Threat Level: green Handler on Duty: Russ McRee

SANS ISC InfoSec News Summary

Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

Popular News

12 hours ago FBI Agents Pose as Repairmen to Bypass Warrant Process

Schneier blog View Synopsis+1

This is a creepy story. The FBI wanted access to a hotel guest's room without a warrant. So agents broke his Internet connection, and then posed as Internet technicians to gain access to his hotel room without a warrant.

From the motion to suppress:

The next time you call for assistance because the internet service in your home is not working, the "technician" who comes to your door may actually be an undercover government agent. He will have secretly disconnected the service, knowing that you will naturally call for help and -- when he shows up at your door, impersonating a technician -- let him in. He will walk through each room of your house, claiming to diagnose the problem. Actually, he will be videotaping everything (and everyone) inside. He will have no reason to suspect you have broken the law, much less probable cause to obtain a search warrant. But that makes no difference, because by letting him in, you will have "consented" to an intrusive search of your home.

Basically, the agents snooped around the hotel room, and gathered evidence that they submitted to a magistrate to get a warrant. Of course, they never told the judge that they had engineered the whole outage and planted the fake technicians.

More coverage of the case here.

This feels like an important case to me. We constantly allow repair technicians into our homes to fix this or that technological thingy. If we can't be sure they are not government agents in disguise, then we've lost quite a lot of our freedom and liberty.

14 hours ago Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...

The Register View Synopsis+1
FYI this isn't just going to target Windows, Linux and OS X fans

After Symantec published its report on the Regin super-spyware, there were many questions raised. Who coded it? What can it do? And - above all - why did it take so long for security vendors to notice it?

12 hours ago Zero-day hacking group resorts to UNICORN SMUT-SLINGING

The Register View Synopsis+1
Playboy ploy not beneath APT3

Sysadmins who have not yet patched their Windows boxes against the 18-year-old "unicorn-like" OLE bug disclosed last month could expect a deluge of spear phishing smut from a group once confined to lofty targeted zero-day attacks.

23 hours ago Second time's a charm: Adobe has another go at killing Flash hijack flaw

The Register View Synopsis+1
It's not December already - out-of-band patch today must be installed

Ready to enjoy the Thanksgiving holiday? Can't wait to open your advent calendar? Not so fast - there's one more patch to install before the month is over.

23 hours ago Security seals clobbered ahead of Black Friday bonanza

The Register View Synopsis+1
Hackers' delight as vendors certify phishing sites

This Black Friday, beware the shop with the security seal: researchers have shown that issuers of common good webkeeping seals of approval sometimes miss basic flaws, happily certify phishing sites and inadvertently function as a hackers' black book of vulnerable sites.

Top News

12 hours ago Massive surveillance operations possible with explicit help from telecom companies

Yahoo Security View Synopsis+1

U.S. and U.K. spy agencies including the NSA and GCHQ, respectively, have performed a variety of sophisticated spy operations, collecting massive amounts of personal data, as many Edward Snowden leaks revealed in the past year. German publication Süddeutsche Zeitung has published a new report that reveals that as far back as 2009 the GCHQ, and thus also the NSA, had massive access to submarine cable links around the globe with help from now Vodafone-owned Cable & Wireless. FROM EARLIER: The most advanced malware yet has been spying on you for years "A joint investigation by NDR, WDR, Süddeutsche Zeitung and Channel 4 based on documents leaked by whistleblower Edward Snowden, reveals that Cable & Wireless actively shaped and provided the

12 hours ago ERP and the IoT: What Should You Know?

IT Toolbox Blogs View Synopsis+1

Dozens of new articles come out every day about the Internet of Things (IoT) and the possibilities that it's bringing to light. Still, there is some confusion. What is this Internet of Things? And what, exactly, does it have to do with enterprise resource planning (ERP)?


First, the easy question:

1 day ago Microsoft cold-shoulders Server 2003 and XP users hit with Microsoft Update error 0x80248015

Yahoo News View Synopsis+1
The causes of the problem remain cloudy, but the symptoms are quite clear. Starting on Nov. 18, some Server 2003, Windows Home Server 2003, and Windows XP SP3 machines suddenly refused to connect to Microsoft Update. As best I can tell, Microsoft has not responded to the problem, not documented a workaround, and is basically doing nothing visible to fix it.

1 day ago Regin Malware: Stealth "Cyber Pearl Harbor" (November 23 & 24, 2014)

SANS Newsbites View Synopsis+1

The Regin malware targets telecommunications, energy, and health organizations.......

Latest News

2 hours ago Excel Quick Tip: How to use Excel's POISSON function to predict business volumes

IT Toolbox Blogs View Synopsis+1

The holiday season is here. Will you have enough employees to handle the increased number of visitors to your store or web site? You can use Excel's POISSON function to ensure you will meet the upcoming demand. For example, say you are deciding how many additional employees will be needed for the Customer Service Department, but you are not sure how many customers to expect this year. Your records

5 hours ago You can get Google to stop showing ads FOR A PRICE!!

IT Toolbox Blogs View Synopsis+1
Google has offered to allow you t block their web ads. The downside is you have to pay for it! Here?s some info and a poll to take. Google Contributor: would you pay to remove ads on websites? [POLL]

5 hours ago New Snowden Documents Show GCHQ Paying Cable & Wireless for Access

Schneier blog View Synopsis+1

A new story based on the Snowden documents and published in the German newspaper Süddeutsche Zeitung shows how the GCHQ worked with Cable & Wireless -- acquired by Vodafone in 2012 -- to eavesdrop on Internet and telecommunications traffic. New documents on the page, and here.

Ars Technica article. Slashdot thread.

13 hours ago Bitcoin exchange Kraken to help in Mt. Gox bankruptcy

Yahoo Security View Synopsis+1

By Teppei Kasai TOKYO (Reuters) - U.S. bitcoin exchange operator Payward Inc said on Wednesday it will work on retrieving some millions of dollars lost by Tokyo-based Mt. Gox, once the world's largest bitcoin exchange before it collapsed in bankruptcy this year. Kraken, Payward's bitcoin exchange, will assist Mt. Gox's Tokyo-court appointed trustee Nobuaki Kobayashi with investigating where the missing bitcoins are, along with eventually redistributing any found to creditors as part of a liquidation. The partnership between Payward and Mt. ...

14 hours ago Zero-day hacking group resorts into UNICORN SMUT-SLINGING

The Register View Synopsis+1
Playboy ploy not beneath APT3

Sysadmins who have not yet patched their Windows boxes against the 18-year-old "unicorn-like" OLE bug disclosed last month could expect a deluge of spear phishing smut from a group once confined to lofty targeted zero-day attacks.