Hackin9

InfoSec News

Posted by InfoSec News on Sep 30

http://freebeacon.com/white-house-hack-attack/

By Bill Gertz
Washington Free Beacon
September 30, 2012

Hackers linked to China’s government broke into one of the U.S.
government’s most sensitive computer networks, breaching a system used
by the White House Military Office for nuclear commands, according to
defense and intelligence officials familiar with the incident.

One official said the cyber breach was one of Beijing’s most brazen...
 

Posted by InfoSec News on Sep 30

http://www.nytimes.com/2012/09/27/us/us-officials-opening-up-on-cyberwarfare.html

By SCOTT SHANE
The New York Times
September 26, 2012

WASHINGTON -- For years, even as the United States carried out
sophisticated cyberattacks on Iran’s nuclear program and the Pentagon
created a Cyber Command, officials have been hesitant to discuss
American offensive cyberwarfare programs openly. Since June, in fact,
F.B.I. agents have been investigating...
 

Posted by InfoSec News on Sep 30

http://www.wired.com/threatlevel/2012/09/adobe-digital-cert-hacked/

By Kim Zetter
Threat Level
Wired.com
09.27.12

The ongoing security saga involving digital certificates got a new and
disturbing wrinkle on Thursday when software giant Adobe announced that
attackers breached its code-signing system and used it to sign their
malware with a valid digital certificate from Adobe.

Adobe said the attackers signed at least two malicious utility...
 

Posted by InfoSec News on Sep 30

http://www.darkreading.com/threat-intelligence/167901121/security/vulnerabilities/240008081/profiling-the-cybercriminal-and-the-cyberspy.html

By Kelly Jackson Higgins
Dark Reading
Sept 27, 2012

First in an occasional series on knowing the attacker.

Chinese hackers operate more as big-box, thrifty enterprises with
bargain-basement mini-botnets and commodity malware. Eastern European
hackers run higher-end operations with bulletproof hosting...
 

Posted by InfoSec News on Sep 30

http://www2.canada.com/nanaimodailynews/news/story.html?id=7320810

By Jordan Press
Postmedia News
September 29, 2012

OTTAWA - When a federal cyber-security expert gave his colleagues a
rundown of the hacktivist collective Anonymous, his coworkers were
impressed with his expertise - so impressed they jokingly became
suspicious.

"Seems like Ken is awfully knowledgeable about the inner workings of
Anon.," reads a Feb. 3 email to Luc...
 
As expected, Oracle CEO Larry Ellison on Sunday unveiled a souped-up version of its Exadata database machine that will allow customers to run all of their databases in-memory, providing what Ellison termed blazing performance.
 
Oracle is planning to roll out a new IaaS (infrastructure as a service) offering that will compete directly with Amazon Web Services, along with a service called Oracle Public Cloud that runs inside customers' facilities, CEO Larry Ellison announced Sunday during a keynote address at the OpenWorld conference in San Francisco.
 
(c) SANS Internet Storm Center. http://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
EMSL discovered how un-unified it seemed to its customers when a UC project that forwarded calls to employees' mobile devices proved the secret to winning back business.
 

To catch a hacker, it pays to think like a hacker
Washington Post
The InfoSec Institute, an Elmwood Park, Ill.-based company, has been offering workshops in hacking at its Dulles facility for 14 years. Demand has been up in recent years, as high-profile overseas hackers become more aggressive, said Jack Koziol ...

 
Internet Storm Center Infocon Status