Dennis Fisher

About

Dennis Fisher is a journalist with more than 13 years of experience covering information security.

Sensitive DHS platform hacked

From Federal Computer Week (Ben Bain)
Attackers have penetrated a network that the Department of Homeland Security uses to share sensitive information with state and local authorities, gaining access to important, but unclassified, data. The attack began in March and occurred again a few weeks later, according to a report in Federal Computer Week.

How the Debian OpenSSL bug almost spawned a disaster

When news broke last year about the serious flaw in the Debian OpenSSL pseudorandom number generator, security experts knew it was a serious problem and warned users to regenerate any keys that had been created using the vulnerable versions of the OpenSSL package. It was a big problem, but it turns out that it could have been far worse.

Serious new flaw found in IIS 6.0

A new remotely-exploitable vulnerability has been found in the Microsoft IIS 6.0 Web server. The flaw is quite similar to one that was discovered eight years ago in earlier versions of IIS, and exploitation of the weakness could enable an attacker to upload content to the vulnerable server.


From CSO (Robert McMillan)
In the face of increased attacks by its citzens against Chinese networks, China is stepping up the severity and enforcement of its computer crime laws. China often is cited as one of the major havens for hackers and malware authors, but as this IDG News Service report shows, the country is beginning to crack down on its own citizens for computer crimes in an effort to change that image.

Botnets have become one of the more insidious threats on the Internet in the last few years. Large-scale botnets such as the Storm, Asprox and Nugache networks have caused tremendous problems by serving as platforms for spamming operations, DDoS attacks and other mischief. In this podcast from SearchSecurity.com, Rob Westervelt talks with Brian Rexroad of AT&T Labs about the company’s botnet research program.

Little, if anything, gets Mac users more exercised than a mention of their favorite machine’s security problems. Despite the fact that security experts believe Macs to be much easier to exploit than Windows machines, Mac users simply trot out the old saw about there not being any virus attacks on Macs. Not only is that assertion demonstrably false, but it misses the point entirely: Virus attacks are not an indicator of the security of an operating system.

From SC Magazine (Chuck Miller)
Attackers have discovered that spreading their malware is a much easier task on social networking sites than it is on the rest of the Web. The success rate for malware on social networking sites such as Twitter and Facebook is 10 percent, compared with less than one tenth of that on normal sites and through email.

The back-and-forth in Washington over who should run the cybersecurity program for the federal government has reached a fever pitch, as lawmakers, federal agencies and other interested parties jockey for position and budget dollars in the run-up to the release of the results of the Obama administration’s review of cybersecurity operations in the federal government. But perhaps the question isn’t which agency or office should have ultimate authority over cybersecurity, but whether any of them should.

From The New York Times (John Markoff)

The small cadre of experts who spend their time doing the meticulous, painstaking work of tracing cyber attacks is increasingly relying on a combination of advanced technical tools and old-fashioned intelligence-gathering techniques to track down the people and organizations responsible for the attacks. These investigators for years have been relying almost exclusively on custom software programs to do their work, but the changing nature and increased sophistication of the attacks has forced a change in these tactics.