Daily Archive: April 23, 2012

US-CERT Bulletin (SB12-114) : Vulnerability Summary for the Week of April 16, 2012 0

US-CERT Bulletin (SB12-114) : Vulnerability Summary for the Week of April 16, 2012

“High Vulnerabilities:abb — interlink_moduleabb — interlink_modulecurl — curlemc — data_protection_advisorfreebsd — libarchiveMedium Vulnerabilities :adastra — trace_mode_data_centerapache — http_servercomodo — comodo_internet_securitydemandmedia — pluck_sitelifeemc — data_protection_advisorLow Vulnerabilities :hp — system_management_homepagerealnetworks — helix_mobile_serversyndeocms — syndeocms…”

Security missteps could thwart mobile banking 0

Security missteps could thwart mobile banking

“For years, people have been warning about cyber threats involving handheld devices. It's become a perennial issue, one that mobile enthusiasts sometimes do not take seriously enough, despite the best efforts of mobile security vendors. So far, it would be hard to conclude that the mobile banking revolution–if that's what it truly is–has been thwarted by security concerns….”

Manning Defense Seeks Dismissal of Charges 0

Manning Defense Seeks Dismissal of Charges

“At a pre-trial hearing this week in the case of Pfc. Bradley Manning, who is suspected of releasing classified records to WikiLeaks without authorization, a military judge will consider several motions filed by Mannings defense that seek to reduce the charges against him, or to have them dismissed altogether. The defense motions, filed by attorney David E

Comments open for NIST-proposed updates to Digital Signature Standard, (Mon, Apr 23rd) 0

Comments open for NIST-proposed updates to Digital Signature Standard, (Mon, Apr 23rd)

The comment period forNational Institute of Standards and Technology (NIST) proposed changes to the Digital Signature Standard (FIPS 186-3) is open until May 25, 2012. Submit comments viafips_186-3_change_notice at nist dot gov, with ”186-3 Change Notice” in the subject line. The proposed changes include: clarification on how to implement the digital signature algorithms approved in the standard: the Digital Signature Algorithm (DSA), the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Rivest-Shamir-Adelman algorithm (RSA) allowing the use of additional, approved random number generators, which are used to generate the cryptographic keys used for the generation and verification of digital signatures NIST indicates that the standard provides a means of guaranteeing authenticity in the digital world by means of operations based on complex math that are all but impossible to forge but that updates to the standard are still necessary as technology changes

Criminal charges a 'real possibility' in investigation into death of unhappy spy Gareth Williams 0

Criminal charges a 'real possibility' in investigation into death of unhappy spy Gareth Williams

“The inquest into the death of an 'unhappy' spy, whose body was found locked inside a sports holdall just a week before he was due to leave his job, today heard how police may still bring criminal charges in the ongoing investigation. Gareth Williams, originally from Holyhead in Wales, had been due to leave London and return to the Governments Communications Headquarters in Gloucestershire just a week after his naked, decomposing body was found crammed inside the padlocked bag on August 25 2010

Hurt Locker Makers Return to Sue 2,514 BitTorrent Users 0

Hurt Locker Makers Return to Sue 2,514 BitTorrent Users

“Voltage Pictures, the makers of the Oscar-winning movie The Hurt Locker, have filed a new lawsuit at a federal court in Florida. By targeting at least 2,514 alleged BitTorrent users, Voltage Pictures hopes to recoup several million dollars in settlements to compensate the studio for piracy-related losses. In total, more than a quarter million people have now been sued in the US for alleged copyright infringements via BitTorrent….”