Security News for April

iPhone Tracks Your Every Move, and There’s a Map for That

http://www.wired.com/gadgetlab/2011/04/iphone-tracks/

Leaked Cables Indicate Chinese Military Hackers Attacked U.S.

U.S. authorities have reportedly traced the “Byzantine Hades” spear-phishing attacks to specific Chinese military groups.

http://www.informationweek.com/news/security/attacks/229401866?cid=nl_IW_daily_2011-04-19_html

Final report: Pan-European cyber security exercise

http://www.net-security.org/secworld.php?id=10908

http://news.slashdot.org/story/11/04/19/0422259/Final-Report-Pan-European-Cyber-Security-Exercise

ORNL computers coming back online after cyber attack

http://www.wbir.com/news/article/166712/2/ORNL-computers-coming-back-online-after-cyber-attack

Cyber attacks rise at critical infrastructure firms

http://news.cnet.com/8301-27080_3-20055091-245.html

Cyber attacks on critical infrastructure companies are on the rise, with a jump in extortion attempts and malware designed to sabotage systems, like Stuxnet, according to a new report.

Verizon Finds Stunning Drop in Data Theft

http://threatpost.com/en_us/blogs/weird-science-verizon-finds-stunning-drop-data-theft-041911

The news isn’t really stunning, Brian Krebs says identity theft is so common, the profit bottomed out. So they found other sources of income,

http://krebsonsecurity.com/2011/04/are-megabreaches-out-e-thefts-downsized-in-2010/

Some say the new criminal “money maker” is selling source code.

http://venturebeat.com/2011/03/27/intellectual-property-theft-fuels-the-underground-cyber-economy/

http://h30501.www3.hp.com/t5/Following-the-White-Rabbit-A/Source-Code-is-the-New-Hacker-Currency/ba-p/28567

IPhone tracking – not so much a concern.

http://www.willclarke.net/?p=247

http://alexlevinson.wordpress.com/2011/04/23/3-new-thoughts-on-mobile-location/

It turns out they track the towers, not your GPS.

One-Fourth Of SSL Websites At Risk

http://www.darkreading.com/authentication/167901072/security/vulnerabilities/229402059/one-fourth-of-ssl-websites-at-risk.html

Many sites haven’t applied patches for well-known ‘renegotiation’ flaw

Google’s Android phones face more attacks via apps

http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2011/04/22/BUL51J5G3C.DTL&feed=rss.business

Oak Ridge National Labs Hit by Spear Phishing Attack

http://www.thewhir.com/web-hosting-news/042111_Federal_Lab_Hit_by_Spear_Phishing_Attack

“Tennessee-based Oak Ridge National Laboratory (www.ornl.gov) was hit with a spear phishing attack Friday, forcing the federal data center to cut Internet access for employees, according to a report by Wired.”

Adobe Reader, Acrobat Update Nixes Zero Day

http://krebsonsecurity.com/2011/04/adobe-reader-acrobat-update-nixes-zero-day/

Security First: Security and data protection in Google data centers

http://googleenterprise.blogspot.com/2011/04/security-first-security-and-data.html

Google shows how they protect their data centers

http://www.youtube.com/watch?v=1SCZzgfdTBo&feature=youtu.be

Ashampoo warns of security breach

http://www.betanews.com/article/Ashampoo-warns-of-security-breach/1303479933

Sony confirms external attack brought down PlayStation Network

http://venturebeat.com/2011/04/22/sony-confirms-external-attack-brought-down-playstation-network/

Kapersky’s son kidnapped. He paid ransom.

http://www.telegraph.co.uk/news/worldnews/europe/russia/8468779/Russian-tycoon-pays-ransom-to-free-kidnapped-son.html

Breakthrough in Quantum Computing

http://www.readwriteweb.com/archives/breakthrough_in_quantum_computing.php

Fast AND reliable.

NSA Recommendations For RSA SecurID Users After Cyber Intrusion

http://lightpointsecurity.com/content/nsa-recommendations-for-rsa-securid-users-after-cyber-intrusion

In reaction to the RSA cyber intrusion, The National Security Agency (NSA) released Information Assurance Advisory No. IAA-003-2011: Recommended Actions for SecurID Users in Response to RSA Cyber Intrusion. This advisory expands on the information previously released by NSA via Information Assurance Alert No. IAR-001-2011: Mitigations for the RSA Cyber Intrusion, and provides additional guidance on:

  • The use of SecurID hard tokens and soft tokens
  • Fortifying the security profile of SecurID’s authentication factors
  • Measures to harden SecurID’s Authentication Manager

Yahoo Weighs Spinning Out Hadoop Engineering Group for $1 Billion Opportunity

http://www.readwriteweb.com/cloud/2011/04/yahoo-weighs-spinning-out-hado.php

China Implicated In Hacking Of SMB Online Bank Accounts

FBI warns that small- to mid-size businesses are being targeted in an attack that so far has bilked companies’ accounts of millions of dollars and wired the money to Chinese companies

http://www.darkreading.com/advanced-threats/167901091/security/attacks-breaches/229402294/china-implicated-in-hacking-of-smb-online-bank-accounts.html

This time it wasn’t an “advanced persistent threat” that China was associated with: a fraud alert issued by the FBI today implicates China in a cybercrime operation that bilked U.S.-based small- to midsized businesses of $11 million over the past year.

Trojans Shifting Focus to Less Widely Used Browsers

http://threatpost.com/en_us/blogs/trojans-shifting-focus-less-widely-used-browsers-042611

http://krebsonsecurity.com/2011/04/spyeye-targets-opera-google-chrome-users/?

Current versions of the SpyEye Trojan now include functionality designed to steal sensitive data from individuals surfing the Web with Chrome and Opera browsers according to a Brian Krebs report.

Sony Says PlayStation Hacker Got Personal Data, credit card numbers, passwords, etc.

http://www.nytimes.chttp://krebsonsecurity.com/2011/04/millions-of-passwords-credit-card-numbers-at-risk-in-breach-of-sony-playstation-network/om/2011/04/27/technology/27playstation.html?_r=1

http://krebsonsecurity.com/2011/04/millions-of-passwords-credit-card-numbers-at-risk-in-breach-of-sony-playstation-network/

Then, on Tuesday, after several days of near-silence, Sony said that as a result of the attack, an “unauthorized person” had obtained personal information about account-holders, including their names, addresses, e-mail addresses, and PlayStation usernames and passwords. Sony warned that other sensitive information, including credit card numbers, could have been compromised also, warning customers through a statement to “remain vigilant” by monitoring identity theft or other financial loss.

PTES Technical Guidelines – Penetration Test Standards

http://www.pentest-standard.org/index.php/PTES_Technical_Guidelines

This is a web page that provides a “standard” set of steps to take in a Penetration Test. It’s new, but the outline is growing to be very large.

Insecure Defaults Lead to Mass Open Proxies in China

http://packetstormsecurity.org/news/view/19057/Insecure-Defaults-Lead-To-Mass-Open-Proxies-In-China.html

This seems due to the popularity of the “PPTV online TV” software, which is a P2P file sharing program used for exchanging TV, and movies.

Chinese databases exposed to hackers – Researcher finds government flaws

http://www.washingtontimes.com/news/2011/apr/26/chinese-databases-exposed-to-hackers/

Besides the database of foreign recruits in China, “[o]ther vulnerable networks Mr. Beresford found include the website of the Beijing-based Institute for High Energy Physics and the computer systems of hundreds of other government agencies and departments using poorly configuredInternet telephones, webcams and other devices. Spies could use these devices to eavesdrop on the Chinese government or military offices where they are installed.”

FBI Warns Small Businesses of Unauthorized Wire Transfers to China

http://www.wtma.com/rssItem.asp?feedid=113&itemid=29661842

Many small businesses are having funds transferred without their knowledge.

Microsoft has a new security scanner that augments their virus detection software

http://www.microsoft.com/security/scanner/en-us/default.aspx

A good write-up on this is here

http://andrewtechhelp.com/tech-news/windowsoffice-news/120-microsoft-safety-scanner

Apple response to phone tracking questions

http://www.apple.com/pr/library/2011/04/27location_qa.html

Google patches 27 Chrome bugs, pays out record bounties

http://www.networkworld.com/news/2011/042711-google-patches-27-chrome-bugs.html?source=nww_rss

“Google today patched 27 vulnerabilities in Chrome as it boosted the “stable” build of the browser to version 11 on Windows, Mac and Linux.

The company paid out a record $16,500 in bounties to researchers who reported a majority of the bugs, beating the previous biggest payday by several hundred dollars.”

Visualizing Application Flows with xtractr

http://labs.mudynamics.com/2010/09/30/visualizing-application-flows-with-xtractr/

Interesting packet visualization tool

Advertisements
This entry was posted in Security. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s