NetSec
  corner   



HOME

LINUX

CYBERLAW

VIRTUALIZATION

Bugtraq

Packetstorm

FD

GrokLaw


RSS Feed


Netsec, comsec, infosec and IA news, research and trends

 

11.12.2004

 
E-Mail Authentication Faces Hurdles

UN creates Internet governance working group

Microsoft probing reported flaws in Windows XP SP2

Novell sues Microsoft over WordPerfect

Is Your Domain Name Being Hijacked?

 
10 days into widespread exploitation of the unpatched, yes, unpatched Internet Explorer IFRAME vulnberability, and 4 days into the BOFRA Worm we are already into BOFRA.G

I hear that MyDoom.AH-mm is using IFRAME as well. Please stop using Interner Explorer.

 
Cisco Security Advisory: Crafted Timed Attack Evades Cisco Security Agent Protections



11.11.2004

 
Stopping hackers inside the network

Grisoft's Updated Free Version Of AVG Anti Virus

Trojan horse spies on Web banking

Police arrest phishing mob suspect

 
Cisco Security Advisory: Crafted Timed Attack Evades Cisco Security Agent Protections

Cisco Security Agent (CSA) provides threat protection for server and desktop computing systems, also known as endpoints. It identifies and prevents malicious behavior, thereby eliminating known and unknown security risks.

A vulnerability exists in which a properly timed buffer overflow attack may evade the protections offered by CSA. The system under attack must contain an unpatched
underlying vulnerability in system software that CSA is configured to protect. Another prerequisite for the attack is that a user must be interactively logged in during the attack.

Two days, two vulnerabilities, Cisco.

 
Bofra worm sets trap for unwary - Internet Exploder IFRAME Worm in the Wild Posing as Webcam Pics - The worm sets up an embedded web server listening on a port between 1600/TCP and 1700/TCP. Infected PCs establish an IRC session on port 6667/TCP with a variety of public IRC servers, allowing hackers to control compromised machines - from Ronnie

 
FBI: Hidden threat inside cybercrime

Viruses exploit Microsoft patch cycle



11.10.2004

 
Linux kernel binfmt_elf loader vulnerabilities

 
Cisco Security Advisory: Cisco IOS DHCP Blocked Interface Denial-of-Service

Cisco IOS devices running branches of Cisco IOS version 12.2S that have Dynamic Host Configuration Protocol (DHCP) server or relay agent enabled, even if not configured, are vulnerable to a denial of service where the input queue becomes blocked when receiving specifically crafted DHCP packets.

This vulnerability was introduced by the fix for CSCdx46180, and was integrated in Cisco IOS 12.2(14)SZ and 12.2(18)S. This issue affects only Cisco devices running affected Cisco IOS versions 12.2(18)EW, 12.2(18)EWA, 12.2(14)SZ, 12.2(18)S, 12.2(18)SE, 12.2(18)SV, 12.2(18)SW and higher that do not have the configuration command no service dhcp.

The patch needs patching.

 
DETER and EMIST Kick off Experimentation

 
Honeynet Scan of the Month 33 - A Malicious Binary Hardened Against Analysis "Found" On an XP System

 
Buffer Overflow in M$ ddeshare.exe

 
Smashing the stack for fun and profit



11.09.2004

 
Study: Information security field to grow steadily

 
Procera OptimIP Looks Interesting as a Bandwidth Management and Security Monitoring Platform. I wonder if it works?

 
Security group sets baseline standard for firewalls

 
States, artists urge top court to hear P2P case

Mozilla releases Firefox 1.0

 
Encase has a Computer Forensics Certification test available

http://www.guidancesoftware.com/corporate/press/2001/20011105.shtm

 
Silencing Windows File Protection



11.08.2004

 
The Real THR34T KR3W: The Story of Hacker Connor Hansen (as told by Conner Hansen)

 
Cyber Attacks And Breaches On The Increase

 
Analysis of the Impact of Open Source Software - "There are about 60,000 viruses known for Windows, 40 or so for the Macintosh, about 5 for commercial Unix versions, and perhaps 40 for Linux. Most of the Windows viruses are not important, but many hundreds have caused widespread damage. Two or three of the Macintosh viruses were widespread enough to be of importance. None of the Unix or Linux viruses became widespread - most were confined to the laboratory."

 
European Institute for Computer Antivirus Research

 
The "Worm" Programs--Early Experience with a Distributed Computation (1982) - John Shoch and Jon Hupp - Xerox PARC

The Case for Benevolent Viruses (1991) - Fred Cohen - USC

 
Fred Cohen is Considered the "Father" of the Modern Computer Virus



11.07.2004

 
Computer Viruses - Theory and Experiments by Fred Cohen





This page is powered by Blogger.


Site Meter Locations of visitors to this page