Quantcast
Channel: BOT24
Viewing all 8064 articles
Browse latest View live

Today's NIST CVE Issuance's For Vulnerabilities In NetIQ eDirectory

$
0
0
Click on the underlined CVE for additional vuln specific info


CVE-2012-0432
Summary: Stack-based buffer overflow in the Novell NCP implementation in NetIQ eDirectory 8.8.7.x before 8.8.7.2 allows remote attackers to have an unspecified impact via unknown vectors.
Published: 12/25/2012
CVE-2012-0430
Summary: Unspecified vulnerability in NetIQ eDirectory 8.8.6.x before 8.8.6.7 and 8.8.7.x before 8.8.7.2 on Windows allows remote attackers to obtain an administrator cookie and bypass authorization checks via unknown vectors.
Published: 12/25/2012
CVE-2012-0429
Summary: dhost in NetIQ eDirectory 8.8.6.x before 8.8.6.7 and 8.8.7.x before 8.8.7.2 on Windows allows remote authenticated users to cause a denial of service (daemon crash) via crafted characters in an HTTP request.
Published: 12/25/2012
CVE-2012-0428
Summary: Cross-site scripting (XSS) vulnerability in NetIQ eDirectory 8.8.6.x before 8.8.6.7 and 8.8.7.x before 8.8.7.2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Published: 12/25/2012

new scripts/modules/exploits added to Nmap, OpenVAS, Metasploit, and Nessus

$
0
0

This report describes any new scripts/modules/exploits added to Nmap,
OpenVAS, Metasploit, and Nessus since yesterday.

== Metasploit modules (2) ==

r16230
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/webapp/wp_property_upload_exec.rb
WordPress WP-Property PHP File Upload Vulnerability

r16232
http://metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/unix/webapp/wp_asset_manager_upload_exec.rb
WordPress Asset-Manager PHP File Upload Vulnerability
_______________________________________________
Sent through the dev mailing list

Iran says Stuxnet computer worm halted

$
0
0

PanARMENIAN.Net - An Internet virus attacked computers at industrial sites in southern Iran, in an apparent extension of a covert cyber war that initially targeted the country's nuclear facilities, an Iranian official said, according to Reuters.
Iran, the world's No. 5 oil exporter, has tightened online security since its uranium enrichment centrifuges were hit in 2010 by the Stuxnet computer worm, which Tehran believes was planted by arch-adversaries Israel or the United States.
The unit tasked with fighting cyber attacks, the Passive Defense Organization, said a virus had infected several sites in Hormozgan province in recent months but was neutralized.
"Enemies are constantly attacking Iran's industrial units through Internet networks in order to create disruptions," Ali Akbar Akhavan, head of the Hormozgan branch of the organization, was quoted as saying by the Iranian Students' News Agency on Tuesday, Dec 25.

read more.....http://www.panarmenian.net/eng/news/139217/?&utm_source=twitterfeed&utm_medium=twitter

Game on: Case study with Electronic Arts and Allgress

$
0
0

It's anything but a game when adversaries seek to break into the network of gaming company Electronic Arts, reports Greg Masters.

Video game players are used to fending off alien invaders or fierce linebackers and maneuvering past all sorts of obstacles to attain ever more glorious levels of achievement.

But, back at the drawing board where these challenges are dreamed up, the IT staff at Electronic Arts (EA), one of the world's largest gaming companies, faced a new adversary, something so insidious that even its own software developers couldn't have imagined it a few years ago. The tables turned. Or rather, the door opened. And that's because the staff no longer was solely creating digital content and developing entertainment. With its global headquarters in Redwood City, Calif., and facilities all over the world where more than 9,000 employees keep the action going, the need to reduce cyber risk within its own environment became a priority.

read more.....http://www.scmagazine.com/game-on-case-study-with-electronic-arts-and-allgress/article/265429/

Ethical Hackers Recruitment – Deloitte

$
0
0

The growing number of attacks on corporate networks and IT infrastructures has become a very serious threat to corporate and national security both locally and globally. It is therefore pertinent to guard against most of the possible occurrence of intrusion into organization’s networks in order to mitigate the consequences of unauthorized exposure of trade secrets, proprietary information and customers personal information.
The largest information security team in Nigeria seeks to expand its workforce in order to continue helping organizations maintain confidentiality, integrity & availability of their information. Our reputation for providing high quality services with integrity over the years has earned us the trust of our clients and our people.
If you have what it takes to be part of the leading information security team in Nigeria, then Join our committed workforce in improving the security of organizations’ information assets. Successful candidates will benefit from our unique 3 year training and development program on ethical hacking.
Job Description
Perform vulnerability assessment and network penetration testing
Perform network infrastructure & database security review.
Perform review of web applications and web services.
Perform application source code review.
Perform wireless and mobile application security review.
Qualifications
Bachelor Degree in Computer Science / Engineering or any related discipline (Minimum of second class upper)
3 to 5 years IT experience with a minimum of 2 to 3 years’ experience in IT Security
One or more non vendor based security certifications like CISSP or GIAC
Excellent knowledge of multiple Operating Systems: Windows, Linux and UNIX
Experience performing different types of security testing such as network penetration testing, vulnerability assessments, wireless testing, code reviews, database reviews and/or firewall assessments
Experience with high level programming languages e.g. Java, C, C++, .Net (#, VB)
Experience with web application development e.g. ASP.NET, ASP, PHP, J2EE, JSP
Familiarity with web technologies such as XML, SOAP, AJAX
Familiarity with web server and application software: IIS, Apache, Tomcat etc
Experience with various commercial and open source tools for password cracking, network analyzer, network scanning etc.
Additional Qualifications
Any other Vendor based Technical certification (Microsoft, Cisco, Juniper, Oracle etc.)
Secure configuration of various network devices (Routers, Switches and Firewalls)
Experience with Perl, Python or Ruby
Experience with mobile application testing
Conscientious, innovative, confident and positive disposition
Excellent communication (oral and written) and interpersonal skills
Successful in the background screening procedure for this position
How to apply
Applicant should send CV to:  ngrecruitmanagers@deloitte.com
Application closes December 31, 2012


Source: http://www.informationnigeria.org/2012/12/ethical-hackers-recruitment-deloitte.html

Spies blow their cover through the internet

$
0
0

HUNDREDS of former and some present Australian spies have posted information about their employment with intelligence agencies on the internet in what security experts have called ''a gift for foreign espionage''.
A survey by Fairfax Media has discovered more than 200 former and present intelligence officers who have disclosed their classified employment in profiles on LinkedIn, other professional networking sites and social media including Facebook and Twitter.
While many former and present officers have disclosed only the fact of their employment by agencies including the top secret Defence Signals Directorate and the Defence Intelligence Organisation, some have revealed significant details about their work.
These include employment at specific intelligence facilities, overseas postings and liaison with allied intelligence agencies, linguistic expertise indicating particular intelligence targets, and involvement with specific issues and information technology systems.


Read more: http://www.smh.com.au/technology/technology-news/spies-blow-their-cover-through-the-internet-20121225-2bvaf.html#ixzz2G6yGFt2A

CCID Consulting: Standards, Guidepost for Healthy and Sustainable Development of China’s Cloud Computing Industry

$
0
0

CCID Consulting: Standards, Guidepost for Healthy and Sustainable Development of China’s Cloud Computing Industry

BEIJING--(BUSINESS WIRE)--Standards have increasingly become the core for countries to reserve strategic resources and enhance international competitiveness. "The man who sets up standards gets the world" has been repeatedly demonstrated in the IT field, where giants like Microsoft, Apple and Qualcomm serve as good examples. Cloud computing, conforming to the worldwide demand for integrating computing resources and service capabilities, is the strategic vantage point in the current international IT competition. Therefore, China's competitiveness in the international IT field will depend on our ability of setting up independent standards for cloud computing in the future.

“The man who sets up standards gets the world”
Cloud Computing Industry: Risks Behind Prosperity

In 2011, China's cloud computing industry witnessed a prosperous development. Cloud computing continued to extend from governments to enterprises and to individual users, from the IT industry to traditional agriculture and industry in addition to the modern service industry. The industrial size reached RMB160 billion, up 63.8% year-on-year, and it is expected to reach RMB 800 billion in 2014.

Figure 1 Industrial Size and Growth of China's Cloud Computing Industry, 2010-2014
http://event.ccidconsulting.com/en/images/en-1226-1.jpg
Source: CCID Consulting, March 2012

However, risks also exist behind the prosperous development of the cloud computing industry. Due to the lack of evaluation principles and access systems, some regions which still lacks great demand for cloud computing applications may claim markets by making rash investments; the shortage of applications makes it difficult for data centers to operate at full capacity; the change of the security environment forces cloud computing to face new security situations. Such risks have been affecting the healthy and sustainable development of China's cloud computing industry at every moment. These risks will become the blasting fuse of crises in China's cloud computing industry.

Major Fields Requiring Standards

Cloud computing standards will involve infrastructures, key technologies and products, assessment, operation, security evaluation, etc., and cover basically all the components from hardware, software to business application modes.

Basic standards: Such standards, used to clarify and define the terms, definitions, demand and business scenarios of cloud computing, are some common basic standards of cloud computing, including the terminology, basic reference models and standardized guides of cloud computing.

Standards for key cloud computing technologies and products: Such standards mainly focus on issues like on-demand supply of resources, data locking, distributed management of massive data, and browsing interaction that are most concerned by users, aiming at building an interconnected, highly efficient and stable environment for cloud computing to regulate multiple layers such as the resource layer, the data layer and the application layer.

Standards for service operation management: Such standards cover general requirements for cloud services, standards for cloud-based service modes, general standards for cloud service protocols, evaluation guides on the quality of cloud services, standards for cloud O&M services, standards for cloud service auditing, standards for cloud governance and other aspects, focusing on resolving issues like required qualifications and capabilities for providing cloud computing services, as well as telemeter reading and service auditing when providing cloud computing services for users. Besides, to ensure high-quality services, issues like the O&M services of various cloud computing platforms and data centers, service quality evaluation and service grading are also required.

About CCID Consulting Co., Ltd.

CCID Consulting Co., Ltd., the first Chinese consulting firm listed in the Growth Enterprise Market (GEM) of the Stock Exchange of Hong Kong (HKSE: 08235) and the first consulting firm which gets ISO 9001 international and national quality management system standard certification, is directly affiliated to China Center for Information Industry Development (hereinafter known as CCID Group). Headquartered in Beijing, CCID Consulting has so far set up branch offices in Shanghai, Guangzhou, Shenzhen, Xi’an, Wuhan and Nanjing with over 300 professional consultants. The company’s business scope has covered over 200 large and medium-sized cities in China. CCID Consulting provides customers with public policy establishment, industry competitiveness upgrade, development strategy and planning, marketing strategy and research, HR management, IT programming and management services, investment and financing, and M&A. The company's customers range from government departments at all levels and diversified industrial parks, to industrial users in strategic emerging industries in new generation information technology, energy saving and environmental protection, biological science and technology, high-end equipment manufacturing, new materials, and new energy. CCID Consulting commits itself to become the No. 1 advisor for urban economy, the No. 1 consultancy for enterprise management, and the No. 1 branch for informatization consulting in China.

Contacts

CCID Consulting Co., Ltd.
Ella Wu, +86-10-8855-9080
wuhy@ccidconsulting.com
http://en.ccidconsulting.com

CA ARCserve r16 Outperforms Veeam Backup & Replication 6.5 in Comparative Product Review, Supporting Both Physical and Virtual Environments

$
0
0

MUMBAIDecember 26, 2012 /PRNewswire/ --
Singular Solution Wins Again for Best Data Protection and Business Continuity
CA Technologies today announced that CA ARCserve® r16 has beaten Veeam® Backup & Replication™ 6.5 in every category of a recent comparative review, once again earning the Network Testing Labs (NTL) "World Class Award" for best data protection and business continuity solution.
The CA Technologies-commissioned review compared the capabilities of CA ARCserve and Veeam Backup & Replication around image-based backup, file-based backup, replication/high availability and usability.
"In complete contrast to Veeam Backup & Replication, which only supports virtual systems, CA ARCserve is equally at home in both physical and virtual environments," said Barry Nance , President of Network Testing Labs, who has evaluated thousands of hardware and software products for publications like Computerworld, BYTE Magazine, Government Computer News, PC Magazine, Network Computing, and Network World. "The more mature, more reliable and more feature-complete CA ARCserve gave us both file- and image-based backup, demonstrated faster performance, had better SRM reporting, exhibited far greater uptime and availability and cost less to operate."
Review highlights:
  • The review called CA ARCserve "a single answer for IT organizations that need both physical server and virtual server backup and recovery." It said that in a hybrid physical/virtual environment, Veeam Backup & Replication "forces you to license two different vendors' backup and recovery products - one physical, the other virtual. The two-vendor approach doesn't make sense because it's more expensive and less productive." 
  • CA ARCserve supports more virtual platforms than Veeam and protects the entire Hyper-V hypervisor host, while Veeam Backup & Replication does not. "CA ARCserve can thus recover an entire virtual host, as a single entity."
  • In comparing image-based backup functionality, the reviewer noted that "CA ARCserve's I2 (Infinite Incremental)™ is faster than Veeam Backup & Replication's synthetic full backup process."
  • Unlike Veeam Backup & Replication, CA ARCserve supports tape and provides a wealth of file-based backup features. CA ARCserve is also "fast, reliable and frugal in its use of storage space, offering built-in data deduplication at no additional cost."
  • CA ARCserve includes a High Availability component for companies needing maximum system uptime and availability for business-critical servers and applications. "Simply put, Veeam Backup & Replication lacks CA ARCserve's feature-rich, mature ability to replicate, monitor and automatically fail over critical servers," according to the report.
"Organizations are looking for comprehensive solutions that can safeguard all of their data and application assets regardless of the platform on which they reside," said Steve Fairbanks , Vice President, Product Delivery, Data Management, CA Technologies. "This new review clearly demonstrates the key strength of CA ARCserve as a singular solution that protects customers' complex environments, while at the same time being easy to purchase, own and manage."
The review follows other recent studies commissioned by CA Technologies in which CA ARCserve r16 outperformed Symantec™ Backup Exec™ 2012 and CommVault® Simpana® 9.
Additional Resources
About Network Testing Labs
Network Testing Labs performs independent technology research and product evaluations. Its network laboratory connects myriads of types of computers and virtually every kind of network device in an ever-changing variety of ways. Its authors are networking experts who write clearly and plainly about complex technologies and products.
About CA Technologies
CA Technologies (NASDAQ: CA) provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data and identities, from the data center to the cloud. Learn more about CA Technologies at www.ca.com.
Follow CA Technologies
Legal Notices
Copyright © 2012 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. All other trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
Primary Media Contact: Pallavi Bordoloi pallavi.bordoloi@ca.com, 91-9867696467
Secondary Media Contact: Nikita Nadwani nikita.nadwani@2020msl.com, 91-9167443578
SOURCE CA Technologies



[SECURITY] [DSA 2590-1] wireshark security update

$
0
0
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- -------------------------------------------------------------------------
Debian Security Advisory DSA-2590-1                   security@debian.org
http://www.debian.org/security/                        Moritz Muehlenhoff
December 26, 2012                      http://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : wireshark
Vulnerability  : several
Problem type   : remote
Debian-specific: no
CVE ID         : CVE-2012-4048 CVE-2012-4296

Bjorn Mork and Laurent Butti discovered crashes in the PPP and RTPS2
dissectors, which could potentially result in the execution of arbitrary
code.

For the stable distribution (squeeze), these problems have been fixed in
version 1.2.11-6+squeeze8.

For the unstable distribution (sid), these problems have been fixed in
version 1.8.2-1.

We recommend that you upgrade your wireshark packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlDbFMQACgkQXm3vHE4uylrx5ACfcXma384Y7fP17yWVBFSySCPl
7QYAoMQKizdcTlqpwhDISMbTkfOhQT4y
=udUl
-----END PGP SIGNATURE-

Glitch imperils swath of encrypted records Data destruction easy, inventor warns

$
0
0

A widely used method of computer encryption has a little-noticed problem that could allow confidential data stored by almost all Fortune 500 companies and everything stored on U.S. government classified computers to be “fairly easily” stolen or destroyed.
The warning comes from the inventor of the encryption method, known as Secure Shell or SSH.
“In the worst-case scenario, most of the data on the servers of every company in the developed world gets wiped out,” Tatu Ylonen, chief executive officer of SSH Communications Security Corp., told The Washington Times.
Mr. Ylonen said a computer programmer could create a virus that would exploit SSH’s weaknesses and spread throughout servers to steal, distort or destroy confidential data.
“It would take days, perhaps only hours,” to write such a virus, he said.
What’s more, the same security vulnerabilities plague the U.S. government’s classified networks, say the contractors who build them.
“I would venture to say that there is a very similar situation [in classified networks] to the one in the commercial space,” said Don Fergus, a senior vice president at Patriot Technologies Inc., an information technology and security firm in Frederick, Md.
Mr. Ylonen said encryption methods’ vulnerabilities prevent companies from honestly passing an audit for compliance with U.S. cybersecurity standards for government or the private sector.
He said that all of the “major audit protocols” for federal financial regulations and cybersecurity require that network managers know who can access their systems.
About “90 percent of U.S. companies are out of compliance with regulations governing financial institutions because of this issue,” Mr. Ylonen said.


Read more: http://www.washingtontimes.com/news/2012/dec/25/glitch-imperils-swath-of-encrypted-records/#ixzz2GB20ZQjP

SQLi Vulnerabilities List- (gmap.php dorks)

$
0
0

http://www.coolrivercafe.com/reservations.php?c=3'&id=4'|error in your SQL syntax|
http://www.coolrivercafe.com/reservations.php?c=1'&id=4'|error in your SQL syntax|
http://www.webmastertools.fm/how-to/%5BWTS%5D+Matrimonial+script+++Buy+PHP'|error in your SQL syntax|
http://kebobfinder.com/modules/mod_search_category/gmap/gmap.php?id='|mysql_fetch_assoc()|
http://www.housingauthorityofpocatello.org/gmap.php?id=185'|error in your SQL syntax|
http://www.prayertimes.info/gmap.php?id=36848'|error in your SQL syntax|
http://www.freelisting.biz/gmap.php?id=42'|error in your SQL syntax|
http://www.fsboinpocatello.com/gmap.php?id=54'|error in your SQL syntax|
http://www.realestatetasmania.com.au/gmap.php?id=87'|error in your SQL syntax|
http://www.re5280.biz/gmap.php?id=42'|error in your SQL syntax|
http://www.5280mortgages.com/gmap.php?id=41'|error in your SQL syntax|
http://www.5280homerentals.com/gmap.php?id=42'|error in your SQL syntax|
http://lotlisting.com/gmap.php?id=39'|error in your SQL syntax|
http://www.sweetgrassland.com/gmap.php?id=11'|error in your SQL syntax|
http://www.prayertimes.info/gmap.php?id=36851'|error in your SQL syntax|
http://ja-yecoreprogrammes.org/europe_and_me/gmap.php?id=7'|mysql_fetch_array()|
http://www.theparisian.org/gmap.php?id=792'|error in your SQL syntax|
http://www.mktprealty.com/gmap.php?id=162'|error in your SQL syntax|
http://www.developer.enduetechnologies.com/Real-3/gmap.php?id=19'|error in your SQL syntax|
http://www.byownersantafe.com/gmap.php?id=21'|error in your SQL syntax|
http://ja-yecoreprogrammes.org/company_programme/gmap.php?id=1'|mysql_fetch_array()|




//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information

Symantec PGP Desktop Vulnerability (0 day)

$
0
0

1.Description:

The pgpwded.sys kernel driver distributed with Symantec PGP Desktop contains
an arbitrary memory overwrite vulnerability in the handling of IOCTL 0x80022058.
Exploitation of this issue allows an attacker to execute arbitrary code
within the kernel.
An attacker would need local access to a vulnerable computer to exploit
this vulnerability.

Affected application: Symantec PGP Desktop 10.2.0 Build 2599 (up-to date).
Affected file: pgpwded.sys version 10.2.0.2599.

2.Vulnerability details:

function at 0x10024C20 is responsible for dispatching ioctl codes:

.text:10024C20 ; int __thiscall ioctl_handler_deep(int this, int ioctl, PVOID inbuff, unsigned int inbuff_size, unsigned int outbuff_size, PDWORD bytes_to_return)
.text:10024C20 ioctl_handler_deep proc near            ; CODE XREF: sub_10007520+6A p
.text:10024C20
.text:10024C20 DestinationString= UNICODE_STRING ptr -3Ch
.text:10024C20 var_31          = byte ptr -31h
.text:10024C20 var_30          = dword ptr -30h
.text:10024C20 some_var        = dword ptr -2Ch
.text:10024C20 var_28          = dword ptr -28h
.text:10024C20 var_24          = byte ptr -24h
.text:10024C20 var_5           = byte ptr -5
.text:10024C20 var_4           = dword ptr -4
.text:10024C20 ioctl           = dword ptr  8
.text:10024C20 inbuff          = dword ptr  0Ch
.text:10024C20 inbuff_size     = dword ptr  10h
.text:10024C20 outbuff_size    = dword ptr  14h
.text:10024C20 bytes_to_return = dword ptr  18h
.text:10024C20
.text:10024C20                 push    ebp
.text:10024C21                 mov     ebp, esp
.text:10024C23                 sub     esp, 3Ch
.text:10024C26                 mov     eax, BugCheckParameter2
.text:10024C2B                 xor     eax, ebp
.text:10024C2D                 mov     [ebp+var_4], eax
.text:10024C30                 mov     eax, [ebp+ioctl]
.text:10024C33                 push    ebx
.text:10024C34                 mov     ebx, [ebp+inbuff]
.text:10024C37                 push    esi
.text:10024C38                 mov     esi, [ebp+bytes_to_return]
.text:10024C3B                 add     eax, 7FFDDFD8h
.text:10024C40                 push    edi
.text:10024C41                 mov     edi, ecx
.text:10024C43                 mov     [ebp+some_var], esi
.text:10024C46                 mov     [ebp+var_28], 0
.text:10024C4D                 cmp     eax, 0A4h       ; switch 165 cases
.text:10024C52                 ja      loc_10025B18    ; jumptable 10024C5F default case
.text:10024C58                 movzx   eax, ds:byte_10025BF0[eax]
.text:10024C5F                 jmp     ds:off_10025B50[eax*4] ; switch jump

[..]

0x80022058 case: no check for outbuff_size == 0! <--- FLAW!

.text:10024F5A                 lea     ecx, [edi+958h]
.text:10024F60                 call    sub_100237B0
.text:10024F65                 mov     [ebp+some_var], eax
.text:10024F68                 test    eax, eax
.text:10024F6A                 jnz     short loc_10024F7D
.text:10024F6C                 mov     dword ptr [ebx], 0FFFFCFFAh
.text:10024F72                 mov     dword ptr [esi], 10h <--- bytes to copy to output buffer

next in IofComplete request will be rep movsd at pointer, that is under attacker's control

Due the type of vulnerability (METHO_BUFFERED with output_size == 0) exploit works only on Windows XP/2k3, cause in later Windows OS I/O manager doesn't craft IRP if ioctl is METHOD_BUFFERED and output_size == 0.



//The information contained within this publication is
//supplied "as-is"with no warranties or guarantees of fitness
//of use or otherwise. Bot24, Inc nor Bradley Sean Susser accepts
//responsibility for any damage caused by the use or misuse of
//this information

The Paychex Top 13 in ’13: Potential Regulatory Changes Every Small Business Needs to Know About in the New Year

$
0
0

ROCHESTER, N.Y.--(BUSINESS WIRE)--Paychex, Inc., a leading provider of payroll, human resource, and benefits outsourcing solutions for small- to medium-sized businesses, today announced its top 13 in ’13 list, containing the top 13 potential regulatory changes that America’s small businesses need to know in 2013. By working closely with the IRS and other government agencies throughout the year, Paychex actively monitors both regulatory and compliance-related issues that are likely to affect its 567,000 clients.

“By identifying these top regulatory issues early on, business owners will not only be more informed, but prepared for 2013.”
“As we approach the New Year, Paychex wants to help small business owners understand the major regulatory issues that may potentially affect their business, either legislatively or through simple rule modifications,” said Martin Mucci, Paychex president and CEO. “By identifying these top regulatory issues early on, business owners will not only be more informed, but prepared for 2013.”

  
1.
 
Fiscal Cliff - The unprecedented convergence of several major events at the year-end — known by the term “fiscal cliff” – will impact virtually all businesses and have broader economic implications for the nation unless an agreement is reached. The current payroll tax holiday would expire, as would the lower “Bush-era” federal income tax rates (a particularly difficult scenario for the many small businesses set up as “pass-through” entities, wherein business income is taxed at their owner’s personal rate). Mandated federal spending cuts will also have direct or indirect effects on many companies. Capital gains and estate tax rates will increase, dividends will be taxed as ordinary income, and several popular current tax credits will end.

2.
Tax Gap - The IRS continues to aggressively look at ways to close the estimated $450 billion gap that exists between taxes expected to be collected and the actual tax owed — the large majority of which is believed to come from underreporting, which includes understating income and overstating deductions. IRS examiners are focusing their enforcement resources in those areas thought to have the highest degree of non-compliance, including affluent individuals and small businesses, and are making greater use of technology to more efficiently identify audit targets.

3.
Health Care Reform - After the Supreme Court ruling and the presidential election this year, health care reform remains essentially intact. In 2013, Medical Loss Ratio (MLR) standards will continue, meaning that insurance carriers that don't spend the prescribed percentage of premium dollars collected on actual medical care will be required to provide rebates to policyholders. Large employers (those that filed 250 or more Forms W-2 in the prior tax year) will be required to report the cost of employer-sponsored health coverage on their employees’ 2013 Forms W-2. New in 2013 is the $2,500 limit on an employee’s contribution to a medical flexible spending account (FSA) as well as the employer’s obligations to withhold and report relative to the additional Medicare tax.

4.
Worker Misclassification - More active enforcement efforts are expected from the IRS and the US Department of Labor (DOL) in 2013 with regard to the misclassification of workers as independent contractors. Pending legislation at the state and federal levels, as well as executive orders at the state level establishing dedicated task forces to look at this issue, continued throughout 2012. Legislative reform as part of the resolution for the fiscal cliff is also expected to include provisions that would impose harsher financial penalties on employers who misclassify their workers. Further national and regional enforcement efforts/initiatives specific to industries in lower wage sectors, such as hospitality and construction, are also anticipated in 2013.

5.
Tax Reform - As the country’s budget deficit grows, a topic sure to garner much legislative discussion during 2013 is the possibility of sweeping tax reform. Among the tax benefits which could get consideration, especially for high earners, are in such traditionally popular areas as the employer contribution to health care premiums, employer and employee retirement plan contributions, mortgage interest deduction, and charitable contributions. Additionally, the current tax advantages of structures such as S-corps could also be under assessment.

6.
Retirement Savings - Employers should be aware of several developments in the retirement arena. The limits for contributions to retirement plans such as 401(k)s will increase in 2013. Legislation may also be introduced to manage the effects of 401(k) “leakage” resulting when employees draw down retirement savings by taking loans and withdrawals from their plans. Separately, we expect that federal policymakers, as well as those in some key states, may consider legislation to address the growing view that many workers are not saving enough for retirement. This could possibly include a mandate that certain employers that do not currently sponsor a retirement plan for their employees withhold a modest amount of a worker’s pay for deposit into a basic, automatically enrolled retirement investment.

7.
National Labor Relations Board Activity - In the wake of President Obama’s re-election, a continued pro-labor focus is expected from this very active enforcement agency. While broad pro-union legislation is unlikely to pass in the next Congress, we expect the NLRB to seek to adopt rules to expedite the election process and/or further assist unions in their efforts to organize employees. To this end, the Board is likely to continue to scrutinize employer protocols even at non-unionized companies, including social media policies, employment-at-will disclaimers, and harassment investigation procedures. All employers should be closely watching the NLRB agenda and be ready to consider changes to their internal practices and policies as needed.

8.
US DOL Agenda - The DOL Wage and Hour Division is expected to pursue an active regulatory agenda with the anticipated release of final regulations for the expanded military family leave under the Federal Family and Medical Leave Act, and a final rule to substantially restrict current minimum wage and overtime exemptions for companionship services and live-in domestics. The DOL may also revive the rule process for “Right to Know” regulations which could require employers to provide written notification of a worker’s status and to deliver required wage statements. The agency is also expected to continue its assertive wage and hour enforcement program, especially in the hospitality industry and others where many employees have tips as part of their compensation.

9.
Immigration - Immigration reform is expected to be a top focus in the president’s second term, including efforts by Congress to pass legislation to preempt recent state and local laws. The trend of increased enforcement in the area of Form I-9 audits is likely to continue after a record number of worksite inspections in 2012. The release of a revised Form I-9 is expected in early 2013. The pilot program for E-Verify, the federal government’s Internet-based employment verification tool, was extended for another three years in late 2012. While its use remains voluntary for most of the country, some states have made it mandatory for some or all employers, and other employers may be required to utilize E-Verify under federal regulations. More comprehensive requirements could be implemented at the federal level as part of an overall immigration strategy.

10.
Consumer Financial Protection Bureau - With President Obama’s re-election, the Consumer Financial Protection Bureau (CFPB) is likely to play an even more prominent role in overseeing banks and credit unions as well as “non-bank financial institutions” such as mortgage companies, payday lenders, and debt collectors. As these expanded activities evolve, small businesses could see direct or indirect effects on how they interact with their customers and employees, as well as potential changes in their relationships with banks and lenders.

11.
Cyber Fraud - The steady increase in cyber fraud, especially against small businesses that may lack the resources to implement sophisticated security methods, will likely continue to be front of mind in 2013. Federal anti-cyber fraud legislation is a distinct possibility to better protect the nation’s critical infrastructure against hackers and other criminals. Many states are also likely to further expand/strengthen regulations requiring businesses to employ adequate security over confidential personal and medical information.

12.
Business Continuity - Hurricane Sandy vividly reinforced the importance of a sound business recovery and continuity program. Even small businesses should ensure their key vendors have adequate processes to ensure uninterrupted service in the event of extreme weather or other unforeseen circumstances, and have crucial documents maintained at an alternative location for protection and adherence to retention guidelines for materials such as tax returns, business filings, and other financial documents.

13.
FDIC Insurance - Without Congressional action, the current unlimited Federal Deposit Insurance Corp (FDIC) coverage for noninterest-bearing checking accounts will expire in 2013, reverting back to the normal $250,000 per account. The discontinuation of this unlimited federal insurance, enacted as part of the original Dodd-Frank legislation, has led many small businesses – who often use smaller, community banks – to consider shifting their operating funds to the perceived greater safety of larger banks or spreading balances out among multiple institutions, keeping deposits under the $250,000 cap in each.
“Paychex is dedicated to helping America’s small businesses achieve greater economic success. We will continue to keep a close eye on these regulatory matters as we enter 2013 in order to better serve the needs of our clients,” said Mucci.

Mike Trabold, director of compliance risk at Paychex, talks more about the Top 13 in ‘13 in this two-minute video.

About Paychex

Paychex, Inc. is a leading provider of payroll, human resource, and benefits outsourcing solutions for small- to medium-sized businesses. The company offers comprehensive payroll services, including payroll processing, payroll tax administration, and employee pay services, including direct deposit, check signing, and Readychex®. Human resource services include 401(k) plan recordkeeping, section 125 plans, a professional employer organization, time and attendance solutions, and other administrative services for business. A variety of business insurance products, including group health and workers' compensation, are made available through Paychex Insurance Agency, Inc. Paychex was founded in 1971. With headquarters in Rochester, New York, the company has more than 100 offices serving approximately 567,000 payroll clients as of May 31, 2012. For more information about Paychex and our products, visit www.paychex.com.

Note: The foregoing is provided for informational purposes only, and is not intended to be tax or legal advice. Consult your licensed attorney, accountant, or other tax professional to discuss your particular facts, circumstances, and how these opportunities might apply to your business.

Twitter: www.twitter.com/paychex
Facebook: www.facebook.com/paychex
LinkedIn: www.linkedin.com/company/paychex/products

Contacts

Media:
Paychex, Inc.
Lisa Fleming, 585-387-6402
Public Relations Program Manager
lfleming@paychex.com
Twitter: @PaychexNews
or
Eric Mower + Associates
Tom Brede, 585-389-1870
Counselor, Public Relations & Public Affairs
tbrede@mower.com

EMCO Software Announces Availability of Remote Installer 4 Release

$
0
0

The new version of EMCO Remote Installer software offers network administrators new features designed to increase effectiveness of software deployment and audit in Windows networks.


EMCO Remote Installer running on Windows 8
EMCO Remote Installer version 4 includes over 50 new features and improvements designed to simplify remote software deployment in Windows networks.
San Francisco, CA (PRWEB) December 26, 2012

EMCO Software, a leading vendor of software deployment and distribution solutions for Windows networks has announced the availability of a new version of its EMCO Remote Installer software. EMCO Remote Installer version 4 is a major update of the previous version of the application released over two years ago. The new version includes over 50 new features and improvements designed to simplify remote software deployment in Windows networks.
EMCO Remote Installer 4 has been released in two editions. The Free edition can help network administrators to audit software installed on remote Windows PCs across a local network. Administrators can get detailed software reports for every remote PC as well as for a selected group of PCs, such as an Organizational Unit in Active Directory, a domain or an entire network. The Free edition allows network administrators to install and uninstall a single MSI package on a single network PC silently and remotely. The commercial Professional edition of the application offers additional features designed to automate software deployment in large networks. Using the Professional edition, network administrators can install and uninstall multiple MSI packages on multiple PCs simultaneously.
One of the most expected features introduced in EMCO Remote Installer 4 is customization of remote install and uninstall operations. Network administrators can customize MSI installations performed on remote PCs by applying MSI transformations. The application also allows passing custom properties to Windows Installer upon MSI install and uninstall. If customization can't be performed by using MSI properties and MST files, network administrators can configure EMCO Remote Installer 4 to run executable files, script files, Power Shell scripts and Shell commands before or after an MSI installation on remote PCs.
The Professional edition of the application offers network administrators various scheduling options. Those options allow administrators to schedule remote install, uninstall and software scan tasks to be executed automatically. Remote tasks can be scheduled either for one-time execution on a defined date and time or for recurrent execution, for example, daily or weekly. The target PCs configured in a remote task can be changed over time. It's an important and highly demanded feature for recurrent tasks that are configured only once and executed multiple times. EMCO Remote Installer 4 allows configuring target PCs using a query executed every time before the task execution in order to get a dynamic group of target PCs. Using this approach, network administrators can execute remote tasks on all PCs that belong to a particular group, such as an Organizational Unit in Active Directory or an entire domain, for example.
"In addition to functionality improvements, the new version of EMCO Remote Installer includes a new high-performance networking engine optimized to work in large networks. It can operate successfully with a good performance in networks including up to 10,000 PCs. Also, the new version is designed to save the network bandwidth and can not only distribute installations from a central location to network PCs but also install applications from installations stored on local network shares. It can significantly reduce the network workload in large networks," Thorarinn Oskarsson, CEO at EMCO Software, says.
Pricing and Availability
The free and commercial editions of EMCO Remote Installer 4 can be downloaded without registration at http://emcosoftware.com/remote-installer. The commercial edition of the application, which allows managing up to 25 remote PCs, can be evaluated for free during 30 days. The free edition of the application can be used free of charge for personal and commercial needs. The license prices for the commercial edition vary from $49 to $445 depending on the number of network PCs that should be managed remotely. Owners of licenses for version 3 can upgrade to version 4 at special upgrade prices starting from $19.
About EMCO Software
EMCO Software is a provider of integrated software solutions that help organizations to reinvent approaches to their computer networks management. EMCO Software award-winning products enable organizations to manage their IT environments remotely and automate their network administration procedures, including network inventory, software deployment, power management, and network & security control. Founded in 2001, EMCO Software is headquartered in Reykjavik, Iceland, with operations around the globe. Today, more than 20,000 organizations in 85 countries, including Fortune 100 and Fortune 500 companies, trust EMCO Software products. For more information, visit http://emcosoftware.com.

Signed malware and Bring your own Application, listed among top threats for 2013 by McAfee

$
0
0
2013 will bring along new threats such as ransomware, non-Windows-based attacks, signed malware and threats related to Bring your own Application


n the wake of rising threats, it is important for everyone to be geared with new cyber challenges that would arise in the New Year.

McAfee India’s Jagdish Mahapatra shares his top 10 enterprise security predictions

1. Targeted Attacks: 2012 saw an increased growth in targeted attacks that proved successful in disrupting service and fraudulently obtaining significant amounts of intellectual property.  We expect Cyber Criminals will continue to use this method and as a result, in 2013, we are likely to see significantly more targeted attacks and targeted malware. This type of attack is more difficult to protect against. Uniform attacks are still out there but as soon as they are identified and a security fix is released they are no longer effective.One disturbing development in this trend across 2012 was that we started to see more targeted attacks that also destroyed evidence of the attack afterwards and we are likely to see this continue. We have seen attacks where 30,000 hard drives were left non-operational after an attack. Dealing with the clean-up distracts the IT administrators who don’t immediately realize they have been hacked. It also adds to the difficulty in ensuring effective incident response as hackers literally attack any hardware on the way out. Protecting against this will be a major challenge – particularly for enterprise and government.

2. Signed malware: Signed malware was prevalent in 2012 and this is likely to continue. Signed malware is present when a hacker obtains a digital certificate from an organization and appends it to malware, allowing the malware to pass through an organization’s operating system. Stuxnet is a high profile example of this threat. There will be a large increase in this type of threat and it will be harder to stop because it appears more legitimate.

read more.....http://www.informationweek.in/software/12-12-26/signed_malware_and_bring_your_own_application_listed_among_top_threats_for_2013_by_mcafee.aspx

Trend Micro Identifies Malware Purporting Trend Micro Component

$
0
0

A newly found malware type is using to con users by claiming that it is not a warning by forwarding itself off as a component of Trend Micro, claims security experts at security firm, Trend Micro.

In addition, the Trojan leaves a Bitcoin miner application that generates money for the malware author.

The social engineering method employed by the cybercriminals in this particular case is very straightforward. These mails try to attract users into forming the threat by aiding them into believing that the file is a Trend Micro product.

When the user carries out the Trojan, it forms a process svchost.exe (the exact word as the windows starts processing for services, which is an additional effort to conceal itself) towards downloading a second fake component package.


read more...........http://www.spamfighter.com/News-18108-Trend-Micro-Identifies-Malware-Purporting-Trend-Micro-Component.htm


Today's NIST CVE Issuance's For Vulnerabilities In IBM Tivoli NetView, IBM Rational Automation Framework (RAF), Drupal And Android

$
0
0
Click on the underlined CVE for additional vuln specific info


CVE-2012-5951
Summary: Unspecified vulnerability in IBM Tivoli NetView 1.4, 5.1 through 5.4, and 6.1 on z/OS allows local users to gain privileges by leveraging access to the normal Unix System Services (USS) security level.
Published: 12/26/2012
CVE-2012-4816
Summary: IBM Rational Automation Framework (RAF) 3.x through 3.0.0.5 allows remote attackers to bypass intended Env Gen Wizard (aka Environment Generation Wizard) access restrictions by visiting context roots in HTTP sessions on port 8080.
Published: 12/26/2012
CVE-2012-5591
Summary: Cross-site scripting (XSS) vulnerability in the Zero Point module 6.x-1.x before 6.x-1.18 and 7.x-1.x before 7.x-1.4 for Drupal allows remote attackers to inject arbitrary web script or HTML via the path aliases.
Published: 12/26/2012
CVE-2012-5590
Summary: SQL injection vulnerability in the Webmail Plus module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Published: 12/26/2012
CVE-2012-5589
Summary: The MultiLink module 6.x-2.x before 6.x-2.7 and 7.x-2.x before 7.x-2.7 for Drupal does not properly check node permissions when generating an in-content link, which allows remote authenticated users with text-editing permissions to read arbitrary node titles via a generated link.
Published: 12/26/2012
CVE-2012-5588
Summary: The Email Field module 6.x-1.x before 6.x-1.3 for Drupal, when using a field permission module and the field contact field formatter is set to the full or teaser display mode, does not properly check permissions, which allows remote attackers to email the stored address via unspecified vectors.
Published: 12/26/2012
CVE-2012-5587
Summary: Cross-site scripting (XSS) vulnerability in the Email Field module 6.x-1.x before 6.x-1.3 for Drupal allows remote attackers to inject arbitrary web script or HTML via the mailto link.
Published: 12/26/2012
CVE-2012-5586
Summary: The Services module 6.x-3.x before 6.x-3.3 and 7.x-3.x before 7.x-3.3 for Drupal allows remote authenticated users with the "access user profiles" permission to access arbitrary users' emails via vectors related to the "user index method" and "the path to the user resource."
Published: 12/26/2012
CVE-2012-5585
Summary: Cross-site scripting (XSS) vulnerability in the Mixpanel module 6.x-1.x before 6.x-1.1 in Drupal allows remote authenticated users with the "access administration pages" permission to inject arbitrary web script or HTML via the Maxpanel token.
Published: 12/26/2012
CVE-2012-5584
Summary: The Table of Contents module 6.x-3.x before 6.x-3.8 for Drupal does not properly check node permissions, which allows remote attackers to read a node's headers by accessing a table of contents block.
Published: 12/26/2012
CVE-2012-5183
Summary: The Loctouch application 3.4.6 and earlier for Android allows attackers to obtain sensitive information about logged locations via a crafted application that leverages read permission for system log files.
Published: 12/26/2012
CVE-2012-5182
Summary: The Loctouch application 3.4.6 and earlier for Android does not properly handle implicit intents, which allows attackers to obtain sensitive information about logged locations via a crafted application.
Published: 12/26/2012
CVE-2012-5180
Summary: The Opera Mobile application before 12.1 and Opera Mini application before 7.5 for Android do not properly implement the WebView class, which allows attackers to obtain sensitive information via a crafted application.
Published: 12/26/2012
CVE-2012-5179
Summary: The Boat Browser application before 4.2 and Boat Browser Mini application before 3.9 for Android do not properly implement the WebView class, which allows attackers to obtain sensitive information via a crafted application.
Published: 12/26/2012

New Computer Bridges Classical and Quantum Computing

$
0
0

A new type of machine could rival quantum computers in exceeding the power of classical computers, researchers say.
Quantum computers rely on the bizarre properties of atoms and the other construction blocks of the universe. The world is a fuzzy place at its very smallest levels — in this realm where quantum physics dominates, things can seemingly exist in two places at once or spin in opposite directions at the same time.
The new computers rely on "boson" particles, and resemble quantum computers, which differ from traditional computers in important ways. Normal computers represent data as ones and zeroes, binary digits known as bits that are expressed by flicking switch-like transistors on or off. Quantum computers, however, use quantum bits, or qubits (pronouced "cue-bits"), that can be on and off at the same time, a state known as "superposition."
This allows the machines to carry out two calculations simultaneously. Quantum physics permits such behavior because it allows for particles that can exist in two places at once or spin in opposite directions at the same time.
In principle, quantum computers could solve certain problems much faster than can classical computers, because the quantum machines could run through every possible combination at once. A quantum computer with 300 qubits could run more calculations in an instant than there are atoms in the universe.

read more.............http://news.yahoo.com/computer-bridges-classical-quantum-computing-175759146.html

APPLE DEVICE THEFT DRIVES NYC CRIME RATE UP FOR FIRST TIME IN 20 YEARS

$
0
0
Apple’s (AAPL) stock might be taking a beating, but that doesn’t mean the products dreamed up by Jonathan Ive and company aren’t still hot commodities. On the contrary, Apple products are still so hot that thefts of iOS devices helped drive New York City’s crime rate up for the first time in 20 years, according to The Wall Street Journal. The news isn’t shocking considering the data the New York Police Department released in October, which revealed Apple-related crimes were up 40% this year.

read more.....http://bgr.com/2012/12/26/iphone-theft-nyc-crime-rate-269057/

Why smartphone security policy is more effective than MDM tools

$
0
0

Why smartphone security policy is more effective than MDM tools

    Why smartphone security policy is more effective than MDM tools

    Date: Dec 10, 2012
    According to mobile security expert Aaron Turner, enterprises must learn about "the ugly underbelly of the mobile device management market" before making an MDM purchase. Namely, that MDM vendors are almost entirely at the mercy of the mobile platform providers, and that means MDM tools are often much less effective than customers are led to believe.
    In this video, Turner, co-founder of information security consultancy N4Struct Inc., discusses why a sound enterprise mobile security policy is a better method for securing smartphones. He also touches on how enterprises can augment mobile security using existing tools and systems, what effect BYOD has on enterprise smartphone security efforts, and why a mobile device inventory is a crucial starting point.

    Source link: http://searchsecurity.techtarget.com/video/Why-smartphone-security-policy-is-more-effective-than-MDM-tools
    Viewing all 8064 articles
    Browse latest View live