Daily Report Wednesday, January 3, 2007
Daily Highlights
The Associated Press reports utility crews are continuing the effort to restore electrical service to tens of thousands of homes and businesses in Colorado and Kansas after a snowstorm last week; it could take more than a week to get them all back on line. (See item 2)
·
CBS4 reports a 20.year.old Wyoming man tried to open the door of a JetBlue plane while flying from Pittsburgh toward Boston, on Monday morning, January 1; he was subdued by passengers and flight attendants. (See item 16)
·
The Associated Press reports the government and the produce industry will issue new guidelines in April on how to prevent contamination throughout the food chain, seeking to avoid future E. coli food poisoning outbreaks involving spinach and lettuce. (See item 23)
·
The Times Argus reports that as of Monday, January 1, Vermont leads the country in emergency response systems, implementing a new enhanced 911 system, E911, completely based upon Internet technology. (See item 35)
Information Technology and Telecommunications Sector
38. January 02, IDG News Service — Alcatel.Lucent completes buy of Nortel 3G business. Alcatel.Lucent SA has closed its acquisition of Nortel Networks Corp.'s Universal Mobile Telecommunications System (UMTS) mobile infrastructure business, the companies announced Tuesday, January 2. Alcatel.Lucent announced plans to buy the third.generation (3G) networks business in September for $320 million less transaction costs. It has cleared the final regulatory approvals and closed the purchase on December 31, it said. The deal makes Alcatel.Lucent one of the largest providers of UMTS gear, with one in four UMTS operators worldwide using its products, the company said.
Source: http://www.infoworld.com/article/07/01/02/HNalcatelnortel_1. html
39. January 02, Agence France.Presse — Emergency measures in Hong Kong after Web chaos. Hong Kong telecom authorities have assumed emergency powers as firms faced Internet disruption on the first day back to work Tuesday, January 2, after an earthquake damaged regional undersea data cables. Telecom and Internet service providers sent the city's telecom authority OFTA hourly updates on service capacity as repair ships struggled to mend fiber optic cables severed in the Boxing Day quake off Taiwan. OFTA had received only 20 inquiries from Internet users by mid.morning, suggesting that services had not been hit as hard as had been feared. By the close of business OFTA said traffic had moved smoothly and there had been no reports of serious congestion.
Source: http://news.yahoo.com/s/afp/20070102/tc_afp/asiaquakeinterne t
40. January 01, eWeek — Apple vulnerability project launches with QuickTime exploit. An easy.to.exploit security vulnerability in Apple Computer's QuickTime media player could put millions of Macintosh and Windows users at risk of code execution attacks. The QuickTime flaw kicked off the Month of Apple Bugs project, which promises to expose unpatched Mac OS X and Apple application vulnerabilities on a daily basis throughout the month of January. According to an advisory released Monday, January 1, the flaw exists in the way QuickTime handles a specially rigged "rtsp://" URL. "By supplying a specially crafted string, [an] attacker could overflow a stack.based buffer, using either HTML, Javascript or a QTL file as attack vector, leading to an exploitable remote arbitrary code execution condition," said LMH, one of the mysterious hackers behind the controversial project. He described exploitation of the issue as "trivial" and warned that stack NX can also be rendered useless. LMH said the issue was successfully exploited in QuickTime Player Version 7.1.3. Previous versions are likely vulnerable as well. Both Microsoft Windows and Mac OS X versions are affected.
Source: http://www.eweek.com/article2/0,1895,2078180,00.asp
41. December 29, IDG News Service — 'Happy New Year!' worm on the move. Verisign Inc. is warning of a new e.mail worm arriving in inboxes with the subject "Happy New Year!" The message, currently being spread from 160 e.mail domains, requires users to click on the attached "postcard.exe" file in order to cause damage. The file will install several different malicious code variants including Tibs, Nwar, Banwarum and Glowa on the computer. It then executes mass mailings from the infected computer. The worm is already being heavily spammed, Verisign said. The security company has found one network that is sending out five e.mails per second with the worm.
Source:
No comments:
Post a Comment