Tageszusammenfassung - Mittwoch 17-10-2012

End-of-Shift report

Timeframe: Mittwoch 17-10-2012 18:00 − Mittwoch 17-10-2012 18:00 Handler: Stephan Richter Co-Handler: Robert Waldner

Kaspersky Lab Developing Its Own Operating System? We Confirm the Rumors, and End the Speculation!

"Today Id like to talk about the future. About a not-so-glamorous future of mass cyber-attacks on things like nuclear power stations, energy supply and transportation control facilities, financial and telecommunications systems, and all the other installations deemed critically important. Or you could think back to Die Hard 4 where an attack on infrastructure plunged pretty much the whole country into chaos...."


Vuln: Oracle Java SE CVE-2012-5068 Remote Java Runtime Environment Vulnerability

Oracle Java SE CVE-2012-5068 Remote Java Runtime Environment Vulnerability


Steam spawns vulnerabilities, say researchers

Gamers can be fragged by undocumented features A new security research outfit called ReVuln has presented its letter of introduction to the world in the form of a paper that analyses how the Steam protocol can expose gamers to attacks.…


Stürmischer Oktober-Patchday bei Oracle



New "Surveillance-Proof" App To Secure Communications Has Governments Nervous

"Lately, Mike Janke has been getting what he calls the hairy eyeball from international government agencies. The 44-year-old former Navy SEAL commando, together with two of the worlds most renowned cryptographers, was always bound to ruffle some high-level feathers with his new projecta surveillance-resistant communications platform that makes complex encryption so simple your grandma can use it. This week, after more than two years of preparation, the finished product has hit the


Sicherheitsrisiko Steam



Next-Generation Malware: Changing The Game In Securitys Operations Center

"In a quiet, secluded spot, a malware author is creating a new piece of code that no antivirus tool has ever seen before. Its not a particularly creative exploit -- just a slight tweak on an existing Trojan -- but it should be enough to bypass the signature-based defenses of the company hes targeting. Your company...."