Search This Blog

24 Steak Burgers FREE with your order of $119+ Use Promo Code 2LOB8B12 to receive 2 Lobster Tails + 8 Steak Burgers

Active Warrants: Erie County Sheriff's Department

Saturday, October 30, 2010

US-CERT Cyber Security Update

US-CERT Current Activity

The US-CERT Current Activity web page is a regularly updated summary of the most frequent, high-impact types of security incidents currently being reported to the US-CERT.
Last reviewed: October 29, 2010 09:08:51 EDT

October 29Adobe Releases Security Update for Shockwave Player
October 28Adobe Releases Security Bulletin for Flash Player, Reader, and Acrobat
October 28Firefox 3.5 and 3.6 Vulnerability
October 27Cisco Releases Security Advisory for CiscoWorks Common Services
October 25Fraud Advisory for Consumers Released: Involvement in Criminal Activity Through Work from Home Scams
October 25Fraud Advisory for Businesses Released: Corporate Account Take Over
October 25Linux Root Access Vulnerabilities
October 25Adobe Releases Security Advisory for Shockwave Player
October 21Apple Releases Java for Mac OS X 10.5 Update 8 and Java for Mac OS X 10.6 Update 3
October 20Google Releases Chrome 7.0.517.41



Adobe Releases Security Update for Shockwave Player

added October 29, 2010 at 08:31 am Adobe has released a security update for Shockwave Player to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code.

US-CERT encourages users and administrators to review Adobe security bulletin APSB10-25 and apply any necessary updates to help mitigate the risks. Additional information regarding the 'rcsL' chunk parsing vulnerability can be found in US-CERT vulnerability note VU#402231.


Adobe Releases Security Bulletin for Flash Player, Reader, and Acrobat

added October 28, 2010 at 02:24 pm Adobe has released a security advisory to alert users of a vulnerability affecting the following applications:
  • Adobe Flash Player 10.1.85.3 and earlier for Windows, Macintosh, Linux, and Solaris
  • Adobe Flash Player 10.1.95.2 and earlier for Android
  • Adobe Reader 9.4 and earlier 9.x versions for Windows, Macintosh, and Unix
  • Adobe Acrobat 9.4 and earlier 9.x versions for Windows and Macintosh
Exploitation of this vulnerability may allow an attacker to execute arbitrary code or cause a denial-of-service condition. The advisory indicates that there are reports of active exploitation affecting Adobe Reader and Acrobat.

US-CERT encourages users and administrators to review Adobe security advisory APSA10-05 and consider implementing the suggested workarounds to help mitigate the risks until the vendor releases a fix. The advisory indicates that updates for Adobe Flash Player will be available by November 9, 2010 and updates for Adobe Reader and Acrobat will be available by November 15, 2010.

Additional information regarding this vulnerability can be found in US-CERT vulnerability note VU#298081. US-CERT will provide updates as details become available.

Firefox 3.5 and 3.6 Vulnerability

added October 27, 2010 at 09:06 am | updated October 28, 2010 at 08:24 am Mozilla has released a blog entry indicating that it is aware of a critical vulnerability affecting Firefox 3.5 and Firefox 3.6. This vulnerability may allow an attacker to execute arbitrary code. The blog entry indicates that active exploitation of this vulnerability has been detected.

Update: The Mozilla Foundation has released Firefox 3.6.12 and 3.5.15 to address this vulnerability. Additionally, this vulnerability has been addressed in Thunderbird 3.1.6 and 3.0.10.

US-CERT encourages users and administrators to apply any necessary updates to help mitigate the risks. Users should consider disabling JavaScript and using the NoScript Add-on as described in the Securing Your Web Browser (PDF) document as best-practice security measures to help protect against future vulnerabilities.


Cisco Releases Security Advisory for CiscoWorks Common Services

added October 27, 2010 at 01:59 pm Cisco has released a security advisory to address a vulnerability affecting CiscoWorks Common Services for Oracle Solaris and Microsoft Windows. This vulnerability may allow a remote, unauthenticated attacker to execute arbitrary code with administrative privileges or cause a denial-of-service condition.

US-CERT encourages users and administrators to review Cisco security advisory cisco-sa-20101027-cs and apply any necessary updates or workarounds to help mitigate the risks.


Fraud Advisory for Consumers Released: Involvement in Criminal Activity Through Work from Home Scams

added October 25, 2010 at 12:35 pm As part of a joint effort, the United States Secret Service, the Federal Bureau of Investigation, the Internet Crime Complaint Center (IC3) and the Financial Services Information Sharing and Analysis Center (FS-ISAC) have released Fraud Advisory for Consumers: Involvement in Criminal Activity through Work from Home Scams (PDF). The document explains that criminal syndicates are using newspaper ads, online employment services, and unsolicited emails to recruit consumers to launder stolen money. Individuals who are knowing or unknowing participants in this type of scheme could be prosecuted and may have their own identities or bank accounts stolen.

This advisory provides information that consumers can use to help understand and protect themselves against work from home scams. US-CERT encourages users and administrators to review this document to help protect themselves against work from home scams.


Fraud Advisory for Businesses Released: Corporate Account Take Over

added October 25, 2010 at 12:35 pm As part of a joint effort, the United States Secret Service, the Federal Bureau of Investigation, the Internet Crime Complaint Center (IC3) and the Financial Services Information Sharing and Analysis Center (FS-ISAC) have released Fraud Advisory for Businesses: Corporate Account Take Over (PDF). The document explains that cyber criminals are targeting small- and medium- sized businesses and using methods such as malicious code, phishing, and social engineering attacks to compromise business banking accounts. Once these accounts have been compromised, cyber criminals can fraudulently transfer funds out of them and can cause significant business disruption and substantial monetary loss.

This advisory provides information that businesses can use to help understand, prevent, detect, and respond to the threats of corporate account take over. US-CERT encourages users and administrators to review this document and to remain vigilant in combating the threats of corporate account takeover.


Linux Root Access Vulnerabilities

added October 25, 2010 at 10:31 am US-CERT is aware of public reports of multiple vulnerabilities affecting Linux. Exploitation of these vulnerabilities may allow an attacker to access the system with root or "superuser" privileges.

The first of these vulnerabilities is due to a flaw in the implementation of the Reliable Datagram Sockets (RDS) protocol in Linux kernel versions 2.6.30 through 2.6.36-rc8. By sending a specially crafted socket function call, an attacker may be able to write arbitrary values into kernel memory and escalate privileges to root.

This vulnerability affects Linux installations where the CONFIG_RDS kernel configuration option is set and where there are no restrictions preventing unprivileged users from loading packet family modules. Reports indicate that this may be the default configuration and that a patch for this vulnerability has been committed to the Linux kernel. Users should apply any updates for their Linux distributions to help mitigate the risks. Additionally, reports indicate that preventing the RDS kernel module from loading is an effective workaround. This can be performed by executing the following command as root:

  • echo "alias net-pf-21 off" > /etc/modprobe.d/disable-rds
The second vulnerability is due to a flaw in the library loader of the GNU C library. Exploitation of this vulnerability may allow an attacker to gain root privileges. Reports indicate that patches have not yet been released to address this issue.

US-CERT will provide additional information as it becomes available.

Adobe Releases Security Advisory for Shockwave Player

added October 25, 2010 at 08:14 am Adobe has released a security advisory to alert users of a vulnerability affecting Adobe Shockwave Player. This vulnerability may allow an attacker to execute arbitrary code or cause a denial-of-service condition.

US-CERT encourages users and administrators to review Adobe security advisory APSA10-04 and to consider implementing the workarounds provided in US-CERT Vulnerability Note VU#402231 until a fix is released by the vendor.

Additional information will be provided as it becomes available.


Apple Releases Java for Mac OS X 10.5 Update 8 and Java for Mac OS X 10.6 Update 3

added October 21, 2010 at 11:20 am Apple has released Java for Mac OS X 10.5 update 8 and Java for Mac OS X 10.6 update 3 to address multiple vulnerabilities affecting the Java package. Exploitation of these vulnerabilities may allow an attacker to execute arbitrary code or cause a denial-of-service condition.

US-CERT encourages users and administrators to review Apple articles HT4417 and HT4418 and apply any necessary updates to help mitigate the risks.


Google Releases Chrome 7.0.517.41

added October 20, 2010 at 11:47 am Google has released Chrome 7.0.517.41 for Linux, Mac, and Windows to address multiple vulnerabilities. These vulnerabilities may allow an attacker to execute arbitrary code, cause a denial-of-service condition, conduct URL spoofing, or bypass security restrictions.

US-CERT encourages users and administrators to review the Google Chrome Releases blog entry and apply any necessary updates to help mitigate the risks.


Content from US-Cert

No comments:

Advertiser

Technology Headlines

The TSA Blog

FEMA Blog

White House.gov Video Feed

NYSDOT Recent Press Releases

Indian Point Press Releases

Erie County RSS Feed

The Weather Channel: Your Local Weather Outlook--Niagara Falls, NY (14304)

Niagara County RSS Feed

National Weather Service

Albany County RSS Feed

Allegany County RSS Feed

Bronx County RSS Feed

Broome County RSS Feed

Cattaraugus County RSS Feed

Chemung County RSS Feed

City of Toronto News Releases

US Consumer Product Safety Commission - Recent Recalls and Product Safety News

Center for Missing & Exploited Children: NY Missing

Lead Photos - U.S. Dept. of Defense

Contract - U.S. Dept. of Defense

Speech - U.S. Dept. of Defense

Transcript - U.S. Dept. of Defense

FBI Extra

NASA Breaking News

NASACast Video

City of Toronto news releases, Emergency Medical Services

City of Toronto news releases, Fire Services

Speeches

Advertiser

City of Toronto news releases, Fire Services

RoyaltyFreeMusic.com Music Reviews

Automobile RSS Feed

Speed and Accuracy Statement

The information you find here is in the form of raw data, usually delivered via RSS feeds. The information is delivered via website in the most rapid manner possible. Usually this is the manner of delivery of information to media. Therefore, this service gets the audience information to the public more rapidly then any media outlet that has to re-write the information for their email club or SMS feeds.

In some cases, cases, from time to time, updates and correctons are offered by the authors of this information, Motioncenter.info is not responisble for the content of RSS feeds, press releases, or any other content. The content of the information presented is the responsiblity of the producer of the content.

There are many reasons for presenting the information as the page does. The public really never has had a view of the raw data before now. Most cases we see news packaged, polished and prioritized. This blog network offers a wide audience a variety of news, some of it is produced by Motioncenter and some by the government or other sources.

Read what you like, ignore what doesn't interest you, but at least Motioncenter doesn;t tell you what the news is, you choose.

Material Connection Disclosure

You should assume that the owner of this website has an affiliate relationship and/or another material connection to the providers of goods and services mentioned on this site and may be compensated when you purchase from a provider. You should always perform due diligence before buying goods or services from anyone via the internet or offline. THIS IS A BLOG. A NON-COMMERCIAL WEBPAGE At no time does commerce transact on this site. If it had then it would require a Secure Sockets Layer certificate and a merchant account. Being a non-commercial site there are some licensing privledges that this site will participate in. Mystuffnow is an online radio station broadcasting twenty four hours daily. This station can be bet described as a hybrid format of adult contemporary, international and ad popular music. In a sense it may, be compared to compared random radio format, but mystuffnow has three dedicated day parts. These day parts include a morning, evening and overnight separate music selection. The morning and afternoon have a selection of classic rock and current hot hits. To make the station more unique a new track, or tracks from the overnight day part have been added to make the station stand out from traditional stations that broadcast locally. The overnight day part is called “After Hours” and mimics the general principals of a quiet storm programming style where as there are fewer commercials and the music is more adult in nature, not just in lyrics but the music is more unique, offering international and slower tracks. This is meant for relaxation or whatever you may be doing in the late night hours. This station is run by computerized traffic software. At any moment a live deejay can broadcast and a morning show or news programming is possible, all playlists are run automatically. One positive of this is the fact that the software ensures that all artists get paid their royalties and this station avoids any fines for digital media issues. Update: Mystuffnow is currently off the air.

No Endorsement Statement

No endorsement is implied nor should it be inferred. No government agency, or organization has endorsed Motioncenter.Info. Motioncenter.info is a media organization with a mission of offering unbiased information as it becomes available, without any form of bias.

Privacy Policy

This is a website run by Group Speeddog Results Marketing, L.L.C... We take our readers privacy very seriously. Promotions through Third Party Merchants While this site is not endorsed or owned by any of the third party merchants appearing on this site, this site may at times receive various types of compensation when a viewer makes a purchase or clicks on a link appearing on this site. This site is not responsible for any claims or warranties associated with any third-party merchant link or website. This site does not directly collect any information regarding its viewers without your prior knowledge and permission; nor does it share their information with third-party vendors or merchants . It is not now, nor ever will be, our practice to sell your information to any third-party under any circumstance. We use third-party advertising companies to serve ads when you visit our website. These companies may use information (not including your name, address, email address, or telephone number) about your visits to this and other websites in order to provide advertisements about goods and services of interest to you. Google Advertising Cookie and Privacy Policies What is the DoubleClick DART cookie? The DoubleClick DART cookie is used by Google in the ads served on the websites of its partners, such as websites displaying AdSense ads or participating in Google certified ad networks. When users visit a partner’s website and either view or click on an ad, a cookie may be dropped on that end user’s browser. The data gathered from these cookies will be used to help better serve and manage ads on the publisher’s site(s) and across the web. *Google, as a third party vendor, uses cookies to serve ads on your site. *Google’s use of the DART cookie enables it and its partners to serve ads to your users based on their visit to your sites and/or other sites on the Internet. *Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy.
Add to The Free DictionaryAdd to Excite MIXAdd to netomat HubAdd to fwicki