InfoSec News

Dell has filled the last big hole in its virtualization stack through a partnership with Netuitive, which makes analytics software for managing virtual infrastructure, Netuitive and industry analysts have confirmed.
 
Debbie Crowell never ordered the iPhone, but thanks to a hacking group known as LulzSec, she spent a good part of her Thursday morning trying to get $712.00 in charges reversed after someone broke into her Amazon account and ordered it.
 
Texas Instruments said Thursday it has agreed to license two patents from Eolas Technologies, which two years ago sued more than 20 companies for alleged patent infringement including TI, Google, Yahoo, Apple and Amazon.com.
 
Research In Motion missed analysts' lowered revenue forecasts for its fiscal first quarter and said its outlook for the second quarter was lower than expected, as it reported its first-quarter results Thursday.
 
Oracle Java SE and Java for Business CVE-2010-3560 Remote Networking Vulnerability
 
Research In Motion missed analysts' lowered revenue forecasts for its fiscal first quarter and said its outlook for the second quarter was lower than expected, as it reported its first-quarter results Thursday.
 
With Google now touting new image and voice search tools, Microsoft needs to keep up or risk falling behind the evolving search race.
 
Salesforce.com is ready to help customers turn their businesses into 'social enterprises,' CEO Marc Benioff said Thursday during the on-demand software vendor's Cloudforce event in Boston.
 
Oracle Java SE and Java for Business CVE-2010-3558 Remote Java Web Start Vulnerability
 
Virtualization makes power management more complicated, but one researcher says he has the solution.
 
Placing a version of MapReduce on the Web server could eliminate the need for a separate log processing system, a Usenix researcher argues
 
jabberd XML Parsing Denial of Service Vulnerability
 
Microsoft today warned that scammers have taken to the phone lines to dupe Windows users into putting malware on their machines or paying for worthless help.
 
The U.S. Department of Defense and NASA today issued a call for papers to help in their quest to ensure that humans can start interstellar space travel within 100 years.
 
The CIO of the federal government, Vivek Kundra, is resigning after two and a half years on the job, the White House said.
 
Microsoft Internet Explorer Drag and Drop Information Disclosure Vulnerability
 
[SECURITY] [DSA 2263-1] movabletype-opensource security update
 
T-Mobile today announced that it has added 41 cities to its fastest wireless networks, making it available in 102 markets overall.
 
Despite lingering privacy concerns, the U.S. Office of Personnel Management is plowing ahead with plans to build a massive centralized database containing detailed healthcare information on millions of federal workers and their families.
 
NYU's Langone Medical Center is the first hospital in the Northeast to use a new infrared palm-scanning technology that ensures patients are linked to their medical records and helps prevent medical ID theft.
 
Microsoft Internet Explorer 'toStaticHTML' HTML Sanitizing Information Disclosure Vulnerability
 
Making screen savers and finding date leakage, oh my.
 
Microsoft Excel Out of Bounds WriteAV CVE-2011-1279 Remote Code Execution Vulnerability
 
Microsoft Excel Insufficient Record Validation CVE-2011-1272 Remote Code Execution Vulnerability
 
Microsoft Excel Buffer Overflow CVE-2011-1276 Remote Code Execution Vulnerability
 
iDefense Security Advisory 06.14.11: Adobe Shockwave Font Asset Heap Overflow Vulnerability
 
iDefense Security Advisory 06.14.11: Adobe Shockwave 3D Asset DEMX Integer Overflow Vulnerability
 
iDefense Security Advisory 06.14.11: Adobe Shockwave Lingo Script Opcodes Integer Signedness Vulnerability
 
Microsoft Improper Record Parsing CVE-2011-1273 Remote Code Execution Vulnerability
 
Microsoft Excel Array Out Of Bounds Access CVE-2011-1274 Remote Code Execution Vulnerability
 
Microsoft Excel Heap Memory Corruption CVE-2011-1275 Remote Code Execution Vulnerability
 
Adobe Shockwave Player 'IML32.dll' CVE-2011-2115 Multiple Memory Corruption Vulnerabilities
 
iDefense Security Advisory 06.14.11: Adobe Shockwave Cursor Asset tSAC Chunk Integer Overflow Vulnerability
 
Many mobile users say they don't like advertising on their smartphones and tablets, but it is having an upsurge, with revenues in 2011 expected to double over last year, according to a new Gartner forecast.
 
T-Mobile today announced that it has added 47 cities to its fastest wireless networks, making it available in 102 markets overall.
 
IBM is celebrating the 100th anniversary of its founding Thursday. Led by American capitalist icons Thomas J. Watson, Sr. and Thomas J. Watson, Jr. until the 1970s, the company grew from a pre-World War I conglomeration of companies making tabulating machines and time-keeping devices into a globe-spanning technology behemoth that pioneered the development of electronic computers and dominated the mainframe era.
 
Everything Everywhere, O2 and Vodafone plan to create a joint venture in the U.K. that will allow users to pay for goods using NFC-equipped phones, they said on Thursday.
 
Apple today rolled out its annual back-to-school promotion, but unlike years past offered a $100 iTunes gift card to customers who buy a qualifying Mac.
 
myBloggie 2.1.6 SQL-Injection, Advanced INSERT INTO Injection technique
 
CORE-2010-1021: IBM WebSphere Application Server Cross-Site Request Forgery
 
[SECURITY] [DSA 2262-1] moodle security update
 
TPTI-11-10: Adobe Shockwave dirapi.dll rcsL Chunk Parsing Remote Code Execution Vulnerability
 
IBM marks its 100th anniversary by celebrating its record in technology innovation.
 
Taiwan Semiconductor Manufacturing Co. is vying with Intel to become the first company to sell three-dimensional chips that boost the density of transistors in a single semiconductor by up to 1000 times.
 
Compliance with the PCI security standard tricky in public cloud environments, report says.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
Trend Micro Control Manager 'ApHost' Parameter Cross Site Scripting Vulnerability
 
Protected View builds on Adobe Reader X Protected Mode, isolating processes to make it more difficult for malicious code to access the underlying operating system.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
DJabberd XML Parsing Denial of Service Vulnerability
 
Hewlett-Packard and Toshiba will collaborate to push cloud computing and related services to infrastructure organizations, the companies said on Thursday
 
Automatic Data Processing said on Wednesday that it is investigating a system intrusion that likely impacted only one client.
 
Microsoft Internet Explorer Time Element Uninitialized Memory Remote Code Execution Vulnerability
 
Initiated by IBM President Thomas Watson Jr., Big Blue's building boom cemented the company's role as a leading patron of modern design and architecture, beginning in postwar America and continuing into the 1980s.
 
Starbucks is doing just fine with barcode scanning for its smartphone payment technology, so who really needs Near Field Communication technology for mobile payments?
 

Enterprises struggling with security defences
MicroScope (blog)
Research from Hewlett-Packard, undertaken at this years InfoSec show, discovered that enterprise customers are chasing their own tails when it comes to coping with the latest threats and a significant number arew resigned to that situation remaining ...

 
Over 360,083 credit card accounts in North America of Citigroup were affected as a result of a compromise of its card account management website in May, the bank said in an update on Wednesday.
 
Yahoo wants to help people find mobile applications and information about them.
 
Internet Storm Center Infocon Status