Friday, November 30, 2012

The Japanese space agency is a victim of the Trojan


Japanese Space Agency Jaxa today announced that with the help of Trojan software unknown attackers stole private data on the latest Japanese space rocket. As reported in Jaxa, computer virus has been detected on the network at Tsukuba Space Center in the northeast of Tokyo. Said malicious code secretly collect and transmit data about the missile beyond Jaxa.

The agency said today that the malicious code was detected by anti-virus software is November 21, the same space agency employees took 'all necessary measures'. Also in Jaxa say spy code was detected in only one space center, the other systems have not been exposed to infection.

An official statement said that while it was unclear whether the virus is available on computers Jaxa employees or hit by cyberattacks. Previously, a number of Japanese military-industrial company claims that have been targets of cyber attacks, the traces of which were in China.

As for the information stolen by malicious code, it is associated with a new missile Epsilon, solid fuel and is a further development of modern Japanese rockets. Independent experts say that Epsilon was originally created as a solution for launching satellites and interplanetary spacecraft, but in principle it could have a dual purpose and be used as an intercontinental ballistic missile.

Epsilon first start is expected in autumn 2013.

Thursday, November 29, 2012

New type of fraud in Instagram


The Symantec corporation reports about detection of the roguish campaign which is carried out by means of the popular Instagram service. Users are invited to subscribe to a paid newsletter video, which, in fact, is in the public domain.

For a long time the object of spammers are social networks. Generally, the activity of spammers on a particular resource increases with its popularity. It appears that the photo-sharing service Instagram has also recently became the target of such scams.

Symantec experts first encountered this when unknown users are allowed to comment on photos users have no connection with the images.

"Hi there, Get a FREE Game in my Profile, OPEN it up, Get 85.90 $ :-) xx"

The profile was not commenting on published any own pictures.

The content of the section "About Me" in this profile was almost identical to the comment, but, in addition, include a shortened link that leads to the site of mobile service. As part of the service "for just € 4.50 per month" proposed sending heartwarming video with animals. To use this service, you had to provide your phone number, then the user would not have to watch the same video on Youtube for free.

App OPSWAT Security Score to evaluate the safety of your PC


OPSWAT Security Score - a free tool that allows you to quickly and easily assess the current level of protection for your computer. After performing rapid and accurate scanning of system you can rest easy knowing that your PC is able to withstand the current threats. If the test results will be less comforting, the program will provide detailed recommendations to address vulnerabilities in the defense.

The application boasts a maximum ease of use. In particular you will not have to spend too much time setting up the parameters. The user only has to run the application, the proposed program to the terms of service (which OPSWAT Security Score honestly warns of gathering statistical information about the used remedies), and click the «Start». After that, in a matter of seconds, the program will analyze your system's security in seven key areas (protection from viruses and phishing, secure file transfers, data backup, manage patches and updates, data encryption and firewall) and display the accurate estimate.

To decrypt the estimates and more information you can flip by sector is shown on screen chart. For example, the reviewers site BetaNews reported that their test system received 20 out of 20 possible points in the category of 'backup' (the computer was found two relevant product Windows Backup and Macrium Reflect). But the available encryption were rated a 5 out of 10. May reduce the assessment facilitated by the fact that the protective mechanism Bitlocker was disabled at the time of inspection.

Wednesday, November 28, 2012

Go Daddy: Theft of our DNS records was carried with the use of phishing


According to the registrar, the incident is not due to the detection of vulnerability management system DNS.

Antivirus company Sophos researchers have discovered that hackers managed to compromise DNS records web-sites on the hosting company Go Daddy. As a result of the incident, a number of portals that are customers of the registrar, redirect your users to malicious resources, which, in turn, contain malicious exploits vulnerabilities.

Operating systems of victims of the attack were infected with malware-extortioners.

When the incident became known to the general public, Go Daddy could not explain exactly how the hackers managed to carry out hacking. But now one of the leaders of the registrar Scott Gerlach said that the reason was the successful hacking phishing attack.

"The Go Daddy recorded a very small number of customer accounts, in which attackers have harmful changes. At the moment, we eliminate these threats as they are discovered. In addition, compromised passwords have been changed - assured Gerlach. - We assume that the victims of the incident was used phishing, or their home computers were infected Cool Exploit ".

Tuesday, November 27, 2012

VIPRE Antivirus: Black Friday/Cyber Monday sale has been extended

Cyber Week - Save Up to 75% on VIPRE



Cyber Week Sale: November 27 12:00AM PST - 30 11:59PM PST, 2012

The Black Friday/Cyber Monday sale has been extended until the end of the week!  Between now and November 30th, customers can save up to 75% on VIPRE products. All VIPRE consumer desktop products and licensing options will be on sale.

Customers can get:
- VIPRE Antivirus 2013 for as little as $9.99 (1PC/1Year);
- VIPRE Internet Security 2013 for as litlr as $19.99 (1PC/1Year).


December "End of Days" Giveaway/Sale - Update
December 5-21, 2012

We have updated the date of the 'End of Days' sale to begin on December 5th.

In Europe and the United States have closed more than 130 counterfeit websites


EU law enforcement agencies and the U.S. on Monday conducted an operation Cyber ​​Monday in which 132 were closed site who sold counterfeit goods. "These resources are designed to steal from legitimate sellers and owners, as well as people who want to buy the genuine article," - said the head of the U.S. Customs Service, John Morton.

According to him, executed operation was implemented by the National Center for Coordination of Intellectual Property Rights, part of the U.S. Customs Service, U.S. Department of Homeland Security, and the police agencies of Belgium, Denmark, France, Romania, the UK and the European police force Europol.

Blocked resources were selling a wide range of fake goods, from children's car seats and shoes to jewelry. Among the brands that are counterfeited and sold are called McAfee, Symantec, Armani, Guess, Burberry, Chanel, Gucci, Lacoste, Dior, Tommy Hilfiger, Versace, YSL and Michael Kors. Sites-sellers were located in domain areas. Eu,. Be,. Dk,. Fr,. Ro and. Uk.

"This operation - an example of the excellent cooperation between the security agencies of the United States and Europe. We believe that counterfeiting - is a global problem and the need to deal with it at the international level," - said in a joint statement.

Monday, November 26, 2012

Symantec experts found SQL-virus aimed at Iran


Found in the 'wild' virus got internal designation W32.Narilam


The company announced the discovery of a new virus that targets the Iranian computer systems and databases within these systems.

Messages about the virus first appeared on November 15, and the company Symantec said its low hazard. More interesting were the data on the location of virus detection Narilam - most copies were found in Iran, and other isolated cases of infection reported in the UK, in the continental U.S. and Alaska.

It is noteworthy that the new virus Narilam has many similarities with the infamous virus Stuxnet, which has led to large-scale man-made disaster in the factory for uranium enrichment in Iran. Like Stuxnet, which disrupted enrichment centrifuges by implementing a control program, the virus Narilam is a worm that spreads through removable drives and network shares.

When the virus enters Narilam on the victim, he first searches the database Microsoft SQL. The virus searches in these databases for certain keywords, including, in Persian (Farsi), the official language of Iran. Elements found virus replaces a randomly generated value or destroy certain data fields. In particular, the virus searches and replaces words such as 'hesabjari' (current account), 'pasandaz' (account balance) and 'asnad' (debts).

Saturday, November 24, 2012

BitDefender Total Security 2013 Christmas Deals


November deals for the Christmas sale are available

Holiday promotions for best Antiviruses and Security Software 2013. Save money on hot deals and discounts on Christmas. Curent promotion: Black Friday / Cyber Monday Sales!

Here we provide Christmas great discount for BitDefender Total Security 2013: 1PC/1Year, free 6 months, 3PCs/1Year, free 3 months, 3PC/2Years. Buy now and save up tu $60 today! Promotion till end Dec 2012.

Bitdefender's excellent performance was confirmed again in September with the latest results from independent testing. We decided on Bitdefender Total Security 2012 for its top-rated security, its low impact on your computer's performance, and its excellent range of features.


BitDefender Total Security 2013 1PC/1Year, free 6 months

Now Christmas Discount Price only: $45.47 ($24.48 discount)

Friday, November 23, 2012

Black Friday/Cyber Monday Sale: VIPRE Internet Security 2013 for as little as $19.99

Protect your PC against viruses, spyware and malware for as little as $19.99. Or get VIPRE  Internet Security as a holiday gift! Deal ends November 26.

VIPRE Internet Security is the only antivirus to prevent the number one cause of PC infections: out-of-date software, with its groundbreaking Easy Update tool. Exclusive features in VIPRE Internet Security 2013: Easy Update – Automatically updates out-of-date versions of Java, Adobe and other non-Windows software,  Bad website blocking – Protects against malicious URLs and phishing websites.


VIPRE Internet Security Black Friday/Cyber Monday Sale

Internet Security 2013 1year / 1PC

Regular price: $49.99 USD

Now best price only: $19.99 USD

Duration Black Friday/Cyber Monday deal - November 23 12:00AM EST - 26 11:59PM EST, 2012

Facebook - changes to Privacy Policy


Regulators want to test the new rules provide users with data for compliance with European law.


Irish regulators have demanded that the administration of the social network Facerbook immediately explained the changes of security policy.

Under the new rules, which the administration of the social network announced on Wednesday, November 21, customers can get more detailed information on their own data, stored on the servers of the social network, including more control messages and reminders.

According to news agency Bloomberg, the Irish representative control agencies Gary Davis sent to the office of social networks demand for an immediate explanation of the new rules. "If the proposed changes require a certain agreement with the EU, we will demand that Facebook had agreed on a new policy of confidentiality" - sends the publication to the expert.

Recall that the Irish office Facebook is responsible for all users of social networks in the European Union.

Narilam - new worm aimed at Iran


Narilam is a worm that spreads through removable storage devices and resources available in the network to infect databases SQL.

Symantec discovered a new malicious program Narilam, which aims mainly at Iran's computer systems and uses its data base of the SQL.

The researchers found that Narilam has some similarities to the virus Stuxnet, which was used in an attack on Iran's industries. Like Stuxnet, Narilam is a worm that spreads through removable drives and shared network resources.

When Narilam enters the system, it will search the database Microsoft SQL. After their discovery the virus searches for certain words, most of them in Persian. Subsequently malware replaces elements in a database with random values ​​or remove specific field.

"The functions of the malicious program does not include the theft of information from infected systems, and possibly a virus programmed specifically to damage the data stored in the target database," - says the company Symantec Shunichi Imano.

The expert notes that Narilam targets the databases associated with the orders, accounting, or systems that manage customer information.

Black Friday/Cyber Monday Sale: VIPRE Antivirus 2013 for as little as $9.99

VIPRE Antivirus 2013 for as little as $9.99

Protect your PC against viruses, spyware and malware for as little as $9.99. Or give VIPRE antivirus software as a holiday gift! Deal ends November 26.

VIPRE Antivirus 2013: Virus prevention that won't slow you down, VIPRE Antivirus 2013 is the all-in-one security solution that protects against identity thieves, spammers, hackers and cybercriminals to keep your PC safe without impacting performance. From always-on Active Protection™ that scans for threats in real time to protection against email-borne viruses, VIPRE Antivirus 2013 features provide essential PC security.

Black Friday/Cyber Monday Great Discount (Promotion expired)


VIPRE NEW PROMOTION


VIPRE Internet Security 2013 Christmas and New Years Sales Great Discount

Now through January 31, 2013 all customers who purchase one year of VIPRE Internet Security will get a second year free!


VIPRE Internet Security 2013 1PC - 2Years Regular price: $69.99
Buy now for just $49.99 instead of $69.99 and save $20.00

VIPRE Internet Security 2013 2-10PC - 2Years Regular price: $99.99
Buy now for just $69.99 instead of $99.99 and save $30.00


Duration deal - December 21, 2012 - January 31, 2013

Wednesday, November 21, 2012

AVG releases a new version of the browser Family Safety for iOS



Antivirus company AVG Technologies today announced the release of an updated version of the mobile solutions AVG Family Safety for iOS. The third version of the product has acquired technology to support AVG Do Not Track, informing users about tracking their activities on the network and allows users to block such attempts. In the new version of Do Not Track is enabled by default after installation.

Family Safety for iOS is a specialized browser for iOS environment with a high level of protection. The company recommends installing this free product for iPhone / iPad, with which work is underage. “Ten years ago parents would protect their children from online threats by putting the family PC in the living room,” said JR Smith, CEO of AVG Technologies.

Also in the new version of the updated version of the manufacturer has built solutions LinkScanner, checking for malicious links, and for fraud, according to which the user should be on the Internet. When a suspicious or fraudulent product links will give the user a warning. Users can also block content to label the system as adult content. “In today’s mobile world that is obviously not enough and parents are looking for a simple and modern solution. AVG Family Safety for iOS not only helps keeping the whole family safe from online threats, by adding Do Not Track it now also provides users control over their online privacy.”

New virus replaces packages Linux web servers


Analysts from the company "Kaspersky Lab" found a conceptually new type of malware for Linux. 

The virus, known as «Rootkit Linux Snakso-A» on the internal classification system infects Linux-kernel-level submenus are web servers. Thus, all web sites hosted on the compromised server, is dangerous for the visitors. Web server is running in normal mode, only send packets at a low level insert special tags «iFrame», in which the hidden links to download malicious content hidden.

According to reports, the new virus affects 64-bit systems with kernel kernel 2.6.32-5-amd64 and popular web server Nginx. The executable file, found in the "wild", is about 500 KB, but experts justify such an unnaturally large size of the fact that while the virus compiled to include all debug messages. The danger is that the server has virtually no way of determining the existence of "tabs" on the server. And threats to Internet users visiting a site served by an infected machine. Each time when coming to such a site, they receive an additional hidden links that are not in the output of the web server. In fact, the virus replaces outgoing TCP-packets sent by web site visitors.

The researchers believe that the virus is detected in an early stage of development. A number of features in it is not fully implemented, and some features have yet to see in action. To some extent, it can be considered a prototype of the future server superbugs. By itself, the virus does not spread malicious content - this task was assigned to the auxiliary server located elsewhere. Another unusual feature of the virus - the connection to the control server is done using the encrypted password.

Tuesday, November 20, 2012

Hackers attack gamers in online games


Plunging into the virtual worlds, gamers do not forget about the real threats aimed at his computer

 Fraud and theft of other people's virtual property - an increasingly frequent phenomenon in the world of computer games. This is largely due to the growing number of virtual resources (the things, characters, currency, etc.) that can be converted into real cash.

The main threat, aimed at gamers - is a compromise of game accounts. With malware infiltrated into poorly protected user's computer, social engineering, or technology break weak passwords attackers gain access to the accounts of players and steal virtual resources. Then stolen "good" is usually put up for online auction or offered back to the victim for ransom.

Passwords and user names from the accounts, and personal information of players can be made available to hackers and hacking by the successful database operator game - as it happened last year with the Sony PlayStation Network. Then drain victims were 77 million users of gaming services Sony. The trouble was not only in the fact that the information was stolen, but that it was stored in a readable plaintext.

Many gamers are tempted to use the so-called cheats - additional programs that offer an advantage over the other players (in the reaction rate, visibility opponent, etc.). Despite the fact that cheating is usually forbidden by administrators of game servers, cheats remain popular among gamers. In this case, downloading programs, cheats is a great danger of infecting your computer with malware.

Monday, November 19, 2012

Spybot - Search & Destroy 2.0 - a great addition to the Windows-antivirus


Safer-Networking company officially introduced the new version of its unusual antivirus product called Spybot - Search & Destroy 2.0. 


With this release, developers have presented a number of interesting new features, but most of them are familiar to users of the beta version and the earlier announcements of the manufacturer.

Today, the vast majority of Windows users have at least some anti-virus, whether the package Microsoft Security Essentials, Windows Defender, McAfee, Norton, or any free anti-virus software from reputable manufacturers. At the same time, any such program can not be considered perfect. There is always another spyware, rootkit or a virus that is not ranked in the current signature database. While running two antivirus programs on one PC at once really is a bad practice, the presence of additional special software to intercept malicious software - is a reasonable move. The only question is which program to choose. Just one of the best programs of its kind is the Spybot - Search & Destroy 2.0.

At the stage of the installation package Spybot - Search & Destroy offers multiple configuration options and a traditional software license agreement. Another thing is that any settings you specify here can be changed later, so that the whole process should not take you more than a few minutes. After installation the user is presented an updated graphical interface, which compares favorably with a fresh view, compared with the previous version. The main window of the advanced mode there are three sections to the basic, advanced and professional tools. When you turn off the advanced mode is only a section «Basic tools».

Sunday, November 18, 2012

Ikarus virus.utilities - a powerful anti-virus, effectively detects and blocks security threats


Ikarus virus.utilities from Ikarus Security Software GmbH - a powerful anti-virus, effectively detects and blocks security threats such as viruses, Trojans, worms, etc., to detect malicious components Ikarus virus.utilities antivirus scan uses a special technology Ikarus T3. With its modern and simple interface, easy to install and predictable behavior, as well as constant monitoring virus activity Ikarus virus.utilities is an attractive solution for corporate and home users. The product is designed for computers running Windows.

Characteristics Ikarus virus.utilities:

   - Easy and intuitive design, intuitive for novice users;

   - Easy maintenance - to work in the program does not require special knowledge;

   - Advanced configuration and antivirus settings for advanced users or administrators;

   - Optimized scanning technology Ikarus T3, supports all compression formats and sequential scan;

Saturday, November 17, 2012

GFI MailSecurity multifunctional email Firewall


GFI MailSecurity Software is a postal firewall provides protection against email viruses, exploits and threats, as well as attacks by using e-mail. 


GFI MailSecurity from GFI Software Ltd. can act as a mail gateway repeater on the perimeter of the corporate network, it can scan incoming and outgoing mail, or mounted directly to the Exchange 2000/2003. GFI Mailsetsurity is available as a separate product or as part of GFI EmailProtection Suite.

The simultaneous use of multiple antivirus

GFI MailSecurity scans incoming mail using multiple antivirus modules from different vendors, which significantly reduces the average interval between the outbreak of a new virus outbreak and a vaccine to combat it. When a new threat to one of the antivirus vendors will always create their vaccine before others, today one, tomorrow another. But if you are using multiple solutions simultaneously, the chances that at least one of them will be ready to counter the new threat, when the ripple ripple to you increases.

Friday, November 16, 2012

A quarter of the discussions on hacker forums - Training


ADC Hacker Intelligence Initiative: a quarter of the discussions on hacker forums - Training


The study showed " Monitoring Hacker Forums ", a recent company Imperva, a discussion in which learning takes place hacking technologies, 28% of the content of hacker forums, is the main content of these Internet sites. The main themes of the training, regarding the transfer of knowledge and experience novice hackers, hacking techniques websites and web forums, hacking software and other tools hackers.

The main topics that were not related to training, it is mostly highly technical issues and cybercrime business (orders, service offerings and stolen information, etc.).

"Indeed, online forums have become, unfortunately, today, effective search, training, and technical equipment hackers. Beneficiary of the work of these resources is in the first place, the hacker community that gets a great opportunity to improve their skills and to recruit talented young people - says the company's experts eScan in Russia and CIS countries. - In addition to training on these forums hackers can coordinate their actions and provide the information required for a solicitation. "

Dr. Web: New Windows Trojan-blocker


Experts have found a new sample of the Trojan family - Trojan.Winlock, which found signs of a backdoor


Researchers antivirus company "Dr. Web" reported the discovery of new malware samples per family Trojan.Winlock, specializing in locking the operating system Windows. The virus, called Trojan.Winlock.7372, differs from its predecessors because it does not contain any images or texts, and be uploaded from the Internet, serving as a backdoor.

According to experts, the new malware is an atypical representative Trojan.Winlock, because it contains the usual components of such viruses. When you lock the operating system loads the virus all the necessary elements of the Internet, and when locking the screen displayed by normal web-page.

After activation of the infected computer Trojan.Winlock.7372 puts itself into a branch of the registry, conducting startup programs. Then, the virus triggers an infinite loop start and stop several applications, including the researchers note the Task Manager, Notepad, Registry Editor, Command Prompt, system settings, browsers, Microsoft Internet Explorer, Google Chrome, Firefox, Opera, application ProcessHacker, Process Monitor, and others. After that, the Trojan disables the firewall and makes invisible to the victim's window, which is functioning as a backdoor downloadable from hackers web-page with the requirement to pay to unlock the operating system. For "unlocking" attackers require at $ 200.

Threats "zero-day" - the fear of the unknown


Unclosed vulnerabilities in software are "gateway" through which penetrate into the computer system by hackers and malicious software. 


According to the company Secunia, half-user computers running Microsoft Windows is installed, on average, more than 66 programs from 22-vendors. The use of such a large number of heterogeneous software without means of automated patch management leads to the fact that much of the software does not have all the required patches.

The problem is compounded by the fact that for a number of vulnerabilities patch does not exist. Attacks carried out by hackers already discovered flaws, which have not yet issued a corrigendum and of which remains to be seen on a large number of computer professionals are called attacks "zero day". Such attacks pose the greatest danger to the user and at the same time great value for cybercriminals.

During the period of "zero day" attackers have the best conditions for the attacks: ready hacking exploit, and the lack of available patches and antivirus signatures. However, many users ignore the need to install patches for the software even after their release - in particular for the software that is not part of the operating system.

Managers of businesses overestimate their level of information security


eScan: Managers of small businesses overestimate their level of information security

According to the study of anti-virus companies, 86% of respondents are confident in their defense, but have no written policy on security.

According to a study conducted by Virus eScan, most small business managers mistakenly believe the level of security in their organizations satisfactory.

Thus, about 86% of executives said they considered their current protection sufficient (another 52% said they were full, and 34% - only to some extent). 87% of respondents do not have a written policy on security, and in 83% - not to protect themselves from cyber attacks.

Moreover, 72% of respondents have no policies to the safe use of mobile and remote devices, and 59% - there is no plan to respond to data leakage. Such protections as multifactor authentication and data encryption using only 14% and 23% of companies, respectively.

"Indeed, the small and medium business is lagging behind in terms of implementing even basic policies and procedures for information security," - experts stress eScan.

According to them, this is due to lack of awareness about the threats the organization's leadership and the available means of protection, as well as due to the limited resources allocated to establish and maintain their information security systems.

Wednesday, November 14, 2012

VIPRE Internet Security 2013 PC Lifetime Protection Sale


Back by popular demand - VIPRE Internet Security PC Lifetime Licenses 


The PC Lifetime Licenses can save customers hundreds of dollars over the lifetime of their PC. No more paying $50 to $60 a year to renew antivirus software. No interruptions in protection, no costly renewals, no annoying pop-ups to renew, just complete PC protection.


VIPRE Internet Security 2013 - comprehensive antivirus which includes a personal firewall, antispam, web filtering, component VIPRE Easy Update in one easy solution for complete protection from malware and Internet threats.

VIPRE Easy Update, Improving Web protection, new technology to protect against rootkits, Support Windows 8, FAT updates, ease of use.

Tuesday, November 13, 2012

Symantec Endpoint Protection Small Business Edition 2013


Symantec is a new security solution with the ability to control the cloud


Symantec Endpoint Protection Small Business Edition 2013 is designed specifically for the protection of workstations and servers, small companies

Symantec Corp. announced a solution for the protection of workstations and servers designed specifically for small and medium businesses, - Symantec Endpoint Protection Small Business Edition 2013. This solution has centralized management in the form of a cloud service, the same as an application installed on the server of the company. By simplifying the deployment process, the company may at any time easily migrate to the cloud option, without prejudice to the workflow. Now, when the number of cyber attacks on small businesses (250 employees or less) and has already doubled up 36% of all targeted attacks, this solution provides these businesses protection of their information.

SymantecEndpoint Protection Small Business Edition 2013 allows the owners and employees of small and medium-sized businesses to be confident in the safety of their information, as well as in the framework of the solutions provided by:

  - Protection of the highest level: advanced protection against viruses and malware, in which technology is applied Insight reputation scanning and behavior analysis SONAR. Thanks to them, the system is easily and quickly detect new threats and neutralize them from the start, ensuring safe and trouble-free operation of computers, even when they are mobile;

New Windows Trojan - Trojan.Gapz.1


Trojan.Gapz.1 - is bootkit implements functions and the ability to hide its presence in the infected system. In this application are fairly interesting mechanisms infecting computers.

Trojan.Gapz.1 capable of running both 32-bit and 64-bit versions of Windows. the procedure of installing the malicious program varies depending on the platform. The Trojan is also able to actively use the vulnerability number of system components, which allows him to perform a specially crafted code.

The installer has been attempting bootkit bypassing the UAC (User Accounts Control, UAC), preventing unauthorized execution of executable files in the system by exploiting vulnerabilities Graphics Windows.

Trojan.Gapz.1 then analyzes the structure of the infected computer's hard drive, creates a special image and places it in the reserved sectors of the disk. The Trojan modifies one field in the boot sector of the disk, and thus makes the boot load up and run a malicious application.

Monday, November 12, 2012

A new type of attack on custom software


The new type of attack called "man-in-the-browser" or "universal attack man-in-the-browser". 


This type of attack, reported in his blog specialists Trusteer.

During this attack, provided that the virus will be implemented in the operating system or application, the virus also installs a special extension for the browser. This extension will run every browser start. After that, in the case of a general attack on every web page is loading in the browser to verify that the virus will be the page address certain target sites list. If the site is included in this list - extension intercepts or modifies the data that a user enters into web forms, such as registration or entry of financial information.

Thus, the malware takes control of all traffic between your computer and the web server serving a specific site. This allows hackers to intercept passwords to log into online banking or replace data make transactions to redirect funds to the account hacking.

Users' personal data of Amazon's systems have been published in Open access


Hacker Darwinaire has posted purported data on more than 600 Amazon UK customers online, to prove the hacker attack.


According to ZDNet, the hacker under the alias Darwinaire stole confidential information to more than 600 customers from Amazon UK. Representative of the British Internet company stated that the information could be stolen from its servers.

Recorded in Pastbin, which at the time of publication of news has been removed, Darwinaire claims that it published personal data in order to prove that breaking the regional department Amazon. Were freely available user names, registration dates, phone numbers and e-mail addresses, as well as some of the passwords in the clear.

"There has been no compromise of security Amazon and this information does not come from our database," - said the representative of the company in a statement edition ZDNet.

Friday, November 9, 2012

Hackers compromised a large number of Twitter users passwords


The Social Network did not provide details on the causes of cracking and its initiators.


The administration of the social network Twitter has sent letters to thousands of users with e-mail notification about breaking their account by third parties. Some accounts were actually compromised, but the others were notified after Twitter inadvertently reset.

It should be noted that at the present time, representatives of the social network refused to provide any data on the causes of break-ins, as well as those responsible for it.

In a statement Twitter states: "If we believe that your account has been compromised, we reset the password and send a notice to the owner account ... This is our normal job, which is to provide reliable protection to users."

Apple eliminated nine critical vulnerabilities in QuickTime


Apple Inc. has released a new version of QuickTime for Windows, which eliminated nine vulnerabilities.


Apple Inc. has released QuickTime version 7.7.3 for Windows, which eliminated nine vulnerabilities multimedia player. All underlying vulnerability can cause denial-of-service application or execute arbitrary code on the target system.

Among the flaws are fixed numerous bugs can be noted in the processing and TeXML PICT files that allows you to call and memory corruption and buffer overflow. For the exploitation of these vulnerabilities an attacker must entice the victim to open a specially crafted file or visit the web-page containing the exploit.

The new version of QuickTime supports Windows XP, Vista and Windows 7. Users of the player as soon as possible is recommended to install the update from the manufacturer.

A detailed description of vulnerabilities can be found at:
http://malwarelist.wordpress.com/.../vulnerabilities-in-apple-quicktime/

Thursday, November 8, 2012

A new SMS-vulnerability in Android found


Programmers from North Carolina State University have discovered a vulnerability in the operating system Android, with which you can send SMS-messages from one application to another, bypassing the mobile network operator. Experts warn that once a vulnerability can be used for SMS-phishing. Previously, the same research team from North Carolina has identified dozens of malicious apps in the store Google Play, and in 2011 developed a rootkit that captures data about the calls.

The final presentation of the vulnerability Write_SMS Capability Leak says that vulnerability can be used without any additional privileges on a system. "Vulnerability Android-running application to generate fake SMS-message, which can then be communicated to the user phone or to another application. We believe that the vulnerability could be used to organize phishing attacks," - said in a statement.

Saturday, November 3, 2012

Apple has removed a several of vulnerabilities in iOS


The American corporation has released a firmware update for its mobile devices


Apple updated the firmware of their mobile devices to iOS 6.0.1 while addressing a number of vulnerabilities. The platform fixes two vulnerabilities that could allow an attacker to gain access to the key OSBundleMachOHeaders and specific information in the application Passbook.

In addition, the iOS has been updated Webkit, contain two vulnerabilities that could allow an attacker to execute arbitrary code on the target system. 6.0.1 Among the updates is worth noting the elimination of visual artifacts when using the keyboard, as well as a fix updates via wireless networks in iPhone 5.

Users of the iPhone 5, 4, 4S and 3GS, iPad 2 tablets, and 3, as well as the iPod touch iOS 4 is recommended to set to version 6.0.1.

A detailed description of vulnerabilities can be found at:
http://malwarelist.wordpress.com/2012/11/03/multiple-vulnerabilities-in-ios/