Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Tuesday, May 29, 2012

New virus twenty times stronger than the Stuxnet was discovered



A new and rapidly evolving virus, code-named Flame was discovered by Kaspersky seems to have caused great concern in the region of Iran infecting dozens of computers. Flame,  can monitor the network traffic, using a local computer, captures screenshots and records sounds by sending all this data back to servers. The virus is believed to be active since at least March 2010, and twenty times more potent than the Stuxnet.


The virus... Share to read the rest article.
Thanks for sharing, you just leveled up! Here is the secret stuff.

The virus is mainly active in Iran but has been discovered in Israel, Palestine, Sudan, Syria, Lebanon, Saudi Arabia and Egypt. It aims mainly academics and private computers and managers seem to delete the virus from low-value equipment. Indeed, it is possible to upgrade the virus with new capabilities in the form of add-on packages. At least twenty such packages have been identified so far with currently unknown function.


 The promoters behind the creation and distribution of the virus have not been identified yet. "It took us half the time to analyze the Stuxnet», said Alexander Gostev, in charge of Kaspersky Lab. "This is twenty times more complicated. It will take us 10 years to fully understand everything. "

Tuesday, May 15, 2012

Anonymous: We have access to all the secret government databases



Some time had passed since the last time you heard about Anonymous and now the popular  hackers group returns with an incredible statement. In an interview with the newspaper 'National Post',  Christopher "Commander X" Doyon, one of the few remaining leaders of Anonymous, said:
Share to read the interview.
Thanks for sharing, you just leveled up! Here is the secret stuff.

"We currently have access to all databases of the U.S. government. It is a matter of time before we will publish all of these elements, without any possibility of not doing it. You know how we gained access? Not with a hack. The access given to us by people who are responsible for the systems." 


As you can see, these statements are too serious but somehow unattainable. Indeed, the popular group of hackers may have access to some of the databases of government but not all. Even if true but the latter scenario, the risk for the U.S. government is still huge.

Monday, May 7, 2012

Microsoft informs about malware in Office for Mac




Microsoft researchers discovered malware on a Mac OS X which operates a three-year hole in Office for Mac. It uses a multi-level attack as in the world of Windows. Although Microsoft made ​​the problem since 2009, the company informs that not all machines are updated to the latest version. The figures show the company that the malware is not as extensive.


The stresses in the Microsoft blog:


"No operating system outside the laboratory is 100% safe. As more systems are gaining users, 
acquire and viruses. "


The Microsoft ends up urging users of Office 2004 for Mac and Office 2008 for Mac to make immediate update to protect against potential threats.

Friday, April 27, 2012

You thought you're safe in an https site? Think again




Research published by the Trustworthy Internet Movement, a nonprofit organization dealing with security on the Internet, reveals that 90 percent of the top 200 000 websites with https protection is vulnerable to attack SSL (Secure Sockets Layer). The data derived from a new project called SSL Pulse using an automated scanning technology to analyze the security of https sites located on the first list of the company analyzes Alexa.


The project uses an algorithm to rank websites for security they provide and the protocols they use. Most sites were able to score a good score but only ten percent were truly safe. The rest were found to be vulnerable to an attack known as BEAST (Browser Exploit Against SSL / TLS) is used to decrypt tokens and cookies from certification requests HTTPS.


The vulnerability corrected in version 1.1 of the Protocol TLS servers but many still continue to support older protocols such as SSL 3.0, for compatibility with previous generations. "For the average website, which has significant potential value, the risk is very small. But for pages that have large numbers of users and important risk is too great. "

Tuesday, April 24, 2012

Check the security of Facebook applications with Privacyscore


privacychoice


PrivacyChoice launches today the Privacyscore application for Facebook with which you can check which of the popular social network applications respect the privacy of your data and which not. "Hundreds of millions of people use Facebook everyday applications, sharing their personal data with thousands of providers. Each provider has their own privacy policies, which often do not provide even the basics, "says CEO of the company.


We have in mind that Facebook has no control over which applications have access to your data and has absolutely no responsibility. The Privacyscore grades each application from 0 to 100 before permitting access to your account so you have a more complete picture of the policy of each company.


The PrivacyChoice already scanned many companies to hold first place in the Playdom rating 93/100 and second place in the EA 91/100 while Zynga scored 82/100. The PrivacyChoice notes that the average of all applications is examined in 78/100.

Saturday, April 21, 2012

Found malware that steals card details from hotel reservations



The security company "Trusteer" informed about the existence of a trojan able to steal the credit card details from the hotel reservations. The "Trusteer" team discovered that the remote access trojan sold at forums for $ 280. 


The malware is designed to pull screenshots from applications that have access to credit card numbers and expiration dates. Such applications are usually found in hotels and computers usually do not include protection anti-virus software. The creators of malware including instructions on how to use VoIP software to fool those responsible to install the trojan.

Tuesday, April 17, 2012

Securelist identified the second Trojan for Mac!

trojan for mac


A few days ago was discovered a Trojan virus called "Flashback" who was spotted at 600,000 Mac computers and stole passwords and other personal data. This has led to a movement in Apple Java update for OS X, to remove the virus. 


Securelist publishes the findings of another Mac trojan that goes through Java. The malware called Backdoor.OSX.SabPub, captures screenshots of the status display, performs commands in the "infected computer" and connects to a remote website to transmit data. For now we do not know how is the virus, but the small number of cases, the Securelist believes that used in targeted attacks with emails containing URLs of dangerous websites.

Monday, April 9, 2012

Security hole is discovered in Facebook and Dropbox for iOS




New security scandal revealed the researcher Gareth Wright on the iOS devices and many popularFacebook and Dropbox applications . Essentially, anyone can very easily just by copying an unencrypted text file from one device to another to obtain access to the account of another user.


The matter is quite serious and the failure of developers to protect encoded data user access within the application itself. Initially, Facebook issued a statement which basically says the safety gap appears only jailbroken devices and does not blame itself.


TNW, however, conducted tests and found that no jailbreak of the device is required to obtain access to a user's login information stealing in this way the account. The leak can be done either by obtaining physical access to the user device or installing malicious software on a public computer. Wright to prove what he said , installed such a program on a public computer and managed to collect over a thousand files. Plist in a week before contacting Facebook about the problem.



The same behavior occurs the application Dropbox too creating serious questions because the developers do not encrypt these very important information. The Dropbox notes, however, that the application for Android does not have this vulnerability.


No need to panic, though. Although the developers have to make to upgrade their applications by editing the security hole you can easily protect yourself by setting a passcode on your device. The passcode is a security method that should be everyone has put in iOS device. Passcode to all your data remains protected even in case of theft. To set a passcode go to Settings-> General-> lock with password.

Wednesday, April 4, 2012

EU plans to punish hackers for cyber attacks




The European Commission passed the Civil Liberties approved the proposal to criminalize offenses related to cyber attacks making it legally responsible individuals within companies.


For example, if a company hire a hacker to access the database a competitor, then the company will be legally responsible for this, or the act was without knowledge of either.


Members of the European Union should from now on to ensure that their networks are available nationwide at any time with a response time in emergencies less than eight hours to prevent proliferation of attacks across the border.


Essentially, the decision says that the most cyber attacks (cyber attacks) computer systems will be prosecuted at least two years' imprisonment and a maximum penalty of five years if, for example, economic losses resulting from the attack. Even the possession or distribution of hacking software prosecuted from now on.

Tuesday, April 3, 2012

Completed the first step for the system against piracy of U.S.




It was reported some time ago the upcoming collaboration of Comcast, Cablevision, Verizon, Time Warner Cable and other Internet service companies in the U.S. to launch a new program for strict control of their networks.


The measures will apply from July but the band announced its board members with Jill Lesser, director of the company The Glover Park Group, to lead the organization.


The agreement states that anyone downloading illegal material from the Internet will receive warning notices from providers and from a point and then if you ignore these warnings should take tougher measures such as reducing speed, disconnection roundtrips. Any customer wishing a review of his case will have to pay a fee worth $ 35.


The only certainty is that the "movement" takes slowly physically and legally, and if approved will be major problems. We expect to see in July and practically how to move this organization.

Monday, April 2, 2012

Global Payments Hack: 1,5 million credit card numbers in the hands of hackers!


Coals are looking forward to the cardholders and Visa MasterCard American banks after the recent revelation that the payment processing service Global Payments was attacked by hackers.


A breach of security of the system of Global Payments placed in space-25 January 21 February, but was seen just last Friday. The result of the attack was to steal 1.5 million credit card numbers, rather than the original calculations were for 50,000.


At present it is unclear what data is passed in the hands of hackers, but like all show the names, addresses and security codes of the cards are safe. The company will announce more details after the meeting which will take place

Thursday, March 29, 2012

The Unreal Engine 3 of Epic Games will be used by the FBI and the U.S. Army


As revealed by Epic Games, the graphics engine, Unreal Engine 3, which lies behind successful titles 'Gears of War' and 'Mass Effect', will be used to develop educational games for the FBI, the U.S. Army and other organizations U.S. Government.

Epic Games recently announced an agreement with Virtual Heroes, a company specialized in developing simulators. Part of the deal is and use the graphics engine Unreal Engine 3 by the FBI and other government agencies through the U.S. UGN (Unreal Government Network).

The machine will be a valuable tool for training FBI agents acting as a multiplayer simulator crime scene. As for the American military would be used to develop two simulators: the first will be an anesthesia simulator while the second will be on the platform HumanSim for training doctors and surgeons.

Wednesday, March 28, 2012

Security company "breaks" the passcode on iPhone [Video]




The company Micro Systemation from Sweden, helps the police and the army around the world on issues related passwords and security systems. In the video above shows how our software works and according to Forbes:
The application of Micro Systemation called XRY can break very quickly an iOS or Android device passcode,  transfer data to PC,  decode, and display information such as user location on GPS, files, chat history, messages, even record of keystrokes.
The report stresses that the company uses the same exploits used by jailbreakers to "enter" on your device when access can not see everything.


Tuesday, March 27, 2012

Malware Chrome Extensions "occupy" your account to Facebook!


New way to trick users found Chrome cunning hackers, raising malicious Chrome Extensions  the official application store of the popular browser.


google store





The user seeing these extensions in Google Chrome Web Store considers to be safe and proceeding to installation. The result: The extensions occupy his account on Facebook!


Worst of all is that these extensions are advertised on Facebook, claiming that they can change the color of your profile page, find out who he visited often and generally promising many of the usual (and naturally suspicious) promises.


When the user clicks on the advertisement, carried on the official Chrome Web Store where it considers that it is safe software. However, once installed the extension, the account begins to act uncontrollably, making Like to pages and spamming his friends on the new extension.


The next time you try to download a Chrome extension from the official Google Chrome Web Store believing that in view of their home is safe, well you can double check it.

Friday, March 23, 2012

All you need to know about the new changes in Facebook's security policy


In the new changes in security policy goes far the most popular social network in the world, starting with the renaming of the term 'Privacy Policy' to 'Data Use Policy'. Let's see in detail the major changes:




Access to content and user information


Now all the details you need about the different applications access to your data you can find in the section 'Sharing Your Content and Information'. Here it is clear that the applications that you download have the right to see your content (after your permission when downloading) like those of your friends, provided that the latter have access to your content.


Security


The Facebook prohibits obtaining information from social network using automated means without its consent. Moreover, these 'dating' applications within the social network is now available only to users over 18 years.


Special Provisions for users outside the U.S.


This change allows Facebook to block / restrict the provision of any functions or services to specific geographic areas. The move is reminiscent of its policy for censorship of Twitter tweets in selected countries.


Protecting the rights of third


While so far the users of social network could do a tag third party without consent, Facebook now decided to go one step further. From now on, will not be allowed to tag other people do you know you do not want that.


Special Provisions for advertisers


This clarifies that Facebook is not responsible for any cheating advertisers invalid click through ads or other technological issues that may arise.


Special Provisions for software


This is a new section concerning any downloaded software associated with Facebook, such as the various plug-ins for browsers around. The company says it will release software update for these products without any further notice. Moreover, explicitly prohibits any attempt to access the source code of the social network.


Amendments


Facebook invites users to comment on the changes (here), indicating that in case of suspension of more than 7,000 faculty will offer voting by providing alternatives.


The new security policy (Data Use Policy) of Facebook here.

Monday, March 12, 2012

The Anonymous publish the code of Norton Antivirus!




After the unsuccessful attempt to extort Anonymous amount of $ 50,000 from Symantec (at least the claims of the latter), the popular group of hackers published the final Code of Norton AntiVirus on the website The Pirate Bay.


The file size is 1.07GB and contains the source of many products of the suite and a note that refers to the release of arrested members excluding the LulzSec-Sabu, leader of the group of hackers who turned out secretly collaborated with the FBI.


Symantec has announced the release of the code will not affect the products of the suite, arguing that the current version has been completely renovated and has no common code with the version of 2006, the year that is stolen code.

Saturday, March 10, 2012

The Swedish police plans new raid on PirateBay!


New sudden raid by the police is expected to receive soon the The Pirate Bay, one of the largest websites in the world torrents.






As the team at PirateBay Torrentfreak, there are reports that the Swedish authorities have already obtained the necessary warrants and plans soon to move against the new servers. Se domain name of the website.




However, this will not be the first attack against the popular file-sharing website. Back in 2006, the Swedish police raided against the Pirate Bay, resulting in concentration was enough information to send four of its founders in prison and oblige them to pay huge fines.


The PirateBay operate normally until now except for the change of the domain name. Org to. Se during the past months and the transition from files. Torrents on magnet links. The PirateBay team answers:


"We will remain here we are. We are not going anywhere. But we have a message for Hollywood, investigators and prosecutors: LOL. "

Thursday, March 8, 2012

Google Chrome: Hacked within a few minutes in the contest Pwn2Own!


A few days ago that Google felt confident of the security of the browser Google Chrome and even announced awards of $ 60,000, $ 40,000 and $ 20,000 for those who manage to break the safeguardswhile rumming the competition Pwn2Own.






Eventually, VUPEN Security has managed to overcome the security of any Google Chrome in just a few minutes and run their own code in the whole platform web browser!




As is logical, it was unknown how penetration or "vulnerable" spots, but Google has compensated the team with $ 60,000 and 32 points for the contest Pwn2Own underway, while repair problems before they release the next version of Google Chrome.

The Anonymous "threw" the Vatican's website!




One day after the identification and arrest of the senior team LulzSec by the betrayal of Sabu, which would supposedly elite and Anonymous, the latter occurring in the best manner, "threw" the official website of the Vatican!




The attack took the Italian Anonymous group on the grounds that the Roman Catholic Church is responsible for countless scandals during the history and hidden behind a false doctrine.


"The Anonymous decided to attack today on your website, answering this way the doctrine, operations, the absurd and anachronistic perceptions profit organization that spreads throughout your world. The attack is not against religion or against Christian believers worldwide, but is addressed to the corrupt Roman Catholic Church "

Wednesday, March 7, 2012

The U.S. government can seize any. com domain wants!




A few months ago, the U.S. government issued rulings on The closure of sites and the seizure of domains even if they have been registered outside the U.S.. The explanation he gives for all this ... is clear: "Anything that ends in. Com,. Net,. Cc,. Tv and. Name, can be seized!"




Last week U.S. authorities closed the gambling website Bodog.com although owned Canadian company. However, as the U.S. government, the adoption of new domain names owned by VeriSign's jurisdiction based in the U.S..


According to department spokesperson 'Immigration and Customs Enforcement' (ICE), whenever the U.S. wants to download a website domain. Com,. Net,. Tv or. Name, sends court order to VeriSign, which complies directly. The same procedure is followed in the Public Interest Registry, which manages the. Org domains.


Since June 2010, under the initiative of the U.S. government, 'Operation in Our Sites' have seized more than 352 domains and every indication if something is not done the number will increase further.


The explanation for the closure of the website Bodog.com was that the site had access to American citizens when gambling on the Internet in the U.S. are prohibited, regardless of which other countries are legitimate. Perhaps, someone should remind them that the Internet is not American but global service?

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes |