2540817 Outlook 2007 prompts for credentials after Exchange CAS is restarted

#Exchange2010 #Outlook #Exchange …  Interesting

Source: http://support.microsoft.com/default.aspx?scid=kb;EN-US;2540817

After an Exchange Client Access Server (CAS) is restarted, the Microsoft Office Outlook 2007 client prompts you to re-enter your credentials to reconnect to the Microsoft Exchange server. (This behavior is not experienced if you are connected to the Exchange CAS server by using Outlook 2010.)

To work around this issue, follow these steps to enable the DisableTransientFailureAuthPrompts

BCS Cybercrime Forensics SG Briefing: 20th September 2011

Not sure if I am allowed to blog these? but let try this an see

Opinion: Evolution of Incident Response Computer Weekly 19th September 2011
http://www.computerweekly.com/Articles/2011/09/19/247928/Opinion-Evolution-of-incident-response.htm
Security Firms’ Plan Targets Cyberthreats UPI 19th September 2011
http://www.upi.com/Business_News/Security-Industry/2011/09/19/Security-firms-plan-targets-cyberthreats/UPI-93641316451916/
The All-Seeing Eye of the Camera: New TV Series Person of Interest Set in a Not-Too-Distant Future of Crime ’Prediction’
Canada.com 19th September 2011
http://www.canada.com/entertainment/seeing+camera+series+Person+Interest+distant+future+crime+prediction/5425771/story.html
Chinese Hackers Pledge to Reject Cybercrime Computer World 19th September 2011
http://www.computerworlduk.com/news/security/3304319/chinese-hackers-pledge-to-reject-cybercrime/
Navy War-Room Leak: Case Falling Apart Zee News—India 19th September 2011
http://zeenews.india.com/news/nation/navy-war-room-leak-case-falling-apart_732456.html
Counter What? Family Security Matters—USA 19th September 2011
http://www.familysecuritymatters.org/publications/id.10398/pub_detail.asp
Clarke: Outdated Cyber Defence Leaves US Open to Attack GCN—USA 19th September 2011
http://gcn.com/articles/2011/09/19/richard-clarke-us-outdated-cyber-defense.aspx
Feds: Wi-Fi Hacking Burglars Targeted Dozens of Seattle-Area Businesses Seattle Pi—USA 19th September 2011
http://www.seattlepi.com/local/article/Feds-Wi-Fi-hacking-burglars-targeted-dozens-of-2178421.php
Hackers Breach Japan’s Missile, Nuclear Plants Mobileda 19th September 2011
http://www.mobiledia.com/news/108832.html
No Set-Back in Naval War Room Leak Accused Extradition: CBI The Hindustan Times—India 20th September 2011
http://www.hindustantimes.com/No-set-back-in-Naval-War-Room-leak-acccused-extradition-CBI/Article1-748042.aspx
US Matrix-Style Cyberwar Firing Range Moves Forward The Register 20th September 2011
http://www.theregister.co.uk/2011/09/20/cyber_range_pahse_iib/
ComodoHacker Declares Private Cyber-War eWeek 20th September 2011
http://www.eweekeurope.co.uk/news/comodohacker-declares-private-cyber-war-40152
Integralis Takes a Proportional Approach to Cybercrime Source Wire 20th September 2011
http://www.sourcewire.com/releases/rel_display.php?relid=67189
Cyber Attacks Coincide With 80th Anniversary of Manchurian Incident The Telegraph 20th September 2011
http://www.telegraph.co.uk/news/worldnews/asia/japan/8775634/Cyber-attacks-coincide-with-80th-anniversary-of-Manchurian-Incident.html
Cyber Attacks on South Korea Foreign Policy Journal 20th September 2011
http://www.foreignpolicyjournal.com/2011/09/20/cyber-attacks-on-south-korea/
Japan Defence Firm Mitsubishi Heavy in Cyber Attack BBC News 20th September 2011
http://www.bbc.co.uk/news/world-asia-pacific-14982906
Complaints relating to Spam Text Messages Increase BBC News 20th September 2011
http://www.bbc.co.uk/newsbeat/14971377
UK Firm Denies ’Cyber-Spy’ Deal With Egypt BBC News 20th September 2011
http://www.bbc.co.uk/news/technology-14981672
Cybercrime: Ugly Face of Social Media The National 20th September 2011
http://www.thenational.ae/business/technology/cybercrime-ugly-face-of-social-media
Last Line of Defence: Why is ANZUS Prepping for a Cyber War?
The Conversation—Australia 20th September 2011
http://theconversation.edu.au/last-online-of-defence-why-is-anzus-prepping-for-a-cyber-war-3418

#BlackBerry Enterprise Server for Exchange Software Support Life Cycle

#Exchange #Exchange2010

Interesting, hope you off BES 4.1

Product Name and Version General Availability Support End Date Sales End Date
BlackBerry Enterprise Server v5.0.1 for Microsoft Exchange Available 15-Nov-2011 15-Nov-2011
BlackBerry Enterprise Server v5.0.0 for Microsoft Exchange 04-May-2009 15-Nov-2011 15-Nov-2011
BlackBerry Enterprise Server v4.1.7 for Microsoft Exchange 17-Nov-2009 02-Jul-2011 02-Jul-2010
BlackBerry Enterprise Server v4.1.6 for Microsoft Exchange 17-Jul-2008 02-Jul-2011 02-Jul-2010
BlackBerry Enterprise Server v4.1.5 for Microsoft Exchange 18-Apr-2008 31-Jan-2009 17-Jul-2008
BlackBerry Enterprise Server v4.1.4 for Microsoft Exchange 20-Jun-2007 31-Jan-2009 18-Apr-2008

Definitions:

General Availability: The software product is available for download on this date.

Sales End Date Support End Date
Definition The date the full version of the software is no longer available for sale or download from RIM. The full support scope of service is diminished and source code maintenance no longer performed.
Impact to the T-Support Customer No longer able to purchase additional full copies of this version. Replacement copies for Disaster Recovery may be available. Customer with existing contract continues to be supported; all issues are triaged but if the issue reported has been resolved in a current version, customer may be instructed to update the software. Customer may continue to receive hot fixes for Sev 1 and security issues.
Impact to the non T-Support Customer No longer able to purchase additional full copies of this version. Replacement copies for Disaster Recovery may be available. Maintenance Releases (MRs) are no longer available.

http://www.blackberry.com/LifeCycle/external/index.do

Microsoft Security Advisory 2607712 Revised

Microsoft Security Advisory 2607712 – Fraudulent Digital Certificates Could Allow Spoofing: http://www.microsoft.com/technet/security/advisory/2607712.mspx

Microsoft is aware of active attacks using at least one fraudulent digital certificate issued by DigiNotar, a certification authority present in the Trusted Root Certification Authorities Store. A fraudulent certificate could be used to spoof content, perform phishing attacks, or perform man-in-the-middle attacks against all Web browser users including users of Internet Explorer. While this is not a vulnerability in a Microsoft product, this issue affects all supported releases of Microsoft Windows.