• Source Port Randomization for Caching DNS Servers Requested, yet again. Vulnerability
    Source Port Randomization for Caching DNS Servers Requested, yet again.
    Hello, this is Moto Kawasaki, a new member of Global Coordination Division. Alerts from JPRS and JPCERT/CC On April 14th 2014, JPRS (Japan Registry Services Co., Ltd.) and JPCERT/CC concurrently published the alerts on DNS cache poisoning attack. Alert from JPRS http://jprs.jp/tech/security/2014-04-15-portrandomization.html (Japanese version) Alert from JPCERT/CC https://www.jpcert.or.jp/english/at/2014/at140016.html (English version) https://www.jpcert.or.jp/at/2014/at140016.html (Japanese version) Now I'd like to elaborate on the key points and share my views on the case by...

    Read more

  • APCERT DAY at APRICOT and  Open Resolver Check Site Launched by JPCERT/CC Event
    APCERT DAY at APRICOT and Open Resolver Check Site Launched by JPCERT/CC
    Hello, I am Yukako (Yuka) Uchida from APCERT Secretariat. I am a new Liaison Officer of the Global Coordination Division since last December. From 18th to 28th February, APRICOT 2014 (https://2014.apricot.net/) had been held in Petaling Jaya, Malaysia. APRICOT, which stands for Asia Pacific Regional Internet Conference on Operational Technologies, is an annual meeting for internet engineers in the region. They have kindly offered APCERT a one-day slot on 26...

    Read more

  • JPCERT/CC at “CODE BLUE”
    JPCERT/CC at “CODE BLUE”
    Hi. This is You Nakatsuru (“Tsuru”) – a “just married” Information Security Analyst from Analysis Center. Today, I would like to introduce JPCERT/CC’s presentations at “CODE BLUE”, a new international information security conference originating in Japan which was held on February 17 and 18. The conference attracted many computer security experts – more than 400 attendees from about 10 different countries. The conference covered a wide range of topics discussing...

    Read more

  • ICS SECURITY CONFERENCE 2014
    ICS SECURITY CONFERENCE 2014
    Hello, I am Hidekazu Yamada at ICS Response Group of JPCERT/CC. In this entry today, I would like to look back on “ICS Security Conference 2014” which was held early last month, along with some presentation highlights. My presentation summary on the result of the ICS Asset owners’ survey will also be covered. Event Overview The conference took place on Wednesday, 5 February 2014 at Kokuyo Hall in Shinagawa, Tokyo....

    Read more

  • Analysis on Compromised Websites in Japan
    Analysis on Compromised Websites in Japan
    Hi. This is Misaki Kimura at Watch and Warning Group. We have been tracking and compiling information on website compromises, impacting thousands of legitimate websites in Japan. The number of compromised websites increased significantly in the first half of JFY 2013: more than 5,200 sites have been compromised from April 1 to October 31, 2013. The following chart illustrates the number of compromised websites detected each month in Japan, counted...

    Read more

  • Information Security Incident Management Standard under Revision
    Information Security Incident Management Standard under Revision
    Hi, it's Masaki Kubo. I’ve just returned from my trip to Incheon, Korea, where we had an ISO/IEC JTC 1/SC 27 meeting on standardization of IT security techniques. JPCERT/CC has been engaged in this standardization effort through the Japanese national body over the past years, and I participated particularly in the revision work of ISO/IEC 27035:2011 on information security incident management. ISO/IEC 27035:2011 was published in 2011 and right after...

    Read more

  • SNS in Japan
    SNS in Japan
    I'm Shoko Nakai, a member of the Incident Response Group. It was back in 1998 when I first started corresponding with my friends over the Internet. I was a student then and had the opportunity to participate in a short study program in the United States. I was invited to several social events, and people asked me to exchange e-mail addresses by writing it on a piece of paper. But...

    Read more

  • The votes are in - and we have a new CVE numbering scheme!
    The votes are in - and we have a new CVE numbering scheme!
    ------------------------------------------------------------------------ [Update 2013.8.1] MITRE has prepared a page describing the change in CVE format. The page is at the following: CVE-ID Syntax Change https://cve.mitre.org/cve/identifiers/syntaxchange.html Stated on the site, this change is scheduled to take effect on January 1, 2014. This page describes some of the background behind the change and towards the bottom of the page there is a list of some frequently asked questions. ------------------------------------------------------------------------ Hello, this is Taki...

    Read more

  • Phishing Trends in Japan
    Phishing Trends in Japan
    Hi, I'm Misaki Kimura, a member of the Watch and Warning Group, and this is my first time to post here. My duty here at JPCERT/CC is to monitor various security related information and to share them internally/externally to support taking earliest countermeasures. Today’s topic is about the recent phishing trends in Japan, which includes the phishing incidents observed and efforts for mitigation. Phishing became so prevalent that we frequently...

    Read more

  • APCERT Commemorates Its 10th Anniversary
    APCERT Commemorates Its 10th Anniversary
    G’day! This is Shiori Kubo from JPCERT/CC, serving as a member of the APCERT Secretariat. Today I would like to cover APCERT’s 10th anniversary, commemorated at the APCERT AGM & Conference 2013, held on 23rd - 27th March 2013 in Brisbane, Australia, very warmly and successfully hosted by CERT Australia. About APCERT For readers who are not familiar with APCERT, please let me briefly introduce – APCERT stands for Asia...

    Read more