31 Ocak 2012 Salı

Trojan-Downloader:OSX/Flashback.C

Trojan-Downloader:OSX/Flashback.C poses as a Flash Player installer and connects to a remote host to obtain further installation files and configuration.

indir com nod32 nod32 keyleri nod32 keyler nod32 key

Supremes to Congress: Bring privacy law into 21st century

commentary The justices have ruled that GPS tracking requires a warrant. Now Congress needs to act to balance privacy and public safety regarding location data.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel

European Union overhauls data-privacy policies to protect consumers

The EU says that data protection for individuals will be drastically improved by not allowing companies to process sensitive data without the user's consent.

esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key

Brazilian cybercriminals? daily earnings - more than you?ll ever earn in a year!

��� How much do you earn per day? If we look at how much a cybercriminal from Brazil earns every day, we’ll understand why Brazil is one of the main sources of malware in the world. Brazilian cybercriminals really like to use short URLs to track infections and have their own stats. Here is the profile of one criminal using Bitly as a URL shortening service.

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

CVE-2012-0003 Exploit ITW

S. Korean handlers are slow to take down the publicly distributed malicious code exploiting CVE-2012-0003, a vulnerability patched in Microsoft's January 2012 patch release MS12-004. We have discussed with reporters that the code has been available since the 21st, and a site appears to have been publicly attacking very low numbers of Korean users over the past day or so. The site remains up at this time.

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download

Trojan:Android/YZHCSMS.A

Trojan:Android/YZHCSMS.A sends SMS/MMS messages to premium rate numbers, potentially incurring unexpected/unwanted usage charges.

nod32 keyler nod32 key esed nod32 download

Richmond cop's Twitter comment attacking Internet hackers draws anger, criticism

http://www.flickr.com/photos/xeni/3563657187/

A Richmond police officer is facing criticism and anger Monday for a Twitter comment he made about Internet hackers.

Angry posts on the Facebook pages of the Richmond Police Department and the Contra Costa Times are criticizing the officer for his Jan. 26 tweet about a hacker attack on the Ultimate Fighting Championship website.

nod32 keyleri nod32 keyler nod32 key esed nod32 download

National Public Radio Talks Chinese Digital Espionage

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

Mystery and mayhem surrounding MegaUpload (roundup)

Hackers down government and entertainment Web sites after piracy arrest of people including Kim DotCom connected with the hosting site.

eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri

The Mystery of Duqu: Part Six (The Command and Control servers)

Over the past few weeks, we have been busy researching the Command and Control infrastructure used by Duqu.

It is now a well-known fact that the original Duqu samples were using a C&C server in India, located at an ISP called Webwerks. Since then, another Duqu C&C server has been discovered which was hosted on a server at Combell Group Nv, in Belgium.

At Kaspersky Lab we have currently cataloged and identified over 12 different Duqu variants. These connect to the C&C server in India, to the one in Belgium, but also to other C&C servers, notably two servers in Vietnam and one in the Netherlands. Besides these, many other servers were used as part of the infrastructure, some of them used as main C&C proxies while others were used by the attackers to jump around the world and make tracing more difficult. Overall, we estimate there have been more than a dozen Duqu command and control servers active during the past three years.

Before going any further, let us say that we still do not know who is behind Duqu and Stuxnet. Although we have analyzed some of the servers, the attackers have covered their tracks quite effectively. On 20 October 2011 a major cleanup operation of the Duqu network was initiated. The attackers wiped every single server they had used as far back as 2009 - in India, Vietnam, Germany, the UK and so on. Nevertheless, despite the massive cleanup, we can shed some light on how the C&C network worked.

full nod32 download est nod32 serial 64 bit nod32

Time to party! Windows 7 is here!

It's only a few days away. The official launch of Windows 7 is here!

And of course, that means its time to party!!! You may have heard about the Windows 7 House Parties that are being thrown all around the world. Basically thousands of small groups of people are getting together to see what Windows 7 can do.

Personally, I thought we needed to do more. So fellow MVP and friend Charlie Russel and I decided we would throw our own party. But focused on IT pros and not the consumer angle. We plan to have a lot of fun, showing the cool features of Windows 7 for IT pros like BitLocker, AppLocker and DirectAccess. We plan to bring a bunch of laptops and show new shell extensions, Powershell, new multitouch features and basically sit around and enjoy hours of Q&A for those that haven't tried it yet. We are even planning on installing Windows 7 on a guest's Macbook to show how well it does using Bootcamp on Apple hardware and even on small netbooks.

I also wanted to send a message out to the Vancouver IT community to clear up some misconceptions. This is a party hosted by Charlie and myself. This is NOT a Microsoft event. Microsoft was gracious enough to let us use their facility and even sprung for some of the cost for pizza. However, they never planned this out. Nor did the local VanTUG and VanSBS groups.

Our party is an INVITATION ONLY event. Because we are limited in our own budget and constrained in where we could have the party... we only have enough room for 75 people. So we could only allow a certain number of our friends to come. Charlie and I decided the best way to handle this would be to simply invite who we wanted, and then open it to our friends at the local user groups on a first come, first served basis. This is why there is a cap on the registration on the event, and why it booked up so quickly.

I am hearing through the grapeline that there is a LOT of descent in the Vancouver IT community who feel that Microsoft, VanTUG and VanSBS did a poor job organizing this. >LET ME BE CLEAR. This is a personal party that Charlie and I organized. If you were lucky enough to get an invitation and registered, great. But if you didn't, don't take it out on Microsoft, the local usergroups or their leaders. It's not their fault!!!

We are using our own money and time to throw this party. Please be considerate and respect that we couldn't invite all of you. I am happy to see there is so much excitement about Windows 7 and that you wanted to party with us. And I am sorry if you feel it isn't fair that you didn't get invited. Please feel free to share your own Windows 7 experience, and host your own party. We may be the only IT pro party during the Windows 7 launch, but nothing says you can't have your own!

So party on. Welcome to a new world. Welcome to Windows 7!

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Trojan-Dropper:OSX/Revir.A

Trojan-Dropper:OSX/Revir.A drops a downloader component that downloads a backdoor program onto the system, while camouflaging its activity by opening a PDF file to distract the user.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

European Union overhauls data-privacy policies to protect consumers

The EU says that data protection for individuals will be drastically improved by not allowing companies to process sensitive data without the user's consent.

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Symantec tells customers to disable PCAnywhere

PCAnywhere customers should turn the remote connection software off until Symantec issues software to protect against potential attacks resulting from stolen source code.

nod32 full indir nod32 full download full nod32 download

The Zappos Breach and Textual Password Based Authentication

Following their major database breach, Zappos leadership is doing the right thing by what seems to be quickly and clearly communicating what data was accessed and what was not - there are no unexplained delays or confusion on their part about the event. It's like another Aurora moment in my book, when Google extraordinarily opened up about their breach while the other 30-odd Aurora-breached major corporations did the opposite, aggressively maintaining NDA's to hide their Aurora incidents and hide their heads in the sand. Zappos reset 24 million customers' passwords and emailed all of them about the problem last night.

eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri

RunAs Radio podcasts you might want to listen to

Hey guys. I noticed Twitter is a buzz with a few podcast interviews I did on RunAs Radio lately. I thought I will post the links for those of you who don't follow such tweets.

There were two interviews I did last month:

The first interview was discussion on free tools available for network monitoring and diagnostics. The second was some in depth discussion on using DirectAccess with Windows 7 and Windows Server 2008 R2. I do hope you find both interviews fun and useful.

Enjoy!

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

Upload at your own risk: Most cloud storage services offer no data guarantee (Digital Trends)

Digital Trends - It’s become increasingly clear that users who lost files due to the US government’s seizure of Megaupload will, most likely, never get their files back. First of all, Megaupload’s hosting company, Carpathia Hosting, will allegedly begin deleting files on Thursday due to non-payment by Megaupload. Second — and here’s the stickler — Megaupload never guaranteed that files stored on its servers would remain accessible to users in the first place.

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Researchers find smart meters could reveal favorite TV shows

Tests on smart meters made by German company Discovergy show that someone with network sniffing skills and equipment could determine what's been watched by looking at lighting display patterns.

nod32 guncel keyler nod32 guncel key güncel key nod32

DHS disputes memo on purported railway computer breach

Officials with the Department of Homeland Security and railroad industry say there was no targeted attack on a railway company.

esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key

30 Ocak 2012 Pazartesi

Monitoring-Tool:Android/SpyBubble.A

Monitoring-Tool:Android/SpyBubble.A is a commercially available tracking tool.

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

How Web giants store big - and we mean big - data

http://static.arstechnica.net/assets/2012/01/google-hdd-techs-4f1647b-intro-thum

Consider the tech it takes to back the search box on Google's home page: behind the algorithms, the cached search terms, and the other features that spring to life as you type in a query sits a data store that essentially contains a full-text snapshot of most of the Web. While you and thousands of other people are simultaneously submitting searches, that snapshot is constantly being updated with a firehose of changes.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Hacking Seen as Rising Risk With Car Electronics

http://farm4.staticflickr.com/3378/3333089193_e59ea8836c.jpg

Drivers can talk with each other via Bluetooth phone connections, ask their cars for directions and dial up satellite radio. The same cars use electronic components to signal the gas pedal to accelerate and control stability.

What increasingly worries scientists is that entertainment computers could be manipulated to tell the safety computers what to do.

nod32 full download full nod32 download est nod32 serial

Trojan-Dropper:OSX/Revir.B

Trojan-Dropper:OSX/Revir.B drops and executes a backdoor program onto the system, while camouflaging its activity by opening a JPG file to distract the user.

nod32 keyleri nod32 keyler nod32 key esed nod32 download

Worm:ACAD/Kenilfe.A

The worm is a malicious AutoCAD program that propagates via removable drives. It also attempts to download Visual Basic Scripts from remote servers, if certain conditions are met.

nod32 full download full nod32 download est nod32 serial 64 bit nod32

Megaupload case gets weirder with gun charges, flight risks, and an inflatable tank

http://www.flickr.com/photos/sunface13/1659901944/

Flight risks, firearms charges and an inflatable tank are just some of the latest wrinkles in the bizzare case of Megaupload founder Kim Dotcom. After his arrest, Dotcom's mansion received delivery of a full-size inflatable replica of a Russian T-72 tank, which is now parked in front of the "Dotcom Mansion" and is busy infuriating the upscale neighbors. The T-72 "Threat Decoy" is similar to those used by the military for field training and intelligence deception, manufactured by companies such as Inflatable Images in the US and Russia's Rusbal; each sells for thousands of dollars.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Businesses must do more to comply with cookie law says ICO

News in brief: Cookie law is not being taken seriously

(silicon.com - Security)

nod32 keyleri nod32 keyler nod32 key

Malicious MIDI files lead to rootkit malware

http://www.flickr.com/photos/collinmel/4174747024/

A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets' computer, warns Trend Micro.

The victims are lured to a malicious web page (http://images.{BLOCKED}p.com/mp.html), which hosts a specially crafted MIDI file and JavaScript.

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

The Mystery of Duqu: Part Six (The Command and Control servers)

Over the past few weeks, we have been busy researching the Command and Control infrastructure used by Duqu.

It is now a well-known fact that the original Duqu samples were using a C&C server in India, located at an ISP called Webwerks. Since then, another Duqu C&C server has been discovered which was hosted on a server at Combell Group Nv, in Belgium.

At Kaspersky Lab we have currently cataloged and identified over 12 different Duqu variants. These connect to the C&C server in India, to the one in Belgium, but also to other C&C servers, notably two servers in Vietnam and one in the Netherlands. Besides these, many other servers were used as part of the infrastructure, some of them used as main C&C proxies while others were used by the attackers to jump around the world and make tracing more difficult. Overall, we estimate there have been more than a dozen Duqu command and control servers active during the past three years.

Before going any further, let us say that we still do not know who is behind Duqu and Stuxnet. Although we have analyzed some of the servers, the attackers have covered their tracks quite effectively. On 20 October 2011 a major cleanup operation of the Duqu network was initiated. The attackers wiped every single server they had used as far back as 2009 - in India, Vietnam, Germany, the UK and so on. Nevertheless, despite the massive cleanup, we can shed some light on how the C&C network worked.

full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

Worm:W32/Downadup.gen

Worm:W32/Downadup.gen is a Generic Detection of Worm:W32/Downadup.

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Tim Cook: Apple does not turn a blind eye to supply chain problems

http://en.wikipedia.org/wiki/Tim_Cook

Apple CEO Tim Cook has fired back at reports into issues surrounding the company?s operations and partners in emerging markets, claiming that the company is not ignoring the problems.

As 9to5mac reports, Cook contacted company employees to set the record straight and reassure them that Apple is working to raise standards for its employees and partners across the world. The move comes in response to numerous media reports of poor working conditions and other problems, triggered by a New York Times investigation.

eset nod32 güncel key indir com nod32 nod32 keyleri

Rogue:W32/SystemTool

This detection identifies a malicious program, typically used to deceive users into purchasing a fake application.

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

EU overhauling data-privacy policies to protect consumers

The EU says that data protection for individuals will be drastically improved by not allowing companies to process sensitive data without the user's consent.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Does Android Malware Exist?

I’m often asked about the real danger of Android malware. This is a difficult question as it has many factors to consider, such as your location, your device, how many apps you install, and how reckless you are with the apps that you choose.

There are two common factions often at odds with each other. There is one side of the argument that states that the threat to Android is overblown, and that because the number of malicious samples discovered so far is so small in comparison with Windows malware, it’s insignificant. In fact when a company discloses their findings and they show any type of marked growth in this sector, they’re often accused of scaremongering to generate sales.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

Trojan:JS/Obfuscated.Gen

Trojan:JS/Obfuscated.Gen is a Generic Detection that identifies malicious HTML, Javascripts, PDF, or any scripting files that contain obfuscated code, which may be used by malware authors to evade antivirus signature detection, as well as making malicious scripts harder discover and analyze

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Trojan:W32/Yakes

Trojan:W32/Yakes variants attempt to connect to and download files from remote servers.

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download

Lab Matters - Cloudy with a chance of stolen data

Director of Kaspersky Lab's global research and analysis team Costin Raiu appears on Lab Matters to discuss the security ramifications of the growing dependence on cloud computing. The discussions center on the convenience of using consumer cloud services and some of the risks involved with outsourcing security to third-parties.

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

Inside a Congressional Hearing on Digital Threats

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Trojan-Spy:W32/Zbot.PUA

This type of trojan secretly installs spy programs and/or keylogger programs.

esed nod32 4 nod32 esed nod32

Backdoor:OSX/Imuler.A

Backdoor:OSX/Imuler.A contacts a remote server for instructions; it may then steal files or capture a screenshot of the infected computer system, which is then forwarded to the remote server.

full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

29 Ocak 2012 Pazar

Hawaiian politician backs away from Web dossier law

A state legislator who proposed requiring Internet providers to record every Web site their customers visited is now backing away from the idea.

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

The Mystery of Duqu: Part Six (The Command and Control servers)

Over the past few weeks, we have been busy researching the Command and Control infrastructure used by Duqu.

It is now a well-known fact that the original Duqu samples were using a C&C server in India, located at an ISP called Webwerks. Since then, another Duqu C&C server has been discovered which was hosted on a server at Combell Group Nv, in Belgium.

At Kaspersky Lab we have currently cataloged and identified over 12 different Duqu variants. These connect to the C&C server in India, to the one in Belgium, but also to other C&C servers, notably two servers in Vietnam and one in the Netherlands. Besides these, many other servers were used as part of the infrastructure, some of them used as main C&C proxies while others were used by the attackers to jump around the world and make tracing more difficult. Overall, we estimate there have been more than a dozen Duqu command and control servers active during the past three years.

Before going any further, let us say that we still do not know who is behind Duqu and Stuxnet. Although we have analyzed some of the servers, the attackers have covered their tracks quite effectively. On 20 October 2011 a major cleanup operation of the Duqu network was initiated. The attackers wiped every single server they had used as far back as 2009 - in India, Vietnam, Germany, the UK and so on. Nevertheless, despite the massive cleanup, we can shed some light on how the C&C network worked.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Peter Cochrane's Blog: Data protection - Who's sticking to the letter of the law?

Apparently, not central government...

(silicon.com - CIO Insights)

64 bit nod32 esed nod32 4 nod32

Trojan:Android/BaseBridge.A

Trojan:Android/BaseBridge.A forwards confidential details to a remote server.

full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

Mobile security app from McAfee hits 2.0

A new feature that lets you know what your apps are doing with your personal data, along with call and text message filtering, arrive in the second version of McAfee Mobile Security.

indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key

Malicious MIDI files lead to rootkit malware

http://www.flickr.com/photos/collinmel/4174747024/

A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets' computer, warns Trend Micro.

The victims are lured to a malicious web page (http://images.{BLOCKED}p.com/mp.html), which hosts a specially crafted MIDI file and JavaScript.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Teens migrating to Twitter � sometimes for privacy (AP)

AP - Teens don't tweet, will never tweet - too public, too many older users. Not cool.

indir nod32 nod32 güncel key nod32 guncel key

Computer Incident Response Team Organizational Survey, 2011

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Peter Cochrane's Blog: Data protection - Who's sticking to the letter of the law?

Apparently, not central government...

(silicon.com - CIO Insights)

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

Trojan:Android/YZHCSMS.A

Trojan:Android/YZHCSMS.A sends SMS/MMS messages to premium rate numbers, potentially incurring unexpected/unwanted usage charges.

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

Trojan-Downloader:OSX/Flashback.A

Trojan-Downloader:OSX/Flashback.A poses as a Flash Player installer, and connects to a remote host to obtain further installation configuration and files.

nod32 keyleri nod32 keyler nod32 key

Russia v China -- Sound Familiar?

est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce

6 security companies to watch

http://www.flickr.com/photos/chrisjones/3041586303/

This group of security companies includes several that want to capitalize on technology ideas that were originally devised to serve communities of special interest but could now take on a wider cybersecurity role. Fixmo, for example, has its roots in the National Security Agency where its mobile security makes it possible to run critical applications in sandboxes that are insulated from the rest of the machine, making them less likely to fall victim to malware that might have infected the device.

nod32 turkce nod32 full indir nod32 full download full nod32 download

Backdoor:W32/Spyrat.D

A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Facebook Security Phishing Attack In The Wild

At the time of writing there is a new Facebook phishing attack going on. It will not just try to steal your Facebook credentials; it will also try to steal credit card information and other important information such as security questions.

This Facebook phishing attack is pretty interesting because it does not just try to trick the victim into visiting a phishing website. It will reuse the stolen information and login to the compromised account and change both profile picture and name. The profile picture will be changed to the Facebook logo and the name will be translated to “Facebook Security” but containing special ascii characters replacing letters such as “a” “k” “S” and “t”.

Once an account is compromised it will also send out a message to all contacts of the compromised account. The message looks like this:

nod32 keyler nod32 key esed nod32 download

Dustin Webber Creates Network Security Monitoring with Siri

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

Trojan:W32/Trojan

This program performs a malicious action, either due to deliberate intent or to bugs in its programming. Malicious actions may vary from data tampering to disabling a computer system.

esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key

Lab Matters - Analyzing the Android security ecosystem

Kaspersky Lab security researcher Tim Armstrong looks at the security posture of the Android platform and discusses current and future threats to Android-powered devices.

nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri

28 Ocak 2012 Cumartesi

Backdoor:W32/Zxshell.A

Backdoor:W32/Zxshell.A is a DLL file with an exported function ("Install"), which is called to install the backdoor.

nod32 guncel key eset nod32 guncel key eset nod32 güncel key

Thousands of European cards blocked following payment processor breach

Several Eastern European banks have started notifying their customers in the beginning of last week that their cards have been blocked and will be replaced with new ones. Most of the banks did not give out any more details about what happened, and in many cases even failed to notify their customers prior to actually blocking their cards. Is it just another day in the payment processing business? Based on the rushed response from banks and the lack of information surrounding the case, I would say no.

It all started one week ago after the state-owned Romanian bank CEC Bank blocked ~17,000 cards in response to a security breach at one of VISA’s European payment processor.

The reaction of other banks followed soon. The Romanian branch of ING Bank also confirmed to have blocked compromised cards, but didn’t put out a number. They say they’ve only blocked a few cards, but are closely monitoring the situation.

A few days later, Serbian banks also started blocking thousands of cards for security reasons. Raiffeisen Bank, Komercijalna and Societe Generale confirm they have been informed by VISA about some of their customer’s cards being compromised. Very similar to what happened in Romania.

Rumors indicate the European branch of an electronic payment services provider, Euronet Worlwide, to be the source of this breach. This information has been going around Romanian business media (1, 2) - and though it hasn’t been confirmed officially, it would explain why customers from different banks in different countries were affected.

It’s very hard to assess the severity of this security breach, as the banks’ reaction to these events was very mixed. Some banks proceeded immediately to blocking and replacing all affected cads, while others decided to monitor the situation more closely.

Currently, it’s very hard to get a full picture of what is going on, but as it usually happens, these are unlikely to be isolated incidents. Actually, these stories could be just the tip of the iceberg. If you have recently received such a notification from your bank, we’d like to hear from you, especially if it’s outside Serbia and Romania.

Meanwhile, make sure to follow these 3 basic steps to make sure you don’t become a victim of credit card fraud:

  1. Check your statements as often as possible. Make sure all payments showing up are actually made by yourself. In case you suspect a fraudulent transaction, get in touch with your bank as soon as possible.
  2. Enable instant SMS notifications if your bank offers it. Some banks offer it for free, others charge for this option. No matter what, it’s worth it. You’ll be able to get instant reports of payments made with your cards.
  3. Make sure you keep most of your money in an account that has no card linked to it. Having to move money from an account to another on a weekly or monthly basis might seem annoying, but it can save you a great deal of pain in case your card gets compromised.

Last, but not least, we know it’s the holiday season and shopping is on everyone’s mind. So if you want to keep your money safe when doing online shopping, this insightful article we’ve put together is for you: Online shopping made safe and convenient.

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Microsoft's Kelihos botnet suspect says he's innocent

St. Petersburg, Russia-based Andrey N. Sabelnikov says he is "absolutely not guilty" of participating in the creation of the huge spam network that Microsoft shut down last September.

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

Mandiant Webinar Wednesday; Help Us Break a Record!

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Twitter to block tweets locally, not globally

Rather than blocking content worldwide, Twitter will now block tweets only in countries that have generated the complaints due to local restrictions.

full nod32 download est nod32 serial 64 bit nod32

Patch Tuesday December 2011

Microsoft finishes out this year of patching with a heavy release that's all over place. While techs were notified of an anticipated 14 bulletins, 13 were released for the month of December. Headline grabbing events and code are addressed in one of them, and while fewer are labelled "Critical", are they any less important?

Many speculative bits have been spilled on the group behind Stuxnet and its precursor Duqu, with our own researchers posting at least a half dozen Securelist writeups on Duqu findings alone. MS11-087 patches up the delivery vector for Duqu itself. This kernel mode vulnerability was publicly identified and confirmed at the beginning of November, but could well have been used quietly in attacks around the world for a year or more.

nod32 full indir nod32 full download full nod32 download est nod32 serial

Computer Incident Response Team Organizational Survey, 2011

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Peter Cochrane's Blog: Computer forensics - Why you're not so hard to track down

Forget fingerprints and DNA - digital sleuthing is on the up...

(silicon.com - CIO Insights)

nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri

The Zappos Breach and Textual Password Based Authentication

Following their major database breach, Zappos leadership is doing the right thing by what seems to be quickly and clearly communicating what data was accessed and what was not - there are no unexplained delays or confusion on their part about the event. It's like another Aurora moment in my book, when Google extraordinarily opened up about their breach while the other 30-odd Aurora-breached major corporations did the opposite, aggressively maintaining NDA's to hide their Aurora incidents and hide their heads in the sand. Zappos reset 24 million customers' passwords and emailed all of them about the problem last night.

full nod32 download est nod32 serial 64 bit nod32

Backdoor:W32/Zxshell.A

Backdoor:W32/Zxshell.A is a DLL file with an exported function ("Install"), which is called to install the backdoor.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

Become a Hunter

64 bit nod32 esed nod32 4 nod32 esed nod32

Announcing Elevation of Privilege: The Threat Modeling Game

I have had the pleasure over the past few months to spend some time playing with an early rendition of " Elevation of Privilege: The Threat Modeling Game". According to Adam, "Elevation of Privilege is the easiest way to get started threat modeling".  I couldn't agree more. If you have a team that is new to the whole process of threat modeling, you will want to check it out. If you are at RSA this week, drop by the Microsoft booth and pick the game up for free. If you aren't, you can download it here.

EoP is a card game for 3-6 players. The deck contains 74 playing cards in 6 suits: one suit for each of the STRIDE threats (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service and Elevation of Privilege). Each card has a more specific threat on it.  You can see a short video on how to play and some more information about the game by checking our Adam's post here. In the end, it is a game that makes it possible to have more fun when thinking about threats. And that's a good thing.

Even more impressive is that they have released the game under Creative Commons Attribution license which gives you freedom to share, adapt and remix the game. So you if you feel you can improve up this, step up and let everyone know!!   

Congratulations to the SDL team at Microsoft for creating an innovative way to approach the concept of threat modeling.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

DHS disputes memo on purported railway computer breach

Officials with the Department of Homeland Security and railroad industry say there was no targeted attack on a railway company.

nod32 keyleri nod32 keyler nod32 key

Why DIARMF, "Continuous Monitoring," and other FISMA-isms Fail

nod32 full download full nod32 download est nod32 serial 64 bit nod32

Lab Matters - Java exploits percolate

In this webcast, Kurt Baumgartner talks about the rise of exploits against vulnerabilities in Oracle’s Java software. The discussion centers around the exploitation of Java vulnerabilities in exploit kits and the poor state of patching on the Windows platform.

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

National Public Radio Talks Chinese Digital Espionage

güncel key nod32 full nod32 esed nod32 keyleri

Hacker group Anonymous targets Mexican websites (Reuters)

Reuters - The activist hacker group Anonymous attacked three Mexican government websites on Friday in protest at a proposed bill that seeks to toughen local laws about online file-sharing.

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download

6 security companies to watch

http://www.flickr.com/photos/chrisjones/3041586303/

This group of security companies includes several that want to capitalize on technology ideas that were originally devised to serve communities of special interest but could now take on a wider cybersecurity role. Fixmo, for example, has its roots in the National Security Agency where its mobile security makes it possible to run critical applications in sandboxes that are insulated from the rest of the machine, making them less likely to fall victim to malware that might have infected the device.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

15 Killer Quotes From 'Sh*t People Say' Videos (Mashable)

Mashable - This meme is certainly making a strong case to be one of the biggest of 2012. Sure, the first episode of "Sh*t Girls Say" was uploaded at the end of last year, but who's counting really? The results that Google yields when you start typing "Sh*t People Say" are as far-ranging in quality as they are in topic.
SEE ALSO: 15 Best ‘Sh*t People Say’ Videos

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

27 Ocak 2012 Cuma

The Mystery of Duqu: Part Seven (Back to Stuxnet)

We have been studying the Duqu Trojan for two months now, exploring how it emerged, where it was distributed and how it operates. Despite the large volume of data obtained (most of which has yet to be published), we still lack the answer to the fundamental question - who is behind Duqu?

In addition, there are other issues, mostly to do with the creation of the Trojan, or rather the platform used to implement Duqu as well as Stuxnet.

In terms of architecture, the platform used to create Duqu and Stuxnet is the same. This is a driver file which loads a main module designed as an encrypted library. At the same time, there is a separate configuration file for the whole malicious complex and an encrypted block in the system registry that defines the location of the module being loaded and name of the process for injection.

This platform can be conventionally named as ‘Tilded’ as its authors are, for some reason, inclined to use file names which start with "~d".

We believe Duqu and Stuxnet were simultaneous projects supported by the same team of developers.

Several other details have been uncovered which suggest there was possibly at least one further spyware module based on the same platform in 2007-2008, and several other programs whose functionality was unclear between 2008 and 2010.

These facts significantly challenge the existing "official" history of Stuxnet. We will try to cover them in this publication, but let us first recap the story so far.

Continue reading

güncel key nod32 full nod32 esed nod32 keyleri

Come have Coffee and Code in Vancouver with me and Microsoft tomorrow

So John Bristowe, Developer Evangelist for Microsoft Canada will be hosting a Coffee and Code event in Vancouver tomorrow from 9 to 2 at Wicked Cafe. Come join him and fellow Microsoft peers Rodney Buike and Damir Bersinic as they sit and share their knowledge over a cup of joe.

I will be there too, and will be available if anyone wants to talk about secure coding, threat modeling with the SDL TM or if you want to talk about integrating AuthAnvil strong authentication into your own applications or architectures

I do hope to see some of you there. And if I don't... I will be seeing you at #energizeIT right?

What: Coffee and Code in Vancouver
When: April 8th, 2009 from 9am - 2pm
Where: Wicked Cafe - 861 Hornby Street (Vancouver)

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Trojan:SymbOS/ZeusMitmo.A

When installed on a mobile phone, this trojan monitors all incoming SMS messages and acts as a backdoor for receiving commands sent by an attacker via SMS messages.

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

Microsoft: Critical Vista Patch Coming

Microsoft plans to ship two patches on Jan. 8, 2008 to patch code execution vulnerabilities in its newest OS.

nod32 turkce nod32 full indir nod32 full download full nod32 download

Just Show Me: Great free to-do apps for your iPhone (Yahoo! News)

Yahoo! News - Welcome to Just Show Me on Tecca TV, where we show you tips and tricks for getting the most out of the gadgets in your life. In today's episode we'll show you two amazing to-do apps for your iPhone. In addition to the Reminders ?

64 bit nod32 esed nod32 4 nod32

Obama touts alternative energy despite Solyndra's demise

President avoids mentioning solar panel maker Solyndra's embarrassing collapse during his State of the Union address but nevertheless says it's time to "double down" on the idea.

nod32 keyleri nod32 keyler nod32 key esed nod32 download

Data protection: Nine things you should know about the new EU draft law

Legal Eye: Proposed law contains wide-ranging changes...

(silicon.com - CIO Insights)

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

European Parliament says its website taken offline by Anonymous

http://youranonnews.tumblr.com/

The European Parliament's website fell under a distributed denial-of-service attack (DDOS) on Thursday in what the organization classified as retaliation for the shutdown of the Megaupload file-sharing site and an anti-counterfeiting trade agreement.

The Parliament issued a statement saying it had acted to reduce the impact of the attacks, but the site was still down as of mid-afternoon Thursday.

esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key

Megaupload case gets weirder with gun charges, flight risks, and an inflatable tank

http://www.flickr.com/photos/sunface13/1659901944/

Flight risks, firearms charges and an inflatable tank are just some of the latest wrinkles in the bizzare case of Megaupload founder Kim Dotcom. After his arrest, Dotcom's mansion received delivery of a full-size inflatable replica of a Russian T-72 tank, which is now parked in front of the "Dotcom Mansion" and is busy infuriating the upscale neighbors. The T-72 "Threat Decoy" is similar to those used by the military for field training and intelligence deception, manufactured by companies such as Inflatable Images in the US and Russia's Rusbal; each sells for thousands of dollars.

esed nod32 keys est nod32 key esed nod32 serial

Student orders terrorism textbook on Amazon, gets $400 bag of cocaine as a bonus (Yahoo! News)

Yahoo! News - All Sophia Stockton wanted from Amazon was a textbook for one of her classes. Little did she know that it was going to be shipped to her with something extra on the side. Leafing through the pages of her new book, she ?

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Worm:W32/Morto.A

Worm:W32/Morto.A propagates through Remote Desktop Services on Windows servers by brute-forcing the login credentials of the server.

eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler

AirAsia blames 'IT issues' in price case

http://www.flickr.com/photos/junkeatyong/5776098760/

Asia's biggest budget carrier AirAsia said yesterday it has taken "corrective action" to resolve complaints in a lawsuit brought by Australian regulators over its online fare information.

The Malaysia-based airline, which flies international services out of Australia from the Gold Coast, Melbourne and Perth, with Sydney to be added from April, was named in documents lodged at the Federal Court in Melbourne.

nod32 keyleri nod32 keyler nod32 key esed nod32 download

Operation Ghost Click DNS servers to shut down in March

The DNSChanger malware servers that were converted by the FBI's Operation Ghost Click to function legitimately will be shut down in March, possibly leaving some systems unable to access the Internet.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Computer Coding: Not for Geeks Only

http://images.businessweek.com/cms/2012-01-26/tech_coding05__01__600.jpg

The Web-based backlash against the Stop Online Piracy Act, a bill aimed at taking down overseas distributors of copyrighted movies and music, was much like the Internet itself: decentralized, anarchic, and powerful enough to help persuade Senate Majority Leader Harry Reid (D-Nev.) to shelve the bill on Jan.�20. There was no official slogan for the public pushback against perceived government meddling with the Web, but the unofficial one might have been a headline that appeared on the online magazine Motherboard: ?Dear Congress, it?s no longer ok to not know how the Internet works.?

indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key

Trojan-Dropper:OSX/Revir.B

Trojan-Dropper:OSX/Revir.B drops and executes a backdoor program onto the system, while camouflaging its activity by opening a JPG file to distract the user.

indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key

Passenger Hacks NYC Taxi Computer System

The problem is more significant than GPS objections, according to the software engineer who hacked the system.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

Become a Hunter

eset nod32 güncel key indir com nod32 nod32 keyleri

Trojan-Downloader:W32/Kazy-17907

This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.

indir com nod32 nod32 keyleri nod32 keyler nod32 key

Trojan:Android/GinMaster.A

Trojan:Android/GinMaster.A steals confidential information from the device and sends it to a remote website.

nod32 keyler nod32 key esed nod32 download nod32 serialleri

26 Ocak 2012 Perşembe

Want to stop botnets overnight? Ban infected PCs from the net

Steve Ranger's Notebook: Why surfing on a virus-ridden PC is like sneezing in my face

(silicon.com - Security)

esed nod32 4 nod32 esed nod32 indir nod32

Lab Matters - The threat from P2P botnets

Kaspersky Lab malware researcher Tillmann Werner joins Ryan Naraine to talk about the threat from peer-to-peer botnets. The discussions range from botnet-takedown activities and the ongoing cat-and-mouse games to cope with the botnet menace.

est nod32 serial 64 bit nod32 esed nod32 4

Spam on the Run: Notorious Spammer on the Lam

An indictment charges Alan Ralsky with using illegal e-mail to promote Chinese stock pump-and-dump scheme.

eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler

MANDIANT Webinar Friday

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

MANDIANT Webinar Friday

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

Researchers find smart meters could reveal favorite TV shows

Tests on smart meters made by German company Discovergy show that someone with network sniffing skills and equipment could determine what's been watched by looking at lighting display patterns.

esed nod32 antivirus nod32 turkce nod32 full indir