InfoSec News

European regulators are looking closely at Intel's planned McAfee acquisition and may hold up the deal with an investigation, according to a report published Friday.
 
Google has missed a deadline set by the Connecticut Attorney General's Office for turning over data that it says was collected inadvertently by its Street View cameras.
 
Yahoo will not shut down Delicious and instead is trying to sell it to another company. At least, that's what Yahoo wrote on the Delicious blog Friday, a day after reports circulated that it planned to shut down the social bookmarking pioneer.
 
The latest from the 2011 Consumer Electronics Show: News, Features, Opinions and more
 
RETIRED: Apple Time Capsule and AirPort Base Station Multiple Remote Vulnerabilities
 
Google Thursday launched a new tool that lets users explore the human anatomy.
 
Google Thursday launched a new tool that lets users explore the human anatomy.
 
No year in the IT industry would be complete without a number of high-profile ERP (enterprise resource planning) project failures, ones that burn through mountains of cash, bring company operations to a standstill, generate bad publicity for vendors and toss careers in the trash.
 
Democrats ask the FCC to include schools and libraries in proposed Net neutrality protections.
 
The software giant's last batch of scheduled fixes for 2010 is a "doozy" that will address critical remote code-execution flaws in Windows and IE.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
An audit of a prominent Boston-based health care firm found serious lapses in employee security awareness.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
The TDL4 rootkit, a variant of the Alureon rootkit, has been updated to target a zero-day vulnerability in the Windows Task Scheduler.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
Survey finds some enterprises are overburdened with compliance issues and are using piecemeal patch testing and deployment processes.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
AVG, McAfee and Microsoft Corp. will work with the ISCA Labs to test and certify integrated endpoint security components.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
The WikiLeaks "hacktivist" DDoS attacks pale in sophistication to the more serious application-layer DDoS threats of the future.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
The end of the year is the perfect time to review how your career has played out during the past 12 months and refine future goals. In this tip, infosec career experts Lee Kushner and Mike Murray explain the best questions to ask.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
Mozilla will reward vulnerability hunters for critical flaws found on a dozen Mozilla websites.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
The new Core Insight pen testing suite can lay out the history of testing campaigns and the relative threat level of an enterprise's systems.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
Microsoft addressed a zero-day vulnerability used by the notorious Stuxnet worm and moved to block ongoing attacks targeting several Internet Explorer zero-day flaws.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
Reader discussions and comments on the hottest Computerworld stories for the week of December 13, 2010.
 
Embedded Video WordPress Plugin Cross Site Vulnerability (XSS) - CVE-2010-4277
 
Apple Quicktime Memory Corruption - CVE-2010-3801
 
Published yesterday, Apple released a new firmware update for it's Time Capsule and Airport Base Station devices covering the following CVE's:

CVE-2008-4309
CVE-2009-2189
CVE-2010-0039
CVE-2009-1574
CVE-2010-1804

If you are using these pieces of hardware, please be sure and update. (I already have!)
-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Thanks to reader Hurin:
We were notified that a new version of Microsoft's Security Essentials is now available for download from Windows Update. Check it out, or grab it from here:
http://www.microsoft.com/security_essentials/

-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
For those of you that use Opera (all 2.20% of you), the folks over there have released version 11.00. There are a ton of updates to the code, including many security related fixes, so check out the Changelog here:
http://www.opera.com/docs/changelogs
and download it here:
http://www.opera.com/browser/
Thanks Roseman for writing in!
-- Joel Esler | http://blog.joelesler.net | http://twitter.com/joelesler (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Not long after being criticized for not knowing how to make money, Facebook is looking to reel in more than $2 billion in sales in 2010.
 
Forrester analyst Ted Schadler says we need to step up to the multidevice, multichannel challenge.
 
Google has started notifying its search engine users of sites in their list of query results that may have been compromised by hackers.
 
A new survey indicates that the biggest issue for virtualization deployment is insufficient memory installed in servers and not, as is commonly believed, CPU performance.
 
A new tool for Google allows users to search through 5.2 million digitized books.
 
Users of the popular exim mail server report attacks exploiting the recently patches vulnerability [1,2]. It appears that the attacks are scripted and installing popular rootkits. If you experienced an attack against exim: We are interested in packet captures or other logs showing how the attack is performed.
[1] http://www.reddit.com/r/netsec/comments/en650/details_of_the_root_kit_that_got_installed_on_my/

[2] http://www.exim.org/lurker/message/20101207.215955.bb32d4f2.en.html
------

Johannes B. Ullrich, Ph.D.

SANS Technology Institute

Twitter (c) SANS Internet Storm Center. http://isc.sans.org Creative Commons Attribution-Noncommercial 3.0 United States License.
 
The WikiLeaks "hacktivist" DDoS attacks pale in sophistication to the more serious application-layer DDoS threats of the future.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
 
Oracle's net income for the quarter ended Nov. 30 rose 28% to $1.9 billion compared to the same period last year, buoyed by strong software license sales and an improving hardware business, the company said Thursday. Revenue was $8.6 billion, a 47% jump.
 
AltaVista will be "sunsetted" soon--reminding us that even though the bubbly mid-90's seems like a century ago, the Web is merely a toddler.
 
Citrix Systems announced it has agreed to purchase German vendor Netviewer, maker of online meeting software, in order to meet growing demand for such services in the European region.
 
[ GLSA 201012-01 ] Chromium: Multiple vulnerabilities
 
Alt-N WebAdmin Source Code Disclosure
 
www.eVuln.com : "link" and "linkdescription" XSS in Social Share
 
www.eVuln.com : "titl","url" - Non-persistent XSS in Social Share
 
If AirPort troubles have got you blue going into the holiday season, then perhaps this will help: Apple on Thursday released both a firmware update for AirPort Base Stations and Time Capsules that fixes a number of bugs in the wireless routers and an update for its AirPort Utility.
 
NEC will show a dual-screen tablet computer based on Google's Android operating system at January's International Consumer Electronics Show.
 
ISC DHCP Server Failover Peer Port Field Denial of Service Vulnerability
 

How to protect your company from social engineering attacks
Help Net Security
Jayson E. Street is the Chief Infosec Officer at Stratagem 1 Solutions, the author of the book Dissecting the hack: the f0rb1dd3n network and a well-known ...

 
GNU Mailman Multiple Cross Site Scripting Vulnerabilities
 
Headlines to the contrary, the WikiLeaks hacktivist attacks against Visa, MasterCard, PayPal and others last week were relatively small and disorganized, a security expert says.
 
More Yahoo applications and services will be shut down or merged with existing products in the coming months, the company has said.
 
Some privacy groups criticize a new policy paper from the U.S. Department of Commerce.
 
BLOG:CMS Multiple HTML Injection and Cross Site Scripting Vulnerabilities
 
InfoSec News: U.S. attorney: Blaine hacker targeted neighbor: http://www.startribune.com/local/north/111972394.html
By JAMES WALSH Star Tribune December 16, 2010
A Blaine man hacked into his neighbor's wireless Internet to send e-mails containing child pornography, sexual advances and threats to Vice President Joe Biden to smear and terrorize people who had made him angry, a federal prosecutor said on Wednesday.
What set Barry Vincent Ardolf apart, said Assistant U.S. Attorney Tim Rank, was his computer expertise and vindictiveness to meticulously carry out a scheme that almost succeeded in making it appear that all those things came from his neighbor's computer.
Rank cautioned jurors on the first day of Ardolf's federal trial in St. Paul to not be intimidated by the technical minutiae of tapping into somebody else's wireless service and creating bogus e-mails and MySpace pages.
"This case is about a dangerous man,'' Rank said in his opening arguments. "A person who got mad at his neighbors and then used his knowledge and technical training to terrorize them and try to destroy their lives."
[...]
 
InfoSec News: Ohio State Says Hackers Breached Data on 760,000: http://www.nytimes.com/2010/12/17/education/17colleges.html
By TAMAR LEWIN The New York Times December 16, 2010
Ohio State University is notifying about 760,000 people whose personal information was stored in the university’s computer server that a data [...]
 
InfoSec News: Compliance Means Getting A Handle On Insider Threats: http://www.darkreading.com/insider-threat/167801100/security/client-security/228800755/compliance-means-getting-a-handle-on-insider-threats.html
By Diana Kelley and Ed Moyle Contributing Writers Darkreading Dec 16, 2010
[Excerpted from "Compliance From The Inside Out," a new report posted [...]
 
InfoSec News: Size of DDoS group 'doesn't matter', security agency says: http://www.zdnet.co.uk/news/security-threats/2010/12/16/size-of-ddos-group-doesnt-matter-security-agency-says-40091193/
By Jack Clark @mappingbabel ZDNet UK 16 December, 2010
The number of people needed to launch a successful denial-of-service attack has been overestimated by the press, according to the European Network and Information Security Agency.
Attacks such as those by pro-Wikileaks groups need significantly fewer participants than has been reported, the European Network and Information Security Agency (Enisa) said on Tuesday. Visa was taken down by a distributed denial-of-service (DDoS) attack from roughly 500 machines, Ulf Bergstrom, Enisa's spokesman, told ZDNet UK on Thursday.
"An attack can be constituted by much fewer machines [than was thought], and that is quite concerning and quite an important point to make," Bergstrom said.
DDoS attacks against Wikileaks, Visa, PayPal and various government sites all demonstrated that "size doesn't matter: the number of computers used in the attacks was relatively small (in the hundreds). Some press reports claim over six times the real number, which is indicative of the unreliability of information about botnets", Enisa wrote in a statement on Wednesday.
[...]
 
InfoSec News: County upgrades computer security for audit report: http://www.dewitt-ee.com/articles/2010/12/15/news/doc4d08eed477f4f744440444.txt
By Christina Verderosa Dewitt Era Enterprise December 15, 2010
Arkansas County has spent a great deal of time in the past year improving computer security and data back-up plans. [...]
 
InfoSec News: New corps' mission to parry cyberthreat: http://www.staradvertiser.com/news/hawaiinews/20101216_New_corps_mission_to_parry_cyberthreat.html
By William Cole Honolulu Star-Advertiser Dec 16, 2010
Their ranks include snoops and sleuths who cull intelligence obtained from submarines, ships and aircraft, monitor foreign computer traffic, [...]
 
InfoSec News: Secunia Weekly Summary - Issue: 2010-50: ========================================================================
The Secunia Weekly Advisory Summary 2010-12-09 - 2010-12-16
This week: 79 advisories [...]
 
InfoSec News: Nuclear security urgently reviewed after Sellafield is found to be vulnerable to terrorists: http://www.mirror.co.uk/news/politics/2010/12/16/nuclear-security-urgently-reviewed-after-sellafield-is-found-to-be-vulnerable-to-terrorists-115875-22786725/
By James Lyons Daily Mirror 16/12/2010
Special forces carrying out “red team exercises” to test­security at [...]
 
Freescale will display 23 tablet computers at the International Consumer Electronics Show (CES) in Las Vegas next month, and 11 of them are already on sale ahead of Christmas, according to an executive from the company.
 

Posted by InfoSec News on Dec 16

http://www.dewitt-ee.com/articles/2010/12/15/news/doc4d08eed477f4f744440444.txt

By Christina Verderosa
Dewitt Era Enterprise
December 15, 2010

Arkansas County has spent a great deal of time in the past year
improving computer security and data back-up plans. This turned out to
be worthwhile for a number of reasons, including that this is just what
state auditors were looking for.

In its regular meeting Tuesday, the Arkansas County Quorum...
 

Posted by InfoSec News on Dec 16

http://www.staradvertiser.com/news/hawaiinews/20101216_New_corps_mission_to_parry_cyberthreat.html

By William Cole
Honolulu Star-Advertiser
Dec 16, 2010

Their ranks include snoops and sleuths who cull intelligence obtained
from submarines, ships and aircraft, monitor foreign computer traffic,
and work with super-secret organizations such as the National Security
Agency in Kunia.

There are 2,800 Navy intelligence, information warfare,...
 

Posted by InfoSec News on Dec 16

========================================================================

The Secunia Weekly Advisory Summary
2010-12-09 - 2010-12-16

This week: 79 advisories

========================================================================
Table of Contents:

1.....................................................Word From...
 

Posted by InfoSec News on Dec 16

http://www.mirror.co.uk/news/politics/2010/12/16/nuclear-security-urgently-reviewed-after-sellafield-is-found-to-be-vulnerable-to-terrorists-115875-22786725/

By James Lyons
Daily Mirror
16/12/2010

Special forces carrying out “red team exercises” to test­security at
high-profile targets are thought to have exposed flaws.

A 118 million GBP bunker capable of storing enough material to build
thousands of nuclear bombs has just been built...
 

Posted by InfoSec News on Dec 16

http://www.startribune.com/local/north/111972394.html

By JAMES WALSH
Star Tribune
December 16, 2010

A Blaine man hacked into his neighbor's wireless Internet to send
e-mails containing child pornography, sexual advances and threats to
Vice President Joe Biden to smear and terrorize people who had made him
angry, a federal prosecutor said on Wednesday.

What set Barry Vincent Ardolf apart, said Assistant U.S. Attorney Tim
Rank, was his...
 

Posted by InfoSec News on Dec 16

http://www.nytimes.com/2010/12/17/education/17colleges.html

By TAMAR LEWIN
The New York Times
December 16, 2010

Ohio State University is notifying about 760,000 people whose personal
information was stored in the university’s computer server that a data
breach could put them at risk for identity theft.

The university, located in Columbus, began sending letters on Wednesday
to current and former faculty and staff members, students and...
 

Posted by InfoSec News on Dec 16

http://www.darkreading.com/insider-threat/167801100/security/client-security/228800755/compliance-means-getting-a-handle-on-insider-threats.html

By Diana Kelley and Ed Moyle
Contributing Writers
Darkreading
Dec 16, 2010

[Excerpted from "Compliance From The Inside Out," a new report posted
this week on Dark Reading's Insider Threat Tech Center.]

When you talk about security and compliance, you typically think about
protecting the...
 

Posted by InfoSec News on Dec 16

http://www.zdnet.co.uk/news/security-threats/2010/12/16/size-of-ddos-group-doesnt-matter-security-agency-says-40091193/

By Jack Clark
@mappingbabel
ZDNet UK
16 December, 2010

The number of people needed to launch a successful denial-of-service
attack has been overestimated by the press, according to the European
Network and Information Security Agency.

Attacks such as those by pro-Wikileaks groups need significantly fewer
participants than...
 


Internet Storm Center Infocon Status