Hackin9

InfoSec News

The Internet address registry for North America expects to start allowing transfers of IPv4 addresses to qualified users in Asia by the end of this month, possibly providing an escape valve for pent-up demand in that region.
 
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
The appointment of former Google executive Marissa Mayer as CEO of Yahoo had tech industry tongues wagging Monday when the surprise announcement was made. Today, there's just as much talk about how much she stands to earn at Yahoo, but what people are saying depends on where they are getting their news.
 
Microsoft revenue rose slightly but due to several one-time items, it posted a net loss during its fourth fiscal quarter, when the Windows division's sales fell 13 percent.
 
Google has reported a profit of $2.79 billion in the quarter ended June 30, up 11% over the same period of last year, in the company's first financial statement since it finalized its acquisition of Motorola in May.
 
California's top legal official has put the tech industry on notice that she intends to get tough on digital privacy.
 
Microsoft revenue rose slightly but due to several one-time items, it posted a net loss during its fourth fiscal quarter, when the Windows division's sales fell 13 percent.
 
U.S. broadband providers are delivering close to their advertised speeds, according to a U.S. Federal Communications Commission report, but not everyone trusts the numbers.
 
The latest effort to produce legislation intended to encourage firms to repatriate jobs back to the U.S. failed today on a 56-to-42 vote in the Senate. The bill needed 60 votes to move forward.
 
Following last year's merger with Activant Solutions, ERP (enterprise resource planning) vendor Epicor is closing in on US$1 billion in revenue, a figure that belies the vendor's relatively low profile compared to giants such as Oracle and SAP.
 
Harvard University scientists are working on an Iron Man-like smart suit that could improve soldiers' endurance in war zones.
 
A Russian man has been arrested in Cyprus on charges that he launched denial-of-service attacks on Amazon.com and eBay in 2008, the U.S. Department of Justice announced.
 

Most infosec professionals want compliant cloud providers
Infosecurity Magazine
You are here: Home; /; News; /; Most infosec professionals want compliant cloud providers · "Although cloud adoption is growing, it continues to be a minor part of most organizations' infrastructure", nCircle's Meltzer says ...

 
A group of activists have banded together to protect the Internet from what they see as bad legislation, with a focus initially on copyright enforcement proposals.
 
Microsoft's $1.2 billion acquisition of Yammer has been finalized, less than a month after the companies announced the cash deal.
 
Apple will report a fall-off in iPhone sales next week, although not as dramatic as some believe, but the iPad will make up the difference, with units sales 72% above last year's, a financial analyst today.
 
Drop and dunk tests of both the new Apple iPad and the Google Nexus 7 show the Google device is more resilient, according to SquareTrade, which offers third-party warranties for electronic devices.
 
Nokia's dismal earnings report announced Thursday has left smartphone industry observers looking for better news at the Nokia World conference Sept. 5-6 in Helsinki.
 
[SECURITY] [DSA 2515-1] nsd3 security update
 
[Announcement] ClubHack Magazine's July 2012 Issue Released
 
The WiebeTech UltraDock v5 is a multi-interface dock with a number of different connections, enabling users to connect drives mechanisms to a Mac.
 
Canonical is adding a new feature to its Ubuntu operating system that will allow desktop users to access popular Internet services without opening a browser window. Instead, a Web page can be accessed as a desktop application.
 
Cybercriminals no longer control one of the world's largest spam botnets, Grum, because all of the servers the botnet relied on for receiving commands were shut down, according to researchers from security firm FireEye.
 
Toy CRM systems might make you think the software is just cases, escalations and SLA management, but serious CRM is changing the world of service and support by leveraging social networking functionality.
 
As we've seen in recent years, natural disasters can lead to long-term downtime for organizations. Because earthquakes, hurricanes, snow storms or other events can put data centers and other corporate facilities out of commission for a while, it's vital that companies have in place a comprehensive disaster recovery plan.
 
Sandra Pickering faced her audience and saw them slumped on their seats. She continued with her pitch -- how a career in information technology is rewarding and empowering. At the end of the presentation, the audience, 14 to 16 year old girls at Selwyn College, were "engaged", listening and learning forward.
 
Zoho has integrated its cloud-hosted office productivity applications with the Google Drive online storage service, Zoho said in a blog post.
 
GreHack 2012 - Call For Musicians/Artists/DJs application open till October 5th 2012 (Grenoble, France)
 
ZDI-12-127 : (0Day) HP StorageWorks File Migration Agent RsaFTP.dll Remote Code Execution Vulnerability
 
ZDI-12-126 : (0 day) HP StorageWorks File Migration Agent RsaCIFS.dll Remote Code Execution Vulnerability
 
Nokia reported a 39 percent year-on-year drop in the number of smartphones it sold in the second quarter, to 10.2 million, while its net loss more than trebled.
 
A typical cloud contract contains uptime clauses and credits for missed service levels, but it often fails to adequately protect the enterprise customer. Here are 10 questions the intelligent cloud customer can ask to make sure they are sheltered from potential disaster.
 
Nokia reported a 39% year-on-year drop in the number of smartphones it sold in the second quarter, to 10.2 million, while its net loss more than trebled.
 
The upper house of the Russian Parliament passed a bill on Wednesday that the Russian IT industry believes has high potential to lead to Internet censorship.
 
Nokia reported a 39% year-on-year drop in the number of smartphones it sold in the second quarter, to 10.2 million, while its net loss more than trebled.
 
European antitrust officials have widened their investigation into Microsoft's browser practices to include four different allegations against Windows 8 and Windows RT, a government spokesman said.
 
Workflow engines help ensure enterprise application development stays on track -- if you know how to use them
 
Lawyers for Megaupload filed another motion on Wednesday asking a federal court to dismiss its criminal case, continuing its argument that the company can't be served a summons since it was headquartered outside the U.S.
 
A Brookings Institution report that looks at H-1B use in U.S. metropolitan areas is being criticized for its approach, as well as its research data.
 
Have you noticed that it's just not so cool to be in the PC business these days? Michael Dell, founder and CEO of Dell, said this week that the 'new Dell' really isn't in the PC business anymore.
 
Getting people to agree on the problems, let alone the solutions, is no easy task.
 

Posted by InfoSec News on Jul 19

https://www.nytimes.com/2012/07/17/business/labor-dept-tightens-security-for-market-sensitive-data.html

By JOHN H. CUSHMAN Jr.
The New York Times
July 16, 2012

WASHINGTON -- On Tuesday morning at precisely 8:30, after a 10-second
countdown synchronized to the Naval Observatory’s atomic clock, a Labor
Department official flipped a master switch in the agency’s
battened-down pressroom and computers blurted out the monthly Consumer
Price...
 

Posted by InfoSec News on Jul 19

https://www.computerworld.com/s/article/9229336/Hacker_claims_breach_of_50_000_accounts_from_Wall_Street_IT_recruiting_firm

By Jaikumar Vijayan
Computerworld
July 18, 2012

A hacker today claimed to have broken into ITWallStreet.com, a website
for IT professionals who are seeking Wall Street jobs or working with
Wall Street firms, and exposed highly detailed data belonging to tens of
thousands of job applicants.

As many as 12 data files...
 

Posted by InfoSec News on Jul 19

http://www.theregister.co.uk/2012/07/19/china_government_cyber_security_guidelines/

By Phil Muncaster
The Register
19th July 2012

The Chinese government has released sweeping new information security
guidelines designed to enable public and private bodies to protect
themselves more effectively against new cyber threats.

The State Council’s long list of recommendations spans just about every
conceivable aspect of information security,...
 

Posted by InfoSec News on Jul 19

http://news.cnet.com/8301-1009_3-57475328-83/experts-take-down-grum-spam-botnet-worlds-third-largest/

By Steven Musil
Security & Privacy
CNET News
July 18, 2012

Computer-security experts took down the world's third-largest botnet,
which they say was responsible for 18 percent of the world's spam.

Command-and-control servers in Panama and the Netherlands pumping out up
to 18 billion spam messages a day for the Grum botnet were...
 

Posted by InfoSec News on Jul 19

http://arstechnica.com/security/2012/07/dropbox-hires-outside-experts-to-investigate-possible-e-mail-breach/

By Jon Brodkin
Ars Technica
July 18 2012

Dropbox users have been complaining for a couple of days about spam
delivered to e-mail accounts they created solely to log into Dropbox.
There have been no reports of unauthorized activity on Dropbox accounts,
but it's happening to enough users that Dropbox is investigating the
matter...
 

China lays out glorious eight-point infosec masterplan
Register
The Chinese government has released sweeping new information security guidelines designed to enable public and private bodies to protect themselves more effectively against new cyber threats. The State Council's long list of recommendations spans just ...

and more »
 

Spy chief: intel gathering a challenge in infosec landscape
SC Magazine Australia
The head of the Australian Secret Intelligence Service (ASIS) has warned IT security challenges "pose one of the biggest threats of the decade", as the security landscape makes covert intelligence operations more difficult for agents. Director-general ...

and more »
 
Internet Storm Center Infocon Status