Its Friday, and time for our weekly news roundup!

Dan Geer at Source Boston. Before we begin, I came across a very interesting talk I’d like to share with you – Dan Geer’s keynote at SOURCE Boston 2012. I was not there myself, but I read Dan's script posted here. Geer’s talk was impressive, a must read for anyone that uses the Internet! Among the many quote-worthy gems in his talk – “The Internet will never be free as it is this morning”.

Fergal Glynn on Threatpost. Additionally, threatpost is featuring a multi-part series of posts by Veracoder Fergal Glynn on Application Security.

On to the news items that made headlines this week -

Nissan Cyber Attack and Network Breach. A post on InfosecIsland notes that Nissan Confirms Cyber Attack and Network Breach. Initially discovered on April 13th, this attack is believed to have stolen employee user ID’s and passwords. A Nissan spokesman said that "We didn’t want to let the world know that there was an intrusion.... The company was not legally required to report the incident because no sensitive data about customers, employees or business operations was taken in the attack."

Stealth IT and BYOD. Stacey Higginbotham posted a very interesting article in Gigaom, discussing Stealth IT – the IT professional side of the BYOD craze. The article describes the threat posed by using external, sometimes unapproved resources, for computing when internal resources are not available or hard to use. Basically, enterprise IT groups are experiencing their own BYOD issue. The full article is here.

Risks that Chinese espionage poses to US companies. Peter J. Toren, former federal prosecutor for the Computer Crime and Intellectual Property Section of the US Justice Department wrote about the risks that Chinese espionage poses to US companies in Forbes. Toren reports that, “FBI Director Robert Muller testified that hacking could soon replace terrorism as the FBI’s primary concern.” Over the past few years there has been a slew of both hacking and physical incidents that led to the breach of sensitive US company data, including documents from Boeing that related to the space shuttle, Delta IV Rocket, B-52 Bomber, and F-15 Fighter. So what can be done? Toren recommends a solid cybersecurity law, and several other measures.

Oracle Critical Patch Update. Dennis Fisher of ThreatPost authored an article detailing a, “critical remotely exploitable vulnerability in all of the current versions of the Oracle database server that can enable an attacker to intercept traffic and execute arbitrary commands on the server.” Oracle is now claiming the bug is fixed thanks to a Critical Patch Update.

The Conficker worm is still alive??? Finally, Kelly Jackson Higgins of Dark Reading has reported that the three-year-old Windows Conficker worm is still alive and spreading. Microsoft has said the worm is mostly moving through enterprises via overlooked best-practice security precautions, working through weak and/or stolen passwords, in fact 100 percent of the infections on Windows 7 and Vista machines were due to ineffective passwords.

Proud to be one of Veracode’s first co-op employees, Zack is a student concentrating in management and marketing at Northeastern University. With this opportunity, he looks forward to the prospect of further developing the skills he has gained as a student and in other positions, positively contributing to Veracode’s marketing and sales efforts, and learning from and working with the Veracode marketing team!

Love to learn about Application Security?

Get all the latest news, tips and articles delivered right to your inbox.




contact menu