Information Security News
Posted by InfoSec News on May 16http://arstechnica.com/security/2013/05/critical-linux-vulnerability-imperils-users-even-after-silent-fix/
Posted by InfoSec News on May 16http://www.bankinfosecurity.com/detangling-45-million-cyberheist-a-5759
Posted by InfoSec News on May 16http://www.darkreading.com/attacks-breaches/new-algorithm-lets-scada-devices-detect/240154875
Posted by InfoSec News on May 16http://english.donga.com/srv/service.php3?bicode=020000&biid=2013051579958
Posted by InfoSec News on May 16http://fcw.com/articles/2013/05/15/cybersecurity-evangelism.aspx
The 4th annual Forensics and Incident Response Summit EU will take place on October 6-13 in Prague, one of the most historical European cities, in the context of the SANS Forensics Prague
Thank you for your interest in presenting
Hackers compromised accounts belonging to maintainers of the open-source ZPanel after a team member supporting the Web hosting control panel called a critic a "fucken little know it all." The ZPanel site went completely down after the incident and remained down at time of writing.
ZPanel support member Nigel Caldwell made the comment in the site's official forums and it was directed at a user named joepie91. Shortly beforehand, the Netherlands-based software developer—whose real name is Sven Slootweg—claimed that websites using ZPanel in combination with certain modules were vulnerable to exploits that allowed attackers to remotely execute malicious code. Slootweg directed his statement at Caldwell, aka PS2Guy, after the support member left a comment saying ZPanel "is more secure than panels that you pay good money for." Caldwell also said users have "got more chance of someone hacking your Operating System than the control panel that sits on it."
In his response, Slootweg claimed there was an "arbitrary code execution and root escalation vulnerability in the current version of ZPanel." To support this, Slootweg provided an example line of code he said could be inserted into a main ZPanel template to trigger the vulnerability. Last month, Slootweg disclosed a ZPanel vulnerability here. Two weeks ago, he stepped up his criticism after claiming the vulnerability had gone unfixed. "I find it shameful that I even have to post here to point this out, to prevent someone from putting themselves at risk," Slootweg wrote in Wednesday's post on the ZPanel forum. "This should be the responsibility of the ZPanel team."
For more than two years, the Linux operating system has contained a high-severity vulnerability that gives untrusted users with restricted accounts nearly unfettered "root" access over machines, including servers running in shared Web hosting facilities and other sensitive environments. Surprisingly, most users remain wide open even now, more than a month after maintainers of the open-source OS quietly released an update that patched the gaping hole.
The severity of the bug, which resides in the Linux kernel's "perf," or performance counters subsystem, didn't become clear until Tuesday, when attack code exploiting the vulnerability became publicly available (note: some content on this site is not considered appropriate in many work environments). The new script can be used to take control of servers operated by many shared Web hosting providers, where dozens or hundreds of people have unprivileged accounts on the same machine. Hackers who already have limited control over a Linux machine—for instance, by exploiting a vulnerability in a desktop browser or a Web application—can also use the bug to escalate their privileges to root. The flaw affects versions of the Linux kernel from 2.6.37 to 3.8.8 that have been compiled with the CONFIG_PERF_EVENTS kernel configuration option.
"Because there's a public exploit already available, an attacker would simply need to download and run this exploit on a target machine," Dan Rosenberg, a senior security researcher at Azimuth Security, told Ars in an e-mail. "The exploit may not work out-of-the-box on every affected machine, in which case it would require some fairly straightforward tweaks (for someone with exploit development experience) to work properly."
Posted by InfoSec News on May 15http://www.tucsonweekly.com/TheRange/archives/2013/05/14/amys-baking-company-chooses-we-were-hacked-as-their-damage-control-response
Posted by InfoSec News on May 15http://www.darkreading.com/government-vertical/us-cyber-command-head-general-alexander/240154788
Posted by InfoSec News on May 15http://www.wired.com/threatlevel/2013/05/saudi-telecom-sought-spy-help/
Posted by InfoSec News on May 15http://www.wlfi.com/dpp/news/local/stolen-laptop-could-contain-important-patient-information
Posted by InfoSec News on May 15http://www.theregister.co.uk/2013/05/14/nab_warning_infosec_regulation/