31 Aralık 2012 Pazartesi

Telepresence robots let employees 'beam' into work

Bo Preising, Suitable Technologies' vice president of engineering, at left, talks with fellow engineers, Josh Faust, center on screen, and Josh Tyler, on screen at right, both using a Beam remote presence system in Palo Alto, Calif., Wednesday, Dec. 12, 2012. More employees are working from home, but there's still no substitute for actually being at the office. Enter the Beam. It's a roving computer screen _ with video cameras, microphones and speakers _ that stands five feet and rides on motorized wheels. (AP Photo/Marcio Jose Sanchez)PALO ALTO, Calif. (AP) ? Engineer Dallas Goecker attends meetings, jokes with colleagues and roams the office building just like other employees at his company in Silicon Valley.


nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Trojan:Android/GinMaster.A

Trojan:Android/GinMaster.A steals confidential information from the device and sends it to a remote website.

nod32 full download full nod32 download est nod32 serial

Trojan:W32/Patched

Windows components that have been 'patched' by a malicious application, usually to facilitate the malware's operations. The affected component and the purpose of the patching may vary depending on the malware in question.

nod32 keyler nod32 key esed nod32 download nod32 serialleri

China tightens the screws on Internet users

The country will now require all citizens to use their real names when signing up for an Internet account and force Internet providers to delete posts deemed "illegal."

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

Trojan:W32/Reveton

Trojan:W32/Reveton is a Ransomware application. It fraudulently claims to be from a legitimate law enforcement authority and prevents users from accessing their infected machine, demanding that a 'fine' must be paid to restore normal access.

esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key

A Quick Look at the Twitter Phish Rotating through Domains

A Twitter phishing scheme is spreading its wings, as the previous couple of phishing domains used by this scheme late last week have been taken down. So its operators have decided to put up multiple effective domains. Here are a couple of things to look for.

When you are using a browser like Google Chrome and you are visit twitter.com, the browser displays a green url indicator that the domain has been verified by an extended SSL CA. Now, with the CA breaches that we've seen in the past year (the Diginotar breach report was finalized this past week), that may not mean everything. But, in this case, here is how you might verify that you are using the legitimate twitter site:

This Direct Message attracts phish with a dramatic notice: "Hey you hear about the gossip your mentioned in? it started some serious drama, it fired up a lot of people on here". There are a handful of messages in use, as the GFI guys mentioned here last week.

If you were to click on that bit.ly shortened link, your browser will be redirected through a click tracking service:
hXXp://client1.gtisolutions.co.uk/track?type=click=|||hXXp:// tivvtter.com/r1?zcms
And on to the unverified, carefully selected domain. At first glance, this one almost looks like the twitter domain itself:

Do not enter your username and password at this site. Also, there are at least a half dozen other domains that look fairly close to "twitter.com", like this one. These guys are using all of them with the same page and graphics to tempt you into entering your credentials. This theft can be a risk if you re-use your passwords across accounts. Also, there is often other personal information within these twitter accounts, like the user's email address used to create the Twitter account. So please keep an eye out for this sort of play on word recognition-domains.

nod32 esed nod32 indir nod32

Microsoft investigating possible IE mouse-tracking flaw

All versions of the Web browser are vulnerable to flaw that allows attackers track cursor movements on the screen, a security researcher warns.

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

Inside Saudi Aramco with 60 Minutes

64 bit nod32 esed nod32 4 nod32 esed nod32

Ancient apps crush newbies on iPhone ? 8 out of top-10 franchises are more than a year old

Many people still think the iPhone app market is a chaotic melee where hits are created and then vanish in an unpredictable way. In some ways, the opposite is true: the iPhone paid download chart is extraordinarily conservative, effectively frozen in time. The entertainment industry tends to be dominated by fresh product. On December 28th, seven out of the�top-10 movies in America were released within 10 days. The oldest was released 50 days earlier. Seven out of the�top-10 songs on�the Billboard 100 were released within the past 91 days. The NPD Group?s chart of the top-10 console games in November was ruled by brand new titles. But the mobile app market is the mesmerizing exception. Year after year, people expect

nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Acer president defends Windows 8, says consumers just need time to get used to it

Windows 8 has taken potshots from�MIT professors and drunk people�alike, but at least one Microsoft (MSFT) OEM thinks such criticism is largely overblown. In an interview with Digitimes, Acer�(2353) president�Jim Wong said that Windows 8 is actually a very good operating system that consumers will adapt to it given enough time. ?Windows 8 is a major milestone for 2012, but it is also a new system that consumers must learn and the learning process will prevent the operating system from taking off quickly,? Wong told Digitimes. ?However, many of the concerns and criticisms concerning Windows 8 have been rather unfair.? In particular, Wong praised Microsoft for taking risks and being boldly innovative with its new operating system, which he said

esed nod32 indir nod32 nod32 güncel key

Top Comments: The Problems with Facebook, Windows and Apple

Top Comments: The Problems with Facebook, Windows and AppleThe Problem with Windows 8


est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce

Over Time, Intruders Improvise, Adapt, Overcome

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

It's time to start patching the Human OS

http://www.flickr.com/photos/mikeygottawa/374910126/

Computers and mobile devices store, process and transfer highly valuable information. As a result, your organization most likely invests a great deal in protecting them.

Protect the end point and you protect the information. Humans also store, process and transfer information -- people are in many ways are nothing more than another operating system, the Human OS.

Yet if you compare how much organizations invest in securing their computers versus how much effort they put into teaching employees how to safeguard information, you would be stunned at the difference.

Tags: 

nod32 keyleri nod32 keyler nod32 key esed nod32 download

miniFlame aka SPE: "Elvis and his friends"

You can read our Full Technical Paper on SPE / miniFlame here.

In May 2012, a Kaspersky Lab investigation detected a new nation-state cyber-espionage malware, which we named "Flame". Our research also identified some distinguishing features of Flame�s modules. Based on those features, we discovered that in 2009, the first variant of the Stuxnet worm included a module that was created based on the Flame platform. This confirmed there was some form of collaboration between the groups that developed the Flame and Tilded (Stuxnet/Duqu) platforms.

A more in-depth research conducted in June 2012 resulted in the discovery of another nation state-sponsored and previously unknown malware which we named �Gauss�. Gauss used a modular structure resembling that of Flame, a similar code base and system for communicating with command-and-control (C&C) servers, as well as numerous other similarities to Flame.

In partnership with Symantec, ITU-IMPACT and CERT-Bund/BSI, we also published our analysis of the Flame Command and Control servers. The analysis showed that the code can understand several communication protocols to talk to different �clients� or malware:

  • OldProtocol
  • OldProtocolE
  • SignupProtocol
  • RedProtocol (mentioned but not implemented)

nod32 guncel key eset nod32 guncel key eset nod32 güncel key

A Targeted Attack Against The Syrian Ministry of Foreign Affairs

Several days ago, a number of leaked documents from the �Syrian Ministry of Foreign Affairs� were published on �Par:AnoIA�, a new wikileaks-style site managed by the Anonymous collective.

One of our users notified us of a suspicious document in the archive which is detected by our anti-malware products as Exploit.JS.Pdfka.ffw. He was also kind enough to send us a copy of the e-mail for analysis.

We�ve checked the e-mail, which contains a PDF file with an exploit (CVE-2010-0188, see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0188), a typical spear-phishing attack:

nod32 full indir nod32 full download full nod32 download est nod32 serial

Is Network Solutions Snatching Domain Names?

Numerous individuals have discovered that when they search for a domain name at Network Solutions, the domain register is automatically registering the name for Network Solutions.

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Review of Super Scratch Programming Adventure! Posted

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

Announcing Elevation of Privilege: The Threat Modeling Game

I have had the pleasure over the past few months to spend some time playing with an early rendition of " Elevation of Privilege: The Threat Modeling Game". According to Adam, "Elevation of Privilege is the easiest way to get started threat modeling".  I couldn't agree more. If you have a team that is new to the whole process of threat modeling, you will want to check it out. If you are at RSA this week, drop by the Microsoft booth and pick the game up for free. If you aren't, you can download it here.

EoP is a card game for 3-6 players. The deck contains 74 playing cards in 6 suits: one suit for each of the STRIDE threats (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service and Elevation of Privilege). Each card has a more specific threat on it.  You can see a short video on how to play and some more information about the game by checking our Adam's post here. In the end, it is a game that makes it possible to have more fun when thinking about threats. And that's a good thing.

Even more impressive is that they have released the game under Creative Commons Attribution license which gives you freedom to share, adapt and remix the game. So you if you feel you can improve up this, step up and let everyone know!!   

Congratulations to the SDL team at Microsoft for creating an innovative way to approach the concept of threat modeling.

esed nod32 keys est nod32 key esed nod32 serial

Turns out Snapchat, Poke videos don't actually disappear

Videos sent through Snapchat or Facebook's Poke app are supposed to vanish after several seconds -- yet they're still viewable if someone knows where to look.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

30 Aralık 2012 Pazar

Hackers target Westboro Baptist Church after Newtown threat

After church leaders announce plans to protest at site of school massacre, Anonymous posts the personal information for dozens of members of the extremist group, including names, e-mail addresses, and phone numbers.

nod32 esed nod32 indir nod32 nod32 güncel key

ZTE Grand S to shake up phablet world with 6.9mm profile and high-end specs

The Nubia Z5 isn?t the only feature-packed�smartphone ZTE plans to release. The company is preparing to show off its Grand S, a 6.9-millimeter thick smartphone with a 5-inch full-HD display and a 13-megapixel camera rear camera. ZTE claims the Grand S will be the world?s thinnest 5-inch smartphone. According to�UnwiredView the�ZTE Grand S is also rumored to have a�1.5 GHz quad-core Qualcomm Snapdragon S4 (APQ8064) processor, 2GB of RAM and a 2,500 mAh battery ? slightly larger than the Nubia Z5?s 2,300 mAh battery. ZTE plans to reveal the Grand S?s full specs and price at the Consumer Electronics Show in January. One thing is for sure, the company is embracing large-screened smartphones like no other. Aside from the Nubia

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Hashcat's GPU-accelerated Gauss encryption cracker

2012 was a year full of major security incidents: Flame, Shamoon, Flashback, Wiper, Gauss, and so on. As we are about to turn the page, many unsolved mysteries remain still. Perhaps the most interesting unsolved mysteries are related to the Gauss Trojan: the Palida Narrow font and the unknown encrypted payload.

Previously, we�ve published a blogpost about the encrypted payload hoping that the crypto community will take on the challenge and break the encryption scheme to reveal the true purpose of the mysterious malware.

nod32 key esed nod32 download nod32 serialleri

Google.ro and other RO domains, victims of a possible DNS hijacking attack

Earlier today, Softpedia reported that an Algerian hacker using the nickname MCA-CRB has managed to deface the Romanian sites of Google (google.ro) and Yahoo! (yahoo.ro).

Screenshot of the defaced Google.ro domain

When we found out about this incident we were pretty skeptical of these websites being hacked. A website as large as Google can be hacked, in theory, but it�s highly unlikely. We then noticed that both domains resolve to an IP address located in the Netherlands: 95.128.3.172 (server1.joomlapartner.nl) � so it rather looks like a DNS poisoning attack.

The question which remains unanswered up until now is where exactly the DNS spoofing/poisoning attack has happened.There are several possible scenarios here:

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

Coding Tip: Why you should always use well known SIDs over usernames for security groups

So have you ever tried to restrict access to your applications in a way so that you can maintain least privilege?

I do. All the time. And recently it blew up in my face, and I want to share my experience so others can learn from my failure.

Let me show you a faulty line of code:


if( principal.IsInRole( "Administrators" ) )

Seems rather harmless doesn't it? Can you spot the defect? Come on... its sitting right in the subject of this post.

Checking to see if the current user is in the "Administrators" group is a good idea. And using WindowsPrincipal is an appropriate way to do it. But you have to remember that not EVERYONE speaks English. In our particular case, we found a customer installed our product using English, but had a user with a French language pack. Guess what... the above code didn't work for them. Why? Because the local administrators group is actually "Administrateurs".

The fix is rather trivial:


SecurityIdentifier sid = new SecurityIdentifier( WellKnownSidType.BuiltinAdministratorsSid, null );
if (principal.IsInRole(sid))

By using the well known SID for the Administrators group, we ensure the check regardless of the name or language used.

Lesson learned the hard way for me. We have an entire new class of defect we are auditing for, which we have found in several places in our code. it always fails securely, NOT letting them do anything, but that's not the point. It is still a defect. Other accounts we weren't considering were "Network Service" (its an ugly name on a German target) and "Guest". Just to name a few.

Hope you can learn from my mistake on that one. That's a silly but common error you may or may not be considering in your own code.

64 bit nod32 esed nod32 4 nod32 esed nod32

Windows Phone Store doubled in size this year

Windows Phone has had a difficult time battling Android and iOS in the mobile space this year thanks to a glaring lack of apps. Unfortunately for Microsoft (MSFT), its Windows Phone Store�falls short compared to Apple?s (AAPL) App Store, Google?s (GOOG) Play Store and even the�Amazon�Appstore. Microsoft is gaining ground, however, as the company revealed earlier this week that it published more than 75,000 new apps and games to its Windows Phone Store this year alone, more than doubling the catalog?s size. To put that figure in perspective, Google and Apple boast more than 700,000 apps in their respective stores, and Research in Motion (RIMM) will look to start strong with more than 70,000 apps promised for the release of

nod32 turkce nod32 full indir nod32 full download full nod32 download

RIM offloads NewBay at a huge loss in quest for cash

Following reports that Research In Motion (RIMM) was looking to scrounge up cash by offloading som ?minor assets,? the company has managed to sell�cloud-based service provider NewBay in a deal that was confirmed late Thursday, MarketWatch reports.�Synchronoss Technologies paid $55.5 million in cash for NewBay and its assets, about half the $100 million RIM spent last October to acquire the firm. If nothing else, the sale will help cover RIM?s $65 million payment to Nokia (NOK) related to the companies? recent patent settlement.

64 bit nod32 esed nod32 4 nod32

BoteAR: a �social botnet�? What are we talking about?

In information security, talk about botnets equals talk about malicious actions that materialize through criminal action. In essence, we think there is always a hostile attitude on the part of those who administer them. Please correct me colleagues, refute this if I'm wrong, but I think conceptually you agree with me.

BoteAR (developed in Argentina) adopts the concept of "social networks" although it seems, as yet, not fully materialized. It offers a conventional and manageable botnet via HTTP but uses the model of crimeware-as-a-service. Moreover, the author seems to adopt (maybe unknowingly) the business model of affiliate systems originating in Eastern Europe which are used to spread malware i.e. infect and get revenue for each node you infect.

So far nothing unusual, unfortunately we witness this kind of tactic every day. The striking thing about BoteAR though is that it tries to shield itself under a wrapper of security in an attempt to "fraternize" with its community.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

PlugX is becoming mature

Recently, a new Remote Administration Tool has been discovered that started appearing here and there in targeted attacks. This tool is �PlugX�. Researchers have even tracked someone suspected of creating that malware � one of the members of the Chinese hacking group NCPH, which is allegedly in the service of PLA. Among others, this group has been accused of attacking high-profile US organizations.

But PlugX has been detected in targeted attacks not only against military, government or political organizations, but also against more or less ordinary companies. And this is quite a strange situation. No matter whether penetrators have been hired or they work for themselves, if they tend to attack �serious� organizations/persons how come we�ve also seen very different types of targets - absolutely peaceful companies � hit by the same group? We could not locate any site where this tool (or rather its kit or builder) has been offered for use, so we can�t confirm that PlugX has been shared between cybercriminal communities or other potential attackers (although we can�t deny that possibility).

On our side we have detected attacks using this infamous tool against a company which is far from military, politics, critical infrastructure and so on. This company has been bombarded for a month with spear-phishing emails with attachments containing exactly this PlugX program. The first samples were of the same type that had been already described, i.e. some sort of debug version with plenty of logging of potential errors in a bug.log file. But several days ago attackers sent a bunch of emails with a new version of PlugX. This version differs from the previous one in terms of logging activity. The virus writer has removed almost all the lines of code for processing potential errors that were present in the old version. The following awful picture represents where the logging function has been invoked in the old version of PlugX code:

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

PlugX is becoming mature

Recently, a new Remote Administration Tool has been discovered that started appearing here and there in targeted attacks. This tool is �PlugX�. Researchers have even tracked someone suspected of creating that malware � one of the members of the Chinese hacking group NCPH, which is allegedly in the service of PLA. Among others, this group has been accused of attacking high-profile US organizations.

But PlugX has been detected in targeted attacks not only against military, government or political organizations, but also against more or less ordinary companies. And this is quite a strange situation. No matter whether penetrators have been hired or they work for themselves, if they tend to attack �serious� organizations/persons how come we�ve also seen very different types of targets - absolutely peaceful companies � hit by the same group? We could not locate any site where this tool (or rather its kit or builder) has been offered for use, so we can�t confirm that PlugX has been shared between cybercriminal communities or other potential attackers (although we can�t deny that possibility).

On our side we have detected attacks using this infamous tool against a company which is far from military, politics, critical infrastructure and so on. This company has been bombarded for a month with spear-phishing emails with attachments containing exactly this PlugX program. The first samples were of the same type that had been already described, i.e. some sort of debug version with plenty of logging of potential errors in a bug.log file. But several days ago attackers sent a bunch of emails with a new version of PlugX. This version differs from the previous one in terms of logging activity. The virus writer has removed almost all the lines of code for processing potential errors that were present in the old version. The following awful picture represents where the logging function has been invoked in the old version of PlugX code:

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Exploit:Java/CVE-2012-4681.H

Exploit:Java/CVE-2012-4681.H identifies malicious Java Archive (JAR) files that exploit a known vulnerability.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Trojan-Downloader:OSX/Flashback.K

Trojan-Downloader:OSX/Flashback.K connects to a remote site to download its payload; on successful infection, the malware modifies targeted webpages displayed in the web browser.

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Passenger Hacks NYC Taxi Computer System

The problem is more significant than GPS objections, according to the software engineer who hacked the system.

nod32 full indir nod32 full download full nod32 download est nod32 serial

Commander's Reading List

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Narilam: A 'New' Destructive Malware Used In the Middle East

Several days ago, our colleagues from Symantec published an analysis of a new destructive malware reported in the Middle East. Dubbed �Narilam�, the malware appears to be designed to corrupt databases. The database structure naming indicates that targets are probably in Iran.

We have identified several samples related to this threat. All of them are ~1.5MB Windows PE executables, compiled with Borland C++ Builder. If we are to trust the compilation headers, they appear to have been created in 2009-2010, which means it might have been in the wild for a while:

The earliest known sample has a timestamp of �Thu Sep 03 19:21:05 2009�.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Apple tumbles to 10-month closing low

Shares of Apple (AAPL) tumbled during Friday?s session to end the day at a 10-month closing low, down 1.10% to $509.41. The stock is down a further 0.38% to $507.48�in after-hours trading, pushing it beneath�a low hit previously on December 14th.�Apple?s stock climbed to an all-time high of $705.07 only three months ago, just before the company?s record-breaking iPhone 5 launch. Fears that the company cannot maintain its unprecedented growth have since soured investor sentiment and the stock is down 27% since hitting its record high in September.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

Rogue:OSX/FakeMacDef.A

Dishonest antivirus software which tricks users into buying or installing it, usually by infecting a user's computer, or by pretending the computer is infected.

indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key

What to Do With Your New Android

What to Do With Your New AndroidSo you got a shiny new Android for Christmas? Before showing it off to all your Apple-loving friends, the device should be fully optimized at the start. Taking a couple measures ahead of time will make for a better experience later.


nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

29 Aralık 2012 Cumartesi

Backdoor:OSX/Olyx.C

Backdoor:OSX/Olyx.C connects to a remote server to receive further instructions, without the knowledge or permission from the user.

güncel key nod32 full nod32 esed nod32 keyleri

Backdoor:OSX/DevilRobber.A

Backdoor:OSX/DevilRobber.A silently installs applications related to Bitcoin-mining; it may also harvest data from the infected machine and listen for additional commands from a remote user.

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

Microsoft Updates November 2012 - IE, Kernel+Shell, and .NET Critical Patches

Microsoft is patching a fair number of vulnerabilities in their software with 19 flaws being fixed. All of them are being updated in six Bulletins this month (MS12-071 through MS12-076). Four of the Bulletins are rated critical with only two of them being rated urgent for immediate deployment by larger customers concerned with compatibility and performance. At the same time, Internet Explorer 10 is not vulnerable to exploitation by the related set of three flaws, and newly released Windows 8 is affected by yet another font parsing flaw described by CVE-2012-2897, similar to the vulnerability exploited by Duqu. The font malware is especially interesting because the Duqu exploit is currently being included in mass exploitation kits alongside widespread Java and Adobe Reader exploits to spread Ransomware, ZeroAccess, and other trojans of all sorts. Even though Duqu was spread years ago, the patch delivered months ago, the vulnerability continues to be included in the kits and successfully exploited.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

3 million Verizon accounts stolen - Q&A with the person claiming to be behind it

http://betanews.com/wp-content/uploads/2011/09/shutterstock_44185312-600x400.jpg

A report surfaced today that Verizon Wireless, a premier mobile carrier in the United States has been breached, with a result of three million customers being compromised. The good news is that the compromise does not seem to be malicious. The bad news is that, as proof of this, 300,000 users' data was released.

While the number may seem large, it represents a small fraction of the company's user base. Still, any customer information released into the wild is bad. So how did this happen and how bad is it?

Tags: 

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

Narilam: A 'New' Destructive Malware Used In the Middle East

Several days ago, our colleagues from Symantec published an analysis of a new destructive malware reported in the Middle East. Dubbed �Narilam�, the malware appears to be designed to corrupt databases. The database structure naming indicates that targets are probably in Iran.

We have identified several samples related to this threat. All of them are ~1.5MB Windows PE executables, compiled with Borland C++ Builder. If we are to trust the compilation headers, they appear to have been created in 2009-2010, which means it might have been in the wild for a while:

The earliest known sample has a timestamp of �Thu Sep 03 19:21:05 2009�.

esed nod32 key esed nod32 keys est nod32 key

The Value of Branding and Simplicity to Certifications

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

Microsoft SDL bans mempcy()... next it will be zeros!!!!

So recently Microsoft banned memcpy() from their SDL process, which got several of us talking about perf hits and the likes when using the replacement memcpy_s, especially since it has SAL mapped to it. For those that don't know, SAL is the "Standard Annotation Language" that allows programmers to explicitly state the contracts between params that are implicit in C/C++ code. I have to admit its sometimes hard to read SAL annotations, but it works extremely well to be able to help compilers know when things won't play nice. It is great for static code analysis of args in functions, which is why it works so sweet for things like memcpy_s()... as it will enforce checks for length between buffers.

Anyways, during the discussion Michael Howard said something that had me fall off my chair laughing. And I just had to share it with everyone, because I think it would make a great tshirt in the midst of this debate:

Oh, I'm thinking of banning zero's next - so we can no longer have DIV/0 bugs! Waddya think?

OK.. so its a Friday and that is funny to only a few of us. Still great fun though.

Have a great long weekend! (For you Canadian folks that is)

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

This Weird Crystal Demonstrates a New Magnetic Behavior that Works Like Magic

http://www.extremetech.com/wp-content/uploads/2012/12/quantum-spin-liquid-herbertsmithite-crystal-640x481.jpg

Researchers at MIT have discovered a new state of matter with a new kind of magnetism. This new state, called a quantum spin liquid (QSL), could lead to significant advances in data storage. QSLs also exhibit a quantum phenomenon called long-range entanglement, which could lead to new types of communications systems, and more.

Tags: 

est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce

Backdoor:OSX/Tsunami.A

Backdoor:OSX/Tsunami.A is a distributed denial-of-service (DDoS) flooder that is also capable of downloading files and executing shell commands in an infected system.

esed nod32 serial esed nod32 antivirus nod32 turkce

PlugX is becoming mature

Recently, a new Remote Administration Tool has been discovered that started appearing here and there in targeted attacks. This tool is �PlugX�. Researchers have even tracked someone suspected of creating that malware � one of the members of the Chinese hacking group NCPH, which is allegedly in the service of PLA. Among others, this group has been accused of attacking high-profile US organizations.

But PlugX has been detected in targeted attacks not only against military, government or political organizations, but also against more or less ordinary companies. And this is quite a strange situation. No matter whether penetrators have been hired or they work for themselves, if they tend to attack �serious� organizations/persons how come we�ve also seen very different types of targets - absolutely peaceful companies � hit by the same group? We could not locate any site where this tool (or rather its kit or builder) has been offered for use, so we can�t confirm that PlugX has been shared between cybercriminal communities or other potential attackers (although we can�t deny that possibility).

On our side we have detected attacks using this infamous tool against a company which is far from military, politics, critical infrastructure and so on. This company has been bombarded for a month with spear-phishing emails with attachments containing exactly this PlugX program. The first samples were of the same type that had been already described, i.e. some sort of debug version with plenty of logging of potential errors in a bug.log file. But several days ago attackers sent a bunch of emails with a new version of PlugX. This version differs from the previous one in terms of logging activity. The virus writer has removed almost all the lines of code for processing potential errors that were present in the old version. The following awful picture represents where the logging function has been invoked in the old version of PlugX code:

nod32 full indir nod32 full download full nod32 download est nod32 serial

Reflecting on our Windows 7 birthday party

So this week my buddy Charlie and I threw a Windows 7 party for the IT pro community in Vancouver, BC at the Microsoft office.

The office could only handle 80 people, and we simply had to turn people away. Sorry to those who weren't allowed to come. Many people came early, and hung out in the hallway even before they were allowed in.

With almost a 100 people in that hallway just out of the elevator, that hall was WARM. I felt bad for some of the people as you could tell they were overheating. But we weren't ready to let them in as we set up the rooms with different Windows 7 systems.

When we did open the doors it was a mad rush for everyone to get in where it was cooler and they could grab a cold one and cool down. Thankfully everyone was patient and polite. Thanks to everyone for that!

Once they got in, there were several different rooms that they could go hang out in. In one room, Charlie had brought a HP Media Touchsmart so people could experience the new multi touch functionality of Windows 7. Kerry Brown, a fellow MVP with experience in Windows shell, stayed in the room teaching people all the new shell features like Libraries, Jump Lists etc, and I am told schooled some admins on the nitty gritty of Power Shell. Good job Kerry! Thanks for helping out!!!

It was interesting as everytime I looked in that room, people were surrounded around the device playing with the TouchPack games and with Virtual Earth. It was interesting to hear my buddy Alan comment that his experience on his iPhone with multitouch, especially with Google Earth, was far superior to what he was seeing there. Maybe that is something Microsoft can take away from that. Of course, big difference on a 24 inch monitor and a small iPhone screen. But the point is well taken.

We had the biggest crowds when we did demos in the main presentation room. When I was presenting on DirectAccess security I had my good friend Roger Benes (a Microsoft FTE) demonstrate how Microsoft used DirectAccess themselves. Using the Microsoft guest wireless he connected seamlessly to Microsoft's corpnet, which allowed us to demonstrate the policy control and easy of use of the technology. I am told a lot of people enjoyed that session, with several taking that experience back to their own office to discuss deployment. Thats always good to hear.

Charlie impressed the crowd showing how to migrate from Windows XP and Vista to Windows 7. He demonstrated Windows Easy Transfer and Anytime Upgrades and took the time to explain the gotchas in the experience. He even had me demonstrate XP mode on my laptop so people could see how they could maintain application compatibility with a legacy Windows XP virtualized on Windows 7.

Of course, I had a lot of fun hanging out in the far back room. I got to demonstrate some of the security stuff built into Windows 7 like BitLocker, AppLocker and BitLocker to Go. I was even asked about Parental Controls which I couldn't show on my laptop since its domain joined, but was able to show on a demo box Roger had brought for people to play with.

Some of the more interesting things I helped facilitate was asking my buddy Alan to bring his Macbook in. He is a great photographer who works with Linux and OSX a fair bit, on top of using Windows. Actually, all the photos you see in this post were taken by him. Thanks for sharing them Alan!

Anyways, I convinced him to let us use his Macbook to install Windows 7. He reluctantly agreed, as you can see from the picture below when he was looking at the Snow Leopard and Windows 7 media together. :-)

We had a fair number of people crowd around his Macbook as he went through the process of installing Bootcamp and deploying Windows 7. Interestingly enough, it flawlessly converted that Apple hardware into a powerful Windows 7 system in about 20 minutes.

Charlie and I were REALLY busy. We had presented on different sessions in different rooms throughout the night. Actually, I very rarely even saw him except for a few times when he called me in to help out with a demo. Sorry we couldn't party more together Charlie. And my apologies to those that were looking forward to our traditional "Frick and Frack" show where we banter back and forth.

Many of you may not know that outside of computers, I am an avid indie filmmaker. Actually, that is giving me too much credit. I am an amateur cinematographer at best, who had high hopes that I would get a chance to film everyone's impressions throughout the party. Unfortunately, I was so busy presenting, I had almost NO TIME to get any film recorded. *sigh* Alan did get a snap of a rare moment when I actually caught someone on film.

Of course I can't complain too much. I had a great time getting to show all the neat features in Windows 7, and answering the tonnes of questions that people had.

Of course, when the night finally wound down, it was nice to close out the party and watch the Vancouver skyline change. When we were done, we had the opportunity to hang with our IT friends in Vancouver and bring in the birth of Windows 7.

I have several people I would like to thank for making the evening possible. Charlie and I couldn't have done it without the support of people like Graham from VanTUG, Jas from VanSBS and Roger from Microsoft. Speaking of Microsoft, I have to give a shout out to Sim, Sasha and Ljupco in the MVP team who helped us get through all the red tape to throw the party at Microsoft's office. And many thanks to Brent, Alan and Kerry for helping us out throughout the event. My thanks to all of you.

I hope everyone had a good time. And if anything, Charlie and I hope you learned something that will help you deploy and use Windows 7 in your organizations. Happy birthday Windows 7. Welcome to a new world without walls!

P.S. All the pictures you see here were taken by Alan and used with his permission. You can check out some of his other amazing work at bailwardphotography.com.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

Trojan:BASH/QHost.WB

Trojan:BASH/QHost.WB hijacks web traffic by modifying the hosts.

nod32 full download full nod32 download est nod32 serial 64 bit nod32

Rootkit:W32/ZAccess

Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additionaly advertising information.

esed nod32 key esed nod32 keys est nod32 key

Microsoft Updates November 2012 - IE, Kernel+Shell, and .NET Critical Patches

Microsoft is patching a fair number of vulnerabilities in their software with 19 flaws being fixed. All of them are being updated in six Bulletins this month (MS12-071 through MS12-076). Four of the Bulletins are rated critical with only two of them being rated urgent for immediate deployment by larger customers concerned with compatibility and performance. At the same time, Internet Explorer 10 is not vulnerable to exploitation by the related set of three flaws, and newly released Windows 8 is affected by yet another font parsing flaw described by CVE-2012-2897, similar to the vulnerability exploited by Duqu. The font malware is especially interesting because the Duqu exploit is currently being included in mass exploitation kits alongside widespread Java and Adobe Reader exploits to spread Ransomware, ZeroAccess, and other trojans of all sorts. Even though Duqu was spread years ago, the patch delivered months ago, the vulnerability continues to be included in the kits and successfully exploited.

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Carberp-in-the-Mobile

We previously wrote several times about Man-in-the-Mobile attacks which aim to steal mTANs sent via SMS. For a long time, only two families of such malware have been known: ZeuS-in-the-Mobile (ZitMo) and SpyEye-in-the-Mobile (SpitMo). ZitMo and SpitMo work together with their Windows �brothers�. Actually, without them, they would look like trivial SMS spy Trojans. It is necessary to mention that during the last two years such attacks have been observed only in some European countries like Spain, Italy, Germany, Poland and few others.

But when the mobile version of Carberp Trojan appeared (we detect it as Trojan-Spy.AndroidOS.Citmo, Carberp-in-the-Mobile) such attacks became real in Russia as well. There is no secret that online banking is becoming more and more popular in Russia; and banks are very active in promoting online banking with various authorization methods.

Carberp for Windows works in a similar way to the ZeuS Trojan. If a user tries to login into his online banking account using a machine infected by Carberp, the malware will modify the transaction so that user credentials are sent to a malicious server rather than a bank server.

In addition to the login and password, cybercriminals still need mTANs in order to confirm any money transfer operation from a stolen account. That is why one of the Carberp modifications (we call it Trojan-Spy.Win32.Carberp.ugu and we've added detection for it on 11th of December) alters the online banking web page on the fly, inviting the user to download and install an application which is allegedly necessary for logging into the system. And the user can get this link via SMS message by entering his phone number or by scanning a QR-code:

According to this screenshot, users of one of the most popular Russian banks, Sberbank, are under attack. �Sberbank� updated its web page on 12th of December with information about the attack. The link in the QR-code led to the fake �SberSafe� application (Trojan-Spy.AndroidOS.Citmo) which has been in Google Play since 30th of November.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Backdoor:OSX/Imuler.A

Backdoor:OSX/Imuler.A contacts a remote server for instructions; it may then steal files or capture a screenshot of the infected computer system, which is then forwarded to the remote server.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Malware in the Amazon App Store

Like many others, I took advantage of Amazon.com's sale and ordered a Kindle Fire HD last week. When I got around to exploring the Amazon App Store, it didn't take long before running into malware.

While searching for a particular benchmarking app I was presented with some additional apps. One of them immediately looked suspicious.

nod32 keyleri nod32 keyler nod32 key

28 Aralık 2012 Cuma

Microsoft investigating possible IE mouse-tracking flaw

All versions of the Web browser are vulnerable to flaw that allows attackers track cursor movements on the screen, a security researcher warns.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

WiFi study in Dubai

Why in Dubai? First, I was there recently.� Second,� Dubai has become one of the most important cities in the world for holding IT conferences. All statistics are based on around 3 thousand found WiFi access points.� Let�s begin with the channels Dubai�s WiFi is running on:

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

Announcing Elevation of Privilege: The Threat Modeling Game

I have had the pleasure over the past few months to spend some time playing with an early rendition of " Elevation of Privilege: The Threat Modeling Game". According to Adam, "Elevation of Privilege is the easiest way to get started threat modeling".  I couldn't agree more. If you have a team that is new to the whole process of threat modeling, you will want to check it out. If you are at RSA this week, drop by the Microsoft booth and pick the game up for free. If you aren't, you can download it here.

EoP is a card game for 3-6 players. The deck contains 74 playing cards in 6 suits: one suit for each of the STRIDE threats (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service and Elevation of Privilege). Each card has a more specific threat on it.  You can see a short video on how to play and some more information about the game by checking our Adam's post here. In the end, it is a game that makes it possible to have more fun when thinking about threats. And that's a good thing.

Even more impressive is that they have released the game under Creative Commons Attribution license which gives you freedom to share, adapt and remix the game. So you if you feel you can improve up this, step up and let everyone know!!   

Congratulations to the SDL team at Microsoft for creating an innovative way to approach the concept of threat modeling.

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Google Helping to Bring Santa to Chrome and to Your Phone

http://www.eweek.com/imagesvr_ce/1708/346x214googlemapsbldgs1.jpg

Google's Santa Tracker can help you keep track of the Big Man on his deliveries on Christmas Eve, and don't forget to use Google's cool Santa Call service, too.

Google Maps' Santa Tracker is ready to be used by Santa Claus fans around the world as they track his Christmas Eve trip that has him delivering toys and gifts to good children and to well-behaved techies.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Trojan-Downloader:OSX/Flashback.B

Trojan-Downloader:OSX/Flashback.B poses as a Flash Player installer, and connects to a remote host to obtain further installation configuration and files.

nod32 keyleri nod32 keyler nod32 key esed nod32 download

Trojan:Android/DroidKungFu.C

Trojan:Android/DroidKungFu.C forwards confidential details to a remote server.

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

Four security trends defined 2012, will impact 2013

Mobile and Mac malware burbles noxiously, data breaches and data mining will cause more havoc with your privacy, and the Web will continue to suffer the ignominy of poorly-written, Swiss-cheesed code as security experts predict lessons from 2012 go unlearned in 2013.

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

miniFlame aka SPE: "Elvis and his friends"

You can read our Full Technical Paper on SPE / miniFlame here.

In May 2012, a Kaspersky Lab investigation detected a new nation-state cyber-espionage malware, which we named "Flame". Our research also identified some distinguishing features of Flame�s modules. Based on those features, we discovered that in 2009, the first variant of the Stuxnet worm included a module that was created based on the Flame platform. This confirmed there was some form of collaboration between the groups that developed the Flame and Tilded (Stuxnet/Duqu) platforms.

A more in-depth research conducted in June 2012 resulted in the discovery of another nation state-sponsored and previously unknown malware which we named �Gauss�. Gauss used a modular structure resembling that of Flame, a similar code base and system for communicating with command-and-control (C&C) servers, as well as numerous other similarities to Flame.

In partnership with Symantec, ITU-IMPACT and CERT-Bund/BSI, we also published our analysis of the Flame Command and Control servers. The analysis showed that the code can understand several communication protocols to talk to different �clients� or malware:

  • OldProtocol
  • OldProtocolE
  • SignupProtocol
  • RedProtocol (mentioned but not implemented)

64 bit nod32 esed nod32 4 nod32

PlugX is becoming mature

Recently, a new Remote Administration Tool has been discovered that started appearing here and there in targeted attacks. This tool is �PlugX�. Researchers have even tracked someone suspected of creating that malware � one of the members of the Chinese hacking group NCPH, which is allegedly in the service of PLA. Among others, this group has been accused of attacking high-profile US organizations.

But PlugX has been detected in targeted attacks not only against military, government or political organizations, but also against more or less ordinary companies. And this is quite a strange situation. No matter whether penetrators have been hired or they work for themselves, if they tend to attack �serious� organizations/persons how come we�ve also seen very different types of targets - absolutely peaceful companies � hit by the same group? We could not locate any site where this tool (or rather its kit or builder) has been offered for use, so we can�t confirm that PlugX has been shared between cybercriminal communities or other potential attackers (although we can�t deny that possibility).

On our side we have detected attacks using this infamous tool against a company which is far from military, politics, critical infrastructure and so on. This company has been bombarded for a month with spear-phishing emails with attachments containing exactly this PlugX program. The first samples were of the same type that had been already described, i.e. some sort of debug version with plenty of logging of potential errors in a bug.log file. But several days ago attackers sent a bunch of emails with a new version of PlugX. This version differs from the previous one in terms of logging activity. The virus writer has removed almost all the lines of code for processing potential errors that were present in the old version. The following awful picture represents where the logging function has been invoked in the old version of PlugX code:

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Is Twittering safe?

So Susan has been on my case about Twitter for some time now. In a recent round table we were recording she "beat me up" about it, and tonight on IM we had a good discussion about the REAL vs PERCEIVED risks in Twitter.

Susan's biggest complaint is that security minded individuals shouldn't be blindly recommending the use of Twitter without educating the user on 'safe-twittering'. I would say that same logic exists for setting up web pages, blogs and the use of social networking sites like Facebook.

She stepped that up a bit tonight when she blogged her discomfort in the fact the RSA Conference was recommending Twitter as well.

So in an effort to stop spreading the FUD about Twitter insecurity, I wanted to share some of my thoughts through a quick set of safe twittering rules.

@DanaEpp's 5 Rules of Safer Twittering


  • Never share information in a tweet that you wouldn't share with the world. You can never expect to take it back once it's on the Internet. Even though you can delete a tweet, 3rd party clients may still have it archived. If you feel you want to share private thoughts through Twitter, consider using a "Private Account" and limited it to only people you trust and want to share with. Of course, remember nothing prevents your friends from sharing your tweets with the world. So never share private information on Twitter. Ever. it's just easier that way.
  • There is no assurance that a Twitter account is the person you believe it is. Deal with it. Anyone can register an account if it doesn't already exist. As a real world example, for some time @cnnbrk was NOT an official CNN account, even though most of the Twitter world thought it was. It wasn't until recently that CNN bought the account from James Cox (the account holder) for an undisclosed amount of money. Another example is the fact that one of Susan's Twitter accounts was actually created by a fellow SBS MVP, and not actually her. :-)
  • Never click on links in a tweet, unless you trust the URL. If unsure, don't click! The worms that were used to attack Twitter came from people getting users to go to profile pages etc that they had control over for some interesting script attacks. With only 140 chars, its common to "shorten" the URL. Which means you might be clicking on a link blind. That's fine. But only trust shortened URLs that can be previewed BEFORE you go to it. As an example, my recommendation is to use something like TinyURL. However, here is the trick. When you create a TinyURL, use the preview mode. As an example, if you want to send someone to my blog you can use http://tinyurl.com/silverstr to go directly. However, if you use http://preview.tinyurl.com/silverstr it will stop at TinyURL.com and let the user SEE the link before they actually get to it. That is much safer. If using TweetDeck, select TinyURL as the provider, and when it creates the shortened url, simply add "preview." in front of "tinyurl.com".
  • Use a 3rd party Twitter client instead of using the Twitter.com website directly. I am a fan of TweetDeck and Twitterfon, but there are tons of different clients out there. Why? It is the lesser of two security evils as it relates to web based attacks in Twitter. Most clients have ways to reduce or turn off linking, prevents the script attacks in profile viewing and generally is just an easier environment to stay protected in. Are these clients free of attack? Of course not. But its another layer of defense. Of course... you need to have trust in your client. But that's a story for another day ;-)
  • You never know who is following you. Remember that. As you use Twitter more and more, you never know who might be watching. I recently had someone who has been trying to get an interview with me who follows me on Twitter, knew where I was having coffee one day because of a tweet I wrote (and it's geotag) and ended up coming down to confront me with his resume. Which was inappropriate in my books. But my own fault. I wasn't too concerned.. but it definitely gave me pause when considering my daughter uses Twitter and could be as easily found. Nothing like the potential of being stalked. GeoTagging makes it way to easy to find you. Remember that.

Look, Twitter is addictive. Simple. Short. Fast. A great way to see the thoughts of others you might care about. Ultimately though... like any other Internet based technology it has the potential to be abused... and put you at risk. No different than websites or blogs.

So be careful. Follow these rules and enjoy the conversation!

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Understanding Responsible Disclosure of Threat Intelligence

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Phishing at the Top Level

Opinion: ICANN and overbearing governments are gearing up for a major expansion of the attack surface of the DNS.

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Nintendo?s Wii U wobbles as sales sink

According to Famitsu, Nintendo?s (NTDOY) portable 3DS console continued to see huge success during the week ahead of Christmas. It racked up sales of 433,000 units in Japan, up from 333,000 units in the prior week. But weirdly enough, the brand new and heavily promoted Wii U home console wobbled badly as its weekly sales slipped to 122,000 units from 130,000 units in the previous week. This may have been the biggest week in Japanese console market in 2012, so the stakes were high. To put Wii U performance in context, the old PSP portable console sold 58,000 units in Japan during the same week. It is not an encouraging sign that the more than half-decade old PSP (which was

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Trojan:Android/DroidKungFu.C

Trojan:Android/DroidKungFu.C forwards confidential details to a remote server.

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Exploit:W32/CVE-2010-0188.B

Exploit:W32/CVE-2010-0188.B identifies malicious PDF files downloaded by the Blackhole exploit kit that exploit a known vulnerability.

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

Samsung details Jelly Bean update with new features for original Galaxy Note

The�Galaxy S III�isn?t the only device getting new software features.�Samsung�(005930) confirmed on its website that the original Galaxy Note�will be updated to Android 4.1 Jelly Bean, which should mean it?ll run faster thanks to UI enhancements from ?Project Butter.?�Samsung-specific features including multi-window � �view for true multitasking, pop-up apps, photo frame mode, enhanced S Note and Google Now�will also be available in the ?Premium Suite? update. Essentially, the Galaxy Note will gain many of the features already available in the�Galaxy Note II. The company didn?t provide any firm details on when the update will be released, but it should be any day now.

esed nod32 indir nod32 serial nod32 güncel keyleri

Exploit:Java/Majava.B

Exploit:Java/Majava.B identifies malicious files that exploit vulnerabilities in the Java Runtime Environment (JRE).

64 bit nod32 esed nod32 4 nod32 esed nod32

UGNazi Hackers Seize Another Westboro Baptist Church Hate Account

http://img.gawkerassets.com/img/188vfulaiixqjjpg/original.jpg

The lunatic power-bigots at the WBC are down another Twitter account?and this time it belongs to its leader's son, Fred Phelps Jr. What's more surprising is that Cosmo the God?yep, that one?is claiming responsibility.

Like last time, the team at UGNazi is saying they've attained full control of a prominent WBC member's account in retaliation for the hate group's plans to picket Newtown victim funerals. They also posted a picture of an alleged email exchange between "church" members, suggesting the account was broken into through a password reset sent to a compromise email inbox.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

27 Aralık 2012 Perşembe

Using the Internet to catch traditional (non-cyber) criminals

It can happen to anyone�and when it does it usually catches everybody � the victim and his relatives � completely unprepared. I�m talking about kidnapping. Twice in my life I�ve been involved in helping the police track down and arrest gangs of kidnappers. The first case didn�t directly affect me or my family, but the second time a close friend of mine was kidnapped. And it turns out that our work in tackling cybercrime can also be useful to catch criminals who seem to have little connection with high-tech wrong-doing. The Internet is not just a tool for cybercrime � it is also often used to communicate with the families and friends of kidnap victims, especially to demand a ransom. When this happens, our work can be vital: evidence collected on the Internet as well, as the errors made by criminals, can help to track them down, identifying their location via their IP address.

nod32 full download full nod32 download est nod32 serial 64 bit nod32

Microsoft investigating possible IE mouse-tracking flaw

All versions of the Web browser are vulnerable to flaw that allows attackers track cursor movements on the screen, a security researcher warns.

esed nod32 keys est nod32 key esed nod32 serial

Stealing currency permits from the Government

Right after the Venezuelan presidential elections cybercriminals launched a new credential stealing malware joined by a social engineering campaign saying that supposedly the last election was a fraud. The name of the malicious file is �listas-fraude-electoral.pdf.exe� which is translates to �Fraud elections lists� and it spread via a fake Globovision Venezuelan news TV station. The mentioned malware is quite simple and it sets out to disable the UAC system, which allows the criminals to run administrative commands under restricted users accounts. C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

Exploit:W32/CVE-2010-0188.C

Summary
Exploit:W32/CVE-2010-0188.C identifies malicious PDF files downloaded by the Blackhole exploit kit that exploit a known vulnerability.

nod32 keyleri nod32 keyler nod32 key esed nod32 download

Facebook helps FBI take down $850M botnet crime ring

FBI credits the social-networking giant with helping take down the suspects behind one of the largest cybercrime hauls in history.

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

World of botnet cybercrime paying pretty well these days

http://www.flickr.com/photos/tom-b/5547908627/

The world of cybercrime is getting more specialized as an eco-sphere of helpers in running botnet operations has developed, according to one security researcher who spent over a year monitoring online forums and communities.

eset nod32 güncel key indir com nod32 nod32 keyleri

My Role in Information Warfare during the Yugoslav Wars

nod32 full indir nod32 full download full nod32 download est nod32 serial

Cyber predators lurking

They�re stalking, taking advantage of the anonymity offered by the Internet and using the most advanced techniques to deceive their victims. They pose a persistent threat. They are often very patient and have sometimes communicated with their victims over a number of days, weeks, months and sometimes for over a year before they finally arrange to meet with the young person. They are a new breed of predators.

nod32 esed nod32 indir nod32 nod32 güncel key

Application:W32/InstallCore

InstallCore is an advertising module that displayed targeted advertising material.

nod32 esed nod32 indir nod32 nod32 güncel key

Rootkit:W32/ZAccess

Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additional advertising information.

nod32 full download full nod32 download est nod32 serial

Spyware:Android/Flexispy.K

Spyware:Android/Flexispy.K is a commercially available monitoring program.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

HP 'pretexting' scandal ends with Wagner's sentencing

The former private investigator was sentenced to three months in prison and two years of supervisory release.

esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key

Apple still can?t build enough iPad minis

A common issue often presents itself when Apple (AAPL) launches new products: it can?t build them fast enough. We?ve seen it time and time again, most recently when Apple launched the iPhone 5 and 150,000 dedicated factory workers still couldn?t keep up with demand. Now, a report has surfaced claiming that Apple?s manufacturing partners in the Far East can?t build units fast enough to keep pace with Apple?s iPad mini orders. According to Digitimes? supply chain sources, Apple?s parts suppliers have prepared enough components to build between 10 million and 12 million iPad mini tablets in the fourth quarter to accomodate heavy demand. Apple?s manufacturing partners are only expected to ship 8 million assembled units, however. The report states that

nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Israeli Agents Steal Korean Tech for Chinese Customer

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Using the Internet to catch traditional (non-cyber) criminals

It can happen to anyone�and when it does it usually catches everybody � the victim and his relatives � completely unprepared. I�m talking about kidnapping. Twice in my life I�ve been involved in helping the police track down and arrest gangs of kidnappers. The first case didn�t directly affect me or my family, but the second time a close friend of mine was kidnapped. And it turns out that our work in tackling cybercrime can also be useful to catch criminals who seem to have little connection with high-tech wrong-doing. The Internet is not just a tool for cybercrime � it is also often used to communicate with the families and friends of kidnap victims, especially to demand a ransom. When this happens, our work can be vital: evidence collected on the Internet as well, as the errors made by criminals, can help to track them down, identifying their location via their IP address.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Samsung expects to ship more than half a billion phones in 2013

Samsung (005930) had a big year and despite some legal setbacks, the company saw record profits led by its mobile division. In 2012, Samsung became the world?s largest cell phone vendor with shipments estimated to have reached about 420 million units. According to the Korea Times, the company expects to ship 510 million phones in 2013, an increase of 20% over this year. More than half, or 390 million, of the devices are expected to be smartphones and the other 120 million units will be budget feature phones. Along with its popular line of Android-powered Galaxy smartphones, the company will ship devices powered by Microsoft?s (MSFT) Windows Phone 8 operating system and handsets running the new Tizen platform.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Where OS X security stands after a volatile 2012

http://cdn.arstechnica.net/wp-content/uploads/2012/12/apple-key.jpg

2012 was an "exciting" year for OS X security?at least if you're a security expert or researcher. There were plenty of events to keep people on their toes. Although Apple took some egg on the face for some of them, overall, the company came out ahead when it came down to keeping users safe.

At least that's the opinion of some security researchers who followed OS X developments throughout the year.

esed nod32 4 nod32 esed nod32 indir nod32