Monthly Archives: November 2012

Rootkit Infects Linux Web Servers


November 21, 2012 By
The Vigilant Application Owner

The H – (International) Rootkit infects Linux web servers. A previously unknown rootkit is infecting Linux Web servers and injecting malicious code into Web pages served by infected servers. The rootkit was discovered by a user of security mailing list Full Disclosure, who posted his observations, including the suspicious kernel module, to the mailing list. […]

Continue reading...

Nexus Bolsters Component Management Capabilities


November 15, 2012 By
Manfred Moser

When Maven Repository Managers (MRM) first appeared on developers’ radar, everyone using them immediately saw the benefits. Right off the bat, MRMs replaced cobbled together solutions like shared drives or local Maven repositories copied and exposed via http. Since its release four years ago, Sonatype Nexus has grown to support many repository formats. And most […]

Continue reading...

Intel Corporation: McAfee Threats Report Shows Global Expansion Of Cybercrime


November 14, 2012 By
The Vigilant Application Owner

Business Wire – (International) Intel Corporation: McAfee Threats Report shows global expansion of cybercrime. McAfee November 14 released the McAfee Threats Report: Third Quarter 2012, which explores techniques in cybercrime as well as the global evolution of cyber exploits. The latest report uncovers new details of “Operation High Roller.” It states that mobile malware almost […]

Continue reading...

Joomla 3.0.2 and 2.5.8 Available For Download, Security Fixes Included


November 9, 2012 By
The Vigilant Application Owner

Softpedia – (International) Joomla 3.0.2 and 2.5.8 available for download, security fixes included. The Joomla Project released Joomla 3.0.2 and Joomla 2.5.8. Both variants come with a number of improvements, including fixes for security issues. In Joomla 3.0.2, a medium priority cross-site scripting (XSS) vulnerability that affected the language search component was fixed. In the […]

Continue reading...

Siemens Software Targeted By Stuxnet Still Full Of Holes


November 8, 2012 By
The Vigilant Application Owner

IDG News Service – (International) Siemens software targeted by Stuxnet still full of holes. Software made by Siemens and targeted by the Stuxnet malware is still full of other dangerous vulnerabilities, according to researchers. The CTO of Positive Technologies was scheduled to give a presentation in July at Defcon, but it was pulled after Siemens […]

Continue reading...

How Hackers Scrape RAM To Circumvent Encryption


By
The Vigilant Application Owner

ZDNet – (International) How hackers scrape RAM to circumvent encryption. Speaking at Verizon’s media day forum November 7, the company’s business investigative response managing principal said the various encryption standards today do a good job of protecting data that is at rest, such as data stored on a server or in transit across a network. […]

Continue reading...

Mushrooming Ransomware Now Extorts $5 Million A Year


By
The Vigilant Application Owner

Ars Technica – (International) Mushrooming ransomware now extorts $5 million a year. Malware that disables computers and demands that hefty cash payments be paid to purported law-enforcement agencies before the machines are restored is extorting as much as $5 million from end-user victims, researchers said. The estimate, contained in a report published November 8 by […]

Continue reading...

Virtual Machine Used To Steal Crypto Keys From Other VM On Same Server


November 6, 2012 By
The Vigilant Application Owner

Ars Technica – (International) Virtual machine used to steal crypto keys from other VM on same server. Piercing a key defense found in cloud environments such as Amazon’s EC2 service, scientists devised a virtual machine that can extract private cryptographic keys stored on a separate virtual machine when it resides on the same piece of […]

Continue reading...

Users Take Their Time Over Java And Flash Updates


By
The Vigilant Application Owner

The H – (International) Users take their time over Java and Flash updates. Of the computers studied by Kaspersky in the third quarter of 2012, 35 percent suffered from a Java vulnerability and 19 percent from a vulnerability in an Adobe product. Comparing Kaspersky’s quarterly security reports from 2010-2012 shows that the Oracle and Adobe […]

Continue reading...