Arlington, VA hosts SANS training program for the CISSP(R) Certification Exam, October 4 – 9

SANS is pleased to announce Community SANS Arlington, VA where
we will teach Management 414: SANS Training Program for the
CISSP(R) Certification Exam, October 4 – 9.  The course will be
taught by SANS Certified Instructor Ted Demopolous.  For complete
course description, event details, and to register, please visit
(https://www.sans.org/arlington-2010-cs).

If you need to take this course sooner than the first week of
October, there are a few seats still available in Charleston,
SC for the same course starting on Monday, August 23,
(https://www.sans.org/charleston-2010-cs).

SANS Instructor Ted Demopolous just completed teaching this sold out
course to a group of students in Dulles, and so we are scheduling
another class as so many of you are working to make sure you are
compliant with the DoD 8570.1 directive on security certifications
by the end of this year.  Why take this course from SANS as opposed
to another training provider?

Over the past four years, 98% of the people who have taken this SANS
course and then took the CISSP(R) certification exam have passed
the exam.  Don’t you want those odds on your side when you sit for
the CISSP(R) exam this year?

Save $400 on tuition fees when you register by September 1.

TRAINING EVENT DETAILS:

When:   October 4 – 9, 2010

Course: Management 414: SANS Training Program for the CISSP(R)
Certification Exam
Instructor: Ted Demopolous
(https://www.sans.org/arlington-2010-cs)

Where:  Residence Inn Marriott
Arlington Pentagon City
550 Army Navy Drive
Arlington, Virginia 22202
Phone: 703-413-6630

Tuition: $3,095 through September 1, 2010
(https://www.sans.org/arlington-2010-cs/tuition.php)

Group Discounts:  contact community@sans.org

THE COMMUNITY SANS ADVANTAGE (http://www.sans.org/info/41114)

The Community SANS format offers the most popular SANS courses in
your local community at a reduced tuition fee.

Small class sizes make it easier for you to get the access you need
to your veteran Community SANS instructor, Ted Demopolous.  The small
class size also makes it much easier for you to network with your
professional peers throughout the six course days.

SANS promises that you will be able to use what you learn in the
classroom as soon as you return to the office.

Does this sound like the kind of training that would help you to be
more effective in your job combating Cyber Crime and Cyber Terrorism?
Won’t your management want to know you are working to get the
skills needed to provide a secure networked environment for your
organization?  Then register today to join us in Dulles by visiting
(http://www.sans.org/info/58518).

Please contact me if you have any questions, and thanks for your
continued participation in the SANS community.

See you in Arlington!

Warm regards,

Scott Weil – Director
SANS Training Without Travel

********************************************************************

SANS is pleased to announce an easy way to view all upcoming training
events happening right in your community.  To view our current schedule
please visit us at (http://www.sans.org/info/33203)

To change your subscription, address, or other information, visit
http://portal.sans.org.  If you wish to have your name removed from our
mailing list, visit the site above, click on “update your account” and
check the box “Do not send any email.”

SANS Institute, 8120 Woodmont Ave., Suite 205, Bethesda, MD 20814-2743

********************************************************************

SC Magazine Webcast – IBM 20/20 Webcast

SC Magazine is pleased offer a unique webcast series – SC Magazine 20/20. The free webcast series features a member of the SC Magazine editorial team sitting down with various industry thought leaders to discuss the past, present and future of IT security. Our next webcast in the series:

Different day, same story

Date: Wednesday, August 11, 2010
Time: 2:00 p.m. ET/11:00 a.m. PT

Click on the link below to register for free:
http://sc.haymarketcomm.net/r/?ZXU=1261640&ZXD=71914587

Weaknesses in the software and applications used by corporations are the prime source for hackers to breach infrastructures, steal choice critical data and turn a profit in the sale or use of it. The exploitation of vulnerabilities that crop up because of corrupted websites or malicious content isn’t new, but there are various ways to confront the problems. IBM’s Ryan Berg reviews some of the persistent and common threats that take advantage of holes in organizations’ systems, reviewing for us why some attack methods – like remote code execution, SQL injection, or cross-site scripting – still exist and what some of the simple measures are that CSOs can use against them.

Featured speaker
Illena Armstrong, editor-in-chief, SC Magazine
Ryan Berg, Senior Architect of Security Research, IBM

–Can’t attend live? Register below to receive a link to the recorded webcast.

Click on the link below to register for free:
http://sc.haymarketcomm.net/r/?ZXU=1261641&ZXD=71914587

Sponsored by:
IBM
http://sc.haymarketcomm.net/r/?ZXU=1261642&ZXD=71914587

IBM is the world’s largest information technology company, with 80 years of leadership in helping clients innovate. Drawing on a breadth of capabilities and best practices from across IBM and our extensive partner ecosystem, we offer clients within every industry, a wide range of services, solutions and technologies that can help them improve productivity, respond rapidly to the needs of their business and reduce development and operations costs.

For more information, email Anthony Curry at mailto:anthony.curry@haymarketmedia.com

SecurityOrb.com Deal of the Week – Samsung NP-N130-JA01US Refurbished Netbook from TigerDirect

The SecurityOrb.com deal of the week comes from TigerDirect.com .  It is a refurbished Samsung NP-N130-JA01US Netbook with a webcam and Windows 7 Starter.

Check it out here

Samsung NP-N130-JA01US Refurbished Netbook – Intel Atom N270 1.6GHz, 1GB DDR2, 160GB HDD, 10.1″ WSVGA, Windows 7 Starter

New threat: Hackers look to take over power plants

LOLITA C. BALDOR, Associated Press Writer

WASHINGTON — Computer hackers have begun targeting power plants and other critical operations around the world in bold new efforts to seize control of them, setting off a scramble to shore up aging, vulnerable systems.

Cyber criminals have long tried, at times successfully, to break into vital networks and power systems. But last month, experts for the first time discovered a malicious computer code — called a worm — specifically created to take over systems that control the inner workings of industrial plants.

In response to the growing threat, the Department of Homeland Security has begun building specialized teams that can respond quickly to cyber emergencies at industrial facilities across the country.

As much as 85 percent of the nation’s critical infrastructure is owned and operated by private companies, ranging from nuclear and electric power plants to transportation and manufacturing systems. Many of the new attacks have occurred overseas, but the latest episode magnified worries about the security of plants in the U.S.

“This type of malicious code and others we’ve seen recently are actually attacking the physical components, the devices that open doors, close doors, build cars and open gates,” said Sean McGurk, director of control systems security for Homeland Security. “They’re not just going after the ones and zeros (of a computer code), they’re going after the devices that actually produce or conduct physical processes.”

Officials have yet to point to any operating system that has been compromised by the latest computer worm. But cyber experts are concerned that attacks on industrial systems are evolving.

In the past, it was not unusual to see hackers infiltrate corporate networks, breaking in through gaps and stealing or manipulating data. The intrusions, at times, could trigger plant shutdowns. The threat began to escalate last year, with cyber criminals exploiting weaknesses in systems that control what the industries do.

The latest computer worm, dubbed Stuxnet, was an even more alarming progression. Now hackers are creating codes to actually take over the critical systems.

In many cases, operating systems at power plants and other critical infrastructure are decades old. Sometimes they are not completely separated from other computer networks used by companies to run administrative systems or even access the Internet.

Those links between the administrative networks and the control systems provide gateways for hackers to insert malicious codes, viruses or worms into the programs that operate the plants.

Sitting in his office not far from Homeland Security’s new state-of-the-art cyber operations center, McGurk recently held out a small blue computer flash drive containing the destructive Stuxnet worm.

Experts in Germany discovered the worm, which has since shown up in a number of attacks — primarily in Iran, Indonesia, India, and the U.S., according to Microsoft. Stuxnet had tried to infect as many as 6,000 computers, as of July 15, according to Microsoft data.

German officials transmitted the malware to the U.S. through a secure network, and experts at the Energy Department’s Idaho National Laboratory began to analyze it.

In plain terms, the worm was able to burrow into some operating systems that included software designed by Siemens AG, by exploiting a vulnerability in several versions of Microsoft Windows.

On Monday, Microsoft released another update to address the problem, and Siemens has taken similar steps.

Annual reports issued by Homeland Security and the Department of Energy have detailed weaknesses in the industrial computer systems, and have repeatedly pressed companies to improve security practices. Reports as recently as this May urged companies to routinely download patches to update software, change and improve passwords, carefully restrict access to critical systems and use firewalls to separate commonly used networks from those that control key systems.

A successful attack against a critical control systems, the Energy Department warned in its May report, “may result in catastrophic physical or property damage and loss.”

Over the past year, Homeland Security has quietly been deploying teams of experts around the country to assess weaknesses in industrial control systems. The agency has created four teams and — with a budget scheduled to increase from $10 million this year to $15 million next year — has plans to grow to 10 teams in 2011.

The teams are armed with a $5,000 kit: a black, suitcase-sized bag crammed with cables, converters, data storage and high-tech computer forensic tools. With that equipment, they can download the problem malware, analyze it and work with the companies to correct or clean their systems.

So far, said McGurk, the teams have done 50 assessments and have been dispatched 13 times to investigate and help correct cyber incidents and attacks. Nine of those cases involved some type of deliberate cyber intrusion, while the other four were the unintended result of an operator’s action.

In one of the nine intrusion cases, a company representative had gone to a conference and had the presentation documents downloaded onto a computer flash drive.

One of the files was infected with the Mariposa botnet, a malicious software code that has infected 12 million computers worldwide, including hundreds of companies and at least 40 major banks in 190 countries since appearing in December 2008.

When the man returned to his office and connected his laptop to the company’s network, the botnet spread, eventually affecting nearly 100 computers.

A Homeland Security team was called in and helped the company evaluate the problem and begin to clear up the system.

Source: The Associated Press

Microsoft Security Bulletin MS10-046 – Critical

Microsoft Security Bulletin MS10-046 – Critical

Vulnerability in Windows Shell Could Allow Remote Code Execution (2286198)

Published: August 02, 2010 | Updated: August 03, 2010

Version: 1.1

General Information

Executive Summary

This security update resolves a publicly disclosed vulnerability in Windows Shell. The vulnerability could allow remote code execution if the icon of a specially crafted shortcut is displayed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.

This security update is rated Critical for all supported editions of Microsoft Windows. For more information, see the subsection, Affected and Non-Affected Software, in this section.

The security update addresses the vulnerability by correcting validation of shortcut icon references. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

This security update addresses the vulnerability first described in Microsoft Security Advisory 2286198.

Recommendation. The majority of customers have automatic updating enabled and will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates and install this update manually. For information about specific configuration options in automatic updating, see Microsoft Knowledge Base Article 294871.

For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update immediately using update management software, or by checking for updates using the Microsoft Update service.

See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.

Known Issues. None

Top of section

Affected and Non-Affected Software

The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, visit Microsoft Support Lifecycle.

Affected Software

Operating System Maximum Security Impact Aggregate Severity Rating Bulletins Replaced by this Update
Windows XP Service Pack 3 Remote Code execution Critical None
Windows XP Professional x64 Edition Service Pack 2 Remote Code execution Critical None
Windows Server 2003 Service Pack 2 Remote Code execution Critical None
Windows Server 2003 x64 Edition Service Pack 2 Remote Code execution Critical None
Windows Server 2003 with SP2 for Itanium-based Systems Remote Code execution Critical None
Windows Vista Service Pack 1 and Windows Vista Service Pack 2 Remote Code execution Critical None
Windows Vista x64 Edition Service Pack 1 and Windows Vista x64 Edition Service Pack 2 Remote Code execution Critical None
Windows Server 2008 for 32-bit Systems and Windows Server 2008 for 32-bit Systems Service Pack 2* Remote Code execution Critical None
Windows Server 2008 for x64-based Systems and Windows Server 2008 for x64-based Systems Service Pack 2* Remote Code execution Critical None
Windows Server 2008 for Itanium-based Systems and Windows Server 2008 for Itanium-based Systems Service Pack 2 Remote Code execution Critical None
Windows 7 for 32-bit Systems Remote Code execution Critical None
Windows 7 for x64-based Systems Remote Code execution Critical None
Windows Server 2008 R2 for x64-based Systems* Remote Code execution Critical None
Windows Server 2008 R2 for Itanium-based Systems Remote Code execution Critical None

*Server Core installation affected. This update applies, with the same severity rating, to supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, whether or not installed using the Server Core installation option. For more information on this installation option, see the TechNet articles, Managing a Server Core Installation andServicing a Server Core Installation. Note that the Server Core installation option does not apply to certain editions of Windows Server 2008 and Windows Server 2008 R2; seeCompare Server Core Installation Options.

Top of section

Frequently Asked Questions (FAQ) Related to This Security Update

Vulnerability Information

Severity Ratings and Vulnerability Identifiers

Shortcut Icon Loading Vulnerability – CVE-2010-2568

Update Information

Detection and Deployment Tools and Guidance

Security Update Deployment

Other Information

Acknowledgments

Microsoft thanks the following for working with us to help protect customers:

Sergey I. Ulasen and Oleg Kupreev of VirusBlokAda for reporting the Shortcut Icon Loading Vulnerability (CVE-2010-2568)
Andreas Marx and Maik Morgenstern of AV-Test for reporting the Shortcut Icon Loading Vulnerability (CVE-2010-2568)
Will Dormann of CERT/CC for working with us on the Shortcut Icon Loading Vulnerability (CVE-2010-2568)
Niels Teusink for working with us on the Shortcut Icon Loading Vulnerability (CVE-2010-2568)
Stefan Kanthak for working with us on the Shortcut Icon Loading Vulnerability (CVE-2010-2568)

Top of section

Microsoft Active Protections Program (MAPP)

To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please visit the active protections Web sites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.

Top of section

Support

Customers in the U.S. and Canada can receive technical support from Security Support or 1-866-PCSAFETY. There is no charge for support calls that are associated with security updates. For more information about available support options, see Microsoft Help and Support.
International customers can receive support from their local Microsoft subsidiaries. There is no charge for support that is associated with security updates. For more information about how to contact Microsoft for support issues, visit the International Support Web site.

Top of section

Disclaimer

The information provided in the Microsoft Knowledge Base is provided “as is” without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Top of section

Revisions

V1.0 (August 2, 2010): Bulletin published.
V1.1 (August 3, 2010): Added an entry to the section, Frequently Asked Questions (FAQ) Related to This Security Update, to clarify why Server Core installations are affected.

Electric Grid Vulnerabilities Exposed

Computer networks controlling the electric grid are plagued with security holes says a new Energy Department report based on the findings of 24 assessments of computer-control systems performed between 2003 and 2009.  Many are VERY basic.
Source: The Wall Street Journal [Online]