2010年9月1日 星期三

FW: NEWSBANK:: U.S. cautions citizens on India travel


-------------------------------------------
寄件者: Paul Ferguson (RD-US)
傳送日期: Thursday, September 02, 2010 2:24:03 PM
收件者: Newsbank
主旨: NEWSBANK:: U.S. cautions citizens on India travel
自動依照規則轉寄


U.S. cautions citizens on India travel

Alert tied to Commonwealth Games, but no specific terrorist threat cited

 

The U.S. State Department is asking Americans traveling to India or living there to be alert and cautious during the 2010 Commonwealth Games Oct. 3-14 in New Delhi.

An alert issued Wednesday by the U.S. Mission in India notes that it has "no specific threat of attack that any individual or group is planning to coincide with the games."

But it cited an Aug. 12 "Worldwide Caution" suggesting that "al-Qaida and affiliated organizations continue to plan terrorist attacks against U.S. interests" in multiple areas including Asia.

"In the event the US government receives information of any specific threat, the Department of State would provide information on that threat to the public immediately," the alert said.

It urged all Americans in or going to India to enroll with the U.S. Mission to "receive alerts as quickly as possible."

The mission said Indian authorities will be responsible for Commonwealth Games' security arrangements. Sizable crowds of tourists, athletes and VIPs will mean security screenings that will take time at game venues, it said.

Despite increased security, the mission advised Americans to "be on guard against petty crime, pickpockets, and the theft of personal property on trains or buses. Major airports, train stations, popular restaurants, and tourist sites are often used by scam artists looking to prey on visitors."

The travel alert expires Nov. 15, the State Department said.

 

http://www.msnbc.msn.com/id/38966829/ns/world_news-south_and_central_asia/

 

-ferg

 

--

"Fergie", a.k.a. Paul Ferguson

 Threat Research,

 CoreTech Engineering

 Trend Micro, Inc., Cupertino, California USA

 

 

FW: NEWSBANK:: Researchers will have access to 'real-world' data on cyber-attacks across the Internet


-------------------------------------------
From: Paul Ferguson (RD-US)
Sent: Thursday, September 02, 2010 5:34:26 AM
To: Newsbank
Subject: NEWSBANK:: Researchers will have access to ‘real-world’ data on cyber-attacks across the Internet
Auto forwarded by a Rule


Researchers will have access to ‘real-world’ data on cyber-attacks across the Internet

By: Jacob Goodwin

 

http://www.gsnmagazine.com/sites/default/files/imagecache/fullsize/cyber-warfare%20WEB.JPG

The Science and Technology Directorate at DHS is planning to gather “comprehensive real-world data” about cyber-attack phenomena, so it can make those data sets available to an estimated 200 different research organizations attempting to develop products and technologies that can better protect the nation’s computing infrastructure.

Under a program called Protected Repository for the Defense of Infrastructure Against Cyber Threats, or PREDICT, the S&T directorate seeks to make these real-world data sets widely available to researchers, who today have to rely instead on anecdotal or small-scale test experiments.

“The data sets are intended to provide developers with timely and detailed insight into cyberattack phenomena occurring across the Internet and in some cases will reveal the effects of these attacks on networks that are owned or managed by the data producers,” says a notice published by S&T in the Federal Register on September 1.

Research groups will be asked to apply for access to the PREDICT data sets by completing a newly-assembled package of forms prepared by S&T. “In addition to helping to determine whether a group is eligible to access the repository, the forms will also manage the interactions between the PREDICT portal administrators and the research groups accessing the PREDICT portal,” says the S&T notice.

The Web portal’s URL is https://www.predict.org. The Coordinating Center for PREDICT will manage the centralized repository, and act as gatekeeper for access to and release of the data. “All data input to the system is either keyed in by users (Data Providers) or migrated (via upload of XML files),” says the notice.

DHS has estimated that 206 research organizations will complete the required package of forms, and that it will take each organization an average of eight hours to do so.

Further information is available from Jeffery Harris at 202-254-6015.

“Researchers, software developers, inventors associated with an authorized sponsoring institution may be granted access to the PREDICT portal,” explains the PREDICT Web site. “In addition, organizations that provide data to the researchers or host the data may hold accounts.

“PREDICT datasets are available to approved Researchers who are conducting cyber security research that is in the interests of the United States,” the Web site continues. “All research and work involving PREDICT datasets must be carried out at locations within the 50 United States.”

 

 

http://www.gsnmagazine.com/article/21367/researchers_will_have_access_%E2%80%98real_world%E2%80%99_data_cyb

 

-ferg

 

--

"Fergie", a.k.a. Paul Ferguson

 Threat Research,

 CoreTech Engineering

 Trend Micro, Inc., Cupertino, California USA

 

 

FW: NEWSBANK:: Krebs: FCC Must Make ISPs Crack Down on Spammers and Malware


-------------------------------------------
From: Paul Ferguson (RD-US)
Sent: Thursday, September 02, 2010 5:00:56 AM
To: Newsbank
Subject: NEWSBANK:: Krebs: FCC Must Make ISPs Crack Down on Spammers and Malware
Auto forwarded by a Rule


Krebs: FCC must make ISPs crack down on spammers and malware

The FCC is looking for industry guidance on its cybersecurity roadmap. Brian Krebs says measuring security efforts by US-based ISPs and hosting companies is a critical first step.

By Brian Krebs

September 01, 2010CSO

The Federal Communications Commission (FCC) is asking for help in developing a "Cybersecurity Roadmap," an ambitious plan to identify dangerous vulnerabilities in the Internet infrastructure, as well as threats to consumers, businesses and governments.

The one piece of advice I will offer the commission is to begin measuring the responsiveness of Internet service providers (ISPs) and hosting companies in quashing malicious threats that take up residence on their networks. This is an imperative first step to prevent attacks on the Internet infrastructure, in addition to making the Internet a friendlier place for users.

The FCC said that it is seeking comments on how to proceed with the roadmap, which is part of the commission's National Broadband Plan to roll high-speed Internet services to more Americans.

The commission made the request at almost the same time as the Pew Research Center's Internet & American Life Project issued its finding that more than half of Americans disagree with federal efforts to expand broadband deployment, an effort for which the Obama administration has allocated more than $7 billion. The Pew report came as the FCC was releasing data showing that most Americans who are paying for high-speed access aren't getting anywhere near the Internet speeds they've been promised.

Here's my proposal: Instead of spending billions to squeeze even more people onto already overloaded high-speed lines, the commission should spend its resources trying to improve the security, privacy and satisfaction of people already using these networks.

The FCC now collects reams of data every month about how well the major phone companies serve their customers, measuring the quality of the services they provide by keeping track of and publishing a myriad of data points, such as the frequency of dropped calls and customer complaints. Yet, the commission largely has no reliable data with which to measure whether ISPs (many of them phone companies as well) are taking any concrete steps to make their high-speed pipes less hospitable to online threats.

For tens of millions of consumers, one of the greatest hidden "costs" of being online is dealing with seemingly incessant attacks from scammers, spammers and malicious software. Spam costs U.S. businesses and consumers more than $42 billion annually, according to 2009 estimates by Ferris Research, and Symantec now tells us that spam accounts for roughly 90 percent of all e-mail.

We hear a great deal about the cyber threat from nations such as China and Russia, but the truth is that the United States is the world's largest exporter of cybercriminal-friendly resources. Computer security firm Sophos notes that the United States continues to be the largest single source of spam, spewing more than 13 percent of junk e-mail worldwide.

According to anti-spam group Spamhaus.org, ISPs and hosting providers in the United States are by far the most popular havens for spammers, more than three times worse than China, the second country on the list.

American ISPs and hosting companies also are the top breeding grounds for sites hosting malicious software. According to an automated monitoring system set up by the University of California, Santa Barbara, U.S. based hosting providers account for seven of the world's Top 10 most malicious networks. UC Santa Barbara's rating system is unique in that it not only counts the percentage of hosts that are found to be malicious, but it also takes into account how long problematic sites persist at each hosting provider.

U.S. providers also consistently host the largest number of phishing Web sites -- counterfeit bank and e-commerce sites designed to trick people into revealing their financial and personal information: A review of the monthly statistics from Phishtank.com, a volunteer-led group that monitors phishing sites, shows the same seven U.S.-based hosting providers among the world's top 10 "phishiest" networks.

A number of other groups monitor Internet badness from a variety of unique perspectives. While there are no shortage of groups—mostly volunteer-led -- that track badness on the Internet, few measure ISP reputation from more than one particular vantage point. What is needed is a single place that gathers together information from various, trusted sources of reputation data to build a well-rounded and timely picture of which ISPs and hosting providers have the most work to do in cleaning up their networks.

ISPs serve a vital role in connecting Americans to the rest of the world, and consumers increasingly are relying upon them to deliver a growing number of traditional non-Internet services, including television, radio, telephone and video conferencing. I cannot emphasize enough that it should never be acceptable for Internet providers to abide customers who pollute the Internet for weeks and months on end.

The idea should not be to punish ISPs because they have customers whose computers are turned into spam zombies by a virus, or because they host compromised Web sites that are used in online scams: All providers face these problems. Yet currently, there is little—if any—accountability ISPs that allow these problems to fester and spread to other networks.

U.S.-based ISPs and hosting providers can be shamed into taking corrective action when publicly confronted with the magnitude of malicious activity resident on their networks. I believe that the FCC must help foster this type of awareness, simply by dedicating a portion of the funding it will receive as part of its broadband rollout efforts to gathering and publishing data on providers that are consistently the top sources of Internet evils originating in the United States.

Internet security experts constantly warn that our nation has much to lose from a potential cyber attack on our critical infrastructure, and the FCC's own request for comments acknowleges that issue. If that day ever comes, and unless our Internet providers clean up their act, most of the attacks will probably originate right here in our own backyard.

 

 

http://www.csoonline.com/article/608663/krebs-fcc-must-make-isps-crack-down-on-spammers-and-malware

 

- ferg

 

--

"Fergie", a.k.a. Paul Ferguson

 Threat Research,

 CoreTech Engineering

 Trend Micro, Inc., Cupertino, California USA

 

 

FW: NEWSBANK:: Cyber Thieves Steal Nearly $1,000,000 from University of Virginia College


-------------------------------------------
From: Paul Ferguson (RD-US)
Sent: Thursday, September 02, 2010 4:02:03 AM
To: Newsbank
Subject: NEWSBANK:: Cyber Thieves Steal Nearly $1,000,000 from University of Virginia College
Auto forwarded by a Rule


Cyber Thieves Steal Nearly $1,000,000 from University of Virginia College

Cyber crooks stole just shy of $1 million from a satellite campus of The University of Virginia last week, KrebsOnSecurity.com has learned.

http://krebsonsecurity.com/wp-content/uploads/2010/08/uvawise-300x133.jpg

The attackers stole the money from The University of Virginia’s College at Wise, a 4-year public and liberal arts college located in the town of Wise in southwestern Virginia.

Kathy Still, director of news and media relations at UVA Wise, declined to offer specifics on the theft, saying only that the school was investigating a hacking incident.

“All I can say now is we have a possible computer hacking situation under investigation,” Still said. “I can also tell you that as far as we can tell, no student data has been compromised.”

According to several sources familiar with the case, thieves stole the funds after compromising a computer belonging to the university’s comptroller. The attackers used a computer virus to steal the online banking credentials for the University’s accounts at BB&T Bank, and initiated a single fraudulent wire transfer in the amount of $996,000 to the Agricultural Bank of China. BB&T declined to comment for this story.

Sources said the FBI is investigating and has possession of the hard drive from the controller’s PC. A spokeswoman at FBI headquarters in Washington, D.C. said that as a matter of policy the FBI does not confirm or deny the existence of investigations.

The attack on UVA Wise is the latest in a string of online bank heists targeting businesses, schools, towns and nonprofits. Last week, cyber thieves stole more than $600,000 from the Catholic Diocese of Des Moines, Iowa.

 

 

 

 

http://krebsonsecurity.com/2010/09/cyber-thieves-steal-nearly-1000000-from-university-of-virginia-college/

 

-ferg

 

 

--

"Fergie", a.k.a. Paul Ferguson

 Threat Research,

 CoreTech Engineering

 Trend Micro, Inc., Cupertino, California USA

 

FW: [Newsbank] Why Smaller Botnets are Big Business

-------------------------------------------
From: David Perry (MKT-US)
Sent: Thursday, September 02, 2010 3:36:18 AM
To: Ivan Macalintal (RD-US); Newsbank
Subject: RE: [Newsbank] Why Smaller Botnets are Big Business
Auto forwarded by a Rule

NOTE: by Rental, Ivan means that the botnet itself goes out to 'rent' for further criminal or profit motivated use. This is the dominant model in the malware world today. This means that at the time of infection, the only purpose the bad guy had in mind was to capture your system. The real use only happens later.


 
David Perry | Global Director of Education

10101 North De Anza - Cupertino, California 95014 USA

Office: +1 (714) 846-5689 | Mobile: +1 (949) 500-2033


-----Original Message-----
From: Ivan Macalintal (RD-US)
Sent: Wednesday, September 01, 2010 10:04 AM
To: Newsbank
Subject: [Newsbank] Why Smaller Botnets are Big Business

That is why ZeuS is big business.

Excerpt:

'....Rather than this bigger-is-better mentality prevailing, nowadays, smaller botnets are more valuable as far as the rental business is concerned. This is largely due to the success of security researchers and law enforcement in taking down some of the big botnets and their hosts.

With the good guys now able to infiltrate and sabotage highly visible botnet operations, to the point of effectively putting them out of business for weeks - a week is a very long time in online crime activity - it has become far easier and safer for the bad guys to creep under the radar using smaller botnets. .....'

To read the complete article see:
http://www.pcpro.co.uk/realworld/360712/why-smaller-botnets-are-big-business

-- Ivan@FTR

TREND MICRO EMAIL NOTICE
The information contained in this email and any attachments is confidential and may be subject to copyright or other intellectual property protection. If you are not the intended recipient, you are not authorized to use or disclose this information, and we request that you notify us by reply mail or telephone and delete the original message from your mail system.

FW: [Newsbank] Why Smaller Botnets are Big Business

> -------------------------------------------
> ???: Ivan Macalintal (RD-US)
> ????: Thursday, September 02, 2010 1:04:19 AM
> ???: Newsbank
> ??: [Newsbank] Why Smaller Botnets are Big Business
> ????????
>
That is why ZeuS is big business.

Excerpt:

'....Rather than this bigger-is-better mentality prevailing, nowadays, smaller botnets are more valuable as far as the rental business is concerned. This is largely due to the success of security researchers and law enforcement in taking down some of the big botnets and their hosts.

With the good guys now able to infiltrate and sabotage highly visible botnet operations, to the point of effectively putting them out of business for weeks - a week is a very long time in online crime activity - it has become far easier and safer for the bad guys to creep under the radar using smaller botnets. .....'

To read the complete article see:
http://www.pcpro.co.uk/realworld/360712/why-smaller-botnets-are-big-business

-- Ivan@FTR

TREND MICRO EMAIL NOTICE
The information contained in this email and any attachments is confidential and may be subject to copyright or other intellectual property protection. If you are not the intended recipient, you are not authorized to use or disclose this information, and we request that you notify us by reply mail or telephone and delete the original message from your mail system.

FW: Newsbank :: DEF CON survey reveals vast scale of cloud hacking


-------------------------------------------
寄件者: Miguel Pascual Martinez (TS-IE)
傳送日期: Wednesday, September 01, 2010 6:39:38 PM
收件者: Newsbank
主旨: Newsbank :: DEF CON survey reveals vast scale of cloud hacking
自動依照規則轉寄


https://www.fortify.com/news-and-events/press-releases/2010/2010-08-24.html

DEF CON survey reveals vast scale of cloud hacking - and the need to bolster security to counter the problem

San Mateo, CA, August 24, 2010 — An in-depth survey carried out amongst 100 of the elite IT professionals attending this year's DEF CON 2010 Hacker conference in Las Vegas recently has revealed that hackers view the cloud as having a silver lining for them.

And a gold, platinum and diamond one, it seems, as an overwhelming 96 per cent of the respondents to the Fortify Software-sponsored poll said they believed the cloud would open up more hacking opportunities for them.

This is being driven, says Barmak Meftah, chief products officer with the software assurance specialist, by the belief from the hackers, that cloud vendors are not doing enough to address the security issues of their services.

"89 per cent of respondents said they believed this was the case and, when you analyze this overwhelming response in the light of the fact that 45 per cent of hackers said they had already tried to exploit vulnerabilities in the cloud, you begin to see the scale of the problem," he said.

"While ‘only’ 12 per cent said they hacked cloud systems for financial gain, that still means a sizeable headache for any IT manager planning to migrate their IT resources into the cloud," he added.

According to Meftah, when you factor in the prediction from numerous analysts that at the start of 2010 20 per cent of businesses would have their IT resources in the cloud within four years (http://bit.ly/7dvygF), you begin to appreciate the potential scale and complexity of the security issues involved.

In the many predictions, he explained, 20 per cent of organizations would own no appreciable IT assets, but would instead rely on cloud computing resources - the same resources that 45 per cent of the DEF CON 2010 attendees in the survey cheerfully admitted to already having tried to hack.

Breaking down the survey responses, 21 per cent believe that Software-as-a-Service (SaaS) cloud systems are viewed as being the most vulnerable, with 33 per cent of the hackers having discovered public DNS vulnerabilities, followed by log files (16 per cent) and communication profiles (12 per cent) in their cloud travels.

Remember, says Meftah, we are talking about hackers having DISCOVERED these types of vulnerabilities in the cloud, rather than merely making an observation.

DEF CON has evolved considerably since the first event was held way back in 1993, and the hackerfest in the last couple of years has attracted 8,500 of the world's top hackers and IT security researchers. “Anecdotal evidence suggests this year's Las Vegas event was even more successful, meaning that our survey results highlight the very real security challenges that lie ahead for cloud vendors and security defense professionals," he said.

"More than anything, this research confirms our ongoing observations that cloud vendors - as well as the IT software industry as a whole - need to redouble their governance and security assurance strategies when developing solutions, whether cloud-based or not, as all IT systems will eventually have to support a cloud resource," he added.

"It is of great concern to us here at Fortify that the message about software assurance has still to get through to everyone in the software development community, and the DEF CON survey results strengthen our resolve to get this message across to as large an audience as possible."

For more on Fortify Software: www.fortify.com

 

 

 

 

 

 

 

Miguel Pascual Martinez |  Technical Support Engineer , EMEA

IDA Business & Technology Park, Model Farm Road, Cork, Ireland

Office: +353 (0)21 730 7386 | Ext:18386 | www.trendmicro.com