31 Mayıs 2012 Perşembe

Best Book Bejtlich Read in 2011

indir com nod32 nod32 keyleri nod32 keyler nod32 key

Packed:W32/PeCan.A

This program is packed using a packer program associated with numerous other malware.

esed nod32 indir nod32 serial nod32 güncel keyleri

Behind the 'Flame' malware spying on Mid-East computers (FAQ)

With possible ties to malware targeting Iran, the Flame spying software is seen as the latest cyber espionage attempt from a nation state.

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

Major Windows 7 gotcha you should know about that may block you from upgrading

OK, so anyone who knows me expects that I stay up on the bleeding edge when it comes to dev tools and operating systems. Yes, I have been using Windows 7 for almost a year now and have been loving it. However, I never ran it on my production dev environment as I felt I did not what to disrupt our software development workflow until Windows 7 was in final release. With it out to RTM now, I felt it was as good as time as any to migrate, especially since we recently released our latest build of our own product and have a bit of time to do this.

So last week I deployed Windows 7 to both of my production dev systems, as well as the primary QA lab workstations. It was the worst thing I could ever have done, halting all major development and test authoring in our office due to a MAJOR gotcha Microsoft failed to let us know about during the beta and RC.

Ready for this....

You cannot run Virtual PC 7 (beta) in Windows 7 WITHOUT hardware virtualization. OK, I can live with that, since the new XP mode (which is an excellent feature) may very well need it. That didn't concern me. It was my fall back that failed to work that blew my mind...

You cannot run Virtual PC 2007 in Windows 7, as they have a hard block preventing it from being installed on Windows 7 due to compatibility issues. So the same machine that I have been using for development using Vista for a few years has now become a glorified browsing brick. I cannot do any of my kernel mode and system level development or debugging as I am not ALLOWED to install Virtual PC 2007 on the same hardware that worked before. *sigh*

What surprised me is that Ben, the Virtual PC Guy at Microsoft blogged that it was possible to run Virtual PC on Windows 7, and in his own words:

While all the integration aspects of Virtual Machine Additions work (mouse integration, shared folders, etc...) there is no performance tuning for Windows 7 at this stage - so for best performance you should use a system with hardware vitalization support.

That sounds to me like it will still work without hardware virtualization. Seems that is not the case.

Since Windows 7 is already to RTM, if this is a block due to Windows, it isn't going to be fixed anytime soon. So hopefully they can do something in the Virtual PC side of the equation, or they are going to disappoint a lot of unknowing developers.

This just became a MAJOR blocking issue for many dev shops that are using Virtual PC for isolated testing.

If this concerns you, then I recommend you download Intel's Processor Identification Utility so you can check to see if your dev environment is capable of running hardware virtualization.

Failing to do so might get you stuck like I did, now having me decide if I want to degrade back to Windows Vista just to get work done. There goes another day to prep my main systems again. *sigh*

UPDATE: Fellow MVP Bill Grant has provided me a solution to my delimma. It appears the issue is because Virtual PC 7 (beta), a built in component for Windows 7 when installed, is causing the blocking issue. By going into "Turn Windows features on or off" and removing Virtual PC support (and effectively removing XP mode support), Virtual PC 2007 can then be installed on machines that do not have hardware virtualization support.

This isn't the most optimal behaviour, but acceptable. Since without VT support in my CPU I can't use XP mode anyways, removing it does not limit WIndows 7 from functioning. I have reported to Microsoft on this odd behaviour since:

  • Virtual PC 7 and XP Mode simply shouldn't be installing if my CPU isn't supported

  • When the Customer Experience dialog pops up there is an option to "Check for Solutions Online". This is a PERFECT time where they could explain to uninstall Virtual PC 7 and XP mode support built into Windows 7 so Virtual PC 2007 will not block. Right now it reports that no solution is available.

So if you do NOT have VT support in your CPU, please uninstall Virtual PC 7 support if you installed it. VPC 2007 will then properly install for you.

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32

Microsoft releases final test version of Windows 8

Microsoft is nearly done with a much-anticipated overhaul of its Windows operating system.

64 bit nod32 esed nod32 4 nod32 esed nod32

Exploit:Java/Blackhole

Exploit:Java/Blackhole identifies a Java class module used as part of an exploit kit known as Blackhole.

nod32 guncel keyler nod32 guncel key güncel key nod32

China's Sina Weibo intros code of conduct for social users

The microblogging service announced plans to launch a "user contract" earlier this month. It has now implemented it, according to a report.

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

Critical TCP/IP Worm Hole Dings Windows Vista

Microsoft has issued a high-priority security update to fix a pair of "critical" flaws that expose Windows users to remote code execution attacks.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Big Brother

It seems that development of the main module of SpyEye stopped with last autumn’s version 1.3.48 - and this is now

the dominant strain of SpyEye malware.

SpyEye distribution by versions for the period since 1 January 2012* * Others (7%) includes: 1.2.50, 1.2.58, 1.2.71, 1.2.80, 1.2.82, 1.2.93, 1.3.5, 1.3.9, 1.3.25, 1.3.26,

1.3.30, 1.3.32, 1.3.37, 1.3.41, 1.3.44.

But just because the authors are not developing this platform further, it doesn’t mean that SpyEye is no longer

getting new functions. The core code allows anyone to create and attach their own plugins (DLL libraries). I’ve been

analyzing SpyEye samples since the start of the year, and I’ve counted 35 different plugins. Below you can see a

table with those plugins and the corresponding number of samples in which they were included:

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Inside Facebook security: defending users from spammers, hackers, and 'likejackers'

http://www.flickr.com/photos/ivanwalsh/5078348654/

If Facebook were a country, it would be the third largest in the world, just behind India and China. And like any country, Facebook has a police force to keep things under control. 300 people have been entrusted with the responsibility of keeping a 900-million-person virtual society from itself and from external forces. How do you look after people who use the same username and password on every website and get "hacked"? What about "likejackers" determined to make people spam themselves over and over again?

esed nod32 download nod32 serialleri esed nod32 indir

Teledyne will acquire BlueView Technologies

Defense and aerospace industry supplier Teledyne Technologies Inc. said Thursday that a subsidiary will acquire BlueView Technologies Inc., a privately held company which makes high-resolution underwater acoustic imaging and measurement devices. No terms were disclosed.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

EU executive to take Berlin to court over data law

The European Union's executive body announced Thursday it is taking Germany to court for failing to implement a directive calling for anti-terrorism authorities to retain data on telephone calls and emails.

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

Trojan:W32/Ransomcrypt

Trojan:W32/Ransomcrypt is ransomware that encrypts files on the affected computer and demands payment in order to provide a password decrypting the affected files.

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32

MTV Movie Awards Go Social With Live Voting, Facebook Tracker and More

MTV's extensive social and digital tactics for the MTV Movie Awards offer viewers new ways to engage before, during and after the June 3 live broadcast.

esed nod32 download nod32 serialleri esed nod32 indir

More Bad Drivers on the Information Superhighway

Opinion: In order to prevent bad device drivers from making the system unstable, Microsoft artificially limits the amount of memory available to Windows.

64 bit nod32 esed nod32 4 nod32 esed nod32

Backdoor:W32/Knockex.A

A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.

nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri

NASA refutes Iranian cyberattack claims

http://en.wikipedia.org/wiki/NASA

NASA, the US space agency, has denied that its website had been hacked and information stolen by a band of Iranian students that called themselves the "Cyber Warriors Team."

The group bragged in a May 16 post on Pastebin that it had hacked a NASA site and stolen the personal information of thousands of NASA researchers. The site allegedly compromised is called the Solicitation and Proposal Integrated Review and Evaluation System.

esed nod32 4 nod32 esed nod32 indir nod32

I Want to Detect and Respond to Intruders But I Don't Know Where to Start!

indir nod32 nod32 güncel key nod32 guncel key

Review of SSH Mastery Posted

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

30 Mayıs 2012 Çarşamba

Carberp: it?s not over yet

On 20 March, Russian law enforcement agencies announced the arrest of a cybercriminal gang involved in stealing money using the Carberp Trojan. This is very good news, but unfortunately does not mark the end of the Carberp story.

Evidently, those arrested were just one of the criminal gangs using the Trojan. At the same time, those who actually developed Carberp are still at large, openly selling the Trojan on cybercriminal forums.

Here is a recent offer for the ‘multifunctional bankbot’, which appeared on 21 March:

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

Flame malware: So big, so overlooked

The most "complex malware ever found" -- Flame -- has taken the information security world by surprise. Given that it is said to have been around for years, how did everyone miss it?

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Facebook closes lower once again

After a brief reprieve in morning trading, Facebook's stock once again closed lower on Wednesday, nearly $10 below its initial public offering price.

nod32 turkce nod32 full indir nod32 full download

Sony considered download only for next-gen Playstation, will keep optical drive

Sony considered download only for next-gen Playstation, will keep optical driveSony considered removing the optical drive from its next-generation Playstation gaming console, The Wall Street Journal reported. The Japanese electronics maker decided against a download-only model, however, because ?Internet connectivity is too inconsistent around the world.? Removing the optical drive would have also hurt the adoption of�Blu-ray, which Sony heavily pushed with its Playstation 3. The next-generation PlayStation, codename Orbis, is rumored to launch during the holiday season of 2013. It has been reported that the system will feature an AMD x64 CPU and AMD Southern Islands GPU capable of running games at a resolution of 4,096 x 2,160 pixels.� Read


nod32 keyleri nod32 keyler nod32 key esed nod32 download

RSA Lays Off Security, Sales Staff

Layoffs are part of an ongoing restructuring across EMC caused by acquisitions that officials estimated in 2006 might ultimately claim 1,250 jobs.

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

Impressions: The Web Application Hacker's Handbook, 2nd Ed

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download

Mandiant Webinar Wednesday; Help Us Break a Record!

esed nod32 serial esed nod32 antivirus nod32 turkce

Inside Facebook security: defending users from spammers, hackers, and 'likejackers'

http://www.flickr.com/photos/ivanwalsh/5078348654/

If Facebook were a country, it would be the third largest in the world, just behind India and China. And like any country, Facebook has a police force to keep things under control. 300 people have been entrusted with the responsibility of keeping a 900-million-person virtual society from itself and from external forces. How do you look after people who use the same username and password on every website and get "hacked"? What about "likejackers" determined to make people spam themselves over and over again?

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Other:W32/Generic

Other:W32/Generic is a Generic Detection for a wide range of malicious programs, such as trojans, worms and keyloggers.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

Google, Samsung unveil new version of Chromebook

This product image provided by Google shows the newly released Chromebook laptop computer from Samsung. The Tuesday, May 29, 2012 release of the next-generation Chromebooks will give Google and Samsung another opportunity to persuade consumers and businesses to buy an unconventional computer instead of machines running on familiar software by industry pioneers Microsoft Corp. and Apple Inc. (AP Photo/Google)Google will try to win more converts to a computer operating system revolving around its popular Chrome Web browser with a new wave of lightweight laptops built by Samsung Electronics.


güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32

Blizzard Admits Accounts With Authenticators Have Been Hacked

http://www.cinemablend.com/images/sections/42909/diablo_3_42909.jpg

So, you know how there was this whole thing about having an official Blizzard authenticator meant you weren't going to get hacked? Well, turns out you can still get hacked even with an authenticator.�

Originally, Blizzard mentioned that accounts they investigated that had been hacked/infiltrated/compromised did not have authenticators attached beforehand. This led many in the forums to post rebuttals that most of the hacking occurring was due to player negligence and that they were not properly protecting themselves.�

nod32 guncel key güncel key nod32 full nod32

Flashfake Removal Tool and online-checking site

After intercepting one of the domain names used by the Flashback/Flashfake Mac Trojan and setting up a special sinkhole server last Friday, we managed to gather stats on the scale and geographic distribution of the related botnet. We published information on this in our previous blog entry.

We continued to intercept domain names after setting up the sinkhole server and we are currently still monitoring how big the botnet is. We have now recorded a total of 670,000 unique bots. Over the weekend (7-8 April) we saw a significant fall in the number of connected bots:

This doesn’t mean, however, that the botnet is shrinking rapidly - these are merely the numbers for the weekend.

Over the last few days our server has registered all the data sent by bots from the infected computers and recorded their UUIDs in a dedicated database. Based on this information we have set up an online resource where all users of Mac OS X can check if their computer has been infected by Flashback.

To find out if your computer is infected and what to do if it is, visit: flashbackcheck.com

Also users can check if they’re infected with Flashfake by using Kaspersky Lab’s free removal tool.

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Backdoor:W32/Spyrat.D

A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.

esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key

A gift from ZeuS for passengers of US Airways

Spam

On 20 March, we detected a spam campaign targeting passengers of US Airways. Almost the entire week cybercriminals were sending users the following email allegedly from US Airways:

There is a brief description of the check-in procedure and a confirmation code is provided for online reservation.

The criminals are obviously banking on any recipients flying on the flight mentioned in the email clicking on the link "Online reservation details".

Different emails contained different links - for example, we noticed the following domains: sulichat.hu, prakash.clanteam.com, panvelkarrealtors.com.

After clicking the link a series of redirects eventually leads to a domain hosting BlackHole Exploit Kit.

full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

Olympus to cut 2,500 jobs, sell equity stake: media

A man is seen next to an Olympus logo at an electronics shop in TokyoTOKYO (Reuters) - Japan's Olympus Corp, hit by a $1.7 billion fraud scandal, plans to shed 2,500 workers and sell an equity stake to either Sony Corp or Panasonic Corp in a bid to bolster its finances, local media reported Wednesday. Olympus, the world's leading maker of diagnostic endoscopes, is struggling to recover from an accounting fraud uncovered last year by its then CEO, Michael Woodford. It was forced to correct years of accounts, leaving its balance sheet badly weakened. ...


nod32 esed nod32 indir nod32

China's Sina Weibo intros code of conduct: No 'evil teachings'

Users of the microblogging service must not harm China's unity, speak unkindly of the country's constitution, promote rumors, or spread superstitions.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Trojan:Android/DroidKungFu.C

Trojan:Android/DroidKungFu.C forwards confidential details to a remote server.

nod32 keyler nod32 key esed nod32 download nod32 serialleri

Application:W32/InstallCore

InstallCore is an advertising module that displayed targeted advertising material.

esed nod32 4 nod32 esed nod32 indir nod32

Court says YouTube not obligated to control content

A Paris court dismissed a lawsuit against YouTube filed by French televisionA Paris court on Tuesday dismissed a lawsuit against YouTube filed by French television, saying the video-sharing website was not obligated to control content of uploaded material.


64 bit nod32 esed nod32 4 nod32

29 Mayıs 2012 Salı

HTC says phones pass U.S. customs review

TAIPEI (Reuters) - Smartphone maker HTC said on Wednesday its latest smartphones have passed a U.S. customs review, clearing the way for it to ramp up sales in the United States as it looks to turn around a decline in what was once its largest market. Earlier in May HTC had said that U.S. sales of two new smartphones, the HTC One X and HTC EVO 4G LTE, would be delayed due to a requirement for customs inspections after the Taiwanese company lost a patent dispute with Apple Inc . That news sent its shares tumbling on concerns over its ability to win back share in the U.S. market. ...

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

Adware:W32/ClickPotato.A

This program delivers advertising content to the user. It is usually annoying but harmless, unless it is combined with spyware or trackware.

eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri

Trojan:W32/Ransomcrypt

Trojan:W32/Ransomcrypt is ransomware that encrypts files on the affected computer and demands payment in order to provide a password decrypting the affected files.

esed nod32 4 nod32 esed nod32 indir nod32

Backdoor:OSX/Olyx.C

Backdoor:OSX/Olyx.C connects to a remote server to receive further instructions, without the knowledge or permission from the user.

est nod32 key esed nod32 serial esed nod32 antivirus

Impressions: The Tangled Web

indir com nod32 nod32 keyleri nod32 keyler nod32 key

Think twice before installing Chrome extensions

Since November 2011, according to recent statistics, Google Chrome has become the most popular browser in Brazil (more than 45% of the market share).

The same has is true for Facebook, which now is the most popular social network in Brazil, with a total of 42 million users, displacing Orkut.

These two facts are enough to motivate Brazil’s bad guys to turn their attentions to both platforms. This month we saw a huge wave of attacks targeting Brazilian users of Facebook, based on the distribution of malicious extensions. There are several themes used in these attacks, including “Change the color of your profile” and “Discover who visited your profile” and some bordering on social engineering such as “Learn how to remove the virus from your Facebook profile”:

1) Click on Install app, 2) Click on Allow or Continue, 3) Click on Install now, After doing these steps, close the browser and open again

This last one caught our attention not because it asks the user to install a malicious extension, but because the malicious extension it’s hosted at the official Google's Chrome Web Store. If the user clicks on “Install aplicativo” he will be redirected to the official store. The malicious extension presents itself as “Adobe Flash Player”:

eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri

Backdoor:OSX/Imuler.A

Backdoor:OSX/Imuler.A contacts a remote server for instructions; it may then steal files or capture a screenshot of the infected computer system, which is then forwarded to the remote server.

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32

Facebook extends post-IPO slump

People walk past a sign welcoming Facebook at the NASDAQ stock exchange in New YorkFacebook shares extended their slump Tuesday after a much-hyped public offering earlier this month, shedding more than seven percent as markets reopened following a US holiday weekend.


nod32 guncel keyler nod32 guncel key güncel key nod32

Instant View: RIM enlists JPMorgan, RBC in review, warns of loss

(Reuters) - Blackberry maker Research in Motion, which has steadily ceded market share to Apple Inc and Google Inc in the hotly contested smartphone arena, has hired JP Morgan and RBC Capital Markets to help review its struggling business. The company also said it expects to post an operating loss in the current quarter. Commentary: MARK MCKECHNIE, ANALYST, THINKEQUITY LLC "Clearly its a special situation stock. It's having trouble competing with Android and Apple for the No.3 place. "We're looking at this as a salvage, value type situation. ...

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

New cyberweapon discovered; Iranian computers hit

A massive, data-slurping cyberweapon is circulating in the Middle East, and computers in Iran appear to have been particularly affected, according to a Russian Internet security firm.

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download

Update to "DNSChanger - Cleaning Up 4 Million Infected Hosts"

The Fbi's "Operation Ghost Click" announcement in Nov 2011, involving the Rove Digital botnet delayed cleanup efforts that we previously discussed, continues to haunt both the internet networks and the mass media. A Forbes article and a Times article yesterday brought the apparition back to the front, with some claiming that the site offered by the DNSChanger Working Group is a new one, which it is not. The 2011 Operation being described, and the temporarily outsourced DNS server replacements and delayed cleanup, is the same. This phantom is nothing supernatural, so why all the discussion? The federal judge's extension allowing the Fbi to run these replacement DNS servers still cuts off access in early July. When those replacement servers are removed in early July, the infected systems resolving DNS queries at these previously-owned Rove Digital servers will simply not be able to resolve DNS requests. July 9th will arrive soon, and notifications continue to go out related to the hundreds of thousands of systems in the US alone that are still infected.

In the simplest terms, connectivity will not be severed for DNSChanger-infected systems, but internet communications will not function for infected systems that have not been cleaned up. In the US, government agencies, home users, and other organizations still infected with the malware will have systems that effectively can't get online, can't send email, etc. It will look like they are connected to their network, but they just won't communicate with anything.

At the same time, there seems to be issues with some existing identification efforts. Yesterday, I infected a system with DNSChanger and visited dns-ok.us. Results here:

Regarding the dns-ok site visit, my ISP's support team isn't aware of any "DNS redirections" that would cause the test to fail, and I will update this post with any update from our network admin that they are redirecting my system's dns queries. But that piece is highly doubtful. My point here is that infected system owners may be confused by this check. And the ip address was within the Fbi-provided ranges run by Rove Digital - perhaps a reader knows differently?
UPDATE (1:40 p.m. MST) - I received some details from my local ISP network admin. They are not redirecting any related DNS queries. However, one of their large upstream providers is redirecting DNS requests to another DNS server of their own. The other upstream link to the net does not seem to be re-routing DNS requests. So my infected client's traffic must be favoring routes through the larger upstream provider, and poof, the green/clean response banner appears. Any way you look at it, the response from the site can be inconsistent - sometimes red, sometimes green. Unfortunately, this sort of situation is going to confuse cleanup efforts. So, here we are again. To the potentially millions of folks running DNSChanger infected systems and are listening to the cacophony of incident responder consultants tossing out cheap cynicism that "AV is dead!", go ahead and download an "AV product" to scan your system. Of course, I like recommending our scanners (just visit http://www.kaspersky.com) because I have cleaned up DNSChanger infected systems with it (and the products have fully functional trial periods), along with our TDSSKiller rootkit removal tool to clean up especially complex DNSChanger infections.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Trojan:Android/BaseBridge.A

Trojan:Android/BaseBridge.A forwards confidential details to a remote server.

güncel key nod32 full nod32 esed nod32 keyleri

Facebook stock pounded, hovers around $30

Facebook's stock is dropping again, hovering around $30 after it hit a new low in morning trading.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Samsung Galaxy S3 Now Available in Europe

Samsung's new flagship Android smartphone, the Galaxy S3, today becomes available in 28 countries, including several European markets such as Germany and the UK.

esed nod32 4 nod32 esed nod32 indir nod32

Backdoor:W32/Knockex.A

A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Trojan:SymbOS/ZeusMitmo.A

When installed on a mobile phone, this trojan monitors all incoming SMS messages and acts as a backdoor for receiving commands sent by an attacker via SMS messages.

güncel key nod32 full nod32 esed nod32 keyleri

Is Network Solutions Snatching Domain Names?

Numerous individuals have discovered that when they search for a domain name at Network Solutions, the domain register is automatically registering the name for Network Solutions.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

Massive targeted cyber-attack in Middle East uncovered

Flame, which is designed to steal stored files and information about targeted systems, appears to be state sponsored, Kaspersky Labs says.

64 bit nod32 esed nod32 4 nod32 esed nod32

Public points of data loss

��� “Forgetting” or “underestimating” are the main reasons for data loss around the world. In an airport lounge during my last trip I came across� some cool tab devices running on Android integrated with an external keyboard available for public use and connected to the Internet.

As in the past I performed a quick check of downloaded files, most visited sites and browser history and found a huge list of sensitive information. Here are some examples:
  • Access via OWA to a corporate email of a Latin American bank.
  • Medical files from Spanish hospitals.
  • Commercial offers with personal banking information of a service provider.
  • Personal traveller information with full names, IDs, frequent flyer number and the destination of the flight.
  • Audit control released by a Latin American government to local companies.
I didn’t check if the browser function “save passwords” was enabled. Just imagine if it was! I also didn’t check the saved cookies. Anyway enough sensitive information was already exposed out there. Lots of people are not very good at safeguarding their personal information on standard PCs; they are even worse when it comes to tab computers. More often than not, they just don’t know where a file was downloaded on a tab, and they have no idea how to delete it afterwards. I wonder how much sensitive information is already exposed in this way at airports around the globe! Without any doubt it’s a huge advantage for cybercriminals who know how to use social engineering and a big pain for security officers of the companies who have to train employees. Another important point is when people fly on business - they are usually managers, so any leaked information can compromise not only their personal identity but also a company’s secrets.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

28 Mayıs 2012 Pazartesi

Clueful scans your iOS apps for privacy behavior

The iOS security app scans what's installed on your device and tells you what kinds of information your apps have access to.

indir nod32 nod32 güncel key nod32 guncel key

Worm:W32/Downadup.AL

Worm:W32/Conficker.AL is a variant of Worm:W32/Downadup that can spread using three different methods and is capable of hiding its actions on the infected machine, as well as downloading files from remote sites.

nod32 turkce nod32 full indir nod32 full download full nod32 download

Powerful "Flame" cyber weapon found in Iran

To match Feature IRAN-INTERNET/BOSTON (Reuters) - Security experts said on Monday a highly sophisticated computer virus is infecting computers in Iran and other Middle East countries and may have been deployed at least five years ago to engage in state-sponsored cyber espionage. Evidence suggest that the virus, dubbed Flame, may have been built on behalf of the same nation or nations that commissioned the Stuxnet worm that attacked Iran's nuclear program in 2010, according to Kaspersky Lab, the Russian cyber security software maker that took credit for discovering the infections. ...


nod32 full indir nod32 full download full nod32 download est nod32 serial

Microsoft SDL bans mempcy()... next it will be zeros!!!!

So recently Microsoft banned memcpy() from their SDL process, which got several of us talking about perf hits and the likes when using the replacement memcpy_s, especially since it has SAL mapped to it. For those that don't know, SAL is the "Standard Annotation Language" that allows programmers to explicitly state the contracts between params that are implicit in C/C++ code. I have to admit its sometimes hard to read SAL annotations, but it works extremely well to be able to help compilers know when things won't play nice. It is great for static code analysis of args in functions, which is why it works so sweet for things like memcpy_s()... as it will enforce checks for length between buffers.

Anyways, during the discussion Michael Howard said something that had me fall off my chair laughing. And I just had to share it with everyone, because I think it would make a great tshirt in the midst of this debate:

Oh, I'm thinking of banning zero's next - so we can no longer have DIV/0 bugs! Waddya think?

OK.. so its a Friday and that is funny to only a few of us. Still great fun though.

Have a great long weekend! (For you Canadian folks that is)

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

Whistleblowers: The Approaching Storm for Digital Security

esed nod32 key esed nod32 keys est nod32 key

Clowns Base Key Financial Rate on Feelings, Not Data

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download

Critical TCP/IP Worm Hole Dings Windows Vista

Microsoft has issued a high-priority security update to fix a pair of "critical" flaws that expose Windows users to remote code execution attacks.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Trojan:W32/Ransomcrypt

Trojan:W32/Ransomcrypt is ransomware that encrypts files on the affected computer and demands payment in order to provide a password decrypting the affected files.

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Backdoor:W32/Bohu.A

This program installs various files onto the system. Among the components installed are: a backdoor which connects to an external site to optain updates and other settings; and a component that monitors web traffic to various search engines in China and the domains of certain antivirus (AV) vendors.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

Worm:W32/Downadup.A

Worm:W32/Downadup exploits a vulnerability in the Windows Server service to spread copies of itself across a network. The worm also attempts to download files from a remote server.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Time to party! Windows 7 is here!

It's only a few days away. The official launch of Windows 7 is here!

And of course, that means its time to party!!! You may have heard about the Windows 7 House Parties that are being thrown all around the world. Basically thousands of small groups of people are getting together to see what Windows 7 can do.

Personally, I thought we needed to do more. So fellow MVP and friend Charlie Russel and I decided we would throw our own party. But focused on IT pros and not the consumer angle. We plan to have a lot of fun, showing the cool features of Windows 7 for IT pros like BitLocker, AppLocker and DirectAccess. We plan to bring a bunch of laptops and show new shell extensions, Powershell, new multitouch features and basically sit around and enjoy hours of Q&A for those that haven't tried it yet. We are even planning on installing Windows 7 on a guest's Macbook to show how well it does using Bootcamp on Apple hardware and even on small netbooks.

I also wanted to send a message out to the Vancouver IT community to clear up some misconceptions. This is a party hosted by Charlie and myself. This is NOT a Microsoft event. Microsoft was gracious enough to let us use their facility and even sprung for some of the cost for pizza. However, they never planned this out. Nor did the local VanTUG and VanSBS groups.

Our party is an INVITATION ONLY event. Because we are limited in our own budget and constrained in where we could have the party... we only have enough room for 75 people. So we could only allow a certain number of our friends to come. Charlie and I decided the best way to handle this would be to simply invite who we wanted, and then open it to our friends at the local user groups on a first come, first served basis. This is why there is a cap on the registration on the event, and why it booked up so quickly.

I am hearing through the grapeline that there is a LOT of descent in the Vancouver IT community who feel that Microsoft, VanTUG and VanSBS did a poor job organizing this. >LET ME BE CLEAR. This is a personal party that Charlie and I organized. If you were lucky enough to get an invitation and registered, great. But if you didn't, don't take it out on Microsoft, the local usergroups or their leaders. It's not their fault!!!

We are using our own money and time to throw this party. Please be considerate and respect that we couldn't invite all of you. I am happy to see there is so much excitement about Windows 7 and that you wanted to party with us. And I am sorry if you feel it isn't fair that you didn't get invited. Please feel free to share your own Windows 7 experience, and host your own party. We may be the only IT pro party during the Windows 7 launch, but nothing says you can't have your own!

So party on. Welcome to a new world. Welcome to Windows 7!

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

Backdoor:OSX/Olyx.B

Backdoor:OSX/Olyx.B connects to a remote server to receive further instructions, without the knowledge or permission from the user.

esed nod32 antivirus nod32 turkce nod32 full indir

Absinthe Used To Jailbreak 1.2 Million Devices On iOS 5.1.1 Over The Weekend

http://cultofmac.cultofmaccom.netdna-cdn.com/wp-content/uploads/2012/05/Screen-Shot-2012-05-28-at-12.04.50-AM.jpg
On Friday, May 25th hackers from the Chronic Dev Team released Absinthe 2.0, a tool that jailbreaks iOS 5.1.1 on nearly all iOS devices, including the third-gen iPad. The untethered jailbreak can be performed on an iOS device after downloading the free Absinthe app on any Mac, Windows or Linux computer.�Once again proving that jailbreaking is becoming more mainstream, impressive Absinthe download numbers have been announced from over the weekend.

nod32 esed nod32 indir nod32 nod32 güncel key

Kaspersky to cut phisher lines before they hook you

In its upcoming 2013 suites, Russian security firm lays out a prevention plan to block phishers from reaching you.

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Trojan-Downloader:OSX/Flashback.C

Trojan-Downloader:OSX/Flashback.C poses as a Flash Player installer and connects to a remote host to obtain further installation files and configuration.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Backdoor security flaw found in ZTE Score M

A security flaw allowing third parties to control MetroPCS' ZTE Score M leaves users vulnerable.

nod32 guncel keyler nod32 guncel key güncel key nod32

Morgan Stanley may refund some Facebook investors

Morgan Stanley, the lead investment bank in Facebook's troubled initial public offering, will compensate retail investors who overpaid when they bought Facebook's stock in Friday's IPO, according to a source familiar with the matter.

full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

RSA Lays Off Security, Sales Staff

Layoffs are part of an ongoing restructuring across EMC caused by acquisitions that officials estimated in 2006 might ultimately claim 1,250 jobs.

nod32 esed nod32 indir nod32 nod32 güncel key

Google seals buyout of Motorola Mobility by axing CEO

http://www.theinquirer.net/IMG/747/221747/dennis-woodside-google-motorola-android-chief-executive-170x275.jpg?1337696353

Google sealed its $12.5bn purchase of Motorola Mobility on Tuesday, marking the company's biggest ever acquisition with a change at the top.�

Google CEO Larry Page said in a post on Google's official blog earlier that the deal was closed with Motorola Mobility CEO, Sanjay Jha, stepping down and being replaced by president of Google's Americas region, Dennis Woodside.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

27 Mayıs 2012 Pazar

Trojan:Android/DroidKungFu.C

Trojan:Android/DroidKungFu.C forwards confidential details to a remote server.

nod32 turkce nod32 full indir nod32 full download

Is this the world?s most epic marriage proposal?

Now we've seen our share of�geeky marriage proposals in our day, but Isaac Lamb's�insanely epic live lip-dub proposal may just be the most epically awesome "she said yes!" story of them all. The Portland actor had his brother�sit girlfriend Amy ? Continue reading ?

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

Top 10 GIFs of the Week

1. Getting Down

esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key

IMF chief sparks Facebook war by Greeks

International Monetary Fund (IMF) Managing Director Christine LagardeGreek web users waged Facebook war against IMF head Christine Lagarde on Sunday after she accused their countrymen of dodging taxes.


güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

10 Simple Tips for Boosting The Security Of Your Mac

At the moment, there are more than 100 million Mac OS X users around the world. The number has grown switfly during the past years we expect this growth to continue. Until recently, Mac OS X malware was a somehow limited category and included trojans such as the Mac OS X version of DNSChanger and more recently, fake anti-virus/scareware attacks for Mac OS X which boomed in 2011. In September 2011, the first versions of the Mac OS X trojan Flashback have appeared, however, they didn’t really become widespread until March 2012. According to data collected by Kaspersky Lab, almost 700,000 infected users have been counted at the beginning of April and the number could be higher. Although Mac OS X can be a very secure operating systems, there are certain steps which you can take to avoid becoming a victim to this growing number of attacks.

Here’s our recommendation on 10 simple tips to boost the security of your Mac:

nod32 keyler nod32 key esed nod32 download

Trojan-Downloader:OSX/Flashback.C

Trojan-Downloader:OSX/Flashback.C poses as a Flash Player installer and connects to a remote host to obtain further installation files and configuration.

64 bit nod32 esed nod32 4 nod32 esed nod32

This Adorable 'Lip-Dub' Marriage Proposal Is Worth Watching Now [VIRAL VIDEO]

It seems as though there's a new viral marriage proposal every week, but this delightful "lip-dub" effort from a Portland actor who called in some help from family and friends is unlike anything we've ever seen.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Fake or hijacked Facebook accounts used in scams to steal money are on the rise

Sweden recently experienced a large banking scam where over 1.2 million Swedish kronor (about $177,800) were stolen by infecting the computers of multiple victims. The attackers used a Trojan which was sent to the victims and, once installed, allowed the attackers to gain access to the infected computers. Luckily these guys were caught and sentenced to time in jail, but it took a while to investigate since over 10 people were involved in this scam.

It's possible that these attacks are no longer as successful as the bad guys would like, because we are now seeing them use other methods to find and exploit new victims. For quite some time now we have seen how hijacked Facebook accounts have been used to lure the friends of whose account has been hijacked to do everything from click on malicious links to transfer money to the cybercriminals’ bank accounts.

Please note that this is not a new scam - it has been out there for quite some time. But what we are now seeing is the use of stolen/hijacked accounts, or fake accounts, becoming very common on Facebook. So common, in fact, that there are companies creating fake accounts and then selling access to them to other cybercriminals. As you might expect, the more friends these accounts have, the more expensive they are, because they can be used to reach more people.

The problem here is not just technical - it’s primarily a social problem. We use Facebook to expand our circle of friends. We can easily have several hundred friends on Facebook, while we in real life we may only have 50. This could be a problem because some of the security and privacy settings in Facebook only apply in your interactions with people who you are not friends with. Your friends, on the other hand, have full access to all the information about you.

nod32 turkce nod32 full indir nod32 full download full nod32 download

Trojan:Android/GinMaster.A

Trojan:Android/GinMaster.A steals confidential information from the device and sends it to a remote website.

esed nod32 indir nod32 serial nod32 güncel keyleri

Impressions: The Tangled Web

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Trojan:Android/BaseBridge.A

Trojan:Android/BaseBridge.A forwards confidential details to a remote server.

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Whistleblowers: The Approaching Storm for Digital Security

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Web series touts funky concept snowboards

Signal Snowboards bass guitar modelIn the summer of 2010, Signal Snowboards created the Web series "Every Third Thursday" to showcase the company's experimentation with funky concept boards. Think Science Channel?s ?How It?s Made? ? except with a lot more sass and a funkier setting.


nod32 serialleri esed nod32 indir nod32 serial

iOS Jailbreak Dream Team Releases Absinthe 2.0 - iOS 5.1.1 Jailbreak at #HITB2012AMS

http://cache.greenpois0n.com/images/abs_gp001.png

AMSTERDAM, THE NETHERLANDS - 25th May 2012�? Today @pod2g and the @ChronicDevTeam announced the highly anticipated release of Absinthe 2.0 at #HITB2012AMS held at the Okura Hotel in Amsterdam.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

The mystery of Duqu: Part Ten

At the end of the last year the authors of Duqu and Stuxnet tried to eliminate all traces of their activity. They wiped all servers that they used since 2009 or even earlier. The cleanup happened on October 20.

There were virtually no traces of Duqu since then. But several days ago our colleagues in Symantec announced that they found a new "in-the-wild" driver that is very similar to known Duqu drivers. Previous modifications of Duqu drivers were compiled on Nov 3 2010 and Oct 17 2011, and the new driver was compiled on Feb 23 2012.

So, the authors of Duqu are back after a 4 months break.

Duqu is back

The newly discovered driver does not contain any new functionality compared to its previous versions. The code contains only minor modifications, and they were most likely done to evade detection from antivirus programs and detection tools such as the CrySyS Duqu Toolkit. Here’s a list of changes compared to older versions:

  • The code was compiled with different optimization settings and/or inline attributes of functions.
  • The size of the EXE stub that is injected with the PNF DLL was increased by 32 bytes.
  • The LoadImageNotifyRoutine routine now compares the module name with “KERNEL32.DLL” using hash checksums instead of simple string comparison.
  • The size of the encrypted configuration block was increased from 428 to 574 bytes. There are no new fields in in the block, but the size of the registry value name (“FILTER”) field was increased. This makes the registry value name easily modifiable - probably for future use.
  • The algorithm of the two subroutines that decrypt the encrypted config block, registry value and PNF DLL has been changed. This is the third known algorithm used in the Duqu encryption subroutines.
  • The algorithm of the hash function for the APIs has changed. All the hash values were changed correspondingly.

Old hash function, used in previous versions of the Duqu driver:

New hash function:

The fact that the new driver was found in Iran confirms that most of Duqu incidents are related to this country.

nod32 keyleri nod32 keyler nod32 key esed nod32 download

Backdoor security flaw found in ZTE Score M

A security flaw allowing third parties to control MetroPCS' ZTE Score M leaves users vulnerable.

nod32 full indir nod32 full download full nod32 download est nod32 serial

SOURCE Boston Security Conference and Training 2012 Day 2 - Dan Geer Keynote, Android Modding and Cloud Security

Dan Geer's fantastic Keynote Speech kicked off Day 2 of SOURCE Conference Boston this morning. The talk itself was heady and complex, something to keep up with. Notable talks also were Jeremey Westerman's "Covering *aaS - Cloud Security Case Studies for SaaS, PaaS and IaaS", and Dan Rosenberg's "Android Modding for the Security Practitioner".

"The internet will never be as free as it is this morning." Dan Geer is one of the best, sharpest computing/network security speakers around. His talk descended from a high-level, lengthy, example-laden description of most every developed nation's dependency on the internet: "Dependence with respect to the internet is transitive, dependence on television is not...We are at the point where it may no longer be possible to live your life without having a critical dependence on the Internet, even if you live at the end of a dirt road but still occasionally buy nails or gasoline." And, he wound through multiple examples of failures in US systems to provide fallback options. He talked about his little local bank, whom he wrote a letter to close down the auto-created online account he wouldn't use. They, as an exception, closed it down immediately. His 401k account administrator Fidelity Investments, on the other hand, would not accept customer instructions from him in writing. The company continues to send him mailed marketing content of all kinds in writing at the address from which he sends his letters. Their auditors apparently approve of Fidelity's rejection of customer-initiated hand-written delivered communications, instead, accepting email/online chat messaging or instructions over the phone. This discussion made its way through systems design, unified field theory, and fault tolerance, eventually landing on key points that intrusion prevention is agreed not to be a workable model, instead, the elegance of "intrusion tolerance" must be built into systems, and countries and organizations that cannot build tolerance into their systems are not sustainable. Favorite quotes: "forget the banks, it is the internet that is too big to fail", "Is there room for those who choose simply to not participate in the internet?", "HTML5 is Turing complete. HTML4 is not", and "Should we preserve a manual means? Preserving fallback is prudent if not essential."

Jeremy Westerman's "Covering *aaS - Cloud Security Case Studies..." presented several design cases for Universities and other organizations. The single most important point to learn from this talk is that API key management is unfortunately not handled with as much urgency and awareness as private SSL keys for large organizations. This API key, in the context of multiple, popular single sign-on (SSO) solutions in use at large universities, is the key to tens of thousands, if not hundreds of thousands, of email accounts. Similar API key schemes are implemented on IaaS solutions like the Xen supported Amazon EC2 environment and VMWare vCloud Teramark environments. Without appropriate awareness, developers are storing that key in improper locations like the hard drive of the sign-on machine, or the developers themselves are storing keys on their development system hard drives in non-obvious places, emailing/"dropboxing" them around to each other and then simply transferring the API keys to the production environment, instead of re-issuing production API keys. It is practically imperative that these keys are taken out of the hands of developers. These loose handling practices are bad news - viral code like Sality and other viral code and worms previously high in our prevention stats have maintained functionality to steal FTP and web admin account passwords in order to silently host malicious code, encrypted or otherwise, on legitimate web sites without the owner's knowledge. In other words, developers have been effective and weak targets in the past for credential theft, enabling silent site compromise and malicious use. Most schools don't want that - I remember one unfortunate notification at a small Arts college, where the web admin really didn't want to believe that the encrypted blob of data hosted on his school's web server was a viral payload updating other students' infected systems, located there because his credentials were Sality-stolen after trying to run cracked software distributed over a P2P network. Anyway, it happens and it can be planned for and prevented.

esed nod32 indir nod32 nod32 güncel key

Come have Coffee and Code in Vancouver with me and Microsoft tomorrow

So John Bristowe, Developer Evangelist for Microsoft Canada will be hosting a Coffee and Code event in Vancouver tomorrow from 9 to 2 at Wicked Cafe. Come join him and fellow Microsoft peers Rodney Buike and Damir Bersinic as they sit and share their knowledge over a cup of joe.

I will be there too, and will be available if anyone wants to talk about secure coding, threat modeling with the SDL TM or if you want to talk about integrating AuthAnvil strong authentication into your own applications or architectures

I do hope to see some of you there. And if I don't... I will be seeing you at #energizeIT right?

What: Coffee and Code in Vancouver
When: April 8th, 2009 from 9am - 2pm
Where: Wicked Cafe - 861 Hornby Street (Vancouver)

nod32 full download full nod32 download est nod32 serial 64 bit nod32

Rogue:OSX/FakeMacDef.A

Dishonest antivirus software which tricks users into buying or installing it, usually by infecting a user's computer, or by pretending the computer is infected.

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32

26 Mayıs 2012 Cumartesi

SabPub Mac OS X Backdoor: Java Exploits, Targeted Attacks and Possible APT link

Last week, Apple released two urgent updates to Mac OS X to:

1. Remove the Flashback malware about which we have already written

2. Automatically deactivate the Java browser plugin and Java Web Start, effectively disabling java applets in browsers

Particularly, the second step shows the severity of the CVE-2012-0507 vulnerability exploited by Flashback to infect almost 700,000 users via drive-by malware downloads.

Actually, it was the right decision because we can confirm yet another Mac malware in the wild - Backdoor.OSX.SabPub.a being spread through Java exploits.

This new threat is a custom OS X backdoor, which appears to have been designed for use in targeted attacks. After it is activated on an infected system, it connects to a remote website in typical C&C fashion to fetch instructions. The backdoor contains functionality to make screenshots of the user’s current session and execute commands on the infected machine.

nod32 esed nod32 indir nod32 nod32 güncel key

Who's Up Late Booking Memorial Day Weekend Hotel Rooms Online? [INFOGRAPHIC]

Did you impulsive book a hotel for Memorial Day weekend late at night, tired and groggy eyed? Whether it was because you needed an emergency place to crash for a night or you're a budget-conscious traveler who spotted an excellent last-minute deal, you're not alone. It turns out plenty of hotel patrons are reserving rooms after-hours.

esed nod32 indir nod32 nod32 güncel key

Microsoft SDL bans mempcy()... next it will be zeros!!!!

So recently Microsoft banned memcpy() from their SDL process, which got several of us talking about perf hits and the likes when using the replacement memcpy_s, especially since it has SAL mapped to it. For those that don't know, SAL is the "Standard Annotation Language" that allows programmers to explicitly state the contracts between params that are implicit in C/C++ code. I have to admit its sometimes hard to read SAL annotations, but it works extremely well to be able to help compilers know when things won't play nice. It is great for static code analysis of args in functions, which is why it works so sweet for things like memcpy_s()... as it will enforce checks for length between buffers.

Anyways, during the discussion Michael Howard said something that had me fall off my chair laughing. And I just had to share it with everyone, because I think it would make a great tshirt in the midst of this debate:

Oh, I'm thinking of banning zero's next - so we can no longer have DIV/0 bugs! Waddya think?

OK.. so its a Friday and that is funny to only a few of us. Still great fun though.

Have a great long weekend! (For you Canadian folks that is)

esed nod32 4 nod32 esed nod32 indir nod32

FAQ: Disabling the new Hlux/Kelihos Botnet

Q: What is the Hlux/Kelihos botnet? A: Kelihos is Microsoft's name for what Kaspersky calls Hlux. Hlux is a peer-to-peer botnet with an architecture similar to the one used for the Waledac botnet. It consists of layers of different kinds of nodes: controllers, routers and workers.

Q: What is a peer-to-peer botnet? A: Unlike a classic botnet, a peer-to-peer botnet doesn't use a centralized command and control-server (C&C). Every member of the network can act as a server and/or client. The advantages from the malicious user’s point of view is the omission of the central C&C as a single-point-of-failure. From our point of view, this makes it a lot harder to take down this kind of botnet. Architecture of traditional botnet vs P2P:

Traditional botnet with centralized C&C

Traditional botnet with centralized C&C

Architecture of a P2P botnet

Architecture of a P2P botnet

eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri

SEC eyes Nasdaq compliance in Facebook debacle

WASHINGTON (Reuters) - Securities regulators are looking into whether Nasdaq violated any technical exchange rules when it botched Facebook Inc's market debut last week, according to people familiar with the matter. The review of potential technical violations is part of the Securities and Exchange Commission's broader look at how Nasdaq handled its part of the initial public offering, including its decision to proceed with trading despite glitches, these people said. The SEC is also reviewing Nasdaq's communications with market participants, one of those people added. ...

64 bit nod32 esed nod32 4 nod32 esed nod32

How To Organize A Social Media Day Meetup

Mashable?s third annual Social Media Day is on Saturday, June 30, 2012!

est nod32 serial 64 bit nod32 esed nod32 4

Code Testing Tools Could Be Acquisition Targets in '08

Interest in building security into the development process could make code testing products into inviting buyout targets.

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

New Google data show Microsoft's piracy problems

Google's Internet search engine receives more complaints about websites believed to be infringing on Microsoft's copyrights than it does about material produced by entertainment companies pushing for tougher online piracy laws.

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

Backdoor:OSX/DevilRobber.A

Backdoor:OSX/DevilRobber.A silently installs applications related to Bitcoin-mining; it may also harvest data from the infected machine and listen for additional commands from a remote user.

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Carolina Dieckmann, Brazilian cybercrime legislation and la ?Viveza criolla?

��� Carolina Dieckmann, a famous Brazilian actress, recently became the victim of cyber attacks that allowed cybercriminals to steal personal property - nude pictures of her- from her computer. Many pictures or maybe all of them got leaked to the Internet. This incident has served as a good incentive for the Brazilian government to have new cybercrime laws in the country (the current law to fight cybercrime in Brazil was approved back in the 40’s of XX century). As a result of this incident, a new cybercrime law that carries a punishment of up to 2 years in prison for such crimes has finally been proposed for consideration. This is a good and right move! A press article in Portuguese can be

esed nod32 serial esed nod32 antivirus nod32 turkce

'True Blood,' 'Twilight' Sink Teeth Into Social Media [INFOGRAPHIC]

TV critics predict True Blood, the hit HBO series about vampires and other superhuman characters, will dominate conversations online this summer. And while the show's plot is responsible for driving much of the dialogue across social networks, True Blood's social media tactics to engage viewers propels the buzz to another level.

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Fallout from New Orleans Times-Picayune Announcement of Downsizing

Without a doubt, the Times-Picayune newspaper played a vital role in gathering and dissemination of news and information in Louisiana following Hurricane Katrina. The Pulitzer Prize-winning paper has served the New Orleans community for the past 175 years.

nod32 esed nod32 indir nod32 nod32 güncel key

SabPub Mac OS X Backdoor: Java Exploits, Targeted Attacks and Possible APT link

Last week, Apple released two urgent updates to Mac OS X to:

1. Remove the Flashback malware about which we have already written

2. Automatically deactivate the Java browser plugin and Java Web Start, effectively disabling java applets in browsers

Particularly, the second step shows the severity of the CVE-2012-0507 vulnerability exploited by Flashback to infect almost 700,000 users via drive-by malware downloads.

Actually, it was the right decision because we can confirm yet another Mac malware in the wild - Backdoor.OSX.SabPub.a being spread through Java exploits.

This new threat is a custom OS X backdoor, which appears to have been designed for use in targeted attacks. After it is activated on an infected system, it connects to a remote website in typical C&C fashion to fetch instructions. The backdoor contains functionality to make screenshots of the user’s current session and execute commands on the infected machine.

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download