Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Sunday, February 15, 2009

Android Browser Vulnerability So Dangerous, Owners are Warned not to use it - JCXP

Android Browser Vulnerability So Dangerous, Owners are Warned not to use it - JCXP:
"Android Browser Vulnerability So Dangerous, Owners are Warned not to use it"

Read more... http://www.jcxp.net/news.php?newsid=2618

"At the Schmoocon hacker conference last Friday, security researcher Charlie Miller brought up a disturbing vulnerability within Google's Android browser that allows remote computers to take control of the browser itself, as well as other related processes, effectively compromising the phone."

It is easy to put down Microsoft IE for it's security flaws when they appear but there is a huge process in place which takes care of those and makes millions of transactions everyday either on the internet or intranet secure, fast and effortless.

Google is going to learn this now.

Microsoft Exploitability Index

What is Microsoft Exploitability Index?

Wednesday, January 21, 2009

Taking care of Win32/Conficker.B/Downadup infections.

Win32/Conficker.B exploits a vulnerability in the Windows Server service (SVCHOST.EXE) for Windows 2000, Windows XP, Windows Vista, Windows Server 2003, and Windows 2008. While Microsoft addressed this issue in October with Microsoft Security Bulletin MS08-067, and Forefront antivirus and OneCare (as well as other vendor’s anit-virus products) helped protect against infections, many systems that have not been patched manually through Server Update Services and Microsoft/Windows Update or through Automatic Updates have recently come under attack by this worm. Attacked systems may lock out users, disable our update services and block access to security-related Web sites:

In response to this threat, Microsoft has:
· Updated the January version of the MSFT to detect and remove variants of Win32/Conficker.B. You can download this version from the MSRT from either the Microsoft Update site or through its associated Knowledge Base article.

· Created the KB article 962007 “Virus alert about the Win32/Conficker.B worm” to
provide public details on the symptoms and removal methods available to address this issue.

· Announced the release of the items and the virus threat itself on the Microsoft Malware Protection Center blog.

Thursday, December 18, 2008

Fix for for IE is out (MS08-078 )

http://www.microsoft.com/technet/security/bulletin/ms08-dec.mspx?pf=true

Internet Explorer Security alert.

If you are using Internet Explorer 5,6,7 and 8 Beta 2 installed on your PC/laptop, a potential security issue has been publicly reported with Internet Explorer that is currently being investigated by Microsoft.

Until Microsoft issue a response it is strongly recommend you take the following precautionary steps when browsing.

· Only browse to sites that are known to you.
· Do not open any links to web sites in e-mails if the site or the sender is unknown to you.
· Only run with administrator rights when absolutely necessary to reduce the severity of a security attack.

Further details will follow when they are issued from Microsoft. You can view the full Microsoft security advisory here

http://www.microsoft.com/technet/security/advisory/961051.mspx

Tuesday, December 09, 2008

integrating ADAM with WSS 3.0

Here is a good read on how to get ADAM integration with WSS 3.0 for extranet type configuration.

https://blogs.pointbridge.com/Blogs/morse_matt/Pages/Post.aspx?_ID=2

The ADAM is one of the many authentication that be plugged into WSS/MOSS. This is the service provided by ASP.net provider model. For scalability i would rather be using SQL Server to store names/password. The good thing with ADAM if it can be integrated into ISA 2006 as well so it could do pre-authentication. SQL cannot be in that sense.

Tuesday, November 18, 2008

a non-secure implementation of OCS

This article, http://www.voipshield.com/news/press-releases-details.php?year=2008&id=20, talks about security concerns in OCS's use of RTP protocol.

But for anybody who is following the best practises of implementing OCS, Microsoft responded that VoIPShield's test is "on a non-secure implementation of OCS, which you would have to disable as we are secure with a default installation."

Saturday, September 06, 2008

Not so Chrome.

from the SANS Institute newsletter (NewsBites).

--Chrome Gets Some Dents
(September 3, 2008)
People have already begun to find vulnerabilities in the beta version of Google Chrome, the company's new web browser. In one scenario involving a flaw in the WebKit engine and another in Java, users could be tricked into downloading executable files. In another scenario, the browser could be crashed when users click on maliciously crafted links.

Proof-of-concept code has been posted for both vulnerabilities.
http://www.informationweek.com/news/internet/google/showArticle.jhtml?articleID=210300297
http://www.scmagazineus.com/Google-Chrome-flaws-come-soon-after-browser-release/article/116251/
http://www.heise-online.co.uk/security/Google-Chrome-beta-comes-with-security-holes--/news/111458

[Editor's Note (Pescatore): Let's see: by my math, if you multiply the security level of consumer-grade software times the security level of beta code, you get a whole mess of vulnerabilities that will be easily exploited. That said, I would love to see more competition in the browser world drive browsers to simpler code bases with more focus on security as the top feature, vs. trying to bundle in email clients and all kinds of other stuff.

(Schultz): For a nice, unbiased view of Chrome security, visit http://www.high-tower.com/blogs/bolcer/

By the way Chrome's EULA still shows
"By submitting, posting or displaying the content you give Google (NSDQ: GOOG) a perpetual, irrevocable, worldwide, royalty-free, and non-exclusive license to reproduce, adapt, modify, translate, publish, publicly perform, publicly display, and distribute any Content which you submit, post, or display on or through, the Services."

Friday, March 07, 2008

Security Certification and Education

The Committee on National Security Systems (CNSS) / National Security Agency ( NSA) of the United States of America certified EC-Council Network Security Administrator Certification as 100% mapped to the CNSS National Standards 4011.


This certification is made by the Information Assurance Courseware Evaluation (IACE) Program, National INFOSEC (Information Security) Education and Training Program and is administered by the U.S. National Security Agency (NSA).The Committee on National Security Systems (CNSS) and National Security Agency (NSA) have developed a nationally recognized certification program based on NSTISSI standards. The CNSS / NSA Certification is a government class certification that is the National Training Standard for Information Security Professionals


For more information -> http://www.eccouncil.org/newsletter/CNSS.swf

Tuesday, February 05, 2008

Sunday, January 27, 2008

Fast Facts

· 79 million personal records were reported compromised last year in the U.S., nearly four times greater than in 2006. Source: Identity Theft Resource Center
· More than 20% of commercial applications are open to attack because available fixes for security flaws have not been applied. Source: Secunia APS

Wednesday, August 15, 2007

Forefront Security for SharePoint SP1 Available Now

This is the posting at the SharePoint Team BLOG about the availability of SP1 (Service Pack 1) of Forefront Security for SharePoint, not to be confused with Windows SharePoint Services 3.0 SP1 or Office SharePoint Server 2007 SP1 which will be released at a later date.

Sunday, August 12, 2007

Off line patching...WSUS Offline

http://www.vulnerabilityassessment.co.uk/ctupdate.htm

From a forum
"
This tool will allow you to run on a machine downloading every day, building an ISO.
This way you always have an up-to-date CD-image at hand when you need it.

The tool uses the same CAB-file as MBSA and you can manually add extra hotfixes.
"

Monday, July 09, 2007

I Know What You Did Last Logon: Monitoring Software, Spyware, and Privacy

http://go.microsoft.com/?linkid=6951838
This white paper from the Microsoft Antimalware Team explores the technical methods used by both hardware- and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and the social and legal appropriateness of various use scenarios.

Password Checker

http://go.microsoft.com/?linkid=6951842
Online accounts, computer files, personal information, and company information are more secure when you use strong passwords to help protect them. Offer this tool to your co-workers to help them gauge the strength of their passwords.