Wednesday, June 24, 2009

Wednesday 06/24/09

Is Microsoft's 'Morro' Malware in Disguise? Windows Security Essentials, previously dubbed "Morro," enters its public beta today. And contrary to earlier reports, the program doesn't proxy all of your Web traffic through Microsoft's servers: Go figure?

----------

Can Facebook Be Private? Worried about privacy on Facebook? Here’s how to keep your personal information safe.

----------

Spotting the Antivirus Rogue Check out a short guide from Sunbelt Software to help identity a favorite bad guy scam job.

To help identify whether a pop-up or other warning is real, or whether it might have come from one of the many, many fake scams, Sunbelt Software yesterday put out a short guide. While it only lists a few relatively basic steps (check against a list of known bad apps, run a Google search, etc.), it's still good info to have.

----------

Oracle Users Struggle With Patch Management
Jun 18,2009
Despite new tools that speed deployment, many administrators are still far behind

----------

Not needed by us, but ugh:
Cisco Security Advisory: Vulnerabilities in Cisco Video Surveillance Products

----------

TJX reaches $9.75 million breach settlement with 41 states TJX has agreed to pay for investigations by 41 states into a massive data breach that gave hackers access to data stored on as many as 94 million payment cards used by TJX customers. Read more...
----------

ICANN: New domains coming in 2010 ICANN says the new gTLDs will provide more innovation, choice and competition on the Internet, especially for non-English language domains. The new domains can be anywhere from three to 63 characters in length and can support Chinese, Arabic and other scripts.So far, dozens of groups have announced plans to apply for new gTLDs representing cities such as .paris, regions such as .africa, charities such as .green, and generic terms such as .food and .wine. Some companies plan to reserve their own names such as .deloitte.

----------

Defense Secretary Gates approves creation of U.S. Cyber Command
The proposal to create the new command has been expected for some time and is part of an effort to address growing threats to Defense Department and Pentagon networks from foreign and domestic threats. As part of its mission, Cybercom is also expected to develop a range of offensive cyber warfare capabilities.

----------

Pro-Iranian regime hackers invade Oregon computers AP – Wed Jun 24, 2:02 pm ET PORTLAND, Ore. - Hackers broke into the computers of the Oregon University System and posted a message telling President Barack Obama to mind his own business and stop talking about the disputed Iranian election.

----------

Forcible DNA Extraction Violated the ConstitutionBy ANNIE YOUDERIAN (CN) - A Las Vegas detective violated a pre-trial detainee's constitutional rights by "forcibly extracting" his DNA without a warrant while he was shackled and chained to a bench, the 9th Circuit ruled on a 2-1 vote.

----------

Sex the Bait in Mass Orkut Compromise
With the advent of Web 2.0, social networking websites have become an easy target for online fraud and other identity scams. Lately, we have seen Twitter being used to phish out personal information, as well as MySpace scams and Facebook spams.
With more than 15 percent of the traffic from India, Orkut is perhaps the most popular and widely used social networking website in the country. Phishers have come up with an elegant approach to social-engineer the not so tech-savvy users on Orkut. They have updated the user profiles of several thousands of compromised Orkut accounts, which now link to various phished websites. These lure visiting users into divulging their personal information.

----------

No comments: