Monday, November 23, 2009
Wednesday, November 18, 2009
DNS Problem linked to DDoS!!!
Arnold, California Move Toward Skynet!!!
Windows 7 Needs a Patch...Go Figure...
Turk Student Hack Twitter...
Wednesday, November 11, 2009
Swedish DoS!!!
iPhone & R.I.M.Takes the Pie...
Tuesday, November 10, 2009
Little Known Holes...Enter Here!!!
Little-known hole lets attacker hit main website domain via its subdomains. Turns out an exploit on a Website’s subdomain can be used to attack the main domain: A researcher has released a proof-of-concept showing how cookies can be abused to execute such an insidious attack. A senior researcher for Foreground Security published a paper this week that demonstrates how an exploit in a subdomain, such as mail.google.com, could be used to hack the main production domain, google.com, all because of the way browsers handle cookies. “There’s no specific vulnerability here, but it’s widening the attack surface for any large organization that has more than one [Web] server set up. A [vulnerability] in any one of those servers can affect all the rest,” he says. Most Web developers are not aware that a vulnerability in a subdomain could be used to target the main domain. “We’re trying to get the message out that now you have to treat everything [in the domain] as though someone can compromise your crown jewels,” says the CSO for Foreground. “You have to realize that every vulnerability, every attack vector in those subdomains, can be used to compromise [other areas of the domain],” he says. It all boils down to the browsers themselves. Within the DNS architecture, the main domain — fortune500company.com, for instance — has control over its subdomains, such as development.fortune500company.com. Development.fortune500company.com has no authority to change anything on the main fortune500company.com site. But browsers do the reverse, the CSO says. Development.fortune500company.com can set cookies for fortune500company.com, the main domain. That leaves the door open for cookie-tampering, he says, when the subdomain has an exploitable vulnerability, such as cross-site scripting (XSS) or cross-site request forgery (CSRF).
iPhone Snooping Fiasco
Backdoor in top iPhone games stole user data, suit claims. A maker of some of the most popular games for the iPhone has been surreptitiously collecting users’ cell numbers without their permission, according to a federal lawsuit filed on November 4. The complaint claims best-selling games made by Storm8 contained secret code that bypassed safeguards built into the iPhone to prevent the unauthorized snooping of user information. The Redwood City, California, company, which claims its games have been downloaded more than 20 million times, has no need to collect the numbers. “Nonetheless, Storm8 makes use of the ‘backdoor’ method to access, collect, and transmit the wireless phone numbers of the iPhones on which its games are installed,” states the complaint, which was filed in US District Court in Northern California. “Storm8 does so or has done so in all of its games.”
Data Breach Notification Bills...
Senate committee approves data-breach notification bills. The U.S. Senate Judiciary Committee has approved two bills that would require organizations with data breaches to report them to potential victims. The Judiciary Committee on November 3 voted to approve both the Personal Data Privacy and Security Act and the Data Breach Notification Act by large majorities. The Data Breach Notification Act, sponsored by a Senator who is a California Democrat, would require U.S. agencies and businesses that engage in interstate commerce to report data breaches to victims whose personal information “has been, or is reasonably believed to have been, accessed, or acquired.” The bill would also require agencies and businesses to report large data breaches to the U.S. Secret Service The Personal Data Privacy and Security Act would also require that organizations that maintain personal data give notice to potential victims and law-enforcement authorities when they have a data breach. It would increase criminal penalties for electronic-data theft and allow people to have access to, and correct, personal data held by commercial data brokers. The second bill, sponsored by another Senator who is the Judiciary Committee chairman and a Vermont Democrat, would also require the U.S. government to establish rules protecting privacy and security when it uses information from commercial data brokers.
Monday, November 09, 2009
The Death of the Zeus Trojan
Hackers Exploit Google
Wednesday, November 04, 2009
If you happen to work on a pc...
Cyber Merger...
DHS to announce cyber merger. In what could mark a major improvement to the nation’s ability to defend itself against cyber threats, the Department of Homeland Security will announce Friday that the U.S. Computer Emergency Readiness Team (CERT) will merge with the National Coordinating Center for Telecommunications (NCC). The two groups — now separated by two floors — will now be co-located and will operate jointly. It’s an interesting pairing, putting the public-private CERT together with the NCC, an interagency group of 22 Federal departments and agencies first created by a U.S. President in the aftermath of the Cuban Missile Crisis. The pending merger was discussed October 29 at a conference on cyber issues at the National Defense University. One expert at the conference expressed concern that centralizing the functions of the two groups might work against their effectiveness given the widely distributed nature of the Internet. “The primary issue this affects is in response. The military itself is commanded hierarchically but distributes capability among different commands. Unifying the agencies can help with funding but slow response and dilute capability,” said an associate professor at the Calumet campus of Purdue University.