Hackers next target Like Tesco, Marks & Spencer etc

Hacker

Criminals could use the kind of tactics which crippled Estonia’s government and some firms last year, they warned.

The experts were members of the infamous “Hackers Panel” which convened in London this week at the InfoSecurity Europe conference.

The panel includes penetration testers and so-called “white hat” hackers, who help companies tighten up their digital security by searching for flaws in their defences.

Previous panellists include Gary McKinnon, known as Solo, alleged by the US government to have hacked into dozens of US Army, Navy, Air Force, and Department of Defense computers.

The “hackers” usually remain anonymous, “for security reasons”, but this year’s panellists agreed to break cover.
[ad#add-top-in]
Mr Preatoni said, “It’s too easy to blame China,”. “In fact, legitimate countries are bouncing their attacks through China. It’s very easy to do, so why not?

“My evil opinion is that some western governments are already doing this.”

source:read

Hackers Attack Code For Works Bug Using Microsoft Products

MS-bugs

No sooner had Microsoft issued a massive set of security patches for its software than hackers started posting code showing how to exploit one of the flaws.

The proof-of-concept code, posted Wednesday to the Milw0rm Web site, exploits a bug in the Microsoft Works file converter software that is part of Office 2003 and can be used to run unauthorized software on a victim’s computer.

The flaw also affects Works 8 and Works Suite 2005. To fall prey to the attack, a victim would first have to open a malicious Works attachment.

Hackers have uncovered many of these file-format bugs in recent years and they are generally not used in widespread attacks. In fact, security vendor Symantec predicts that we’ll see fewer of these attacks in the months ahead as online criminals increasingly rely on browser bugs to do their dirty work.

Still, Periman expects criminals to try out this latest attack code. “It’s so simple,” he said. “All you have to do is get someone to open the document.”

The software vendor released 11 sets of patches this week, fixing 17 flaws in its products, but this is the first exploit code to pop up following the updates. A second program exploiting one of these vulnerabilities — this one in an ActiveX control used by the Visual FoxPro database — was posted to Milw0rm in September, months before Microsoft patched the issue.

source:pcworld