Friday, July 14, 2006

PowerPoint zero-day / Phishers beat bank tokens / Networking helps hackers

New PowerPoint hole used in cyber attacks
A previously unknown vulnerability in Microsoft's PowerPoint has been used in a an email attack, security firm Symantec reports. - CNET News.com

IT security rides offshore outsourcing wave
A survey shows that the offshore outsourcing of IT security functions in U.S. corporations have increased significantly over the last year. - CNET News.com

Microsoft confirms PowerPoint zero-day attack
Microsoft confirms reports from security firm Symantec about a zero-day exploit in PowerPoint that was used in an email attack. - eWEEK

Most CFOs harbor security concerns
Most Chief Financial Officers rank IT security as their top concern, as they fear the humiliation of data theft incidents, survey shows. - eWEEK

Markle suggests ways info sharing, security can coexist
A U.S. report suggests that it is possible to increase information sharing between agencies and still protect civil liberties. - Federal Computer Week

OMB tightens IT security incident rules
The U.S. Office of Management and Budget now requires federal agencies to report incidents involving data theft much sooner than before. - Government Computer News

Cisco discloses critical IPS vulnerability
Cisco having already disclosed two other vulnerabilities this week now adds a critical flaw in its Intrusion Prevention System. - InformationWeek

State Department releases detail of computer system attacks
According to the U.S. State Department no sensitive information was compromised during the recent attacks against its computer systems. - InformationWeek

Phishers try to best banks' authentication

Security experts have detected about 35 websites set up to circumvent the two-factor authentication with tokens used by some banks. - InfoWorld

Ohio University CIO resigns in wake of data breaches
The CIO of Ohio University has resigned after a data breach that has compromised personal information of tens of thousands students and alumni. - Computerworld

DHS finds RFID seriously flawed for border security
The U.S. Department of Homeland Security has found serious flaws in the RFID system used in the US-VISIT system that could result in unauthorized access to a government database. - InternetWeek.com

Cybercrooks turn to multipronged hacks
Apple may not be ready for the changes underway in computer attacks, where vulnerable software of all kinds and not just Windows is become a target. - NewsFactor

Man-in-the-middle attack on Citibank users concerns experts
The use of man-in-the-middle tactics in a recent phishing attack against Citibank raises concerns among security experts. - SC Magazine UK/US

Trojans account for over half of all malware
Antivirus firma Panda Labs reports that more than 54 percent of all new malware in the last quarter was trojans. - SC Magazine UK/US

Networking sites could help hackers
Personal information put on professional social networking sites could provide a hacker with enough for social engineering attacks. - The Register

Peer loses cybercrime fight
Attempts have failed to amend a new british law to prevent IT professionals from also being hit with a ban on releasing tools that can be used for hacking. - ZDNet UK

Thursday, July 13, 2006

Israeli websites attacked / Excel still vulnerable / Two-factor under attack

IBM sued over hacked email server
A Washington D.C. lawfirm has sued IBM claiming that an IBM employed was behind an attack on the lawfirm's email server. - CIO Magazine

Veterans Affairs faulted in data theft
A report from the inspector general points to a series of missteps within the Department of Veterans Affairs that led to the theft of data. - CNET News.com

Adobe fixes PDF Reader flaws
Adobe has patched two security flaws in its Adobe Acrobat and Reader software. - CNET News.com

"Putin death" trojan unleashed
A new trojan spreading through email attempts to lure users with a fake news story about the death of russian president Vladimir Putin. - Computer Weekly

Seven keys for complete message security
It is not easy to implement encryption of all messages in a corporation, without doing some forethought. - Computerworld

Microsoft research automates hunt for search engine spam
Microsoft is readying its Strider software tool to help combat spamming of search engines and weblogs. - eWEEK

Critical Excel flaws remain unpatched
Security researchers warn that even after Microsofts patches for its Office suite earlier this week, at least two critical flaws remain unpatched in Excel. - eWEEK

A year later, still no DHS cybersecurity chief
The position as cybersecurity chief at the U.S. Department of Homeland Security is still vacant after a year. - Federal Computer Week

Army close to full PKI implementation

The U.S. Army is close to completing its implementation of a public key encryption infrastructure. - Government Computer News

State investigating cyberintrusion
The U.S. State Department is investigating what could turn out to have been a major attack against its network. - Government Computer News

State Department hack escalates federal data insecurity

The attack against the U.S. State Department is worse than the theft of a laptop, Gartner analyst warns. - InformationWeek

Voice and VoIP phishing scams on the rise
VoIP gives the scammers the anonymity they need to carry out their operations, security experts warn. - InformationWeek

Researcher to show code for 'wormable' Windows flaw
The developer of the Metasploit hacking tool, HD Moore, claims to be just weeks away from demonstrating code that exploits a vulnerability in Windows that Microsoft fixed this week. - InfoWorld

Super firewall aims to stop DDoS
European researchers are working on a firewall technology that could stop distributed denial of service attacks from causing damage. - InfoWorld

Cisco details new VoIP, router vulnerabilities
Network equipment giant Cisco has disclosed a number of vulnerabilities in CallManager and the web-based interface for its routers. - InternetWeek.com

Spam ratios on the rise
The ratio of spam to legitimate email is rising, warns security firm MessageLabs. - NewsFactor

Israeli websites attacked
The fighting between Israel and Lebanon has apparently been taken into cyberspace leading to attacks against Israeli websites. - Red Herring

CSI/FBI: Security losses down
The FBI and the Cybersecurity Institute reports that the number of attacks and the losses from these attacks are down from last year. - TechWeb

Debian organisation server hacked
The Debian Linux organisation's gluck server has been hacked resulting in a shut down of multiple services used by developers. - The Inquirer

Phishers rip into two-factor authentication
A recent phishing attack using a man-in-the-middle strategy shows that two-factor authentication is no silver bullet against phishing. - The Register

Phishers crack two-factor authentication
Security researchers warns about an attack against Citibank's two-factor authentication system using man-in-the-middle tactics. - Vnunet.com

Mobiles set for key role in card authentication
Cellular phones are well suited to be used to authenticate financial transactions. - Vnunet.com

New worm targets virus researchers
A new piece of malware is targetting a popular reverse engineering tool used by security and virus researchers. - Vnunet.com

Wednesday, July 12, 2006

Microsoft plugs wormhole / State Dept. hacked / Lax policy blamed in VA loss

Hacker to fight US extradiction
Gary McKinnon is prepared to take his case all the way to the European Court of Human Rights if necessary to fight the UK decision to extradite him to the US. - BBC News

Two-factor too scarce at consumer banks
Far too many online banking solutions targeted at consumers do not use adequate security measures. - CIO Magazine

Microsoft plugs wormhole in Windows
Microsoft has issued security patches for 18 vulnerabilities in Windows and Office, some of which could be exploited by a network worm. - CNET News.com

State department investigating computer anomalies

The U.S. State Department is investigating an anomalie that has been reported as a large scale break-in on its computer network. - Reuters

Hackers target State Department computers
Hackers may have breached security at U.S. State Department's main office and regional offices, according to reports. - AP/CNN.com

Patchwork policy can't protect data: VA IG
A security policy that was fragmented across different departments is partly to blame for the risk of compromising personal data that hit the Veterans Affairs Dept. last month. - Government Computer News

Defense: Government was out to get UBS
The defense for the former UBS system administrator, who is on trial for planting a logic bomb on the company's systems, said that his client has been framed by the government. - InformationWeek

High prison time for Shadowcrew culprit
Another member of the ID theft gang Shadowcrew has been sentenced to 90 months in prison. - Internetnews.com

Security experts Google for malicious sites
Google has begun indexing binary files on websites, and security experts have figured out how to use this feature to find websites containing malicious code. - InternetWeek.com

Investigators faults VA, employee for data loss
The employee, who took the laptop containing personal information home, showed poor judgement, investigators say. His supervisors are also to blame for lax policies. - AP/MSNBC

Mobile users face knotty security issues

The recent incidents of data loss from lost mobile devices may indicate that network executives are using trial and error to find the best security for mobile users. - Network World Fusion

Gordon Brown sets up ID fraud taskforce
A new U.K. taskforce is being set up to explore future identity management systems and their possible use in private and public sectors. - Silicon.com

Emails probed in 'Cash for honours' swoop
Forensic software is now being used to dig out deleted emails in the ongoing investigation about loans to members of the Labour Party in the U.K. - Silicon.com

Anti-Cyber Terrorism spending to reach $6.3bn
Federal and corporate spending on measures against cyber terrorism will climb to $6.3 billion in 2011, market research firm estimates. - TechWeb

Outsourced data must be protected, says privacy chief
Even if a data breach happens at a third party facility as part of an outsourcing deal, the company that has outsourced the task is still responsible. - The Register

Small businesses risk data loss
Many one person business do not backup vital financial or other business related information, even though this information resides on a single computer. - Vnunet.com

Malware writers turn to zero-hour viruses
Virus writers are switching from large scale attacks to smaller attacks using zero-hour exploits to avoid detection. - Vnunet.com

Hacker spawns a french Watergate

A hacking into a bank in Luxembourg is becoming a central piece of a large scandal in France, as the bank records were apparently modified to implicate politicians, celebrities. - Wired News

Tuesday, July 11, 2006

Support ends for Windows 98 / Vishing joins phishing / Boffins tackle DoS attacks


Microsoft shuts down Windows 98

Microsoft is now ending its technical support for Windows 98, Windows 98 SE, and Windows ME. The software is still being used by an estimated 70 million people. See also: Windows 98 offers history lessons - BBC News

Critical flaws found in Excel, Flash Player
The french security response team, FrSIRT, has issued a warning against flaws found in Excel and Macromedia Flash Player. - Computer Weekly

Microsoft to show off Vista at Hack in the Box conference
The asian hacker conference will get an inside look at the new security features of Windows Vista. - Computerworld

Prosecutors: UBS sysadmin believed "he had created the perfect crime"

In closing arguments the prosecution in the case against a former system administrator for UBS, who allegedly planted a logic bomb on the systems, said the man believed he had created the perfect crime. - InformationWeek

Security chiefs talk trends, risks
Three heads of security businesses discuss why it is so hard to secure a laptop against theft. - InfoWorld

Vishing joins phishing as security threat
Security experts warns that internet criminals have picked up VoIP as a new tool to scam people of money or personal information. - Internetnews.com

Zango adware found on MySpace
A developer at adware company Zango, formerly 180solutions, created profiles on MySpace with the intent to persuade users to install the Zango software. - InternetWeek.com

IT security spending to grow significantly
A survey conducted by Accenture indicates that security professionals in U.S., India, and China expect to spend more on security technology than last year. - SC Magazine UK/US

Sophos discovers PoC-virus targeting research tool
Antivirus firm Sophos warns that it has found a proof-of-concept virus that targets reverse engineering tool Interactive Disassembler Pro. - SC Magazine UK/US

Personal info of 100k sailors, Marines posted to public site
Due to a programming error the personal information of 100.000 U.S. Navy personnel ended up on a publicly available website. - SC Magazine UK/US

Rogue dialer crackdown targets network providers
The U.K. governing body Icstis that oversees premium phone services is to provide a strict set of guidelines for network operators to prevent rogue dialers and other scams. - Silicon.com

MSSP Catbird battles pharming menace

The managed security service provider has launched a network to detect pharming attacks against its customers' networks. - CRN

European boffins tackle DoS attacks
A team of european computer scientists and internet service providers have designed a new defense that may prevent broadband connections from being used in denial-of-service attacks. - Vnunet.com

Phishers target Google Gmail users
Security experts warn that phishers are targeting users of Googles Gmail service, luring them with prizes in a fake lottery. - Vnunet.com

Mobile security in poor health
Companies are nervous about losing data from mobile devices which in turn hampers the rollout of mobile devices. - Vnunet.com

Crazy-long hacker sentence upheld
A federal court has upheld a nine years prison sentence over a hacker who tried but failed to steal credit card information using a insecure wireless network at a local hardware store. - Wired News

Monday, July 10, 2006

US Navy probes breach / ISPs to lock out file-sharers / Teens put PCs at risk

McAfee ready to take on Microsoft
Antivirus firm McAfee believes that it will be able to stay ahead and not be threatened by Microsoft entering the antivirus market. - CIO Magazine

FBI plans new net-tapping push
The FBI is trying to pass legislation that will require Internet service providers (ISP) to create hubs for police surveillance and require makers of networking gear to create backdoors. - CNET News.com

Google search finds widespread malicious code
Security firm Websense warns that searches for malicious executables on Google has turned up a large number of results from forums and personal webpages. - Computer Weekly

US Navy probes data security breach
The US Navy is investigating how data containing personal information about 100.000 personnel was stolen and posted to a website recently. - Computer Weekly

Visa, MasterCard to unveil new security rules
Visa and MasterCard will within the next two months unveil new security rules for all organisations that handles credit card data. - Computerworld

ADP gave shareholder data to 'unauthorized party'
Payroll services provider ADP says that the company gave information about shareholders to an unauthorized party that impersonated numerous corporate offices. - Reuters/Computerworld

DOD gets a handle on top-secret content
The U.S. Department of Defense had to develop a new way to share top-secret information between various systems, this case study shows. - eWEEK

IG: U.S. Visist RFID needs better security controls
The U.S. Department of Homeland Security have since New Year issued almost 150.000 I-94 forms to foreign visitors with embedded RFID-tags. The system needs better procetion, inspector general concludes. - Government Computer News

Data brokers draw increased scrutiny
Legislators wants to take a closer look at the fast-growing industry that deals in trading with consumer data. - InformationWeek

Guidelines to enable UK spam data sharing
The University of Cambridge has defined a set of guidelines for exchange of spam information between U.K. Internet service providers to combat spam based on traffic patterns. - InfoWorld

Phishers tap VoIP in new scam
Phishers are using cheap VoIP telephone numbers to practice a new form of phishing, where the user is fooled into giving out sensitive information over the phone. - InfoWorld

InformationWeek Global Security Survey 2006

InformationWeek has conducted its ninth annual security survey. Among the findings is that 48 percent of it-managers say that security is their top challenge. - InternetWeek.com

Retailers fail to pass security test
One year after the deadline for compliance with the Payment Card Industry (PCI) standard, a large number of big merchants still fails to comply. - Network World Fusion

ISPs urged to lock out file-sharers
The british recording industry now urges Internet service providers (ISPs) to lock out alleged file-sharers. - Reuters

Euro teens put PCs at risk of viruses and hacking
A survey by antivirus firm McAfee indicates that european teenagers ignores the security risks when using file-sharing services like Kazaa. - SC Magazine UK/US

Researchers look to predict software flaws
Researchers at Colorado State University attempt to build models that will be able to predict possible flaws in new software based on historical data. - The Register

Why do laptops schlep such data?
There is no good business reason for carrying sensitive information around on laptops that is in risk of being stolen, but it still happens frequently. - AP/Wired News

Fraud buck will stop with network operators
Fraudsters profiting from premium phone services by spreading rogue dialers are about to get a harder time making their schemes work. Regulators wish to force network operators to check contractors' backgrounds more throughly. - ZDNet UK