Twitter
LinkedIn
RSS

Archive for April 16th, 2012


Political rhetoric ramps up and so does President Obama related spam

by Dave Michmerhuizen & Luis Chapetti – Security Researchers If you’re a malware spammer, the number one challenge you face is how to get people to open, read and follow links in your message. To accomplish this, one of the driving emotions that spammers appeal to is curiosity.   For years spammers have sent emails offering glimpses of gory accidents, scantily clad women and outrageous celebrity behavior – anything that might get you to drop your guard, suspend your critical thinking and click through some dodgy link in the hope of seeing some juicy nugget. An excellent example of that fell into the Barracuda Labs spam traps recently.  It claimed that President Obama is a homosexual and offered an incriminating picture that would prove it.

Read More...

McAfee DAT troubles , (Mon, Apr 16th)

Thanks to reader Dan for sharing the following information: McAfee has confirmed that incremental DAT 6682 may trigger message scan failures and a system crash in GroupShield Exchange (MSME), GroupShield Domino, and McAfee Email Gateway 7 (MEG). McAfee recommends that customers do NOT upload DAT 6682. More information will be available on the McAfee KnowledgeBase (https://mysupport.mcafee.com) in article KB70380 (https://kc.mcafee.com/corporate/index?page=contentid=KB70380).

Read More...

Militarisation of cyberspace: how the global power struggle moved online

“Jonathan Millican is a first-year university student from Harrogate in North Yorkshire. He says he doesn't think of himself as a “stereotypical geek”, but having been crowned champion in Britain's Cyber Security Challenge, the 19-year-old is bound to take some stick from his undergraduate friends at Cambridge. The competition is not well known, but it is well contested….”

Read More...

Cyber Security Bulletin SB12-107 – Vulnerability Summary for the Week of April 9, 2012

“High Vulnerabilities :360zip — 360zipadobe — acrobatantonin_descampe — openjpeggoogle — chromemicrosoft — windows_7microsoft — biztalk_servermicrosoft — . net_frameworkmicrosoft — ieMedium Vulnerabilities :apache — hadoopatvise — webmi2adscloudera — cloudera_managercmsmadesimple — cms_made_simpledotnetnuke — dotnetnukedotnetnuke — dotnetnukehp — system_management_homepageicz — sencha_snsLow Vulnerabilities :hp — procurve_switch_5400zlibm — tivoli_event_pumpwireshark — wireshark…”

Read More...

Microsoft Responds to Critics Over Botnet Bruhaha

“Microsofts most recent anti-botnet campaign a legal sneak attack against dozens of ZeuS botnets seems to have ruffled the feathers of many in security community.

Read More...

SB12-107: Vulnerability Summary for the Week of April 9, 2012

The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week.

Read More...

Javvad Malik Interviews Nabil Ouchn at Black Hat EU 2012

“Nabil Ouchn is a co-founder of NETPeas and the person behind the vastly impressive ToolsWatch. Nabil took the time to speak to us a bit about ToolsWatch and their involvement in the Black Hat arsenal…

Read More...

Apple Releases Flashback Malware Security Updates

Apple has released security updates to address Flashback malware in the following products: OS X Lion v10.7.3 OS X Lion Server v10.7.3 Mac OS X v10.6.8 Mac OS X Server v10.6.8 Apple has released a malware removal tool for the most common variant of the Flashback malware.

Read More...

SabPub – The Latest Mac OS X Backdoor Java Exploit

“Recently, Russian Anti-Virus company Doctor Web, found that the Flashback Mac Trojan had infected more than 600,000 systems, further quashing the myth that Apple's OS X is somehow immune to malware threats. The Trojan exploited three Java vulnerabilities to gain remote access to the infected systems and likely included a keylogger capability to capture authentication credentials. Doctor Web created an online tool for uses to see if they had been infected by the Flashback Trojan, F-Secure has instructions on how to remove the virus, and Apple announced they had successfully patched the vulnerability….”

Read More...

Patriot Hackers: Stand YOUR Ground – Not Mine

“As part of my participation in Wikistrat, I get to see some pretty brilliant debates on what can – can't – will – and (hopefully) won't happen across the geopolitical sphere. And while the Cyber sphere of geopolitics continues to trouble many with Fear – Uncertainty – Doubt, there is one area where the general consensus of the “Good Guys” is the same:Let me preface the rest of this by saying I do not care who The Jester, The Raptor, YamaTough, Anons, etc. are

Read More...