Infosec Weekly Roundup , March 5 – 11, 2012

DNS CHANGER: How do I know if my computer is safe?

After observing millions of infected computers with DNS changer malware , several awareness action have been launched to help victims clean their computer against this sophisticated malware as it blocks computer from updating security software’s and disable any protection on the machine. Here is a post by Theresa Payton, Fortalice, LLC about how to protect yourself from this malicious software.

“Three Tips for a Healthy Computer or Digital Device:

* Maintain up-to-date browsers, software, computers, and antivirus software.
* Do not clink on links in email messages unless you have to – even from people you know.
* Use extreme caution when opening email attachments – verify with the sender before opening

http://fortalicesolutions.blogspot.com/2012/03/dns-changer-how-do-i-know-if-my.html

Michael Jackson back catalogue allegedly stolen by hackers

Another attack on Sony Music resources here we find more than 50,000 files from Sony Music, most by late pop legend, are said to have been illegally downloaded.

http://www.guardian.co.uk/music/2012/mar/05/michael-jackson-back-catalogue-stolen

Symantec Confirms 2006 Norton AV Source Code Dump

Symantec have declared several software leakages on the last period, after the PcAnywhere  program incident Infosecisland have published another exclusive report about Symantec source code leakage but this time it’s for the Norton Antivirus program.

“Infosec Island had made multiple attempts to prompt YamaTough to provide actual proof that the data had in fact been stolen from servers operated by the Indian government, but all requests were either met with silence or an outright refusal.”

http://infosecisland.com/blogview/20647-Symantec-Confirms-2006-Norton-AV-Source-Code-Dump.html

Malware Analysis Tutorials: a Reverse Engineering Approach

Very interesting and useful Tutorial for reversing malware mostly based on open-source tools for virtualization, dynamic and static analysis.

“Roadmap: You need to first follow Tutorials 1 to 4 to set up the lab configuration. Then each tutorial addresses an independent topic and can be completed separately (each one will have its own lab configuration instructions).”

http://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html

Defending Against a New Generation of Security Threats

The last up is an online webinar that are going to be held by Richard Stiennon, James M. Connolly and Michael Montecillo  covering this year threats and how to deal with emerging security threats.

“New dangers await the information technology professional. The information security threats that IT has become familiar with, including viruses, misplaced disks, and denial-of-service attacks, suddenly are taking a back seat to a new class of dangers. This Webinar will provide a look at how to deal with the emerging threats that experts believe present the greatest infosecurity dangers in 2012, including persistent threats, the issues raised by an increased focus on mobile computing, and the implications of social media use for social engineering and executive safety. “

http://www.theitservicessite.com/webinar.asp?webinar_id=29820

That’s all for this week, if you have more information security news please to share them with our readers by sending emails or using the contact form.

Share
You can leave a response, or trackback from your own site.