End-of-Shift report
Timeframe: Montag 09-09-2013 18:00 − Dienstag 10-09-2013 18:00
Handler: Robert Waldner
Co-Handler: Stephan Richter
Book Review: The Practice of Network Security Monitoring
benrothke writes "It has been about 8 years since my friend Richard Bejtlichs (note, that was a full disclosure my friend) last book Extrusion Detection: Security Monitoring for Internal Intrusions came out. That and his other 2 books were heavy on technical analysis and real-word solutions. Some titles only start to cover ground after about 80 pages of introduction. With this highly informative and actionable book, you are already reviewing tcpdump output at page 16. In The Practice of
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/GDJ5LDb-zAY/story01.htm
Researchers Call for Ban on PHP SuperGlobal Variables
Researchers urge developers to ban PHP SuperGlobal variables in applications. These variables are wide open to remote code execution, remote file inclusion and security bypasses.
http://threatpost.com/researchers-call-for-ban-on-php-superglobal-variables/102224
Keeping Data Secret, Even From Apps That Use It
Nervals Lobster writes "Datacenters wanting to emulate Google by encrypting their data beyond the ability of the NSA to crack it may get some help from a new encryption technique that allows data to be stored, transported and even used by applications without giving away any secrets. In a paper to be presented at a major European security conference this week, researchers from Denmark and the U.K. collaborated on a practical way to implement a long-discussed encryption concept called
http://rss.slashdot.org/~r/Slashdot/slashdot/~3/xYV9IJvP0OQ/story01.htm
Online security: it’s in your interest! 1st European Cyber Security Month coming up in October
In October 2013, the first fully-fledged European Cyber Security Month (ECSM) will take place all over Europe.
http://www.enisa.europa.eu/media/press-releases/online-security-it2019s-in-your-interest-1st-european-cyber-security-month-coming-up-in-october
MIPS-Router mit Entropieproblemen
Die MIPS-Ausgabe von Linux erzeugt Zufallszahlen mit Hilfe von fragwürdigen Entropiewerten, was die Angreifbarkeit von kryptografischen Schlüsseln erhöht. Dies betrifft eine ganze Reihe von Routern für den Endverbraucher-Markt.
http://www.heise.de
iPhone 5S Phishing Mail Arrives In Time for Launch
While millions of mobile users are anticipating the launch of the new iPhone (5S and 5C), cybercriminals are already making their move to distribute spam that promise to give away the said devices for free, in the guise of a contest. We saw samples of spammed messages that attempted to spoof an Apple Store email […]Post from: Trendlabs Security Intelligence Blog - by Trend MicroiPhone 5S Phishing Mail Arrives In Time for Launch
http://feeds.trendmicro.com/~r/Anti-MalwareBlog/~3/zf_EldxUPaU/
Windows Phone 7: a look at popular apps and their data storage practices
This paper looks at how popular Windows Phone 7 apps address data storage with a focus on the platforms initial lack of data protection APIs and how that influenced the type of and manner in which data was kept on a users device.
https://www.isecpartners.com/media/106503/wp7_app_survey_storage.pdf
NSA-Affäre: Generatoren für Zufallszahlen unter der Lupe
Nachdem bekannt wurde, dass die NSA eine Backdoor in einen von NIST veröffentlichten Zufallszahlengenerator einbaute, werden nun viele Entropie-Quellen mit gesundem Misstrauen geprüft. So auch Intels Chip-basierte RDRAND-Funktion unter Linux.
http://www.heise.de/security/meldung/NSA-Affaere-Generatoren-fuer-Zufallszahlen-unter-der-Lupe-1953716.html
iPhone 5S: Fingerabdruckscanner können ausgetrickst werden
Einfache Systeme mit Fotokopien täuschbar - Experten orten Probleme auch in zentralen Datenbanken
http://derstandard.at/1378248579562
HPSBPV02918 rev.1 - HP ProCurve Manager (PCM), HP PCM+ and HP Identity Driven Manager (IDM), SQL Injection, Remote Code Execution, Session Reuse
Potential security vulnerabilities have been identified with HP ProCurve Manager (PCM), HP PCM+ and HP Identity Driven Manager (IDM). These vulnerabilities could be exploited remotely to allow SQL injection, remote code execution and session reuse.
https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03897409
Bugtraq: FreeBSD Security Advisory FreeBSD-SA-13:12.ifioctl
http://www.securityfocus.com/archive/1/528520
Bugtraq: Open-Xchange Security Advisory 2013-09-10
http://www.securityfocus.com/archive/1/528519
Bugtraq: Multiple vulnerabilities on D-Link Dir-505 devices
http://www.securityfocus.com/archive/1/528516