InfoSec News

AT&T announced service throttling for the heaviest users of its unlimited mobile data plans on Friday, saying the only way to truly solve its bandwidth crunch is for regulators to approve its merger with T-Mobile USA.
Microsoft has been ordered to pay $70 million to networking vendor Alcatel-Lucent in a years-old patent dispute that at one time could have cost Microsoft $1.5 billion.
As promised, members of the Anonymous hacking movement have released hundreds of megabytes of documents that they say were stolen from government security contractor ManTech.
A group of telecom carriers and trade groups proposes broadband subsidies to replace telephone service subsidies.
To accommodate the surging data volumes, Facebook has moved its Hadoop cluster to a new and bigger data center.
Google+, which on Thursday hit its one-month birthday, is already a major social networking player, analysts say.
ZDI-11-246: Sybase Adaptive Server Backup and Monitor Server NULL Write Remote Code Execution Vulnerability
AppSec USA 2011 Open Source Showcase Call for Demos
Users of Toshiba's latest Thrive Tablet early next week will receive a software update to resolve a bug that causes the tablet to not wake up from sleep mode.
Facebook's move today to follow Google, Mozilla and Hewlett-Packard in offering bounties for bugs got a unanimous thumbs up from security researchers.
cgcraft llc (info.php?id) (news_item.php?id) Remote SQL injection Vulnerability
Vegetav (news_item.php?id) Remote SQL injection Vulnerability
ZDI-11-245: Sybase Adaptive Server Backup and Monitor Server Translation Array Remote Code Execution Vulnerability
A federal judge has put the case against a man charged with hacking AT&T's website on hold to allow plea negotiations to continue, court documents show.
Facebook is going to pay hackers to find problems with its website -- just so long as they report them to Facebook's security team first.
Google wants the judge overseeing the lawsuit Oracle filed over the Android mobile OS to redact a potentially damaging e-mail written by a Google employee, saying it was supposed to remain confidential and that Oracle wrongly revealed it.

The mobility and wireless tracks were packed at the Gartner Catalyst Conference 2011 this week in San Diego, underscoring the pressure enterprises are under to accommodate mobility demands. in fact, the standing-room only sessions on Wednesday drew grumbles from some attendees who wondered why Gartner didn’t figure that the hot topic would draw crowds; other sessions in much bigger rooms drew far fewer attendees.

One of the sessions I managed to get a seat to provided an overview of mobile device management technology. With more new smartphones and tablets coming out all the time, the age of the single mobile OS — BlackBerry — is over, said Michael Disabato, a Gartner research vice president. These devices, which employees are bringing into the enterprise, lack management capabilities; mobile device management technology provides a way to control and secure diverse devices, he said.

MDM products can do over-the-air provisioning and provide “virtual containers” to separate personal and professional data, he said. If the device is compromised or lost, a company has the ability to delete the corporate data from it.

Disabato said MDM products are available in client-less and client-based implementations, with the latter providing the most flexibility and more granular management capabilities. He also noted that MDM vendors have created enterprise application stores that bypass the iTunes Store and Android Market for application distribution.

He recommended that companies determine which MDM features they really need by conducting a detailed risk analysis. “There are a lot more on these things [MDM products] than you really need,” he said. IT pros also should understand how the MDM agent will impact the end user, he added.

Add to digg Add to StumbleUpon Add to Add to Google
The company is making billions, and its real assets are all of us users that it's constantly abusing.
Samba 'client/mount.cifs.c' Local Denial of Service Vulnerability
When Lion first appeared in the Apple App store most of probably blindly click YESYES YESlike good little Apple zombies (me included!)... After some updates and fiddling withApplications to get them working I started to take a hard look at what was now leaving my devices. A new series of packets on port TCP 5223 was leaving outbound from my network stack and thanks to Little Snitch [1] I was in control of it.

On Apple's support site [2] You will find a list of well know TCP/UDPports used by Apple operating systems and according to their site:

XMPP over SSL, Apple Push Notification Service

MobileMe (Automatic sync notifications) (see note 9), APNs, FaceTime, Game Center

Check out my first Video Diary of taking a look at these packets.

Richard Porter
--- ISC Handler on Duty

[2] (c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License.
Cisco Security Advisory: Cisco TelePresence Recording Server Default Credentials for Root Account Vulnerability

Early Look: New Controls NIST Will Offer (blog)
"This has been one of the most exciting projects I've worked on since the Joint Task Force started," Ross told me (see Ron Ross on NIST's New Privacy Controls), referring to the 2-year-old group of civilian-, defense- and intelligence-agency infosec ...

and more »
The U.S. debt reduction deadlock in Congress is already taking a toll on how much companies are spending on property, buildings and equipment, including computer hardware and software, according to a new survey by ChangeWave Research.
PacSec CFP note, deadline Aug 3; conf Nov 9/10 Tokyo
Sitecore CMS 6.4 Open URL Redirect Vulnerability
[SECURITY] [DSA 2288-1] libsndfile security update
July 29, 2011: G+ gets a minus, Apple puts old technology behind us
CA Technologies is purchasing WatchMouse, a maker of SaaS-based tools for monitoring mobile and on-demand applications.
Today is the perfect day to show your appreciation for the unsung heroes who keep corporate desktops, servers and networks running. It's System Administrator Appreciation Day, an annual event thought up by IT pro Ted Kekatos.
Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability
Microsoft Thursday released an updated version of Communicator for the Mac that works with Apple's Lion operating system.
Apple and Samsung both sold more smartphones than Nokia in the second quarter, although Nokia still sold most phones overall, market researcher Strategy Analytics said Friday.
Dell launched its newest 10-inch Android tablet exclusively in China on Friday.
Google said Thursday that it has rolled out its two-step authentication sign-in system to 40 languages across over 150 countries.
Get the most out of Google's new social network Google+ with these 40 awesome tips and tricks.
Unlike with the debt limit debate, there is bipartisan interest in Congress in reforming high-skill immigration. New legislation is on its way, and heres what to watch for.
The growing need for companies to manage surging volumes of structured and unstructured data is continuing to propel enterprise use of open-source Apache Hadoop software.
ManageEngine ServiceDesk Plus Multiple HTML Injection Vulnerabilities

Posted by InfoSec News on Jul 29

Forwarded from: Dragos Ruiu <dr (at)>

TOKYO, Japan -- To address the increasing importance of information security in
Japan, the best known figures in the international security industry will get
together with leading Japanese researchers to share best practices and
technology. The most significant new discoveries about computer network attacks
will be presented at the ninth annual PacSec conference to be discussed.

The PacSec...

Posted by InfoSec News on Jul 29

By Adam Penenberg
Fast Company
July 27, 2011

A crusader from has found that an alarmingly high number
of books written by computer security experts are nearly 100% copied
from other sources. What does that say about the industry?

Borrowing code is standard operating procedure for those who work with
software. All modern computer program languages use what is known as...

Posted by InfoSec News on Jul 29


Online bookmaker warned punters on Monday that their personal
data may have been exposed during a security breach – a security breach
that may have taken place in December of 2009.

Amazingly the gambling site has only just alerted customers to the
potential leak some 19 months after the original incident, but
maintain that they...

Posted by InfoSec News on Jul 29

By John Leyden
The Register
28th July 2011

Personal information on as many as 35 million users of a South Korean
social network site may have been exposed as the result of what has been
described as the country's biggest ever hack attack.

Local authorities were quick to blame hack attacks against the Cyworld
social networking website and the Nate web portal – both of...

Posted by InfoSec News on Jul 29

By Mathew J. Schwartz
July 28, 2011

Between April and June 2011, EMC spent $66 million dealing with the
fallout from a March cyber attack against its systems, which resulted in
the compromise of information relating to the SecurID two-factor
authentication sold by EMC's security division, RSA.

That clean-up figure was disclosed last week during an EMC...

Posted by InfoSec News on Jul 29


The Secunia Weekly Advisory Summary
2011-07-21 - 2011-07-28

This week: 105 advisories

Table of Contents:

1.....................................................Word From Secunia...

Posted by InfoSec News on Jul 29

By Kelly Jackson Higgins
Dark Reading
July 28, 2011

New data released today reveals how enterprises and government agencies
are failing to adopt best practices for security: nearly all of the 420
organizations that participated in the survey were at some risk in
security or compliance.

The Echelon...
Apple Safari WebKit JavaScript Regular Expression Handling Buffer Overflow Vulnerability
ioQuake3 Engine Multiple Remote Code Execution Vulnerabilities
Chris Mohan

--- Internet Storm Center Handler on Duty (c) SANS Internet Storm Center. Creative Commons Attribution-Noncommercial 3.0 United States License.

Big five infosec software vendors lose ground
SC Magazine Australia
Analyst Ruggero Contu said the infosec software industry remained fragmented, and small innovative players continued to make wins. “The information security market is in a continuous state of consolidation, but even fairly intense merger and ...

and more »
Internet Storm Center Infocon Status