Hackin9
LinuxSecurity.com: Updated kernel-rt packages that fix multiple security issues and one bug are now available for Red Hat Enterprise MRG 2.5. Red Hat Product Security has rated this update as having Important security [More...]
 
LinuxSecurity.com: Security Report Summary
 
LinuxSecurity.com: Updated openstack-neutron packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 4.0. Red Hat Product Security has rated this update as having Moderate security [More...]
 
LinuxSecurity.com: Several security issues were fixed in OpenJDK 7.
 
Cacti Multiple Unspecified Security Vulnerabilities
 

The muse for this diary is far from hot off the press. Many of you may have already come across the click through scam on Facebook reporting a video recording taken of Robin Williams moments before his death.  

In case you had not heard, Robin Williams is a popular American movie actor and entertainer that recently took his own life at the young age of 63.  The general public's open expression of grief for his passing has given some evil doers an opening to take advantage of human emotion.

Snopes.com has a write up on this scam. [1]   I can offer a couple of details on it.    
An image like this one will show up in your Facebook feed enticing you to click to view the video of Robin Williams.



Once the link is clicked, it will bait again the user to fill out a survey and provide some information. (PII)
The following image is the next step.


 

By clicking through this type of scam it opens a list of vectors for the user to be exploited. So please beware, educate your family, friends, and co-workers.

Let this also be a wake up call for other soft spots.  The ALS Ice Bucket challenge is viral marketing success, that could easily be exploited. So don't always trust and feel the need to meet your curiosity.

Safe clicking.

 
[1] http://www.snopes.com/computer/facebook/robinwilliams.asp

 

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
Cacti Multiple Cross Site Scripting Vulnerabilities
 
Review Board CVE-2014-5027 Unspecified Cross Site Scripting Vulnerability
 

Posted by InfoSec News on Aug 20

http://defensesystems.com/articles/2014/08/15/drones-can-hack-wifi-networks.aspx

By George Leopold
Defense Systems
Aug 15, 2014

The next major network security threat could come from the sky, in the
form of drones equipped with video cameras and the ability to sniff out
mobile devices and their unique identifiers, perhaps even establishing
rogue network access points in the sky that could be used to hack
sensitive government or corporate...
 
Microsoft Windows Installer Service CVE-2014-1814 Local Privilege Escalation Vulnerability
 
OpenStack Neutron CVE-2014-3555 Denial of Service Vulnerability
 
WordPress WP Content Source Control Plugin 'download.php' Directory Traversal Vulnerability
 
CVE-2014-5307 - Privilege Escalation in Panda Security Products
 
CVE-2014-4973 - Privilege Escalation in ESET Windows Products
 
SQL Injection Vulnerability in ArticleFR
 
[SECURITY] [DSA 3007-1] cacti security update
 

Posted by InfoSec News on Aug 20

Cyber Security EXPO is a new event for everybody wanting to protect their
organisation from the increasing commercial threat of 21st century
cyber-attacks. The challenge of securing corporate data and networks to
mitigate risk is greater than ever, so Cyber Security EXPO has been
designed to include the following themes - Internet & Network Security,
Cyber Crime, Log Data & Advanced Analytics, Identity & Access Management,...
 

Posted by InfoSec News on Aug 20

http://www.timesofisrael.com/crooks-turn-war-torn-syria-into-cyber-battlefield/

By David Shamah
The Times of Israel
August 20, 2014

Syrian hackers, known best for their attacks on vital sites in Israel, the
US, and Europe, are turning on their own people, taking advantage of their
fears about the devastating civil war around them

The Syrian Electronic Army, an outfit that has gained fame for its hacks
of government and defense websites, is...
 

Posted by InfoSec News on Aug 20

http://www.csoonline.com/article/2466726/data-protection/heartbleed-to-blame-for-community-health-systems-breach.html

By Steve Ragan
CSO
Aug 19, 2014

According to a blog post from TrustedSec, an information security
consultancy in Ohio, the breach at Community Health Systems (CHS) is the
result of attackers targeting a flaw OpenSSL, CVE-2014-0160, better known
as Heartbleed.

The incident marks the first case Heartbleed has been linked to an...
 
Microsoft Windows Kernel 'Win32k.sys' CVE-2014-0318 Local Privilege Escalation Vulnerability
 
Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities
 
ICETC2014 - IEEE Extended Submission until Aug. 28, 2014
 
[security bulletin] HPSBUX03095 SSRT101674 rev.1 - HP-UX running OpenSSL, Multiple Vulnerabilities
 
[security bulletin] HPSBUX03092 SSRT101668 rev.1 - HP-UX running Java6, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
 
FFmpeg 'libavcodec/iff.c' Memory Corruption Vulnerability
 
FFmpeg 'libavcodec/proresenc_kostya.c' Buffer Overflow Vulnerability
 
HybridAuth 'install.php' Remote Code Execution Vulnerability
 
Sprint's new lower-priced shared data plan sounds ambitious, but analysts say it doesn't go far enough and won't address the carrier's network performance sore spot.
 
VMware's Virtual SAN 1.0 combines easy setup and management with high availability and high performance -- and freedom from traditional storage systems
 
Twitter said late Tuesday it will remove images and videos of deceased people upon the request of family members, but it put conditions on the policy.
 
A type of malware called Reveton, which falsely warns users they've broken the law and demands payment of a fine, has been upgraded with powerful password stealing functions, according to Avast.
 
Apple is working its way toward releasing OS X Mountain Lion 10.9.5, very likely the last non-security update for the 10-month old operating system.
 
Historically, cloud BI has been mostly used by smaller businesses, but larger enterprises are starting to make the trek.
 
Scientists at Northeastern University are using nanotechnology to find an effective treatment for the Ebola virus, which has killed more than 1,200 people, and sickened even more.
 

Posted by InfoSec News on Aug 20

http://healthitsecurity.com/2014/08/19/identifying-and-mitigating-healthcare-it-security-risks/

By Patrick Ouellette
Health IT Security
August 19, 2014

Being proactive in healthcare IT security means picking out risks before
incidents occur, not after the fact. But the challenge is that potential
risks are spread across a variety of areas within a healthcare
organization. Blair Smith, Ph.D. Dean, Informatics-Management-Technology
(IMT) at...
 
[security bulletin] HPSBMU03101 rev.1 - HP Asset Manager, CloudSystem Chargeback, running OpenSSL, Remote Disclosure of Information or Unauthorized Access
 
[security bulletin] HPSBMU03094 rev.1 - HP Connect-IT, running OpenSSL, Remote Disclosure of Information or Unauthorized Access
 
[Call For Papers] RiseCON - Rosario, Argentina
 
[security bulletin] HPSBUX03091 SSRT101667 rev.1 - HP-UX running Java7, Remote Unauthorized Access, Disclosure of Information, and Other Vulnerabilities
 
China has approved the sale of 5 million Xbox One units, opening the way for Microsoft to make a big splash in the country's emerging console sector.
 
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
 
A tricked-out version of YouTube offering exclusive content might prove lucrative bait for Google to lure some of its users deeper into its digital video and music services.
 
An analysis by security researchers of 48,000 extensions for Google's Chrome browser uncovered many that are used for fraud and data theft, actions that are mostly undetectable to regular users.
 
It's not surprising that former Microsoft CEO Steve Ballmer abruptly gave up his board seat some six months after leaving the top job, and the move should help cement the regime and strategy of his successor Satya Nadella, according to several industry observers.
 
 
Cisco ASR 5000 Series Software CVE-2014-3331 Denial of Service Vulnerability
 

The 'human firewall': a more proactive approach to infosec
SC Magazine
Security has always been expensive, and it's getting worse. In fact, a recent survey shows 60 percent of enterprises in the U.S., Canada, UK and Australia increased their IT security spending since last year. Of the U.S. companies surveyed, nearly 50 ...

 
Fully 70% of federal agencies experienced downtime of 30 minutes or more in a recent one-month period.
 
The data breach at Community Health Systems that exposed the personal information on more than 4.5 million people is a symptom of the chronic lack of attention to patient data security and privacy within the healthcare industry.
 
Ex-CEO Steve Ballmer resigned from the Microsoft board today, effective immediately.
 
Steve Ballmer's decision to step down from Microsoft's board draws to a close a 34 year-long career that took him from business manager to CEO.
 
MIT kerberos 5 'ldap_principal2.c' Buffer Overflow Vulnerability
 
ESA-2014-071: RSA Archer® GRC Platform Multiple Vulnerabilities
 
The U.S. Federal Communications Commission has the green light to collect new data on the pricing of so-called special access services, the middle-mile network services used to deliver business broadband and mobile service backhaul.
 
Google is reportedly eying the creation of a YouTube music subscription service to take on the likes of Spotify and Pandora.
 
About six months after retiring as CEO of Microsoft, Steve Ballmer has relinquished his seat on the company's board of directors effective immediately, citing a busy schedule and confidence in the company's current and future financial performance.
 
A petition started last year that urges Apple's CEO to recall older MacBook Pro laptops to fix a graphics problem has passed the 10,000-signature mark, part of an ongoing effort to get Apple to do something.
 
Put simply, cybercrime, especially financial malware, has the potential to be quite the lucrative affair. That's only because the bad guys have the tools to make their work quick and easy, though. Cripple the automated processes presented by certain malware platforms, and suddenly the threats -- and the losses --aren't quite so serious.
 
AMD said Tuesday that it will sell three 2.5-inch SSDs manufactured by enthusiast house OCZ, allowing AMD to offer high-speed storage alongside microprocessors and graphics chips.
 

A healthcare system spanning 29 states announced on Monday that cybercriminals operating from China stole information on approximately 4.5 million patients, including names, birth dates, and Social Security numbers.

Community Health Systems, which comprises 206 facilities in the southern and western states, announced the incident in an 8-K filing submitted to the Securities and Exchange Commission (SEC). The data breach likely stems from compromises in April and June of this year, involved sophisticated malware, and is apparently connected to China, the company stated.

"The attacker was able to bypass the Company’s security measures and successfully copy and transfer certain data outside the Company," CHS said in its 8-K filing. "Since first learning of this attack, the Company has worked closely with federal law enforcement authorities in connection with their investigation and possible prosecution of those determined to be responsible for this attack."

Read 5 remaining paragraphs | Comments

 
HTC announced the HTC One (M8) smartphone for Windows todayl it's available exclusively at Verizon Wireless for $99 on a two-year contract.
 
Venture capital fundraising has picked up steam in the U.S., with cloud computing, mobile technology and robotics getting solid backing.
 
Internet Storm Center Infocon Status