Welcome to the Network Security website at the IAS

This website is intended to bring you the latest news, how to's, tools and resources in Information Security.  Security Awareness of our Faculty, Members and Staff is key in creating a safer computing environment.

The three major Principles of Information Security, Availability, Integrity and Confidentiality, will be covered throughout the security awareness program at the Institute.  For a description of these principles, please see our About section.

In keeping with the spirit of the Institute, I encourage questions and open discussions about security.  And if you discover anything out of the ordinary, please feel free to bring it to my attention so that we can work together to create a more productive, safer environment.

Thanks,
Brian Epstein <security@ias.edu>
twitter: @epepepep


Vulnerabilities in Adobe Flash Player 6 Provided in Windows XP Could Allow Remote Code Execution

http://www.microsoft.com/technet/security/advisory/979267.mspx

"Microsoft is aware of reports of vulnerabilities in Adobe Flash Player
6 provided in Windows XP. We are not aware of attacks that try to use
the reported vulnerabilities or of customer impact at this time but
recommend that users install the latest version of Flash Player provided
by Adobe."

Vulnerabilities in Adobe Flash Player 6 Provided in Windows XP Could Allow Remote Code Execution

http://www.microsoft.com/technet/security/advisory/979267.mspx

"Microsoft is aware of reports of vulnerabilities in Adobe Flash Player
6 provided in Windows XP. We are not aware of attacks that try to use
the reported vulnerabilities or of customer impact at this time but
recommend that users install the latest version of Flash Player provided
by Adobe."

MIT Kerberos AES and RC4 Decryption Integer Underflow Vulnerabilities

http://www.securityfocus.com/bid/37749

"MIT Kerberos is prone to multiple integer-underflow vulnerabilities
because it fails to properly handle malformed encrypted data.

Attackers can exploit these issues to execute arbitrary code with
SYSTEM-level privileges. Failed attacks will result in denial-of-service
conditions.

Versions prior to Kerberos 5 1.6.4 and 1.7.1 are vulnerable."

MIT Kerberos AES and RC4 Decryption Integer Underflow Vulnerabilities

http://www.securityfocus.com/bid/37749

"MIT Kerberos is prone to multiple integer-underflow vulnerabilities
because it fails to properly handle malformed encrypted data.

Attackers can exploit these issues to execute arbitrary code with
SYSTEM-level privileges. Failed attacks will result in denial-of-service
conditions.

Versions prior to Kerberos 5 1.6.4 and 1.7.1 are vulnerable."

Vulnerabilities in Adobe Flash Player 6 Provided in Windows XP Could Allow Remote Code Execution

http://www.microsoft.com/technet/security/advisory/979267.mspx

"Microsoft is aware of reports of vulnerabilities in Adobe Flash Player
6 provided in Windows XP. We are not aware of attacks that try to use
the reported vulnerabilities or of customer impact at this time but
recommend that users install the latest version of Flash Player provided
by Adobe."

MIT Kerberos AES and RC4 Decryption Integer Underflow Vulnerabilities

http://www.securityfocus.com/bid/37749

"MIT Kerberos is prone to multiple integer-underflow vulnerabilities
because it fails to properly handle malformed encrypted data.

Attackers can exploit these issues to execute arbitrary code with
SYSTEM-level privileges. Failed attacks will result in denial-of-service
conditions.

Versions prior to Kerberos 5 1.6.4 and 1.7.1 are vulnerable."

FBI warns of Haitian Earthquake relief fund fraud

http://www.ic3.gov/media/2010/100113.aspx

"The FBI today reminds Internet users who receive appeals to donate money in the aftermath of Tuesday's earthquake in Haiti to apply a critical eye and do their due diligence before responding to those requests."

As always, when natural disaster strikes, there are people who try to profit off of it.  For any place you donate to, make sure to check on them to make sure they are legit.  I like using the following resources before I donate.

Pages