Twitter
LinkedIn
RSS

Archive for April 23rd, 2012


US-CERT Bulletin (SB12-114) : Vulnerability Summary for the Week of April 16, 2012

“High Vulnerabilities:abb — interlink_moduleabb — interlink_modulecurl — curlemc — data_protection_advisorfreebsd — libarchiveMedium Vulnerabilities :adastra — trace_mode_data_centerapache — http_servercomodo — comodo_internet_securitydemandmedia — pluck_sitelifeemc — data_protection_advisorLow Vulnerabilities :hp — system_management_homepagerealnetworks — helix_mobile_serversyndeocms — syndeocms…”

Read More...

Security missteps could thwart mobile banking

“For years, people have been warning about cyber threats involving handheld devices. It's become a perennial issue, one that mobile enthusiasts sometimes do not take seriously enough, despite the best efforts of mobile security vendors. So far, it would be hard to conclude that the mobile banking revolution–if that's what it truly is–has been thwarted by security concerns….”

Read More...

Manning Defense Seeks Dismissal of Charges

“At a pre-trial hearing this week in the case of Pfc. Bradley Manning, who is suspected of releasing classified records to WikiLeaks without authorization, a military judge will consider several motions filed by Mannings defense that seek to reduce the charges against him, or to have them dismissed altogether. The defense motions, filed by attorney David E

Read More...

Comments open for NIST-proposed updates to Digital Signature Standard, (Mon, Apr 23rd)

The comment period forNational Institute of Standards and Technology (NIST) proposed changes to the Digital Signature Standard (FIPS 186-3) is open until May 25, 2012. Submit comments viafips_186-3_change_notice at nist dot gov, with ”186-3 Change Notice” in the subject line. The proposed changes include: clarification on how to implement the digital signature algorithms approved in the standard: the Digital Signature Algorithm (DSA), the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Rivest-Shamir-Adelman algorithm (RSA) allowing the use of additional, approved random number generators, which are used to generate the cryptographic keys used for the generation and verification of digital signatures NIST indicates that the standard provides a means of guaranteeing authenticity in the digital world by means of operations based on complex math that are all but impossible to forge but that updates to the standard are still necessary as technology changes

Read More...

Mysterious Cyber Attack on Iranian Oil Data

“Iran has confirmed that a cyber attack hit its Oil Ministry data systems. It claims there was no damage, but the National Iranian Oil Company website was inaccessible as of Monday

Read More...

100 million users might be affected by a social network vulnerability

“DO IT YOURSELF social networking company Ning is reportedly suffering from a slight security problem that could affect 100 million users. Ning lets people set up their own gasbag social networking channels and is used by people like the pop group Radiohead

Read More...

Criminal charges a 'real possibility' in investigation into death of unhappy spy Gareth Williams

“The inquest into the death of an 'unhappy' spy, whose body was found locked inside a sports holdall just a week before he was due to leave his job, today heard how police may still bring criminal charges in the ongoing investigation. Gareth Williams, originally from Holyhead in Wales, had been due to leave London and return to the Governments Communications Headquarters in Gloucestershire just a week after his naked, decomposing body was found crammed inside the padlocked bag on August 25 2010

Read More...

UPDATE 1-Suspected cyber attack hits Iran oil industry

“Iran is investigating a suspected cyber attack on its main oil export terminal and on the Oil Ministry itself, Iranian industry sources said on Monday.

Read More...

Hurt Locker Makers Return to Sue 2,514 BitTorrent Users

“Voltage Pictures, the makers of the Oscar-winning movie The Hurt Locker, have filed a new lawsuit at a federal court in Florida. By targeting at least 2,514 alleged BitTorrent users, Voltage Pictures hopes to recoup several million dollars in settlements to compensate the studio for piracy-related losses. In total, more than a quarter million people have now been sued in the US for alleged copyright infringements via BitTorrent….”

Read More...

Greater Taunton police departments increase focus on cyber crime

“As more criminals take to the Internet to search for victims, local police departments are being asked to do more in the world of cyber crime.

Read More...