Wednesday, January 2, 2013
Daily Report
Top Stories
• A bus traveling from Las Vegas to Vancouver
drove through a guard rail and crashed on Interstate 84 near Pendleton, killing
9 and sending 39 passengers to the hospital. – ABC News
3.
December 30, ABC News – (Oregon) Oregon
bus crash leaves 9 people dead. A bus traveling from Las Vegas to Vancouver
drove through a guard rail and crashed on Interstate 84 near Pendleton, killing
9 and sending 39 passengers to the hospital. Investigators were still
determining the cause of the crash, but icy road conditions were believed to be
a factor. Source: http://abcnews.go.com/US/oregon-bus-crash-leaves-people-dead/story?id=18096025#.UOG0Dq6p3To
• Results from international studies
identified two new Listeria strains that caused numerous illnesses and deaths
during the 2011 cantaloupe outbreak. – Food Safety News
6.
December 31, Food Safety News –
(National) Study of Listeria linked to cantaloupe in 2011 reveals new
outbreak strain. Results from international studies identified two new
Listeria strains that caused numerous illnesses and deaths during the 2011
cantaloupe outbreak. Source: http://www.foodsafetynews.com/2012/12/2011-listeria-cantaloupe/#.UOGcAOTAfGs
• Nearly one million gallons of water leaked
from a major water main supplying Green Bay December 29 and resulted in a boil
advisory. – WTAQ 97.5 FM/1360 AM Green Bay
11.
December 30, WTAQ 97.5 FM/1360 AM Green Bay –
(Wisconsin) Green Bay east side water main break leads to boil water
advisory. Nearly one million gallons of water leaked from a major water
main supplying Green Bay December 29. A boil advisory was issued until the
water comes back clean, and an intersection near the burst pipes was closed.
Source: http://wtaq.com/news/articles/2012/dec/30/green-bay-east-side-water-main-break-leads-to-flooding-boil-water-advisory/
• Microsoft verified that Internet Explorer
(IE) 6, 7, and 8 include a zero-day vulnerability being used in targeted
attacks through IE 8, and offered a stopgap workaround until a full security
update is completed. – Computerworld
18.
December 29, Computerworld –
(International) Microsoft confirms zero-day bug in IE6, IE7 and IE8. Microsoft
verified that Internet Explorer (IE) 6, 7, and 8 include a zero-day
vulnerability being used in targeted attacks through IE 8, and offered a
stopgap workaround until a full security update is completed. Source: http://www.networkworld.com/news/2012/123012-microsoft-confirms-zero-day-bug-in-265412.html?source=nww_rss
Details
Banking and Finance Sector
Nothing to report
Information Technology Sector
18.
December 29, Computerworld –
(International) Microsoft confirms zero-day bug in IE6, IE7 and IE8. Microsoft
verified that Internet Explorer (IE) 6, 7, and 8 include a zero-day
vulnerability being used in targeted attacks through IE 8, and offered a
stopgap workaround until a full security update is completed. Source: http://www.networkworld.com/news/2012/123012-microsoft-confirms-zero-day-bug-in-265412.html?source=nww_rss
19.
December 28, IDG News Service –
(International) Researchers find malware targeting Java HTTP servers. Trend
Micro researchers discovered a piece of malware known as BKDR_JAVAWAR.JG that
allows backdoor access to Java-based HTTP servers. Source: http://www.networkworld.com/news/2012/122812-researchers-find-malware-targeting-java-265401.html?source=nww_rss
Communications Sector
Nothing to report
Department of Homeland Security
(DHS)
DHS Daily Open Source Infrastructure Report Contact Information
About the reports - The DHS Daily Open Source Infrastructure Report is a daily [Monday through Friday]
summary of open-source published
information
concerning significant critical infrastructure issues. The DHS Daily Open Source Infrastructure Report is archived for ten days on
the
Department of Homeland Security Web site: http://www.dhs.gov/IPDailyReport
Contact Information
Content and Suggestions: Send mail to cikr.productfeedback@hq.dhs.gov or contact the DHS
Daily Report Team at (703)387-2314
Subscribe to
the
Distribution List: Visit the
DHS Daily Open Source Infrastructure Report and follow
instructions to
Get e-mail updates when this information
changes.
Contact DHS
To report physical infrastructure incidents or to request information, please contact the National Infrastructure
To report cyber infrastructure incidents or to
request information,
please contact US-CERT at soc@us-cert.gov or visit their Web
page at www.us-cert.go v.
Department of Homeland Security Disclaimer
The DHS Daily Open Source Infrastructure Report is a non-commercial publication intended to
educate and
inform personnel engaged
in infrastructure protection. Further reproduction
or redistribution is subject to original copyright
restrictions. DHS provides no
warranty of ownership of the copyright,
or accuracy with respect to
the
original
source material.