Tageszusammenfassung - Mittwoch 2-07-2014

End-of-Shift report

Timeframe: Dienstag 01-07-2014 18:00 − Mittwoch 02-07-2014 18:00 Handler: Alexander Riepl Co-Handler: n/a

Microsoft Expands TLS, Forward Secrecy Support

Microsoft announced TLS support on Outlook.com and that OneDrive cloud storage now supports Perfect Forward Secrecy.

http://threatpost.com/microsoft-expands-tls-forward-secrecy-support/106965


Cisco Small Cell Command Execution Vulnerability

http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3307


DOWNAD Tops Malware Spam Source in Q2 2014

DOWNAD , also known as Conficker remains to be one of the top 3 malware that affects enterprises and small and medium businesses. This is attributed to the fact that a number of companies are still using Windows XP, susceptible to this threat. It can infect ..

http://blog.trendmicro.com/trendlabs-security-intelligence/downad-tops-malware-spam-source-in-q2-2014/?


VMSA-2014-0006.4

VMware product updates address OpenSSL security vulnerabilities

http://www.vmware.com/security/advisories/VMSA-2014-0006.html


Microsoft Digital Crimes Unit disrupts Jenxcus and Bladabindi malware families

Today, following an investigation to which the Microsoft Malware Protection Center (MMPC) contributed, the Microsoft Digital Crimes Unit initiated a disruption of the Jenxcus and Bladabindi malware families. These families are believed to have been created by individuals Naser Al Mutairi, aka njQ8, and ..

http://blogs.technet.com/b/mmpc/archive/2014/06/30/microsoft-digital-crimes-unit-disrupts-jenxcus-and-bladabindi-malware-families.aspx


MONSTER COOKIES can nom nom nom ALL THE BLOGS

Blog networks can be force-fed more than they can chew Giant cookies could be used to create a denial of service (DoS) on blog networks, says infosec researcher Bogdan Calin.

http://go.theregister.com/feed/www.theregister.co.uk/2014/07/02/monster_cookies_can_nom_nom_nom_all_the_blogs/


Transparenzzentrum: Microsoft gewährt Behörden Quellcode-Einsicht

In einem Transparenzzentrum will Microsoft Behörden, die Code-Manipulationen durch fremde Geheimdienste befürchten, die Gelegenheit bieten, den Source-Code selbst zu untersuchen.

http://www.heise.de/security/meldung/Transparenzzentrum-Microsoft-gewaehrt-Behoerden-Quellcode-Einsicht-2245711.html


Anatomy of a buffer overflow - Googles "KeyStore" security module for Android

Heres a cautionary tale about a bug, courtesy of IBM. Not that IBM had the bug, just to be clear: Google had the bug, and IBM researchers spotted it.

http://nakedsecurity.sophos.com/2014/07/02/anatomy-of-a-buffer-overflow-googles-keystore-security-module-for-android/


OpenSSL legt Sanierungsplan vor

Nach der Heartbleed-Katastrophe hat das OpenSSL-Projekt nun eine Roadmap veröffentlicht, die helfen soll, organisatorische Mängel im Entwicklungsprozess auszubessern.

http://www.heise.de/security/meldung/OpenSSL-legt-Sanierungsplan-vor-2248106.html


Rig Exploit Kit Used in Recent Website Compromise

Attackers planted code in a popular Web portal to redirect users to an exploit kit ..

http://www.symantec.com/connect/blogs/rig-exploit-kit-used-recent-website-compromise