Infosec Weekly Round-up October 01-07, 2012

Millions of Brazilian internet users falling victim to a sustained and silent mass attack

“This is the description of an attack happening in Brazil since 2011 using 1 firmware vulnerability, 2 malicious scripts and 40 malicious DNS servers, which affected 6 hardware manufacturers, resulting in millions of Brazilian internet users falling victim to a sustained and silent mass attack on DSL modems.”

https://www.securelist.com/en/blog/208193852/The_tale_of_one_thousand_and_one_DSL_modems

Washington confirms Chinese hack attack on White House computer

“White House sources partly confirmed an alarming report that U.S. government computers — reportedly including systems used by the military for nuclear commands — were breached by Chinese hackers.”

http://www.foxnews.com/tech/2012/10/01/washington-confirms-chinese-hack-attack-on-white-house-computer/

Map Of Global Cyberattacks, Created By Honeynet Project, Shows Where Strikes Are Happening RIGHT NOW

“Ever wondered how many cyberattacks occur across the world every second? The non-profit Honeynet Project attempts to give you a sense of where and how frequently these cyberstrikes happen.”

http://www.huffingtonpost.com/2012/10/05/map-of-global-cyberacks_n_1927861.html

Google to Users: Your Account May Be Under Attack

“ Google began to issue a warning similar to one it had sent in June to tens of thousands of Gmail users to inform them that their accounts may be targeted by hackers.”

http://www.technewsdaily.com/8172-google-accounts-under-attack.html

Creating a Self-Defending Network Using Open Source Software

“Let’s talk network security. You’ve got a firewall and a DMZ, you’re all set, right? Not so fast slugger. We preach a theory called “defense in depth” here at Hurricane. And that means you need something to defend you when your firewall admins make a mistake. And something to protect you when that layer fails.”

http://www.slideshare.net/hurricanelabs/creating-a-selfdefending-network-using-open-source-software

That’s all for this week, if you have more information security news please to share them with our readers by sending emails or using the contact form.

Share