Sunday, September 27, 2009
Friday, September 25, 2009
Google News Alert for: computer hack
Google News Alert for: computer hack
SIM card hack suspect released on bail Register The computer science student allegedly accessed Digicel's system via another firm he was working at during at the time of the alleged hack, the Jamaican ... See all stories on this topic | ||
The Money Times The 28-year-old computer hacker has been charged with stealing millions of debit and credit card numbers of major retail chains and carrying out fraudulent ... See all stories on this topic | ||
High Position (blog) First we need to understand what a worm is: in a normal environment a computer worm is a self-replicating code or program that tries to spread itself ... See all stories on this topic |
Friday, September 18, 2009
Microsoft Security Advisory Notification - September 17, 2009
Issued: September 17, 2009
******************************
Security Advisories Updated or Released Today
==============================
* Microsoft Security Advisory (975497)
- Title: Vulnerabilities in SMB Could Allow Remote
Code Execution
- http://www.microsoft.com/
- Revision Note: V1.1 (September 17, 2009): Clarified the
FAQ, What is SMBv2? Added a link to Microsoft Knowledge Base
Article 975497 to provide an automated Microsoft Fix it
solution for the workaround, Disable SMB v2.
Friday, September 11, 2009
Unpatched Microsoft Vulnerabilities
These following vulnerabilities have been around for a while with no patches… Come on Microsoft…
Microsoft Internet Explorer Window Injection Vulnerability
Microsoft Windows XP GDI+ .ICO Handling DoS Vulnerability
Microsoft Internet Explorer FTP Access Information Disclosure
Microsoft Foundation Class Library FileFind Method Buffer Overflow
Microsoft Windows Web Proxy Automatic Discovery (WPAD) Vulnerability
Microsoft Internet Explorer Cross-Zone Scripting Vulnerability
Microsoft Windows GDI+ EMF Stack Overflow Vulnerability
Microsoft Windows Desktop Wallpaper Code Execution Vulnerability
Microsoft Internet Explorer Cookie Session Fixation
Description:
A vulnerability is present in Microsoft Internet Explorer that may allow for sensitive information disclosure.
Recommendation:
Securityorb.com is not aware of a vendor supplied patch/update at this time.
Observation:
Microsoft Internet Explorer is an industry standard Web browsing application.
A vulnerability exists in Microsoft Internet Explorer that may allow for sensitive information disclosure. Web sites with special domain names can set cookies and hijack HTTP sessions. A user would have to visit a malicious Web site for an attack to occur.
Common Vulnerabilities & Exposures (CVE) Link:
CVE-2008-3173
IAVA Reference Number
IAVA-REF-NUMBER-NOMATCH
VMWare Fusion: How to shutdown Windows when it is hung
I have been running VMWare Fusion with Windows XP as my guest OS for some time. The other day, Windows XP while shutting, just hung as it seems to do from time to time on regular PC-based installed. I spent 2-days, waiting for it to complete. I even used the:
VMware Fusion menu bar > Virtual Machine > select Power Off
But it seem by using:
VMware Fusion menu bar > Virtual Machine > press the option key and select Power Off
It is the equivalent of pulling the plug out of the wall and it worked. Hope this will help someone out as it did me.
Kellep
Thursday, September 10, 2009
Cloud Computing and Security Concerns
Cloud computing has been receiving a lot of press in the IT mainstream media lately and all indications points to it continuing to be a hot topic for some time. Gartner.com stated in an article “Significant innovations in virtualization and distributed computing, as well as improved access to high-speed Internet and a weak economy, have accelerated interest in cloud computing.
The concept of cloud computing pertains to an entity that involves delivering hosted services over the Internet. These services can be private or public and are divided into three categories:
- Infrastructure-as-a-Service (IaaS)
- Platform-as-a-Service (PaaS)
- Software-as-a-Service (SaaS)
Infrastructure as a Service (IaaS) is a service in which an organization outsource the equipment used to support operations, including storage, servers and networking components. The service provider owns the equipment and is responsible for the operation and maintenance of it.
Platform as a Service (PaaS) is a service for which the development tool itself is hosted in the cloud and accessed through a browser. Developers can build web applications without installing any tools on their computer and then deploy those applications without any specialized systems administration skills.
Software as a Service (SaaS) is a software service application that allows users to purchase a software service to be used over the Internet that is developed and managed by an independent or third party. The software is not downloaded onto the user's computer, but is simply accessed via an Application Programming Interface (API) over the World Wide Web with a login and a password.
Cloud Security
Due to the nature of cloud computing, many security concerns have been raised as researchers, security professional and management examines the models. Cloud computing does not allow the organization to physically possess their data on site unless it is backed up on a secondary storage device. Customers of the cloud-computing model need to be aware the service provider is conducting regular backups, have an incident response plan and have a disaster recovery plan in place. This is for continuity of business functions as well as the need for meeting regulatory compliance such as FISMA and HIPPA to name a few.
Cloud computing has the ability to assist many organizations, but intensive research, review and audits should be conducted before doing so. The organizations that choose to rely on using a cloud service model will have to consider additional responsibility to be able to understand the services being offered in order to understand the effects on their operations and security.
Source: http://www.securityorb.com/kellep_Cloud_Computing.html
Friday, September 4, 2009
Cybersecurity Act of 2009 2nd Version Still Controversial
The bill seeks to determine when and how the President could intervene in public and private information systems by limiting internet traffic to critical networks for national security reasons or in the case of an emergency.
It has come under scrutiny from a range of first amendment advocacy groups which have raised alarm about government interference.
More information on the Cybersecurity Act of 2009 can be located here:
http://www.eff.org/deeplinks/2009/09/cybersecurity-act-returns-with-a-fresh-coat-of-paint
http://www.huliq.com/7504/85556/senate-cybersecurity-act-2009-could-shut-down-internet
http://www.foxnews.com/politics/2009/08/28/senate-president-emergency-control-internet/