InfoSec News

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
MIT Kerberos KDC Cross-Realm Referral NULL Pointer Dereference Denial Of Service Vulnerability
Hewlett-Packard will pay US$425,000 to settle a claim that it knowingly sold laptops with hazardous batteries that could overheat or catch fire, the U.S. Consumer Product Safety Commission announced Monday.
My post last week discussed the importance of long-term benefits related to productivity and cost when implementing cloud computing technologies. CFOs and their IT directors must understand the importance of hard costs, but they should not forget their employees who will ultimately be impacted by these changes.
Microsoft Windows Media Player 'winmm.dll' MIDI File Parsing Remote Buffer Overflow Vulnerability
Linux Kernel DRM 'drivers/gpu/drm/crm_crtc.c' IOCTL Local Privilege Escalation Vulnerability
Popular Pwn2Own hacking contest at the CanSecWest conference will be fairer to contestants and winners with larger cash prizes, says TippingPoint.

Add to digg Add to StumbleUpon Add to del.icio.us Add to Google

SANS Toronto 2012
Government Security News
Put the skills you'll learn to practical use and join more than 40000 GIAC certified professionals who make the Infosec industry safe! Visit our GIAC Roadmap for more information and register for your certification attempt today!

and more »
Google has relaxed somewhat its strict real-names policy on Google+ by letting members attach an alternate moniker to their profile name and by letting new members sign up with just a pseudonym, provided it is an "established" identity online or offline.
U.S. Senator Chuck Grassley of Iowa said Monday that the owner of LightSquared and a possible representative of the company may have broken ethics rules when they contacted his office about winning approval for LightSquared's planned mobile broadband network.
[ GLSA 201201-13 ] MIT Kerberos 5: Multiple vulnerabilities
The sponsor of the annual Pwn2Own hacking contest has dramatically revamped the challenge and will be awarding a first prize of $60,000 this year, four times 2011's top reward.
For Internet activists, last week's Web protests against two controversial copyright enforcement bills were a huge victory against three powerful and well-funded trade groups that pushed hard for passage of the Stop Online Piracy Act and the Protect IP Act.
Twitter and federal law enforcement are investigating the hacking of a U.S. Senator's Twitter account Monday afternoon.
Wordpress Kish Guest Posting Plugin 1.0 (uploadify.php) Unrestricted File Upload Vulnerability
[ GLSA 201201-12 ] Tor: Multiple vulnerabilities
SQL injection in Bigware shop software
[SECURITY] [DSA 2392-1] openssl security update
The 'Gameover' malware that the FBI warned about earlier this month is a preview of the next version of the even-more-notorious Zeus money-stealing Trojan, a security researcher said today.
A lot is riding on Thorsten Heins, who's been charged with resuscitating stumbling Research in Motion as its new CEO.
Hewlett-Packard on Monday announced its latest netbook, which offers significant application and graphics performance improvements with Intel's newest Atom processor.
Continuing his use of social networks, President Barack Obama is set to do an interview in a Google+ Hangout on Jan. 30.
Those who maintain Ruby on Rails have released a new version of their popular open-source Web application development framework, one that features a number of improvements to help developers build applications more quickly.
Intel announced that it had agreed to buy parts of Qlogic's InfiniBand business as the chip maker looks to provide storage and server bandwidth that will allow systems to achieve exaflop computing.
NX Server 'nxconfigure.sh' Local Privilege Escalation Vulnerability
iSCSI Enterprise Target and tgt Multiple Format String Vulnerabilities
Apple Mac OS X mDNSResponder Remote Buffer Overflow Vulnerability
[SECURITY] [DSA 2301-2] rails regression
Having just released its new cloud operating system, Piston Cloud Computing finds itself in a contentious position -- and company co-founder Josh McKenty says that is exactly where the company wants to be.
U.S. law enforcement agents need court-approved warrants to track a suspect's whereabouts using a GPS device, the U.S. Supreme Court said Monday, in deciding a burning issue where privacy intersects with modern technology.
RIM's new CEO, Thorsten Heins, wants the company to improve its product development while also becoming better at marketing, he said during a conference call on Monday.
Apple let a fake app slip through its approval process for the iOS App Store, the makers of the popular Camera+ program said over the weekend.
A hacker who claims to act in defense of Israel has released 100,000 credentials of allegedly Arab users of Facebook in an ongoing row between Israeli and Arab hackers.
Tablet and e-reader ownership nearly doubled in the U.S. over the recent holiday period, according to the Pew Research Center.
AllWebMenus < 1.1.9 WordPress Menu Plugin Arbitrary file upload
DDIVRT-2011-39 SolarWinds Storage Manager Server SQL Injection Authentication Bypass
[Suspected Spam] Bart`s CMS - SQL Injection Vulnerability
Re: pwgen: non-uniform distribution of passwords
Research In Motion's co-CEOs Mike Lazaridis and Jim Balsillie have quit after a tumultuous period at the company, which saw intense competition, and a long services outage at the maker of the BlackBerry.
ZDI-12-017 : Oracle Outside In OOXML Relationship Tag Parsing Remote Code Execution Vulnerability
[SECURITY] [DSA 2391-1] phpmyadmin security update
Now, not 100% sure if this is the same 0xOmar as before but a pastebin paste on the 22d has leaked a further 3000 accounts which of 2500 are valid. The leak is claimed to be from a dating website, which one we are un sure of so far but will attempt to find out.

IT fight club, dirty dev data, meatball sandwiches -- nine more tales of brain fail beyond belief
Los Angeles-based Web hosting firm DreamHost reset the FTP and shell access passwords for all of its customers on Friday after detecting unauthorized activity within one of its databases.
Juniper Networks has acquired technology and personnel from BitGravity, the content delivery networking (CDN) subsidiary of Tata Communications.
The middle east cyber war has grown to a constant pace recently with new leaks every day, some times a few leaks a day. The most recent leak which was not so long ago is by "Virus Kiss" and contains 185 valid accounts.


SOPA Backpedaling Has InfoSec Boffins Breathing Easier
... Slain recommends, "At first sign of trouble, you should change your password." John Mello is a freelance technology writer and former special correspondent for Government Security News. SOPA Backpedaling Has InfoSec Boffins Breathing Easier.

and more »
A five-star hotel room high above New York's Central Park sounds like a nice place to spend the night, but if your iPhone doesn't work, it may seem like little more than a gilded cage.
Sony said Monday it has developed new technology for the tiny imaging chips that power cameras in portable devices, which will allow for clearer photographs while using less space and cutting manufacturing costs.
Hacked websites dump 25 by STK, See article here for full information, this is just a statistics and details post.

Hacked websites dump 24 by STK, See article here for full information, this is just a statistics and details post.

Hacked websites dump 23 by STK, See article here for full information, this is just a statistics and details post.

Hacked websites dump 22 by STK, See article here for full information, this is just a statistics and details post.

Hacked websites dump 21 by STK, See article here for full information, this is just a statistics and details post.

Last week we made a report that a hacker going by the name STK had dumped a massive load of accounts from sites that had been hacked. Well on the 21st they uploaded 5 more new dumps which hold a further 45 more data dumps which brings the total of sites hacked and dumped by them within 10days to over 100.

Count us among the critics of SOPA and PIPA, the two ill-conceived bills that were intended to protect American firms against copyright infringement by foreign websites.
Smartphone usage is exploding. That creates challenges for enterprise IT shops that have to adapt to BYOD policies, but competition could bring welcome change to the mobile industry.
British Airways has distributed iPads loaded with its new Enhanced Service Platform app to 2,000 of its senior crew across its route network, giving them updated passenger information just before takeoff and after landing.
If your app has too many places to make choices, too many screens or too much functionality, it's probably not very user-friendly.
Body language is too important to ignore when it comes to public speaking and job interviews, says author Christine Jahnke.
U.S. tech firms are investing more in machines than in people, but IT hiring is still rising, according to a new report by Forrester and a just-released National Science Foundation study.
A ballot scanning device slated for use in the upcoming presidential elections misreads ballots, fails to log critical events and is prone to freezes and sudden lockups, the U.S. Elections Assistance Commission found.
Intel moved to defend its turf -- and possibly its future stability -- by inking deals to supply next-generation Atom chips to smartphone makers Motorola and Lenovo. (Insider, registration required.)
After a number of acquisitions, TD Bank Group turned to social collaboration software to help employees span international borders and work together. Insider (registration required)
The shipping of Oracle's Big Data Appliance earlier this month could pressure major rivals like IBM, Hewlett-Packard and SAP to come up with Hadoop offerings that tightly bundle hardware and software products, analysts say.
Microsoft, Siemens and AT&T are just a few of the corporations discovering the value of veterans' tech training, global perspective and surprising arsenal of soft skills.
Software review and news site websoftdownload.com has been hacked and had a large amount of accounts leaked online. The attack which was carried out by @alsa7r, who we have recently seen doing other attacks such as the Justin Bieber website data base leak.

A literal reading of this survey question leads inevitably to a pair of correct answers: absolutely yes and absolutely not.
Gitorious Remote Command Execution Vulnerability
We got an email to the list today that got me to thinking. Alyce was concerned because of Attacks toward her computer that were being logged by the firewall that is part of the locally installed antivirus suite. Alyce wisely checks the history and logs section on a fairly regular basis but admits to being a novice. Recently Alyce observed that about every ten minutes the same IP was trying different attacks to gain access to the computer. As was stated in the email I know that no one is going to jump through my computer screen, but it is scaring me...
It is scary to know traffic coming toward your system is not friendly. The internet is not a safe, nice place where you can leave your computer open and no one will bother it. However, if you keep your system patched, run antivirus software and have your firewall turned on, you are pretty safe from the externally initiated attacks that are aimed at your system. Most tools are automated and are looking for home systems with vulnerabilities. There are far to many open and unprotected system's out there to go after then trying to compromise one that takes effort.
The bigger worry actually comes from what the user at the keyboard is doing. Currently as I write this, I have to make a decision as to whether I should rebuild my box. I keep it patched and locked down to what I need. I don't run as administrator and I run a firewall and antivirus software. All of this it seems, could not save my computer from one of my kids who got on it to surf around the internet. It appears they have picked up something on their travels as my computer is not running right. Even through all the lectures of not clicking on every link out there just because Google returned it, the message still did not get through. The attackers don't have to break in if you open the door for them.
Trying to teach the user community to be careful of where they go and what they click on seems to be a never ending saga. How many years have we spent trying to educate the end users? I have a couple of family members that unintentionally keep creating their own malware zoo on their computers. No matter how much I try to caution and explain, it obviously isn't getting through. I'm sure many of you have the same problem and similar users. The problem is trying to bridge the gap between those who work in the computer world and those who just use it. So, I would like to compile a simple, best practice list for safe internet travels for the non computer savvy home/work user. If you have any recommendations for best practices/advice for this list, please send them in and I will compile the results. I'll post the results of this in a diary next week.
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
ET, from AlienZ, the hacker group has sent a message they would like the world to read to help understand the attacks they carry out.

Internet Storm Center Infocon Status