30 Eylül 2012 Pazar

Bejtlich Interviewed on This Week in Defense News

esed nod32 download nod32 serialleri esed nod32 indir

Tech think tank's website rejects browser do-not-track requests

http://www.itif.org/publications/why-itif-rejects-your-do-not-track-request

The website for the Information Technology and Innovation Foundation (ITIF) now tells visitors it will not honor their browsers' do-not-track requests as a form of protest against the technology pushed by privacy groups and parts of the U.S. government.

The tech-focused think tank on Friday implemented a new website feature that detects whether visitors have do-not-track features enabled in their browsers and tells them their request has been denied.

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

Robot police drones could put disabled cops back on the beat

In the classic sci-fi action movie "RoboCop" (watch on Netflix), severely injured police officer Alex Murphy returns to duty as a cyborg ? a robot body with a human mind. Where the film's fictional doctors placed Murphy's brain into a ? Continue reading ?

nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri

Does Anything Really "End" In Digital Security?

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Rogue:W32/SystemTool

This detection identifies a malicious program, typically used to deceive users into purchasing a fake application.

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Australian telcos warn of criminal advantage in data retention

http://en.wikipedia.org/wiki/Australia

Criminals could take to smaller telcos or internet service providers to escape the Federal Government's proposed data retention regime, Telstra and iiNet have warned.

The telcos fronted a parliamentary committee inquiring into the retention proposal, which aims to keep telecommunications metadata for two years.

Representatives for Australia's largest carriers warned that criminals could simply move to smaller internet service providers and telcos to escape the purview of spy agencies hoping to use captured metadata to make associations or connections between suspects.

nod32 esed nod32 indir nod32 nod32 güncel key

Backdoor:OSX/Olyx.C

Backdoor:OSX/Olyx.C connects to a remote server to receive further instructions, without the knowledge or permission from the user.

nod32 full indir nod32 full download full nod32 download est nod32 serial

Cyberspying effort drops 'Mirage' on energy firms

Malware targets individuals at organizations in Philippines, Taiwan, Canada and elsewhere via "spear-phishing" e-mails bearing tainted PDF files.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Facebook Embraces Bubbles in Messenger iPhone Upgrade

Facebook Embraces Bubbles in Messenger iPhone UpgradeBubbles. That's the biggest change you'll probably notice in Facebook's upgraded Messenger. Gone is the flush-left alignment of the previous version of the app and the rectangles that sandwiched your messages.


esed nod32 antivirus nod32 turkce nod32 full indir

Trojan:W32/Ransomcrypt

Trojan:W32/Ransomcrypt is ransomware that encrypts files on the affected computer and demands payment in order to provide a password decrypting the affected files.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

Exploit:W32/D-Encrypted.Gen

A program or technique that takes advantage of a vulnerability to remotely access or attack a program, computer or server.

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

New ZitMo for Android and Blackberry

Ten months ago we�ve published an article about ZeuS-in-the-Mobile which contains an overview of everything we knew about ZitMo at that moment. The paper finishes with the following prediction: �they [attacks involving ZitMo] will become more specifically targeted against a smaller number of victims�. This prediction appears to have been correct. It�s not that often when we hear/find new wave of ZeuS-in-the-Mobile (or SpyEye-in-the-Mobile) attack. So every new piece of information about these types of malware and/or attacks involving them is very important and helps to understand the evolution of one of the most interesting threats in mobile space so far. Just a small reminder: ZeuS-in-the-Mobile is almost 2 years old. And this blog is about new samples (and probably new wave of attack)) of ZitMo for Android and Blackberry.

New samples overview

We�ve got 5 new files of ZitMo: 4 for Blackberry and 1 for Android. As you may know, the Blackberry platform has never been actively targeted by malware. And here we have 4 different samples of ZeuS-in-the-Mobile for Blackberry at once: 3 .cod files and 1 .jar file (with one more .cod inside). Yes, finally we�ve got a ZitMo dropper file for Blackberry.

As for Android, there is only one .apk dropper. But this ZeuS-in-the-Mobile for Android has been modified and now looks like a �classic� ZitMo with same commands and logic.

Countries and C&C numbers

All samples of ZitMo we�ve seen so far target users from various European countries (Spain, Poland, Germany, etc). This case is no exception. Here is a list of countries from which users are threatened by new ZeuS-in-the-Mobile with C&C number from the sample.

Blackberry:

  • Germany +46769436094
  • Spain +46769436073
  • Italy +46769436073
  • Spain +46769436073

Android

  • Germany +46769436094

To summarize, there are 3 countries (Germany, Spain and Italy) and 2 C&C numbers (both are Swedish). We found out that these cell phone numbers belong to Tele2 mobile operator in Sweden.

indir com nod32 nod32 keyleri nod32 keyler nod32 key

Power Nap With This Head-Consuming Ostrich Pillow

Power Nap With This Head-Consuming Ostrich PillowWith the hectic 24-7 pace of modern life, many people may yearn to emulate the well-worn myth of ostriches when frightened or scared: that is, bury their heads in the sand.


güncel key nod32 full nod32 esed nod32 keyleri

Packed:W32/PeCan.A

This program is packed using a packer program associated with numerous other malware.

nod32 esed nod32 indir nod32 nod32 güncel key

Your car, tracked: the rapid rise of license plate readers

http://cdn.arstechnica.net/wp-content/uploads/2012/07/farivar.car_.tiburon-640x201.jpg

Tiburon, a small but wealthy town just northeast of the Golden Gate Bridge, has an unusual distinction: it was one of the first towns in the country to mount automated license plate readers (LPRs) at its city borders?the only two roads going in and out of town. Effectively, that means the cops are keeping an eye on every car coming and going.

A contentious plan? Not in Tiburon, where the city council approved the cameras unanimously back in November 2009.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

Trojan-Dropper:OSX/Revir.B

Trojan-Dropper:OSX/Revir.B drops and executes a backdoor program onto the system, while camouflaging its activity by opening a JPG file to distract the user.

full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

Which Are the Most Social Colleges? [INFOGRAPHIC]

Which Are the Most Social Colleges? [INFOGRAPHIC]Social Media has become pervasive. You use it, we use it, even celebrities and sports stars use it. Companies have begun using it long time ago as well and, naturally, colleges and universities have followed suit.


esed nod32 indir nod32 nod32 güncel key

Packed:W32/PeCan.A

This program is packed using a packer program associated with numerous other malware.

esed nod32 keyleri esed nod32 key esed nod32 keys est nod32 key

5 Easy Steps To Make Your Job Descriptions Go Viral

5 Easy Steps To Make Your Job Descriptions Go ViralJason Webster is a social recruiting enthusiast and co-founder of Ongig, a platform that creates shareable, visually-appealing job descriptions. He has spoken at multiple social recruiting events, where his passion for candidate experience is the primary topic. Connect with Jason and Ongig on Twitter, Facebook, and LinkedIn.


nod32 turkce nod32 full indir nod32 full download full nod32 download

EuSecWest 2012: That thing in your pocket

AMSTERDAM -- As part of my job monitoring security threats and trends for Kaspersky Lab's global research team, I'm exposed to a healthy dose of paranoia from white hat researchers who find it trivial to hack into modern operating systems and platforms.

After a few days of hanging out in the hallways with exploit writers, I find myself clutching my laptop to my chest a little tighter and constantly peeking at my mobile phone to make sure nothing out of the ordinary is happening.

None of this paranoia is misplaced. Just pay attention to the lessons from the Pwn2Own challenges organized by the CanSecWest/EuSecWest folks (shout-out to Dragos Ruiu for putting together top-notch events) and you get a real-world understanding of why it's near impossible to keep away a motivated adversary.

This week, I had the opportunity to interview the hacking teams that used zero-day vulnerabilities and clever exploitation techniques to compromise fully patched iPhone 4S and Android 4.0.4 (Samsung S3) and the big message from these hackers was simple: Do not use your mobile device for *anything* of value, especially for work e-mail or the transfer of sensitive business documents.

For many, this is not practical advice. After all, your mobile device is seen as an extension of the computer and there is a legitimate need to access work e-mail on iPhone/iPad, Android and BlackBerry smart phones. However, whether you are a businessman, a celebrity or the average consumer, it's important to start wrapping your mind around the idea of separating work from play on mobile devices.

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

29 Eylül 2012 Cumartesi

Chicago looks to Twitter for answer to gun problem

The city of Chicago is asking residents with ideas on how to get illegal guns off the streets to share their thoughts ? in 140 characters or fewer on Twitter.

eset nod32 guncel key eset nod32 güncel key indir com nod32

Israeli Agents Steal Korean Tech for Chinese Customer

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Flame Hypocrisy

nod32 turkce nod32 full indir nod32 full download full nod32 download

Featured apps from the Appolicious community of iOS developers

iPhone and iPad app developer and publishers are encouraged to contact us directly at Appolicious to promote their new app and game releases. Just tell us about the apps that inspire you the most through a rating or review, or create curated lists of your favorites. We will be happy to give your app a shout-out in our weekly community round-up.

nod32 turkce nod32 full indir nod32 full download

Defcon is 20 Years Old in 2012

Defcon 2012 marked its 20th anniversary with unexpected speakers, some pretty tough content, and the cultural dark magic that buzzes the conference every year.

The Dark Tangent welcomed Mark Weatherford. an ex-Navy and Raytheon security guy that became the CISO of the State of Colorado and California and then CSO at the highly regulated NERC before recently moving on to a top spot at the Department of Homeland Security. Weatherford provided some insight into the amount of attacks he sees every day, and then moved on to explaining that some of the best people he is working with don't have a college degree and some recruiting - they are hiring.
The next, huge name that Dark Tangent brought out was General Keith Alexander, Commander of the US Army CyberCom and Director of the NSA/CSS. It seems to be a sign of the times that the hacker community would be approached by the individual building out what is becoming the largest group of "cyberwarriors" in the world, attempting to draw shared principles and parallels between the groups. The guy was genuinely funny, rolling out jokes throughout his talk and Q&A answers, inviting kids onstage and showing off multiple tshirts. Aside from the explanation of their mission and the recruiting talk, a couple other interesting topics came up. According to Alexander, folks should know better than claiming that the NSA maintains files on every individual in the US, and he thinks that the Cybercom doesn't need to become larger than the current US Navy, partly because of the power that automation and smart work provides. Oh, and they are hiring. It was a repeated theme this past week.

A couple of the talks were shocking in their presentation. FX from Phonoelit and Recurity Greg analysed just how bad Huawei router code really is from a security perspective, it was almost unbelievable for a product line from a $21 billion company. Their preso began with a Code Quality slide that they claimed was almost left empty. Every slide's content made it seem like Huawei security practices and implementation couldn't be worse than suggested by the previous slide, but it did. And it was bad. After pouring over the router codes' open services and inability to be disabled, they described a lack of security advisories and updates, interrupt tables with RWX access, a Chinese-only debug interface, a lack of any communication channel whatsoever for reporting vulnerabilities, and a lack of real security development lifecycle throughout the code development, they followed Huawei's lead and copy/pasted their decades old Cisco IOS exploit code into exploits developed for these Huawei routers, targeting 90s style vulnerabilities. The company clearly has't also taken security lessons learned from Cisco's experience in this space.

Follow me on Twitter

At first, I was disappointed that the "Dr Strangelove" nuclear power plant SCADA system talk was cancelled without notice to attendees until arrival at the talk. It was replaced with a talk on SCADA HMI (or human-machine interfaces) security issues from Wesley McGrew titled "SCADA HMI and Microsoft Bob: Modern Authentication Flaws With a 90's Flavor". At face value, it sounded comparably uninteresting. But, it was eye-opening. The talk itself weaved through known, commonly approached technical problems that were met with disturbingly juvenile, incorrect security implementations - these systems are critical infrastructure and security requirements are not being met. This talk was complemented by Alberto Garcia Illera's pen-testing adventures in the transportation systems of Spain, using simple, unforeseen flaws in publicly accessible systems, to peel layers back until they reached the poorly protected SCADA systems called "How to Hack All the Transport Networks of a Country". The first talk revealed incredibly weak implementations in SCADA systems, and the second revealed exactly why those weaknesses need to be fixed and better understood by their developers and vendors.

eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri

Twitter users may be victims of direct message malware

Security analysts say that suspicious direct messages from Twitter friends with links to Facebook, which have been popping up lately, could be malicious "backdoor trojans."

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

Rogue:OSX/FakeMacDef.A

Dishonest antivirus software which tricks users into buying or installing it, usually by infecting a user's computer, or by pretending the computer is infected.

nod32 full download full nod32 download est nod32 serial 64 bit nod32

HP could be headed for another multibillion-dollar write off

HP could be headed for another multibillion-dollar write offEven if the worst is over for HP (HPQ), the company may not yet be done writing off losses from past acquisitions. The�San Jose Business Journal�interviewed a few analysts to get predictions on what HP?s analyst meeting will reveal next week, and Jefferies?�Peter Misek says that the electronics giant could be poised to write off $3 billion in losses linked to its 2011 acquisition of�enterprise information technology firm Autonomy. Last quarter, HP took a $8 billion charge related to its 2008 acquisition of Electronic Data Systems.�Overall,�Misek has recommended that investors sell their HP shares and has projected that the company?s stock price will drop to as low as $14 over the next year. Read


güncel key nod32 full nod32 esed nod32 keyleri

Other:W32/Generic

Other:W32/Generic is a Generic Detection for a wide range of malicious programs, such as trojans, worms and keyloggers.

indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key

Trojan:W32/Murofet.A

This trojan attempts to download a file (presumably malicious) from a randomly generated domain.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Trojan:BASH/QHost.WB

Trojan:BASH/QHost.WB hijacks web traffic by modifying the hosts.

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download

Google can't enforce German Microsoft injunction: ruling

A woman walks past the Google Chicago headquarters logo in ChicagoSAN FRANCISCO (Reuters) - A U.S. appeals court on Friday ruled that Google Inc's Motorola Mobility unit cannot enforce a patent injunction that it obtained against Microsoft Corp in Germany, diminishing Google's leverage in the ongoing smartphone patent wars. The injunction would have barred Microsoft from "offering, marketing, using or importing or possessing" in Germany some products including the Xbox 360 and certain Windows software. The ruling against the German injunction came from the 9th U.S. Circuit Court of Appeals in San Francisco. ...


esed nod32 key esed nod32 keys est nod32 key

Mikko's world: Governments, factories and washing machines

http://photos.hackinthebox.org/index.php/2010/KUL/hitb2010kul-conference/MG_9050

WHEN the Stuxnet virus was first detected back in June 2010, its true purpose was unknown.

Security experts were only able to confirm that it was a Windows worm that spread via USB sticks and once inside an organization, it could also spread by copying itself to network shares if they had weak passwords.

eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler

Canada aware of two cyber attacks, won't say if China involved

A computer keyboard is seen in BucharestOTTAWA (Reuters) - Canada said on Friday it was aware of an attempt by hackers to target a domestic energy company, the second time in 24 hours Ottawa had acknowledged a cyber security attack against a Canadian firm. In both cases the Canadian government declined to comment on reports which suggested a Chinese connection. The news comes at an awkward time for Canada's Conservative government, which is deciding whether to approve a landmark $15.1 billion bid by China's CNOOC Ltd to take over Canadian oil producer Nexen Inc. ...


indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key

Exploit:Java/Blackhole

Exploit:Java/Blackhole identifies a Java class module used as part of an exploit kit known as Blackhole.

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

New Java flaw could hit 1 billion users

A new Java vulnerability has surfaced that apparently affects all Java runtimes and therefore puts close to a billion users at risk.

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Android owners minimize cellular data usage in response to new shared data plans

Android owners minimize cellular data usage in response to new shared data plansThe two largest carriers in the U.S., Verizon (VZ) and AT&T (T), have been heavily promoting their shared data plans since they launched this past summer. Now that the days of unlimited data are coming to an end, users are more cautious about what they download. New research from NPD Group revealed that Android smartphone users have begun to prioritize Wi-Fi over cellular networks, Fierce Wireless reports. The research firm found that users downloaded an average of 2.5GB per month on Wi-Fi, compared to roughly 870MB of data on cellular networks. A further breakdown of the numbers revealed that young adults aged 18 to 24 unsurprisingly use the largest amount of cellular data, averaging 1.05GB per month, compared to adults


nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

USSD attack not limited to Samsung Android devices, can also kill SIM cards

http://www.flickr.com/photos/l33tdawg/8022497527/in/photostream

A variation of the recently disclosed attack that can wipe data from Samsung Android devices when visiting a malicious Web page can also be used to disable the SIM cards from many Android phones, researchers say.

Ravishankar Borgaonkar, a research assistant in the Telecommunications Security department at the Technical University of Berlin, recently demonstrated the remote data wiping attack at the Ekoparty security conference in Buenos Aires, Argentina.

nod32 turkce nod32 full indir nod32 full download full nod32 download

28 Eylül 2012 Cuma

Trojan:Android/AutoSPSubscribe.A

Trojan:Android/AutoSPSubscribe.A is a malicious app that targets Android users in China, and is distributed through unofficial markets.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

Virus:W32/Ramnit.N

A program that secretly and maliciously integrates itself into program or data files. It spreads by integrating itself into more files each time the host program is run.

eset nod32 güncel key indir com nod32 nod32 keyleri

Other:W32/False Positive

This detection was unintentionally triggered on a JavaScript file associated with Google Analytics. A Hydra exclusion for this detection (2010-12-10_01) was released at 0052 UTC on 10th December, followed by an Aquarius database update (2010-12-10_03) released at 0215 UTC which removes the detection entirely. Please ensure your database is updated to resolve this issue.

est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce

Thoughts from the IDC Security Roadshow in South Africa

Greetings from the IDC Security Roadshow in Johannesburg, South Africa! I am sitting here in the hotel lobby looking out at the Nelson Mandela Square listening to the explosive track from DJ Fresh - The Feeling (Ft. RaVaughn) (Metrik Remix), reflecting on the last couple of days and the discussions I�ve had with various people.

I have been giving a few interviews and I was also presenting at the IDC security conference; my presentation is called �The Diary of a Security Geek� and it includes material from a one year long research project I have had. It basically contains observations made during these conferences and some really interesting facts on how security managers see IT security, how they prioritize and some interesting false perceptions on IT security and risks. I know that some of you might be interested in this research, so don�t worry - I will publish my research at a later date and I will also be giving the same presentation on quite a few conferences around the world this year.

full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

WebOS opens up at last [video]

WebOS opens up at last [video]WebOS, the dearly departed mobile operating system developed by Palm and purchased by HP (HPQ), is open source at last. HP on Friday took the wraps off of�Open webOS 1.0, which has ?an�OpenEmbedded�build�that allows a full webOS experience running inside an OE emulator,? along with core email and browsing applications that can be ported onto different devices. HP says it will continue adding key features to Open webOS in the coming months, including open sourced media and audio components, the�BlueZ Bluetooth stack and optimized�SysMgr rendering architecture. A video demonstration of how to port Open webOS onto an HP device is posted below. Read


esed nod32 indir nod32 nod32 güncel key nod32 guncel key

Avira kills its pop-up for 2013, sort of

Avira rises again as it intros new features including a tracking blocker and on-the-fly Web site reputation evaluations for yet another big antivirus overhaul from the German company.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel

iOS 6 allows tweets, Facebook posts from locked device

Disable Siri in the Passcode Lock settings if you don't want strangers to use your phone while it's locked.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Backdoor:OSX/Tsunami.A

Backdoor:OSX/Tsunami.A is a distributed denial-of-service (DDoS) flooder that is also capable of downloading files and executing shell commands in an infected system.

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32

Feds snoop on social-network accounts without warrants

http://asset0.cbsistatic.com/cnwk.1d/i/tim/2012/09/27/holder_610x422.png

Federal police are increasingly gaining real-time access to Americans' social-network accounts -- such as Facebook, Google+, and Twitter -- without obtaining search warrants, newly released documents show.

The numbers are dramatic: live interception requests made by the U.S. Department of Justice to social-networking sites and e-mail providers jumped 80 percent from 2010 to 2011.

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

The Benefits of a More Vigorously Vibrating iPhone

The Benefits of a More Vigorously Vibrating iPhoneThe new iPhone 5 has a different motor that powers its vibrations than its predecessors and while it's been described as "louder and rougher and just more 'violent,'" this is a change for the�better. The new phone part was first noticed during an� �but those are� .�CNET's Don Reisinger also describes it as a "louder, harsher effect." Those may not be words often equated with good things, but the change will please at least some iPhone owners, who complained of the phone's faint buzz.�


esed nod32 serial esed nod32 antivirus nod32 turkce

Bejtlich Interviewed on This Week in Defense News

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Research in Motion lost less than expected in second quarter

http://en.wikipedia.org/wiki/Research_In_Motion

Research In Motion Ltd. posted its third straight quarterly loss, but the struggling BlackBerry maker did increase its subscriber base and cash position.

The company's loss narrowed to $235 million in its fiscal second quarter from $329 million a year ago as RIM tamed costs through a restructuring process that included widespread layoffs and closing manufacturing facilities.

indir com nod32 nod32 keyleri nod32 keyler nod32 key

Nokia cuts smartphone prices before new models arrive

Models of Nokia Lumia 900 cellular telephone are pictured in San FranciscoHELSINKI (Reuters) - Struggling phone maker Nokia has knocked 10-15 percent off the prices of two of its top of the range smartphones, hoping to boost sales before newer models arrive in markets in November. Nokia has cut the price of the Lumia 800 by around 15 percent and the Lumia 900 by 10 percent in Europe, according to device pricing data compiled by British research firm CCS Insight. Nokia declined to comment. Earlier this month, Nokia launched Lumia 820 and 920, which many see as crucial for the Finnish company's survival. ...


eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler

Artificial Intelligence Used to Home in on New Fossil Sites

Artificial Intelligence Used to Home in on New Fossil Sites

esed nod32 antivirus nod32 turkce nod32 full indir

The iPhone 5 delivers solid talk time so far

http://asset3.cbsistatic.com/cnwk.1d/i/tim/2012/09/24/archimedes_iphone5_lifestyle_outside_35438535_01_610x436.jpg

To get a better handle on the iPhone 5's battery life we decided to subject the company's first 4G LTE smartphone to talk time tests. After all the dust settled, our tests produced respectable and surprising call time numbers

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

HowAboutWe for Couples Mixes Love and Local Deals

HowAboutWe for Couples Mixes Love and Local DealsOne of the golden rules of online dating says: Turn off your profile after you?ve successfully found a mate. For two years, singles have flocked to the dating website HowAboutWe to meet their future significant others. As its users get engaged and married, HowAboutWe loses its best customers.


nod32 full indir nod32 full download full nod32 download est nod32 serial

Using TS RemoteApp as an attack vector

So in today's session at SMBNation that I spoke at, I showed how to use TS RemoteApp with TS Gateway on SBS2008 to deliver remote applications through Remote Web Workplace. It is one of the most cool features in the Windows Server 2008 operating system. But we have to remember what its doing.

Part of the conversation we had was on the difference between local desktop display in TS RemoteApp vs just having a full desktop to the Terminal Server. One issue that came up was that as a RemoteApp, you can't run other applications.

Well, that is not actually true. If you think that, then a TS RemoteApp has the ability to be an attack vector for you. What do I mean? Well below is a screen shot of what happens if you hit CTRL-ALT-ENTER with the cursor focused on the RemoteApp window (in this case MS Paint running remotely):

At this point, you can run Task Manager.... then hit File->Run and run something else. In my case, I showed a few people afterwards how to start cmd and start exploring the network. Now, you will only have the privileges of the user account logged in as, but it is still something you have to be careful about. If you think a RemoteApp bundle prevents access to other application sor the network... you are wrong.

So is this bad? No. Is it really an attack vector? No. You just need to understand that when allowing ANY type of Terminal Services based access, you have to restrict the policies and access accordingly. No matter if its local or remote. Running a TS RemoteApp bundle of Office will display on the local desktop, but is STILL running on the Terminal Server. So it will be browsing the network the Terminal Server is connected to as the local net. It will also browse your own drives mapped via tsclient. So you have to remember that.

Hope thats useful. A TS RemoteApp bundle does NOT mean you won't have access to the TS desktop when displaying remotely on your personal desktop. And that's not a bad thing. TS Remote App is a convenient way to extend the workspace to your local machine, anywhere in the world. No pun intended. That's its power... and the benefit. Great remote productivity enhancement in Windows Server 2008. Use it. (Safely of course)

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

Whistleblowers: The Approaching Storm for Digital Security

güncel key nod32 full nod32 esed nod32 keyleri

Camera+ Arrives on the iPad

Camera+ Arrives on the iPadCamera+ -- one of the most popular photo apps for the iPhone -- is now available for the iPad.


nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

27 Eylül 2012 Perşembe

How to Kill Teams Through "Stack Ranking"

nod32 esed nod32 indir nod32 nod32 güncel key

Bejtlich's Thoughts on "Why Our Best Officers Are Leaving"

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Accenture bets on outsourcing business to drive growth

(Reuters) - Accenture Plc forecast full-year earnings ahead of analyst estimates as it bolsters its outsourcing business to offset a slowdown in consulting, sending its shares up 5 percent in after-market trading. Outsourcing revenue rose 10 percent to $3.1 billion while consulting revenue fell 4 percent to $3.74 billion in the fourth quarter. Accenture, which has about 257,000 employees worldwide, expects revenue growth in its outsourcing business to continue to outpace that of consulting, Chief Financial Officer Pamela Craig said on a conference call. "They're clearly gaining market share ...

indir nod32 nod32 güncel key nod32 guncel key

New ZitMo for Android and Blackberry

Ten months ago we�ve published an article about ZeuS-in-the-Mobile which contains an overview of everything we knew about ZitMo at that moment. The paper finishes with the following prediction: �they [attacks involving ZitMo] will become more specifically targeted against a smaller number of victims�. This prediction appears to have been correct. It�s not that often when we hear/find new wave of ZeuS-in-the-Mobile (or SpyEye-in-the-Mobile) attack. So every new piece of information about these types of malware and/or attacks involving them is very important and helps to understand the evolution of one of the most interesting threats in mobile space so far. Just a small reminder: ZeuS-in-the-Mobile is almost 2 years old. And this blog is about new samples (and probably new wave of attack)) of ZitMo for Android and Blackberry.

New samples overview

We�ve got 5 new files of ZitMo: 4 for Blackberry and 1 for Android. As you may know, the Blackberry platform has never been actively targeted by malware. And here we have 4 different samples of ZeuS-in-the-Mobile for Blackberry at once: 3 .cod files and 1 .jar file (with one more .cod inside). Yes, finally we�ve got a ZitMo dropper file for Blackberry.

As for Android, there is only one .apk dropper. But this ZeuS-in-the-Mobile for Android has been modified and now looks like a �classic� ZitMo with same commands and logic.

Countries and C&C numbers

All samples of ZitMo we�ve seen so far target users from various European countries (Spain, Poland, Germany, etc). This case is no exception. Here is a list of countries from which users are threatened by new ZeuS-in-the-Mobile with C&C number from the sample.

Blackberry:

  • Germany +46769436094
  • Spain +46769436073
  • Italy +46769436073
  • Spain +46769436073

Android

  • Germany +46769436094

To summarize, there are 3 countries (Germany, Spain and Italy) and 2 C&C numbers (both are Swedish). We found out that these cell phone numbers belong to Tele2 mobile operator in Sweden.

güncel nod32 keyleri nod32 guncel keyler nod32 guncel key güncel key nod32

Instant view: RIM reports quarterly loss but cash pile grows

(Reuters) - Research In Motion Ltd reported a smaller-than-expected quarterly loss on Thursday and the struggling BlackBerry maker managed to increase its cash pile in the run-up to the launch of its make-or-break line of next generation devices. Having sufficient cash on hand is seen as crucial to a successful launch of RIM's line of revamped smartphones that will run on its new BlackBerry 10, or BB10, operating system. The company has staked its future on BB10. ...

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

New Zealand government to Kim Dotcom: Sorry for the illegal spying

New Zealand government to Kim Dotcom: Sorry for the illegal spyingImagine how embarrassed President Barack Obama would feel if he had to issue a formal apology to Snooki. Well, something very similar has happened in New Zealand, as the The Wall Street Journal reports that Prime Minister John Key has apologized to Megaupload founder and tabloid magnet Kim Dotcom for government security officials who illegally spied on his communications without first obtaining a warrant. The apology to Dotcom comes in the wake of a report released by New Zealand?s inspector-general of intelligence and security earlier this week that admitted the government conducted ?unlawful interception of communications of certain individuals involved in the Megaupload case.? Read


full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

Microsoft's Bing bods exploit fanbois' Apple maps misery

http://www.bing.com/community/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-41-77-metablogapi/1663.infinite_2D00_loop_2D00_3_5F00_08C76669.jpg

Microsoft?s Bing team is taking advantage of Apple?s map app misery to make a push for Redmond's own cartographic efforts.

In a cheeky blog post, Microsoft invites iPhone 5 users to use Bing Maps to get around instead of Apple?s own shoddy substitute for Google Maps. The blog is titled Just Got a New Phone? Time to Download the Bing App, and avoids explicitly naming the iPhone 5, which launched last week, while making its point clear. Microsoft says:

esed nod32 indir nod32 nod32 güncel key

China's High-Tech Military Threat and Air Sea Battle

nod32 keyleri nod32 keyler nod32 key esed nod32 download

Trojan:Android/YZHCSMS.A

Trojan:Android/YZHCSMS.A sends SMS/MMS messages to premium rate numbers, potentially incurring unexpected/unwanted usage charges.

nod32 full download full nod32 download est nod32 serial 64 bit nod32

What Gets Measured, Matters

indir com nod32 nod32 keyleri nod32 keyler nod32 key

First Solar names executive to help grow in China

(Reuters) - First Solar Inc appointed Bruce Yung as managing director of business development for China as the largest U.S. solar panel maker looks to expand in the country. China is looking to aggressively scale up its solar market. The country last month hiked its 2015 target for solar power capacity by 40 percent to about 21 gigawatt (GW), the third increase in just over a year. The appointment will help expand the market for utility-scale solar power plants in China, First Solar said in a statement. ...

nod32 keyler nod32 key esed nod32 download

Microsoft: Critical Vista Patch Coming

Microsoft plans to ship two patches on Jan. 8, 2008 to patch code execution vulnerabilities in its newest OS.

64 bit nod32 esed nod32 4 nod32 esed nod32

Israeli Agents Steal Korean Tech for Chinese Customer

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Thoughts on Lessons from Our Cyber Past: The First Cyber Cops

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Rootkit:W32/ZAccess

Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additional advertising information.

nod32 full download full nod32 download est nod32 serial

Rootkit:W32/Zxshell.B

Rootkit:W32/Zxshell.B is dropped by Backdoor:W32/Zxshell.A and basically functions as a protection mechanism for its main payload file.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

Trojan-Downloader:W32/Kazy-17907

This type of trojan secretly downloads malicious files from a remote server, then installs and executes the files.

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

Major Windows 7 gotcha you should know about that may block you from upgrading

OK, so anyone who knows me expects that I stay up on the bleeding edge when it comes to dev tools and operating systems. Yes, I have been using Windows 7 for almost a year now and have been loving it. However, I never ran it on my production dev environment as I felt I did not what to disrupt our software development workflow until Windows 7 was in final release. With it out to RTM now, I felt it was as good as time as any to migrate, especially since we recently released our latest build of our own product and have a bit of time to do this.

So last week I deployed Windows 7 to both of my production dev systems, as well as the primary QA lab workstations. It was the worst thing I could ever have done, halting all major development and test authoring in our office due to a MAJOR gotcha Microsoft failed to let us know about during the beta and RC.

Ready for this....

You cannot run Virtual PC 7 (beta) in Windows 7 WITHOUT hardware virtualization. OK, I can live with that, since the new XP mode (which is an excellent feature) may very well need it. That didn't concern me. It was my fall back that failed to work that blew my mind...

You cannot run Virtual PC 2007 in Windows 7, as they have a hard block preventing it from being installed on Windows 7 due to compatibility issues. So the same machine that I have been using for development using Vista for a few years has now become a glorified browsing brick. I cannot do any of my kernel mode and system level development or debugging as I am not ALLOWED to install Virtual PC 2007 on the same hardware that worked before. *sigh*

What surprised me is that Ben, the Virtual PC Guy at Microsoft blogged that it was possible to run Virtual PC on Windows 7, and in his own words:

While all the integration aspects of Virtual Machine Additions work (mouse integration, shared folders, etc...) there is no performance tuning for Windows 7 at this stage - so for best performance you should use a system with hardware vitalization support.

That sounds to me like it will still work without hardware virtualization. Seems that is not the case.

Since Windows 7 is already to RTM, if this is a block due to Windows, it isn't going to be fixed anytime soon. So hopefully they can do something in the Virtual PC side of the equation, or they are going to disappoint a lot of unknowing developers.

This just became a MAJOR blocking issue for many dev shops that are using Virtual PC for isolated testing.

If this concerns you, then I recommend you download Intel's Processor Identification Utility so you can check to see if your dev environment is capable of running hardware virtualization.

Failing to do so might get you stuck like I did, now having me decide if I want to degrade back to Windows Vista just to get work done. There goes another day to prep my main systems again. *sigh*

UPDATE: Fellow MVP Bill Grant has provided me a solution to my delimma. It appears the issue is because Virtual PC 7 (beta), a built in component for Windows 7 when installed, is causing the blocking issue. By going into "Turn Windows features on or off" and removing Virtual PC support (and effectively removing XP mode support), Virtual PC 2007 can then be installed on machines that do not have hardware virtualization support.

This isn't the most optimal behaviour, but acceptable. Since without VT support in my CPU I can't use XP mode anyways, removing it does not limit WIndows 7 from functioning. I have reported to Microsoft on this odd behaviour since:

  • Virtual PC 7 and XP Mode simply shouldn't be installing if my CPU isn't supported

  • When the Customer Experience dialog pops up there is an option to "Check for Solutions Online". This is a PERFECT time where they could explain to uninstall Virtual PC 7 and XP mode support built into Windows 7 so Virtual PC 2007 will not block. Right now it reports that no solution is available.

So if you do NOT have VT support in your CPU, please uninstall Virtual PC 7 support if you installed it. VPC 2007 will then properly install for you.

nod32 full download full nod32 download est nod32 serial 64 bit nod32

Libratone Zipp is the first and only AirPlay speaker that doesn?t need a Wi-Fi network

Libratone Zipp is the first and only AirPlay speaker that doesn?t need a Wi-Fi networkApple?s (AAPL) wireless AirPlay technology beats Bluetooth for two reasons. First, it can stream audio in uncompressed CD-quality. And second, unlike Bluetooth speakers that only work within 30 feet of a paired device, AirPlay speakers work over Wi-Fi, so distance is not a problem. But what happens when a Wi-Fi network is not available? Libratone?s 10.2-inch tall and 4.8-inch wide (diameter) battery-powered Zipp AirPlay speaker is here to solve the problem. Instead of using a router-based Wi-Fi network, it connects to any iOS device, Mac or PC by creating a direct Wi-Fi network using Libratone?s PlayDirect technology. What about sound quality? The Zipp?s 360-degree cylindrical design is supposed to?disperse sound in all directions.? The only kicker is that the Zipp


nod32 full indir nod32 full download full nod32 download

26 Eylül 2012 Çarşamba

Trojan-Downloader:OSX/Flashback.B

Trojan-Downloader:OSX/Flashback.B poses as a Flash Player installer, and connects to a remote host to obtain further installation configuration and files.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Chase site hiccups following similar Bank of America issues

Warning posted to Pastebin promises attack on Bank of America because of controversial anti-Islam movie, but there's no evidence the problems with the bank sites are related.

eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler

Full Analysis of Flame's Command & Control servers

Our previous analysis of the Flame malware, the advanced cyber-espionage tool that's linked to the Stuxnet operation, was initially published at the end of May 2012 and revealed a large scale campaign targeting several countries in the Middle East.

The Flame malware, including all of its components, was very large and our ongoing investigation revealed more and more details since that time. The news about this threat peaked on 4th June 2012, when Microsoft released an out-of-band patch to block three fraudulent digital certificates used by Flame. On the same day, we confirmed the existence of this in Flame and published our technical analysis of this sophisticated attack. This new side of Flame was so advanced that only the world's top cryptographers could be able to implement it. Since then, skeptical jokes about Flame have disappeared.

Later in June, we definitively confirmed that Flame developers communicated with the Stuxnet development team, which was another convincing fact that Flame was developed with nation-state backing.

We also published our analysis of the Flame command-and-Control (C&C) servers based on external observations and publicly available information. That helped our understanding of where the C&C servers were located and how they were registered.

With this blog post, we are releasing new information that was collected during forensic analysis of the Flame C&C servers. This investigation was done in partnership with Symantec, ITU-IMPACT and CERT-Bund/BSI.

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download

Backdoor:OSX/Imuler.A

Backdoor:OSX/Imuler.A contacts a remote server for instructions; it may then steal files or capture a screenshot of the infected computer system, which is then forwarded to the remote server.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Not Just Clowns, But Criminals

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

iPhone 4S, Samsung Galaxy S3 hacked in contest

Researchers demonstrate how to remotely attack the mobile devices as part of mobile Pwn2Own contest at security conference.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Nintendo Wii U to launch with 23 games on November 18th

Nintendo Wii U to launch with 23 games on November 18thWhat games will buyers be able to pick up for the Nintendo (NTDOY) Wii U when it launches on November 18th? As promised by Nintendo, the console will see a diversified lineup of 23 launch games that?ll cater to both hardcore and casual gamers. In addition to the 23 games that will be available for purchase on launch day, Nintendo also revealed the 29 other ?launch window? games that will trickle in between November 18th and March 2013. Nintendo will sell the Wii U in two bundles: a ?Basic Set? that includes white console and controller with 8GB of internal storage for $299.99 and a ?Deluxe Set? with a black console and 32GB of storage for $349.99. Wii U software


nod32 esed nod32 indir nod32 nod32 güncel key

Insight: Italy's slow Internet set for reboot

Man looks at his iPhone in RomeMILAN/PARIS (Reuters) - IMM Hydraulics, a small exporter of hoses for industries such as agriculture and mining, is the kind of firm that should be at the center of Italy's efforts to rekindle its stagnant economy. Instead, the company, located in the Abruzzo region of central Italy, is wrestling with a basic impediment to profitability: a woefully slow broadband connection. With just 2 megabits (MB) per second, IMM Hydraulics' broadband connection lags behind the 5 MB typical in Italian cities, which in turn is well behind an average of 12 MB in France and 16 MB in Germany. ...


nod32 full download full nod32 download est nod32 serial

Impressions: Three "Internals" Books for Security

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

Bromium secures computers by holding apps in isolation

New security software separates apps and their processes from the operating system to keep attacks at bay.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Insight: Italy's slow Internet set for reboot

Man looks at his iPhone in RomeMILAN/PARIS (Reuters) - IMM Hydraulics, a small exporter of hoses for industries such as agriculture and mining, is the kind of firm that should be at the center of Italy's efforts to rekindle its stagnant economy. Instead, the company, located in the Abruzzo region of central Italy, is wrestling with a basic impediment to profitability: a woefully slow broadband connection. With just 2 megabits (MB) per second, IMM Hydraulics' broadband connection lags behind the 5 MB typical in Italian cities, which in turn is well behind an average of 12 MB in France and 16 MB in Germany. ...


esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir