Wednesday, January 2, 2013   


Daily Report

Top Stories

 • A bus traveling from Las Vegas to Vancouver drove through a guard rail and crashed on Interstate 84 near Pendleton, killing 9 and sending 39 passengers to the hospital. – ABC News

3. December 30, ABC News – (Oregon) Oregon bus crash leaves 9 people dead. A bus traveling from Las Vegas to Vancouver drove through a guard rail and crashed on Interstate 84 near Pendleton, killing 9 and sending 39 passengers to the hospital. Investigators were still determining the cause of the crash, but icy road conditions were believed to be a factor. Source: http://abcnews.go.com/US/oregon-bus-crash-leaves-people-dead/story?id=18096025#.UOG0Dq6p3To

 • Results from international studies identified two new Listeria strains that caused numerous illnesses and deaths during the 2011 cantaloupe outbreak. – Food Safety News

6. December 31, Food Safety News – (National) Study of Listeria linked to cantaloupe in 2011 reveals new outbreak strain. Results from international studies identified two new Listeria strains that caused numerous illnesses and deaths during the 2011 cantaloupe outbreak. Source: http://www.foodsafetynews.com/2012/12/2011-listeria-cantaloupe/#.UOGcAOTAfGs

 • Nearly one million gallons of water leaked from a major water main supplying Green Bay December 29 and resulted in a boil advisory. – WTAQ 97.5 FM/1360 AM Green Bay

11. December 30, WTAQ 97.5 FM/1360 AM Green Bay – (Wisconsin) Green Bay east side water main break leads to boil water advisory. Nearly one million gallons of water leaked from a major water main supplying Green Bay December 29. A boil advisory was issued until the water comes back clean, and an intersection near the burst pipes was closed. Source: http://wtaq.com/news/articles/2012/dec/30/green-bay-east-side-water-main-break-leads-to-flooding-boil-water-advisory/

 • Microsoft verified that Internet Explorer (IE) 6, 7, and 8 include a zero-day vulnerability being used in targeted attacks through IE 8, and offered a stopgap workaround until a full security update is completed. – Computerworld

18. December 29, Computerworld – (International) Microsoft confirms zero-day bug in IE6, IE7 and IE8. Microsoft verified that Internet Explorer (IE) 6, 7, and 8 include a zero-day vulnerability being used in targeted attacks through IE 8, and offered a stopgap workaround until a full security update is completed. Source: http://www.networkworld.com/news/2012/123012-microsoft-confirms-zero-day-bug-in-265412.html?source=nww_rss

Details

Banking and Finance Sector

Nothing to report

Information Technology Sector

18. December 29, Computerworld – (International) Microsoft confirms zero-day bug in IE6, IE7 and IE8. Microsoft verified that Internet Explorer (IE) 6, 7, and 8 include a zero-day vulnerability being used in targeted attacks through IE 8, and offered a stopgap workaround until a full security update is completed. Source: http://www.networkworld.com/news/2012/123012-microsoft-confirms-zero-day-bug-in-265412.html?source=nww_rss

19. December 28, IDG News Service – (International) Researchers find malware targeting Java HTTP servers. Trend Micro researchers discovered a piece of malware known as BKDR_JAVAWAR.JG that allows backdoor access to Java-based HTTP servers. Source: http://www.networkworld.com/news/2012/122812-researchers-find-malware-targeting-java-265401.html?source=nww_rss
Communications Sector

Nothing to report


Department of Homeland Security (DHS)
DHS Daily Open Source Infrastructure Report Contact Information

About the reports - The DHS Daily Open Source Infrastructure Report is a daily [Monday through Friday] summary of open-source published information concerning significant critical infrastructure issues. The DHS Daily Open Source Infrastructure Report is archived for ten days on the Department of Homeland Security Web site: http://www.dhs.gov/IPDailyReport

Contact Information

Content and Suggestions: Send mail to cikr.productfeedback@hq.dhs.gov or contact the DHS Daily Report Team at (703)387-2314

Subscribe to the Distribution List: Visit the DHS Daily Open Source Infrastructure Report and follow instructions to Get e-mail updates when this information changes.

Removal from Distribution List:     Send mail to support@govdelivery.com.


Contact DHS

To report physical infrastructure incidents or to request information, please contact the National Infrastructure
Coordinating Center at  nicc@dhs.gov or (202) 282-9201.

To report cyber infrastructure incidents or to request information, please contact US-CERT at  soc@us-cert.gov or visit their Web page at  www.us-cert.go v.

Department of Homeland Security Disclaimer

The DHS Daily Open Source Infrastructure Report is a non-commercial publication intended to educate and inform personnel engaged in infrastructure protection. Further reproduction or redistribution is subject to original copyright restrictions. DHS provides no warranty of ownership of the copyright, or accuracy with respect to the original source material.