The Wayback Machine - http://web.archive.org/web/20110613083831/http://blogs.pcmag.com:80/securitywatch/
PCMag.com PCMag.com Blogs Security Watch PCMag Digital Network
 
Security Watch on Twitter
Categories:  

The news is shocking at first: "Brian Krebs, 39 and his boyfriend, Mikko Hyppönen, 42, were arrested in June for trafficking in credit cards they allegedly fabricated using legitimate account numbers purchased online from other criminals" according to Fraud-News.com.

mikkoandbrian.jpg

Just in case it wasn't obvious, Mikko and Brian are neither credit card thieves nor boyfriends. As Mikko says: "I like Brian, but not like that."

Categories:  

The worst thing about marketing in the security industry is hyperbole. I hear a lot of pitches and vendors almost always feel the need to exaggerate the level of threat, which is all the more aggravating because the actual threat is bad enough.
spyeye.png

Categories:  

WindowsUpdate.jpgadobe-lq.pngIt'll be a busy day for IT next Tuesday, June 14, 2011. Microsoft will release 16 security bulletins addressing 34 vulnerabilities in Windows, the .NET Framework, Silverlight, Forefront Threat Management Gateway, Internet Explorer, Office, SQL Server and Visual Studio. 9 of the bulletins have a maximum rating of critical.

Categories:  

Do you do online banking? If so, you may have received an invitation to install Trusteer's Rapport product. I recently got such an invite myself from Bank of America. Trusteer partners with almost 100 institutions, mostly banks but also including PayPal and eBay.

Rapport is a specialized security product for Windows and Mac targeting the financial malware. It's not a conventional antivirus product and works alongside them by securing the communications between the user and Rapport-protected web sites. This defeats keyloggers and other techniques of common banking trojans.

rapport_banner.jpg

Categories:  

In an open letter to customers, RSA Executive Chairman Art Coviello has offered to replace SecurID tokens certain customers. RSA is also offering risk-based authentication strategies for consumer-focused customers.
securid.jpg




Categories:  

playstationhack.jpgTroy Hunt, software architect and Microsoft MVP, took a crack at the password database recently stolen from Sony Pictures to see what kinds of passwords users chose. The results are, as usual with such things, discouraging.

First, the biggest security screwup in this affair clearly was made by Sony who, according to the hacking group ("LulzSec"), "...stored over 1,000,000 passwords of its customers in plaintext."

Categories:  

Thumbnail image for flashplayer_100x100.jpgAdobe has issued an "out of band" update to Flash Player on Windows, Macintosh, Linux and Solaris to fix a "universal cross-site scripting vulnerability" they learned about this past Friday, June 3.

The vulnerability could be used by an attacker to conduct actions on the user's behalf. Adobe has received reports that the vulnerability is being exploited in the wild in targeted attacks "...to trick the user into clicking on a malicious link delivered in an email message".

Flash Player 10.3.181.16 and earlier for Windows, Macintosh, Linux and Solaris are vulnerable. Users should update to version Player 10.3.181.22 (10.3.181.23 for ActiveX). Google has also released a new version 11.0.696.77 of Chrome which incorporates the update. A new version 10.3.181.22 for Android should be available this week.

Users may download the current version of Flash Player, as always, at http://get.adobe.com/flashplayer.

Adobe is investigating whether the Authplay.dll component that ships with Adobe Reader and Acrobat X (10.0.2), and which delivers Flash functionality to PDF documents, is affected. But they are not aware of any attacks using PDF.

Categories:  

Renesys is reporting that Syrian networks are accessible once again from the Internet, some as of late Friday night and the rest Saturday morning. They had been taken down Friday morning.

The downtime happened during Friday, a day which has become a traditional protest day in Arab countries in recent months. It is possible that the outage was planned specifically to disrupt any such protests. Tune in this coming Friday to see if it happens again.

syria_restoration_series-thumb-300x257-331.png

Categories:  

Thumbnail image for phone.png"...virtually none of the visual indicators that help even a moderately savvy novice computer user make informed decision are present on mobile devices" says Randy Abrams, Director of Technical Education at ESET's Cyber Threat Analysis Center.

Categories:  

syria_map_2007-worldfactbook.jpgAccording to Renesys, a service which monitors Internet connectivity, "...approximately two-thirds of all Syrian networks became unreachable from the global Internet." at 3:35 UTC today (6:35am local time).

As in many authoritarian countries, virtually all Internet connectivity in Syria flows through a single state telecom company, SyriaTel. (networks AS29256 and AS29386), which has the power to disconnect private and public networks from the rest of the Internet.

The remaining networks online are mostly government networks, although Renesys reports these are sluggish. Private networks, especially those serving mobile providers, are out.

Similar shutoffs happened in other Arab countries during protests; Egypt's shutdown didn't last long.




Categories:  

Google has uncovered a campaign, based in Jinan, China, which they say compromised the personal GMail accounts of "...senior U.S. government officials, Chinese political activists, officials in several Asian countries (predominantly South Korea), military personnel and journalists." The compromise likely happened through phishing.
googlelogo.png

Categories:  

uscc-seal.jpgAll weapons used by the US military and other agencies (like the CIA) require approval and rules for use, including "cyber-weapons." The government has a classified list of such weapons, according to the Washington Post.

Sorry, we don't have the list here for you.

Categories:  

Thumbnail image for mcafeelogo.jpgSome major botnet takedowns have resulted in a plummmetting volume of spam, but for the most part it seems like business as usual in the world of Internet threats, according to the most recent quarterly McAfee Threat Report.

Categories:  

Apple has issued Security Update 2011-003 for OS X v10.6.7 to add the OSX.MacDefender.A definition to Snow Leopard's File Quarantine feature, and to "...search for and remove known variants of the MacDefender malware."
HT4651_new3d----en.png

Categories:  

GoogleDocs.pngIt's not that surprising to find out that there are phishing sites on Google Docs, although I hadn't thought about it before. It is surprising to see Google making the situation worse.

 

Additional Resources
Download a reliable and undetectable keylogger at WebWatcherNow.com
         
 
  Ziff Davis Home | Contact Us | Advertise | Link to Us | Newsletters | RSS Feeds | Ziff Davis International
Digital Edition Customer Service | Subscribe to PCMag Digital Edition | Reprints
AppScout | Cranky Geeks | DigitalLife | DL.TV | ExtremeTech | GearLog | GoodCleanTech | PC Magazine | PCMagCasts | Security Watch | Smart Device Central | TechSaver
AppScout Mobile | Gearlog Mobile | GoodCleanTech Mobile | PCMag.com Mobile
Privacy Policy | Terms of Service | Linking Policy | Contact Us | AdChoices
Copyright © 1996-2011 Ziff Davis, Inc. All Rights Reserved. Ziff Davis, the Ziff Davis logo and Security Watch are registered trademarks of Ziff Davis, Inc. Reproduction in whole or in part in any form or medium without express written permission of Ziff Davis, Inc. is prohibited.