tag:blogger.com,1999:blog-65830271393541472292024-02-08T22:10:58.682+07:00[JP] Internet and Computer SecurityAll about security on software, network, internet and computer. thank you for visited.KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.comBlogger70125tag:blogger.com,1999:blog-6583027139354147229.post-36526913016469130302010-02-21T12:30:00.001+07:002010-02-21T12:36:12.173+07:00Hackers target unpatched Adobe Reader, Acrobat flaw<img style="display: block; float: none; margin-left: auto; margin-right: auto" src="http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif" width="240" height="52" /> <p /> <strong>Adobe Systems Inc.</strong> said Monday it is investigating reports that attackers are exploiting a previously unidentified security hole in its <strong>Acrobat</strong> and <strong>PDF Reader</strong> software to break into vulnerable computers. <p /> <p align="center"><img src="http://voices.washingtonpost.com/securityfix/assets_c/2009/12/reader-thumb-120x117.jpg" /></p> <p /> The acknowledgment coincided with an alert published by the Shadowserver Foundation, a nonprofit group that tracks the spread of malicious programs that criminals use to control infected systems remotely. Shadowserver member <strong>Steven Adair</strong> said the flaw is present in the most recent versions of Adobe Acrobat and Reader. <p /> Adair warned that security experts have observed cyber crooks using the vulnerability in targeted attacks since at least Dec. 11, but that more widespread attacks are likely to emerge over the next few weeks. In addition, few anti-virus vendors currently detect malicious PDF files harboring this exploit. <p /> At the moment, there is no patch available for this flaw, and Adobe's brief advisory offers little in the way of mitigation advice. <p /> However, Internet users can protect themselves from this attack in a couple of ways. First, this exploit doesn't work unless users have Javascript enabled in Adobe Acrobat/Reader.To disable Javascript, click "Edit," then "Preferences" and then "Javascript," and uncheck "Enable Acrobat Javascript." <p /> As an alternative to Adobe, I generally recommend the free and lightweight Foxit Reader. But there are other free PDF readers, including Sumatra PDF and PDF-XChange Viewer. <p /> <font face="Microsoft Sans Serif" color="#C0C0C0" size="-2">http://voices.washingtonpost.com/securityfix/2009/12/hackers_target_unpatched_adobe.html?wprss=securityfix</font> KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-43633655446215653342009-08-24T11:54:00.000+07:002009-08-24T11:54:30.981+07:00TJX Hacker Indicted in Heartland, Hannaford Breaches<div style="text-align: center;"><a href="http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" lk="true" src="http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif" width="340" /></a></div><br />
A federal grand jury has indicted three individuals for allegedly hacking into credit and debit card payment processing giant <strong>Heartland Payment Systems</strong> last year, as part of an investigation the Justice Department is calling the largest identity theft case ever prosecuted.<br />
<br />
According to indictments returned Monday in a New Jersey federal court, the government believes the same individuals were involved in a string of high-profile data breaches between October 2006 and May 2008, including intrusions at Hannaford Brothers Co., and <strong>7-Eleven</strong>, Inc.<br />
<br />
In total, the government alleges the hackers stole data on more than 130 million credit and debit cards from Princeton, NJ-based Heartland.<br />
<br />
Read the full story, at this link here. A copy of the indictment is available here.<br />
<br />
<span style="color: #999999;">http://voices.washingtonpost.com/securityfix/2009/08/heartland_payment_systems_hack.html?wprss=securityfix</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-56920315691766842412009-08-24T10:11:00.003+07:002009-08-24T10:15:19.871+07:00Security Patch Catchup: Java, Safari & OS X<div class="separator" style="clear: both; text-align: center;"><a href="http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" lk="true" src="http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif" width="340" /></a></div><div class="separator" style="clear: both; text-align: center;"></div><br />
<strong>Security Fix</strong> took a mini-vacation last week, but that's all it takes to fall behind in important software security updates. Here's a quick pointer to some recent updates that have recently happened.<br />
The last time I wrote about Java updates was at Update 13, but as several readers have pointed out, the latest version is now Update 16. Near as I could tell, Updates 14 and 16 did not include security updates. Indeed, Java maker Sun Microsystems says users who have Java SE 6 Update 15 have the latest security fixes and do not need to upgrade to version 16 to be current on security fixes.<br />
<br />
However, Update 15 shipped fixes for a number of serious security holes, so if you've got an earlier version of this program installed, take a few minutes to update. Don't know whether you have Java or what version you may have? Visit this link.<br />
<br />
Unfortunately, Sun still hasn't made the process of updating Java as easy as it should be. When I tried to update one of my Vista machines from Update 13 using the Windows Control panel (by clicking the Java icon, then the Update tab, and then the "Update Now" button), the updater told me I had the latest version installed.<br />
<br />
To grab the latest version, I have to download and run a full installer from Java.com. The installer by default tries to install one of several programs the company has a deal with (mine offered the <strong>Yahoo!</strong> toolbar), so if you don't want the extra software be sure to deselect that option. <br />
<br />
<strong>Apple</strong> also recently released several important updates. Among them was an update for the Safari Web browser that fixes at least six security holes. This patch brings Safari to version 4.0.3. Updates are available for Mac and Windows versions. Mac users can grab the update from Apple Downloads or Software Update, while Windows Safari users will need to use the bundled Apple Software Update tool.<br />
<br />
In addition, Apple has released an update that corrects an important security vulnerability in <strong>Mac OS X 10.4</strong> and <strong>10.5</strong> systems. That update is available through the Mac's built-in Apple Software Update feature.<br />
<br />
<span style="color: #999999;">http://voices.washingtonpost.com/securityfix/2009/08/security_patch_catchup.html?wprss=securityfix</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-48602781894586806782009-08-24T09:50:00.001+07:002009-08-24T09:52:17.870+07:00Induc Virus Abuses Delphi Compiler<div class="separator" style="clear: both; text-align: center;"><a href="http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" lk="true" src="http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png" /></a></div>The W32/Induc virus has been in the wild for at least a year. During this period it has succeeded in infecting a lot of Delphi installations, including manufacturers of some pretty popular software packages.<br />
<br />
<br />
On a victim’s machine this virus searches for the presence of a specific version (4.0, 5.0, 6.0 and 7.0) of the Delphi compiler. The virus gathers this information using the registry entry below.<br />
<br />
<a href="http://www.avertlabs.com/research/blog/index.php/2009/08/19/induc-virus-abuses-delphi-compiler/">Read More ...</a><br />
<span style="color: #999999;"><a href="http://www.avertlabs.com/research/blog/index.php/2009/08/19/induc-virus-abuses-delphi-compiler/">http://www.avertlabs.com/research/blog/index.php/2009/08/19/induc-virus-abuses-delphi-compiler/</a></span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-23431189786202683552009-08-24T09:47:00.000+07:002009-08-24T09:47:15.144+07:00Scammers Love Your Money<div class="separator" style="clear: both; text-align: center;"><a href="http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" lk="true" src="http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png" /></a></div><br />
We generally classify email messages pretending to be from a family member of a (often African) dignitary or from a desperate young woman as scams. In the first case, the sender sometimes explains that following the death of an influential dignitary a large sum of money is blocked in a bank account somewhere. With the recipient’s help and using his or her financial backing for a money transfer, the sender says that it would be possible to release the money. Substantial compensation is offered to whoever agrees. In the second case, the unknown beauty becomes a friend with the victim and suddenly has a terrible money problem.<br />
<br />
<br />
For some individuals, these swindles, called advance fee fraud (also known as 419 fraud) and romance scam, are a primary source of revenue. They also employ lottery and fake price scams.<br />
<br />
<a href="http://www.avertlabs.com/research/blog/index.php/2009/08/17/scammers-love-your-money/">Read More ... </a><br />
<br />
<span style="color: #999999;">http://www.avertlabs.com/research/blog/index.php/2009/08/17/scammers-love-your-money/</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-34621030045236522662009-08-24T09:44:00.000+07:002009-08-24T09:44:13.827+07:00Introducing the IEEE Industry Connections Security Group<div class="separator" style="clear: both; text-align: center;"><a href="http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" lk="true" src="http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png" /></a></div><br />
Agreement and collaboration have been two of the greatest challenges the security community has faced from the very beginning. In an effort to address this, The Industry Connections Security Group (ICSG), a new offering from the IEEE, allows like-minded companies to come together to solve industry or business problems that center on information security. Industry Connections is a program under the IEEE that allows for a fast start-up toward industry collaboration. It also offers the support and infrastructure of an established and well known brand—the IEEE itself. This effort will allow the group to focus on the work of security standards and problem solving, rather than being slowed down with issues such as incorporation or intellectual property matters. McAfee is proud to be a founding member of this effort.<br />
<br />
<br />
<a href="http://www.avertlabs.com/research/blog/index.php/2009/08/17/introducing-the-ieee-industry-connections-security-group/">Read More ...</a>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-92173104352004554642009-04-25T09:35:00.002+07:002009-04-25T09:38:02.172+07:00AVG Internet Security SBS Edition 8.5.322 + Serial<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.antivirus4u.com.my/prodimages/AVGinternetsecurity.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 250px; " src="http://www.antivirus4u.com.my/prodimages/AVGinternetsecurity.jpg" border="0" alt="" /></a><br /><div><br /></div><div>AVG Internet Security SBS ensure complete security protection against all of the most serious Internet threats, including viruses, worms, trojans, spyware, adware, hackers and spam. AVG Internet Security SBS 8.5, includes the most recent anti-virus, anti-spyware, anti-spam , Anti-Rootkit , Web Shield & LinkScanne and firewall technologies with reliable automatic updates while consuming a low level of computer resources for convenient use.</div><div><br /></div><div><span class="Apple-style-span" style="font-weight: bold;">Download : </span><a href="http://221473a3.linkbucks.com">AVG Internet Security SBS Edition 8.5.322</a> </div><div><br /></div><div>Serial:</div><div>8MEH-RF22Z-ANQGS-QDWMR-2ECTN-BEMBR-ACED</div><div>8MEH-RJR4R-7WKJ6-NL3DA-C3DZF-JEMBR-ACED</div><div>8MEH-RGHD3-SUAUO-SXPWA-P92GQ-9EMBR-ACED</div>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-33788442874810072332009-04-25T09:29:00.002+07:002009-04-25T09:33:32.813+07:00AVG Anti-Virus SBS Edition 8.5.322 + Serial<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.antivirus4u.com.my/prodimages/AVGne_small.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 200px; height: 243px;" src="http://www.antivirus4u.com.my/prodimages/AVGne_small.jpg" border="0" alt="" /></a><div>AVG Anti-Virus SBS ensure complete security protection against all of the most serious Internet threats, including viruses, worms, trojans, spyware, adware, and hackers . AVG Anti-Virus SBS 8.5, includes the most recent anti-virus, anti-spyware, Anti-Rootkit , Web Shield & LinkScanne and firewall technologies with reliable automatic updates while consuming a low level of computer resources for convenient use.</div><div><br /></div><div><span class="Apple-style-span" style="font-weight: bold;">Download :</span> <a href="http://ce429296.linkbucks.com">AVG Anti-Virus SBS Edition 8.5.322</a> </div><div><br /></div><div>Serial:</div><div>8MEH-RJR4R-7WJJ6-NL3DA-CYVWB-JEMBR-ACED</div><div>8MEH-RJXR4-2CBYP-2GB3A-DBLAA-PEMBR-ACED</div><div>8MEH-RE6B8-SRJ4Z-A489R-9832J-EEMBR-ACED</div>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-37434142322768003062009-04-25T09:22:00.003+07:002009-04-25T09:29:17.135+07:00Kaspersky Internet Security 2010 v9.0.0.323 Beta<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.picsat.com/images/okpa0xe28cgsxm0m8h.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 250px; " src="http://www.picsat.com/images/okpa0xe28cgsxm0m8h.jpg" border="0" alt="" /></a><div>Kaspersky Anti-Virus 2010 – the backbone of your PC’s security system, offering protection from a range of IT threats. Kaspersky Anti-Virus 2010 provides the basic tools needed to protect your PC.</div><div><br /></div><div>Kaspersky Internet Security 2010 – the all-in-one security solution that offers a worry-free computing environment for you and your family. Kaspersky Internet Security 2010 has everything you need for a safe and secure Internet experience.</div><div><br /></div><div>Kaspersky Internet Security 9.0 – is a new line of Kaspersky Labs products, which is designed for the multi-tiered protection of personal computers. This product is based on in-house protection components, which are based on variety of technologies for maximum levels of user protection regardless of technical competencies. This product utilizes several technologies, which were jointly developed by Kaspersky Labs and other companies; part of them is implemented via online-services.</div><div><br /></div><div>Our products for home and home office are specifically designed to provide hassle-free and quality protection against viruses, worms and other malicious programs, as well as hacker attacks, spam and spyware.</div><div><br /></div><div>During product preparation several competitor offerings were considered and analyzed - firewalls, security suites systems, which position themselves as proactive in defence and HIPS systems. Combination of in-hosue innovative developments and results from analysis gathered through the industry allowed to jump onto a new level of protection for personal users, whereby offering even more hardened and less annoying computer protection from all types of electronic threats – malicious programs of different types, hacker attacks, spam mailings, program-root kits, phishing emails, advertisement popup windows etc.</div><div><br /></div><div><span class="Apple-style-span" style="font-weight: bold;">Download :</span> <a href="http://3942bb25.linkbucks.com">Kaspersky Internet Security 2010 v9.0.0.323 Beta</a> </div><div><br /></div>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-909598254412663862009-01-11T15:20:00.001+07:002009-01-11T15:34:26.833+07:00AVG Internet Security 8.0 Build 229a1410<div class="separator" style="CLEAR: both; TEXT-ALIGN: center"><a style="MARGIN-LEFT: 1em; MARGIN-RIGHT: 1em" href="http://biggerbids.com/members/images/3415/public/422207_AVG-internetSecurity.jpg" imageanchor="1"><img height="420" src="http://biggerbids.com/members/images/3415/public/422207_AVG-internetSecurity.jpg" width="325" border="0" vi="true" /></a></div><br />AVG Internet Security ensure complete security protection against all of the most serious Internet threats, including viruses, worms, trojans, spyware, adware, hackers and spam. AVG Internet Security 7.5, includes the most recent anti-virus, anti-spyware, anti-spam and firewall technologies with reliable automatic updates while consuming a low level of computer resources for convenient use.<br /><br /><br />Download : <a href="http://8ea86886.linkbucks.com/">AVG Internet Security 8.0 Build 229a1410 (50.1 MB)</a>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-57029470375042963782008-12-09T13:12:00.001+07:002008-12-09T13:14:27.532+07:00Apple deletes Mac antivirus suggestion<div><span class="Apple-style-span" style="font-style: italic; ">Updated 7:45 p.m. PST with expert comment, at 7:20 p.m. PST with context on previous coverage, and at 7:08 p.m. PST with background.</span><br /></div><div> <p></p>Apple removed an old item from its support site late Tuesday that urged Mac customers to use multiple antivirus utilities and now says the Mac is safe "out of the box." <p></p> <p>"We have <a href="http://support.apple.com/kb/HT2550">removed the KnowledgeBase article</a> because it was old and inaccurate," Apple spokesperson Bill Evans said. </p> <p>"The Mac is designed with built-in technologies that provide protection against malicious software and security threats right out of the box," he said. "However, since no system can be 100 percent immune from every threat, running antivirus software may offer additional protection."</p> <p>Apple's <a title="Apple suggests Mac users install antivirus software -- Monday, Dec 1, 2008" href="http://news.cnet.com/8301-1009_3-10110852-83.html">previous security message</a> in its KnowledgeBase, which serves as a tutorial for Mac users, was: "Apple encourages the widespread use of multiple antivirus utilities so that virus programmers have more than one application to circumvent, thus making the whole virus writing process more difficult." </p> <p>Security experts, while pleased that Apple would urge Mac users to install antivirus software, had warned that running multiple antivirus products could cause problems and recommended against it. </p> <p>Apple's antivirus support note was initially published last year and was updated last month, despite reports that it was a new note. </p> <p>One Apple expert speculated that Apple was merely removing a poorly worded support note and said it probably wasn't ever Apple's intention to tell Mac users they need antivirus. </p> <p>"I bet you it was a low-level support note and it hadn't gone through the right approvals," said Rich Mogull, security editor of Apple news site <a href="http://db.tidbits.com/">TidBITS</a>. "That's my guess." </p> <p>To some, Apple's latest move will be seen as back-tracking given that it comes one day after those misleading reports circulated. The motive remains unclear, particularly because Apple didn't replace the previously published suggestion with an updated one. </p> <p>The message that remains is that Mac users don't really need to take additional steps to protect against viruses and other malware. Telling customers they can run antivirus for "additional protection" could be interpreted as a way to protect against any liability. </p> <p>There are no known viruses in the wild that exploit a vulnerability in the Mac OS, and Windows continues to be the overwhelming preference for malware writers to target their programs. But malware isn't just taking advantage of operating system weaknesses anymore. In fact, the majority of such threats now come from code that targets weaknesses in browsers and other applications that aren't platform specific. </p> <p>Mogull said he doesn't recommend that the average Mac user install antivirus software because of the low-level of malicious software seen for Macs at this time. </p> <p>To me, this new Apple statement poses more questions than it answers. </p> <p>Regardless of the meaning of Apple's latest action, I'm pleased to now have open lines of communication with the company. Over the last few months, I have had an increasingly difficult time getting any response to my e-mails and phone calls. For instance, I got no response to my requests for comment on Monday's article about this topic. However, after talking to several Apple spokespeople on Tuesday about the matter I am confident that the situation has been cleared up. </p> <p>I also was reminded of how much collective knowledge CNET readers have about Apple and would like to extend an invitation for people to feel free to contact me directly at elinor.mills@cnet.com with any feedback and tips related to Apple security issues. </p><p><span class="Apple-style-span" style="color: rgb(102, 102, 102);">Ref :: http://news.cnet.com/8301-1009_3-10111958-83.html</span></p></div>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-12839423983084487852008-12-09T13:09:00.002+07:002008-12-09T13:12:07.138+07:00Antivirus firms shrug at Microsoft's free security suite<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i.i.com.com/cnwk.1d/i/bto/20081119/microsoft_patch.jpg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 184px; height: 138px;" src="http://i.i.com.com/cnwk.1d/i/bto/20081119/microsoft_patch.jpg" border="0" alt="" /></a><br /><div><p><i>Updated at 1:15 p.m. PST Wednesday with comment from Symantec and at 11:45 a.m. PST Thursday with comments from McAfee and Kaspersky.</i></p> <p>For some security companies, Microsoft's decision to offer a free anti-malware product, <a href="http://news.cnet.com/8301-1009_3-10101582-83.html">code-named Morro</a>, won't result in a dramatic change in how they do business. </p> <p>Morro will be available in the second half of 2009 and will protect against viruses, spyware, rootkits, and Trojans, according to Microsoft.</p> <p>"With OneCare's market share of less than 2 percent, we understand Microsoft's decision to shift attention to their core business," Joris Evers, director of worldwide public relations for McAfee, said in an e-mail. </p> <p>As for confronting a free malware solution from a software giant, Evers said, "With more malware attacks than ever before, we believe our advanced technology, commitment to consumer education, superior protection, dedicated focus on security, and our 20-plus years in this business will provide consumers the confidence to choose McAfee as their trusted adviser and expert in security." </p> <p>Justin Priestley, senior vice president of consumer sales at Kaspersky Lab's Americas division, also seemed not that concerned at the prospect of facing a free security solution from Microsoft. </p> <p>"Having entered the U.S. consumer market at the same time as Microsoft, we initially viewed them as a formidable player. They've continued to hold a very low market share in the consumer market, and we don't expect the exit of OneCare to change the playing field drastically," Priestley said. "With the increasing threat malware and Web attacks pose, security is as important as ever, and we believe people will continue to choose antimalware software based on the quality of protection and will choose the highest-level product available."</p> <p>Rowan Trollope, senior vice president of Symantec's consumer business, characterized the announcement as a "capitulation by Microsoft, and a reinforcement of the notion that it's simply not in Microsoft's DNA to provide high-quality, frequently updated security protection." </p> <p><a href="http://news.cnet.com/8301-1009_3-10102376-83.html">Read More ...</a></p></div><div><br /></div>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-59704536516940768512008-12-09T13:05:00.003+07:002008-12-09T13:08:47.374+07:00Featured Freeware: Laptop Alarm<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://i.i.com.com/cnwk.1d/i/bto/20081118/laptop_alarm_SC_610x457.jpeg"><img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 200px; " src="http://i.i.com.com/cnwk.1d/i/bto/20081118/laptop_alarm_SC_610x457.jpeg" border="0" alt="" /></a><br /><p>This simple program will sound an alarm through your laptop's speakers when certain activities occur, helping to thwart laptop theft. <a href="http://www.download.com/Laptop-Alarm/3000-2162_4-10708142.html">Laptop Alarm's</a> four-check-box interface takes seconds to set. An option pop-up is as easily set to control mouse sensitivity and set a program password.</p><p></p><p>Operating Laptop Alarm is a snap. Users merely run the executable and set the alarm to sound if the laptop loses power the system is shut down or logged off, if the USB mouse is unplugged, or if the mouse moved. Testers found the program accurate with no false alarms. There's no method to alter the alarm sound, and users aren't given the opportunity to enter the program password before the alarm goes off. </p> <p>Laptop Alarm performs well and as expected, but it doesn't run in the background and must be reset each time you want to use it. Leaving your computer is not an action we'd recommend, but this freeware may at least hurt the ears of a potential laptop thief.</p><p><span class="Apple-style-span" style="color: rgb(102, 102, 102);"> Ref :: http://www.download.com/8301-2007_4-10101869-12.html</span></p><p></p><p> </p>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-33042794020907137322008-09-09T06:07:00.001+07:002008-09-09T06:10:14.302+07:00EstDomains: A Sordid History and a Storied CEO<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://voices.washingtonpost.com/securityfix/assets_c/2008/09/tsastsin-thumb-228x161.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px;" src="http://voices.washingtonpost.com/securityfix/assets_c/2008/09/tsastsin-thumb-228x161.jpg" alt="" border="0" /></a><br />In this second part to an <a href="http://voices.washingtonpost.com/securityfix/2008/09/estdomains.html">ongoing investigation</a> into the notorious Web site host and domain name registrar <strong>EstDomains Inc.</strong>, <strong>Security Fix</strong> examines the company's history, the legacy of its current chief executive, and its future prospects.<br /><br />The "Est" in EstDomains is a nod to the company's origins: It was founded in <a href="http://www.tartu.ee/?lang_id=2">Tartu</a>, the second largest city in Estonia (although the corporation is officially registered in Delaware). The chief executive of EstDomains is 27-year-old <strong>Vladimir Tsastsin</strong>, pictured below.<br /><br />Tsastsin also is named as the head of <a href="http://www.rovedigital.com/?page=intro">Rove Digital</a>, a company that appears to encompass a domain auction service named <strong>Bakler.com</strong>, and a recently launched Web traffic-shaping service called <strong>Zmot</strong>.<br /><br /><a href="http://voices.washingtonpost.com/securityfix/2008/09/estdomains_a_sordid_history_an.html">Read more ...</a><br /><span style="color: rgb(153, 153, 153);">Brian Krebs on Computer Security. The Washington Post Company.</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-14752065766276373222008-09-09T05:56:00.002+07:002008-09-09T06:07:12.339+07:00A Superlative Scam and Spam Site RegistrarOver the past week, a number of the Internet's largest data carriers have <a href="http://voices.washingtonpost.com/securityfix/2008/09/scam-heavy_us_isp_grows_more_i.html">ceased providing online connectivity</a> to Atrivo (a.k.a. "Intercage"), an ISP that security experts say is home to a huge number of scammers and spammers. This week, I'm turning the spotlight on <strong>EstDomains Inc.</strong>, Atrivo's most important customer and the single biggest reason <a href="http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html">so many experts have condemned Atrivo</a>.<br /><br />According to <a href="http://www.registrarstats.com/Public/RegistrarMarketShareMain.aspx">RegistrarStats.com</a>, EstDomains is the 49th largest domain name registrar, with more than 270,000 domains. Security Fix is still working on cataloging all of those domains, but for the purposes of this analysis we'll examine some 10,000 Web site names that are both registered through EstDomains and using the company's various domain name servers to route traffic to them.<br /><br />I chose to focus on that particular subset of 10,000 domains mainly so that EstDomains could not simply disavow knowledge of the sites' activities by claiming it serves as nothing more than a registrar for those domains.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://voices.washingtonpost.com/securityfix/assets_c/2008/09/est-pharm1-thumb-228x193.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px;" src="http://voices.washingtonpost.com/securityfix/assets_c/2008/09/est-pharm1-thumb-228x193.jpg" alt="" border="0" /></a><br /> <p>Turns out, at least <span class="mt-enclosure mt-enclosure-file" style="display: inline;"><a href="http://voices.washingtonpost.com/securityfix/2008-09-03_all_est.domains.surbl2.csv">one-third of those domains</a></span> (.CSV) are currently blacklisted by <strong>SURBL.org</strong>, which tracks Web site names that are advertised in junk e-mail.</p><p>Have a look at the complete list of those 10,000 names -- which I've made available <span class="mt-enclosure mt-enclosure-file" style="display: inline;"><a href="http://voices.washingtonpost.com/securityfix/2008-09-03_all_est.domains.csv">at this link here</a></span> (.CSV file) -- and it should quickly become evident why so many are blacklisted.<br /></p><p><br /><a href="http://voices.washingtonpost.com/securityfix/2008/09/estdomains.html">Read more ...</a><br /><span style="color: rgb(153, 153, 153);">Brian Krebs on Computer Security. The Washington Post Company.</span></p>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-71914417224571177792008-09-09T05:54:00.001+07:002008-09-09T05:56:02.765+07:00FBI Warns of Hit Man Scam ResurgenceThe <strong>FBI</strong> is warning people not to be disturbed by an e-mail scam that threatens your life and orders you to pay up to avoid being the target of a hired hit man.<br /><br />The FBI <a href="http://www.fbi.gov/cyberinvest/escams.htm">said</a> its <strong>Internet Crime Complaint Center</strong> continues to receive thousands of reports concerning the hit man e-mail scheme. The FBI notes that while the content of the missive has evolved since similar hit man scams first surfaced in late 2006, the message remains the same, claiming the sender has been hired to kill the recipient.<br /><br />In some cases, the use of names, titles, addresses, and telephone numbers of government officials and business executives, and/or the victims' personal information are used in an attempt to make the fraud appear more authentic, the FBI said.<br /><br /><br /><a href="http://voices.washingtonpost.com/securityfix/2008/08/fbi_warns_of_hit_man_scam_resu.html">Read more ...</a><br /><span style="color: rgb(153, 153, 153);">Brian Krebs on Computer Security. The Washington Post Company.</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-37035991277437710832008-09-07T14:48:00.000+07:002008-09-07T14:52:53.708+07:00Scammer-Heavy U.S. ISP Grows More Isolated<div class="separator" style="clear: both; text-align: center;"><a href="http://voices.washingtonpost.com/securityfix/assets_c/2008/09/glbxdepeer-thumb-228x203.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="178" src="http://voices.washingtonpost.com/securityfix/assets_c/2008/09/glbxdepeer-thumb-228x203.jpg" width="200" /></a></div><br />
<br />
Last week, <strong>Security Fix</strong> published an <a href="http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html">analysis of Atrivo</a>, a California based Internet service provider, also known as <strong>Intercage</strong>, that has proven to be a virtual magnet for cyber-criminal operations. Since that time, Atrivo's biggest network backbone provider decided it could no longer support the company, and stopped offering it direct connectivity.<br />
<br />
I first got wind of this change while reading <a href="http://www.merit.edu/mail.archives/nanog/msg10923.html">a post</a> on the <strong>NANOG</strong> mailing list, which caters to professionals employed by ISPs and various network providers. <strong>Marcus Sachs</strong>, director of the <a href="http://isc.sans.org/">SANS Internet Storm Center</a>, had said it looked like <strong>Global Crossing</strong> had stopped handling long-haul Internet traffic for Atrivo/Intercage within hours after our story was published. I followed up with Marc, but he was unable to produce any conclusive data showing the change.<br />
<br />
Fast forward to today, and with the help of <strong>Jose Nazario</strong> at <a href="http://asert.arbornetworks.com/2008/08/atrivointercage-called-out-as-us-rbn/">Arbor Networks</a>, I was able to pull together a view of what happened. Global Crossing has in fact "de-peered" from Atrivo/Intercage, so it is no longer providing direct Internet connectivity.<br />
<br />
<a href="http://voices.washingtonpost.com/securityfix/2008/09/scam-heavy_us_isp_grows_more_i.html">Read more ...</a><br />
<span style="color: #999999;">Brian Krebs on Computer Security. The Washington Post Company.</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-92053734010555598002008-09-07T14:42:00.000+07:002008-09-07T14:47:12.197+07:00Number of Bot-Infected PCs SkyrocketsThe number of PCs compromised with software that lets cyber criminals control the machines from afar has more than quadrupled over the last quarter, security experts warn<br />
<br />
The estimates come from <a href="http://www.shadowserver.org/">Shadowserver</a>, a group of volunteers that monitor activity from robot networks or "botnets," large armies of hacked personal computers used for spam, phishing and all kinds of criminal activity. Shadowserver saw a rise from roughly 100,000 botted PCs to about 400,000 over the past three months.<br />
<br />
<strong>John Bambenek</strong>, an incident handler with the <strong>SANS Internet Storm Center</strong>, which tracks hacking trends, <a href="http://isc.sans.org/diary.html?storyid=4963">speculates</a> that the spike is probably related to the massive numbers of Web sites that have been hacked by <a href="http://voices.washingtonpost.com/securityfix/2008/06/free_tools_to_secure_your_web_1.html">SQL attacks</a>, and seeded with browser exploits.<br />
<br />
While those numbers might seem high, they suggest more of a recent upward trend in bot counts rather than an accurate picture of just how many compromised PCs are out there. In fact, numerous other security experts this year have spotted single botnets that include <a href="http://voices.washingtonpost.com/securityfix/2008/04/kraken_creates_a_clash_of_the.html">upwards of 350,000 compromised PCs</a>. And by nearly all accounts, there are thousands of distinct botnets out there today under the thumb of criminal groups and individual hackers.<br />
<br />
<a href="http://voices.washingtonpost.com/securityfix/2008/09/number_of_bot-infected_pcs_sky.html">Read more ...</a><br />
<span style="color: #999999;">Brian Krebs on Computer Security. The Washington Post Company.</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-7471908030628577922008-09-01T06:08:00.002+07:002008-09-01T06:13:06.829+07:00FBI Warns of Hit Man Scam ResurgenceThe FBI is warning people not to be disturbed by an e-mail scam that threatens your life and orders you to pay up to avoid being the target of a hired hit man.<br /><br />The FBI <a href="http://www.fbi.gov/cyberinvest/escams.htm">said</a> its Internet Crime Complaint Center continues to receive thousands of reports concerning the hit man e-mail scheme. The FBI notes that while the content of the missive has evolved since similar hit man scams first surfaced in late 2006, the message remains the same, claiming the sender has been hired to kill the recipient.<br /><br />In some cases, the use of names, titles, addresses, and telephone numbers of government officials and business executives, and/or the victims' personal information are used in an attempt to make the fraud appear more authentic, the FBI said.<br /><br />I've heard about these scams before, but never actually seen one of the e-mails until today. Below is a copy of one of the scams making the rounds now.<br /><br /><blockquote></blockquote>"Dear Friend,<br />Goodday to you.<br />Am very sorry for you my friend, is a pity that this is how your life is going to end as soon as you don't comply. As you can see there is no need of introducing myself to you because I don't have any business with you, my duty as I am mailing you now is just to KILL/ASSASINATE you and I have to do it as I have already been paid for that.<br />Someone you call a friend wants you Dead by all means, and the person have spent a lot of money on this, the person also came to us and told me that he want you dead and he provided us with your name, picture and other necessary information's we needed about you. So I sent my boys to track you down and they have carried out the necessary investigation needed for the operation on you, and they have done that but I told them not to kill you that I will like to contact you and see if your life is Important to you or not since their findings shows that you are innocent.<br /><br /><a href="http://voices.washingtonpost.com/securityfix/2008/08/fbi_warns_of_hit_man_scam_resu.html">Read more ...</a><br /><span style="color:#999999;">Brian Krebs on Computer Security. The Washington Post Company.</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-24447041315088644662008-09-01T06:01:00.002+07:002008-09-01T06:08:06.480+07:00Report: Email Address Dictates Spam Volume<strong>The first letter of your email address is one factor in your spam risk, a researcher says</strong><br /><br />By Kelly Jackson HigginsSenior Editor, Dark Reading<br /><br />Everyone knows that some people get more spam than others, but <a href="http://www.cl.cam.ac.uk/~rnc1/aardvark.pdf" target="new">new research</a> shows that it may have something to do with the first letter of your email address. <br />Richard Clayton, a security researcher at the University of Cambridge in the U.K., says he found evidence that the more common the first letter in your email address is, the more spam you get: in other words, alice@company.com typically gets a higher volume of spam than quincy@company.com, or zach@company.com. He says that’s simply because there are more combinations of names that begin with “A” than with “Q” or “Z.”<br /><br />Over an eight-week period, Clayton studied around 8.9 million emails at a U.K. ISP and found that the email addresses that began with “A” received 35 percent spam in their inboxes, while “Z’s” got about 20 percent -- after sorting out real emails versus invalid ones that had likely been generated by a spamming tool. Clayton says it’s likely that spammers using dictionary attacks could be the cause of this disproportionate distribution of spam.<br /><br /><a href="http://www.darkreading.com/document.asp?doc_id=162585&WT.svl=news1_2">Read more ...</a><br /><span style="color:#999999;">Dark Reading.</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-77437694800191232532008-09-01T05:56:00.001+07:002008-09-01T06:01:24.256+07:00Report Slams U.S. Host as Major Source of BadwareLast week, I examined a series of Web services that make profiting from cyber crime a <a href="http://voices.washingtonpost.com/securityfix/web_fraud_20/">point-and-click exercise</a> that even the most novice hackers can master. Today, I'd like to highlight the activities of Atrivo, a Concord, Calif., based network provider that hosts some of these services.<br /><br />Several noted security researchers are releasing <a href="http://www.hostexploit.com/">a report</a> today that stems from many months of investigating malicious activity emanating from Atrivo's customers. Security experts say that Atrivo, also known as "Intercage," has long been a major source of spyware, adware, viruses and fake anti-virus products.<br /><br />The report is an exhaustive and well-researched analysis of Atrivo and its operations. Some of the statistics on active exploits cited in that report come from data sets I commissioned during my own investigation of Atrivo and later shared with <strong>Jart Armin</strong>, the principal author of the report and curator of the blog <strong>hostexploit.com.</strong><br /><br />Looking back several years, Atrivo's various networks were used heavily by the <a href="http://en.wikipedia.org/wiki/Russian_Business_Network">Russian Business Network</a>, an ISP formerly based in St. Petersburg, Russia. RBN had gained notoriety for providing Web hosting services <a href="http://www.washingtonpost.com/wp-dyn/content/article/2007/10/12/AR2007101202461.html">catering exclusively to cyber criminals</a>. But after increased media attention, RBN <a href="http://blog.washingtonpost.com/securityfix/2007/11/russian_business_network_down.html">dispersed its operations</a> to other, less conspicuous corners of the Internet.<br /><br />The portions of Atrivo most heavily used by RBN were <strong>Hostfresh</strong> -- which provides routing for Atrivo through Hong Kong and China -- and <strong>UkrTeleGroup</strong> (also known as <strong>Inhoster</strong>) out of Ukraine. These two networks remain core components of Atrivo's operation, and recent data suggests the company's reputation for supporting online criminals hasn't diminished since the disappearance of the RBN last year. As of last December, Atrivo boasted the largest concentration of malicious activity of any hosting company, according to a report released by security intelligence firm <strong>iDefense.</strong><br /><br /><a href="http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html">Read more ...</a><br /><span style="color:#999999;">Brian Krebs on Computer Security. The Washington Post Company.</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-43901632956215212012008-09-01T05:52:00.002+07:002008-09-01T05:56:10.473+07:00Microsoft Patches 26 Security HolesMicrosoft today released updates to fix at least 26 security vulnerabilities in its Windows operating systems and other software. At least 17 of those flaws earned Microsoft's "critical" rating, meaning they could be exploited to break into vulnerable systems with little or no help from the victim.<br /><br />The 26 vulnerabilities are the most Microsoft has addressed since it had 25 in August of 2006, which also included 17 rated as critical, according to anti-virus firm Symantec.<br /><br />Microsoft patched two holes in that have already been used in <a href="http://voices.washingtonpost.com/securityfix/2008/07/microsoft_hackers_exploiting_u_2.html">targeted attacks</a> against people browsing the Web with Internet Explorer 6 and 7. In addition to those two fixes, one bundle of critical updates plugs five other security holes in Internet Explorer, most of which Microsoft said are present all versions of the browser.<br /><br /><a href="http://voices.washingtonpost.com/securityfix/2008/08/microsoft_patches_26_security.html">Read more ...</a><br /><span style="color:#999999;">Brian Krebs on Computer Security. The Washington Post Company.</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-31809662277528884552008-07-12T09:44:00.002+07:002008-07-12T09:49:38.151+07:00A Baker's Dozen of Security Updates for iPhone 2.0As expected, the 2.0 version of <strong>iPhone</strong> released today includes a number of security updates, patching more than a dozen holes in the slimmed-down <strong>OS X</strong> operating system that powers the devices.<br />
<br />
That means for those who already own Apple's mobile device, it's time to update.<br />
<br />
As detailed <a href="http://blog.washingtonpost.com/securityfix/2008/07/apple_iphone_four_months_behin_1.html">in a column last week</a>, a number of these patches are updates that Apple shipped earlier this year for Safari and/or the version of OS X designed for Mac desktop and laptop computers. iPhone 2.0 bundles <a href="http://support.apple.com/kb/HT2351">some 13 security updates</a>, five of which address previously undocumented security flaws. <br />
<br />
Among the more notable (if not serious) patches: One fix for the gadget's Safari Web browser that was addressed by a number of other software makers (including Mozilla) <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783">back in June 2006</a>. Another Safari update plugs a security hole that Apple sealed in its <strong>Microsoft Windows</strong> version of Safari last month. Another fix corrects <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0177">a bug</a> in the iPhone's innards that Apple said could allow remote attackers to reset a targeted iPhone by sending it a specially crafted packet. An exploit for this vulnerability has been available online since February. <br />
<br />
The new software is available for iPhone 1.0 and <strong>iTouch</strong> 1.1 devices, through <strong>iTunes</strong>.<br />
<br />
<a href="http://blog.washingtonpost.com/securityfix/2008/07/a_bakers_dozen_security_update.html">Read more ...</a><br />
<font color="#666666">Brian Krebs on Computer Security. The Washington Post Company.</font>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-33805822349363090312008-07-12T09:37:00.000+07:002008-07-12T09:43:17.276+07:00Speeding In Maryland Could Be Hazardous to Your IdentityIf you've ever received a traffic ticket in Maryland, your name, birthday, Social Security number and address may be posted on the Maryland state Web site for anyone to find, Security Fix has learned.<br />
<br />
Reader <strong>Mark Webster</strong> from Annandale, Va., alerted me that the official <a href="http://casesearch.courts.state.md.us/inquiry/processDisclaimer.jis">Maryland court records Web site</a> lists the personal data of countless citizens. The citations listed go back more than 30 years, and include records even for routine traffic stops that were ultimately dismissed. <br />
The records with sensitive data in them appear to be limited to tickets issued to people who currently or at one time lived in a state that previously used the Social Security number as the default driver's license or customer number. [..]<br />
<br />
<a href="http://blog.washingtonpost.com/securityfix/2008/07/maryland_traffic_site_lists_so.html">Read more ...<br />
</a><font color="#666666">Brian Krebs on Computer Security. The Washington Post Company.</font>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0tag:blogger.com,1999:blog-6583027139354147229.post-17000650390614135212008-04-03T05:40:00.000+07:002008-04-03T05:40:29.798+07:00April Fool's Day Warning, And Some Fun - Security Fix<a href="http://blog.washingtonpost.com/securityfix/2008/04/april_fools_day_warning_and_so.html">April Fool's Day Warning, And Some Fun - Security Fix</a>: "April Fool's Day Warning, And Some Fun<br /><br />This post has been updated. Please read through to the end.<br /><br />Original post:<br /><br />The cyber criminal(s) behind the Storm worm want to make an April Fool out of you today.<br /><br />The Storm worm author(s) likes to use holidays and other notable calendar occasions to launch new attacks. True to form, new versions of the Storm worm were blasted out yesterday as links in an e-mail that included a taunting image of an idiot in a fool's costume wearing a 'kick me' sign. Anyone foolish enough to follow the embedded directions telling recipients to 'click here, if your download doesn't start in 5 seconds,' will hand their PC over to the bad guys.<br /><br />Image F-Secure.com<br /><br />The security news on this first day of April isn't all hackers and viruses. In fact, you'd do well not to take anything you read online today too seriously. Below are a few of the more entertaining fake security news stories spotted so far today (hat tip to the SANS Internet Storm Center).<br /><br />F-Secure: A new Trojan horse program that actually deposits money into your bank account.<br /><br />Google: Introducing 'Gmail Custom Time.' Didn't send that presentation on time? No problemo! Now you can back-date your G-mail messages.<br /><br />NASA: Giant Space Station Robot Turns on Crew (image)." [..]<br /><br /><a href="http://blog.washingtonpost.com/securityfix/2008/04/april_fools_day_warning_and_so.html">Read more...</a><br /><span style="color: rgb(153, 153, 153);">Brian Krebs on Computer Security. The Washington Post Company.</span>KruJATUhttp://www.blogger.com/profile/12977626066999333658noreply@blogger.com0