Friday, September 12, 2008

Security News Feed Friday 9/12/08

Microsoft defends IE8 'phone home' feature, clarifies privacy policy Microsoft is defending the IE8 tool that suggests sites based on the URLs typed into its address bar, saying that the browser only sends a limited amount of data to Microsoft -- and all user IP addresses are tossed almost immediately. Read more...





Former Intel engineer charged with stealing trade secrets





Hackers Hit Large Hadron Collider site





Cloud computing could prompt government action





Investigations: Merge Ahead
In the enterprise setting, there's no such thing as a digital investigation. Or a physical one. Searching for clues and resolutions requires a blend of disciplines governed by a flexible forensic mind-set.
Read more






Why Can't I Open Vista's Cookies Folder? Lamar Redmon wants to know why he can't access Vista's Cookies folder typing "cookies" and selecting it.






Blast from the future?
Published: 2008-09-12,Last Updated: 2008-09-12 15:31:22 UTCby Mark Hofman (Version: 1)

It is 1995 and users are complaining that a weird dialog box is popping up in their word document. The first macro virus was doing the rounds. Fast forward to September 2008 and yes you guessed it new word macro viruses are doing the rounds. They have been updated somewhat. Rather than pop up a little dialog box it is behaving more like the traditional downloaders and the road to pain afterwards. Rechnung.doc has been around for a few days now and detection rates are pretty good, 23/36

(http://www.virustotal.com/analisis/0fc3a70eff0b9ec447794acbda2402e7 ). So far seems to be mostly Europe. However that is not the only one doing the rounds, Michael passed one along that seems to have fairly bad detect rates, which we've passed on to the AV vendors so detect rates should improve.







The Doghouse: Tornado Plus Encrypted USB Drive
Don't buy this:
My first discussion was with a sales guy. I asked about the encryption method. He didn't know. I asked about how the key was protected. Again, no idea. I began to suspect that this was not the person I needed to speak with, and I asked for a "technical" person. After a short wait, another sales guy got on the phone. He knew a little more. For example, the encryption method is to XOR the key with the data. Those of you in the security profession know my reaction to this news. For those of you still coming up to speed, XORing a key with data to encrypt sensitive information is bad. Very bad.







http://blogs.washingtonpost.com/securityfix/
Web Fraud 2.0: Fake YouTube Page Maker Helps Spread Malware
A new Web Fraud 2.0 tool makes it a cakewalk for criminals to create fake YouTube pages in a bid to trick people into installing malicious software.








IT: Virginia Supreme Court Strikes Down Anti-Spam Law






The_AV8R writes
"Jonathan Zdziarski showed that every time you press the Home button on your iPhone, a screen capture is taken in order to produce a visual effect. This image is then cached and later deleted. Zdziarski says that there have been cases of law enforcement looking up sex offenders' old data and checking recovered screenshots." This revelation occurred in the midst of a webcast on iPhone forensics, demonstrating how to bypass the iPhone's password security (not trivial but doable). Video from the talk is not online yet but is promised soon over at O'Reilly.






Microsoft Live Mesh: What are the Security Implications?
by Deb Shinder
Articles / Web Application Security
The security implications of cloud computing in general and Live Mesh in particular, and what mechanisms Microsoft has built in to protect your "meshed" devices and data.






Anonymization: A Google farce?
Garett Rogers: Google says its "anonymizing" their log files after just 9 months instead of the previous 18, without anonymized cookie data, scrubbed IP addresses could be useless.






More Windows-specific consumer ads coming soon
Mary Jo Foley: If you liked the first Bill Gates/Jerry Seinfeld ad for Microsoft, you'll probably love the second. If you didn't, there's hope: A more Windows-centric one will air in a matter of days.






Fake 'anti-virus' campaigns continueSeptember 12, 2008
Malicious spam campaigns from Srizbi and Pushdo promoting fake 'anti-virus' continue.






University Bans Access To Facebook; Claims It's A Security Issue






Text Message Monopoly Alleged
CHICAGO (CN) - The price of cell-phone text messages has doubled since 2005 because Verizon, AT&T, Sprint-Nextel and T-Mobile conspired to fix prices, an antitrust class action claims in Federal Court. The four companies control more than 90 percent of the U.S. market.






Pirate Bay Boycotts Press After Television Ambush
The Pirate Bay, the controversial BitTorrent tracking site in Sweden, has become ensnared in a grisly, high-profile scandal involving the circulation of autopsy pictures of two murdered children online.








The negative spiral of false-postitves identified by e-mail filters
A study on messaging and Web security we conducted earlier this year asked messaging-oriented... ...4

No comments: