Home Messages Index
[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index

[News] Proprietary Software Makes Vulnerable Phones, USB Trojan to cost $256-1000 Milliob

  • Subject: [News] Proprietary Software Makes Vulnerable Phones, USB Trojan to cost $256-1000 Milliob
  • From: Roy Schestowitz <newsgroups@xxxxxxxxxxxxxxx>
  • Date: Thu, 23 Aug 2007 13:51:07 +0100
  • Newsgroups: comp.os.linux.advocacy
  • Organization: Netscape / schestowitz.com
  • User-agent: KNode/0.10.4
Crash bug blights Cisco IP phones

,----[ Quote ]
| A brace of Session Initiation Protocol (SIP) vulnerabilities in Cisco 
| 7940/7960 IP Phones create the potential for hackers to crash - but not to 
| run exploit code - on vulnerable handsets.  
`----

http://www.theregister.co.uk/2007/08/22/cisco_ip_phone_vuln/

Ukrainian jet setter in world's largest cyber heist?

Last week TJX said it expects to rack up costs totaling about $256m arising
from the debacle. A Forrester analyst has predicted the damage could
ultimately be as high as $1bn.

http://www.theregister.co.uk/2007/08/22/possible_break_in_tjx_investigation/


Recent:

Monster Trojan monsters job seekers' records

,----[ Quoet ]
| Monster.com suffered a major data breach at the weekend, with a Trojan horse 
| stealing more than 1.6 million records from the job search site's database. 
`----

http://www.theregister.co.uk/2007/08/21/monster_trojan_steals_millions_of_records/


Related:

This one sounded like Windows CE...

Update -- TJX Reveals Extent Of Hacker Damage

,----[ Quote ]
| In Wednesday's filing, TJX said for the first time that it first learned 
| that there was suspicious software on its computer system on Dec. 18, 2006.
`----

http://www.forbes.com/2007/03/29/tjx-companies-fraud-markets-equity-cx_mk_0329markets35.html?partner=yahootix
http://tinyurl.com/38tyyq


Details of the largest breach of customer data are starting to come to light.

,----[ Quote ]
| "The people who started the breach opened up the back of those terminals and 
| used USB drives to load software onto those terminals," says the source. In a 
| March filing with the Securities and Exchange Commission,TJX acknowledged 
| finding "suspicious software" on its computer systems.   
| 
| The USB drives contained a utility program that let the intruder or intruders 
| take control of these computer kiosks and turn them into remote terminals 
| that connected into TJX's networks, according to the source. The firewalls on 
| TJX's main network weren't set to defend against malicious traffic coming 
| from the kiosks, the source says. Typically, the USB drives in the computer 
| kiosks are used to plug in mice or printers. The kiosks "shouldn't have been 
| on the corporate LAN, and the USB ports should have been disabled," the 
| source says.       
`----

http://www.informationweek.com/shared/printableArticle.jhtml?articleID=201400171

[Date Prev][Date Next][Thread Prev][Thread Next]
Author IndexDate IndexThread Index