Hackin9
Judging from the number of people poring over their smartphones on the sidewalk, in their cars and in public places, mobile seems to have stolen our attention away from the wired Internet and traditional TV.
 
Looking at historical trends and performance benchmarks, a team of researchers in Spain have concluded that smartphone chips could one day replace the more expensive and power-hungry x86 processors used in most of the world's top supercomputers.
 
[SECURITY] [DSA 2675-2] libxvmc regression update
 
Google has reportedly launched an expansive effort to bring wireless networks and affordable computing to emerging markets such as sub-Saharan Africa and Southeast Asia, moves that could bring the Internet to a further billion people.
 

Google is upgrading the digital certificates used to secure its Gmail, Calendar, and Web search services. Beginning on August 1, the company will start upgrading the RSA keys used to encrypt Web traffic and authenticate to 2048-bits, twice as many as are used now.

The rollout affects the transport layer security (TLS) certificates that underpin HTTPS connections to Google properties. Sometimes involving the secure sockets layer (SSL) protocol, the technologies prevent attackers from reading the contents of traffic passing between end users and Google. They also provide a cryptographic assurance that servers claiming to be Google.com are in fact operated by Google, as opposed to being clones created by attackers exploiting age-old weaknesses in the way the Internet routes traffic.

There are good reasons for Google to upgrade the strength of these crucial digital keys. The weaker the key strength of an RSA key pair, the easier it is for anyone to mathematically derive the "private key." Such attacks work by taking the certificate's "public key" that's published on the website and factoring it to derive the two prime numbers that make up the private key. Once the private key for a Google certificate has been factored, the attacker can impersonate an HTTPS-protected Google server and provide the same indications of cryptographic security as the legitimate service. Someone who was able to derive the secret primes to Google's private key, for instance, would be able to create convincing attacks that would fool many browsers and e-mail clients.

Read 5 remaining paragraphs | Comments

 
[SECURITY] [DSA 2692-1] libxxf86vm security update
 
[SECURITY] [DSA 2691-1] libxinerama security update
 
[SECURITY] [DSA 2690-1] libxxf86dga security update
 

We have seen today a big rise of incoming packets of what appears to be a SQL Slammer attacks. Some of the detected packets are:

Suspect packet #1

Malicious packet 2

Malicious packet 3

We have seen a sustained rate in many nodes  inside AS13489 and AS27989 nodes of  about 25 Mbps. Some very old SQL servers have been compromised, but the Internet speed has been compromised and navigation it's very slow.

Have you seen something like this today on your AS? Let us know!

Manuel Humberto Santander Peláez
SANS Internet Storm Center - Handler
Twitter:@manuelsantander
Web:http://manuel.santander.name
e-mail: msantand at isc dot sans dot org

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
St. Louis-based grocery chain Schnuck Markets has claimed that a potential class action lawsuit filed against it in an Illinois state court over a recent data breach really belongs in federal court because of the case's scope and damages involved
 
[SECURITY] [DSA 2689-1] libxtst security update
 
Premier 100 IT Leader Sonya Christian also answers questions on career paths.
 
Reprogramming the identification number of a cellphone could be punishable with a prison sentence of up to five years under the terms of a proposed law announced Friday.
 
With an update to its namesake configuration tool, Puppet Labs has introduced a programming language designed to give administrators more flexibility in scripting their deployment routines.
 
[SECURITY] [DSA 2688-1] libxres security update
 
[SECURITY] [DSA 2687-1] libfs security update
 
[SECURITY] [DSA 2686-1] libxcb security update
 
Cisco Wireless LAN Controller CVE-2013-1235 Remote Denial of Service Vulnerability
 
Cisco WebEx Social CVE-2013-1245 Multiple Security Bypass Vulnerabilities
 
Cisco Unified Communications Manager CVE-2013-1240 Local Information Disclosure Vulnerability
 
The U.S. Federal Trade Commission has reportedly launched an investigation into Google's display ad business amid complaints from rivals that the company is abusing its power in how it sells online-graphical and video ads.
 
The amount of cybercriminal activity associated with the Zeus family of financial Trojan programs has increased during the past few months, according to security researchers from antivirus vendor Trend Micro.
 
Oracle and managed services provider ServiceKey have come to a proposed settlement of an intellectual-property lawsuit Oracle filed against the company last year.
 
Starting in August, Google will issue new certificates for its services. The company especially plans to scrap certificates with old 1024-bit RSA keys and replace them with 2048-bit ones
    


 
[security bulletin] HPSBUX02881 SSRT101189 rev.1 - HP-UX Directory Server, Remote Disclosure of Information
 
[SECURITY] [DSA 2683-1] libxi security update
 
[SECURITY] [DSA 2682-1] libxext security update
 
[SECURITY] [DSA 2681-1] libxcursor security update
 
Apple's lowest-priced MacBook Air was out of stock on Amazon.com as of Friday, hinting that rumors of a refresh in two weeks are on target.
 
Nokia is targeting HTC's latest slate of smartphones, including the HTC One, with new legal action in the U.S. that demands the Taiwanese company cease the alleged patent infringement.
 
Google is reportedly bidding for crowd-sourced map app provider Waze, igniting a possible bidding war with Facebook.
 
For the 8,000 or so people who signed up this spring to be Glass Explorers, your wait for the computerized eyeglasses may soon be over.
 
Linux Kernel CVE-2013-3224 Local Information Disclosure Vulnerability
 
Linux Kernel CVE-2013-3222 Local Information Disclosure Vulnerability
 
On The H's radar over the last seven days: how to store and protect SSH keys, Wireshark 1.8.7 and 1.6.15, game engine vulnerabilities, Volatility plugins, irrevocable SSL certificates, and historical parallels to the internet
    


 
Reporters investigating a leak of personal information from two phone companies found themselves facing a cease-and-desist letter from the companies who accused them of hacking their systems, a claim the news service denies
    


 
An introduction to analysing the Blackberry Z10 and the new Blackberry OS
    


 
Dovecot 'APPEND' Parameter Denial of Service Vulnerability
 
SAP abruptly reorganized its development strategy, with SuccessFactors CEO and cloud strategy chief Lars Dalgaard leaving the company and executive board member Vishal Sikka tapped to lead a single software development unit.
 
It's taken decades to develop a hosted desktop that is inexpensive, fast, flexible, scalable and usable. Will an Nvidia-Citrix partnership finally buck the trend?
 
Security researchers from antivirus vendor ESET discovered a piece of cyberespionage malware targeting Tibetan activists that uses unusual techniques to evade detection and achieve persistency on infected systems.
 
Mozilla Firefox and Thunderbird CVE-2013-1677 Out of Bounds Memory Corruption Vulnerability
 

BankInfoSecurity.com

Climbing the InfoSec Career Ladder
BankInfoSecurity.com
Breaking into the information security field - a male-dominated profession - is a challenge for women. Lisa Xu, CEO of NopSec, identifies the hurdles she's had to overcome and offers strategies for women to grow in their careers. "One of the challenges ...

and more »
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Several security issues were fixed in the kernel.
 
LinuxSecurity.com: Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input [More...]
 
LinuxSecurity.com: Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input [More...]
 
LinuxSecurity.com: Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input [More...]
 
LinuxSecurity.com: Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input [More...]
 
LinuxSecurity.com: Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input [More...]
 
LinuxSecurity.com: Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input [More...]
 
LinuxSecurity.com: Ilja van Sprundel of IOActive discovered several security issues in multiple components of the X.org graphics stack and the related libraries: Various integer overflows, sign handling errors in integer conversions, buffer overflows, memory corruption and missing input [More...]
 

NGFW Boom Increasing Burden on Infosec Workers
Channelnomics
NGFW Boom Increasing Burden on Infosec Workers. May 24th, 2013 | Author: Doug Woodburn. Twitter · Facebook · Linkedin · Digg · Email. Editor's note: As part of our special editorial partnership, Channelnomics is publishing this recent article from CRN ...

and more »
 
Oracle Java SE CVE-2013-2439 Remote Java Runtime Environment Vulnerability
 
Sony and Lego are working together on creating a new generation of products that bridge the gap between toys and video games.
 
The U.S. International Trade Commission has turned down a request for a ban on Microsoft's Xbox after finding that the gaming device did not infringe a patent owned by Google's Motorola Mobility unit.
 
Google plans to upgrade the security of its SSL certificates, an important component of secure communications.
 
Users in the U.K. and France will have to wait a bit longer to get their hands on the HTC First. The first smartphone to come preinstalled with Facebook Home has been delayed in those countries while Facebook updates the software to address some negative user feedback.
 
Like the tablet market, Google Glass may currently be viewed as a consumer product but it will soon be seen on the faces of IT and mobile employees.
 
With the full Senate starting its debate on a comprehensive immigration bill, Republican lawmakers in the House have released a plan of their own, complete with a slick website.
 
Less than a month after the smartphone's commercial launch, Dan Rosenberg found a design flaw in Samsung's secured bootloader that allows arbitrary kernels to be booted even on a locked phone
    


 

Posted by InfoSec News on May 24

http://www.theregister.co.uk/2013/05/23/saps_anon_hack/

By John Leyden
The Register
23rd May 2013

The identities of more than 15,000 South Africans who reported crimes or
provided tip-offs to the police have been exposed following an attack on
a SAPS (South African Police Service) website.

The names and personal details of whistleblowers and crime victims were
lifted from www.saps.gov.za and uploaded to a bullet-proof hosting site.

Names,...
 

Posted by InfoSec News on May 24

http://www.timesofisrael.com/anonymous-a-little-less-so-thanks-to-israeli-hackers/

By DAVID SHAMAH
The Times of Israel
May 24, 2013

After April’s largely unsuccessful campaign by Anonymous and Arab
hackers, #OpIsrael, to “remove Israel from the Internet,” a second round
of hack attacks against Israeli sites, “OpIsrael Reloaded,” is planned
for Saturday. The followup campaign seeks to demonstrate that Israel did
indeed sustain a...
 

Posted by InfoSec News on May 24

http://www.washingtonpost.com/blogs/worldviews/wp/2013/05/23/should-the-u-s-allow-companies-to-hack-back-against-foreign-cyber-spies/

By Max Fisher
The Washington Post
May 23, 2013

Foreign hackers do remarkable damage by breaking into American
companies, stealing intellectual property worth enormous amounts of
money, swiping proprietary secrets for military technology or other uses
and, in the case of some recent Chinese attacks, even...
 

Posted by InfoSec News on May 24

http://www.zdnet.com/us-government-has-no-idea-how-to-wage-cyberwar-ranum-7000015840/

By Michael Lee
ZDNet.com
May 24, 2013

Military strategies and tactics that may work in the physical world do
not have a place in guiding "cyberwarfare", and those that attempt to
use them demonstrate a key lack of understanding, according to Tenable
Security's chief of security Marcus Ranum.

Ranum, who spoke at AusCERT 2013 at the Gold...
 

Posted by InfoSec News on May 24

http://online.wsj.com/article/SB10001424127887323336104578501601108021968.html

By SIOBHAN GORMAN and DANNY YADRON
The Wall Street Journal
May 23, 2013

WASHINGTON -- Iranian-backed hackers have escalated a campaign of
cyberassaults against U.S. corporations by launching infiltration and
surveillance missions against the computer networks running energy
companies, according to current and former U.S. officials.

In the latest operations, the...
 
VideoJS JS Callback Cross Site Scripting Vulnerability
 
Yahoo has acquired PlayerScale, a startup developer of infrastructure software for cross-platform gaming, adding to its string of recent acquisitions.
 
Google plans to upgrade the security of its SSL (Secure Sockets Layer) certificates, an important component of secure communications.
 
Vanilla Forums AboutMe Plugin HTML Injection Vulnerabilities
 
Vanilla Forums LatestComment Plugin Discussion Title HTML Injection Vulnerability
 
activeCollab Chat Module Arbitrary PHP Code Execution Vulnerability
 
Resource Hacker Heap Based Buffer Overflow Vulnerability
 
Internet Storm Center Infocon Status