Security News #0x63
- Come to our next Cybersecurity@Towson event, Automated Malware Reverse Engineering with DarkPoint. It’ll be Monday, February 10, from 5:30-7:30 on the Towson campus.
- Last year (2013), Mubix gave a talk on how to write malware for mid-Atlantic CCDC at the most recent Shmoocon Epilogue. MS-08-067 over IPV6? Love it!
- Are you interested in web security? Are you interested in being sure that your SSL sessions are using the proper protocol, cipher suites, and key sizes? Then you might want to take a look at what Security Labs is doing. They have an SSL rating guide, and a way to test the quality (as they measure it) of a site’s SSL settings.
- The folks at Quarkslab continue to look into the TCP/32764 backdoor that exists on a number of common routers. They discuss ways these devices could be remotely identified, and some patching techniques.
- Traffic from China to .com addresses (not .cn) were re-routed last week; it is unclear if this was an attack or a mistake.
- Reginaldo Silva shares his story of how he received the largest ever bug bounty payout. The folks at Facebook talk about the situation from their perspective.
- If you think that all cyber-attacks affect large organizations (Target, Neiman-Marcus), you might want to know that Howard County public schools concluded that they were attacked last week.
- Mind you, it is still the case that the large organizations are being attacked as now Michaels apparently has been the target of an attack.
- It looks like refrigerators are not sending spam despite the article linked last week. Yet.
Random Humor Retraction