Linux root exploit due to memory access
http://www.h-online.com/security/news/item/Linux-root-exploit-due-to-memory-access-1419834.html

DreamHost - Changing Shell/FTP Passwords due to Security Issue
http://www.dreamhoststatus.com/2012/01/20/changing-ftpshell-passwords-due-to-security-issue/

more Megaupload…seems he made a couple of bucks on this ;D

Dotcom’s lavish life of parties and luxury
http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=10780514

http://video.google.com/videoplay?docid=8890260472062277672#

http://www.eweek.com/c/a/Security/Symantec-Warns-pcAnywhere-Users-to-Disable-Tool-Due-to-Source-Code-Theft-336440/

Symantec Warns pcAnywhere Users to Disable Tool Due to Source Code Theft

Symantec has confirmed that pcAnywhere users are at "increased risk" because attackers had stolen source code to the remote control tool

The saga over Symantec’s stolen code took another twist as the company acknowledged that pcAnywhere customers are at risk for man-in-the-middle attacks and new exploits.

The breach actually occurred on Symantec servers in 2006 and attackers stole source code to several Norton security products and the pcAnywhere remote access tool, Symantec confirmed last week. At the time, the company assured customers that there was no risk to the products because the source code was so old and the company had made security improvements over the past six years… (more)

O2 sends users’ phone numbers to web sites
http://www.h-online.com/security/news/item/O2-sends-users-phone-numbers-to-web-sites-1421553.html

Cisco IronPort Appliances Telnet Remote Code Execution Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120126-ironport

Now you have your 20 posts, you don’t have to swamp the topic with death by single post and you can post multiple entries per post as opposed to one every few minutes.

I know I can put multiple news stories in one post. However, since one person posted at least three times in a row in this thread, I thought that maybe it was acceptable for me to put only one news story per post. I also needed 20 posts so that I could set a profile picture, my birthday, my location, my gender, a website, and the time. If I had seen a post saying to put multiple news stories in one post, wait for someone else to post, and then post again, I wouldn’t have posted as many times as I did.

I found a Secunia advisory about a vulnerability in the Syneto UTM operating system. It has not been patched. The advisory was released on January 27. The URL is http://secunia.com/advisories/47609.

Just a heads-up: Posting for (essentially) the sole purpose of increasing post count is definitely frowned upon here.

you’re probably a “Syneto UTM” addict ???

I have decided to put quotes of all of the posts I made in this thread yesterday. I have decided to do this in case someone who is able to do so wants to remove the 14 posts I made in this thread yesterday, and in case anyone finds it easier to read the content of the posts I made in one post.

Post 1 of 14:

I found an article named [i]NY Public Service Commission Acknowledges Security Breach[/i], and the URL is http://thedailyattack.com/2012/01/27/ny-public-service-commission-acknowledges-security-breach/.

Post 2 of 14:

I found an article named [i]Facebook sues alleged clickjacking spammer sparking row[/i], and the URL is http://www.bbc.co.uk/news/technology-16755434.

Post 3 of 14:

I found an article named [i]The real danger of the Zappos security breach[/i], and the URL is http://www.courant.com/business/custom/consumer/hc-ls-zappos-20120128,0,3409169.story.

Post 4 of 14:

I found an article named [i]Drive-By-Download Attack Exploits Critical Vulnerability in Windows Media Player[/i], and the URL is http://www.csoonline.com/article/698951/drive-by-download-attack-exploits-critical-vulnerability-in-windows-media-player.

Post 5 of 14:

I found an article named [i]Linux vendors urgently patch a security flaw[/i], which is located at http://www.theinquirer.net/inquirer/news/2141626/linux-vendors-urgently-patch-security-flaw.

Post 6 of 14:

I found an article named [i]Sonos warns of Wireless HiFi System security flaw[/i], and the URL is http://www.expertreviews.co.uk/audio/1289884/sonos-warns-of-wireless-hifi-system-security-flaw.

Post 7 of 14:

I found an article named [i]Google squashes security bugs in Chrome, pays over $6,000 in bounties[/i] at http://www.infosecurity-magazine.com/view/23479/google-squashes-security-bugs-in-chrome-pays-over-6000-in-bounties/.

Post 8 of 14:

I found an article named [i]OS X Lion Includes Serious New Security Vulnerability[/i]. The URL is http://www.macguru.biz/os-x-lion-includes-serious-new-security-vulnerability/.

Post 9 of 14:

I found the story [i]XSS Vulnerability Found in Google, Forbes, Myspace, MTV and Ferrari[/i] at http://news.softpedia.com/news/XSS-Vulnerability-Found-in-Google-Forbes-Myspace-MTV-Ferrari-248996.shtml.

Post 10 of 14:

I found an article named [i]Hacker Finds Flaw in Gay-Dating Smartphone App[/i] at http://www.msnbc.msn.com/id/46133353/ns/technology_and_science-security/t/hacker-finds-flaw-gay-dating-smartphone-app/.

Post 11 of 14:

I found an article named [i]Vlingo Privacy Breach: Data Sent to Remote Servers Without Consent[/i] at http://www.androidpit.com/en/android/blog/401784/Vlingo-security-flaw.

Post 12 of 14:

I found the story [i]OpenSSL fixes flaw introduced in anti-decryption update[/i] located at http://www.computerworlduk.com/news/security/3331862/openssl-fixes-flaw-introduced-in-anti-decryption-update/.

Post 13 of 14:

I found the story [i]Security Flaws Found in WordPress Setup[/i] at http://www.esecurityplanet.com/network-security/security-flaws-found-in-wordpress-setup.html.

Post 14 of 14:

I found the story [i]Hackers Breached Railway Network, Disrupted Service[/i] at http://www.wired.com/threatlevel/2012/01/railyway-hack/.

I don’t plan on double posting or posting three or more times in a row on this forum anymore. I wanted to edit some parts of my profile, but I wasn’t able to do so. I later discovered that I needed to have at least 20 posts. Since one person posted at least three times in a row, I decided to put one news article per post. My intention was not to annoy anyone.

I am not. I don’t recall ever hearing of that operating system until today. I added that to my post because I wanted to avoid posting off-topic. I use Windows 7 Home Premium.

Symantec’s trojan warning criticised as scaremongering
http://www.h-online.com/security/news/item/Symantec-s-trojan-warning-criticised-as-scaremongering-1424809.html
http://blog.mylookout.com/blog/2012/01/27/lookout’s-take-on-the-‘apperhand’-sdk-aka-android-counterclank/

HTC Android phones expose Wi-Fi passwords to apps
http://www.h-online.com/security/news/item/HTC-Android-phones-expose-Wi-Fi-passwords-to-apps-1427099.html
http://blog.mywarwithentropy.com/2012/02/8021x-password-exploit-on-many-htc.html

http://www.bbc.co.uk/news/technology-16812064

Hackers outwit online banking identity security systems

Criminal hackers have found a way round the latest generation of online banking security devices given out by banks, the BBC has learned.

After logging in to the bank’s real site, account holders are being tricked by the offer of training in a new “upgraded security system”.

Money is then moved out of the account but this is hidden from the user.

Experts say customers should follow banks’ official advice, use up-to-date anti-virus software and be vigilant…(more)

Key Internet operator VeriSign hit by hackers
http://www.reuters.com/article/2012/02/02/us-hacking-verisign-idUSTRE8110Z820120202

Megaupload Shutdown Has A Silver Lining
http://blogs.norman.com/2012/for-consumption/megaupload-shutdown-has-a-silver-lining

Kelihos botnet BACK FROM THE DEAD
Bloodied spam-spewing zombie staggers in
http://www.theregister.co.uk/2012/02/02/kelihos_botnet_returns/

Trojan smuggles out nicked blueprints as Windows Update data
Malware backdoors government-targeted kit ‘using Adobe 0-days’
http://www.theregister.co.uk/2012/02/01/spear_phishing_rats/

Virus-slingers abuse WordPress vulns, dose punters with exploit
Blogs also infected with information-harvesting Trojan
http://www.theregister.co.uk/2012/01/31/wordpress_vuln_phoenix/

@Pondus,

What vulnerabilities are being abused by the latest Hierarcy Exploit pack? To find out, read here:
http://malwareint.blogspot.com/search?updated-min=2012-01-01T00:00:00-07:00&updated-max=2013-01-01T00:00:00-07:00&max-results=2 (link- malware intelligence; link author = Steven K (X Y L I T O L) Malware Research),

polonus

Will the bad guys at india ever learn? ::slight_smile: what a shame :cry:

Indian military computers hacked, Symantec source code leaked
http://www.techspot.com/news/46990-indian-military-computers-hacked-symantec-source-code-leaked.html

Old news…!! :wink:
http://forum.avast.com/index.php?topic=52252.msg727906#msg727906