29 Şubat 2012 Çarşamba
Malicious ads on security websites
Two Simple Steps to Take Control Over Google?s New Privacy Policy
Google?s new privacy policy takes effect Thursday. What?s new about it?
Now, it allows Google to integrate information it collects about you from all your Google accounts. So instead of treating your YouTube, Gmail and Google+ accounts as separate entities, Google now sees you as just one user. That should make it easier to target you with relevant ads.
nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key
Malicious ads on security websites
nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri
Lab Matters - The death of browser trust
In this webcast, Kaspersky Lab senior security researcher Roel Schouwenberg talks about the Diginotar certificate authority breach and the implications for trust on the Internet. Schouwenberg also provides a key suggestion for all major Web browser vendors.
eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri
iPad Release Event on March 7: What to Expect
Apple finally released an official invitation to the press regarding the much-anticipated launch of their newest iPad dubbed as iPad 3 on March 7.
Are Mobile Advertisers Getting Too Aggressive?
Many of the apps we enjoy are free. Well, to call them free is a bit misleading. You pay for the apps by looking at advertisements. This is a platform we should all recognize from the sidebar of Facebook, or Google, or almost any service that doesn’t charge a premium to use it. Advertising has paved the way for many services to gather a huge audience audience and still profit.
On Android and in many cases iOS, the advertisers have gotten very aggressive. They now collect all kinds of data through multiple forms of advertising. I’d like to take a look now at what you can expect.
esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download
Brazilian cybercriminals? daily earnings - more than you?ll ever earn in a year!
Rootkit:W32/Zxshell.B
Trojan:SymbOS/ZeusMitmo.A
nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32
Trojan-Spy:W32/Zbot.PUA
Malware increasingly using DNS as C&C channel to avoid detection
The number of malware threats that receive instructions from attackers through DNS is expected to increase, and most companies are not currently scanning for such activity on their networks, security experts said at the RSA Conference 2012 yesterday.
There are many channels that attackers use for communicating with their botnets, ranging from traditional ones like TCP, IRC and HTTP to more unusual ones like Twitter feeds, Facebook walls and even YouTube comments.
est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce
California AG Kamala Harris on app privacy deal (podcast)
Trojan-Downloader:OSX/Flashback.C
nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri
Worm:W32/Downadup.A
Worm:ACAD/Kenilfe.A
eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler
Worm:W32/Todon.I
Exploit:W32/MSWord6.Gen
nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32
Lab Matters - Cloudy with a chance of stolen data
Director of Kaspersky Lab's global research and analysis team Costin Raiu appears on Lab Matters to discuss the security ramifications of the growing dependence on cloud computing. The discussions center on the convenience of using consumer cloud services and some of the risks involved with outsourcing security to third-parties.
nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri
Trojan-Downloader:W32/KDV-176347
nod32 turkce nod32 full indir nod32 full download full nod32 download
28 Şubat 2012 Salı
WikiLeaks plans to release e-mails from security think tank
Are Mobile Advertisers Getting Too Aggressive?
Many of the apps we enjoy are free. Well, to call them free is a bit misleading. You pay for the apps by looking at advertisements. This is a platform we should all recognize from the sidebar of Facebook, or Google, or almost any service that doesn’t charge a premium to use it. Advertising has paved the way for many services to gather a huge audience audience and still profit.
On Android and in many cases iOS, the advertisers have gotten very aggressive. They now collect all kinds of data through multiple forms of advertising. I’d like to take a look now at what you can expect.
nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32
Trojan:Android/DroidKungFu.C
nod32 turkce nod32 full indir nod32 full download full nod32 download
Spyware:Android/Flexispy.K
güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32
Backdoor:W32/Knockex.A
Windows Security Phone Scam Now Targeting Sweden
Earlier today, I was sitting at home working on a Linux server that was compromised while suddenly, I hear my home phone ringing. Actually, someone has been calling me and just hanging up around the same time everyday for three or four days now. I thought that it was just some telemarketing company profiling me to figure out if I’m home or not, but this time it was different.
When I picked up the phone I heard this guy introducing him as a technician from the Windows Security Support Department. The connection was VERY bad and I could not hear everything he said, I don't know if this was intended or not.
When I started to talk to him he asked me in English with a indian accent if I had a computer at home, and of course I said “yes”. Then he started to explain that my computer had been compromised and that my firewall was just protecting me against external threats and not internal threats. At this time I knew that something strange was going on, and I started to ask more questions about the malware and trying to get more information about them, then at this point he immediately hung up the phone.
Just after he hung up I realized that this was one of those scams where they trick people to install Remote Access software to be able to control the machines. Once they got access to the machines, they install rootkits and obtain full access to your computer.
In the outside world, I this is quite an effective scam because they called me during the day, and I guess the people who are at home by this hour are not your average security researcher from Kaspersky Lab but maybe people who are sick, or the elderly.
I want to warn everyone about these scams, and at this time I can confirm that they are currently attacking Sweden. Previously, such scams appeared to target UK/US users mostly (http://money-watch.co.uk/8183/windows-support-scam-worsens), but it seems their business is expanding.
Please let us know if somebody calls you and claims they are from “Windows Security” (or such) and asks you to install remote access software. Most important of all, do not install the software which they recommend!
Trojan:Android/DroidKungFu.C
nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key
Yahoo seeking patent windfall from Facebook (AP)
eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler
Firms embrace Do Not Track for targeted ads only
Malware wallpaper calendars for 2012
As some of you may remember, during 2011 we published a malware calendar wallpaper for each month of the year.
We're doing so again this year, with updated information from 2011. However, we've decided to take a slightly different approach this year and publish all 12 wallpapers in one place. You can find them all here.
We hope you like this year's designs and find the data interesting.
nod32 key esed nod32 download nod32 serialleri esed nod32 indir
Other:W32/Generic
nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri
Oscar's most-TiVo'ed moments from Sunday telecast (Reuters)
The Top 10 Security Stories of 2011
Trojan-Spy:W32/Zbot.PUA
eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler
Trojan-Dropper:OSX/Revir.A
nod32 full indir nod32 full download full nod32 download est nod32 serial
27 Şubat 2012 Pazartesi
Hackers target prison system with latest defacement
The Top 10 Security Stories of 2011
nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri
Spam continues to dip but malware marches merrily on
nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler
Adobe Reader flaw leads to Windows attacks
News in brief: Adobe prepping patch...
(silicon.com - Security)
nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key
26 Şubat 2012 Pazar
Android security: Don't let 2012 become the year of the bad app
Beware the malware lurking on Android Market...
Critical TCP/IP Worm Hole Dings Windows Vista
güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key
Peter Cochrane's Blog: Data protection - Who's sticking to the letter of the law?
Apparently, not central government...
esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key
25 Şubat 2012 Cumartesi
Application:W32/Keygen
Microsoft: Google bypassed IE privacy settings too
nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key
Trojan:SymbOS/ZeusMitmo.A
Hedge fund nominates five for AOL board (Reuters)
esed nod32 key esed nod32 keys est nod32 key esed nod32 serial
The Mystery of Duqu: Part Seven (Back to Stuxnet)
We have been studying the Duqu Trojan for two months now, exploring how it emerged, where it was distributed and how it operates. Despite the large volume of data obtained (most of which has yet to be published), we still lack the answer to the fundamental question - who is behind Duqu?
In addition, there are other issues, mostly to do with the creation of the Trojan, or rather the platform used to implement Duqu as well as Stuxnet.
In terms of architecture, the platform used to create Duqu and Stuxnet is the same. This is a driver file which loads a main module designed as an encrypted library. At the same time, there is a separate configuration file for the whole malicious complex and an encrypted block in the system registry that defines the location of the module being loaded and name of the process for injection.
This platform can be conventionally named as ‘Tilded’ as its authors are, for some reason, inclined to use file names which start with "~d".
We believe Duqu and Stuxnet were simultaneous projects supported by the same team of developers.
Several other details have been uncovered which suggest there was possibly at least one further spyware module based on the same platform in 2007-2008, and several other programs whose functionality was unclear between 2008 and 2010.
These facts significantly challenge the existing "official" history of Stuxnet. We will try to cover them in this publication, but let us first recap the story so far.
Trojan:W32/Murofet.A
ASP.NET Holiday Patches
It's the end of 2011 as we know it, and Microsoft feels fine finishing out the year with a handful of out-of-band holiday patches. This round is important not because the vulnerabilities directly impact massive numbers of customers and their online behavior on Windows laptops, tablets, and workstations, but because ASP.NET maintains vulnerable code enabling easy DoS of hosting websites, authentication bypass techniques, and stealth redirections to other websites (most dangerously those sites hosting phish and hosting client side exploits and spyware). All of this could curdle your eggnog in the coldest of weather.
eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri
Trojan:JS/Obfuscated.Gen
nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler
Android security: Don't let 2012 become the year of the bad app
Beware the malware lurking on Android Market...
esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir
Code Testing Tools Could Be Acquisition Targets in '08
Exploit:W32/D-Encrypted.Gen
esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel
iOS 5.0.1 Flaw Allows Unatuhorized Access to Calls, Contacts
According to a recent report, iOS 5.0.1, released primarily to fix a bug affecting battery life has introduced another bug potentially compromising iPhone owners' privacy.
This newly discovered security flaw apparently allows unauthorised access to an iPhone, including the address book, call lists, and even allows intruders to make phone calls from the hacked iPhone. But before you start panicking - it's not very easy for a hacker to carry out and requires that they have access to your handset.
Kodak � and film � saying goodbye to the Oscars (AP)
eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler
24 Şubat 2012 Cuma
Poor ATM PIN codes give the bad guys a 1-in-11 chance at getting your money
Nearly 10 percent of four-digit ATM PIN codes used for banking purposes could be guessed by an opportunistic thief before the card is blocked, according to research carried out by Cambridge University.
güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32
Worm:W32/Downadup.A
Microsoft: Critical Vista Patch Coming
nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key
Kelihos/Hlux botnet returns with new techniques
It has been four months since Microsoft and Kaspersky Lab announced the disruption of Kelihos/Hlux botnet. The sinkholing method that was used has its advantages - it is possible to disable a botnet rather quickly without taking control over the infrastructure.However,as this particular case showed, it is not very effective if the botnet’s masters are still at large.
Not long after we disrupted Kehilos/Hlux, we came across new samples that seemed to be very similar to the initial version. After some investigation, we gathered all the differences between the two versions. This is a summary of our findings:
Let’s start with the lowest layer, the encryption and packing of Kelihos/Hlux messages in the communication protocol. For some reason, in the new version, the order of operations was changed. Here are the steps of processing an encrypted data for retrieving a job message which is organized as a tree structure:
№ | Old Hlux | New Hlux |
1 | Blowfish with key1 | Blowfish with new key1 |
2 | 3DES with key2 | Decompression with Zlib |
3 | Blowfish with key3 | 3DES with new key2 |
4 | Decompression with Zlib | Blowfish with new key3 |
Lab Matters - The threat from P2P botnets
Kaspersky Lab malware researcher Tillmann Werner joins Ryan Naraine to talk about the threat from peer-to-peer botnets. The discussions range from botnet-takedown activities and the ongoing cat-and-mouse games to cope with the botnet menace.
esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel
Two-pronged attack: Argentine site hit by malware and data leak
Trojan-Downloader:W32/Kazy-17907
full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys
iOS 5.0.1 Flaw Allows Unatuhorized Access to Calls, Contacts
According to a recent report, iOS 5.0.1, released primarily to fix a bug affecting battery life has introduced another bug potentially compromising iPhone owners' privacy.
This newly discovered security flaw apparently allows unauthorised access to an iPhone, including the address book, call lists, and even allows intruders to make phone calls from the hacked iPhone. But before you start panicking - it's not very easy for a hacker to carry out and requires that they have access to your handset.
güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32
Want to be found on Bing by your Facebook friends? Here's how
esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key
Backdoor:W32/Spyrat.D
Friday Poll: Will the Privacy Bill of Rights matter?
full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys
Passenger Hacks NYC Taxi Computer System
esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key
JotForm says domain suspended by feds
Is email about to be deleted? Five predictions for the technology's future
Medium of choice for business comms faces a number of threats...
Patch Tuesday February 2012
Microsoft is releasing 9 Security Bulletins this month (MS12-008 through MS12-016), patching a total 21 vulnerabilities. Some of these vulnerabilities may enable remote code execution (RCE) in limited circumstances, and offensive security researchers have claimed that a "bug" fixed this month should be client-side remote exploitable, but after months of public circulation, there have been no known working exploits.
The prioritized vulnerabilities patched this month exist in Internet Explorer, a specific version of the C runtime, and .NET framework. The Internet Explorer and .NET framework vulnerabilities may result in a potential drive-by exploits, so consumers and businesses alike should immediately install these patches - mass exploitation is likely to be delivered via COTS exploit packs like Blackhole and its ilk.
est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce
Other:W32/False Positive
eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri
Spam continues to dip but malware marches merrily on
nod32 full download full nod32 download est nod32 serial 64 bit nod32
IBM eyes cybersecurity market with new platform (Reuters)
23 Şubat 2012 Perşembe
Trojan-Downloader:OSX/Flashback.A
nod32 key esed nod32 download nod32 serialleri esed nod32 indir
Trojan:W32/Yakes
Backdoor:W32/Spyrat.D
esed nod32 key esed nod32 keys est nod32 key esed nod32 serial
The where and why of HLUX
This is not the first time the HLUX botnet has been mentioned in this blog, but there are still some unanswered questions that we’ve been receiving from the media: What is the botnet’s sphere of activity? What sort of commands does it receive from malicious users? How does the bot spread? How many infected computers are there in the botnet?
Before answering the questions it’s important to clarify that the HLUX botnet we previously disabled is still under control and the infected machines are not receiving commands from the C&C, so they’re not sending spam. Together with Microsoft’s Digital Crimes Unit, SurfNET and Kyrus Tech, Inc., Kaspersky Lab executed a sinkhole operation, which disabled the botnet and its backup infrastructure from the C&C.
The answers below refer to a new version of the HLUX botnet - it’s a different botnet but the malware being used is build using the same HLUX coding. Analysis of a new bot version for the HLUX botnet (md5: 010AC0BFF69EB945108B57B40A4784BE, size: 882176 B) revealed the following information.
Why?
As we already known, the bot distributes spam and has the ability to conduct DDoS attacks. In addition, we have discovered that:
- The bot is capable of infecting flash drives, creating a file on them called “Copy a Shortcut to google.Ink” in the same way Stuxnet did.
- The bot can search for configuration files for numerous FTP clients and transfer them to its command servers.
- The bot has a built-in Bitcoin wallet theft feature.
- The bot also includes a Bitcoin miner feature.
- The bot can operate in proxy server mode.
- The bot searches hard drives for files containing email addresses.
- The bot has a sniffer for intercepting email, FTP and HTTP session passwords.
Part of the HLUX code that interacts with FTP clients
Part of the HLUX code used to steal Bitcoin wallets
Where does it come from?
The bot is loaded onto users’ computers from numerous sites hosted on fast flux domains primarily in the .EU domain zone. The bot installs small downloaders (~47 KB) on the system. These downloaders have been detected on computers in the GBOT and Virut botnets. The downloaders can be loaded to computers within minutes of a machine being infected by the malware mentioned above (GBOT and Virut). This distribution method hinders the detection of the primary bot distribution source.
Bot installations have also been detected during drive-by attacks that make use of the Incognito exploit kit.
The number of computers in the new HLUX botnet is estimated to be tens of thousands, based on the numbers in the approximately 8000 IP addresses detected in operations conducted via P2P.
Where’s it going?
As before, the HLUX botnet primarily receives commands to distribute spam. However, another malicious program, which we wrote about here, is also being installed on the botnet. Its main functionality is fraudulent manipulation of search engines along the lines of TDSS.
The passwords harvested from FTP are used to place malicious Javascripts on websites that redirect users of the compromised sites once again to Incognito exploit kit. Exploits for the CVE-2011-3544 vulnerability are primarily used when the bot is installed during these attacks. In other words, HLUX implements a cyclical distribution scheme just like that used by Bredolab.
Summary
The HLUX botnet, both old and new, is a classic example of organized crime in action on the Internet. The owners of this botnet take part in just about every type of online scam going: sending spam, theft of passwords, manipulation of search engines, DDoS etc.
It is not uncommon for new versions of botnets to appear, and it’s one of the challenges we face in the IT security industry. We can neutralize botnet attacks and delay cyber criminal activities but ultimately the only way to take botnets down is to arrest and persecute the creators and groups operating them. This is a difficult task because security companies face different federal policies and legislation in various countries where botnets are located. This causes the law enforcement investigations and legal process to be a long and arduous process.
We’ll continue monitoring this particular botnet and keep you up to speed with any technical developments.
P.S. We noticed this on one fast flux domain that was earlier spreading HLUX:
It’s not yet clear whether this is the control panel of the HLUX botnet.
Toolbar:W32/MyGlobalSearch
nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri
A few reasons to love Spotify's new gapless playback and crossfade features (Digital Trends)
esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key
IBM eyes cybersecurity market with new platform (Reuters)
esed nod32 download nod32 serialleri esed nod32 indir nod32 serial
Critical TCP/IP Worm Hole Dings Windows Vista
Poor ATM PIN codes give the bad guys a 1-in-11 chance at getting your money
Nearly 10 percent of four-digit ATM PIN codes used for banking purposes could be guessed by an opportunistic thief before the card is blocked, according to research carried out by Cambridge University.
esed nod32 key esed nod32 keys est nod32 key esed nod32 serial
Worm:W32/Morto.A
full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys
Malware wallpaper calendars for 2012
As some of you may remember, during 2011 we published a malware calendar wallpaper for each month of the year.
We're doing so again this year, with updated information from 2011. However, we've decided to take a slightly different approach this year and publish all 12 wallpapers in one place. You can find them all here.
We hope you like this year's designs and find the data interesting.
Rogue:W32/SystemTool
nod32 full download full nod32 download est nod32 serial 64 bit nod32
Rootkit:W32/Zxshell.B
nod32 full indir nod32 full download full nod32 download est nod32 serial
Trojan-Downloader:W32/Kazy-17907
Trojan-Spy:W32/Zbot.PUA
esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir
More Bad Drivers on the Information Superhighway
nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler
22 Şubat 2012 Çarşamba
What do Path's privacy violations mean for Android?
Exploit:W32/MSWord6.Gen
Receive pop-up alerts with the Powow: Text Messaging Android app (Appolicious)
Trojan:W32/AntiAV
indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key
Critical TCP/IP Worm Hole Dings Windows Vista
full nod32 download est nod32 serial 64 bit nod32 esed nod32 4
Exploit:W32/PDF-Payload.Gen
esed nod32 key esed nod32 keys est nod32 key esed nod32 serial
Trojan:W32/Yakes
nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32
RunAs Radio podcasts you might want to listen to
Hey guys. I noticed Twitter is a buzz with a few podcast interviews I did on RunAs Radio lately. I thought I will post the links for those of you who don't follow such tweets.
There were two interviews I did last month:
The first interview was discussion on free tools available for network monitoring and diagnostics. The second was some in depth discussion on using DirectAccess with Windows 7 and Windows Server 2008 R2. I do hope you find both interviews fun and useful.
Enjoy!
China Telecom to start selling Apple's iPhone 4S
China Telecom said on Tuesday it will begin selling the iPhone 4S on March 9, making it the second carrier in the country to officially sell Apple's popular smartphone.
The agreement opens up sales of Apple's newest iPhone to China Telecom's 129 million mobile subscribers. Rival China Unicom had previously been the sole carrier of the iPhone in China. Analysts said this helped drive China Unicom's mobile subscriber growth. It now has 202.8 million users.
esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel
Visa criticizes the lackluster security measures for PayPal's new mobile payment platform
After months of trials with NFC-powered mobile payments, PayPal announced earlier this month that it would be abandoning the technology entirely. The company will instead be adopting a mobile payment system of its own, whose security measures are claimed to be unbeatable.
esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel
Apple iOS developers: We'll adjust to privacy change
nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri
Microsoft: Google bypassed IE privacy settings too
Trojan-Downloader:OSX/Flashback.B
nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32
Symantec pcAnywhere Remote Attack Code Surfaces
Code has been published that attackers could use to crash fully patched versions of pcAnywhere on any Windows PC, without first having to authenticate to the PC.