Linux Kernel CVE-2013-2896 NULL Pointer Dereference Denial of Service Vulnerability

Cybersecurity should be seen as an occupation, not a profession, report says
For direct examples of such a quandary, InfoSec needs only to look at the existing certification programs, and the criticisms directed that certifications such as the CISSP and C|EH. Once a certification is issued, the previously mentioned barriers ...

Google is now 15 years old, and the company is celebrating by smartening up its bread-and-butter technology, search, and adding new features such as comparisons and filters.
A U.S. surveillance court has given the National Security Agency no limit on the number of U.S. telephone records it collects in the name of fighting terrorism, the NSA director said Thursday.
A new solar cell has broken all previous solar efficiency records by achieving 44.7% efficiency, meaning it converts almost half of all the light hitting it into energy.
OpenStack Keystone Token Revocation Failure Security Bypass Vulnerability
WordPress WP Ultimate Email Marketer Plugin Cross Site Scripting and Security Bypass Vulnerabilities
Sudan has regained access to the Internet after a nearly 24-hour blackout that may have been a government-directed response to violent rioting in the country over lifted fuel subsidies.
BlackBerry, BMC and Dell are three of the latest tech companies to go private after a series of stumbles as public companies. To succeed in the latest chapter of their business lives, these firms need to undo the damage done by going public in the first place. It's easier said than done.
This year's America's Cup will be remembered for Oracle Team USA's jaw-dropping comeback against Emirates New Zealand, but it should also be remembered for the huge role computers have come to play in the competition.
Tizen is for tablets, smartphones and laptops, but the operating system could also be headed to printers, cameras and smart TVs.
Microsoft wants to help Web application framework developers tackle one of their thorniest problems, that of testing their libraries to ensure they work correctly across today's dizzying combination of available browsers and operating systems (OSes).
Analytics and advertising firms tracking Apple's new mobile operating system iOS 7 said today that its uptake has been 14% faster than last year's iOS 6.
With the tap of a button on any of the new Kindle Fire HDX tablets, Amazon promises that a frustrated user can get free tech support and tips from a live agent via video, hopefully within 15 seconds.
After a six-hour journey and four orbits around the Earth, a NASA astronaut and two Russian cosmonauts today joined the team on the International Space Station.
Linux Kernel CVE-2013-2897 Heap Buffer Overflow Vulnerability
Linux Kernel CVE-2013-2893 Heap Buffer Overflow Vulnerability
Monkey HTTP Daemon Multiple Denial of Service Vulnerabilities
Monkey HTTP Daemon 'memcpy()' Function Buffer Overflow Vulnerability
[ISecAuditors Security Advisories] Multiple Reflected Cross-Site Scripting vulnerabilities
ESA-2013-060: EMC VPLEX Information Disclosure Vulnerability
AW: Cisco Security Advisory: Cisco IOS Software Zone-Based Firewall and Content Filtering Vulnerability

Survey: Analytics And Intelligence Being Used But Not Effectively
Dark Reading
SANS offers a myriad of free resources to the InfoSec community including consensus projects, research reports, and newsletters; it also operates the Internet's early warning system--the Internet Storm Center. At the heart of SANS are the many security ...

and more »
Enterprises are increasingly interested in developing apps for Android-based smartphones and tablets, showing how Google';s OS is becoming more accepted, according to a poll. At the same time fewer are willing to spend resources on Microsoft OSes.
A glitch in Google Talk routed instant messages incorrectly on Thursday morning, exposing private text chats to unintended recipients.
The device looks like a small piece of carry-on luggage, but it has a more important job than carrying a toothbrush, deodorant and a couple of pairs of underwear.
PayPal's parent company, eBay, plans to acquire payments startup Braintree for approximately US$800 million in cash to enhance PayPal's mobile capabilities.
Broadcom's latest line of wireless chipsets for cars can keep the kids quiet in the back seat, while allowing mom and dad to make calls in the front.
Apple may be forced to abandon its proprietary 30-pin dock charger if European politicians get their way.
LinuxSecurity.com: Multiple vulnerabilities has been found and corrected in the Linux kernel: Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 [More...]
LinuxSecurity.com: Daniel P. Berrange discovered that incorrect memory handling in the remoteDispatchDomainMemoryStats() function could lead to denial of service. [More...]
LinuxSecurity.com: A vulnerability in TPP might allow a remote attacker to execute arbitrary code.
LinuxSecurity.com: Multiple vulnerabilities have been found in libvirt, allowing remote attackers to execute arbitrary code or cause Denial of Service.
LinuxSecurity.com: Multiple vulnerabilities have been discovered in Monkey HTTP Daemon, the worst of which could result in arbitrary code execution.
[ MDVSA-2013:242 ] kernel
XAMPP 1.8.1 Local Write Access Vulnerability
[SECURITY] [DSA 2764-1] libvirt security update
A glitch in Google Talk routed instant messages incorrectly on Thursday, exposing private text chats to unintended recipients.
Cisco Security Advisory: Cisco IOS Software Internet Key Exchange Memory Leak Vulnerability
Cisco Security Advisory: Cisco IOS Software DHCP Denial of Service Vulnerability
Cisco Security Advisory: Cisco IOS Software Resource Reservation Protocol Interface Queue Wedge Vulnerability
Healthcare reform in the United States focuses mainly on providing coverage to the uninsured, and odds are good that your company offers health insurance to most employees. However, there are still reporting and security requirements you'll need to deal with -- and you'll have to be a vocal leader to make sure these tasks are a high priority.
Beware Gmail users: Inserting images into the body of an email message can get you temporarily banned from your account.
js-yaml CVE-2013-4660 Remote Code Execution Vulnerability
Google Chrome CVE-2013-0835 Geolocation Implementation Denial of Service Vulnerability
Google Chrome CVE-2013-0828 Denial of Service Vulnerability
Google Chrome Extension Process CVE-2013-0831 Unspecified Security Vulnerability
Cisco Security Advisory: Cisco IOS Software Multicast Network Time Protocol Denial of Service Vulnerability
Cisco Security Advisory: Cisco IOS Software Zone-Based Firewall and Content Filtering Vulnerability
Apple could have built a much less expensive iPhone, a move most analysts expected before Sept. 10, but that would have risked destroying intangible advantages the company has accumulated over decades, an expert in component costs said.
Telling IT's story to the board of directors requires a business focus, a strong narrative and even a little humor.
Although the number of malicious browser extensions has significantly increased in the past year many security products fail to offer adequate protection against them, while others are simply not designed to do so, according to a security researcher.
Cisco Security Advisory: Cisco IOS Software Queue Wedge Denial of Service Vulnerability
Cisco Security Advisory: Cisco IOS Software Network Address Translation Vulnerabilities

Personally, my "DNS Monitoring System" is a bunch of croned shell scripts and nagios, in desperate need of an overhaul. While working on a nice (maybe soon published) script to do this, I was wondering: What is everybody else using?

The script is supposed to detect DNS outages and unauthorized changes to my domains. Here are some of the parameters I am monitoring now:

- changes to the zone's serial number
- changes to the NS records (using the TLD's name servers, not mine)
- changes to MX records
- monitoring a couple critical A and AAAA records (like 'www').

In addition, for zones with DNSSEC enabled:

- does the signature expire soon?
- do all key signing keys have valid DS records with the parent zone?
- did the DS record change?

What else are you monitoring?  What scripts / tools do you use to accomplish this?


Johannes B. Ullrich, Ph.D.
SANS Technology Institute

(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Gen. Keith Alexander, head of the embattled National Security Agency, says he is willing to share cyberattack information with the private sector -- an offer seen as a Trojan horse by at least one expert.
Researchers at Stanford University have demonstrated the first functional computer built using only carbon nanotube transistors, according to an article published Wednesday on the cover of scientific journal Nature.
A group of researchers have devised an algorithm they say could help advertising networks better detect fraudulent clicks.
A bipartisan group of four U.S. lawmakers has introduced legislation that will prohibit bulk collection of phone records of Americans.
Beware Gmail users: Inserting images into the body of an email message can get you temporarily banned from your account.
He may have angered his customers in the process, but Larry Ellison's Oracle Team USA completed a stunning comeback on Wednesday to snatch the America's Cup sailing trophy from New Zealand in the last race of the competition.
While Oracle CEO Larry Ellison focuses his attention on the America';s Cup sailing race, Oracle is rushing to keep up in another race, the one to get its Java SE in the cloud.
The information superhighway is not for everyone. Fifteen percent of adults still don't use the Internet, primarily because it's not relevant to them or it's too difficult to use, a recent Pew survey said.
The creation of a pan-European patent system will help spread abusive patent litigation to Europe and could lead to E.U.-wide sales bans on products, leading tech vendors have claimed.
AMD announced theA Radeon R7 and R9 series of "Hawaii" graphics cards and cores on Wednesday, an attempt to storm the pinnacle of performance PC graphics.
A hacking group that targeted Japan's parliament in 2011 is believed to have conducted nimble data thefts against organizations mainly in South Korea and Japan, including defense contractors, over the past two years.
Cisco IOS IPv6 Virtual Fragmentation Reassembly Remote Denial of Service Vulnerability

Posted by InfoSec News on Sep 26


By Brittany Ballenstedt
September 25, 2013

With recent research highlighting compliance burdens as a top concern
among IT workers, there’s little surprise in a new report that found
federal cybersecurity professionals are putting little faith in compliance
measures designed to improve information security and protect data.

A survey...

Posted by InfoSec News on Sep 26


By Steve Ragan
Staff Writer
CSO Online
September 25, 2013

Kaspersky Lab, during a presentation at a security summit produced by
Billington CyberSecurity, unveiled the existence of a small group of
criminal hackers for hire, which began operations in 2011 and have
expanded in scope and size over the last few years.

Calling the campaign Icefog,...

Posted by InfoSec News on Sep 26


By Danny Sullivan
September 25, 2013

You probably didn't notice, but this week, your searching activity on
Google got a little safer from prying eyes. When you go to Google, it
likely will transfer you automatically to its "encrypted" service, one
designed to prevent potential "eavesdropping" on your...

Posted by InfoSec News on Sep 26


By Phil Muncaster
The Register
26th September 2013

Kaspersky Lab has uncovered a new APT campaign aimed at pilfering secrets
from governments and supply chain industrial, military, media and
technology companies in Japan and South Korea.

Icefog features many of the key attributes of targeted attacks, including
the spear phishing email lure to gain a foothold...

Posted by InfoSec News on Sep 26


By Kelly Jackson Higgins
Dark Reading
September 23, 2013

Some 30,000 or so hard drives were scrapped and replaced with new ones
last year on Saudi Aramco's internal corporate network after a massive
cyberattack destroyed data on the oil and natural gas company's Windows
machines. While the massive attack didn't directly affect Saudi...
Internet Storm Center Infocon Status