And the moon is made up of green cheese!

Sent from my iPhone

On Feb 10, 2013, at 4:23 PM, "Andrew S. Baker" <[email protected]> wrote:

> The reporting was vague, but Bit9 was more clear in their own blog.
> 
> https://blog.bit9.com/2013/02/08/bit9-and-our-customers-security/
> 
> In brief, here is what happened. Due to an operational oversight within Bit9, 
> we failed to install our own product on a handful of computers within our 
> network. As a result, a malicious third party was able to illegally gain 
> temporary access to one of our digital code-signing certificates that they 
> then used to illegitimately sign malware. There is no indication that this 
> was the result of an issue with our product.  Our investigation also shows 
> that our product was not compromised.
> 
> 
>  
>  
> ASB
> http://XeeMe.com/AndrewBaker
> Providing Virtual CIO Services (IT Operations & Information Security) for the 
> SMB market…
>  
> 
> 
> On Sun, Feb 10, 2013 at 2:03 PM, Crawford, Scott <[email protected]> 
> wrote:
>> You could interpret that sentence two ways:
>> 
>>  
>> 
>> A: We didn’t have it installed on the compromised systems.
>> 
>> B: It was installed, but did not protect them.
>> 
>>  
>> 
>> B says the software doesn’t work. A says there was simply a mistake made. 
>> Phrasing it like they did, allows B to be true, while implying A.
>> 
>>  
>> 
>> From: Andrew S. Baker [mailto:[email protected]] 
>> Sent: Saturday, February 9, 2013 9:51 PM
>> To: NT System Admin Issues
>> Subject: Re: Security Firm Bit9 Hacked, Used to Spread Malware
>> 
>>  
>> 
>> >>The company said attackers managed to compromise some of Bit9′s systems 
>> >>that were not protected by the company’s own software. 
>> 
>>  
>> 
>>  
>> 
>> And this was because of... ?
>> 
>>  
>>  
>> ASB
>> http://XeeMe.com/AndrewBaker
>> Providing Virtual CIO Services (IT Operations & Information Security) for 
>> the SMB market…
>>  
>>  
>> 
>> On Fri, Feb 8, 2013 at 5:59 PM, Stu Sjouwerman <[email protected]> 
>> wrote:
>> 
>> Bit9, a company that provides software and network security services to the 
>> U.S.
>> government and at least 30 Fortune 100 firms, has suffered an electronic
>> compromise that cuts to the core of its business: helping clients distinguish
>> known "safe" files from computer viruses and other malicious software.
>> OUCH !   More at:
>> http://krebsonsecurity.com/2013/02/security-firm-bit9-hacked-used-to-spread-malware/
>> 
>> Warm regards,
>> 
>> Stu
>> 
>>  
>> 
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> 
>> ---
>> To manage subscriptions click here:  
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to [email protected]
>> with the body: unsubscribe ntsysadmin
>> 
>> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
>> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>> 
>> ---
>> To manage subscriptions click here: 
>> http://lyris.sunbelt-software.com/read/my_forums/
>> or send an email to [email protected]
>> with the body: unsubscribe ntsysadmin
>> 
> 
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
> 
> ---
> To manage subscriptions click here: 
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to