Skip to content

CyberSecurity Institute

Security News Curated from across the world

Menu
Menu

Month: November 2003

Future virus fighting

Posted on November 26, 2003December 30, 2021 by admini

In general, an unknown writer identifies a vulnerability in a common system, writes software to exploit it and releases it to his chums and the antivirus companies, sometimes into the wild. The virus is analysed, a unique pattern within it is identified and the antivirus companies release the update to their customers.

One approach to counter that is heuristic analysis, where software examines email attachments and incoming files and attempts to work out what they actually do. A more advanced form of heuristic scanning involves running the code, either in emulation or a virtual machine, and watching for dangerous activity.

Yet another approach is to monitor not the suspect code, but the entry points to the operating system: as software runs, the antivirus program constantly checks for dangerous activity.

One of the latest demonstrations comes from Washington University, where John Lockwood and his students have developed a device called the Field Programmable Port Extender (FPX) that can scan incoming bitstreams at up to 2.4 gigabits per second. The hardware builds incoming packets into a message, analyses the protocol headers and compares the contents of the message against a database of known signatures — all things that are normally done in software.

More info: [url=http://insight.zdnet.co.uk/0,39020415,39118047,00.htm]http://insight.zdnet.co.uk/0,39020415,39118047,00.htm[/url]

Read more

Microsoft To Test Providing Security Updates On CD

Posted on November 26, 2003December 30, 2021 by admini

Microsoft is considering a release of security updates on CD for users of its older operating systems who lack broadband connections to the Internet, according to an e-mail sent to prospective beta testers on Tuesday. The e-mail invites beta testers who are using Windows 98, Windows 98 Second Edition, and…

Read more

Senate OKs Anti-Spam Bill

Posted on November 26, 2003December 30, 2021 by admini

The bill, which would override all existing state anti-spam laws, puts numerous restrictions on the marketing e-mail messages companies can send to users, levies fines and jail terms for offenders, and instructs the Federal Trade Commission to report to Congress on a plan to create a ‘do-not-spam’ list, one similar to the that recently put into place by the FTC which prevents telemarketers from calling consumers who have added their names and phone numbers to the list.

Criminal charges are also part and parcel of the CAN SPAM Act, with penalties ranging up to five years in prison for such practices as hacking into another person’s computer with the intent of sending spam from the hijacked machine, falsifying header information in bulk junk mail, and registering five or more e-mail accounts using false information then using those ill-gotten accounts to blow spam onto the Internet.

More info: [url=http://www.securitypipeline.com/news/showArticle.jhtml;jsessionid=DZDJ4BPE4AWPCQSNDBCSKHY?articleId=16400839]http://www.securitypipeline.com/news/showArticle.jhtml;jsessionid=DZDJ4BPE4AWPCQSNDBCSKHY?articleId=16400839[/url]

Read more

For security ask yourself…what would Microsoft do?

Posted on November 26, 2003December 30, 2021 by admini

The paper, simply titled “Security at Microsoft,” details the methods and technologies that the company’s Operations and Technology Group (OTG) use to secure the company’s global corporate network of more than 300,000 computers and 4,200 servers.

In the paper, Microsoft describes its risk management strategy, which involves classifying different computing resources according to their “value class” — from servers hosting the Windows source code down to test servers.

Microsoft also provides guidance on how its security group assesses the potential risks and threats to those assets and creates policies to secure the assets that are appropriate, given the value of the data they contain.

To protect corporate assets from threats introduced by remote workers, Microsoft said it has invested heavily in smart card technology, deploying more than 65,000 smart cards to remote workers that enable them to log on to the corporate network using two-factor authentication.

The company is also candid in admitting to past security failures, acknowledging that the company has been attacked in the past and that “there is a medium to high probability that within the next year, a successful attack will occur that could compromise the High Value and/or Highest Value data class,” such as source code or human resources data, according to the document.

Microsoft centrally monitors the patch level of machines on its network using its own Systems Management Server 2003 product, enforces the application of security patches “without end-user intervention” and prohibits users from disabling security patch management features without “an approved exemption,” according to the document.

In addition to publishing the white paper, Microsoft has started broadcasting monthly webcasts featuring senior security executives, who articulate the company’s message on securing its products and answer questions from IT professionals about where to find software patches and technical information, Nash said in an interview on Monday.

The company has also launched a new security portal called the “IT Pro Security Zone” that brings together information on security best practices and provides access to Microsoft MVPs (Most Valuable Professionals), experts on the company’s technology who are active participants in technology news groups and online discussions.

After reading the white paperRuss Cooper,surgeon general of TruSecure. and moderator of the NTBugtraq security discussion list, said that it probably had more public relations than technical value, especially with a reading audience made up of administrators at companies with constrained budgets.

More info: [url=http://www.infoworld.com/article/03/11/21/HNmssecurity_1.html]http://www.infoworld.com/article/03/11/21/HNmssecurity_1.html[/url]

Read more

Microsoft to launch SUS 2.0 beta in January

Posted on November 26, 2003December 30, 2021 by admini

The first major improvement is the ability to go beyond the operating system and patch Windows’ application content. This will be done through a feature called Microsoft Update, as opposed to Windows Update, which Microsoft cannot use for this purpose because of the software maker’s antitrust settlement with the federal government.

As Microsoft said earlier this year, the company is boiling down the number of installers it currently uses — from four to two.

Microsoft Installer for Windows (MSI 3.0) is currently in beta and will be released at the same time as SUS 2.0.

In SUS 2.0, administrators can choose the language and content they want, whereas today, anything connected to a SUS Server gets patched. This is one of the main differentiators between the patch manager and SMS, which just began shipping in its latest version earlier this month. “Reducing the size of the package is huge,” said Roger Wilding, a senior technical engineer at CNF, a Palo Alto, Calif.-based transportation and shipping company.

Questions continue to arise about the level of integration SUS will have with SMS 2003. Today, SMS 2.0 and SUS 1.0 are built on completely different architectures, but Microsoft plans to build SMS on top of SUS so there is a common architecture and experience.

More info: [url=http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci938503,00.html]http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci938503,00.html[/url]

Read more

Nachi worm infected Diebold ATMs

Posted on November 26, 2003December 30, 2021 by admini

The machines were in an advanced line of Diebold ATMs built atop Windows XP Embedded, which, like most versions of Windows, was vulnerable to the RPC DCOM security bug exploited by Nachi, and its more famous forebear, Blaster.

At both affected institutions the ATMs began aggressively scanning for other vulnerable machines, generating anomalous waves of network traffic that tripped the banks’ intrusion detection systems, resulting in the infected machines being automatically cut off, Diebold executives said.

Though ATMs typically sit on private networks or VPNs, the most serious worms in the last year have demonstrated that supposedly-isolated networks often have undocumented connections to the Internet, or can fall to a piece of malicious code inadvertently carried beyond the firewall on a laptop computer.

January’s Slammer worm indirectly shut down some 13,000 Bank of America ATMs by infecting database servers on the same network, and spewing so much traffic that the cash machines couldn’t processes customer transactions.

More info: [url=http://www.securityfocus.com/news/7517]http://www.securityfocus.com/news/7517[/url]

Read more

Posts navigation

  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 13
  • Next

Recent Posts

  • AI/ML News – 2024-04-14
  • Incident Response and Security Operations -2024-04-14
  • CSO News – 2024-04-15
  • IT Security News – 2023-09-25
  • IT Security News – 2023-09-20

Archives

  • April 2024
  • September 2023
  • August 2023
  • July 2023
  • June 2023
  • April 2023
  • March 2023
  • February 2022
  • January 2022
  • December 2021
  • September 2020
  • October 2019
  • August 2019
  • July 2019
  • December 2018
  • April 2018
  • December 2016
  • September 2016
  • August 2016
  • July 2016
  • April 2015
  • March 2015
  • August 2014
  • March 2014
  • August 2013
  • July 2013
  • June 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • October 2012
  • September 2012
  • August 2012
  • February 2012
  • October 2011
  • August 2011
  • June 2011
  • May 2011
  • April 2011
  • February 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • June 2009
  • May 2009
  • March 2009
  • February 2009
  • January 2009
  • December 2008
  • November 2008
  • October 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • December 2007
  • November 2007
  • October 2007
  • September 2007
  • August 2007
  • July 2007
  • June 2007
  • May 2007
  • April 2007
  • March 2007
  • February 2007
  • January 2007
  • December 2006
  • November 2006
  • October 2006
  • September 2006
  • August 2006
  • July 2006
  • June 2006
  • May 2006
  • April 2006
  • March 2006
  • February 2006
  • January 2006
  • December 2005
  • November 2005
  • October 2005
  • September 2005
  • August 2005
  • July 2005
  • June 2005
  • May 2005
  • April 2005
  • March 2005
  • February 2005
  • January 2005
  • December 2004
  • November 2004
  • October 2004
  • September 2004
  • August 2004
  • July 2004
  • June 2004
  • May 2004
  • April 2004
  • March 2004
  • February 2004
  • January 2004
  • December 2003
  • November 2003
  • October 2003
  • September 2003

Categories

  • AI-ML
  • Augment / Virtual Reality
  • Blogging
  • Cloud
  • DR/Crisis Response/Crisis Management
  • Editorial
  • Financial
  • Make You Smile
  • Malware
  • Mobility
  • Motor Industry
  • News
  • OTT Video
  • Pending Review
  • Personal
  • Product
  • Regulations
  • Secure
  • Security Industry News
  • Security Operations
  • Statistics
  • Threat Intel
  • Trends
  • Uncategorized
  • Warnings
  • WebSite News
  • Zero Trust

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
© 2025 CyberSecurity Institute | Powered by Superbs Personal Blog theme