Thursday, August 28, 2008

Malware infects space station laptops - Network World

Malware has managed to get off the planet and onto the International Space Station, NASA confirmed today. And it's not the first time that a worm or virus has stowed away on a trip into orbit.

The attack code, which space news site SpaceRef.com identified Monday as "W32.Gammima.AG," infected at least one of the laptops used on the station, an international effort headlined by the U.S. and Russia.

NASA spokesman Kelly Humphries declined to identify the malware, saying only that anti-virus software detected a worm on July 25.

The first public report of malware about the ISS was logged earlier this month, on Aug. 11. In NASA's daily status report on the station that day, the agency said. Sergey Volkov, the International Space Station (ISS) commander, was "working on the Russian RSS-2 laptop" and "ran digital photo flash cards from stowage through a virus check with the Norton AntiVirus application."

A week later, on Aug. 21 Volkov "checked another Russian laptop, today RSK-1, for software virus by scanning its hard drives and a photo disk."

The next day, Volkov transmitted antivirus scanning results from the laptop to Earth, and American astronaut Greg Chamitoff scanned another computer for possible infection. NASA also said in Friday's report that all laptops on board the ISS were being loaded with anti-virus software.
"All A31p laptops onboard are currently being loaded with [the] latest [Norton AntiVirus] software and updated definition files for increased protection," said NASA.

W32.Gammima.AG, the name Symantec Corp., maker of Norton AntiVirus, gives the malware, is a year-old Windows worm designed to steal information from players of 10 different online games, some of them specific to the Chinese market. Among the games: ZhengTu, HuangYi Online and Rohan.

The worm also plants a rootkit on the infected system, and transmits hijacked data to a remote server.
Today, Humphries said that the worm poses no threat. "It was never a threat to any command-and-control or operations computer," he said. He refused to detail how the malware snuck aboard, citing "IT security issues," but other sources, including SpaceRef.com, speculated that it might have stowed away on a laptop or a flash card.

In fact, the Aug. 11 ISS log entry hinted at digital camera storage cards as a suspect.

"There have been other incidents," confirmed Humphries, who works at the Johnson Space Center in Houston, Tex. "I don't know when the first one was, but the station will have been in orbit for 10 years [come] November."

"If there is any good news at all, it's that the malware was designed to steal usernames and passwords from computer game players, not something that orbiting astronauts are likely to be spending a lot of time doing," said Graham Cluley, a senior technology consultant with Sophos Plc., in a post to that company's blog today. "After all, with a view like that who needs to play the likes of World of Warcraft?" Sphere: Related Content

Monday, August 25, 2008

NewsFactor Network | Black Hat Hears Security Details as Reporters Booted

The Black Hat Security Conference got off to a fast start with two reporters from a security magazine kicked out for trying to hack the pressroom systems. In other highlights at the Black Hat conference, Dan Kaminsky outlined how to hack DNS, serious holes in Google Gadgets were discussed and Cisco vulnerabilities were on the agenda.

Day one of the Black Hat Security Conference in Las Vegas got off to a hot start with details about DNS and e-mail flaws, Google gaffes, and Cisco vulnerabilities. And some French reporters were kicked out for trying to hack the pressroom facilities.

The Black Hat conference is the premiere conference for the latest in security news and tools. Nearly 7,000 attendees are listening to presentations on phishing, hacking and malware, and many are taking comprehensive training on the latest security tools and techniques to protect their networks.
Kaminsky Details DNS Flaw

Dan Kaminsky gave an in-depth briefing of the much-reported DNS flaw he discovered, with some startling new wrinkles.

First and foremost, Kaminsky estimated that only 70 percent of Fortune 500 servers have rolled out a DNS patch. Despite the fact that many servers are still exposed, Kaminsky ran through a detailed laundry list of ways to exploit the flaw before a standing-room only crowd. He may have been pushing laggards to fix the problem by releasing details.

By listening to his presentation, a hacker would have a road map to develop multiple exploits. Kaminsky also spoke in detail on how patches prevent such attacks.

Google Gadgets Vulnerable

Next up for security woes was Google's Gadgets. According to conference presenters Tom Stracener and Robert "RSnake" Hansen, Google's popular desktop gizmos are a gaping security hole waiting to be exploited. Gadgets run a variety of small tasks, such as a desktop calendar, news-feed windows, or the latest crossword puzzle.

Stracener and Hansen highlighted some scenarios.

First, a malicious Google gadget could be added to users' desktops without their knowledge, monitoring activities and collecting sensitive information.

A malicious gadget could also be used to collect account information, trigger other malicious gadgets and send users to bogus sites to fill out forms with sensitive information.

They also demonstrated JavaScript hacks of Google gadgets, underscoring their vulnerability. The duo warned that as businesses deploy desktop gadgets, significant business data could be at risk.

When Reporters Hack

InfoWorld reported that reporters from a French security magazine, Global Security Mag, were tossed out of the Black Hat conference after an apparent reporter-led hack of the pressroom facilities. Apparently the French journalists were attempting to snoop on their rivals to determine what stories they were filing.

According to a later report, the victim was a reporter working for eWeek. His password was intercepted by the French journalists using a well-known hacking technique on the unsecured portion of the LAN in the pressroom.

After the incident, eWeek had to reset its online story-filing passwords to protect its system. Sphere: Related Content

Wednesday, August 20, 2008

Georgia cyberwar overblown - Network World

Last week Russian tanks rolled into South Ossetia while Russian bombers were taking out critical communications infrastructure. But even before the first tank rolled across the disputed borders, another war was brewing in cyberspace. Sphere: Related Content

Tuesday, August 19, 2008

EASEUS Disk Copy: Free Disk Copy Software. Sector by Sector for hard drive backup tool.

Disk Copy 2.0 is a potent freeware providing sector-by-sector disk/partition copy regardless of your operating system, file systems and partition scheme. The sector-by-sector method assures you a copy 100% identity to the original. EASEUS Disk Copy can be used for copy, cloning, or upgrading your original small hard drive to a new larger drive. Simply speaking, it can copy anything from the old hard drive including the deleted, lost files and inaccessible data Sphere: Related Content

Monday, August 18, 2008

Dutch police, FBI rein in large botnet - Network World

The botnet created by a teenager who was arrested by Dutch police in a sting operation
is most notable for its total reliance on social engineering to spread, computer security
experts said Thursday. Sphere: Related Content

Anti-Georgia spammers building new botnet - Network World

Hackers targeting Georgia in the midst of its conflict with Russia have started sending out a new batch of malicious spam messages, apparently with the aim of building a new botnet network of remote-controlled computers. Sphere: Related Content

Friday, August 15, 2008

Judge refuses to lift gag order on MIT students in Boston subway-hack case

Judge refuses to lift gag order on MIT students in Boston subway-hack case

A federal judge in Boston today refused to lift a temporary restraining order preventing three MIT students from publicly discussing details of several security vulnerabilities that they found in the electronic ticketing system used by the city's mass transit authority. Sphere: Related Content

The dos and don'ts of IT job seeking - Network World

The dos and don'ts of IT job seeking - Network World

High-tech recruiter sheds light on how IT workers can help and hinder their job search with social networking sites. Sphere: Related Content

Monday, August 11, 2008

Kenyan economy to benefit from e-transaction law - Network World

Kenyan economy to benefit from e-transaction law - Network World:

"Kenya's ICT industry will contribute to at least one percent of economic growth if Parliament enacts proposed e-transaction legislation, said Marcel Werner, chairman of the Kenya ICT Federation." Sphere: Related Content

Inside the CIA's extreme technology makeover, part 4 - Network World

Inside the CIA's extreme technology makeover, part 4 - Network World:

"The CIA is undergoing a major transformation, and IT is playing a leading role. In Part 4 of our inside look at the agency, we look at how the CIA is working to 'play nicely' with the 15 other intelligence agencies. We also describe the IT department that CIO Al Tarasiuk leads and why he's protective of them and their efforts." Sphere: Related Content

The dirty half-dozen - Network World

The dirty half-dozen - Network World

Six types of rootkits and how to defend against them Sphere: Related Content

Sunday, August 10, 2008

Russian hacker gang steals with impunity, says researcher

Russian hacker gang steals with impunity, says researcher

The Russian hacker gang using a Microsoft administration tool to steal passwords has cashed in big time for years, the researcher who has tracked the group's crimes said today.

A sampling of 11% of the stolen accounts found in one directory on the gang's command-and-control server found more than a quarter-million dollars at risk, said Joe Stewart, director of malware research at Atlanta-based SecureWorks Inc. Sphere: Related Content

Saturday, August 9, 2008

Researchers mash Google Earth with electrical data to predict national grid problems | NetworkWorld.com Community

Researchers mash Google Earth with electrical data to predict national grid problems NetworkWorld.com Community

What do you get when you combine images from Google Earth and the brainpower from researchers at Oak Ridge National Labs? Well in this case you get a tool that enables real-time status of the national electric grid that federal state and local agencies can use to coordinate and respond to major problems such as wide-area power outages, natural disasters and other catastrophic events. Sphere: Related Content

Friday, August 8, 2008

Black Hat: U.S. cybersecurity director talks democracy, cyberjustice - Network World

Black Hat: U.S. cybersecurity director talks democracy, cyberjustice - Network World

The director of the National Cyber Security Center (NCSC), Rod Beckstrom, wants to see the nation’s traditions of democracy and human rights extend into the online world. Sphere: Related Content

Credit card thieves ran a polite, professional help desk - Network World

Credit card thieves ran a polite, professional help desk - Network World

The criminal network identified in the Justice Department indictments this week as having stole tens of millions of credit card numbers used people with skills in technology, finance and black markets -- some whom were notably polite, attentive and productive. Sphere: Related Content

Google Gadgets an open door for attack - Network World

Google Gadgets an open door for attack - Network World

Gadget lovers were dealt a blow on Wednesday when two researchers outlined what they called a "hole" during a Black Hat presentation.

"The attacker can forcibly install Google Gadgets; they can read the victim's search history once a malicious gadget has been installed in some specific circumstances; they can attack other Google Gadgets; they can phish usernames and passwords from victims, and so on," said Robert Hansen, also known as RSnake, a founder of security consultancy SecTheory. "Really, the sky is the limit, once the browser is under the control of an attacker. And that point is exacerbated by the fact that people trust Google be a trustworthy domain, making the attacks even easier." Sphere: Related Content

Thursday, August 7, 2008

Kaminsky: Many ways to attack with DNS - Network World

Kaminsky: Many ways to attack with DNS - Network World

There were 6 a.m. calls from Finnish certificate authorities and also some pretty harsh words from his peers in the security community, even an accidentally leaked Black Hat presentation, but after managing the response to one of the most highly publicized Internet flaws in recent memory, Dan Kaminsky said Wednesday that he'd do it all over again. Sphere: Related Content

Wednesday, August 6, 2008

Video Demonstration: Aurora Concept Video Proposes the Future of the Web

Video Demonstration: Aurora Concept Video Proposes the Future of the Web:

"What will browsing the web be like a decade from now? Leading design and UI company Adaptive Path offers one possible answer in a new concept video series called Aurora. Jesse James Garrett (the guy who coined the term AJAX) designed and narrated part one of a video series demonstrating what the future of the web might look like. There's some gorgeous, imaginative, and high-tech stuff going on here—hit the play button below to watch." Sphere: Related Content

Tuesday, August 5, 2008

Computerworld > Firewall vendors scramble to fix DNS problem

Computerworld > Firewall vendors scramble to fix DNS problem

When I sit down at my computer and type Bank of America's Web site into my browser's address bar, I expect to be taken to Bank of America. When I send an e-mail to my parents from my G-mail account, I expect that e-mail to go to my family in Memphis. But now, because of a first-of-its-kind flaw in the Internet's infrastructure, hackers can easily divert you to fake Web sites where your personal information – from your banking passwords to your e-mails – are ripe for the picking. Sphere: Related Content

ABC News: Major Web Flaw Puts Personal Info At Risk

ABC News: Major Web Flaw Puts Personal Info At Risk

When I sit down at my computer and type Bank of America's Web site into my browser's address bar, I expect to be taken to Bank of America. When I send an e-mail to my parents from my G-mail account, I expect that e-mail to go to my family in Memphis. But now, because of a first-of-its-kind flaw in the Internet's infrastructure, hackers can easily divert you to fake Web sites where your personal information – from your banking passwords to your e-mails – are ripe for the picking. Sphere: Related Content

ABC News: Meet A-Z: Hacker Behind Cybercrime Wave

ABC News: Meet A-Z: Hacker Behind Cybercrime Wave

He goes by the nickname A-Z and is one of Russia's bright young tech stars. He's a crack programmer, successful entrepreneur and creator of sophisticated software tools that help his customers make millions. Sphere: Related Content

Children's internet activity could create security problems - SC Magazine UK

Children's internet activity could create security problems - SC Magazine UK


The provider claims that 84 per cent of parents rely on a verbal agreement to ensure that their children ‘surf safely', with 48 per cent regularly using downloads. Although there are reports on personal safety while using chatrooms and social networking, there could also be a danger of technology security. Sphere: Related Content

Update: Eleven indicted in massive ID theft scheme

Update: Eleven indicted in massive ID theft scheme

Eleven people have been charged or indicted in a massive identity theft and computer fraud scheme involving some of the largest data breaches in recent U.S. history, the Department of Justice announced Tuesday Sphere: Related Content

Computerworld > DNS patches slow servers, but fast action is advised

Computerworld : DNS patches slow servers, but fast action is advised

Software patches released in early July to protect against a critical flaw in the Domain Name System protocol have slowed servers running the internet's most popular DNS implementation and crippled some Windows Server systems. Sphere: Related Content

WEIS 2008: Escalation and incentives for better security - Network World

WEIS 2008: Escalation and incentives for better security - Network World

Xia Zhao is a research fellow at the Glassmeyer/McNamee Center for Digital Strategies of the Tuck School of Business at Dartmouth. In collaboration with M. Eric Johnson, professor of operations management and director of the Center for Digital Strategies, she presented a paper entitled "Information Governance: Flexibility and Control through Escalation and Incentives." Sphere: Related Content

Monday, August 4, 2008

SecurityProPortal.com - Expect Government to be interested in your IT security.

SecurityProPortal.com - Expect Government to be interested in your IT security.

Disaster has struck and all big organisations should be preparing to pay the price. In the aftermath of the HM Revenue & Customs (HMRC) loss -of personal information and a subsequent flood of data security breaches, large organisations should be ready to prove that they can take care of personal information. Sphere: Related Content

UK Hacker is doing all he can not to get extradited to the US

UK Hacker is doing all he can not to get extradited to the US


In a last ditch effort Gary McKinnon, the UK hacker who allegedly hacked in to the Pentagon, is now taking his case to the European Court on Human Rights. McKinnon feels that his human rights were violated when the U.S. offered him a plea-bargain (something the UK courts to not do) to get a lighter sentence. He felt that by accepting this he would be opting himself out of a fair trial. Of course, he’s already admitted he did the crimes, having left a melodramatic note on the system saying among other things: Sphere: Related Content

FBI warns of new Storm Worm attacks - Network World

FBI warns of new Storm Worm attacks - Network World

A rash of complaints prompted the FBI to issue a warning of a new round of spam e-mails bombarding the Internet to spread the malicious Storm Worm.

In an announcement today, the FBI and its partner organization, the Internet Crime Complaint Center (IC3), said they've received reports of recent spam e-mails spreading the Storm Worm. The e-mails contain the phrase "F.B.I. vs. facebook," according to the warnings, and ask recipients to click on a link to view an article about the FBI and Facebook that then downloads malicious software. Sphere: Related Content

Sunday, August 3, 2008

Telecommuting poses security, privacy risks - Network World

Telecommuting poses security, privacy risks - Network World

Allowing employees to work from home and telecommute poses security and privacy risks that are not being addressed adequately by business or government, according to a study released today by consulting firm Ernst & Young in partnership with the Washington-based advocacy group Center for Democracy and Technology. Sphere: Related Content