HNS Newsletter Issue 364 - 23.04.2007 http://www.net-security.org ------------------------------------------------------ ADVERTISEMENT: Infosecurity Canada, June 12-14, 2007 ------------------------------------------------------ When it comes to your critical information it is not a

georgenameElectronics - Devices

Nov 27, 2013 (3 years and 9 months ago)

231 views

HN
S Newsletter

Issue 364
-
23.04.2007

http://www.net
-
security.org


------------------------------------------------------

ADVERTISEMENT: Infosecurity Canada, June 12
-
14, 2007

------------------------------------------------------

When it comes to your critical information it is not a

question of if it's at risk, it's a question of when. Stay in

front of the fast, ever changing information security curve at the

most important IT security event in Canada, Infosecurity Canada 2007.



It's where the Canadian IT industry gathers to get up
-
to
-
date on

how to best deal with today's threats to vital information, and how

to be prepared for tomorrow's information hazards. Presented by

some of the finest minds in IT, educational content w
ill cover

Emerging Threats, Identity, Privacy and Risk, Compliance and a

Technical track.


Secure your place today at Infosecurity Canada, June 12
-
14, 2007

at the Metro Toronto Convention Centre.


http://www.infosecuritycanada.com

--------------------
----------------------------------



Table of contents:


1) Security news

2) Advisories

3) Articles

4) Webcasts

5) Conferences

6) Security World

7) Virus News



[ Security news ]



----------------------------------------------------------------


CA TO PURSUE CO
-
FOUNDER WANG FOR FRAUD

A special committee at CA Inc. on Friday released a report that

blames co
-
founder Charles Wang for accounting fraud at the company

and recommends suing him for damages and the value of company stock

he received.

http:
//www.net
-
security.org/news.php?id=14110



WI
-
FI BUG FOUND IN LINUX

A major Linux Wi
-
Fi driver contains a bug that can allow an attacker

to take control of a laptop
--
even when it is not on a Wi
-
Fi network.

http://www.net
-
security.org/news.php?id=14111



BL
OGGERS' SEARCH FOR ANONYMITY

The internet has given the individual unprecedented power to reach

out to millions but some governments are cautious, even hostile, to

giving their citizens free access to ideas they deem too democratic

and dangerous.

http://www.net
-
security.org/news.php?id=14112



TOP 10 IT PRIORITIES AT THE DOD

Deputy CIO David Wennergren talks about IT initiatives at the U.S.

Department of Defense.

http://www.net
-
security.org/news.php?id=14113



STUDENT CHARGED WITH HACKING SCHOOL CO
MPUTERS

Robert Charles Sipes, 17, of Simpsonville told police he had warned

the district months before that its system wasn't secure, according

to a Mauldin police report.

http://www.net
-
security.org/news.php?id=14114



BOTTOM LINE IMPACT OF DATA BREACHES
UNCLEAR

Despite dire predictions of massive financial consequences for

breached companies, TJX's business has grown in the wake of its data

breach.

http://www.net
-
security.org/news.php?id=14115



THIS IS HOW WE CATCH YOU DOWNLOADING

All over Europe thousan
ds of people are being threatened with court

action for allegedly sharing games like Dream Pinball 3D on P2P

networks.

http://www.net
-
security.org/news.php?id=14116



STALKERS GO HIGH TECH TO INTIMIDATE VICTIMS

The case had the makings of an eerie cyber
-
mystery: A young

Alexandria woman told local police she suspected that her

ex
-
boyfriend was tapping into her e
-
mail inbox from thousands of

miles away, reading messages before she could and harassing the

senders.

http://www.net
-
security.org/news.php?id=14117



ZOMBIES INFILTRATE US MILITARY NETWORKS

Security researchers have traced spam
-
sending botnet clients back to

networks run by the US military.

http://www.net
-
security.org/news.php?id=14118



DO
-
IT
-
YOURSELF DES
TRUCTION

For some reason, a lot of IT folks love to try some pretty wacky

stuff for themselves. The area of data destruction is no exception.

http://www.net
-
security.org/news.php?id=14119



NOTES ON VISTA FORENSICS

One of the first things to note about use
rs' data files is that

they're not where they used to be! Instead of the familiar "Documents

and Settings" folder we must instead look to a new folder called

"Users".

http://www.net
-
security.org/news.php?id=14120



VIDEO: MICROSOFT INFORMATION PROTECTION

Keith Brintzenhofe, the Manager of the Information Protection

Platform Team at Microsoft, discusses their approach to information

protection. He talks about new security capabilities in several

Microsoft products, policy creation, the challenges of the vir
tual

workplace, the experience of seamless security for the end user, and

much more.

http://www.net
-
security.org/news.php?id=14121



THE IMPORTANCE OF APPLICATION CLASSIFICATION IN SECURE
APPLICATION

DEVELOPMENT

As organizations race to integrate security
into the software

development process, they are realizing that many security flaws can

be fixed long before deployment.

http://www.net
-
security.org/news.php?id=14122



NINE OUT OF 10 UK FIRMS HAVE VOIP SECURITY FEARS

More than 90% of UK firms fear that the
speed of adoption of instant

messaging and Voice over IP technologies is outstripping related

security measures, research has found.

http://www.net
-
security.org/news.php?id=14123



FEDS SEE SLIGHT GAIN ON SECURITY MARKS

Overall grade up to C
-
, but eight agencies still flunk FISMA test.

http://www.net
-
security.org/news.php?id=14124



SHOULD APPLE SECURE ITS IPODS?

Few corporations are likely to ban iPods in the workplace, but

whether Apple and other manufacturers of MP3 pl
ayers shoulder some

responsibility to add security to their devices
-
and how effective

that security would be

is a growing debate.

http://www.net
-
security.org/news.php?id=14125



NORWEGIAN PARTY PUSHES FOR LEGAL FILE SHARING

Group seeks to replace DRM w
ith a compensation fund that gives

consumers more say in how they use downloaded music or software.

http://www.net
-
security.org/news.php?id=14126



P2P WORMS GET THEIR TURN

Security experts warn of dangerous new threats arising from new

botnet techniques a
nd the consolidation of fraudulent organizations.

http://www.net
-
security.org/news.php?id=14127



V.I. LABS ADDS SNOOPING TO ANTIPIRACY PRODUCT

Vendor joins forces with Internet Crimes Group.

http://www.net
-
security.org/news.php?id=14128



U.S. MAN PLEADS GUILTY IN P
-
TO
-
P CRACKDOWN

Conviction is the fifth related to an ongoing effort to stop

bootlegging and software piracy over peer
-
to
-
peer networks.

http://www.net
-
security.org/news.php?id=14129



INSTALLING AND CONFIGURING SPAMD

Yesterday w
e looked at spamd, a service designed to reduce the flow

of spam to your email inbox. Now that we know some of its advantages,

let's put it to work.

http://www.net
-
security.org/news.php?id=14130



CONSUMERS 'SHUN' HACKED STORES

Customers of companies which
lose credit card data to hackers are

voting with their wallets and taking their business elsewhere,

suggests a survey.

http://www.net
-
security.org/news.php?id=14131



DATA BREACH AIDED UNIVERSITY PHISHING SCAM

A highly targeted phishing attack last year t
hat scammed dozens of

Indiana University students out of their personal and financial data

appears to have been aided in part by a previously undisclosed hacker

break
-
in at one of the school's main research servers, according to

documents unearthed by a do
ctoral student there.

http://www.net
-
security.org/news.php?id=14132



EMPLOYERS WARNED ON EMAIL SPYING

A new ruling, which said a college had breached a woman's privacy by

secretly monitoring her emails, means employers cannot spy on staff,

say legal experts.

http://www.net
-
security.org/news.php?id=14133



US
-
HOSTED PHISHING ATTACKS DROP

Phishers increasingly looking to Russia and Hong Kong.

http://www.net
-
security.org/news.php?id=14134



TWO ARRESTED OVER WI
-
FI 'THEFT'

Two people have been c
autioned for using people's wi
-
fi broadband

internet connections without permission.

http://www.net
-
security.org/news.php?id=14135



U.S. HOUSE TO PROBE FEDERAL NETWORK INTRUSIONS BY FOREIGN
HACKERS

A subcommittee hearing is set for Thursday.

http://www.ne
t
-
security.org/news.php?id=14136



FACIAL RECOGNITION 'PROVEN' AS AIRPORT CROWD FILTER

Facial recognition cameras have been proven as a means of spotting

wanted people in crowds, claimed LogicaCMG.

http://www.net
-
security.org/news.php?id=14137



CALIFORNIA SENATE FIGHTS RFID TRACKING

California's state Senate struck a major blow against the enemies of

mankind in the inevitable war against The Machines.

http://www.net
-
security.org/news.php?id=14139



OPEN
-
SOURCE PROJECT AIMS TO ERASE E
-
VOTING FOG

R
esearchers building software they hope will provide a foundation for

future secure e
-
voting systems.

http://www.net
-
security.org/news.php?id=14138



UNIVERSITY ADMINS LEND PHISHERS A HAND

Lax security at Indiana University appears to have played a key role

in highly targeted phishing attack last year that hauled in

confidential information on as many as 80 account holders of the

school's credit union.

http://www.net
-
security.org/news.php?id=14140



MICROSOFT ROOTS OUT WINDOWS HOME SERVER LEAK

Leak to thehot
fix.net didn't come from an MVP, says Redmond.

http://www.net
-
security.org/news.php?id=14141



ISP EJECTS WHISTLE
-
BLOWING STUDENT

A 21
-
year
-
old college student in London had his internet service

terminated and was threatened with legal action after publish
ing

details of a critical vulnerability that can compromise the security

of the ISP's subscribers.

http://www.net
-
security.org/news.php?id=14142



TRAGEDY PUTS SPOTLIGHT ON TECH AND TRAINING

Higher
-
ed officials adopt measures pioneered after Columbine

shootings.

http://www.net
-
security.org/news.php?id=14143



LARGE ENTERPRISES STILL SERVING UP SPAM

Despite lots of security measures, major corporations are still

having internal IP addresses hijacked by spammers.

http://www.net
-
security.org/news.php?id=14
144



HACKERS TURN TO POWERPOINT FOR VIRUS INFECTION

Slack patching leaves application open.

http://www.net
-
security.org/news.php?id=14145



BARCLAYS STEPS UP ONLINE SECURITY

Barclays Bank is handing out handheld chip
-
and
-
pin card readers as

part of a new
online security initiative.

http://www.net
-
security.org/news.php?id=14146



US NAVY MALWARE INFECTION RISKED SUBMARINE PRANG

An American contractor holding top
-
level security clearance has been

convicted of sabotaging critical US Navy computers used for submarine

traffic control.

http://www.net
-
security.org/news.php?id=14147



THE MUSHROOMING MENACE OF KEYLOGGERS

"Most modern keyloggers are considered to be legitimate software or

hardware and are
sold on the open market. However, there is an

ethical boundary between justified monitoring and monitoring for the

purpose of stealing confidential user information
--
a boundary

marked by a very fine line," said Nikolay Grebennikov, deputy

director of Ka
spersky Lab's R&D department.

http://www.net
-
security.org/news.php?id=14148



UBER
-
ROOTKITS CHALLENGE SECURITY COMMUNITY

McAfee warns that stealth malware is getting more dangerous.

http://www.net
-
security.org/news.php?id=14149



MICROSOFT: DNS PATCH TO CO
ME BY MAY 8... MAYBE

Microsoft hopes to fix by May 8 a critical flaw in Windows DNS

servers that is being exploited by online criminals, the company said

late Tuesday.

http://www.net
-
security.org/news.php?id=14150



TOP 10 INTERNET CRIMES OF 2006

The Inter
net Crime Complaint Center filed its annual report last

month, but didn't get the attention it deserved. A look inside offers

some revealing statistics on the darker side of the Web.

http://www.net
-
security.org/news.php?id=14151



SINGLE
-
VICTIM SPAM ATTACKS SKYROCKET

Malicious Microsoft Office documents are the weapon of choice for

one
-
off attacks.

http://www.net
-
security.org/news.php?id=14152



HOW HACKERS GOT WASHINGTON

A break
-
in targeting US State Department computers worldwide
last

year occurred after an employee in Asia opened a mysterious email

that quietly allowed hackers inside the US government's network.

http://www.net
-
security.org/news.php?id=14153



STUDENT LOAN COMPANIES ILLEGALLY USE US DATABASE

The US government has t
emporarily barred college loan firms accessing

a database containing personal and financial details of nearly 60

million people after a Washington Post article reported it was being

used illegally.

http://www.net
-
security.org/news.php?id=14154



HACKERS IN
VITED TO BREAK INTO PHILIPPINE INTERNET VOTING
SYSTEM

Local and foreign computer hackers will be tapped to try and break

into an Internet
-
based voting system that will be pilot tested by the

country's Commission on Elections (Comelec) starting July 10.

http://www.net
-
security.org/news.php?id=14155



HOW SECURITY COMPANIES SUCKER US WITH LEMONS

More than a year ago, I wrote about the increasing risks of data loss

because more and more data fits in smaller and smaller packages. Today

I use a 4
-
GB USB memor
y stick for backup while I am traveling. I like

the convenience, but if I lose the tiny thing I risk all my data.

http://www.net
-
security.org/news.php?id=14156



COUNTER STRIKE FIRM IN CREDIT CARD HACK CLAIM

Valve Software, the company behind Counter Strik
e and Half Life, has

been accused of covering up a hack of its servers which allegedly

exposed the credit card details of thousands of its customers.

http://www.net
-
security.org/news.php?id=14157



VIDEO: NEW SECURITY FEATURES IN INTERNET EXPLORER 7

Markel
los Diorinos from the IE team at Microsoft introduces the new

security features in IE 7 and speaks about extended validation SSL

certificates. He also covers the Certification Authority Browser

Forum whose members apart from Microsoft include also the Mozi
lla

Foundation, Opera Software and KDE.

http://www.net
-
security.org/news.php?id=14158



NO DATA STOLEN IN 2006 COMPUTER INTRUSIONS, SAYS COMMERCE
DEPT.

Hackers managed to get into 33 agency computers.

http://www.net
-
security.org/news.php?id=14159



BYPASSING THE SECURITY MEASURES OF MANY ANTIVIRUS
PROGRAMS

A paper has been published that takes a look at several techniques to

go over antivirus protection.

http://www.net
-
security.org/news.php?id=14160



MICH. COMMUNITY COLLEGE SHUT BY ONLINE THREAT

Kal
amazoo Valley Community College closed for rest of the week.

http://www.net
-
security.org/news.php?id=14161



US STATE DEPARTMENT ROOTED BY 0
-
DAY WORD ATTACK

A virus attack aimed at US State Department computers last May

penetrated government networks after
a worker in Asia opened a

contaminated email.

http://www.net
-
security.org/news.php?id=14162



YAHOO SUED FOR PROVIDING DATA ON CHINESE DISSIDENTS

Four were arrested after Yahoo turned over e
-
mail information.

http://www.net
-
security.org/news.php?id=14163



SPAMMERS, HACKERS SEIZE ON VIRGINIA TECH SHOOTINGS

Spam e
-
mails contain link which installs a Trojan horse program that

collects banking details.

http://www.net
-
security.org/news.php?id=14164



LIMITED ATTACK POTENTIAL FROM MICROSOFT DNS WORM

While Microsoft has not yet said when it will release a patch to fix

an under
-
attack flaw in its server software, most properly protected

servers should not be vulnerable.

http://www.net
-
security.org/news.php?id=14165



DOJ JOINS SUIT AGAINST HP, SUN AND A
CCENTURE

HP, Sun and Accenture are charged with making false claims to the

U.S. government for work done involving information technology (IT)

hardware and services contracts.

http://www.net
-
security.org/news.php?id=14166



NEW ATTACK PUTS ROUTERS, CELL PH
ONES, OTHER GEAR AT RISK

Null pointer dereferencing errors in the spotlight.

http://www.net
-
security.org/news.php?id=14167



EUROPEAN E
-
CRIME PORTAL SCHEME FLOATED

British academics and information security experts are teaming up in

plans to develop a cybe
rcrime reporting portal for Europe.

http://www.net
-
security.org/news.php?id=14168



APPLE PATCHES 25 SECURITY HOLES

Apple published Security Update 2007
-
004 for both Mac OS X v10.4.9

and Mac OS X v10.3.9. It

s available for download from Apple

s Web

site as well as through the Software Update system preference.

http://www.net
-
security.org/news.php?id=14169



LAWMAKERS GRILL U.S. AGENCIES ON CYBERATTACKS

In the wake of last week's failing scores in cybersecurity for many

government agencies, lawmakers
are upset that many agencies haven't

inventoried their networks.

http://www.net
-
security.org/news.php?id=14170



WHERE'S THE VIRTUAL SECURITY?

Security struggles to keep up with the virtualized data centre

revolution.

http://www.net
-
security.org/news.php?i
d=14171



ATTACKERS IMPROVE ON JAVASCRIPT TRICKERY

As JavaScript becomes an increasingly key component of online

attacks, attackers are investing more energy in obfuscation and other

techniques to make defenders' attempts at reverse engineering more

diffic
ult.

http://www.net
-
security.org/news.php?id=14172



GOOGLE TO STRENGTHEN CALENDAR PRIVACY WARNINGS

Forgetful users, including businesses, letting sensitive info slip.

http://www.net
-
security.org/news.php?id=14173



DATA BREACH? HERE'S WHAT TO DO, WHEN AND HOW

The key is to prepare ahead of time with a contingency plan that

details roles, actions and timelines.

http://www.net
-
security.org/news.php?id=14174



BOTNETS BATTLE OVER TURF

More botnet
-
on
-
botnet turf wars hav
e erupted
--
and intensified
--

over the past few months.

http://www.net
-
security.org/news.php?id=14175



DISGRUNTLED TECHIE ATTEMPTS CALIFORNIAN POWER BLACKOUT

A cheesed
-
off American IT worker was seized by an FBI Joint Terrorism

Task Force on Wednesday f
or attacking the Californian electric power

grid.

http://www.net
-
security.org/news.php?id=14176


----------------------------------------------------------------





[ Advisories ]



All advisories are located at:

http://www.net
-
security.org/archive_advi.php



----------------------------------------------------------------


Slackware Security Advisory
-
freetype (SSA:2007
-
109
-
01)

http://www.net
-
security.org/advisory.php?id=7428



Slackware Security Advisory
-
xine
-
lib: Heap
-
based buffer overflow

(SSA:2007
-
109
-
02)

http://www.net
-
security.org/advisory.php?id=7427



US
-
CERT Technical Cyber Security Alert
-
Apple Updates for Multiple

Vulnerabilities (TA07
-
109A)

http://www.net
-
security.org/advisory.php?id=7426



Apple Se
curity Update
-
Security Update 2007
-
004

(APPLE
-
SA
-
2007
-
04
-
19)

http://www.net
-
security.org/advisory.php?id=7425



Mandriva Linux Security Update Advisory
-
sqlite (MDKSA
-
2007:091)

http://www.net
-
security.org/advisory.php?id=7424



Mandriva Linux Security Update Advisory
-
php (MDKSA
-
2007:088)

http://www.net
-
security.org/advisory.php?id=7423



Mandriva Linux Security Update Advisory
-
php (MDKSA
-
2007:087)

http://www.net
-
security.org/advisory.php?id=7422



Ubuntu Security Notice
-
lib
x11 vulnerability (USN
-
453
-
1 )

http://www.net
-
security.org/advisory.php?id=7421



Gentoo Linux Security Advisory
-
MadWifi: Multiple vulnerabilities

(GLSA 200704
-
15)

http://www.net
-
security.org/advisory.php?id=7420



Gentoo Linux Security Advisory
-
File:
Denial of Service (GLSA

200704
-
13)

http://www.net
-
security.org/advisory.php?id=7419



Turbolinux Security Announcement
-
Multiple vulnerabilities in

xorg
-
x11, XFree86

http://www.net
-
security.org/advisory.php?id=7418



Mandriva Linux Security Update Advisor
y
-
cups (MDKSA
-
2007:086)

http://www.net
-
security.org/advisory.php?id=7417



Mandriva Linux Security Update Advisory
-
freeradius (MDKSA
-
2007:085)

http://www.net
-
security.org/advisory.php?id=7416



Mandriva Linux Security Update Advisory
-
ipsec
-
tools vulnerability

(MDKSA
-
2007:084)

http://www.net
-
security.org/advisory.php?id=7415



Gentoo Linux Security Advisory
-
OpenOffice.org: Multiple

vulnerabilities (GLSA 200704
-
12)

http://www.net
-
security.org/a
dvisory.php?id=7414



Gentoo Linux Security Advisory
-
Vixie Cron: Denial of Service (GLSA

200704
-
11)

http://www.net
-
security.org/advisory.php?id=7413



Gentoo Linux Security Advisory
-
Inkscape: Two format string

vulnerabilities (GLSA 200704
-
10)

http://ww
w.net
-
security.org/advisory.php?id=7412


----------------------------------------------------------------





[ Articles ]



All articles are located at:

http://www.net
-
security.org/articles_main.php


Articles can be contributed to articles@net
-
security.org



----------------------------------------------------------------


NEW SECURITY FEATURES IN INTERNET EXPLORER 7

Markellos Diorinos from the IE team at Microsoft introduces the new

security features
in IE 7 and speaks about extended validation SSL

certificates. He also covers the Certification Authority Browser

Forum whose members apart from Microsoft include also the Mozilla

Foundation, Opera Software and KDE.

http://www.net
-
security.org/article.php?
id=1003



MICROSOFT INFORMATION PROTECTION

Keith Brintzenhofe, the Manager of the Information Protection

Platform Team at Microsoft, discusses their approach to information

protection. He talks about new security capabilities in several

Microsoft products,
policy creation, the challenges of the virtual

workplace, the experience of seamless security for the end user, and

much more.

http://www.net
-
security.org/article.php?id=1002



----------------------------------------------------------------





[ Software ]



Windows software is located at:

http://net
-
security.org/software_main.php?cat=1


Linux software is located at:

http://net
-
security.org/software_main.php?cat=2


Pocket PC software is located at:

http://net
-
security.org/software_main.php?cat=3


Mac OS X software is located at:

http://net
-
security.org/software_main.php?cat=5



----------------------------------------------------------------


AD
-
AWARE SE PERSONAL EDITION 1.06 (Windows)

Ad
-
aware is a free multi spyware removal utility.

http://www.
net
-
security.org/software.php?id=135



FTIMES 3.8.0 (Linux)

FTimes is a system baselining and evidence collection tool.

http://www.net
-
security.org/software.php?id=382



NUFW 2.0.20 (Linux)

NuFW is an "authenticating gateway". This means it requires

authentication for any connections to be forwarded through the

gateway.

http://www.net
-
security.org/software.php?id=526



OS
-
SIM 0.9.9 rc4 (Linux)

OSSIM is a distribution of open source products that are integrated

to provide an infrastructure for security
monitoring.

http://www.net
-
security.org/software.php?id=304



YASSL 1.6.8 (Linux)

yaSSL is an SSL Library for programmers building security

functionality into their applications and devices.

http://www.net
-
security.org/software.php?id=521


---------------
-------------------------------------------------





[ Webcasts ]





All webcasts are located at:

http://net
-
security.org/webcasts.php



----------------------------------------------------------------


Reduce Spam and Viruses While You Increase ROI with Virtual

Appliances

Organized by Proofpoint on 24 April 2007, 11:00 AM

http://www.net
-
security.org/webcast.php?id=457



Optimizing Identity and Access Management for Employees and Customers

Organized by Co
urion on 25 April 2007, 1:00 PM

http://www.net
-
security.org/webcast.php?id=461



Building the Foundation of Your Risk and Compliance Management

Program

Organized by Archer on 26 April 2007, 1:00 PM

http://www.net
-
security.org/webcast.php?id=458


----------
------------------------------------------------------





[ Conferences ]



All conferences are located at:

http://net
-
security.org/conferences.php



----------------------------------------------------------------


Infosecurity Europe 2007

Organized by Reed Exhibitions
-
24 April
-
26 April 2007

http://www.net
-
security.org/conference.php?id=207



The 3rd Information Security Practice and Experience Conference

(ISPEC 2007)

Organized by City University of Hong Kong
-
7 May
-
10 May 2007

http://www
.net
-
security.org/conference.php?id=198



4rd Information Security Expo & Conference in Tokyo

Organized by Reed Exhibitions
-
16 May
-
18 May 2007

http://www.net
-
security.org/conference.php?id=192



Eurocrypt 2007

Organized by International Association for Cryptologic Research
-
20

May
-
24 May 2007

http://www.net
-
security.org/conference.php?id=199



Strategic Information Security Singapore

Organized by Universal Network Intelligence
-
23 May
-
25 May 2007

http://www.ne
t
-
security.org/conference.php?id=217



Strategic Information Security Dubai

Organized by Universal Network Intelligence
-
27 May
-
29 May 2007

http://www.net
-
security.org/conference.php?id=216



9th Annual Techno Security Conference

Organized by The Training
Co.
-
3 June
-
6 June 2007

http://www.net
-
security.org/conference.php?id=211



5th International Conference on Applied Cryptography and Network

Security (ACNS'07)

Organized by ONETS
-
5 June
-
8 June 2007

http://www.net
-
security.org/conference.php?id=200



IT
Underground Dublin 2007

Organized by Software
-
Konferencje
-
20 June
-
22 June 2007

http://www.net
-
security.org/conference.php?id=214



3rd Annual GFIRST Conference

Organized by US
-
CERT
-
25 June
-
29 June 2007

http://www.net
-
security.org/conference.php?id=218



The International Conference on Dependable Systems and Networks (DSN

2007)

Organized by DSN
-
25 June
-
28 June 2007

http://www.net
-
security.org/conference.php?id=201



12th Australasian Conference on Infor
mation Security and Privacy

Organized by JCU
-
2 July
-
6 July 2007

http://www.net
-
security.org/conference.php?id=202



Security '07
-
16th USENIX Security Symposium

Organized by USENIX
-
6 August
-
10 August 2007

http://www.net
-
security.org/conference.php?id=
186



3rd Annual Techno Forensics Conference

Organized by The TrainingCo.
-
29 October
-
31 October 2007

http://www.net
-
security.org/conference.php?id=212


----------------------------------------------------------------





[ Security World ]



All security world articles are located at:

http://www.net
-
security.org/secworld_main.php


Send your press releases to press@net
-
security.org



----------------------------------------------------------------


MIT Kerberos 5 Release 1.5.3 with security fix
es

http://www.net
-
security.org/secworld.php?id=5043



General availability of SSH Tectia Server 5.4 for IBM z/OS

http://www.net
-
security.org/secworld.php?id=5042



Decru secureView management framework for enterprise
-
wide storage

security unveiled

http://
www.net
-
security.org/secworld.php?id=5041



Nationwide foils phishers with help from MarkMonitor

http://www.net
-
security.org/secworld.php?id=5040



Protection suite for VMware Infrastructure 3

http://www.net
-
security.org/secworld.php?id=5039



Sourcefire delivers protection 2 years in advance of the MS animated

cursor vulnerability

http://www.net
-
security.org/secworld.php?id=5038



Q1 Spam trends report: botnets continue sending massive amounts of

spam

http://www.net
-
security.org/secworld.php?id
=5037



New version of SecureTrack firewall operations management solution

http://www.net
-
security.org/secworld.php?id=5036



TK Maxx highlights database risks, sends warning to UK National

Identity Register Project

http://www.net
-
security.org/secworld.php
?id=5035



Tips to protect tax filers from online threats

http://www.net
-
security.org/secworld.php?id=5034



Critical vulnerability affecting Akamai Download Manager

http://www.net
-
security.org/secworld.php?id=5033



Barracuda Spam Firewall now with predictive sender profiling

capabilities

http://www.net
-
security.org/secworld.php?id=5032



Key issues to secure proprietary corporate data

http://www.net
-
security.org/secworld.php?id=5031



ArcSight's security information
management product awarded by

Information Security Magazine readers

http://www.net
-
security.org/secworld.php?id=5030



Security assistance tool for Firefox and Internet Explorer

http://www.net
-
security.org/secworld.php?id=5029



New authentication technolo
gy debuts at Web 2.0 Expo

http://www.net
-
security.org/secworld.php?id=5028



Secure Windows Vista compatible flash drive

http://www.net
-
security.org/secworld.php?id=5027



WatchGuard announces new Firebox X Core and Peak security appliances

http://www.net
-
security.org/secworld.php?id=5026



New exploits out for DNS Vulnerability in Windows Server

http://www.net
-
security.org/secworld.php?id=5025



Watchfire AppScan 7.5 web application security solution released

http://www.net
-
security.org/sec
world.php?id=5024



Info on the new StrongBox TapeSentry encryption appliance

http://www.net
-
security.org/secworld.php?id=5023



pdf
-
Recover Professional 4.0 removes the security settings of PDF

documents

http://www.net
-
security.org/secworld.php?id=5022



O'Reilly Releases "A+, Network+, Security+ Exams in a Nutshell"

http://www.net
-
security.org/secworld.php?id=5021



Wi
-
Fi presents treasure trove for ID thieves

http://www.net
-
security.org/secworld.php?id=5020



Increased use of spam combined with social engineering to spread

malware

http://www.net
-
security.org/secworld.php?id=5019



New version of AppScan web application security testing tool

http://www.net
-
security.org/secworld.php?id=5018



Sourcefire launches
enterprise threat management strategy

http://www.net
-
security.org/secworld.php?id=5017



BrightCloud web filtering software development kit available

http://www.net
-
security.org/secworld.php?id=5016


-------------------------------------------------------
---------





[ Virus News ]



All virus news are located at:

http://www.net
-
security.org/viruses.php



----------------------------------------------------------------


Instant Worm shows pictures of steamy model

http://www.net
-
security.org/virus_news.php?id=782



Spammed malware attack poses as camera phone footage of university

shootings

http://www.net
-
security.org/virus_news.php?id=781



Instant messaging worm spreads via Skype messages

http://www.net
-
security.o
rg/virus_news.php?id=780


----------------------------------------------------------------






Questions, contributions, comments or ideas go to:


Help Net Security staff

staff@net
-
security.org

http://net
-
security.org


----------------------


Unsubscribe from this weekly digest on:

http://www.net
-
security.org/subscribe.php


The archive of the newsletter in TXT and PDF format is available

http://www.net
-
security.org/newsletter_archive.php