Infosec Weekly Round-up October 15-21, 2012

Businesses take 7 months to detect intruders

“Corporations are taking an average of seven months to detect system breaches despite most having access to forensic information in their logs, Verizon has warned. According to Bryan Sartin, vice president of Verizon’s Research Investigations Solutions Knowledge (RISK) team, the statistic indicated a need for more security information sharing across organisations.”

http://www.itnews.com.au/News/319549,businesses-take-seven-months-to-detect-intruders.aspx

Computer Viruses Are “Rampant” on Medical Devices in Hospitals

Computerized hospital equipment is increasingly vulnerable to malware infections, according to participants in a recent government panel. These infections can clog patient-monitoring equipment and other software systems, at times rendering the devices temporarily inoperable.

http://www.technologyreview.com/news/429616/computer-viruses-are-rampant-on-medical-devices/

Olmasco bootkit: next circle of TDL4 evolution (or not?)

“Olmasco (also known as SST, MaxSS)  is a modification of the TDL4 bootkit family that we’ve been aware of since summer 2011. We started to track a new wave of activity from a new Olmasco dropper at the end of this summer. This bootkit family was the second to use VBR (Volume Boot Record) infection to bypass kernel-mode code signing policy since Rovnix (Rovnix bootkit framework updated) appeared in-the-wild.”

http://blog.eset.com/2012/10/18/olmasco-bootkit-next-circle-of-tdl4-evolution-or-not

Blackhole exploit kit v2 on the rise

“It should come as no surprise that attackers are upgrading their Blackhole exploit kits to a new and more powerful version. An update is now available, thanks to the launch of Blackhole Exploit Kit v2 and we are starting to see adoption of this latest version.”

http://research.zscaler.com/2012/10/blackhole-exploit-kit-v2-on-rise.html

ANTI-MALWARE REPORTS: Anti-Virus Protection

“These reports aim to compare the effectiveness of anti-malware products provided by well-known security companies. The products were exposed to internet threats that were live during the test period. This exposure was carried out in a realistic way, closely reflecting a customer’s experience. These results reflect what would have happened if a user was using one of the products and visited an infected website.”

http://dennistechnologylabs.com/reports/s/a-m/2012/

That’s all for this week, if you have more information security news please to share them with our readers by sending emails or using the contact form.

Share
You can leave a response, or trackback from your own site.