30 Kasım 2012 Cuma

Backdoor:OSX/DevilRobber.A

Backdoor:OSX/DevilRobber.A silently installs applications related to Bitcoin-mining; it may also harvest data from the infected machine and listen for additional commands from a remote user.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Anonymous escalates its 'cyberwar' against Israel

The hacking collective's latest campaign against Israel escalates, with defacements of Microsoft Israel Web sites and the publication of alleged donors to a pro-Israel group.

esed nod32 4 nod32 esed nod32 indir nod32

Stealing currency permits from the Government

Right after the Venezuelan presidential elections cybercriminals launched a new credential stealing malware joined by a social engineering campaign saying that supposedly the last election was a fraud. The name of the malicious file is �listas-fraude-electoral.pdf.exe� which is translates to �Fraud elections lists� and it spread via a fake Globovision Venezuelan news TV station. The mentioned malware is quite simple and it sets out to disable the UAC system, which allows the criminals to run administrative commands under restricted users accounts. C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f

est nod32 key esed nod32 serial esed nod32 antivirus

Thoughts on Lessons from Our Cyber Past: The First Cyber Cops

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

5 ways to avoid pulling a Petraeus

When it comes to keeping your e-mail private, it's not hard to be smarter than the former director of the CIA. Here are five easy tips for avoiding David Petraeus' missteps.

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

Samsung printers vulnerable to hackers

Certain printers made by the company have a hardcoded account that leaves them open to incursions.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Spyware:Android/Flexispy.K

Spyware:Android/Flexispy.K is a commercially available monitoring program.

esed nod32 keyleri esed nod32 key esed nod32 keys

A race against the spammers

A few days ago, the latest VBSpam results were published. The testing, conducted by Virus Bulletin in August, saw Kaspersky Linux Mail Security 8.0 detect 99.93% of all the spam messages used in the test. This is a new record for Kaspersky of which we are very proud (if the number of congratulatory emails flying back and forth between us is anything to go by). Eugene Kaspersky also mentioned the result in his blog (http://eugene.kaspersky.com/2012/09/27/kaspersky-server-anti-spam-no-longer-the-underdog-more-top-dog/)  - he’s proud of us too :)

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

KSN: An Analysis of Web Browsers

Today, cybercriminals are quick to exploit vulnerabilities in Adobe Reader, Flash and Java to infect users’ computers. There is a simple reason for this popularity: exploits of vulnerabilities found in these products can infect computers regardless of which operating systems and browsers are used on the attacked machines. We assumed that the threats posed to users were unaffected by their choice of browser and undertook a little research to test this assumption.

Picture courtesy of the PCMAG website

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Australian police swoop on suspected credit card ring

http://en.wikipedia.org/wiki/Australia

Police have swooped on a Romanian hacking ring accused of being behind Australia's largest credit card fraud.

The gang is alleged to have stolen half a million banking details and cashed out some $30 million in goods from 30,000 credit cards.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

VB2012 day 2

One of the things I don�t like from conferences is when there are two talks you want to attend scheduled at the same time. And this is what happened to me in VB2012.

Fortunatelly David was on the stage for a whole hour, so I attended his first half and then I switched to Fabio�s talk.

esed nod32 indir nod32 nod32 güncel key

Israel government Web sites hit by hacker blitz

Government says its Web sites have experienced 44 million hacking attempts but only one successful breach.

64 bit nod32 esed nod32 4 nod32 esed nod32

Trojan:W32/Ransomcrypt

Trojan:W32/Ransomcrypt is ransomware that encrypts files on the affected computer and demands payment in order to provide a password decrypting the affected files.

est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce

Samsung printers vulnerable to hackers

Certain printers made by the company have a hardcoded account that leaves them open to incursions.

nod32 full download full nod32 download est nod32 serial 64 bit nod32

Military judge sets terms for possible Manning plea

The ruling establishes how alleged Wikileaking Army private Bradley Manning could plead guilty to seven charges and face up to 16 years in prison.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel

How to stay safe when holiday shopping online

Ready or not, holiday shopping season is upon us, and many of us will be buying gifts online. We've put together some tips to help get you safely through your shopping list.

nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri

U.N. nuclear agency, Israel news agency hacked

http://en.wikipedia.org/wiki/International_Atomic_Energy_Agency

The website of an international nuclear relations group has been breached, allowing perpetrators to spill sensitive information contained in a server.

The Vienna-based International Atomic Energy Agency (IAEA), which reports to the U.N. about nuclear cooperation among nations, confirmed the breach, according to a Tuesday Reuters article. On Sunday, a hacker collective calling itself ?Parastoo? published the stolen data on Pastebin, which included email addresses of more than 100 individuals who work with the watchdog group.

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

Known keycard hack suspected in hotel room burglary

A security bypass demonstrated at the BlackHat conference in July appears to have been utilized in at least one burglary, Forbes reports.

nod32 guncel key güncel key nod32 full nod32 esed nod32 keyleri

29 Kasım 2012 Perşembe

iPhone faces a real challenge as Android app revenue surges

iPhone faces a real challenge as Android app revenue surgesOne of the big mobile content stories of 2012 is how nimbly Google (GOOG) has been able to revive the fortunes of the Android app market, particularly in Asia. On October 24th, we wrote about how AppAnnie statistics highlighted sizzling Google Play revenue growth in South Korea. This might have been interpreted as a side effect of Samsung?s (005930) powerhouse status in Korean handset market. Now AppAnnie is reporting that Google Play revenue growth in the last month was 17.9% globally while iOS app revenue actually shrunk by 0.7%. As one symptom of Android app resurgence, Google Play has now overtaken iOS in Japanese revenue rivalry. This despite the fact that the iPhone is remarkably popular in Japan. Over a


esed nod32 key esed nod32 keys est nod32 key

Is Twittering safe?

So Susan has been on my case about Twitter for some time now. In a recent round table we were recording she "beat me up" about it, and tonight on IM we had a good discussion about the REAL vs PERCEIVED risks in Twitter.

Susan's biggest complaint is that security minded individuals shouldn't be blindly recommending the use of Twitter without educating the user on 'safe-twittering'. I would say that same logic exists for setting up web pages, blogs and the use of social networking sites like Facebook.

She stepped that up a bit tonight when she blogged her discomfort in the fact the RSA Conference was recommending Twitter as well.

So in an effort to stop spreading the FUD about Twitter insecurity, I wanted to share some of my thoughts through a quick set of safe twittering rules.

@DanaEpp's 5 Rules of Safer Twittering


  • Never share information in a tweet that you wouldn't share with the world. You can never expect to take it back once it's on the Internet. Even though you can delete a tweet, 3rd party clients may still have it archived. If you feel you want to share private thoughts through Twitter, consider using a "Private Account" and limited it to only people you trust and want to share with. Of course, remember nothing prevents your friends from sharing your tweets with the world. So never share private information on Twitter. Ever. it's just easier that way.
  • There is no assurance that a Twitter account is the person you believe it is. Deal with it. Anyone can register an account if it doesn't already exist. As a real world example, for some time @cnnbrk was NOT an official CNN account, even though most of the Twitter world thought it was. It wasn't until recently that CNN bought the account from James Cox (the account holder) for an undisclosed amount of money. Another example is the fact that one of Susan's Twitter accounts was actually created by a fellow SBS MVP, and not actually her. :-)
  • Never click on links in a tweet, unless you trust the URL. If unsure, don't click! The worms that were used to attack Twitter came from people getting users to go to profile pages etc that they had control over for some interesting script attacks. With only 140 chars, its common to "shorten" the URL. Which means you might be clicking on a link blind. That's fine. But only trust shortened URLs that can be previewed BEFORE you go to it. As an example, my recommendation is to use something like TinyURL. However, here is the trick. When you create a TinyURL, use the preview mode. As an example, if you want to send someone to my blog you can use http://tinyurl.com/silverstr to go directly. However, if you use http://preview.tinyurl.com/silverstr it will stop at TinyURL.com and let the user SEE the link before they actually get to it. That is much safer. If using TweetDeck, select TinyURL as the provider, and when it creates the shortened url, simply add "preview." in front of "tinyurl.com".
  • Use a 3rd party Twitter client instead of using the Twitter.com website directly. I am a fan of TweetDeck and Twitterfon, but there are tons of different clients out there. Why? It is the lesser of two security evils as it relates to web based attacks in Twitter. Most clients have ways to reduce or turn off linking, prevents the script attacks in profile viewing and generally is just an easier environment to stay protected in. Are these clients free of attack? Of course not. But its another layer of defense. Of course... you need to have trust in your client. But that's a story for another day ;-)
  • You never know who is following you. Remember that. As you use Twitter more and more, you never know who might be watching. I recently had someone who has been trying to get an interview with me who follows me on Twitter, knew where I was having coffee one day because of a tweet I wrote (and it's geotag) and ended up coming down to confront me with his resume. Which was inappropriate in my books. But my own fault. I wasn't too concerned.. but it definitely gave me pause when considering my daughter uses Twitter and could be as easily found. Nothing like the potential of being stalked. GeoTagging makes it way to easy to find you. Remember that.

Look, Twitter is addictive. Simple. Short. Fast. A great way to see the thoughts of others you might care about. Ultimately though... like any other Internet based technology it has the potential to be abused... and put you at risk. No different than websites or blogs.

So be careful. Follow these rules and enjoy the conversation!

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

Known keycard hack suspected in hotel room burglary

A security bypass demonstrated at the BlackHat conference in July appears to have been utilized in at least one burglary, Forbes reports.

esed nod32 4 nod32 esed nod32 indir nod32

Apple to sell unlocked iPhone 5 handsets beginning Thursday night

Apple to sell unlocked iPhone 5 handsets beginning Thursday nightApple (AAPL) has�already accidentally leaked its unlocked iPhone 5 pricing and now 9to5Mac?s sources say the contract-free smartphones will be available for purchase on the online store as early as Thursday night at 9 p.m. Apple retail stores are reportedly receiving stock for the unlocked iPhone 5�and will begin selling them ?soon.? As previously reported, the factory unlocked GSM iPhone 5 handsets will be priced at $649 (16GB), $749 (32GB) and $849 (64GB) and will be available in white/silver and black/slate. Of course, if you didn?t already know, the�CDMA iPhone 5 on�Verizon�(VZ) comes with its�nano SIM card already unlocked.�9to5Mac�also reports Apple Stores will make a small change to its Personal Pickup program that lets shoppers reserve devices for pickup after


nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Trojan-Downloader:OSX/Flashback.A

Trojan-Downloader:OSX/Flashback.A poses as a Flash Player installer, and connects to a remote host to obtain further installation configuration and files.

nod32 guncel key güncel key nod32 full nod32

Backdoor:W32/Knockex.A

A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.

nod32 keyler nod32 key esed nod32 download nod32 serialleri

U.N. nuclear agency, Israel news agency hacked

http://en.wikipedia.org/wiki/International_Atomic_Energy_Agency

The website of an international nuclear relations group has been breached, allowing perpetrators to spill sensitive information contained in a server.

The Vienna-based International Atomic Energy Agency (IAEA), which reports to the U.N. about nuclear cooperation among nations, confirmed the breach, according to a Tuesday Reuters article. On Sunday, a hacker collective calling itself ?Parastoo? published the stolen data on Pastebin, which included email addresses of more than 100 individuals who work with the watchdog group.

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

U.N. nuclear agency, Israel news agency hacked

http://en.wikipedia.org/wiki/International_Atomic_Energy_Agency

The website of an international nuclear relations group has been breached, allowing perpetrators to spill sensitive information contained in a server.

The Vienna-based International Atomic Energy Agency (IAEA), which reports to the U.N. about nuclear cooperation among nations, confirmed the breach, according to a Tuesday Reuters article. On Sunday, a hacker collective calling itself ?Parastoo? published the stolen data on Pastebin, which included email addresses of more than 100 individuals who work with the watchdog group.

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

Hackers steal and publish e-mails from U.N. nuclear agency

The IAEA confirms its servers were breached and a hacking group claims responsibility demanding an investigation into Israel's alleged nuclear proliferation program.

esed nod32 4 nod32 esed nod32

KSN: An Analysis of Web Browsers

Today, cybercriminals are quick to exploit vulnerabilities in Adobe Reader, Flash and Java to infect users’ computers. There is a simple reason for this popularity: exploits of vulnerabilities found in these products can infect computers regardless of which operating systems and browsers are used on the attacked machines. We assumed that the threats posed to users were unaffected by their choice of browser and undertook a little research to test this assumption.

Picture courtesy of the PCMAG website

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

A race against the spammers

A few days ago, the latest VBSpam results were published. The testing, conducted by Virus Bulletin in August, saw Kaspersky Linux Mail Security 8.0 detect 99.93% of all the spam messages used in the test. This is a new record for Kaspersky of which we are very proud (if the number of congratulatory emails flying back and forth between us is anything to go by). Eugene Kaspersky also mentioned the result in his blog (http://eugene.kaspersky.com/2012/09/27/kaspersky-server-anti-spam-no-longer-the-underdog-more-top-dog/)  - he’s proud of us too :)

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

Rootkit:W32/ZAccess

Rootkit:W32/ZAccess constantly displays advertisements on the infected machine and may silently contact remote servers to retrieve additional advertising information.

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

Commander's Reading List

esed nod32 download nod32 serialleri esed nod32 indir

Understanding Responsible Disclosure of Threat Intelligence

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

Exploit:W32/CVE-2010-0188.B

Exploit:W32/CVE-2010-0188.B identifies malicious PDF files downloaded by the Blackhole exploit kit that exploit a known vulnerability.

indir com nod32 nod32 keyleri nod32 keyler nod32 key

Commander's Reading List

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

28 Kasım 2012 Çarşamba

Backdoor:OSX/DevilRobber.A

Backdoor:OSX/DevilRobber.A silently installs applications related to Bitcoin-mining; it may also harvest data from the infected machine and listen for additional commands from a remote user.

nod32 key esed nod32 download nod32 serialleri

Trojan-Downloader:OSX/Flashback.B

Trojan-Downloader:OSX/Flashback.B poses as a Flash Player installer, and connects to a remote host to obtain further installation configuration and files.

64 bit nod32 esed nod32 4 nod32 esed nod32

Serious Google security glitch restores Webmaster Tools, possibly Analytics access to revoked accounts

http://cdn.thenextweb.com/wp-content/blogs.dir/1/files/2012/11/Screen-Shot-2012-11-27-at-5.01.33-PM-645x250.jpg

Earlier tonight, reports began rolling in of a serious breach in Google accounts security. Some sort� of glitch has granted access to Webmaster Tools, Google Analytics and perhaps even more tools to users who previously had access, but then had that access revoked.

eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler

Do Devs Care About Java (In)Security?

indir com nod32 nod32 keyleri nod32 keyler nod32 key

BoteAR: a �social botnet�? What are we talking about?

In information security, talk about botnets equals talk about malicious actions that materialize through criminal action. In essence, we think there is always a hostile attitude on the part of those who administer them. Please correct me colleagues, refute this if I'm wrong, but I think conceptually you agree with me.

BoteAR (developed in Argentina) adopts the concept of "social networks" although it seems, as yet, not fully materialized. It offers a conventional and manageable botnet via HTTP but uses the model of crimeware-as-a-service. Moreover, the author seems to adopt (maybe unknowingly) the business model of affiliate systems originating in Eastern Europe which are used to spread malware i.e. infect and get revenue for each node you infect.

So far nothing unusual, unfortunately we witness this kind of tactic every day. The striking thing about BoteAR though is that it tries to shield itself under a wrapper of security in an attempt to "fraternize" with its community.

nod32 key esed nod32 download nod32 serialleri

Stealing currency permits from the Government

Right after the Venezuelan presidential elections cybercriminals launched a new credential stealing malware joined by a social engineering campaign saying that supposedly the last election was a fraud. The name of the malicious file is �listas-fraude-electoral.pdf.exe� which is translates to �Fraud elections lists� and it spread via a fake Globovision Venezuelan news TV station. The mentioned malware is quite simple and it sets out to disable the UAC system, which allows the criminals to run administrative commands under restricted users accounts. C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

Backdoor:W32/Knockex.A

A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

Exploit:W32/CVE-2011-3402.A

Exploit:W32/CVE-2011-3402.A is a Generic Detection that identifies malicious files which exploit a known vulnerability various Windows operating system versions.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

My Role in Information Warfare during the Yugoslav Wars

güncel key nod32 full nod32 esed nod32 keyleri

Powerball Photo Fever! 5,000 Players Instagram Their Tickets

Powerball Photo Fever! 5,000 Players Instagram Their TicketsIf you needed a reason not to buy a ticket for Wednesday's $500 million-plus Powerball lottery, here are a few. In fact, here are 5,000 -- roughly, the number of people who have taken pictures of their tickets on the popular photo-sharing service Instagram with the hashtag #powerball.


full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

Anonymous targets Israeli Web sites in protest over Gaza

The hacking collective knocks the Bank of Jerusalem offline and attacks the site of the Ministry of Foreign Affairs. Anonymous claims nearly 700 sites have been affected.

indir com nod32 nod32 keyleri nod32 keyler nod32 key

New Android apps worth downloading: Skype and GTA Radio updates, Avengers Initiative

Skype received an update that makes it better for tablet users and stomps out a few bugs, and GTA Radio added more content from the beloved Grand Theft Auto video game series to bring you some hilarious radio shows and great music. Finally, Avengers Initiative will give you some stuff for The Hulk to smash.

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Exec embroiled in HP-Autonomy mess lashes out

An executive vilified by Hewlett-Packard Co. on allegations of an accounting ruse is escalating his counter-attack on the company accusing him.

est nod32 key esed nod32 serial esed nod32 antivirus

Second person guilty in AT&T iPad prank hack

http://en.wikipedia.org/wiki/AT%26T

A hacker who helped publicize a vulnerability on AT&T's website, which affected more than 100,000 iPad 3G owners, has been convicted in federal court.

Andrew Auernheimer was found guilty last week of two charges: identity fraud and conspiracy to violate the Computer Fraud and Abuse Act (CFAA). But the ruling has caused many in the tech community to question the rights of individuals who share security flaws with the public.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Trojan:Android/DroidKungFu.C

Trojan:Android/DroidKungFu.C forwards confidential details to a remote server.

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

Trojan:Android/AutoSPSubscribe.A

Trojan:Android/AutoSPSubscribe.A is a malicious app that targets Android users in China, and is distributed through unofficial markets.

est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce

27 Kasım 2012 Salı

China cyber-espionage threatens U.S., advisory group warns

In its 2012 report, the U.S.-China Economic and Security Review Commission urges Congress to fully investigate China's cyber-espionage campaigns.

eset nod32 guncel key eset nod32 güncel key indir com nod32

Backdoor:OSX/Sapbap.A

Backdoor:OSX/Sabpab.A connects to a remote server to receive further instructions, without the knowledge or permission from the user.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Trojan-Downloader:OSX/Flashback.I

Trojan-Downloader:OSX/Flashback.I connects to a remote site to download its payload; on successful infection, the malware redirects web traffic.

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

Lottery fraudsters freshen up their repertoire

Earlier, we wrote about the tricks that fraudsters often use on their gullible victims. There’s a prize for you, just pay a small fee to open a bank account (or transport costs, bank fees, overheads etc.), and you will be a millionaire! Sounds familiar, doesn’t it? However, old tricks become stale over time, and readers become alert and suspicious to them. So, the fraudsters have come up with a new variation of an old scam.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

iOS dictionary app accuses customers of piracy via Twitter

http://cdn.gizmocrazed.com/wp-content/uploads/2012/08/oxford-dictionary1.jpg

In a blog posting, author Jenn Frank reports that the Oxford Dictionary of English iPhone/iPad app, which retails for �20.99 (or ?26.99) , accuses legitimate buyers of being software pirates. Apparently, the app's flawed DRM feature automatically tweets "How about we all stop using pirated iOS apps? I promise to stop. I really will" to the dictionary user's Twitter followers. Frank says that the message "I am a software thief!" is pushed to the iPhone's lock screen at the same time.

esed nod32 keys est nod32 key esed nod32 serial

Welcome to the Twisted Age of the Twitter Death Threat

Welcome to the Twisted Age of the Twitter Death ThreatNever believe anyone who tells you that the Internet is all nice or all terrible. Just like real life, there are good people and bad ones here. The majority of people behave badly occasionally and decently most of the time. Yes, there are some truly horrible people lurking and behaving in ways consistent to their form, but the thing is, we're complicated creatures, online and off. So I don't buy into theories that the Internet is all nice anymore than I believe all commenters are trolls. ...


nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

Exploit:Java/CVE-2012-4681.H

Exploit:Java/CVE-2012-4681.H identifies malicious Java Archive (JAR) files that exploit a known vulnerability.

nod32 full indir nod32 full download full nod32 download est nod32 serial

Monitoring-Tool:Android/SimChecker.A

Monitoring-Tool:Android/SimChecker.A collects geolocation and other device information, and sends out this information via SMS messages and e-mails.

nod32 keyler nod32 key esed nod32 download nod32 serialleri

Samsung's Factory Abuse Has Officially Gone Far Enough

Samsung's Factory Abuse Has Officially Gone Far EnoughNow that labor watchdog groups have started complaining about the poor working conditions in Samsung's Chinese factories, maybe the South Korean electronics�behemoth will make changes to the too-long hours and too-little pay�we've known about for months. A September audit brought all that just-as-bad-as-Apple-and-Foxconn stuff ? including 16-hour work days, with one day off per month ? to the attention of the world and, apparently, to Samsun.�Since then, the company seems to have done little to nothing to change the situation. ...


nod32 full download full nod32 download est nod32 serial

Apple has top U.S. smartphone, passes Google: research firm

An Apple iPhone 5 phone is displayed in the Apple Store on 5th Avenue in New YorkHELSINKI (Reuters) - Early success for the iPhone 5 smartphone has helped Apple to overtake Google's Android software in the United States, research firm Kantar WorldPanel said on Tuesday. Apple's U.S. share of smartphone sales in the 12 weeks to October 31 more than doubled from a year ago to 48.1 percent, putting it within reach of the record 49.3 percent it managed in early 2012. Android's share dropped to 46.7 percent from 63.3 percent, Kantar WorldPanel's data showed, but it continues to dominate in key European markets. ...


est nod32 serial 64 bit nod32 esed nod32 4 nod32

Coding Tip: Why you should always use well known SIDs over usernames for security groups

So have you ever tried to restrict access to your applications in a way so that you can maintain least privilege?

I do. All the time. And recently it blew up in my face, and I want to share my experience so others can learn from my failure.

Let me show you a faulty line of code:


if( principal.IsInRole( "Administrators" ) )

Seems rather harmless doesn't it? Can you spot the defect? Come on... its sitting right in the subject of this post.

Checking to see if the current user is in the "Administrators" group is a good idea. And using WindowsPrincipal is an appropriate way to do it. But you have to remember that not EVERYONE speaks English. In our particular case, we found a customer installed our product using English, but had a user with a French language pack. Guess what... the above code didn't work for them. Why? Because the local administrators group is actually "Administrateurs".

The fix is rather trivial:


SecurityIdentifier sid = new SecurityIdentifier( WellKnownSidType.BuiltinAdministratorsSid, null );
if (principal.IsInRole(sid))

By using the well known SID for the Administrators group, we ensure the check regardless of the name or language used.

Lesson learned the hard way for me. We have an entire new class of defect we are auditing for, which we have found in several places in our code. it always fails securely, NOT letting them do anything, but that's not the point. It is still a defect. Other accounts we weren't considering were "Network Service" (its an ugly name on a German target) and "Guest". Just to name a few.

Hope you can learn from my mistake on that one. That's a silly but common error you may or may not be considering in your own code.

eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri

Trojan:W32/Yakes

Trojan:W32/Yakes variants attempt to connect to and download files from remote servers.

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

VB2012 day 2

One of the things I don�t like from conferences is when there are two talks you want to attend scheduled at the same time. And this is what happened to me in VB2012.

Fortunatelly David was on the stage for a whole hour, so I attended his first half and then I switched to Fabio�s talk.

esed nod32 serial esed nod32 antivirus nod32 turkce

KSN: An Analysis of Web Browsers

Today, cybercriminals are quick to exploit vulnerabilities in Adobe Reader, Flash and Java to infect users’ computers. There is a simple reason for this popularity: exploits of vulnerabilities found in these products can infect computers regardless of which operating systems and browsers are used on the attacked machines. We assumed that the threats posed to users were unaffected by their choice of browser and undertook a little research to test this assumption.

Picture courtesy of the PCMAG website

güncel key nod32 full nod32 esed nod32 keyleri esed nod32 key

Yahoo Mail hijacking exploit selling for $700

XSS vulnerability allows attacks to steal and replace tracking cookies, as well as read and send e-mail from a victim's account.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Mystery worm scrambles Iranian databases

http://msnbcmedia3.msn.com/j/streams/2012/November/121127/1C4934891-fromkaspersky.streams_desktop_medium.jpg

A new worm that appears to be targeted at Iran seeks to sabotage corporate databases by searching for specific phrases and values and replacing them with random ones.

This latest bug, dubbed the "Narilam" worm, goes after Microsoft SQL databases, according to Symantec, which first uncovered the malicious code.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Google buys Wi-Fi provider ICOA for $400 million

Google has bought an operator of Wi-Fi hotspots in high-traffic locations such as airports, hotels and fast-food restaurants.

nod32 guncel key eset nod32 guncel key eset nod32 güncel key

A race against the spammers

A few days ago, the latest VBSpam results were published. The testing, conducted by Virus Bulletin in August, saw Kaspersky Linux Mail Security 8.0 detect 99.93% of all the spam messages used in the test. This is a new record for Kaspersky of which we are very proud (if the number of congratulatory emails flying back and forth between us is anything to go by). Eugene Kaspersky also mentioned the result in his blog (http://eugene.kaspersky.com/2012/09/27/kaspersky-server-anti-spam-no-longer-the-underdog-more-top-dog/)  - he’s proud of us too :)

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

26 Kasım 2012 Pazartesi

Yahoo Mail hijacking exploit selling for $700

XSS vulnerability allows attacks to steal and replace tracking cookies, as well as read and send e-mail from a victim's account.

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

11 Cyber Monday Deals for iPhone Owners

11 Cyber Monday Deals for iPhone Owners1. Klipsch Image X10 Noise-Isolating Earphone


nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Review of Super Scratch Programming Adventure! Posted

esed nod32 download nod32 serialleri esed nod32 indir

Google buys Wi-Fi provider ICOA for $400 million

Google has bought an operator of Wi-Fi hotspots in high-traffic locations such as airports, hotels and fast-food restaurants.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

Exploit:W32/CVE-2010-0188.C

Summary
Exploit:W32/CVE-2010-0188.C identifies malicious PDF files downloaded by the Blackhole exploit kit that exploit a known vulnerability.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Application:W32/InstallCore

InstallCore is an advertising module that displayed targeted advertising material.

nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Trojan:Android/AutoSPSubscribe.A

Trojan:Android/AutoSPSubscribe.A is a malicious app that targets Android users in China, and is distributed through unofficial markets.

nod32 keyler nod32 key esed nod32 download

Backdoor:OSX/Sapbap.A

Backdoor:OSX/Sabpab.A connects to a remote server to receive further instructions, without the knowledge or permission from the user.

full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

Spam on the Run: Notorious Spammer on the Lam

An indictment charges Alan Ralsky with using illegal e-mail to promote Chinese stock pump-and-dump scheme.

esed nod32 download nod32 serialleri esed nod32 indir nod32 serial

Company Sues Kickstarter Over 3D Printer Patent, Maligns 'Hackers And Makers'

http://i.imgur.com/bLz3I.png

We've been pointing out for a while that one of the reasons why advancements in 3D printing have been relatively slow is because of patents holding back the market. However, a bunch of key patents have started expiring, leading to new opportunities. One, in particular, that has received a fair bit of attention was the Formlabs 3D printer, which raised nearly $3 million on Kickstarter earlier this year. It got a ton of well-deserved attention for being one of the first "low end" (sub ~$3,000) 3D printers with very impressive quality levels.

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys

Microsoft Updates November 2012 - IE, Kernel+Shell, and .NET Critical Patches

Microsoft is patching a fair number of vulnerabilities in their software with 19 flaws being fixed. All of them are being updated in six Bulletins this month (MS12-071 through MS12-076). Four of the Bulletins are rated critical with only two of them being rated urgent for immediate deployment by larger customers concerned with compatibility and performance. At the same time, Internet Explorer 10 is not vulnerable to exploitation by the related set of three flaws, and newly released Windows 8 is affected by yet another font parsing flaw described by CVE-2012-2897, similar to the vulnerability exploited by Duqu. The font malware is especially interesting because the Duqu exploit is currently being included in mass exploitation kits alongside widespread Java and Adobe Reader exploits to spread Ransomware, ZeroAccess, and other trojans of all sorts. Even though Duqu was spread years ago, the patch delivered months ago, the vulnerability continues to be included in the kits and successfully exploited.

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

What to Expect from Climate Negotiations

As the world gathers in Doha, is progress being made in reducing greenhouse gas pollution? David Biello reports

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Petraeus used draft e-mails to communicate with mistress

The former CIA director used a trick often used by terrorists and teenagers to make e-mails harder to trace, the Associated Press reports.

full nod32 esed nod32 keyleri esed nod32 key esed nod32 keys