And the moon is made up of green cheese! Sent from my iPhone
On Feb 10, 2013, at 4:23 PM, "Andrew S. Baker" <[email protected]> wrote: > The reporting was vague, but Bit9 was more clear in their own blog. > > https://blog.bit9.com/2013/02/08/bit9-and-our-customers-security/ > > In brief, here is what happened. Due to an operational oversight within Bit9, > we failed to install our own product on a handful of computers within our > network. As a result, a malicious third party was able to illegally gain > temporary access to one of our digital code-signing certificates that they > then used to illegitimately sign malware. There is no indication that this > was the result of an issue with our product. Our investigation also shows > that our product was not compromised. > > > > > ASB > http://XeeMe.com/AndrewBaker > Providing Virtual CIO Services (IT Operations & Information Security) for the > SMB market… > > > > On Sun, Feb 10, 2013 at 2:03 PM, Crawford, Scott <[email protected]> > wrote: >> You could interpret that sentence two ways: >> >> >> >> A: We didn’t have it installed on the compromised systems. >> >> B: It was installed, but did not protect them. >> >> >> >> B says the software doesn’t work. A says there was simply a mistake made. >> Phrasing it like they did, allows B to be true, while implying A. >> >> >> >> From: Andrew S. Baker [mailto:[email protected]] >> Sent: Saturday, February 9, 2013 9:51 PM >> To: NT System Admin Issues >> Subject: Re: Security Firm Bit9 Hacked, Used to Spread Malware >> >> >> >> >>The company said attackers managed to compromise some of Bit9′s systems >> >>that were not protected by the company’s own software. >> >> >> >> >> >> And this was because of... ? >> >> >> >> ASB >> http://XeeMe.com/AndrewBaker >> Providing Virtual CIO Services (IT Operations & Information Security) for >> the SMB market… >> >> >> >> On Fri, Feb 8, 2013 at 5:59 PM, Stu Sjouwerman <[email protected]> >> wrote: >> >> Bit9, a company that provides software and network security services to the >> U.S. >> government and at least 30 Fortune 100 firms, has suffered an electronic >> compromise that cuts to the core of its business: helping clients distinguish >> known "safe" files from computer viruses and other malicious software. >> OUCH ! More at: >> http://krebsonsecurity.com/2013/02/security-firm-bit9-hacked-used-to-spread-malware/ >> >> Warm regards, >> >> Stu >> >> >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to [email protected] >> with the body: unsubscribe ntsysadmin >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ >> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ >> >> --- >> To manage subscriptions click here: >> http://lyris.sunbelt-software.com/read/my_forums/ >> or send an email to [email protected] >> with the body: unsubscribe ntsysadmin >> > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
