CEBA-2015:0097 CentOS 6 libssh2 BugFix Update

CentOS Errata and Bugfix Advisory 2015:0097 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0097.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
28ab4d79c33a10d055b6eed05dc0c2051e9abb5932a69889cb2f70bb2172a7b7  libssh2-1.4.2-1.el6_6.1.i686.rpm
4650f891e63ecf6f13a1e5c1e84a5675f69188af5250a9ed8768c595fb5eb652  libssh2-devel-1.4.2-1.el6_6.1.i686.rpm
9435dc4114a3e66619562863bb5f4af4473c9f2c6bef4c503bd9767df863f6b5  libssh2-docs-1.4.2-1.el6_6.1.i686.rpm

x86_64:
28ab4d79c33a10d055b6eed05dc0c2051e9abb5932a69889cb2f70bb2172a7b7  libssh2-1.4.2-1.el6_6.1.i686.rpm
2e07438d7789237523d415dd3a92d99215867b7641ad267b424880b0dca9c89c  libssh2-1.4.2-1.el6_6.1.x86_64.rpm
4650f891e63ecf6f13a1e5c1e84a5675f69188af5250a9ed8768c595fb5eb652  libssh2-devel-1.4.2-1.el6_6.1.i686.rpm
7e00157f2af61f22fe18260a9f2204982d92066cf8613384168d6972643df70c  libssh2-devel-1.4.2-1.el6_6.1.x86_64.rpm
57800bbe07d3f5cfe4315c9aff91145fb2463e324ef18d9a82a0f2ddf1c22fac  libssh2-docs-1.4.2-1.el6_6.1.x86_64.rpm

Source:
10684ae17a697ab8cce1cfca1dcd8915c0a7d2a5f4e84f568bf52dabe97c1c6c  libssh2-1.4.2-1.el6_6.1.src.rpm



CEBA-2015:0098 CentOS 6 curl BugFix Update

CentOS Errata and Bugfix Advisory 2015:0098 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0098.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
4e4cd05361833384ad287cfb5cfcd8aed1ec0461d83bc754e51ee6c630e06c63  curl-7.19.7-40.el6_6.4.i686.rpm
1fdd61fea79c7e0f4f1c416909a54269f01f7879d2f2199e296089b52bb5f042  libcurl-7.19.7-40.el6_6.4.i686.rpm
6ff5a5059dfde80bdb33add0894bc6d89d9de5aa805d790c9b29784f79cabd41  libcurl-devel-7.19.7-40.el6_6.4.i686.rpm

x86_64:
43ac2a840e3bc14b3397ab4bc094315f6e285e291739d53146d4ec9c8287d221  curl-7.19.7-40.el6_6.4.x86_64.rpm
1fdd61fea79c7e0f4f1c416909a54269f01f7879d2f2199e296089b52bb5f042  libcurl-7.19.7-40.el6_6.4.i686.rpm
f05250feaea200500e271cf1bff1725bdebef29f002bb8fb80dfd9653dfc9f30  libcurl-7.19.7-40.el6_6.4.x86_64.rpm
6ff5a5059dfde80bdb33add0894bc6d89d9de5aa805d790c9b29784f79cabd41  libcurl-devel-7.19.7-40.el6_6.4.i686.rpm
3d853c62440e5ac2fdd67d2abd6fd438ba0170d6c9f2698c9654f192541fb9f3  libcurl-devel-7.19.7-40.el6_6.4.x86_64.rpm

Source:
44dfa657f77c2777366f6255b71938278db86014fc407e659c228dd3665a4e6b  curl-7.19.7-40.el6_6.4.src.rpm



CEBA-2015:0108 CentOS 6 tcsh BugFix Update

CentOS Errata and Bugfix Advisory 2015:0108 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0108.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
2534940990a5957d0d18a19ca1ab803df8febda4dcdc74cdd4d1fb4ed77ac4f3  tcsh-6.17-25.el6_6.i686.rpm

x86_64:
4ef1392aef0a90045b8147235bafe2faa195b49ecf3404f8f1a3468c6569e50d  tcsh-6.17-25.el6_6.x86_64.rpm

Source:
d94793dc7e12799e65c46dd420a12c48f3b7b152d578d5b4aded7ca90faa4a77  tcsh-6.17-25.el6_6.src.rpm



The most cyber-attacked city is a model town

cibercityThere’s a city in a secret place in the state of New Jersey where the public services are always a mess. Power cuts, water supply problems and even Internet outages. Then add to that banks, stores, hospitals, schools and public transport that can’t operate normally on a daily basis because their security is continually compromised. In this city however no human being has to suffer any of the consequences. Nobody lives there: the city is just 1.8m wide by 2.4 m long.

CiberCity is a model city created by the Sans Institute, an organization that brings together over 165,000 IT security professionals. Its aim is to show the US army how to hack every corner of a modern city. It’s a 1:87 scale training camp designed to ensure the military is properly prepared for a cyber-war.

Ed Skoudis is the director and instructor of this unusual project aimed at teaching the latest cyber-security techniques. “A lot of computer security over last 10 years has really focused on computers themselves and the data on them… or it’s focused on spying and espionage”. Now there are other types of attacks. “But the threat is changing. It’s still that, but adding to that, it’s now people hacking into computers to cause real-world physical damage“, explains this expert in IT security.

If CiberCity existed in real life, it would have 15,000 inhabitants. It’s a city that has all the typical amenities and features of a real town: garden plants, swings in the parks, urban traffic, bars with WiFi and even a chemical plant have all been recreated in this mini city.

cibercity hacker

Five cameras monitor CiberCity so students have a live stream of everything happening there, and can carry out remote cyber-attacks, thereby learning how to attack and defend a city by hacking its security systems.

In one of the training missions, these security experts assume the role of hackers to cause a complete blackout of the city then reconfigure the power company’s computers so utility workers can’t access them. A city can’t live without power, so the challenge is how to get the system up and running again.

Another scenario asks students to work out how to simultaneously turn all traffic lights in the city to red, to prevent terrorists from escaping from the city. Derailing a train hurtling towards the town and laden with radiological weapons; reprograming a rocket launcher aimed at a hospital and hacking a water treatment plant so that clean water appears to be dirty are just some of the entertaining challenges that students will have to tackle.

According to Skoudis, the fact that the model is so realistic makes the project more meaningful to military leaders than if the missions were simply in virtual environments. “They want to see physical things. They want to see the battle space, and what’s happening there”.

Some 70% of Americans say they fear cyber-attacks from other countries, and would no doubt approve of their military acquiring such advanced system hacking skills in order to be better prepared to defend them. And it’s a fair bet that the students enjoy themselves too. Who wouldn’t with such a realistic Lego set?

The post The most cyber-attacked city is a model town appeared first on MediaCenter Panda Security.