Tuesday, June 19, 2012

Craigslist Targeted: Killers Reaching Innocents

Craigslist is an on the web network comprising of employers, organization owners and service providers, Marketing and advertising services and selling points. you'll find sections for jobs, classified, actual estate and more. Craigslist allow users to write-up adz to obtain and sell number of points on the website, and users can interact and work accordingly. Craigslist is utilised by  See More..

Predictions Made by Supercomputer

A supercomputer named SGI Altix that is too known as Nautilus based in the University of Tennessee was fed with millions of articles dating back to middle of 20th century. The supercomputer provided results, which were most surprising for researchers. The method was designed to analyze articles, news feeds, journals, reports and other resources of  See More..

Angry Birds: Why This Game is quite Popular?

The term Angry Birds reminds of video games from early 90s and several people might be surprised to know what is Angry Birds? It's basically a video game designed for mobiles phones and It's developed by Rovio Mobile based in Finland. The game was launched in December 2009 for iOS platform and it  See More..

Celebrity Names utilized for Cyber Attacks

Cyber attacks are one of the most concerned issues online and are of excellent risk to privacy. These are Not simply risk to networks about are as well threat to national interest. Cyber criminals use various methods to initiate cyber attacks, which includes use of malicious codes, breaching firewalls and hacking into accounts. However,  See More..

Embarcadero Finally Release Delphi 64-bit

Delphi is really a cross platform IDE (integrated development environment) utilized to create user applications, which are compatible with number of platforms such as Microsoft Windows and Apple Macintosh. Delphi was originally designed by Borland but It is now operated by Embarcadero. Features The organization released a brand new version of Delphi XE2 and It is too  See More..

Social Netoperating Website Badoo Hits Hundred Million

Over the past few years, World wide web has flooded with social networks, blogs and content management systems. Now you'll find several social networking sites and WordPress blogs in distinct categories such as technology, design, photography and several more. Badoo is extremely a freshly introduced social networking website. It was began in August 2011 and amazingly you'll find  See More..

Needles inside the Facebook Haystack

Yesterday I was searching all by way of the mid-day logs from one of the WebPulse modules, checking out the malware it had flagged. One of these caught my eye: a single log line referring to a setup.exe file coming from a site called youtube-vid.com. The idea occurred to me that we usually only take time to research  See More..

Apple releases OS X 10.7.2 and iOS 5 with enormous security patch

Apple have released updated versions of OS X Lion (10.7.2), Snow Leopard (Security Update 2011-006), iOS (5), Numbers for iOS (1.5) and Pages for iOS (1.5) to resolve numerous security issues. Beginning with OS X 10.7.2/Security Update 2011-006 for OS X 10.6 you may find 75 known vulnerabilities that are fixed with these updates. Most could  See More..

MSRT October ’11: EyeStye

This month, the Malicious Software Removal Tool (MSRT) targets two families: Win32/EyeStye and Win32/Poison. EyeStye (aka SpyEye ) is extremely a family of trojans that steals information, targeting authentication data employed for on the internet banking such as passwords and digital certificates. The approach it employs is called form grabbing which involves the interception of webform data submitted to  See More..

Error 3200: Apple iOS 5 stumbles on launch

Apple has launched the considerably anticipated iOS 5.0 the new version of its operating technique for iPhones and iPads, complete with revolutionary new features such as the iCloud. It ought to have been a good moment for the company, and severalthing to put several cheer back in Apple fans hearts following the death of founder  See More..

A Refresher on Spam and Exploits

Lately, we have been seeing a renewed increase in volume of spam attacks that utilizes an exploit kit specifically, the BlackHole exploit kit to trigger a malicious payload. Specifically, we have seen this in the latest slew of Automated Clearing home (ACH) spam, along with the more recent spam run related to Steve Jobs  See more..

“1.php” Group Intrusion Set Paper

ThreatLabZ has just released a report that delivers a summary of incident Information related to the 1.php Group. Historically, this Group utilized command and control servers (C Cs) with /1.php? for the checkin URL path that's the reason for the informal name utilized. They have repeatedly targeted one of our customers so I  See More..

Malware Uses New DLL Loading program – MS11-071

It has been a year given that we have witnessed a DLL hijacking program which loads a malicious DLL that affects hundreds of programs. The approach involves dropping a collection of normal files together with the malicious DLL from within a directory. We recently analyzed the following archive sample. Only the file deskpan.dll was detected as  See More..

On Going Phishing Attacks on Email Services.

Series of phishing attacks aimed at stealing Gmail and Yahoo user log-in Information is on rise. I think that the attacks were a part of a larger campaign aimed at stealing user data and compromise computer systems. If the users put the Login details on such phishing links, then the Information get transferred to the  See More..

How rapidly fingerprinting of OLE2 files can lead to efficient malware detection

At last week s Virus Bulletin 2011 conference Paul Baccas and Stephen Edwards from SophosLabs presented their study paper rapidly fingerprinting of OLE2 files: Heuristics for detection of exploited OLE2 files Depending on specification non-conformance . They may well winside the prize for the longest title, but what does it mean? OLE2 is a container format synonymous with  See More..

BlackBerry outage, video apologies, a hoax and Ronnie Corbett

Millions of BlackBerry owners around the world have been feeling the pain this week as messaging and email systems collapsed in a service outage. With multiple turning to social networks to vent their anger, as well as newspaper cartoonists Making fun of the situation, bosses at research in Motion (RIM) have clearly been feeling the heat.  See More..

Return of the Hack, Playstation Accounts breached again

Sony has reported that it has had quite a few sign-in attempts on accounts belonging to users on its various networks. In a statement on the Sony site it was revealed that Sony Network Entertainment International LLC and Sony on-line Entertainment (SOE) have detected a large amount of unauthorized sign-in attempts on PlayStationNetwork (PSN), Sony  See More..

SIRv11: Putting Vulnercapacity Exploitation into Context

As Vinny Gullotto, our GM blogged earlier inside the week, the 11th edition of the Security Intelligence Report (SIRv11) has been released. One of the new places of investigation in this release is very a investigation of essentially the most prevalent types of vulnerability exploitation and how significantly of that exploitation is 0-day (short for zero-day, an  See More..

RIP Dennis Ritchie, inventor of C and father of UNIX

Dennis Ritchie, the researcher and computer scientist whom Wired farewelled with the headline The Shoulders Steve Jobs Stood On, has returned from main(). He died at his residence last weekend. Dr Ritchie can possibly most succinctly be described as the inventor of C along with the father of UNIX, work for which he and Bell Labs  See More..

Evil backdoors – Part II

several months ago we did a write-up about backdoors, explaining how they work and how to look for them. need to you didn t read it, take a read here:ASK Sucuri: What about the backdoors?However, we nonetheless see on on the internet forums individuals recommending to search for eval(base64_decode and issues like that when looking for backdoors. If  See More..

Communicative malware writers

Do you bear in mind Mystic compressor and its shouts to the world, especially to Sunbelt guys? I hope so, but just in case here s one screenshot: greetings to Sunbelt And now we ve got a kind of response at the same time from Morphex authors a few of my blog posts concern Morphex, Crum and similar custom packers (this  See More..

Government minister dumps documents in park bins

CabiWorld wide web minister Oliver Letwin has got himself into hot water, after a British newspaper exposed he was within the habit of dumping private correspondence and sensitive documents detailing Al-Qaeda activities and secret service operations into park bins near Downing Street. The ereally day Mirror reported that some of the documents dumped by Letwin in St James s  See More..

Is Anonymous nonetheless a “hacktivist” collective?

Members of the net collective known as Anonymous are usually described as hacktivists. But are they extremely? Or are they extremely just activists (is that what they ve become)? We follow diverse Anonymous news accounts on Twitter and ever simply contemplating that the sub-collective, LulzSec, petered out, Anonymous has shifted away from talking about on-line attacks and hacks  See More..

‘Addiction’ drove Scarlett Johansson’s nude photo hacker

Christopher Chaney, the man accemployed of hacking into the email accounts of female celebrities, and scooping up their private messages and nude photos, has described how his curiousity became an addiction. 35-year-old Chaney, from Jacksonville, Florida, was arrested by the FBI earlier this week in connection with Operation Hackerazzi , an investigation into a series of  See More..

Your Data, Facebook’s Trade Secret

within the wake of Europe vs. Facebook s Annoy Facebook campaign, those that participated located one thing extremely fishy: Facebook claims that It is not required to give a user a complete copy of his or her data if, in Doing so, the organization will be compromising its trade secrets or intellectual house . It s a bit of  See More..

The continuation of harmful rogue ads on Bing (and Yahoo)

We ve noted this before, but Microsoft Specifications to get a handle on ad placements on Bing. Ok, so Bing isn t the most widely utilized search engine, but bear in mind that Yahoo plays a part here as well. In this case, we re talking Sirefef (ZeroAccess aka Max++), probably the nastiest piece of malware circulating on the web  See More..

Horrible blog going around about you? Or a Twitter phishing attack?

you will not realise it, but your Twitter account is worth money. Cybercriminals are keen to compromise your Twitter account, so they can spam out messages (either as public tweets, or less obvious direct messages to your on-line friends) within the hope that several recipients will click on the links. What lies in the end  See More..

TaskManager Runs on 64-bit Excel

I m releasing a brand new version of TaskManager.xls that runs on Excel 2010 64-bit too. The previous version ran on 64-bit Windows, provided you utilised Excel 32-bit. But this new version runs on each implementations of Excel.TaskManager_V0_1_0.zip (https)MD5: 5ED2AB6036CA94FAC7DEE5352718D07CSHA256: EBCF4832C4DBAB0AFE778E19423EBB56CA4644DA1FDB5B2EB1BB4C27A26DB18C  See More..

more Brits Leaving World wide web Passwords in Wills

The thought of people leaving their Facebook passwords in their wills is certainly not a mainstreaan concept- in the moment. However, if one really stops to think of it, our increasing reliance on Internet based services prompts the necessity of such action. In fact, a analysis conducted in behalf of Rackspace, a cloud computing company,  See More..

Free coffee from Starbucks and Tim Hortons? No, it’s a Facebook scam

As of late points have been somewhat quiet on the Facebook scam front, but these days we have seen a resurgence in scams targeting each Americans and Canadians. A small significantly more than a day ago a scam appeared purporting to be a free gift card for the renowned Canadian coffee and doughnut shop Tim Hortons. It  See significantly more..

Saturday, June 2, 2012

FREE $25 Tim Hortons Gift Card – Facebook Scam

Scam Signature Message:FREE $25 Tim Hortons Gift Cardtimhortonsbirthdaygift.meTo celebrate our birthday, we are giving away thousands of$25 Gift Vouchers FREE http://timhortonsbirthdaygift.me/Scam Type:Bogus OfferTrending: October 2011Why it s a Scam:Clicking the wall write-up link takes youto the following page:As usual, here you're asked to Share the message along with your friends and enter a comment on  See More..

Targeted spam or just a brand new spam filter evading technique?

I own a couple of dokeys for various private activities, among these, my personal blog. They don t get considerably traffic, but I receive numerous spam on these dokeys. One of these spams escaped the spam filters simply given that it was specially crafted. The email was sent from an email address of a dokey which  See More..

NHS Direct Twitter account compromised by Acai Berry diet spammers

NHS Direct, the UK helpline which delivers skilled health advice by way of the telephone and internet, has had its Twitter account taken over by spammers promoting an Acai Berry diet. At 10:40pm UK time on Sunday night, the NHS Direct Twitter account posted the following message: Are you currently wanting to lose some weight? i highly suggest  See More..

An additional Modified ZeuS Variant Seen inside the Wild

inside the past, we ve reported about malware Depending on the leaked ZeuS code, such as Ice IX, and ZeuS 2.3.2.0, and this usage of the leaked code has continued on since then, and has resulted to attacks such as the one I m about to share.My colleagues and I have been monitoring Another new version of  See More..

Netflix look alike android malware

We have received a brand new malicous Android malware which look alike a real Netflix application, and which is utilised to steal the Netflix account information. This is actually a classic case of trojanzied malware wherewithin the fake application which is extremely a lot identical to the real application and which lures the users to enter the Netflicx  See More..

You lost your Facebook messages!

Or, to put it Another way, you didn t. However, spam mail Performing the rounds wants you to think otherwise. Click to Enmassive you have three lost messages on Facebook, to recover the messages please follow the link below. The links just pay a visit to the usual advert / viagra junk. What s kind of funny here is  See More..

McDonald’s Facebook scam: Happy Birthday to…Donald?

I m certain a McDonald s themed Facebook scam seemed like a great notion to somebody at the time, but wow is this one all over the place. It s your average Click here to Like , article a spam comment saying how good This incredibly is then do one of these offers affair. However, you may find many points about  See More..

Google publishes Web safety advice for ‘very good to Know’ campaign

Google has launched a campaign promoting on-line safety, in association with the UK s Citizen s Advice Bureau. The campaign, which will incorporate adverts in newspapers, on public transport and on-line, is being run with the hope of encouraging Web users to take considerably more care over their on-line activities including producing use of considerably more secure passwords, and remembering  See considerably more..

Facebook scam promises free Macbook Air

Compromised Facebook accounts are being utilized to sfinish out scam posts promising free Apple Macbooks. The scam will not make reference to the death of Steve Jobs as others have. The link leads to Marketing and Advertising and marketing affiliate sites that ask for a user s mobile phone number users are then signed up for premium mobile content  See More..

BlackBerry outage made roads safer, police claim

in accordance with media reports, police in the United Arab Emirates have given a surprising explanation for a dramatic fall in traffic accidents last week: drivers BlackBerrys weren t working. It s claimed that last week s worldwide BlackBerry outage, which frustrated business men and women around the world who were unable to communicate with their colleagues, had one sure result  See More..

Facebook ID Cards: Could they be within your Future?

Here s a little peek into what could perhaps be a fixture in our future: Facebook ID Cards. Last October 11, the enterprise applied for a trademark on the usage of Facebook on cards, namely organization cards and non-magnetically encoded identity cards . The application is open for all to see and on trademark search engines such  See More..

National Identity Fraud Prevention Week shares a couple of excellent tips

This week is National Identity Fraud Prevention Week, in accordance with what I just read inside the Register. pretty excellent timing, following last week s privacy scandal exactly where MP Oliver Letwin casually dropped constituents letters and sensitive documents into London park bins. The overall advice and resources on the educational microsite are excellent, particularly for men and women and  See More..

SpyEye vs. Tracker

It has turn into clear that the creator of the banking Trojan SpyEye have additional plugin support to their code. In this new design, these plugins might be utilized by third parties to add additional functions to the core bot. The plugins are DLLs stored inside the bot s configuration file. Among the core plugins created for  See More..

Facebook Rape Pages – Tastemuch less Jokes or Over the Line?

you know she s playing difficult to get When you re chasing her down an alleyway. That quote Whether it made you chuckle or fume in indignation is in the center of a rather controversial sequence of events. You see, the quote is in reality the name of a Facebook page which contains far more than 200,000  See far more..

Cloud Database: The Future Database Solution

Cloud is defined as database or data storage space available to number of computers connected to World wide World wide web or local network. These databases can either be placed on on the World wide web data storage servers such as Amazon World wide web Services and employees can access data from their workspace. Cloud databases have certain benefits over traditional computer databases. Cloud computing  See More..

Quickpost: several Windows 8 Observations

I assume you know Microsoft released Windows 8 Developer Preview.1) The UserAssist registry keys still exist, and still use ROT13 encoding:Notice that There are too entries for the launching of Metro apps (e.g. alarms).But There are too a couple of added keys, I ll analyze them when much more definitive versions of Windows 8 are released:2) My  See much more..

US considered cyberwarfare in attacks on Gaddafi’s Libya

The New York Times is reporting thin the United States virtually chose to utilize cyber weaponry inside the lead-up to the attacks on Libya earlier this year. Apparently the US military considered hacking into the Libyan government s air defense control systems. It's an interesting development that US officials are considering their offensive cyber capabilities  See More..

A small light relief

Recently I ve been collecting examples of comment spam. Essentially, This is for a investigation project that's someexactly where very low on my to-do list. However, it does have a much more confident aspect: whenever I actually feel at a loss for words and losing faith in my own wordsmifactor ability, I scroll down to see what nice  See much more..

Get FREE Starbucks Vouchers – having a value of $100 – Facebook Scam

Scam Signature Message:Get FREE Starbucks Vouchers using a value of $100gift-cards-4-drinks.comTo celebrate 40 years of Starbucks, we are giving awaythousands of $100 Gift Vouchers FREE http://gift-cards-4-drinks.comScam Type:Bogus OfferTrending: October 2011Why it s a Scam:Clicking the wall article link takes youto the following page:As usual, here you're asked to Share the message along with your  See More..

GMail Hacker: D’oh!

One of our researchers has come across a supposed hacking tool-GMail Hacker Pro-that claims it can compromise GMail accounts. This tool comes with a quite slick searching website (complete with live chat support) identified at gmailhackerpro(dot)com. Click to enhuge During installation, it shows users a EULA. Let us just rapidly point out that a portion  See More..

Highlights from VB 2011 Barcelona

This year, we had the privilege of attending the 21st Virus Bulletin International Conference in Barcelona, Spain.Researchers from Trend Micro presented three subjects within the corporate stream and one subject within the technical stream. Ethan YX Chen covered file-fraction reputation for the technical stream on day 1. For the corporate steam on day 2, Max  See More..

Free coffee from Starbucks and Tim Hortons? No, it’s a Facebook scam

As of late items have been somewhat quiet on the Facebook scam front, but nowadays we have seen a resurgence in scams targeting both Americans and Canadians. A small considerably more than a day ago a scam appeared purporting to be a free gift card for the renowned Canadian coffee and doughnut shop Tim Hortons. It  See considerably more..

Hot Diamond enterprise 419 scam

Here s a 419 scam with a little of everything, including a wonderful fake website. First, the email: Click to Enmassive In case you don t want to read it goodness knows, I tried the Hot Diamond organization have taken time out from selling diamonds and necklaces to give away one million funds to help  See More..

HeapLocker: Preventing Heapsprays

I ve been using my HeapLocker alsol for practically a year now, and I ve encountered no issues, except for the NOP sled detection. When utilised with Adobe Reader, HeapLocker will produce also several false positives when searching for NOP sleds. So I ve disabled NOP sled detection for Adobe Reader.The last feature I require to talk about  See More..

results of our compromised/hacked/stolen accounts survey

In Late September we posted a survey where we asked you to tell us your stolen account stories. We have summarized the results in a unique report the state of hacked accounts The data reveals that most users get hacked at high rates even when they tfinish not to believe they are engaging in risky behavior,  See More..

LulzSec suspect pleads not guilty to Sony Pictures website hack

A 23-year-old man, suspected of being a member of the LulzSec hacking gang, has pleaded not guilty to an attack on the Sony Pictures website. Cody Kretsinger, from Phoenix, Arizona, pleaded not guilty to conspiracy and unauthorized impairment of a protected computer during a hearing at Los Angeles District Court. Kretsinger is alleged to be  See More..

Be conscious of ‘Steve Jobs Alive’ spam.

News concerning the death of Steve Jobs has been exploited by cyber-criminals by sending spam emails associated with this incident. The spam mail which may well have one of the following subjects: - Steve Jobs: Not Dead Yet. - Is Steve Jobs really Dead?. - Steve Jobs Alive! or Steve Jobs Not Dead. If you have got got  See More..

“Privacy can be a way of managing Information flow.”

Why are folks so willing to give away their personal Info to complete strangers? It s simply because humans want to share Info. And in fact, they share Info much much more freely than other points such as Merchandise and services. Which of these Are you currently most likely to provide with out thinking significantly about it? •To give  See much more..

A Creepy Case of Facebook Identity Theft

Doppelgangers: many people would assume that these entities are merely figments of man s imagination. But the reality is, they do exist, just not inside the form many people feel they do. One woman had to find this out the difficult way when she located that she had an on-line doppelganger. Someone had stolen her identity  See More..

UK will make cyberwarfare strikes, says Foreign Secretary William Hague

Britain is prepared to use the Net to strike computer attackers and enemy nations who launch cyberwarfare attacks on the UK s infrastructure and businesses. That s the message from Foreign Secretary William Hague, who perched precariously on his cabiNet Office desk, iPad in hand has been interviewed by a tabloid newspaper concerning the growing  See More..

บทความที่ได้รับความนิยม

Popular Posts