Hackin9

Aviation Info Sec
Infosecurity Magazine (blog)
Information Risk Management Plc. (IRM) is an international Information Security consultancy dedicated to providing strategic cybersecurity advice across a wide range of sectors to ensure that executives, management and technical teams understand the ...

 
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1714 Same Origin Policy Security Bypass Vulnerability
 

The August 2013 ISSA Journal includes an excellent read from Ken Dunham: A Fuzzy Future in Malware Research. Ken is a SANS veteran (GCFA Gold, GREM Gold, GCIH Gold, GSEC, GCIA) who spends a good bit of his time researching, writing and presenting on malware-related topics.

From Ken's abstract:

"Traditional static analysis and identification measures for malware are changing, including the use of fuzzy hashes which offers a new way to find possible related malware samples on a computer or network. Fuzzy hashes were born out of anti-spam research and offer another avenue of promise for malware researchers and first responders. The focus of this article is on malware research and response."

No discussion on fuzzy hashes is complete without including SANS Instructor Jesse Kornblum's SSDEEP, as Ken does in depth. Consider it a requirement to familiarize (pg. 22) yourself with SSDEEP if conducting research of this kind interests you.

Enjoy this great read and happy fuzzy hashing!

Russ McRee | @holisticinfosec

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Nasdaq blamed the unprecedented trading halt Thursday on a "connectivity issue" between an exchange participant and a core system used to consolidate and disseminate quote and trade information on Nasdaq listed securities.
 
As the software-defined data center evolves from dream to reality, many Software Defined Networking (SDN) startups are being snatched up by established networking vendors. Here are nine SDN startups (and an important new standards body) that intend to push SDN into the mainstream.
 
You will find a few possibility located at almost any quickness, and yet a large number of mishaps is usually averted through quite a few practical sense and even research. Coming from as well as the get kart you acquire in order to the actual security tools buy might find out an individual's volume of probability. Everything is realistic and once you may be around the trail, go problems, ruined halloween bones, that will fire and even more. Dr Dre Beats UK
 
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1710 Arbitrary Code Execution Vulnerability
 
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 

Can someone answer me this.. How do I get my hacked facebook back? Facebook are no use, they won't help me..

thanks

bev

 
Plone 'mail_password.py' Access Bypass Vulnerability
 
[security bulletin] HPSBST02897 rev.1 - HP StoreOnce D2D Backup System, Remote Denial of Service (DoS)
 
Makerbot's Digitizer desktop 3D scanner, which can scan an object and replicate it in digital form for a 3D printer, is now for sale. But it comes with a hefty price tag.
 
Joomla! VirtueMart component <= 2.0.22a - SQL Injection
 
Xerox has issued the first software patch intended to fix a problem in some multi-function printers that causes characters to be incorrectly reproduced when scanned.
 
A U.S. government investigation into allegations that Microsoft or its business partners have bribed officials or handed out kickbacks to close deals has expanded to include Russia and Pakistan, according to the Wall Street Journal.
 
The current generation of teenagers seems willing to share anything on social media, but cares more about privacy than you think, according to a recent Pew study.
 
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1713 Same Origin Policy Security Bypass Vulnerability
 
Mozilla Firefox, SeaMonkey, and Thunderbird CVE-2013-1717 Information Disclosure Vulnerability
 
Mozilla Firefox/Thunderbird/SeaMonkey CVE-2013-1709 Cross Site Scripting Vulnerability
 
Mozilla Firefox/Thunderbird/Seamonkey CVE-2013-1701 Multiple Memory Corruption Vulnerabilities
 
CVE-2013-4152 XML External Entity (XXE) injection in Spring Framework
 
Recent versions of Orbit Downloader, a popular Windows program for downloading embedded media content and other types of files from websites, turns computers into bots and uses them to launch distributed denial-of-service (DDoS) attacks, according to security researchers.
 
Steven Sinofsky, who abruptly left Microsoft weeks after his Windows 8 brainchild shipped, has found a new gig at venture capital firm Andreessen Horowitz.
 
Nasdaq's unprecedented trading halt today stemmed from a technical glitch with a core data feed that disseminates market data for Nasdaq-listed securities.
 
For the first time since 2011, Yahoo topped Internet behemoth Google in Web traffic last month, according to Internet tracker comScore Inc.
 
All trading on the NASDAQ market was halted on Thursday for more than two hours due to a glitch in a system used to disseminate trading information. Trades were set to resume by mid-afternoon.
 
Lenovo, the world's largest computer maker, announced today that its Windows 8 PCs will come bundled with the Pokki Start button and menu replacement, along with its desktop mode-oriented app store.
 
SAP has made the second change to its software licensing policies within a month following a long-term lobbying effort by user groups, and while the move will give customers more flexibility, certain limitations apply.
 
Oracle Solaris CVE-2013-3787 Remote Security Vulnerability
 
Foreman 'users_controller.rb' Remote Privilege Escalation Vulnerability
 
[ MDVSA-2013:215 ] cacti
 
FreeBSD Security Advisory FreeBSD-SA-13:09.ip_multicast
 
Mobile application development tools vendor Appcelerator has acquired Singly, a provider of API (application programming interface) management software, the two companies announced.
 
Steven Sinofsky, who abruptly left Microsoft weeks after his Windows 8 brainchild shipped, has found a new gig at venture capital firm Andreessen Horowitz.
 
All trading on the NASDAQ market was halted on Thursday due to a glitch in a system used to disseminate trading information.
 
 
[slackware-security] poppler (SSA:2013-233-03)
 
[slackware-security] hplip (SSA:2013-233-01)
 
FreeBSD Security Advisory FreeBSD-SA-13:10.sctp
 
The prospect of self-driving cars within the next decade is beginning to stir up resistance in the blogosphere, with many saying auto makers will have to pry the steering wheel from their 'cold, dead hands' before they'll give up their ability to control their own vehicles.
 
TP-Link TL-SC3171 IP Camera Arbitrary File Upload Vulnerability
 
TP-Link TL-SC3171 IP Camera Remote Security Bypass Vulnerability
 
TP-Link TL-SC3171 IP Camera CVE-2013-2579 Remote Command Injection Vulnerability
 

CounterTack Partners With South Korean Providers For APT Defense
Dark Reading
SK Infosec, the leading information security company in South Korea, has received 2013 Frost & Sullivan Korea Excellence Awards for Managed Security Services. The company has more than 3,000 customers in Korean government and public institutions, ...

and more »
 
Nearly one in four browsers are now armed with an ad-blocking tool, reducing revenue at free-content websites, an Irish company said today
 
In July 2012, I had a long, thoughtful chat with BlackBerry CEO Thorsten Heins about everything BlackBerry. Our conversation came at a crucial time for the company. The BlackBerry 10 OS had already been delayed multiple times, the company was at the center of endless doom-and-gloom rumors and Heins, who took on the chief executive reins just six months earlier, had a whole lot to prove. (Read the full Q&A with Heins here.)
 
Software AG is adding mashup and real-time analytic capabilities to its lineup with the acquisition of JackBe. Terms of the deal, which was announced Thursday, were not disclosed.
 

IT security strategy 2.0: Adjusting for a shifting infosec landscape
TechTarget
There is no doubt that we as information security practitioners face unprecedented infosec challenges, ranging from the highly technical malware injections to simple social engineering attacks, that require creative energy to address. Each day we read ...

 
Software AG is adding mashup and real-time analytic capabilities to its lineup with the acquisition of JackBe. Terms of the deal, which was announced Thursday, were not disclosed.
 
Sales and marketing experts share their lead-generation tips, including the best methods and media for finding prospective customers.
 
LinuxSecurity.com: SQL injection and shell escaping issues were discovered and fixed in cacti (CVE-2013-1434, CVE-2013-1435). The updated packages have been upgraded to the 0.8.8b version which is not vulnerable to these issues. [More...]
 
LinuxSecurity.com: New hplip packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue. [More Info...]
 
LinuxSecurity.com: New xpdf packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix a security issue. [More Info...]
 
LinuxSecurity.com: New poppler packages are available for Slackware 14.0, and -current to fix a security issue. [More Info...]
 
LinuxSecurity.com: Two security issues (SQL injection and command line injection via SNMP settings) were found in Cacti, a web interface for graphing of monitoring systems. [More...]
 
LinuxSecurity.com: Updated mongodb and pymongo packages that fix two security issues and add one enhancement are now available for Red Hat Enterprise MRG 2.3 for Red Hat Enterprise Linux 6. [More...]
 
LinuxSecurity.com: Updated condor packages that fix one security issue are now available for Red Hat Enterprise MRG 2.3 for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More...]
 
LinuxSecurity.com: Updated condor packages that fix one security issue are now available for Red Hat Enterprise MRG 2.3 for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...]
 
RETIRED: FFmpeg Multiple Remote Security Vulnerabilities
 
AlienVault Open Source SIEM (OSSIM) Multiple SQL Injection Vulnerabilities
 
Ginkgo CMS 'rang' Parameter SQL Injection Vulnerability
 
RETIRED: Puppet CVE-2013-4761 Remote Code Execution Vulnerability
 
Cisco Systems has released new security patches for several versions of Unified Communications Manager (UCM) to address vulnerabilities that could allow remote attackers to execute arbitrary commands, modify system data or disrupt services.
 
Drupal Spambot Module Cross Site Scripting Vulnerability
 
RiteCMS Cross Site Scripting and Cross Site Request Forgery Vulnerabilities
 
mojoportal HTML Injection Vulnerability
 
A malicious software tool perhaps most famously used to hack RSA's SecurID infrastructure is still being used in targeted attacks, according to security vendor FireEye.
 
NASA is bringing a retired spacecraft back to life to search for potentially dangerous near-Earth objects.
 
Adding 4G infrastructure has its own pain points, including getting coverage everywhere you need it. Three early adopters share their experiences and lessons learned.
 
Canonical raised only $12.8 million of the $32 million it wanted for the production of the Ubuntu-based Edge smartphone.
 
Calling app stores flawed, Chinese search giant Baidu wants to directly integrate third-party apps into its mobile services in order to do away with product installs, and streamline the user experience.
 
Little CMS Multiple Remote Buffer Overflow Vulnerabilities
 
Siemens COMOS CVE-2013-4943 Local Privilege Escalation Vulnerability
 
ALLMediaServer Buffer Overflow Vulnerability
 
RETIRED: phpMyAdmin Multiple SQL Injection and Cross Site Scripting Vulnerabilities
 
Hotel Software and Booking System Multiple SQL Injection and Cross Site Scripting Vulnerabilities
 

Posted by InfoSec News on Aug 22

http://english.peopledaily.com.cn/90786/8373519.html

China Military Online
August 22, 2013

WASHINGTON DC, August 20 (ChinaMil) -- Chang Wanquan, state councilor and
defense minister of the People’s Republic of China (PRC) who is on an
official friendly visit to the U.S., expressed China's stand on network
security issues by using the word “oppose” for five times on August 19,
2013 to stress that the Chinese military has never...
 

Posted by InfoSec News on Aug 22

http://www.fastcompany.com/3016156/the-code-war/data-triage-for-the-boston-bombing-how-beth-israel-deaconess-protected-patient-

By Neal Ungerleider
Fast Company
August 21, 2013

When bombs went off at the Boston Marathon on April 15, Beth Israel
Deaconess Medical Center (BIDMC) CIO John Halamka found himself dealing
with the kind of the emergency few drills could ever prepare you for. As
bombing victims were brought into his downtown hospital...
 

Posted by InfoSec News on Aug 22

http://www.theregister.co.uk/2013/08/21/cyberheist_ddos_smokescreen/

By John Leyden
The Register
21st August 2013

Cybercrooks are running distributed denial of service attacks as a
smokescreen to distract bank security staff while they plunder online
banking systems, according to a researcher.

Avivah Litan, vice president at Gartner Research, reports that cyber
criminals looking to attack financial institutions are getting more
ambitious...
 

Posted by InfoSec News on Aug 22

http://www.spiegel.de/international/zeitgeist/man-in-underpants-partied-in-german-government-jet-for-angela-merkel-a-917494.html

By David Crossland
Spiegel Online
August 20, 2013

In the annals of Germany's security services, the following event won't be
recorded as their finest hour.

On the night of July 25, a 24-year-old man clutching a bag full of
marijuana and ecstasy pills managed with relative ease to get on board an
empty...
 

Posted by InfoSec News on Aug 22

http://fcw.com/articles/2013/08/21/veterans-affairs-data-breaches.aspx

By Frank Konkel
FCW.com
Aug 21, 2013

Privacy is paramount in the Department of Veterans Affairs, and a small
interagency team plays a large role in how the federal government responds
to potential breaches in the privacy of its veterans.

Each week, at least some of the Data Breach Core Team's 30 members gather
to pore over suspected data breaches reported through...
 
Internet Storm Center Infocon Status