Main » Архив материалов


Situation where one spouse is reading SMS or e-mail of another, is almost normal - refers to cases where the husband or wife to suspect each other of treason, and try to verify this by looking at "discrediting". There are hundreds if not thousands of anecdotes about such situations and, in general, society does not consider such cases something out of the ordinary. And here in the U.S. Ceychas is an interesting trial, a decision which may be the same judicial precedent. The situation is completely anecdotal, if not complete its severity.

The accused, 33-year-old Leon Walker, regularly read e-mails his wife, having learned the password from her account in Gmail. We have to think that the big problem is to find out the password from the email, instant messenger or social networking account of its second half there. Walker waited until the wife leaves the house and sat down to check her email. In the end, his wife noticed something was wrong, a scandal, and not just - it we ... Читать дальше »
Просмотров: 1946 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Not only Apple, AT & T and accessory makers have all the amenities of hype around the iPhone. Virus writers and scammers, too, have found a way how you can profit from this situation. They have already managed to create a botnet of users who wanted to buy himself a new "wonder device" from Apple.

Company PandaLabs has detected this week botnet of 7.5 thousand computers (the number is constantly growing), infected with a trojan called Aifone.A. PC users who tried to buy an iPhone from the site iphone.com, owned by Apple, to be forwarded to a fake site that mimics the site iPhone. If users have ordered the iPhone through the dummy site, the information about the bank or credit card fell into the hands of fraudsters.

"This is one of the most sophisticated attacks aimed at specific community, this time for buyers iPhone», - said the technical director of PandaLabs Kerrons Lewis (Luis Corrons). - "It's really complex, dangerous attack that combines elements of malware (tro ... Читать дальше »
Просмотров: 675 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Specialists have reported unusual behavior of Windows XP and Vista in recent days. Some of them are on the team in the middle of the night began to update the system files to bypass the traditional process avtoapdeyta. And the files are updated, even if the system is turned off Automatic Updates. Program Windows Update (WU) has assumed all powers and without any dialogue with the user independently replaced nine files.

Generally speaking, this is a very meaningful event. If Microsoft would make compulsory procedure for updating the standard, we need to review the entire security strategy for personal computers. This self-updating PC is not entirely controlled by his master.

Of course, Microsoft does this for security of the users, but is relevant to users as a herd of sheep rather insulting. In addition, implementing such a procedure global updating systems in a homogeneous environment, the company itself becomes a source of potential danger.

Under OS XP SP2 update ... Читать дальше »
Просмотров: 746 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

One winter morning a colleague said that in various browsers on a page Presenting Vimeo Plus, shows a different value of the subscription. It was $ 49.95 and $ 59.95. Immediately suspicion crept in, why is it so strange marks Vimeo annual subscription. While in my car all browsers show the same amount.

After a little research, we realized that the price is stored in a cookie named 5vimeo_cart:

% 7B% 22item_class% 22% 3A% 22AccountFeatures% 22% 2C% 22user_for% 22% 3Anull% 2C% 22item_identifier% 22 % 3A1% 2C% 22name% 22% 3A% 22Vimeo + Plus% 3Cimg + src% 3D% 27% 5C% 2Fassets% 5C% 2Fimages% 5C% 2Ficon_plus_tiny.png% 27% 5C% 2F% 3E% 22% 2C% 22cost % 22% 3A59.95% 7D

reasons for such different amounts of affixing not been elucidated. As an experiment, decided to try to put the value and try to buy a subscription for one year. Just for this was an appropriate card with $ 4 per account (had nothing to lose, you still would not have removed more). Change the ... Читать дальше »
Просмотров: 718 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Just received the following letter:

Dear Customer,

According to paragraph 4.6.2.5. Terms of Use Yandex.Money, your account is blocked.
Need an account reactivation in the system.

To reaktsivatsii follow this link: https: / / money.yandex.ru / login.html

or contact one of our operators:
PS Yandex LLC. 101000, Moscow, st. Vavilova, 40
tel.: +7 (495) 739-23-25 ??
PS Yandex LLC, St. Petersburg branch. 191123, St. Petersburg, ul. Radishchev 39, tel.: +7 (812) 334-7750

Letter generated automatically, do not respond
Best regards, PS Yandex

Letter sent in HTML format . If you click on a link you get to the page: http://pornos-de.com/money.ya.ru/Index.h ..., which is a replica of the main page of Yandex. In no case do not enter their data.

Be careful.

If you access this page FireFox warns that this is a dangerous page. Apparently the good people have already noted the site as potentially dangerous for users. By the wa ... Читать дальше »
Просмотров: 815 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

Translation of an article from the site rootkit.com

Preamble

Kaspersky Anti-Virus - one of the most technically advanced anti-virus today. It can even deal with certain types of viruses, even when they were alive and trying to attack.

He has a proactive defense module (Proactive Defence), representing a partial implementation of HIPS, is capable, in theory, help protect your computer from unknown threats by analyzing program behavior and preventing unauthorized actions.

This is all theory and advertising slogans. In reality, we have a very different situation. There are many viruses, which do not show anti-virus, and its proactive protection can be suppressed so that an attacker can download your driver, then any proactive protection simply useless.

This article - not just a review of errors and vulnerabilities - at the end of each part, we give advice to developers antivirus, because we see that they can not deal with these mistakes yourself. ... Читать дальше »
Просмотров: 836 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

As reported by Associated Press, on Monday, Donald Kerr (Donald Kerr), since October was the Director of National Intelligence in the Office of the President of the United States, said that society needs to reconsider the definition of such an important democratic freedom as privacy. "Privacy no longer can mean anonymity," said Carr, adding that protection against ingress of correspondence and financial information to citizens in improper hands should not engage themselves and the government and business. Of course means that the hands of the CIA and NSA to improperly do not apply.

The discussion was again raised in the U.S. Congress during a re-consideration of amendments to the Act on the Supervision of foreign intelligence (FISA), which for several months trying to push through the Bush administration. Amendments are needed for its extension of the almost unlimited powers, which were issued to U.S. "security officials" in the famous USA PATRIOT Act after the attacks of Septem ... Читать дальше »
Просмотров: 656 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

The most secure network of anonymous servers, Tor was not such secure. Two months ago in Sweden a scandal erupted when it became aware of the deed of a well-known consultant on IT-security, 22-year-old Dena Egerstada (Dan Egerstad). He made a traffic filtering Tor and posted on his blog logins and passwords to mailboxes and servers belonging to the embassies of countries, NGOs, commercial firms and government agencies in different countries. Among the victims - the Embassy of India, Russia, Uzbekistan, Kazakhstan and Iran, as well as the British representative in Nepal. Anyone could go to read a post on these accounts.

That article became a sensation. Now the story gets its development. On a tip from U.S. authorities Swedish police shut down blog Dehn, searched his apartment and confiscated equipment, and him after two hours of interrogation were released. Dan is still at large and giving interviews, explaining his position. He sure has not violated any laws, but it already seem ... Читать дальше »
Просмотров: 689 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

German police could not intercept and decipher Skype traffic for wiretapping phone calls of suspected criminals and terrorists. At the annual meeting of representatives of law enforcement and security professionals at this complained to reporters Zirka Joerg (Joerg Ziercke), president of the National Police headquarters in Germany (BKA), according to Reuters.

This situation is not satisfied with the police, for which wiretapping phones long ago became a standard tool for rapid development. Naturally, the security forces are not going to abandon such an effective tool and are now looking for a way out of this situation.

Experts say VoIP-telephony by its nature more difficult to intercept because the information is transmitted as packets through the network to an unpredictable route, rather than fixed lines, as in conventional telephony.

Joerg Zirka said they did not seek the leadership of Skype to ask for help in solving this problem. "I do not think it will help" - ... Читать дальше »
Просмотров: 651 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

The article deals with one of information security issues - the fight with successive deliveries, which are also called "chain letters" in honor of the handwritten pattern. The first such message, entitled "Celestial" or "holy letters» (Himmelsbriefe) appeared in the Middle Ages. However, we will not digress from the topic and consider the threat of "chain letters" from the perspective of Information Security:

The hidden danger "" chain letters "and similar successive mailings



To many it is understandable that the data distribution provide the parasite load on corporate equipment and communication channels. This is indeed the case, however, is not the biggest danger: the creation of such a chain is one of the mechanisms to obtain accurate database of addresses by spammers. An even greater danger lies in the "illumination" of the staffing structure of enterprises, which allows attackers to use this information in a variety of purposes. But the biggest risk at all ... Читать дальше »
Просмотров: 803 | Добавил: w1zard | Дата: 15.03.2011 | Комментарии (0)

« 1 2 3 4 5 ... 58 59 »