In the News (2014 - Issue 3)

Image removed.

  • The Limits of Packet Capture, Information Security Buzz, 21 July 2014. Packet capture data can be invaluable in digital forensics, but it is important to remember that it has its shortcomings. There are many scenarios where packet capture does not provide complete data, or is insufficient at accomplishing what it is often intended to do. (ID#: 14-50032) See http://www.informationsecuritybuzz.com/limits-packet-capture/
  • Sestus Warns Users to Be Careful of Business Centre Networks, Information Security Buzz, 22 July 2014. With the summer travel season at its peak, the U.S. Secret Service warned the hospitality industry of the cyber threat posed by public PCs and networks. Cyber criminals can introduce malware onto these systems that can sniff for passwords other personal, sensitive information. (ID#: 14-50033) See http://www.informationsecuritybuzz.com/sestus-warns-users-careful-business-centre-networks/
  • We Are Better Protected When We Work Together, Information Security Buzz, 21 July 2014. The cyber threats of today require advanced technologies and sophisticated methods to thwart, but at the end of the day, threat sharing is one of the greatest tools against such threats. Working together can help identify patterns in cyber attacks and disrupt the activities of cyber criminals. (ID#: 14-50034) See http://www.informationsecuritybuzz.com/better-protected-work-together/
  • What is memory safety?, Programming Languages Enthusiast, 21 July 2014 (Blog post). An attempt to define and examine memory safety, specifically in the C programming language. Buffer overflows, dynamic memory errors, out-of-memory errors, and misuse of pointers can cause instabilities and vulnerabilities in programs. (ID#: 14-50039) See http://www.pl-enthusiast.net/2014/07/21/memory-safety/
  • Organizations Slow at Patching Heartbleed in VMware Deployments: Report, SecurityWeek, 25 July 2014. Despite VMwareís releast of patches to address the Heartbleed vulnerability, a substantial number of organizations are vulnerable to Heartbleed attacks. The number of vulnerable systems decreased dramatically in the weeks following the disclosure of the infamous bug, but it might take years before all of them have been patched. (ID#: 14-50040) See http://www.securityweek.com/organizations-slow-patching-heartbleed-vmware-deployments-report
  • Fake Googlebots Increasingly Serve as Tools for DDoS, SecurityWeek, 24 July 2014. Bots are used by Google to help index the web and provide search results, but fake Googlebots are being used for malicious purposes. These impostors can be used for acquiring marketing data, hacking, spamming, and even executing layer 7 DDoS attacks, in an increasing trend. (ID#: 14-50041) See http://www.securityweek.com/fake-googlebots-increasingly-serve-tools-ddos-incapsula
  • UK Travel Company Fined After Card Data Hack, SecurityWeek, 25 July 2014. Think W3 Ltd., a UK-based travel company, was fined £150,000 after a lapse in security compromised payment card details of over 1.1 million customers. The hackers were able to SQL injection on a login page for an internal system, enabling them to acquire administrative access and thus obtain data held on the server. (ID#: 14-50042) See http://www.securityweek.com/uk-travel-company-fined-after-card-data-hack

Note:

Articles listed on these pages have been found on publicly available internet pages and are cited with links to those pages. Some of the information included herein has been reprinted with permission from the authors or data repositories. Direct any requests via Email to SoS.Project (at) SecureDataBank.net for removal of the links or modifications to specific citations. Please include the ID# of the specific citation in your correspondence.