Ingeborg Ribsskog - Baron Adeler Malteserordenen E-post til slottet om Mette-Marit videoen Er noe galt i Martine-saken? Problemer med Grandiosa? johncons-MUSIKK johncons-REISE johncons-FOTBALL

fredag 21. oktober 2011

Jeg sendte en ny e-post til Northumbria-politiet

fromErik Ribsskog eribsskog@gmail.com
toe-policing.mailbox@northumbria.pnn.police.uk

ccemail@techwebnewsletters.com

dateFri, Oct 21, 2011 at 3:18 PM
subjectReport of crime/Fwd: Waiting For 'Son Of Stuxnet' To Attack
mailed-bygmail.com
Images from this sender are always displayed. Don't display from now on.
hide details 3:18 PM (0 minutes ago)


Hi,
Someone have registered me on a newsletter.
Regards,
Erik Ribsskog



---------- Forwarded message ----------
From: Dark Reading Weekly
Date: Thu, Oct 20, 2011 at 5:14 PM
Subject: Waiting For 'Son Of Stuxnet' To Attack
To: erib.sskog@gmail.com



If you are unable to see the message below, click here to view.

Dark Reading Weekly: Issue Highlights
• NEWS: Waiting For 'Son Of Stuxnet' To Attack
• KEYHOLE: Short On Staff, Many IT Organizations Feel Unprepared For New Threats
• BLOG: FFIEC Goes Beyond Traditional Authentication
• ANALYTIC REPORT: In-House Malware Analysis: Why You Need It, How To Do It
• WHITEPAPER: Proof Of Identity: How To Choose Multifactor Authentication
• NEWS FEED: Trend Micro Expands Mobile Protection For Android
• TECH CENTER: Authentication-As-A-Service Gains Steam
• DEEP INSPECTION: Physical, Logical Security Worlds Continue Slow Convergence
• BEST OF THE WEB: Mac Trojan Disables XProtect Updates (F-SECURE BLOG)
• BUGS: dcs-2121_firmware, dcs-2121

Manage Subscription | Contact Dark Reading | Newsletter Contact

FOLLOW US JOIN US


Thursday, October 20, 2011 KEYHOLE | BLOG | NEWS FEED | TECH CENTERS | DEEP INSPECTION | BEST OF THE WEB | BUGS
THE LATEST SECURITY NEWS ANALYSIS:
Waiting For 'Son Of Stuxnet' To Attack
Duqu is considered the intel-gathering step in advance of a new attack -- but could it have been part of the original Stuxnet attack?

Mass SQL Injection Attack Hits 1 Million Sites
Attack similar to LizaMoon hits websites lacking input validation

Banking Trojans Adapting To Cheat Out-of-Band Security
As financial institutions adopt out-of-band security, attackers quickly adapt

Strange But True Penetration-Testing Stories
'Hacker' gets kudos from his financial services victim, as in-house security cameras go rogue and steal users' credentials


MORE NEWS


DOWNLOAD DARK READING'S DIGITAL ISSUE
Sensitive data is scattered in forgotten corners of your IT infrastructure. Find and protect it before it winds up in the wrong hands.

Also: • The Practical Side Of Data Defense
• Dueling SIEM Deals
• Poor Marks For Training Programs

And much more, exclusively in our October 10 Digital Issue

DOWNLOAD NOW (Registration Required)









KEYHOLE:

Short On Staff, Many IT Organizations Feel Unprepared For New Threats
Lack of resources causes many enterprises to lose security efficiency, Symantec study says

Researchers: 'Precursor' To Son Of Stuxnet Spotted In The Wild
Process-control vendors, certificate authorities among those in the bull's eye for what might be prelude to a new Stuxnet attack, Symantec and McAfee say

DDoS, Mobile Attacks Are Top Topics Of Discussion Among Hackers
Study of large online forum finds that hackers have a wide variety of interests


MORE KEYHOLE






BLOGS:

FFIEC Goes Beyond Traditional Authentication
Posted by Richard E. Mackey, Jr.
The FFIEC recommends that organizations provide additional business and fraud detection controls to offset weaknesses in authentication technology

RIM's Biggest Network Disruption Over: Now What?
Posted by Chester Wisniewski
Service disruption becoming all too familiar outcome for BlackBerry users

Pro Pen Testing: The Zero-Knowledge Approach
Posted by Vincent Liu
Special care must be taken in a penetration test that locates targets with 'zero-knowledge'

McAfee + NitroSecurity: SIEM Merger Done Right
Posted by Rob Enderle
McAfee showcases the perfect security company merger by bringing out a SIEM offering that better anticipates an increasingly hostile world




MORE BLOGS






ANALYTIC REPORTS & WHITEPAPERS:
FEATURED REPORTS
In-House Malware Analysis: Why You Need It, How To Do It
Vulnerability management identifies and closes exploitable holes in your enterprise network. But some systems remain vulnerable, and traditional antivirus and perimeter defenses are proving less effective against sophisticated malware, targeted attacks, and zero-day exploits. In this report, we show you how malware analysis, tied closely to incident response, is an essential complement to enterprise vulnerability management programs.
DOWNLOAD NOW (Registration Required)

Database Breaches: Lessons Learned From Real-World Attacks
There's been a rash of major database breaches, including those at Gawker.com, McDonald's, and Walgreens. All the companies had solid resources at their disposal, so what went wrong? In this Tech Center report, we profile five database breaches -- and extract the lessons to be learned from each. Plus: A rundown of six technologies to reduce your risk.
DOWNLOAD NOW (Registration Required)


MORE ANALYTICS

FEATURED WHITEPAPERS
Proof Of Identity: How To Choose Multifactor Authentication
User names and passwords are no longer sufficient authentication. In a time when so much business depends on the Internet, security requirements and regulatory mandates are putting pressure on business to adopt strong, multifactor authentication methods. Learn how to weigh cost vs. risk to select the Web authentication method for your high-risk applications
DOWNLOAD NOW (Registration Required)


MORE WHITEPAPERS





NEWS FEED:
Trend Micro Expands Mobile Protection For Android

Zscaler ThreatLabZ Releases Free IPAbuseCheck

LANDesk Furthers Cloud Management Capabilities With Service Desk As A Service

Lieberman Integrates Password Manager With McAfee ePolicy Orchestrator

Application Security Inc. Adds Adds 'Active Response' Feature Set


MORE NEWS FEED






TECH CENTERS:
From The Advanced Threats Tech Center:
Waiting For 'Son Of Stuxnet' To Attack
Duqu is considered the intel-gathering step in advance of a new attack -- but could it have been part of the original Stuxnet attack?

From The Authentication Tech Center:
Authentication-As-A-Service Gains Steam
Improved security, scalability, operational flexibility, and even brand differentiation are driving AaaS

From The Cloud Security Tech Center
Survey: Organizations Are Cloud-Conflicted
Symantec survey finds less than 20 percent of organizations worldwide have fully implemented cloud services

From The Compliance Tech Center
Compliance Outside Corporate Walls
Getting third parties that touch regulated data to comply can be as important as your own internal compliance efforts

From The Database Security Tech Center:
Mass SQL Injection Attack Hits 1 Million Sites
Attack similar to LizaMoon hits websites lacking input validation

From The Insider Threat Tech Center:
Air Force Says Malware Discovered 'A Nuisance,' Not A Keylogger
Officials say online credential-stealing malware was isolated to mission support systems separate from flight systems

From The Security Monitoring Tech Center:
Many Security Pros In The Dark About Their Own Environments, Study Says
It's 9 a.m. Do you know how many Internet-facing servers you have? Many IT pros don't, according to a new RedSeal survey

From The Security Services Tech Center:
Startup To Launch New Brand Of SaaS For Post-Incident Response
'Data loss management' firm officially launches this week

From The SMB Security Tech Center:
Yet Another Bank Sued By A Small Business For Fraudulent Hacker Transfers
According to Village View, Professional Business Bank says bank responsible for $465K loss to hackers, plus fees and damages suffered in online account breach

From The Vulnerability Management Tech Center:
More Exploits For Sale Means Better Security
Selling exploits can help companies test their systems, but is there room for an independent market?





DEEP INSPECTION:
Physical, Logical Security Worlds Continue Slow Convergence
'Guards, gates, and guns' organizations say cybersecurity has become a top priority


MORE DEEP INSPECTION







BEST OF THE WEB:
Mac Trojan Disables XProtect Updates (F-SECURE BLOG)
Trojan-Downloader:OSX/Flashback.C disables the automatic updater in XProtect, Apple's built-in OS X anti-malware application

One-In-Ten Leave Passwords In Wills (MOBILEDIA)
One in 10 U.K. residents leave Internet passwords in their wills

We'll Strike First In Cyber Warfare (THE SUN)
British foreign secretary William Hague says England is prepared to strike first to defend against a cyberattack from an enemy state


MORE BEST OF THE WEB







BUGS: ENTERPRISE VULNERABILITIES:
Vulnerability: dcs-2121_firmware, dcs-2121
Published: 2011-10-16
Severity: High
Description: recorder_test.cgi on the D-Link DCS-2121 camera with firmware 1.04 allows remote attackers to execute arbitrary commands via shell metacharacters in the Password field, related to a "semicolon injection" vulnerability.

Vulnerability: dcs-2121_firmware, dcs-2121
Published: 2011-10-16
Severity: High
Description: /etc/rc.d/rc.local on the D-Link DCS-2121 camera with firmware 1.04 configures a hardcoded password of admin for the root account, which makes it easier for remote attackers to obtain shell access by leveraging a running telnetd server.

Vulnerability: mac_os_x, mac_os_x_server
Published: 2011-10-14
Severity: Medium
Description: Format string vulnerability in the debug-logging feature in Application Firewall in Apple Mac OS X before 10.7.2 allows local users to gain privileges via a crafted name of an executable file.





WEBCASTS:
Becoming A Security Detective: Gathering And Analyzing Security Intelligence In The Enterprise
Oct. 20: In this all-day virtual event, experts will offer detailed insight about how to collect security intelligence in the enterprise, and how to analyze and study it in order to efficiently identify new threats, as well as low-and-slow attacks, such as advanced persistent threats. More Information & Registration

Mobile Devices And Security--What Now?
Oct. 27: The landscape around mobile devices and mobile device security is changing rapidly. Users continue to put demands on IT to connect their personal devices to the network to conduct business, and you need to secure these devices and protect your organization's data. Join Alan Phillips, mobile security expert with Sophos, to learn about the new security challenges surrounding mobile devices. More Information & Registration


MORE WEBCASTS





RESOURCES AND EVENTS:
Malware War: How Malicious Code Authors Battle To Evade Detection
The stakes have never been higher in the fight for control of corporate and consumer devices between malicious code and the anti-malware software designed to detect and stop it. It's a war of one-upsmanship, as security labs work 'round the clock to analyze malicious code and the bad guys design new, ingenious ways to frustrate analysts and automated tools. This Tech Center report covers the key methods malware writers use to thwart analysis and evade detection.
Download Now (Registration Required)

SecTor 2011
Oct. 18-19, Toronto: Now entering its 5th year, SecTor brings together experts from around the world to share their latest research and techniques. The conference provides an opportunity for IT professionals and managers to connect with their peers and learn from their mentors.
Register Now

Hacker Halter USA 2011
Oct. 21-27, Miami: Hacker Halted USA 2011 is a comprehensive hacker conference covering a broad topic area to provide IT professionals a platform to understand and discuss today's information security environment. Hacker Halted covers real information security issues, discusses solutions that fit into global security attacks scenarios, and sheds light on how to deal with increasing threats, compliance, as well as regulatory issues.
Register Now

Black Hat Abu Dhabi
Dec. 12-15: Black Hat will host its second event in the Middle East in Abu Dhabi with a full contingent of selected Training--including new courses on mobile hacking and PHP security--and three tracks of Briefings.
Register Now




This e-mail was sent to erib.sskog@gmail.com

Dark Reading Weekly Newsletter
-- Published By Dark Reading
600 Community Drive
Manhasset, NY 11030

UNSUBSCRIBE | SUBSCRIBE

Keep Getting This Newsletter
Don't let future editions of Dark Reading Weekly go missing.
Take a moment to add the newsletter's address to your anti-spam white list:
email@techwebnewsletters.com

If you're not sure how to do that, ask your administrator or ISP.
Or check your anti-spam utility's documentation.

We take your privacy very seriously. Please review our Privacy Statement.

© 2011 | United Business Media LLC | Privacy Statement | Terms Of Service
Contact Dark Reading | Newsletter Contact

Bloggarkiv

Populære innlegg

Om meg

Bildet mitt
Overhørte på Rimi Bjørndal, (jeg jobbet som butikksjef/leder i ti år, i mange forskjellige butikker), i 2003, at jeg var forfulgt av 'mafian', mm. Har etter dette ikke fått rettighetene mine, i mange saker. Blogger derfor om problemer med å få rettigheter, mm. Mine memoarer, (Min Bok 1-10), kan også finnes på johncons-blogg, (se: 'Etiketter'). Jeg blogger også om slektsforskning, (etter at min danskfødte mormor, som var etter adelige/kongelige, døde i 2009). Har også vært såvidt innom Høyre/Unge Høyre, i sin tid. Har også studert informasjonsbehandling/IT/Computing, (på NHI, HiO IU og University of Sunderland). Har også bakgrunn fra handel og kontor, (grunnkurs, økonomi med markedsføring og data). Er/var også i Heimevernet, (etter at jeg ble overført dit, etter førstegangstjeneste i infanteriet, (og en rep-øvelse i mob-hæren), i forbindelse med omorganiseringer, i Forsvaret, etter den kalde krigen). Blir også utsatt for mye nettmobbing, mm. johncons-blogg, (og mine memoarer og nettbutikk), er kjent fra TV-programmet Tweet4Tweet, i 2012, (selv om jeg måtte klage, for programmet var veldig useriøst/nedlatende, mm.).

Totalt antall sidevisninger

Etiketter