*************************** Sponsored By SANS ***************************
SANS 8th Annual Log and Event Management Survey is Under Way
Take the SANS 8th Annual Log and Event Management Survey. Be a part of this industry leading survey cited in top technology publications and blogs! Also be entered to WIN a $250 American Express Card giveaway when survey results are released during SANS webcasts held in early May at www.sans.org/webcasts.
- --SANS Security East 2012, New Orleans, LA January 17-26, 2012 11 courses. Bonus evening presentations include Advanced VoIP Pen Testing: Current Threats and Methods; and Helping Small Businesses with Security. http://www.sans.org/security-east-2012/
- --SANS North American SCADA 2012, Lake Buena Vista, FL January 21-29, 2012 Gain the most current information regarding SCADA and Control System threats and learn how to best prepare to defend against them. Hear what works and what doesn't from peer organizations. Network with top individuals in the field of SCADA security. Return from the summit with solutions that you can immediately put to use in your organization. Pre-Summit courses: January 21-25, 2012 Summit: January 26-27, 2012 Post-Summit Courses: January 28-29, 2012 http://www.sans.org/north-american-scada-2012/
- --SANS Monterey 2012, Monterey, CA January 30-February 4, 2012 6 courses. Bonus evening presentations include Who Do You Trust? SSL and TLS Under Attack; and IOS Programming Demo. http://www.sans.org/monterey-2012/
- --SANS Phoenix 2012, Phoenix, AZ February 13-18, 2012 7 courses. Bonus evening presentations include Desktop Betrayal: Exploiting Clients Through the Features They Demand; and Windows Exploratory Surgery with Process Hacker. http://www.sans.org/phoenix-2012/
- --SANS 2012, Orlando, FL March 23-39, 2012 42 courses. Bonus evening presentations include Why Our Defenses Are failing Us: One Click is all It Takes ...; Evolving Threats; and Windows Exploratory Surgery with Process Hacker. http://www.sans.org/sans-2012/
The US Defense Department's 2012 funding bill contains a provision that gives the military the authority to launch offensive strikes in the cyber arena. The provision was present in the House version of the bill and not the Senate version, but appeared in the final, reconciled form of the bill. While the bill does not get very specific, it is likely to cover actions such as releasing malware like Stuxnet; bringing down websites with DDoS attacks, or disabling online forums where terrorists share information. The language of the bill reads: "Congress affirms that the Department of Defense has the capability, and upon direction by the President may conduct offensive operations in cyberspace;" and "in certain instances, the most effective way to deal with threats and protect US and coalition forces is to undertake offensive military cyber activities, including where the role of the United States Government is not apparent or to be acknowledged." -http://www.wired.com/threatlevel/2011/12/internet-war-2/ -http://www.sdtimes.com/blog/post/2011/12/15/US-readies-itself-for-cyber-war.aspx
Certain Industrial Control PLCs Have Hidden Accounts with Hard-Coded Passwords (December 13 & 14, 2011)
************************ SPONSORED LINK **********************************
1) Take the first annual SANS Mobility Survey and Win $250
Take this groundbreaking survey to help determine policy, controls and standards needed to enable users to use their own small mobile devices for work-related functions. Also be entered to win a $250 American Express Card Giveaway when results are announced in late March at www.sans.org/webcasts.
Man Arrested for 2010 DDoS Attack On Gene Simmons's Website (December 14 & 15, 2011)
The FBI has arrested Kevin George Poe for allegedly launching a distributed denial-of-service (DDoS) attack against the website of Gene Simmons, singer and bassist for the rock band KISS. Poe faces charges of conspiracy and unauthorized impairment of a protected computer. He is allegedly affiliated with the hacking collective known as Anonymous. Poe allegedly used Anonymous's Low Orbit Ion Canon to launch the attack, which took place over a five-day period in 2010. The tool, once widely used by members of the group, has a privacy leak - the packets generated by the tool include the IP addresses of those conducting the attack. -http://www.informationweek.com/news/security/attacks/232300516 -http://www.theregister.co.uk/2011/12/15/feds_cuff_simmons_ddos_hack_suspect/
Oracle has released an update for its Java software to address a number of security flaws. The majority of fixes addressed in Java 6 Update 30 are for performance and stability issues. The security issues it fixes affect developers. One of the fixes remedies a problem in Java 6 Update 29 that broke SSL connectivity. Another fix addresses a problem in which cookies were occasionally dropped. -http://www.scmagazineus.com/oracle-updates-java-adobe-patches-coldfusion/article /219224/
John Pescatore is Vice President at Gartner Inc.; he has worked in computer and network security since 1978.
Stephen Northcutt founded the GIAC certification and is President of STI, The Premier Skills-Based Cyber Security Graduate School, www.sans.edu.
Dr. Johannes Ullrich is Chief Technology Officer of the Internet Storm Center and Dean of the Faculty of the graduate school at the SANS Technology Institute.
Ed Skoudis is co-founder of InGuardians, a security research and consulting firm, and author and lead instructor of the SANS Hacker Exploits and Incident Handling course.
William Hugh Murray is an executive consultant and trainer in Information Assurance and Associate Professor at the Naval Postgraduate School.
Rob Lee is the curriculum lead instructor for the SANS Institute's computer forensic courses (computer-forensics.sans.org) and a Director at the incident response company Mandiant.
Rohit Dhamankar is a security professional currently involved in independent security research.
Tom Liston is a Senior Security Consultant and Malware Analyst for InGuardians, a handler for the SANS Institute's Internet Storm Center, and co-author of the book Counter Hack Reloaded.
Dr. Eric Cole is an instructor, author and fellow with The SANS Institute. He has written five books, including Insider Threat and he is a founder with Secure Anchor Consulting.
Ron Dick directed the National Infrastructure Protection Center (NIPC) at the FBI and served as President of the InfraGard National Members Alliance - with more than 22,000 members.
Mason Brown is one of a very small number of people in the information security field who have held a top management position in a Fortune 50 company (Alcoa). He is leading SANS' global initiative to improve application security.
David Hoelzer is the director of research & principal examiner for Enclave Forensics and a senior fellow with the SANS Technology Institute.
Alan Paller is director of research at the SANS Institute.
Marcus J. Ranum built the first firewall for the White House and is widely recognized as a security products designer and industry innovator.
Clint Kreitner is the founding President and CEO of The Center for Internet Security.
Brian Honan is an independent security consultant based in Dublin, Ireland.
David Turley is SANS infrastructure manager and serves as production manager and final editor on SANS NewsBites.
Please feel free to share this with interested parties via email, but no posting is allowed on web sites. For a free subscription, (and for free posters) or to update a current subscription, visit http://portal.sans.org/
I have never seen such high quality training, distilled to a perfected message, and compressed into a timeframe that any organization should willingly commit employee time to taking as a risk reduction strategy. -- Jim Richards III