During this week there were several hacks and security related events. I'll summarize them here.
First, there was a news that VeriSign was hacked, which is actually quite a big news. Here are some reactions to it. Not much is known what happened or what is a damage. It turns out that the hack happened in 2010. but neither management nor public were notified by technical staff. VeriSign reported incident in SEC filling where Reuters spotted it. What is important is that VeriSign is actually in a security business and it runs two very important services, issuing of SSL certificates and DNS system.
Second incident is related to Anonymous posting a recording of a conference call between FBI, Scotland Yard and some other law enforcement agencies. The conference call was about investigation of Anonymous and other similar groups. The mail message was sent to 44 different addresses across 8 different organizations. Quite a huge number. Apparently, anonymous got hold on the mail from one or more of the recipients of a mail message. The mail message contained also access code and conference call bridge telephone number (BridgeTN). This probably allowed crackers to dial to conference call bridge, enter access code and get into a conference call. Actually easy. The point is that Anonymous didn't intercept the call as many Web pages are screaming!
Random notes of what's on my mind. Additional materials you'll find on my homepage.
Friday, February 3, 2012
Subscribe to:
Post Comments (Atom)
About Me
- Stjepan Groš (sgros)
- scientist, consultant, security specialist, networking guy, system administrator, philosopher ;)
Blog Archive
-
▼
2012
(124)
-
▼
February
(18)
- Nortel security breach...
- Computer units sold...
- Otvoreni kod u Hrvatskoj...
- Problem of encrypted hard disks in court...
- Sigurnosni problemi u susjedstvu...
- Biseri naših neukih novinara 3...
- Spoofed mail messages...
- Moderni Robin Hood, a.k.a. Anonymous...
- Napadi Anonymousa po Hrvatskoj...
- Muljanje s titulama...
- Who's listening on an interface...
- Malo o velikim sustavima i percepciji ljudi...
- A bit more of history...
- Getting CentOS on RAID after using text mode insta...
- Error: cannot open tty-output
- Calculating TCP RTO...
- More news about security incidents...
- Promjena uvjeta korištenja Google usluga...
-
▼
February
(18)
3 comments:
To be clear, Verisign, Inc. was compromised, not the Verisign security product lines that were acquired by Symantec.
Symantec (my employer) was not compromised.
You can read their blog here:
http://www.symantec.com/connect/blogs/how-can-we-be-so-sure
True, but I believe that this post doesn't imply that Symantec was compromised in this case?
Post a Comment