-
Security expert: Make vendors liable for bad code
"many users, both at work and at home, aren’t motivated to keep up with security because vulnerabilities are often unseen, leaving them unaware that they are risking their own operations — and the larger global system of networks, Schneier said. "I think things are getting worse, not better," he said. To change that, the ultimate…
-
MySpace superworm creator sentenced to probation, community service
"The man responsible for unleashing what is believed to be the first self-propagating cross-site scripting worm has pleaded guilty in Los Angeles Superior Court to charges stemming from his most infamous hacking. Samy Kamkar, who was 19 when he unleashed the attack on MySpace.com in October 2005, was sentenced to three years of probation and…
-
Microsoft, Hacker Attack XSS
trib e85@gma il.com quotes "Microsoft, Hacker Attack XSS JANUARY 22, 2007 | 5:30 PM — It’s an unlikely alliance, for sure. But a Microsoft engineer and RSnake, the founder of ha.ckers. org d sla.ckers.org — which have brought attention to the epidemic of cross-site scripting (XSS) vulnerabilities in major Websites — have begun informally swapping…
-
NGSEC’s Security Game #3 – BrainStorming
NGSEC has announced version 3 of their web application security challenge. "On each level you will be presented a form asking you to authenticate. You do not know the user and the password, the goal is to bypass the authentication mechanism." Challenge Link: http://quiz.ngsec.com/game3/
-
PHP security under scrutiny
"Perhaps PHP should stand for Pretty Hard to Protect: A week after a prominent bug finder and developer left the PHP Group, data from the National Vulnerability Database has underscored the need for better security in PHP-based Web applications." … "The concerns come as attackers and security researchers have increasingly focused on finding flaws in…
-
PHP Ninja Stefan Esser Quits the PHP Security Team After Being Ignored For Reporting Issues
Apparently Stefan Esser (a key player in PHP's Security Response Team) has called it quits. Steffen is known for finding various vulnerabilities in PHP and working with the PHP Security team to identify and prevent issues in PHP itself. From his blog (Mirroring since his site appears to be getting slammed hard): "Last night I…
-
MySpace, YouTube successes open door to Web 2.0 dangers
"But in the rush to add interactive features, security has often been overlooked. Several high profile attacks have exploited weaknesses in sites using Web 2.0 technologies. The Yamanner worm hit Yahoo mail users, exploiting JavaScript and Ajax code to collect email addresses, while the Samy and Spaceflash worms spread among MySpace users changing buddy lists…
-
Exploit code hiding in cache servers
"According to Finjan Software, which has just released its latest Web trends report, caching technology used by search engines, ISPs and large companies has been discovered to harbour certain kinds of malicious code even after the website that hosted it has been taken down. Such "infection-by-proxy" code can remain in caches for as long as…
-
Hacker cracks Google Blogger security
"Google was left red-faced on Saturday when a bug in its Blogger software allowed an unauthorised user to post a comment on the official Google blog. The post, which stayed up for around an hour before being pulled, claimed that Google had abandoned its click-to-call and Adwords partnership with eBay because of "monopolistic" concerns." Article…
-
IE 7 plus Vista security measures stop latest IE 0day
A great article at ZDNet explaining how Vista + IE7 stopped the latest IE 0day from exploiting the machine. "The initial security warnings are hardly perfect. I've seen similar ActiveX opt-in dialog boxes for other built-in ActiveX components. How is an unsuspecting user supposed to know which one is safe and which is dangerous? And…
-
Microsoft Releases 8 Patches on Security Patch Tuesday
"Of the eight most serious fixes, two affect Internet Explorer, one for JScript within Internet Explorer, one in Windows Media Player, two in Windows, one in Word, and another in PowerPoint. The patch for Word fixes a highly-publicized zero-day exploit that has already been used in several cyber attacks. The vulnerability can be exploited after…
-
Software poses terror threat to UK
"Leading IT consultants have warned the US military, government and "critical infrastructure agencies" that their widespread use of outsourced commercial software is putting the nation more at risk from a cyber terrorist attack. Security experts at the Cyber Defense Agency (CDA) believe that central agencies as well as gas, electricity, telecoms and banking providers could…
-
Not All Banks Requiring SSL
According to news entry on DSHIELD some banks aren't requiring SSL, and even worse aren't submitting credentials over ssl. The findings can be found below. Research Finding Link: https://www.securewebbank.com/loginssluse.html
-
Web App Vulnerabilities Are Getting More Attention
Information weekly has written an article entitled "Web App Vulnerabilities Are Getting More Attention; Now's The Time For IT To Get Defensive" "Attacks designed to bring down networks are largely under control, even though companies still spend plenty of time defending against them. The latest addition to IT teams' worry lists: keeping Web apps from…
-
Web App Hack Incidents Are Up As Businesses Take Cover
"Web site hacks are on the rise and pose a greater threat than the broad-based network attacks that have been giving IT departments fits. Whereas attacks against networks disrupt Internet service and negatively impact companies trying to do business over the Web or private networks, attacks against Web applications threaten to steal critical customer, employee,…
-
Good worms back on the agenda
"A researcher has reopened the subject of beneficial worms, arguing that the capabilities of self-spreading code could perform better penetration testing inside networks, turning vulnerable systems into distributed scanners. The worms, dubbed nematodes after the parasitic worm used to kill pests in gardens, could give security administrators the ability to scan machines inside a corporate…
-
RSS malware plague predicted for 2006
"The fast growing popularity of RSS (really simple syndication) means that the technology will pose increasingly significant problems for IT security professionals this year, new research has warned. ScanSafe's latest web security report notes an explosive growth in the use of RSS feeds to pull updated content via HTTP and XML rather than having it…
-
Trojan Horse Program Targetting Adsense
Apparently people are uploading malware to users computers in order to modify ads displayed on websites they visit with their own ad. "Techshout.com reports that a new, deceptive Trojan Horse program has surfaced. The program is engineered to produce fake Google ads that are formatted to look like legitimate ones. The ads are incorporated in…
-
More than 450 Phishing Attacks Used SSL in 2005
Netcraft has published some statistics about phishing on their site. "In its first year, the Netcraft Toolbar Community has identified more than 450 confirmed phishing URLs using "https" urls to present a secure connection using the Secure Sockets Layer (SSL). The number of phishing attacks using SSL is significant for several reasons. Anti-phishing education initiatives…
-
Security Vendors Form Application Security Industry Consortium (AppSIC)
Apparently Microsoft, Oracle, Red Hat, and SAP have formed a vendor based security consortium titled "AppSIC" or the Application Security Industry Consortium. Quoting the article "Herbert Thompson, the consortium's chair and director of security technology at Security Innovation, says AppSIC members will meet monthly to exchange ideas and vet papers to be issued under the…
-
Rootkits, cybercrime and OneCare By TheRegister
TheRegister has a little editorial outlining some of the highlights of the year 2005 including Sony's DRM, Microsoft OneCare, Viruses, Convictions, and phishing. Article Link: Rootkits, cybercrime and OneCare: The year in IT security (TheRegister)
-
Yahoo Cross Site Scripting Vulnerability Discovered
A posting to the Full Disclosure mailing list claims an unpatched Cross Site Scripting vulnerability in Yahoo!'s mail with example script code. Quoting the author "i didnt contact yahoo, because i contacted them previously regarding a similar vulnerability, and yes they fixed it "silently" without even sending me a thank you email, frankly i didnt…
-
RSS Is Worm Bots Next Target
Yahoo news has an interesting article on worm propigation via rss feeds. "David Sancho, senior anti-virus research engineer at Trend Micro, warned that RSS feed hijacking will become commonplace when Microsoft Corp. ships Internet Explorer 7, a browser refresh that will feature built-in RSS support. In a white paper titled "The Future of Bot Worms,"…
-
ModSecurity 1.9 FINAL has been released
Ivan Ristic Writes "ModSecurity 1.9 FINAL has been released. It is available for immediate download from: http://www.modsecurity.org/download/ After more than a year in development, ModSecurity 1.9 introduces a number of changes that further increase usefulness of this web application security tool. Changes (since 1.8) ——————- Major enhancements include: * A brand new audit logging subsystem…
-
PHP Worm in the Wild
"Virus writers have created a Linux worm which uses a recently discovered vulnerability in XML-RPC for PHP, a popular open source component used in many applications, to attack vulnerable systems." – The Register Article Link http://www.theregister.co.uk/2005/11/07/linux_worm/