Interesting Information Security Bits for June 13th, 2008

by kriggins on June 13, 2008

in Interesting Bits

Good morning all. Here are today's bits.

From the Blogosphere.

Via Alex Eckelberry, Brian Krebs has a note up about a nasty trojan that can change the DNS settings on your home router. Make sure you change those default passwords.

Adam shares with us that the Department of Justice has release a new report "Data Breaches: What the Underground World of “Carding” Reveals."

Jeff Jones brings to our attention a new installation option available in Windows Server 2008, Server Core. Based on his first analysis, this type of install significantly reduces the vulnerability footprint of Windows Server. He will be providing further guidance. Very interesting stuff.

Shrdlu gives us Information Security in 60 Seconds. Succinct and to the point.

The Guerilla CISO has some observations on security services as commodities and the implications of such how those services are provided. Something to think about.

Paterva has released a community version of Maltego v2. I found out via CarnalOwnage.

From the Newsosphere.

From Networkworld and The Times of India, looks like there has been a case of an Indian outsourcer stealing client data and selling it to competitors. It was only a matter of time before it happened.

From The Register, looks like the XSS monster has raised its ugly head at McAfee, Symantec and VeriSign. Orginal article at XSSed.

Informationweek informs us that a network engineer in San Diego has been sentenced to more than five years in prison. Another reminder about the insider attack.

CIO brings us a discussion about whether or not virtualization can improve security or not.

Via Dark Reading, PGP has added pre-boot authentication to their full-disk encryption solution.

The Register tells us that there is a security flaw in a populare piece of software used to manage SCADA systems. Not good.

That's it for today. Have a great Friday.


Technorati Tags: , , , , , , , , , ,

{ 0 comments… add one now }

Leave a Comment

Previous post:

Next post: