31 Ocak 2012 Salı
Trojan-Downloader:OSX/Flashback.C
Supremes to Congress: Bring privacy law into 21st century
European Union overhauls data-privacy policies to protect consumers
esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key
Brazilian cybercriminals? daily earnings - more than you?ll ever earn in a year!
esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus
CVE-2012-0003 Exploit ITW
S. Korean handlers are slow to take down the publicly distributed malicious code exploiting CVE-2012-0003, a vulnerability patched in Microsoft's January 2012 patch release MS12-004. We have discussed with reporters that the code has been available since the 21st, and a site appears to have been publicly attacking very low numbers of Korean users over the past day or so. The site remains up at this time.
esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download
Trojan:Android/YZHCSMS.A
Richmond cop's Twitter comment attacking Internet hackers draws anger, criticism
A Richmond police officer is facing criticism and anger Monday for a Twitter comment he made about Internet hackers.
Angry posts on the Facebook pages of the Richmond Police Department and the Contra Costa Times are criticizing the officer for his Jan. 26 tweet about a hacker attack on the Ultimate Fighting Championship website.
Mystery and mayhem surrounding MegaUpload (roundup)
eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri
The Mystery of Duqu: Part Six (The Command and Control servers)
Over the past few weeks, we have been busy researching the Command and Control infrastructure used by Duqu.
It is now a well-known fact that the original Duqu samples were using a C&C server in India, located at an ISP called Webwerks. Since then, another Duqu C&C server has been discovered which was hosted on a server at Combell Group Nv, in Belgium.
At Kaspersky Lab we have currently cataloged and identified over 12 different Duqu variants. These connect to the C&C server in India, to the one in Belgium, but also to other C&C servers, notably two servers in Vietnam and one in the Netherlands. Besides these, many other servers were used as part of the infrastructure, some of them used as main C&C proxies while others were used by the attackers to jump around the world and make tracing more difficult. Overall, we estimate there have been more than a dozen Duqu command and control servers active during the past three years.
Before going any further, let us say that we still do not know who is behind Duqu and Stuxnet. Although we have analyzed some of the servers, the attackers have covered their tracks quite effectively. On 20 October 2011 a major cleanup operation of the Duqu network was initiated. The attackers wiped every single server they had used as far back as 2009 - in India, Vietnam, Germany, the UK and so on. Nevertheless, despite the massive cleanup, we can shed some light on how the C&C network worked.
Time to party! Windows 7 is here!
It's only a few days away. The official launch of Windows 7 is here!
And of course, that means its time to party!!! You may have heard about the Windows 7 House Parties that are being thrown all around the world. Basically thousands of small groups of people are getting together to see what Windows 7 can do.
Personally, I thought we needed to do more. So fellow MVP and friend Charlie Russel and I decided we would throw our own party. But focused on IT pros and not the consumer angle. We plan to have a lot of fun, showing the cool features of Windows 7 for IT pros like BitLocker, AppLocker and DirectAccess. We plan to bring a bunch of laptops and show new shell extensions, Powershell, new multitouch features and basically sit around and enjoy hours of Q&A for those that haven't tried it yet. We are even planning on installing Windows 7 on a guest's Macbook to show how well it does using Bootcamp on Apple hardware and even on small netbooks.
I also wanted to send a message out to the Vancouver IT community to clear up some misconceptions. This is a party hosted by Charlie and myself. This is NOT a Microsoft event. Microsoft was gracious enough to let us use their facility and even sprung for some of the cost for pizza. However, they never planned this out. Nor did the local VanTUG and VanSBS groups.
Our party is an INVITATION ONLY event. Because we are limited in our own budget and constrained in where we could have the party... we only have enough room for 75 people. So we could only allow a certain number of our friends to come. Charlie and I decided the best way to handle this would be to simply invite who we wanted, and then open it to our friends at the local user groups on a first come, first served basis. This is why there is a cap on the registration on the event, and why it booked up so quickly.
I am hearing through the grapeline that there is a LOT of descent in the Vancouver IT community who feel that Microsoft, VanTUG and VanSBS did a poor job organizing this. >LET ME BE CLEAR. This is a personal party that Charlie and I organized. If you were lucky enough to get an invitation and registered, great. But if you didn't, don't take it out on Microsoft, the local usergroups or their leaders. It's not their fault!!!
We are using our own money and time to throw this party. Please be considerate and respect that we couldn't invite all of you. I am happy to see there is so much excitement about Windows 7 and that you wanted to party with us. And I am sorry if you feel it isn't fair that you didn't get invited. Please feel free to share your own Windows 7 experience, and host your own party. We may be the only IT pro party during the Windows 7 launch, but nothing says you can't have your own!
So party on. Welcome to a new world. Welcome to Windows 7!
nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler
Trojan-Dropper:OSX/Revir.A
nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key
European Union overhauls data-privacy policies to protect consumers
esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus
Symantec tells customers to disable PCAnywhere
The Zappos Breach and Textual Password Based Authentication
Following their major database breach, Zappos leadership is doing the right thing by what seems to be quickly and clearly communicating what data was accessed and what was not - there are no unexplained delays or confusion on their part about the event. It's like another Aurora moment in my book, when Google extraordinarily opened up about their breach while the other 30-odd Aurora-breached major corporations did the opposite, aggressively maintaining NDA's to hide their Aurora incidents and hide their heads in the sand. Zappos reset 24 million customers' passwords and emailed all of them about the problem last night.
eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri
RunAs Radio podcasts you might want to listen to
Hey guys. I noticed Twitter is a buzz with a few podcast interviews I did on RunAs Radio lately. I thought I will post the links for those of you who don't follow such tweets.
There were two interviews I did last month:
The first interview was discussion on free tools available for network monitoring and diagnostics. The second was some in depth discussion on using DirectAccess with Windows 7 and Windows Server 2008 R2. I do hope you find both interviews fun and useful.
Enjoy!
full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys
Upload at your own risk: Most cloud storage services offer no data guarantee (Digital Trends)
nod32 key esed nod32 download nod32 serialleri esed nod32 indir
Researchers find smart meters could reveal favorite TV shows
DHS disputes memo on purported railway computer breach
esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key
30 Ocak 2012 Pazartesi
Monitoring-Tool:Android/SpyBubble.A
nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri
How Web giants store big - and we mean big - data
Consider the tech it takes to back the search box on Google's home page: behind the algorithms, the cached search terms, and the other features that spring to life as you type in a query sits a data store that essentially contains a full-text snapshot of most of the Web. While you and thousands of other people are simultaneously submitting searches, that snapshot is constantly being updated with a firehose of changes.
esed nod32 key esed nod32 keys est nod32 key esed nod32 serial
Hacking Seen as Rising Risk With Car Electronics
Drivers can talk with each other via Bluetooth phone connections, ask their cars for directions and dial up satellite radio. The same cars use electronic components to signal the gas pedal to accelerate and control stability.
What increasingly worries scientists is that entertainment computers could be manipulated to tell the safety computers what to do.
Trojan-Dropper:OSX/Revir.B
Worm:ACAD/Kenilfe.A
nod32 full download full nod32 download est nod32 serial 64 bit nod32
Megaupload case gets weirder with gun charges, flight risks, and an inflatable tank
Flight risks, firearms charges and an inflatable tank are just some of the latest wrinkles in the bizzare case of Megaupload founder Kim Dotcom. After his arrest, Dotcom's mansion received delivery of a full-size inflatable replica of a Russian T-72 tank, which is now parked in front of the "Dotcom Mansion" and is busy infuriating the upscale neighbors. The T-72 "Threat Decoy" is similar to those used by the military for field training and intelligence deception, manufactured by companies such as Inflatable Images in the US and Russia's Rusbal; each sells for thousands of dollars.
esed nod32 key esed nod32 keys est nod32 key esed nod32 serial
Businesses must do more to comply with cookie law says ICO
News in brief: Cookie law is not being taken seriously
(silicon.com - Security)
Malicious MIDI files lead to rootkit malware
A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets' computer, warns Trend Micro.
The victims are lured to a malicious web page (http://images.{BLOCKED}p.com/mp.html), which hosts a specially crafted MIDI file and JavaScript.
full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys
The Mystery of Duqu: Part Six (The Command and Control servers)
Over the past few weeks, we have been busy researching the Command and Control infrastructure used by Duqu.
It is now a well-known fact that the original Duqu samples were using a C&C server in India, located at an ISP called Webwerks. Since then, another Duqu C&C server has been discovered which was hosted on a server at Combell Group Nv, in Belgium.
At Kaspersky Lab we have currently cataloged and identified over 12 different Duqu variants. These connect to the C&C server in India, to the one in Belgium, but also to other C&C servers, notably two servers in Vietnam and one in the Netherlands. Besides these, many other servers were used as part of the infrastructure, some of them used as main C&C proxies while others were used by the attackers to jump around the world and make tracing more difficult. Overall, we estimate there have been more than a dozen Duqu command and control servers active during the past three years.
Before going any further, let us say that we still do not know who is behind Duqu and Stuxnet. Although we have analyzed some of the servers, the attackers have covered their tracks quite effectively. On 20 October 2011 a major cleanup operation of the Duqu network was initiated. The attackers wiped every single server they had used as far back as 2009 - in India, Vietnam, Germany, the UK and so on. Nevertheless, despite the massive cleanup, we can shed some light on how the C&C network worked.
full nod32 download est nod32 serial 64 bit nod32 esed nod32 4
Worm:W32/Downadup.gen
esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel
Tim Cook: Apple does not turn a blind eye to supply chain problems
Apple CEO Tim Cook has fired back at reports into issues surrounding the company?s operations and partners in emerging markets, claiming that the company is not ignoring the problems.
As 9to5mac reports, Cook contacted company employees to set the record straight and reassure them that Apple is working to raise standards for its employees and partners across the world. The move comes in response to numerous media reports of poor working conditions and other problems, triggered by a New York Times investigation.
Rogue:W32/SystemTool
EU overhauling data-privacy policies to protect consumers
esed nod32 download nod32 serialleri esed nod32 indir nod32 serial
Does Android Malware Exist?
I’m often asked about the real danger of Android malware. This is a difficult question as it has many factors to consider, such as your location, your device, how many apps you install, and how reckless you are with the apps that you choose.
There are two common factions often at odds with each other. There is one side of the argument that states that the threat to Android is overblown, and that because the number of malicious samples discovered so far is so small in comparison with Windows malware, it’s insignificant. In fact when a company discloses their findings and they show any type of marked growth in this sector, they’re often accused of scaremongering to generate sales.
esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir
Trojan:JS/Obfuscated.Gen
Trojan:W32/Yakes
esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download
Lab Matters - Cloudy with a chance of stolen data
Director of Kaspersky Lab's global research and analysis team Costin Raiu appears on Lab Matters to discuss the security ramifications of the growing dependence on cloud computing. The discussions center on the convenience of using consumer cloud services and some of the risks involved with outsourcing security to third-parties.
full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys
Trojan-Spy:W32/Zbot.PUA
Backdoor:OSX/Imuler.A
full nod32 download est nod32 serial 64 bit nod32 esed nod32 4
29 Ocak 2012 Pazar
Hawaiian politician backs away from Web dossier law
nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key
The Mystery of Duqu: Part Six (The Command and Control servers)
Over the past few weeks, we have been busy researching the Command and Control infrastructure used by Duqu.
It is now a well-known fact that the original Duqu samples were using a C&C server in India, located at an ISP called Webwerks. Since then, another Duqu C&C server has been discovered which was hosted on a server at Combell Group Nv, in Belgium.
At Kaspersky Lab we have currently cataloged and identified over 12 different Duqu variants. These connect to the C&C server in India, to the one in Belgium, but also to other C&C servers, notably two servers in Vietnam and one in the Netherlands. Besides these, many other servers were used as part of the infrastructure, some of them used as main C&C proxies while others were used by the attackers to jump around the world and make tracing more difficult. Overall, we estimate there have been more than a dozen Duqu command and control servers active during the past three years.
Before going any further, let us say that we still do not know who is behind Duqu and Stuxnet. Although we have analyzed some of the servers, the attackers have covered their tracks quite effectively. On 20 October 2011 a major cleanup operation of the Duqu network was initiated. The attackers wiped every single server they had used as far back as 2009 - in India, Vietnam, Germany, the UK and so on. Nevertheless, despite the massive cleanup, we can shed some light on how the C&C network worked.
esed nod32 download nod32 serialleri esed nod32 indir nod32 serial
Trojan:Android/BaseBridge.A
full nod32 download est nod32 serial 64 bit nod32 esed nod32 4
Mobile security app from McAfee hits 2.0
indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key
Malicious MIDI files lead to rootkit malware
A Windows Media remote code execution flaw that has been patched in the last Patch Tuesday is being exploited by attackers in the wild to deliver malware to the targets' computer, warns Trend Micro.
The victims are lured to a malicious web page (http://images.{BLOCKED}p.com/mp.html), which hosts a specially crafted MIDI file and JavaScript.
esed nod32 key esed nod32 keys est nod32 key esed nod32 serial
Teens migrating to Twitter � sometimes for privacy (AP)
Peter Cochrane's Blog: Data protection - Who's sticking to the letter of the law?
Apparently, not central government...
Trojan:Android/YZHCSMS.A
full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys
Trojan-Downloader:OSX/Flashback.A
6 security companies to watch
This group of security companies includes several that want to capitalize on technology ideas that were originally devised to serve communities of special interest but could now take on a wider cybersecurity role. Fixmo, for example, has its roots in the National Security Agency where its mobile security makes it possible to run critical applications in sandboxes that are insulated from the rest of the machine, making them less likely to fall victim to malware that might have infected the device.
nod32 turkce nod32 full indir nod32 full download full nod32 download
Backdoor:W32/Spyrat.D
nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler
Facebook Security Phishing Attack In The Wild
At the time of writing there is a new Facebook phishing attack going on. It will not just try to steal your Facebook credentials; it will also try to steal credit card information and other important information such as security questions.
This Facebook phishing attack is pretty interesting because it does not just try to trick the victim into visiting a phishing website. It will reuse the stolen information and login to the compromised account and change both profile picture and name. The profile picture will be changed to the Facebook logo and the name will be translated to “Facebook Security” but containing special ascii characters replacing letters such as “a” “k” “S” and “t”.
Once an account is compromised it will also send out a message to all contacts of the compromised account. The message looks like this:
Trojan:W32/Trojan
esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key
Lab Matters - Analyzing the Android security ecosystem
Kaspersky Lab security researcher Tim Armstrong looks at the security posture of the Android platform and discusses current and future threats to Android-powered devices.
nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri
28 Ocak 2012 Cumartesi
Backdoor:W32/Zxshell.A
nod32 guncel key eset nod32 guncel key eset nod32 güncel key
Thousands of European cards blocked following payment processor breach
Several Eastern European banks have started notifying their customers in the beginning of last week that their cards have been blocked and will be replaced with new ones. Most of the banks did not give out any more details about what happened, and in many cases even failed to notify their customers prior to actually blocking their cards. Is it just another day in the payment processing business? Based on the rushed response from banks and the lack of information surrounding the case, I would say no.
It all started one week ago after the state-owned Romanian bank CEC Bank blocked ~17,000 cards in response to a security breach at one of VISA’s European payment processor.
The reaction of other banks followed soon. The Romanian branch of ING Bank also confirmed to have blocked compromised cards, but didn’t put out a number. They say they’ve only blocked a few cards, but are closely monitoring the situation.
A few days later, Serbian banks also started blocking thousands of cards for security reasons. Raiffeisen Bank, Komercijalna and Societe Generale confirm they have been informed by VISA about some of their customer’s cards being compromised. Very similar to what happened in Romania.
Rumors indicate the European branch of an electronic payment services provider, Euronet Worlwide, to be the source of this breach. This information has been going around Romanian business media (1, 2) - and though it hasn’t been confirmed officially, it would explain why customers from different banks in different countries were affected.
It’s very hard to assess the severity of this security breach, as the banks’ reaction to these events was very mixed. Some banks proceeded immediately to blocking and replacing all affected cads, while others decided to monitor the situation more closely.
Currently, it’s very hard to get a full picture of what is going on, but as it usually happens, these are unlikely to be isolated incidents. Actually, these stories could be just the tip of the iceberg. If you have recently received such a notification from your bank, we’d like to hear from you, especially if it’s outside Serbia and Romania.
Meanwhile, make sure to follow these 3 basic steps to make sure you don’t become a victim of credit card fraud:
- Check your statements as often as possible. Make sure all payments showing up are actually made by yourself. In case you suspect a fraudulent transaction, get in touch with your bank as soon as possible.
- Enable instant SMS notifications if your bank offers it. Some banks offer it for free, others charge for this option. No matter what, it’s worth it. You’ll be able to get instant reports of payments made with your cards.
- Make sure you keep most of your money in an account that has no card linked to it. Having to move money from an account to another on a weekly or monthly basis might seem annoying, but it can save you a great deal of pain in case your card gets compromised.
Last, but not least, we know it’s the holiday season and shopping is on everyone’s mind. So if you want to keep your money safe when doing online shopping, this insightful article we’ve put together is for you: Online shopping made safe and convenient.
esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus
Microsoft's Kelihos botnet suspect says he's innocent
nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32
Twitter to block tweets locally, not globally
Patch Tuesday December 2011
Microsoft finishes out this year of patching with a heavy release that's all over place. While techs were notified of an anticipated 14 bulletins, 13 were released for the month of December. Headline grabbing events and code are addressed in one of them, and while fewer are labelled "Critical", are they any less important?
Many speculative bits have been spilled on the group behind Stuxnet and its precursor Duqu, with our own researchers posting at least a half dozen Securelist writeups on Duqu findings alone. MS11-087 patches up the delivery vector for Duqu itself. This kernel mode vulnerability was publicly identified and confirmed at the beginning of November, but could well have been used quietly in attacks around the world for a year or more.
nod32 full indir nod32 full download full nod32 download est nod32 serial
Peter Cochrane's Blog: Computer forensics - Why you're not so hard to track down
Forget fingerprints and DNA - digital sleuthing is on the up...
nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri
The Zappos Breach and Textual Password Based Authentication
Following their major database breach, Zappos leadership is doing the right thing by what seems to be quickly and clearly communicating what data was accessed and what was not - there are no unexplained delays or confusion on their part about the event. It's like another Aurora moment in my book, when Google extraordinarily opened up about their breach while the other 30-odd Aurora-breached major corporations did the opposite, aggressively maintaining NDA's to hide their Aurora incidents and hide their heads in the sand. Zappos reset 24 million customers' passwords and emailed all of them about the problem last night.
Backdoor:W32/Zxshell.A
Announcing Elevation of Privilege: The Threat Modeling Game
I have had the pleasure over the past few months to spend some time playing with an early rendition of " Elevation of Privilege: The Threat Modeling Game". According to Adam, "Elevation of Privilege is the easiest way to get started threat modeling". I couldn't agree more. If you have a team that is new to the whole process of threat modeling, you will want to check it out. If you are at RSA this week, drop by the Microsoft booth and pick the game up for free. If you aren't, you can download it here.
EoP is a card game for 3-6 players. The deck contains 74 playing cards in 6 suits: one suit for each of the STRIDE threats (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service and Elevation of Privilege). Each card has a more specific threat on it. You can see a short video on how to play and some more information about the game by checking our Adam's post here. In the end, it is a game that makes it possible to have more fun when thinking about threats. And that's a good thing.
Even more impressive is that they have released the game under Creative Commons Attribution license which gives you freedom to share, adapt and remix the game. So you if you feel you can improve up this, step up and let everyone know!!
Congratulations to the SDL team at Microsoft for creating an innovative way to approach the concept of threat modeling.
esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir
DHS disputes memo on purported railway computer breach
Lab Matters - Java exploits percolate
In this webcast, Kurt Baumgartner talks about the rise of exploits against vulnerabilities in Oracle’s Java software. The discussion centers around the exploitation of Java vulnerabilities in exploit kits and the poor state of patching on the Windows platform.
nod32 key esed nod32 download nod32 serialleri esed nod32 indir
Hacker group Anonymous targets Mexican websites (Reuters)
esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download
6 security companies to watch
This group of security companies includes several that want to capitalize on technology ideas that were originally devised to serve communities of special interest but could now take on a wider cybersecurity role. Fixmo, for example, has its roots in the National Security Agency where its mobile security makes it possible to run critical applications in sandboxes that are insulated from the rest of the machine, making them less likely to fall victim to malware that might have infected the device.
esed nod32 download nod32 serialleri esed nod32 indir nod32 serial
15 Killer Quotes From 'Sh*t People Say' Videos (Mashable)
SEE ALSO: 15 Best ‘Sh*t People Say’ Videos
esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir
27 Ocak 2012 Cuma
The Mystery of Duqu: Part Seven (Back to Stuxnet)
We have been studying the Duqu Trojan for two months now, exploring how it emerged, where it was distributed and how it operates. Despite the large volume of data obtained (most of which has yet to be published), we still lack the answer to the fundamental question - who is behind Duqu?
In addition, there are other issues, mostly to do with the creation of the Trojan, or rather the platform used to implement Duqu as well as Stuxnet.
In terms of architecture, the platform used to create Duqu and Stuxnet is the same. This is a driver file which loads a main module designed as an encrypted library. At the same time, there is a separate configuration file for the whole malicious complex and an encrypted block in the system registry that defines the location of the module being loaded and name of the process for injection.
This platform can be conventionally named as ‘Tilded’ as its authors are, for some reason, inclined to use file names which start with "~d".
We believe Duqu and Stuxnet were simultaneous projects supported by the same team of developers.
Several other details have been uncovered which suggest there was possibly at least one further spyware module based on the same platform in 2007-2008, and several other programs whose functionality was unclear between 2008 and 2010.
These facts significantly challenge the existing "official" history of Stuxnet. We will try to cover them in this publication, but let us first recap the story so far.
Come have Coffee and Code in Vancouver with me and Microsoft tomorrow
So John Bristowe, Developer Evangelist for Microsoft Canada will be hosting a Coffee and Code event in Vancouver tomorrow from 9 to 2 at Wicked Cafe. Come join him and fellow Microsoft peers Rodney Buike and Damir Bersinic as they sit and share their knowledge over a cup of joe.
I will be there too, and will be available if anyone wants to talk about secure coding, threat modeling with the SDL TM or if you want to talk about integrating AuthAnvil strong authentication into your own applications or architectures
I do hope to see some of you there. And if I don't... I will be seeing you at #energizeIT right?
What: Coffee and Code in Vancouver
When: April 8th, 2009 from 9am - 2pm
Where: Wicked Cafe - 861 Hornby Street (Vancouver)
nod32 key esed nod32 download nod32 serialleri esed nod32 indir
Trojan:SymbOS/ZeusMitmo.A
nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri
Microsoft: Critical Vista Patch Coming
nod32 turkce nod32 full indir nod32 full download full nod32 download
Just Show Me: Great free to-do apps for your iPhone (Yahoo! News)
Obama touts alternative energy despite Solyndra's demise
Data protection: Nine things you should know about the new EU draft law
Legal Eye: Proposed law contains wide-ranging changes...
European Parliament says its website taken offline by Anonymous
The European Parliament's website fell under a distributed denial-of-service attack (DDOS) on Thursday in what the organization classified as retaliation for the shutdown of the Megaupload file-sharing site and an anti-counterfeiting trade agreement.
The Parliament issued a statement saying it had acted to reduce the impact of the attacks, but the site was still down as of mid-afternoon Thursday.
esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key
Megaupload case gets weirder with gun charges, flight risks, and an inflatable tank
Flight risks, firearms charges and an inflatable tank are just some of the latest wrinkles in the bizzare case of Megaupload founder Kim Dotcom. After his arrest, Dotcom's mansion received delivery of a full-size inflatable replica of a Russian T-72 tank, which is now parked in front of the "Dotcom Mansion" and is busy infuriating the upscale neighbors. The T-72 "Threat Decoy" is similar to those used by the military for field training and intelligence deception, manufactured by companies such as Inflatable Images in the US and Russia's Rusbal; each sells for thousands of dollars.
Student orders terrorism textbook on Amazon, gets $400 bag of cocaine as a bonus (Yahoo! News)
nod32 key esed nod32 download nod32 serialleri esed nod32 indir
Worm:W32/Morto.A
eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler
AirAsia blames 'IT issues' in price case
Asia's biggest budget carrier AirAsia said yesterday it has taken "corrective action" to resolve complaints in a lawsuit brought by Australian regulators over its online fare information.
The Malaysia-based airline, which flies international services out of Australia from the Gold Coast, Melbourne and Perth, with Sydney to be added from April, was named in documents lodged at the Federal Court in Melbourne.
Operation Ghost Click DNS servers to shut down in March
nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri
Computer Coding: Not for Geeks Only
The Web-based backlash against the Stop Online Piracy Act, a bill aimed at taking down overseas distributors of copyrighted movies and music, was much like the Internet itself: decentralized, anarchic, and powerful enough to help persuade Senate Majority Leader Harry Reid (D-Nev.) to shelve the bill on Jan.�20. There was no official slogan for the public pushback against perceived government meddling with the Web, but the unofficial one might have been a headline that appeared on the online magazine Motherboard: ?Dear Congress, it?s no longer ok to not know how the Internet works.?
indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key
Trojan-Dropper:OSX/Revir.B
indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key
Passenger Hacks NYC Taxi Computer System
Trojan-Downloader:W32/Kazy-17907
Trojan:Android/GinMaster.A
26 Ocak 2012 Perşembe
Want to stop botnets overnight? Ban infected PCs from the net
Steve Ranger's Notebook: Why surfing on a virus-ridden PC is like sneezing in my face
(silicon.com - Security)
Lab Matters - The threat from P2P botnets
Kaspersky Lab malware researcher Tillmann Werner joins Ryan Naraine to talk about the threat from peer-to-peer botnets. The discussions range from botnet-takedown activities and the ongoing cat-and-mouse games to cope with the botnet menace.
Spam on the Run: Notorious Spammer on the Lam
eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler