Adobe Release Flash Player 10.3.181.34 available at http://get.adobe.com/flashplayer/, (Thu, Jun 30th)
Updated: 2011-06-30 17:54:59
...(more)...
The Common Weakness Scoring System will give organizations a way to determine the security and safety of software to create better applications. - The United States Department of Homeland Security unveiled a
detailed guide to help software developers and vendors avoid common security
errors in their applications.
Homeland Security's Cyber-Security Division worked with the
security training and research organization SANS Institute and the n...
Advanced persistent threats are a way of life for many defense contractors such as Northrop Grumman, who has been seeing regular attacks from various groups for several years. - Organized
hackers have been attempting to breach aerospace and defense company Northrop
Grumman for years to steal sensitive information, according to a Northrop
Grumman senior executive at the Gartner security summit.
The
APTs (advanced persistent threats) are designed to infiltrate networks a...
I have written a few articles regarding comments from analysts and found a recent one that needs more visibility. In a recent paper, the analyst stated that any enterprise vulnerability assessment deployment should have at least 2 of 3 following technologies deployed for full coverage while performing a vulnerability assessment: Network Based Vulnerability Assessment Scanner [...]
The fifth certificate authority to be hacked this year, StartSSL has suspended issuing its free SSL certificates indefinitely. - StartSSL,
a certification authority offering free SSL certificates, was compromised by
unknown attackers earlier this month. The company has suspended issuing
security certificates for Websites as a quot;defensive measure. quot;
Attackers
hit StartSSL on June 15, and the company suspended issu...
This article will discuss what a SID is. Then, it continues to discuss why some SIDs are well-known, and the concept and technology of SIDs.
Congressional lawmakers are revisiting the request in the White House cyber-security proposal which would make hacking government Websites a felony. - Recent high-profile attacks, including attacks on
the CIA, the International Monetary Fund, a public network for the
United States Senate and defense contractors may be spurring the
government into pushing cyber-security legislation through Congress.
If the Obama administration gets its way, the...
Due to a bug in the code, anyone around the world could access any Dropbox online storage account by typing in a random string as a password over a four-hour period. - Online storage service Dropbox accidentally turned off passwords for four hours, potentially exposing data belonging to its 25 million customers to unauthorized users.
The breach occurred when the company applied a code change at 4:54 p.m. EST on June 19 that caused problems with the authentication...
OpenDNS will detect and block all DNS requests to malicious servers as part of its malware protection service. - OpenDNS, the domain name resolution service, launched a
DNS-based malware protection service in its enterprise offering thats designed
to detect and block infected computers from communicating with
command-and-control servers.
This security service for enterprises will examine all DNS
activity ...
My team and I have spoken with a number of analysts and have confirmed that the plethora of vulnerability assessment solutions on the market share a common trait and a common flaw, the shear volume of reports that can be created based on a vulnerability assessment. Every scan can lead to a myriad of hosts [...]
</p
A teenager in Essex, England was arrested for being part of DDOS attacks against major Websites. There are reports he may be part of the LulzSec hacking group. - British police arrested a teenager based in Essex, England,
who is accused breaching networks and launching distribute denial of service
attacks around the world. He may or may not be a part of the LulzSec hacking group.
The 19 year old was arrested at his home in Wickford, Essex,
on suspicion o...
Security researcher Dillon Beresford uncovered two SCADA (supervisory control and data acquisition) vulnerabilities that would allow denial-of-service attacks and remote code execution. - A
security researcher discovered several vulnerabilities in industrial control
systems software from China that can be exploited remotely.
The
vulnerabilities can be used to knock out or take over SCADA (supervisory control
and data acquisition) systems from Chinese firm Sunway ForceControl Tec...
Scammers are poisoning search-result terms for the iCloud keyword to direct users to a fake Windows antivirus. - Businesses and analysts
arent the only ones interested in Apples upcoming iCloud service. Scammers
are moving in on the action to deliver fake antivirus software.
Cyber-criminals have already
used black-hat search engine optimization techniques to poison search results
for the iCloud keyword,...
Organizations should be implementing several measures to prevent cyber-attackers from stealing sensitive, confidential data. - Despite repeated reminders to select strong passwords and not to reuse them across Websites and services, online users continue to be frighteningly lax in their password security, according to a recent analysis of leaked passwords.
Security experts recommend taking a multilayered approach to securi...
Microsoft's week involved a giant Patch Tuesday, the release of Kinect for Windows SDK beta and alerts about a phone scam. - Microsofts relatively quiet week saw a significant Patch
Tuesday and a new phase of life for its popular Kinect hands-free game
controller.
Junes Patch Tuesday tackled some 24 bugs across 16
bulletins. It wasnt quite as big as Aprils session, but certainly covered a
lot of ground: in addition t...
Connecticut state Attorney General George Jepsen wants a meeting with Facebook concerning its controversial use of facial recognition software for photo tagging, which advocates claim violates user privacy. -
Facebook has another foe in its effort to make tagging
friends easier with facial recognition software: Connecticut state Attorney
General George Jepsen.
Jepsen said June 16 he is concerned that consumer privacy
is being compromised by a feature that uses facial recognition to help the
Websi...
This article is part one of a two-part series on using Sysinternals tools to manually detect and clean malware from a Windows system.
Another even month, another huge security bulletin release by Microsoft. Those who took my advice and convinced their bosses to let them take vacation this month avoided 16 security bulletins – hopefully your co-workers will have them fully tested and deployed before you return. For those of us not sitting on a beach somewhere, there [...]
If you are in the financial sector, how are you protecting your financial systems from tampering? If you are the CEO or CFO you must ensure that you financial reports are accurate, delivered in a timely fashion, and do not contain any information that was tampered with. This requires securing critical information technology systems that [...]
When enterprise applications and services migrate from the physical data center, organizations begin to lose visibility and control as the shared infrastructure model of the cloud forces IT to give up their traditional control over the network and system resources. As a result, many organizations and cloud providers will tell you that security continues to [...]