Tech Alert Briefing for 2/23/2007
February 23, 2007
Update covering February 16-22, 2007
Welcome to Tech Talk! In this week's edition of Tech Talk, BOL Guru Jeff Patterson reports on potential Chinese hackers.
BOL GURUYou'll also learn about:
Get the details below.
Free Secure Instant Messaging White Paper
WebEx AIM Pro Business Edition
Osterman Research?s semi-annual tracking survey reveals that IM is found in over 93% of businesses.However, IT departments have a difficult time halting the proliferation of unsecured and unmanaged IM in their organization.
Learn more about securing IM
FREE Webcast: Trends in Commercial Credit Risk Management
Join Harland Financial Solutions for a free Webcast on Trends in Commercial Credit Risk Management. Learn about the relationship between risk and profitability, and how the proposed Basel risk-based capital rules will affect institutions of all sizes. Click here to register! Call 800-815-5592 or email firstname.lastname@example.org for details.
Prediction: China Hacker Haven
FCW reports that Chinese hackers are attacking anything and everything.While most of the attacks appear to be against the U. S. Department of Defense, a recent Chinese white paper suggests that the Chinese government plans to be able to win an "informationized war" by the middle of this century to ensure its freedom of action in international affairs and the ability to influence the global economy.The attacks are believed to be government sponsored.While many may believe these attacks are strictly against the U. S. government, the stated objective to allow the Chinese government to influence the global economy suggests that businesses and financial institutions may be targeted as well.
IP Phones Vulnerable
Cisco announced several vulnerabilities in multiple models of their IP phone group.The vulnerabilities could allow an attacker to change the device's configuration or launch a denial of service attack against the institution relying on the IP telephony products.Read Network Computing and determine what risks may be lurking in your phone system.
Is There a Pharmer in Your Dell?
A large pharming attack was shut down this week, but only after thousands of computers were infected with a Trojan that redirected victims to websites designed to steal login information for at least fifty US, European and Asia-Pacific financial institutions.A bot that allows the attackers to take control of the victim's system may have come in alongside the Trojan.
More Zero-Day Exploit Woes
Following a disturbing pattern, two additional zero-day exploits have been discovered in Microsoft's Office products.At least one virus is actively exploiting the PowerPoint bug.Additional details are available on SecurityFix.
Time to Get Out of the Office?
Network Computing has an excellent article on alternatives to Microsoft Office for IT administrators interested in getting away from the continuing barrage of attacks on Office applications and lowering the total cost involved in each personal computer.
More Browser Bugs
Be careful where you take your computer on the Internet.Additional bugs have been discovered in Microsoft's Internet Explorer and Mozilla's Firefox.One bug that affects both browsers allows malicious websites to steal user data, and another bug in Firefox allows those same sites to modify cookies left by other sites.Read the full story in Silicon.com.
TJX Breach Bigger and Earlier
CNet is running an article that reports the TJX Companies data breach was much more severe than originally thought and started as early as July 2005.Customers who returned goods to stores operated by TJX may have had driver's license information compromised in addition to those whose credit and debit card information was hijacked.
A critical flaw was announced in SNORT, one of the most popular intrusion detection systems available.The flaw could allow the computer hosting the software to be compromised or hijacked.A patch is available and users are encouraged to upgrade.CSOOnline has all the details.
Closing Ports and Doors for Security
What are some of the weak links in your network security approach?CSOOnline suggests that USB and Firewire ports are two of the weak links you need to address and provides some examples on software that can be used to shut down the external ports.CSOOnline also warns about smokers who frequently leave back doors unlocked which can allow intruders into the building.
Vulnerability List at 115 Last Week
The US-CERT Vulnerability Summary for the Week of February 12, 2007 lists seventy High severity vulnerabilities including many from last week's Microsoft's patch release, Adobe's Cold Fusion, HP UX, Sun Solaris, and Cisco's Internetwork Operating System.An additional eight Medium and thirty-seven Low severity vulnerabilities were announced.
New Security Guides
The National Institute of Standards and Technology (NIST) has released three new documents.The Guidelines on Electronic Mail Security has been updated to version 2.Also released were the Guide to Intrusion Detection and Prevention Systems and Establishing Wireless Robust Security Networks.Include these guides as must reads for 2007.
Subscribe to Tech Talk and BOL Tech Advisories.
CD ROM Training & Information Security Supplies
CD ROM Training
CD ROM Training
CD ROM TrainingPolicies/Job Descriptions & Related Sites
Information Technology Specialist
Information Systems Security PolicyArchived Technology and eBanking You have access to previous Tech Talk pages and Tech Alerts on BankersOnline's Technology & eBanking page.
First published on 02/22/2007