InfoSec News

DeepField Networks, a cloud intelligence company operating in semi-stealth mode, offered up some eye-popping findings Wednesday about the breadth of Internet activity Amazon is now responsible for.
When you browse the Web, you are constantly being tracked. It's not personal: It's marketing. Website owners and ad networks want to learn as much as they can about you, so they can target their content and ads effectively. After all, there's not much use in showing ads for anti-aging products to a sixteen-year-old. That said, not all users appreciate being tracked so meticulously, and this is where Anonymizer Universal and other VPN applications come in.
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
As part of their effort to speed delivery of Web pages, Google engineers have released a module for the Apache Web server software that augments the basic protocols used for carrying Web traffic across the Internet.
Consumers have an increasing appetite for wireless data whether they're on a contract or not. AT&T responded Wednesday by doubling its data plans for prepaid customers to bring them more in line with competitors.
A review of hundreds of unique custom Web applications found more than half are vulnerable to cross-site scripting and more than 86% contain injection flaws.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
MySQL Unspecified Remote Code Execution Vulnerability
MySQL 5.5.20 Unspecified Remote Code Execution Vulnerability
SAP intends to become a major player in cloud-based software, and has been adopting agile software development practices as one means of reaching that goal.
With its sleek design and excellent camera, HTC's One S sets a new standard for smartphone greatness for HTC and for T-Mobile.
G-Technology's G-RAID with Thunderbolt is a preconfigured RAID 0 storage device that houses two 7200-rpm Hitachi drives in an all-aluminum enclosure. While it's configured as a striped RAID (RAID 0), it can be reconfigured to a mirrored RAID (RAID 1) for data protection by using the Mac OS X Disk Utility.
The Flashback botnet continues to wither, and now controls approximately 140,000 Macs, a Symantec security manager said today.
GSM SIM Utility '.sms' File Buffer Overflow Vulnerability
CyberLink Power2Go Multiple Stack Buffer Overflow Vulnerabilities
Cisco boasted Wednesday of having sold 50 million IP desktop phones, up from 30 million sold just two years ago.
HTC's One X smartphone will be available exclusively from AT&T on May 6 for $199.99 and a two-year agreement.
Cisco boasted Wednesday of having sold 50 million IP desktop phones, up from 30 million sold just two years ago.
Cisco will include Jabber instant messaging and presence software at no extra charge with its Unified Communications Manager (CUCM) enterprise IP communications system, the company plans to announce on Wednesday.
Big data is all about storing and accessing large amounts of structured and unstructured data. However, where to put that data and how to access it have become the biggest challenges for enterprises looking to leverage the information. If you haven't yet considererd the open source Hadoop platform, now's the time.
Shaw review Stem Innovation's iZON Remote Room Monitor, Belkin's Wireless Dual-Band Travel Router.
Google CEO Larry Page told a jury on Wednesday that he remembers little about Google's attempts to negotiate a Java license from Sun, during 40 minutes of tense questioning in Oracle's lawsuit against Google over Android.
[security bulletin] HPSBMU02766 SSRT100624 rev.1 - HP Onboard Administrator (OA), Remote Denial of Service (DoS)
Multiple vulnerabilities in Newscoop
Multiple XSS vulnerabilities in XOOPS
TC-SA-2012-01: Multiple web-vulnerabilities in ownCloud 3.0.0
The White House joined the growing chorus of voices expressing concern over the proposed Cyber Intelligence Sharing and Protection Act (CISPA) legislation that is scheduled for a vote in the U.S. House of Representatives next week.
If you're trying to decide whether to get the new iPad or spring for an Asus Eee Pad Transformer Prime TF201, check out our video clash between Computerworld Editor-in-Chief Scot Finnie and News Editor Ken Mingis about which one is better.
Verizon Wireless announced that its data prices Monday will drop dramatically -- to $25 for 100MB -- for U.S.-based customers traveling abroad.
Microsoft today declined to confirm whether users of Windows XP and Vista will be able to upgrade their PCs to Windows 8 when the latter launches later this year.
Verizon today launched a new low-latency network for financial services firms that can complete a stock trade between New York and Chicago in as little as 14.5 milliseconds.
PolicyKit 'pkexec' File Existence Information Disclosure Weakness
WordPress 1-jquery-photo-gallery-slideshow-flash Plugin Cross Site Scripting Vulnerability
[ MDVSA-2012:032-1 ] mozilla
Acuity CMS 2.6.x <= Cross Site Scripting
VUPEN Security Research - Microsoft Internet Explorer VML Remote Code Execution (MS12-023 / CVE-2012-0172)
If you think SAP equals ERP, Bill McDermott would like a few minutes to set you straight about the 2012 version of the software giant, which he claims is in the midst of "an intellectual renewal." McDermott has been co-CEO -- along with Jim Hagemann Snabe -- of SAP since 2010 and has helped broaden the company's strategy beyond traditional applications and analytics to the cloud, mobile, Big Data and a bet-the-business focus on real-time computing with the HANA in-memory database at the forefront. Insider (registration required)
Sheer performance can't compete with the ecosystem of applications and services that a particular platform exists in.

The rush to the cloud can often make security an afterthought, but if recent funding announcements are any indication, the VC community wants to reverse that trend.

CloudPassage, Cloud Lock and Symplified are among the cloud security vendors winning funding this year.

San Francisco-based CloudPassage announced last week that it won $14 million in funding. The company said it would use the money, which brings its total funding to $21 million, to further market and develop its Halo cloud server security platform.

In late March, Waltham, Mass.-based CloudLock said it raised $8.7 million in funding to expand its engineering and sales efforts and extend its cloud security technologies to new platforms. The cloud security vendor provides a security SaaS add on for Google Apps. When I met with Tsahy Shapsa, Cloud Lock co-founder and vice president of sales and marketing, at the RSA Conference 2012, he said the company planned to expand its service to protect other cloud platforms.

Earlier this year, Boulder, Colo.-based Symplified garnered a whopping $20 million in VC financing led by Ignition Partners.

When announcing the CloudLock funding, Luke Burns, a partner with Ascent Venture Partners — CloudLock’s new investor — noted that increased collaboration is a major benefit of cloud computing, but organizations “lose sight and control of the data being shared, both internally and externally.” CloudLock, he added, bridges a “critical, emerging security gap.”

Meanwhile, Brian Melton, managing director at Tenaya Capital – which led CloudPassage’s latest funding – said the cloud security vendor’s technology addresses a large market opportunity. He noted that security has been a “key barrier to cloud adoption.”

The fact that VCs see cloud security as an opportunity is a promising sign. It should help cloud service providers understand that security is critical and provide cloud users with more options for securing their cloud environments.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

Presented By:
Effect of UPS on System Availability
  Click here to Download a FREE white paper – “Effect of UPS on System Availability ” and learn how system availability and uptime are affected by AC power outages and provides quantitative data regarding uptime in real-world environments, including the effect of UPS on uptime.

Ads by Pheedo

HP OpenVMS CVE-2012-0134 Unspecified Local Denial Of Service Vulnerability

After some maintenance downtime, the Suspicious Domains lists at https://isc.sans.edu/tools/suspicious_domains.html have been re-launched. This project was developed by handler Jason Lam and is an effort to assemble weighted lists of suspicious domains based on tracking, malware and other sources.


Background - https://isc.sans.edu/tools/suspicious_domains.html#background

Project description, sources cited and suggested uses of project data.

Lists By Level - https://isc.sans.edu/tools/suspicious_domains.html#lists

Domain lists linked here are categorized by Low, Medium and High sensitivity.

The lower the sensitivity, the fewer false positives.
Lists are based on ranges so they will overlap at each level.

Domain Whitelist - https://isc.sans.edu/tools/suspicious_domains.html#whitelist

Links to lists of approved and pending known-good domains. Submissions will be reviewed for approval and the form is limited to the following:

20 submissions per 24 hour period
Submit one domain at a time
Domain must be on one of the current Lists by Level
Domain whitelisted will automatically be removed 7 days after dropping off Lists by Level

Search the Lists - https://isc.sans.edu/tools/suspicious_domains.html#search

Search for domain history and details:

Enter a domain from one of the Lists by Level to view First Added, Last Seen, Source and Whitelist details.

Creates a custom domain list file

Choose criteria on this form to refine a custom suspicious domain list! Results are displayed in a text box so you can easily select all and copy for use.

- Limit Score Range between 0 to 100 (Higher the score, the more sensitive the domain)

- Refine Domain Names by Any, All or Like

- Occurs a minimum of n times

Post suggestions or comments in the section below or send us any questions or comments in the contact form on https://isc.sans.edu/contact.html#contact-form


Adam Swanger, Web Developer (GWEB, GWAPT)

Internet Storm Center https://isc.sans.edu (c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
During his keynote speech at the Open Networking Summit in Santa Clara on Tuesday, Google executive Urs Holzle detailed the company's work with software-defined networking (SDN) from its earliest stages.
Google underestimated the scope and consequences of the outage that hit Gmail on Tuesday.
Honeywell and Inmarsat have signed a deal to cooperate on next-generation in-flight connectivity systems that will increase the maximum bandwidth to 50M bps (bits per second), they said on Wednesday.
[security bulletin] HPSBOV02765 SSRT100828 rev.1 - HP OpenVMS, local Denial of Service (DoS)
An Ohio man reportedly associated with Anonymous pleaded not guilty on Monday to charges of hacking two Utah police websites.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
Security researchers try to get a better understanding of their adversary, but probing Anonymous is proving to be a difficult challenge.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
The Anonymous hacking collective has launched a new site that it claims will allow users to post material without fear of being tracked down.
Google underestimated the scope and consequences of the outage that hit Gmail on Tuesday.
Fibble feels like what Pixar might come up with if the animation studio tried its hand at a puzzle game. The premise behind the game from Crytek even kind of sounds like a Disney movie waiting to happen: When a lovable alien the size of a marble gets knocked from orbit, it has to navigate its way through the hazards of a human household as efficiently as possible. Also, there's a lot of hugging. And an octopus with a monocle.
RealNetworks Helix Server Multiple Remote Vulnerabilities
Amazon Web Services has announced a public beta of the new AWS Partner Network (APN), a global program that aims to boost the cloud-based businesses of partners with the help of sales and marketing support, the company said in a blog post on Tuesday.
Verizon announced Wednesday that it has combined its 4G LTE wireless access, which is now deployed in more than 200 cities, with its Private IP network service to give business users secure, high-speed Internet access.
Mozilla this week began blocking outdated versions of a Java plug-in in Firefox for some Mac users after calling the threat posed by the Flashback malware "evident and imminent."
Flash is a problem for iDevices, which makes mobile access to a website problematic. Here's what smart shops are doing about it.
The system for applications for new generic top-level domains (gTLDs) is still down after nearly a week, with the Internet Corporation for Assigned Names and Numbers (ICANN) still unclear as to when it will be restored.
Yahoo plans to cut about 50 properties and refocus on its core business, CEO Scott Thompson said in an earnings call.
While IBM continues to financially excel at selling software and systems, its hardware revenue for the past three months has been sluggish, according to the latest quarterly results posted by IBM on Tuesday. The hardware results didn't help the company's overall revenue, which was flat for the quarter.

Posted by InfoSec News on Apr 18

Forwarded from: Conference Mailer <noreply (at) crypto.cs.sunysb.edu>

2012 ACM Cloud Computing Security Workshop (CCSW) at CCS

October 19, 2012, Sheraton Raleigh Hotel, Raleigh, NC.

Dear Colleagues,

ACM CCSW is back! The previous workshops were a tremendous success, with
over 100+ people in the audience, multiple sponsors (NSF, Microsoft), 3-5
invited talks and excellent papers. This year we hope...

Posted by InfoSec News on Apr 17


By Ellen Messmer
Network World
April 16, 2012

A Department of Energy (DOE) lab is taking research done to develop a
host-based security sensor and open-sourcing the software to encourage
community feedback and participation.

"We'd love to have other people use this," says Glenn Fink, senior
research scientist at Pacific Northwest National Laboratory, who

Posted by InfoSec News on Apr 17


By Hasyim Widhiarto
The Jakarta Post/Asia News Network
April 17, 2012

State weapons manufacturer PT Pindad has to take extra steps to keep
company secrets from being extracted to foreign nationals wanting a peek
into Indonesia's defense industry.

“During an interview, a candidate for employment is asked to detail his
or her family background,...

Posted by InfoSec News on Apr 17


By Curt Hopkins
ars technica
April 17, 2012

Since the first zero met the first one, people have been shrilly
overestimating the effects of computers on our day-to-day lives. Most
instances of wild exaggeration are eventually brought back down to earth
(at least for a while). It happened with the wild estimates of economic
harm done by...

Posted by InfoSec News on Apr 17


By Steve Johnson

Homeland Security Secretary Janet Napolitano said Monday she would
consider having tech companies participate with the government in
"proactive" efforts to combat hackers based in foreign countries.

Napolitano, who made the comments during a meeting at the San Jose
Mercury News with the editorial board and reporters, declined to say
what steps...

In case you have not seen or heard, some of our readers pointed us to Monday's posting on the Sysinternals Site Discussion panel about a number of updates that are now available.

Among the release are updates to the following:

Process Monitor v3.01
TestLimit v5.2
Webcasts from Mark R.
Windows Internals 6th Ed. Part 1

Further details can be found at the following url:
Many thanks to our loyal readers Rene and Roseman for keeping us in the loop.


ISC Handler on Duty

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Internet Storm Center Infocon Status