption Vulnerability
 

Snowden leaks show that terrorists are JUST LIKE US
Register
Experts in operational security and infosec have been picking through the release to uncover interesting nuggets about the tradecraft of spies. The Foreign Office provides non-attributable official and personal mobile phones to GCHQ officers while on ...

and more »
 
BlackBerry's focus on strong security as a key differentiator for its devices does not mean that they're completely free of flaws. The company released security updates Tuesday for both the OS running on its smartphones and for its enterprise server software.
 
The U.S. National Security Agency has a cyberwarfare program that hunts for foreign cyberattacks and is able to strike back without human intervention, according to NSA leaker Edward Snowden.
 
Microsoft has postponed the implementation of Java blocking within Internet Explorer and will give customers a little less than a month to deal with the unexpected change.
 
Microsoft has chosen 10 home automation startups that it will support in various ways through an accelerator program, in the hopes of helping them develop their technologies and products.
 
LinuxSecurity.com: The system could be made to crash under certain conditions.
 
LinuxSecurity.com: The system could be made to crash under certain conditions.
 
LinuxSecurity.com: An updated Adobe Flash Player package that fixes multiple security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security [More...]
 
LinuxSecurity.com: Updated OpenStack Telemetry packages that fix one security issue and one bug are now available for Red Hat Enterprise Linux OpenStack Platform 4.0. Red Hat Product Security has rated this update as having Important security [More...]
 
LinuxSecurity.com: Several security issues were fixed in OpenJDK 6.
 
Adobe Flash Player and AIR CVE-2014-0538 Use After Free Remote Code Execution Vulnerability
 
Adobe Flash Player and AIR CVE-2014-0545 Unspecified Memory Corruption Vulnerability
 
Adobe Flash Player and AIR CVE-2014-0543 Unspecified Memory Corruption Vulnerability
 
A new tool called Live App Testing from Amazon lets mobile developers distribute apps to a predefined group of users before the apps are launched.
 
 
[security bulletin] HPSBHF03088 rev.1 - HP Integrity SD2 CB900s i2 and i4 Servers running OpenSSL, Remote Unauthorized Access or Disclosure of Information
 
Microsoft is taking on Apple's MacBook Air with a trio of new ads, doubling down on its contention that the Surface Pro 3 is a better laptop than the real laptop.
 
The Internet of Things is still too hard. Even some of its biggest backers say so.
 
An Arbor Networks graphic showing the sudden drop-off in network traffic from Syria on November 29, 2012 as the country was essentially erased from network routing tables.

In a Wired interview with well-known National Security Agency journalist James Bamford that was published today, Edward Snowden claimed that the US accidentally took most of Syria off the Internet while attempting to bug the country's traffic. Snowden said that back in 2013 when he was still working with the US government, he was told by a US intelligence officer that NSA hackers—not the Assad regime—had been responsible for Syria’s sudden disconnect from the Internet in November and December of 2012.

The NSA's Tailored Access Office (TAO), Snowden said, had been attempting to exploit a vulnerability in the router of a “major Internet service provider in Syria.” The exploit would have allowed the NSA to redirect traffic from the router through systems tapped by the agency’s Turmoil packet capture system and the Xkeyscore packet processing system, giving the NSA access to enclosures in e-mails that would otherwise not have been accessible to its broad Internet surveillance.

Instead, the TAO’s hackers “bricked” the router, Snowden said. He described the event as an “oh shit” moment, as the TAO operations center team tried to repair the router and cover their tracks, to no avail.

Read 3 remaining paragraphs | Comments

 
Microsoft Internet Explorer CVE-2014-4057 Remote Memory Corruption Vulnerability
 
Microsoft Internet Explorer CVE-2014-4063 Remote Memory Corruption Vulnerability
 
Microsoft Internet Explorer CVE-2014-2824 Remote Memory Corruption Vulnerability
 
Microsoft Internet Explorer CVE-2014-4055 Remote Memory Corruption Vulnerability
 
Robots are essentially a self-contained tribute to the wonders of technology. The most advanced models use fast computer processing, high-definition cameras, artificial intelligence and long-range sensors, all of which give you a pretty good idea where technology is heading. In some ways, a robot even provides a glimmer of the future car and future IT advances.
 
Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.
 
The Internet of Things is still too hard. Even some of its biggest backers say so.
 
Reflected Cross-Site Scripting (XSS) in Jamroom
 
It's no longer unusual to see major, massive hacks make news these days. They affect millions of individuals and cost millions of dollars to rectify.
 
A few weeks ago VMware released a blast at Amazon's recently released total cost of ownership (TCO) bake-off model that compared AWS cloud services with the on-premise vSphere suite of virtualization products. VMware called the AWS online tool "biased and inaccurate."
 
It can be difficult enough to manage and motivate your teams when things are going well, but keeping morale high and people productive is even tougher if you've suffered a setback -- a failed project, layoffs, losing a major client -- or if personal issue are affecting a member of your team.
 
Adobe Systems has released security patches for its Flash Player, Reader and Acrobat products, addressing a total of eight vulnerabilities, including one that is being exploited by attackers.
 
[oCERT-2014-006] Ganeti insecure archive permission
 
BlackBerry Z 10 - Storage and Access File-Exchange Authentication By-Pass [MZ-13-04]
 
Samsung launched its new Galaxy Alpha with a metal frame in a bid to boost sales after the plastic design of its smartphones was blamed for the company's recent struggles.
 
Amazon.com has introduced a card reader coupled with smartphone and tablet apps that aim to provide small businesses with a way to accept payments on these devices.
 
Google Chrome CVE-2014-3166 Information Disclosure Vulnerability
 
Many malicious software programs used to make a quick exit on virtual machines, a tactic designed to avoid a security check. But that isn't the case anymore, according Symantec research.
 
A decade-old race to crank up core counts in x86 chips may have lulled, but the competition has just started picking up in ARM processors.
 
Samsung has launched its new Galaxy Alpha with a metal frame, in a bid to boost sales after the plastic design of its smartphones has been blamed for the company's recent struggles.
 
The use of 3D printing for finished goods is about to disrupt manufacturing and supply chains in a big way. Here's why, and here's how IT will be critical to that transition.
 
Cloud Foundry shines with broad application support and stellar ease of use, but OpenShift has the edge in management and automation
 
Want to offer extra functionality to your users based on where they are? Here's how.
 
The U.S. Department of Justice has asked a New York court to vacate a stay on an order that would require Microsoft to turn over to the government certain emails held abroad.
 
Former Sprint CEO Dan Hesse, whose last day was Monday, could get more than $38 million in severance pay.
 
Internet Storm Center Infocon Status