Friday, August 04, 2006

Black Hat tests Vista / Microsoft preps patch dozen / US ratifies cybercrime treaty

Virus program incurs church wrath
Symantec is being criticized by the U.K. church for labelling the software Visual Liturgy as spyware. - BBC News
Related of interest:
Symantec atones for church spyware mistake - CNET News.com
Symantec in unholy row - Vnunet.com
Symantec fixes its church spyware mistake - ZDNet UK

Microsoft gets good reception at Black Hat
Although Microsoft is not the typical guest at the Black Hat conference, the company's presentation of security features in Vista was well recieved. - CNET News.com
Related of interest:
Users still wary of Vista security - Computerworld
Microsoft hopes to swallow Blue Pill - Computerworld
Microsoft takes LSD to test Vista security - eWEEK
Microsoft sways Black Hatters with Vista security pledge - eWEEK
Vista vulnerable to stealthy malware - InformationWeek
Microsoft to hackers: Try to break Vista - AP/MSNBC
Symantec: Vista security is flawed - NewsFactor
Vista hacked at Black Hat - CNET/The New York Times

Blog feeds may carry security risk
Using malicious JavaScript it is possible to attack RSS and Atom feed readers, security experts warned at Black Hat. - CNET News.com
Related of interest:
RSS for hackers? - Internetnews.com

Dozen Windows, Office updates coming next week
Microsoft will be releasing 12 security bulletins with security updates for both Office and Windows next Tuesday. - CNET News.com
Related of interest:
Microsoft heads for another big Patch Tuesday - Computerworld
Microsoft plans Patch Day Dozen - eWEEK

Two IT execs at Ohio University fired after data breach
Two of the top IT officials at Ohio University has been fired after about two months suspension following a major data breach. - Computerworld

Security vendor detects aggressive mobile worm variant
Antivirus firm F-Secure reports about a new and more aggressive variant of mobile worm Commwarrior. - Computerworld

Senate approves cybercrime treaty
The U.S. Senate has voted to ratify the Council of Europe's Convention on Cybercrime, to allow greater international cooperation. - Computerworld
Related of interest:
U.S. ratifies cybercrime treaty - Red Herring
Senate ratification of cybercrime treaty praised - SC Magazine UK/US
Senate ratifies cybercrime treaty - AP/Washington Post

Unpatched flaw in Cisco firewall revealed
Albeit less controversial than last year's disclosure, this year's Black Hat brings another Cisco vulnerability to light. - Computerworld

New Google feature flags dangerous sites
Google users will now get a warning, if they click on a search result from Google that points to a dangerous website. - Computerworld

IG flags TWIC for security holes
The U.S. Department for Homeland Security needs to fix a number of serious security vulnerabilities in the Transportation Workers Indentification Credentials program. - Federal Computer Week

The battle lines are drawn in the war on spyware
Gray area spyware vendors are getting less funding, but that leaves the field to the true bad guys, spyware-fighters warn. - Government Computer News

Govt. scrambles to keep up with cybersecurity challenges
The U.S. Defense Department are asking software coders to help develop forensic tools to aid in cybercrime investigations. - Government Computer News

Researcher discloses serious Xerox flaw
A security flaw in Xerox WorkCenter could provide access to information being printed on the company's multifunction printers. - InfoWorld

Browser cache: Goodies for hackers
Information stored in the cache of web browsers can provide a hacker with useful information. - Internetnews.com

Spam's next target: IM
Instant messaging users can be the next major targets of spam as email filtering technologies improve. - InternetWeek.com

Survey: Hacks decline, worries don't
Losses due to hacking declined for the fourth consecutive year, but the dip may reflect changes in companies' willingness to report. - InternetWeek.com

Warning: Your Wi-Fi is vulnerable to attack
Recent disclosures of Wi-Fi vulnerability shows that wireless security may be a bigger problem than just encryption. - NewsFactor
Related of interest:
Hacker exposes security flaw in wireless computers - Sydney Morning Herald

IT pros still most worried about Windows
The increase in threats towards the Mac-platform has not changed the opinion among Black Hat attendees that Windows is still most vulnerable. - SC Magazine UK/US

To disclose or not to disclose?
While the security community still do not agree on how to disclose vulnerabilities, most agree that it has become better over the last years. - SC Magazine UK/US

How to clone the copy-friendly biometric passport
Copying the chip-information of the new biometric passports opens up new opportunities for forgers. - The Register
Related of interest:
Biometric passport cracked and cloned - Silicon.com

Online security must be non-intrusive
Consumers don't want to be bothered by online security measures, unless they understand why they are there. - Vnunet.com

Thursday, August 03, 2006

FBI calls hackers for help / Mac target of Wi-Fi hack / NAC vulnerable

Intel sends out Centrino patches
Intel has released a security patch for its drivers for the Centrino Wi-Fi chipset for Windows to fix a number of serious vulnerabilities. - CNET News.com

Breaking into a laptop via Wi-Fi
Researchers at the Black Hat conference demonstrated how to break into a laptop via Wi-Fi using flaws in its drivers. - CNET News.com

FBI calls for hacker help
FBI asked hackers for help in the bureau's fight against cybercrime at the Black Hat conference. - CNET News.com

FBI seeks hacking partners
FBI wants hackers to give the bureau their input on the best ways to fight cybercrime. - Computer Weekly

Security conference targets the Mac in Wi-Fi demo
Researchers used an Apple MacBook as their target to demonstrate how vulnerabilities in Wi-Fi device drivers can give access to a system. - Computer Weekly

Black Hat: Hit spyware by punishing purveyors, experts say
Antispyware experts say that fighting spyware is best done by punishing the purveyors harder. - Computerworld

Black Hat: Blog readers vulnerable to embedded malware

Atom or RSS feeds can be used by malware writers to install trojans on unsuspecting feed users' PCs. - Computerworld

Black Hat: NAC solutions vulnerable to attack
Systems for network access control contain vulnerabilities that make them vulnerable to attack, researchers warn. - Computerworld

'Brute force' attacks against SMBs on the rise
Small and medium sized businesses have over the last few months become increasingly under attack from targeted brute force attempts. - Computerworld

Intel issues patches for wireless vulnerabilities

Intel has issued a security patch to fix a serious security vulnerability in the Windows drivers for its Centrino Wi-Fi chipset. - Computerworld

ActiveX fuzzer runs IE through security mill
HD Moore has released a fuzzer that can help finding weaknesses in Internet Explorer's handling of ActiveX objects. - eWEEK

Experts point to weakness in NAC security
Experts at the Black Hat conference warn against weaknesses of network access control systems. - eWEEK

The dilemma of reporting spyware attacks

Companies may be afraid to report spyware incidents to authorities, because they could face criminal charges themselves for not securing data. - eWEEK

Hackers expose 'critical' Wi-Fi driver flaw
Both Mac and Windows PCs can become target of attacks that uses flaws in the drivers for the Wi-Fi network devices. - eWEEK

Intel offers security fixes for Centrino
Intel has released updated drivers for its Centrino Wi-Fi chipsets to fix a number of critical security vulnerabilities. - eWEEK

FBI: Hackers must help fight Web mob

The FBI pleaded the hacker community for assistance in its fight against cybercrime by sharing information. - eWEEK

Hackers show MacBook vulnerability
Hackers at the Black Hat conference demonstrated flaws of Wi-Fi drivers by hacking into an Apple MacBook. - Federal Computer Week

Feds wants help from private sector on IT security
FBI is getting into a deeper fight against cybercrime, but needs help from the private security experts. - Government Computer News

The future of authentication
The latest trends in authentication can be found in the health-care and financial services industries. - Government Computer News

Feds look to arrest ID theft with new industry alliance
New threats mean that the FBI has to rely more on private sector researcher on the forefront of the current trends. - InformationWeek

Standards issues open network security holes
Lack of standards in network access control systems has left them open to vulnerabilities, experts at Black Hat warns. - InformationWeek

Open-source Metasploit improves evasion
Metasploit-creator HD wants to scare creators of intrusion detection systems with the evasion features of the latest version of the software. - Internetnews.com

Phishers hit the phone bank with Asterisk
Using open-source Asterisk, phishers can create fake bank phone systems to fool users. - Internetnews.com

Dodging NAC's silver bullet
Network access control may not be the magic elixir for security as some vendors hope, due to inherent security problems. - Internetnews.com

Vista security mostly invisible but thorough
Microsoft wants to show that it is taking security serious in Windows Vista by its major presence at the Black Hat conference. - Internetnews.com

Mac users facing new security threats
Mac users will face new security threats as malware writers and hackers target applications rather than operating systems. - NewsFactor

Another look at VoIP security risks
Experts warn that VoIP applications are just as vulnerable to attacks as any other Internet application. - NewsFactor

Webroot CTO: Spyware threats on the increase

Spyware is becoming a bigger problem with a large number of new threats and methods. - SC Magazine UK/US

Mobile storage devices a threat to businesses
Study shows that many owners of Memory Sticks use them to transfer files between PCs and not just for MP3-players or cameras. - SC Magazine UK/US

Microsoft and Apple 'must improve security patches'
Security patches from vendors like Microsoft and Apple should also include security fixes for drivers, experts urges. - Silicon.com

Laptop thefts pose real gov't data risk
British government agencies have had an alarming number of laptops stolen, putting data at risk. - Silicon.com

Precision phishing on the rise
Very small banks and credit unions are new favorites on the menues of phishers, the Anti-Phishing Working Group reports. - Sydney Morning Herald

EBay scamming automation primed for fraud

Fraudsters use automatic bots to improve their reputations on eBay to gain users' trust. - The Register

Symantec highlights Windows Vista user vulnerabilities
Symantec tries to shed more light on which parts of the Windows Vista security model it finds flawed. - The Register

Two factor risks highlighted
A recent attack on the online payment system E-gold highlights how two factor security can be beaten. - Vnunet.com

Hackers clone e-passports
A German security expert has demonstrated how e-passports with RFID chips can be cloned. - Wired News

Wednesday, August 02, 2006

Apple security update / Centrino Wi-Fi flaw / Black Hat 2006

Apple issues Mac security update
Apple has released a security update for Mac OS X to fix a number of flaws in the support for Bluetooth, OpenSSH, and more. - CIO Magazine

Apple fixes 26 Mac OS X flaws
Apple has issued a security update for Mac OS X that fixes up to 26 flaws, some of which are considered serious. - CNET News.com

Hackers try to crack Windows Powershell
Microsoft's scripting language Powershell has become a new target for hackers. - CNET News.com

McAfee patches holes in SecurityCenter
Antivirus vendor McAfee has issued a security update to fix a critical vulnerability in its consumer products. - Computer Weekly

Microsoft Powershell targeted by worm
An Austrian hacker group has created a proof-of-concept worm that uses Microsoft's scripting language Powershell. - Computer Weekly

Rootkits emerge as maturing IT threat
Rootkits have gained popularity among virus writers as the stealth technology is well suited for targeted under-the-radar attacks. - Government Computer News

Security pros working hard to stay ahead of hackers
Researchers gathered at the Black Hat conference hopes to identify emerging trends and stay ahead of malicious hackers. - Government Computer News

McAfee patches critical bug in consumer software
McAfee issued a critical security update on Tuesday for its SecurityCenter software that is used in most of its consumer security products. - InformationWeek

Story lines abound on eve of Black Hat 2006

Following last year's drama at Black Hat 2005, this year's attendees look forward to a number of perhaps equally controversial presentations. - InformationWeek

Firefox is doing so well it's now a malware target
With over 200 million downloads open-source browser Firefox has become a target for exploits and malware. - Internetnews.com

Hackers and G-men to descend on Las Vegas
Both IT vendors, government experts and teenage hackers meet in Las Vegas for the annual Black Hat and Defcon conferences. - AP/MSNBC

Microsoft plays down bug panic
Speculation that Microsoft's security fix for a Windows flaw didn't work is due to confusion, since a released exploit actually takes advantage of an unpatched issue. - Network World Fusion

The future of enterprise security
Securing peripheral devices is the next big security challenge for enterprises, while smaller business are falling behind. - NewsFactor

Wireless worms threaten laptop users
Vulnerabilities in Windows drivers for Intel's Centrino platform could leave laptops open for attacks through Wi-Fi connections. - SC Magazine UK/US

Intel warns of Centrino wireless driver flaws
Intel has issued a warning about possible security flaws in drivers for its Centrino platform wireless products. - SC Magazine UK/US

KaZaa users warned of p2p worm
A proof-of-concept worm uses Microsoft's Powershell scripting language and propagates through the shared folder in p2p application KaZaa. - SC Magazine UK/US

Alert over stolen tax file numbers
A keylogging trojan has resulted in stolen tax file numbers from at least 170 Australians. - Sydney Morning Herald

Apple patches 26 security flaws
17 of the flaws patched in Apple's security update could expose users to arbitrary code execution. - Vnunet.com

Intel admits to Centrino Wi-Fi security flaw
Intel admits that there is a number of security flaws in the Windows drivers for its Centrino Wi-Fi products. - Vnunet.com

Spam dominated mail during July
Security firm Softscan reports that almost 90 percent of the email scanned by the company in July was spam. - Vnunet.com

Huge botnet swamps U.K. firms with 8M phishing emails
A botnet comprised of estimated 20.000 computers has been used to send out over 8 million phishing mails in a 24 hour period. - Vnunet.com

Hackers ramp up 'insidious' targeted attacks
Virus writers are turning to spamming links to malicious websites instead of mass-mailing worms directly to users. - Vnunet.com

Hijacking a MacBook in 60 seconds or less
At the Black Hat conference two security experts demonstrated how a wireless laptop, in this case a MacBook, can easily be hacked by attacking the wireless device drivers. - Washington Post

Tuesday, August 01, 2006

McAfee hit by flaw / Powershell targeted / Fewer worms but threats remain

Hackers outfox Mozilla's Firefox
An exploit for open-source browser Firefox is being used by a trojan to monitor user input. - CIO Magazine

McAfee patches holes in security software
Security firm McAfee has issued a patch to fix a vulnerability in its SecurityCenter software. - CNET News.com

Black Hat with a Vista twist
The annual security conference Black Hat is no longer just for hackers. Big vendors like Microsoft also show off their products. - CNET News.com

Kaspersky sees reduced worm threat this month
Despite major outbreaks the last three years in August, Kaspersky Lab predicts that there will be no major outbreak this year. - Computer Weekly

Phishers target Bank of Scotland
The Bank of Scotland is the latest target for a new phishing scam. - Computer Weekly

McAfee to release patch for vulnerability
Antivirus firm McAfee has issued a patch for a vulnerability that the company categorizes as of 'medium' severity. - Computerworld

Warners Bros. drops Zango deal over ethics certification
Media company Warner Bros has terminated its controversial deal with adware firm Zango over ethical dispute. - Computerworld

DOD lab excavates bits, bytes to dig out information

The Cyber Crime Center at the U.S. Department of Defense is playing an important role in forensic work in Iraq. - Government Computer News

Email threats plunge in July
Low amounts of email-borne malware in July does not mean that email has become safer, as more spammers instead link to malicious webpages. - InformationWeek

New bot-powered eBay-scam uncovered
A new scam uses bot-software to create new eBay-accounts that help boosting the reputation of the accounts used by scammers. - InformationWeek

The word on email authentication
The technical part of the specification for the email authentication technology Domain Keys Identified Mail is now in place. - Internetnews.com

Rounding the corners of network security
The current trends and threats in IT security is being discussed at the Black Hat conference. - Internetnews.com

A new open source approach to weakness

Inspired by the science of biology, security firm Fortify has launched an open-source method for categorizing software vulnerabilities. - Internetnews.com

McAfee security programs may expose data
A flaw in consumer versions of security software from McAfee could expose sensitive information on users' PCs. - AP/MSNBC

Black Hat conference puts spotlight on NAC, Vista and rootkits
Network access control, Windows Vista and current threats from rootkits are in the spotlight of this year's Black Hat conference. - Network World Fusion

Virus writers target Windows Powershell
Microsoft's forthcoming Powershell scripting language poses a new opportunity for virus writers, a proof of concept shows. - NewsFactor

NASA, military websites hacked in protest over Israeli bombings
According to Zone-H there has been a number of politically motivated hackings of U.S. government websites as result of the bombings in Lebanon. - SC Magazine UK/US

McAfee could patch widespread flaw as early as tomorrow

Security vendor McAfee could issue a patch for a serious vulnerability in its software as early as Wednesday. - SC Magazine UK/US

Will Mac security fears rise in line with growth?
Apple's days of no serious threats to its platform could be numbered, if sales continue to rise, experts warn. - Silicon.com

Most home users secure Wi-Fi networks
According to a poll by JupiterResearch six out of ten home users enable security on their wireless networks. - TechWeb

Viral email traffic falls but threat remains
Malware authors are turning away from mass-mailing viruses in favor of targeted trojans and links to malicious websites. - Vnunet.com

Virus writers target Windows Powershell
New proof-of-concept code shows that virus writers could take advantage of Microsoft's Powershell scripting language. - Vnunet.com

Monday, July 31, 2006

US unprepared for cyberattack / JavaScript bypasses firewalls / Patch-exploit is new flaw

JavaScript opens doors to browser-based attacks
A maliciuos JavaScript loaded from a website could be used to scan the user's network and open it up for attacks. - CNET News.com

Stopping fraud by blackballing PCs
Blocking PCs that have previously been used in fraud from accessing certain websites may help stop fraud with stolen credit cards. - CNET News.com

Senator blasts Homeland Security's Net efforts
U.S. Republican senator Tom Coburn claims that the Department of Homeland Security has made no progress in protecting the country from cyberattacks. - CNET News.com

Efficient firms will enjoy drop in security spend
Organizations with mature IT security practices will be able to lower their spendings, while those lacking must increase their's, Gartner advises - Computer Weekly

No data left behind: Dealing with disposal

Dealing with disposal of old disks for recycling, but still complying with security requirements is. - Computerworld

Banks face web security deadline
The deadline is coming closer for U.S. banks to adopt new required strong authentication measures. - Computerworld

Did Microsoft patch miss the mark?
Microsoft now says that an exploit released for a recently patched vulnerability is actually using a new flaw and not the one fixed by the patch. - eWEEK

Vista, rootkits headline hacker confab
While independent security researchers fear that the Black Hat Briefings are turning into a product demo, Microsoft plans to show off Vista in Las Veges. - eWEEK

GAO: DHS public/private cyber plan incomplete
A new report finds that the U.S. Department of Homeland Security is still not ready for a major Internet disruption caused by a natural disaster or a cyberattack. - Federal Computer Week

GSA warns public of email scam
The U.S. General Services Administration has issued a warning about a phishing scam using the department as bait. - Government Computer News

DDoS attacks may be behind MySpace, AOL problems
Problems with user logins at multiple webbased services may have been the effect of a distributed denial-of-service attack. - InformationWeek

Zango blasted for targeting MySpace as adware channel

A security expert claims that adware company Zango is targeting popular social networking site MySpace as a distribution channel. - InformationWeek

Black Hat 2006: Feeling insecure in Sin City
Various forms of webbased attacks are topping the buzz of the Black Hat security conference in Las Vegas this week. - Internetnews.com

5 ways to get Vista's security now
Five strategies for beefing up the security in Windows XP. - InternetWeek.com

Ternary sorting aims to stop false positives
Adding a third category for sorting phishing emails and spam from the real emails can help improve spamfilters. - Network World Fusion

The challenge in selling security
Chief Security Officers can have a hard time selling the concepts of IT security to the board. - Network World Fusion

Browser-based network attack discovered
JavaScript code may be used to bypass firewalls through the user's browser, security researchers have found. - NewScientist

Senate minority leader victimized by ID theft
U.S. Senate minority leader Democrat Harry Reid has found himself victim of identity theft. - SC Magazine UK/US

Victoria's (malicious) Secret: A information-stealing trojan
Antivirus firm Sophos warns about an email trojan that masks itself as a slideshow of a russian woman. - SC Magazine UK/US