Monday, September 29, 2008

CAZ forms Cyber Security Committee

CAZ forms Cyber Security Committee
Concerns raised over the security of information passing through networks

Euroclear signs for BT managed security services - Finextra

SHARK TANK
Tales from the world of ICT

Xero pushes into Australia with new version
Xero to go head-to-head with MYOB

TECH SPOTLIGHT : New virus detector diagnoses, rubs out uninvited ... - Arkansas Democrat Gazette

IBM Internet Security Systems Advances Its Product Portfolio - MarketWatch

Security Software is a Necessary Nuisance, Say Consumers in a ... - MarketWatch

Microsoft Windows GDI+ Remote Code Execution
The Microsoft Windows GDI+ API (Gdiplus.dll) is vulnerable to multiple buffer overflows that could result in remote code execution.

Multiple Vendors Vulnerable to DNS Cache Poisoning
Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache.  Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008.  At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits.

No comments: