CentOS Errata and Bugfix Advisory 2015:0097 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0097.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 28ab4d79c33a10d055b6eed05dc0c2051e9abb5932a69889cb2f70bb2172a7b7 libssh2-1.4.2-1.el6_6.1.i686.rpm 4650f891e63ecf6f13a1e5c1e84a5675f69188af5250a9ed8768c595fb5eb652 libssh2-devel-1.4.2-1.el6_6.1.i686.rpm 9435dc4114a3e66619562863bb5f4af4473c9f2c6bef4c503bd9767df863f6b5 libssh2-docs-1.4.2-1.el6_6.1.i686.rpm x86_64: 28ab4d79c33a10d055b6eed05dc0c2051e9abb5932a69889cb2f70bb2172a7b7 libssh2-1.4.2-1.el6_6.1.i686.rpm 2e07438d7789237523d415dd3a92d99215867b7641ad267b424880b0dca9c89c libssh2-1.4.2-1.el6_6.1.x86_64.rpm 4650f891e63ecf6f13a1e5c1e84a5675f69188af5250a9ed8768c595fb5eb652 libssh2-devel-1.4.2-1.el6_6.1.i686.rpm 7e00157f2af61f22fe18260a9f2204982d92066cf8613384168d6972643df70c libssh2-devel-1.4.2-1.el6_6.1.x86_64.rpm 57800bbe07d3f5cfe4315c9aff91145fb2463e324ef18d9a82a0f2ddf1c22fac libssh2-docs-1.4.2-1.el6_6.1.x86_64.rpm Source: 10684ae17a697ab8cce1cfca1dcd8915c0a7d2a5f4e84f568bf52dabe97c1c6c libssh2-1.4.2-1.el6_6.1.src.rpm
Monthly Archives: January 2015
CEBA-2015:0098 CentOS 6 curl BugFix Update
CentOS Errata and Bugfix Advisory 2015:0098 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0098.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 4e4cd05361833384ad287cfb5cfcd8aed1ec0461d83bc754e51ee6c630e06c63 curl-7.19.7-40.el6_6.4.i686.rpm 1fdd61fea79c7e0f4f1c416909a54269f01f7879d2f2199e296089b52bb5f042 libcurl-7.19.7-40.el6_6.4.i686.rpm 6ff5a5059dfde80bdb33add0894bc6d89d9de5aa805d790c9b29784f79cabd41 libcurl-devel-7.19.7-40.el6_6.4.i686.rpm x86_64: 43ac2a840e3bc14b3397ab4bc094315f6e285e291739d53146d4ec9c8287d221 curl-7.19.7-40.el6_6.4.x86_64.rpm 1fdd61fea79c7e0f4f1c416909a54269f01f7879d2f2199e296089b52bb5f042 libcurl-7.19.7-40.el6_6.4.i686.rpm f05250feaea200500e271cf1bff1725bdebef29f002bb8fb80dfd9653dfc9f30 libcurl-7.19.7-40.el6_6.4.x86_64.rpm 6ff5a5059dfde80bdb33add0894bc6d89d9de5aa805d790c9b29784f79cabd41 libcurl-devel-7.19.7-40.el6_6.4.i686.rpm 3d853c62440e5ac2fdd67d2abd6fd438ba0170d6c9f2698c9654f192541fb9f3 libcurl-devel-7.19.7-40.el6_6.4.x86_64.rpm Source: 44dfa657f77c2777366f6255b71938278db86014fc407e659c228dd3665a4e6b curl-7.19.7-40.el6_6.4.src.rpm
CEBA-2015:0108 CentOS 6 tcsh BugFix Update
CentOS Errata and Bugfix Advisory 2015:0108 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0108.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 2534940990a5957d0d18a19ca1ab803df8febda4dcdc74cdd4d1fb4ed77ac4f3 tcsh-6.17-25.el6_6.i686.rpm x86_64: 4ef1392aef0a90045b8147235bafe2faa195b49ecf3404f8f1a3468c6569e50d tcsh-6.17-25.el6_6.x86_64.rpm Source: d94793dc7e12799e65c46dd420a12c48f3b7b152d578d5b4aded7ca90faa4a77 tcsh-6.17-25.el6_6.src.rpm
Over 5,000 US gas stations vulnerable to remote hacks
Around 5,300 gas stations in the United States could be vulnerable to a remote cyberattack on the automated tank gauges, causing the pumps to flag alerts or even shut down
The post Over 5,000 US gas stations vulnerable to remote hacks appeared first on We Live Security.
The most cyber-attacked city is a model town
There’s a city in a secret place in the state of New Jersey where the public services are always a mess. Power cuts, water supply problems and even Internet outages. Then add to that banks, stores, hospitals, schools and public transport that can’t operate normally on a daily basis because their security is continually compromised. In this city however no human being has to suffer any of the consequences. Nobody lives there: the city is just 1.8m wide by 2.4 m long.
CiberCity is a model city created by the Sans Institute, an organization that brings together over 165,000 IT security professionals. Its aim is to show the US army how to hack every corner of a modern city. It’s a 1:87 scale training camp designed to ensure the military is properly prepared for a cyber-war.
Ed Skoudis is the director and instructor of this unusual project aimed at teaching the latest cyber-security techniques. “A lot of computer security over last 10 years has really focused on computers themselves and the data on them… or it’s focused on spying and espionage”. Now there are other types of attacks. “But the threat is changing. It’s still that, but adding to that, it’s now people hacking into computers to cause real-world physical damage“, explains this expert in IT security.
If CiberCity existed in real life, it would have 15,000 inhabitants. It’s a city that has all the typical amenities and features of a real town: garden plants, swings in the parks, urban traffic, bars with WiFi and even a chemical plant have all been recreated in this mini city.

Five cameras monitor CiberCity so students have a live stream of everything happening there, and can carry out remote cyber-attacks, thereby learning how to attack and defend a city by hacking its security systems.
In one of the training missions, these security experts assume the role of hackers to cause a complete blackout of the city then reconfigure the power company’s computers so utility workers can’t access them. A city can’t live without power, so the challenge is how to get the system up and running again.
Another scenario asks students to work out how to simultaneously turn all traffic lights in the city to red, to prevent terrorists from escaping from the city. Derailing a train hurtling towards the town and laden with radiological weapons; reprograming a rocket launcher aimed at a hospital and hacking a water treatment plant so that clean water appears to be dirty are just some of the entertaining challenges that students will have to tackle.
According to Skoudis, the fact that the model is so realistic makes the project more meaningful to military leaders than if the missions were simply in virtual environments. “They want to see physical things. They want to see the battle space, and what’s happening there”.
Some 70% of Americans say they fear cyber-attacks from other countries, and would no doubt approve of their military acquiring such advanced system hacking skills in order to be better prepared to defend them. And it’s a fair bet that the students enjoy themselves too. Who wouldn’t with such a realistic Lego set?
The post The most cyber-attacked city is a model town appeared first on MediaCenter Panda Security.
Are you being tracked? How to spot a tracking app on your phone
Tracking apps and spyware are a genuine risk, and an extremely unpleasant invasion of privacy for many. Here are our tips on how to recognize if you have a tracking app on your phone, and what to do about it.
The post Are you being tracked? How to spot a tracking app on your phone appeared first on We Live Security.
Bugtraq: [CVE-2015-1394] Photo Gallery (WordPress Plugin) – Multiple XSS Vulnerabilities Version 1.2.8
[CVE-2015-1394] Photo Gallery (WordPress Plugin) – Multiple XSS Vulnerabilities Version 1.2.8
Bugtraq: Two XSS Vulnerabilities in SupportCenter Plus
Two XSS Vulnerabilities in SupportCenter Plus
Bugtraq: Multiple vulnerabilities in MantisBT
Multiple vulnerabilities in MantisBT
Bugtraq: [SECURITY] [DSA 3143-1] virtualbox security update
[SECURITY] [DSA 3143-1] virtualbox security update