Dennis Fisher

About

Dennis Fisher is a journalist with more than 13 years of experience covering information security.

USB Drives Remain Major Security Threat

The recent admission by a top Department of Defense official that a classified network was compromised in 2008 through an infected USB drive has brought the spotlight back onto the myriad threats that these portable devices pose to corporate networks.

Easily Exploitable Bugs Becoming a Precious Commodity

There has never been more focus on security than there is right now, whether it’s from software vendors looking to eliminate flaws in their products, from attackers looking to exploit those flaws or from customers who are sick of having their PCs compromised. And as the focus has intensified in recent months, researchers say that, for a variety of reasons, it has become increasingly difficult to find exploitable client-side bugs–particularly memory-corruption flaws–leading them to dig deeper and find more exotic bugs.


It looks like the group behind the Gumblar mass Web-site infections is beginning to get serious about making some money from all of the servers that the attacks have compromised in the last 18 months. The group has begun using some of its compromised servers in spam operations that are pushing the usual array of male ego-boosters: Viagra and fake watches.

Hacking by Numbers

In this video from the OWASP AppSec Research conference, Tom Brennan of WhiteHat Security discusses the current trends in vulnerabilities in Web applications and what’s driving them.

A Spanish security researcher has discovered a new vulnerability in Apple’s QuickTime software that can be used to bypass both ASLR and DEP on current versions of Windows and give an attacker control of a remote PC. The flaw apparently results from a parameter from an older version of QuickTime that was left in the code by mistake.

A few days after the majority of the command-and-control servers belonging to one of the variants of the Pushdo botnet were taken offline, some researchers say that there are indications that portions of the botnet are back to their old tricks, downloading new spam templates for a resumption of spam operations.

In an effort to help mitigate man-in-the-middle attacks that make normal HTTP connections look like secured HTTPS sessions, Mozilla is adding support in Firefox 4 for a new technology called HTTP Strict Transport Security that enables site operators to tell browsers to always request an HTTPS session on future visits.

Researchers have made a huge dent in a major variant of the Pushdo botnet, virtually crippling the network by working with hosting providers to take down about two thirds of the command-and-control servers involved in the botnet.