InfoSec Daily Podcast Episode 837 for February 1, 2013. Tonight's podcast is hosted by Geordy Rostad, Boris Sverdlik, aricon and Justin Brown
When: February 15-17, 2013
Where: Washington DC
Spridel is going, Them is going, IronGeek is going, Bill is going.
When: March 15-17, 2013
Where: Raleigh, NC
When: March 22, 2013
Where: Tempe, AZ
Call for Sponsors is Open
CFP closes January 31
When: April 6, 2013
Where: Cathedral Hall inside the Rochester Auditorium Center
When: April 5-7, 2013
Where: San Juan, Puerto Rico
CFP is open
When: April 13-14, 2013
Where: Orlando, FL
When: April 15-19, 2013
Where: Huntington, WV
CFP is open and plain text emails Bill (dot) Gardner (at) marshall (dot) edu
Charlotte ISSA Summit
When: April 17 Training (Hands on Course)
When: April 18 Summit
CFP is open
Cost: $20 for members, $50 for partners, and $80 for Non-members
When: April 24, 2013
Where: London. England
When: April 25-27, 2013
Where: Chicago, IL
When: May 18, 2013
Where: Southwest Tennessee Community College
BsidesLV 2013 “Science Fair”
When: September 25-29, 2013
Where: Louisville, KY
Call for Training is OPEN!
Tickets and CFP opens April 1, 2013
For easy use of the Amazon Affiliate link, use AffiliateFox. Configure it for amazon.com with infdaipod05-20, and for amazon.co.uk with infdaipod-21. Thanks for supporting the podcast!
An application developer reports that the latest Java 7 update "silently" deletes Java 6, breaking applications in the process.
Java 7 update 11 was released two weeks ago to deal with an unpatched vulnerability which had gone mainstream with its incorporation into cybercrook toolkits such as the Blackhole Exploit Kit in the days beforehand. Attacks were restricted to systems running Java browser add-ons.
But Oracle's response appears to have caused some collateral damage.
JNBridge, which provides Java and .NET interoperability tools, reports that customers of software providers who use its technology came a cropper in cases where users had applied the latest Java update (Java 7u11). The software developer blogged about the issue here.
Symantec has taken the unusual step of commenting on a story about a customer, issuing a robust statement denying its anti-virus products were to blame for sophisticated targeted attack on the New York Times.
The Gray Lady revealed yesterday that it had been persistently attacked for four months by China-based cyber insurgents. They used classic APT-style techniques to breach defences before lifting New York Times staff passwords in an attempt to find out more information on an expose run by the paper into outgoing Premier Wen Jiabao.
The Wall Street Journal said today that it's been the target of Chinese hackers stemming from its coverage of China, echoing reports from other news organizations.
Hackers infiltrated the newspaper's computer system through its Beijing bureau in order to monitor the paper's coverage of China, according to the report. Paula Keve, chief spokeswoman for the Journal's parent company, Dow Jones, issued a statement that said the hacks "are not an attempt to gain commercial advantage or to misappropriate customer information." The company completed a "network overhaul" on Thursday to increase security.
Twitter disclosed on Friday evening that its systems had been attacked in the past week by an unidentified group of hackers. As a result of the the attack, the hackers may have had access to the usernames, email addresses and other sensitive information of nearly a quarter of a million twitter users.
“This week, we detected unusual access patterns that led to us identifying unauthorized access attempts to Twitter user data. We discovered one live attack and were able to shut it down in process moments later,” the company said in a blog post. “However, our investigation has thus far indicated that the attackers may have had access to limited user information – usernames, email addresses, session tokens and encrypted/salted versions of passwords – for approximately 250,000 users.”
On Friday evening, Twitter sent out emails to those users whose accounts may have been compromised, notifying them that the company had automatically reset their user passwords, and that they would need to create a new password in order to access the service again.