Exciting information to share!! KrowTen Security is proud to announce its affiliation with WildPort Security. WildPort is an Information Security firm that delivers top-notch support and services to match. They specialize in network assessments and measuring security performance. Check them out http://wildportsecurity.com
Big things coming from these two companies. Stay tuned…..
KrowTen has been off for awhile. Getting established and learning new things. Stay tuned! Lots of info on the way.
If you use any type of mobile device in your day to day life….keep reading. Ignorance can only bring you so far!
Two separate studies of mobile devices have found serious privacy and security issues. One of the studies found that smartphones and tablet PCs can be eavesdropped on when they are being used to make purchases, conduct online banking transactions, or access VPNs (virtual private networks). Another study uncovered a number of ways to break into Apple’s iOS, its operating system for mobile devices. It is likely that cyber criminals will increasingly turn to mobile devices in their attacks as the devices become more and more commonplace in business transactions.
- New security flaws detected in mobile devices (usatoday.com)
- ThreatMetrix Releases Data on Mobile Device Transactions: Will Android Beat iOS on “Mobile Monday”? (prweb.com)
- Online Banking Trends (ally.com)
The Cisco WebEx Recording Format (WRF) player contains three buffer overflow vulnerabilities. In some cases, exploitation of the vulnerabilities could allow a remote attacker to execute arbitrary code on the system with the privileges of a targeted user.
The Cisco WebEx Players are applications that are used to play back WebEx meeting recordings that have been recorded on a WebEx meeting site or on the computer of an online meeting attendee. The players can be automatically installed when the user accesses a recording file that is hosted on a WebEx meeting site. The players can also be manually
installed for offline playback after downloading the application from
If the WRF player was automatically installed, it will be automatically upgraded to the latest, nonvulnerable version when users access a recording file that is hosted on a WebEx meeting site. If the WRF player was manually installed, users will need to manually install anew version of the player after downloading the latest version from
Cisco has updated affected versions of the WebEx meeting sites and WRF player to address these vulnerabilities.
This advisory is available at the following link:
- Cisco Security Advisory: Cisco Small Business SRP 500 Series (netsecurityit.wordpress.com)
- Cisco Security Advisory: Cisco IOS Software Smart Install Denial of Service Vulnerability (netsecurityit.wordpress.com)
- Cisco Security Appliances at risk from Telnet bug (netsecurityit.wordpress.com)
- Cisco Security Advisory: Buffer Overflow Vulnerabilities in the Cisco WebEx Player (seclists.org)
- CVE-2012-1336 (webex_recording_format_player) (web.nvd.nist.gov)
- CVE-2012-1335 (webex_recording_format_player) (web.nvd.nist.gov)
Federal agencies are moving toward “BYOD” mobile policies even as questions about security and privacy continue to arise, according to panelists speaking April 4 at the FOSE conference.
A number of agencies have instituted or are considering BYOD (Bring Your Own Device) policies because many employees rely on their personal smart phones and tablets to manage their lives. The White House is preparing to release a governmentwide BYOD policy.
At the same time, the BYOD trend presents some tricky challenges not fully resolved yet, according to speakers on a FOSE panel.
Because of the ubiquity of smart phones in peoples’ lives, the government is moving toward BYOD “whether we like it or not,” said Rob Burton, partner at the Venable LLP law firm. “But this train may be moving too fast.”
One of the sticking points is whether government agencies have the right to examine or download personal information from employee devices. Burton cited a recent Supreme Court case involving a municipality investigating a policeman for alleged violations. The city downloaded personal information from the policeman’s city-owned smart phone, and the court ruled that was reasonable.
In that case, the court ruled that the government agency had a right to examine the personal information. But if the device had been owned by the policeman, the ruling might have been different, Burton suggested. The privacy expectation presumably would trump any agreements signed by the employee, he added.
Another challenge is security against the growing threat of foreign agents seeking to gain access to U.S. government information, Burton said.
“We think the cyber issues for BYOD are a huge legal area and will be very tough and challenging for corporations and government agencies,” Burton said.
Even at agencies with BYOD policies in place, employees might choose not to participate because of objections to the terms of the policy, according to another panelist at a related seminar.
At the General Services Administration’s Federal Systems Integration and Management Center, about half of the 120 employees currently own personal mobile devices, said Chris Hamm, operations director at the center.
Under an existing BYOD policy and a mobile device management system, the workers are able to use those devices to access email and calendar applications, as well as some other Web browser-based applications, Hamm said.
For connection and integration with GSA’s network, the agency requests that before a device can be connected, the employee sign several agreements for security and access authorizations, Hamm said. One of the agreements is to allow remote wiping of the device under certain conditions.
More from this article here: http://fcw.com/articles/2012/04/04/fose-byod-mobile.aspx
- BYOD Control: Aruba brings it together with ClearPass (netsecurityit.wordpress.com)
- Why Businesses Must Embrace BYOD and Social Media. (itsecurityrisksandsolutions.wordpress.com)
- 77% Of Workers Use Personal iPhones, Other Devices On The Job (cultofmac.com)
Quickbooks 2009 – Quickbooks 2012; in conjunction with Internet Explorer Versions 7-9
- The vulnerability described in this document can potentially be
code as the user viewing the malicious content.
- Intuit Help System Protocol File Retrieval:
- The vulnerability described in this document can be exploited by
which the user viewing the HTML has local or network file system
access. The attacker must know or guess the path and file name of the
target ZIP archive and the target file it contains. A further
significant limitation is that files in subdirectories inside of ZIP
archives have proven inaccessible, based on a sampling of Windows
ZIPs, Microsoft Office 2007 documents, JARs, and APKs.
No vendor response at the time of public release. More information with be posted has it becomes available.