Wednesday, August 28, 2013

Website The New York Times was incapacitated by hackers

Attackers hacked domain name registrar, provides services NYT, Yahoo, Google, Microsoft, Ikea and AOL.

Website of Edition The New York Times was disabled on August 27 of this year. Failure of the portal associated with the attack on the Australian domain name registrar - Melbourne IT. At the time of the attack to all employees edition forbidden to send sensitive information via e-mail.

Director of Information Technology NYT Marc Frons said that the failure of the site is the result of an external cyber attacks by the Syrian Electronic Army, or other intruders posing as this hacker group. Initially, in the publication of failure associated with technical problems.

Attack on Melbourne IT not only caused a problem with the site NYT, but with an account in Twitter edition.

Thursday, August 15, 2013

New Bitdefender Total Security 2014 Overview

If you’re searching for a program with 'Total Security' for your PC, expect Bitdefender to face up for your expectations with the additional features and gratifaction boosters added within the new 2014 version. Bitdefender Total Security 2014 won't let you down by any means with regards to offering antivirus protection, firewall, browsing and also the social media protection.

Initially sight, herpes protection software hardly looks not the same as its less feature-rich predecessor products. But the most recent edition offers much not only defense against malware and anti-virus threats. You’ll experience new performance technology, improved reporting, user-friendly interface, a great password manager, quick installation, more perfect spam detection plus much more.

When the setup is finished, the Bitdefender Total Security 2014 exhibits simple to navigate interface that offer extremely fast use of key areas, which may be customized through the users according to . Most key options and navigation settings is one click or two away. Even those who aren't quite acquainted with interface is going to be simple to|an easy task to travel through it with few random clicks.

Wednesday, August 14, 2013

The new version of Panda Cloud Systems Management for iOS

Panda Software announces the release of new version of the cloud service Panda Cloud Systems Management (PCSM), designed for mobile devices running iOS.

 Designed to meet the needs of companies due to the increasingly popular trend in companies BYOD (Bring Your Own Device - Bring your own device).

The latest version of Panda Security solutions for remote control and monitoring of IT-departments allows companies to respond quickly and flexibly to incidents directly from their devices iPhone / iPad, as well as to diagnose problems and take appropriate action.

In general, the new feature Panda Cloud Systems Management allows IT-managers to remotely manage corporate devices directly from their iPhone or iPad. All this will lead to a significant reduction in response time and obviously improve the quality of services provided.

Tuesday, August 6, 2013

Smartphones based on Windows Phone exposed WiFi-vulnerability

Smartphones running the operating system Windows Phone susceptible to attacks that can expose the user details necessary to enter into closed corporate network resources. This was today warned by Microsoft.

According to the company, the vulnerability lies in the authentication scheme WiFi, known as PEAP-MS-CHAPv2, which is used by Windows Phone-smartphone for a WiFi-networks that are protected by technological WPA2. Cryptographic vulnerability in technology created Microsoft, allows attackers to restore the login information for a secure enterprise domains and resources when the client connects to the victim of false access point.

Note that Microsoft released a bulletin for more than a year after the independent experts have developed an algorithm of attack that works against MS-CHAPv2. Independent experts say that a new attack is largely based on previously identified vulnerabilities, and comes from the fact that Windows Phone does not check the digital certificates of authenticity for points.

New Trojan breaks Wordpress-blogs

The company "Dr. Web" on the eve warned of spreading malware Trojan.WPCracker.1, designed to crack blogs and websites running popular CMS (content management systems), in particular Worldpress.

With the help of the Trojan attackers can change the contents of the blogs or infect them with other malware that threaten future visitors. It is the spread of Trojan.WPCracker.1 may be linked celebrated by numerous experts in the present surge of large-scale attacks on websites.

Once on the infected computer, Trojan.WPCracker.1 creates a copy of one of the system folders and modifies registry branch Windows, responsible for the automatic application launch at system startup. The Trojan then connects with criminals, turning them on a remote server.