<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3401588452896501519</id><updated>2024-12-19T06:22:16.210+03:00</updated><category term="Menu"/><category term="ESET and AVG"/><category term="News"/><category term="Avira and Avast"/><category term="Norton"/><category term="Kaspersky"/><title type='text'>MicroSecurity</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>39</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-6413437358886260732</id><published>2011-03-02T21:02:00.003+03:00</published><updated>2011-03-02T21:04:28.931+03:00</updated><title type='text'>How to protect your Facebook account from hackers, spammers and clowns</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #515151; font-family: Arial, sans-serif; line-height: 22px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; class=&quot;alignright size-full wp-image-3042&quot; height=&quot;131&quot; src=&quot;http://fsecureconsumer.files.wordpress.com/2010/12/hacked12.jpg?w=337&amp;amp;h=139&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: block; float: right; margin-bottom: 18px; margin-left: 20px; margin-right: 0px; margin-top: 0px; max-width: 100%; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; title=&quot;hacked1&quot; width=&quot;320&quot; /&gt;If you’re like the average Facebook user,&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/press/info.php?statistics&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;you have 130 Facebook friends&lt;/a&gt;.&amp;nbsp; Those friends may include your mom, your best friend from 5&lt;sup style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; bottom: 1ex; height: 0px; line-height: 1; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: relative; vertical-align: baseline;&quot;&gt;th&lt;/sup&gt;&amp;nbsp;grade, your boss. (If your friends list includes people you don’t know, you should&amp;nbsp;&lt;a href=&quot;http://safeandsavvy.f-secure.com/2010/12/01/make-facebook-safer/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;audit your account right now&lt;/a&gt;. )&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Now, what happens if your Facebook account is taken over by a spammer or a scammer? Or maybe a disgruntled ex gets control of your profile and starts posting shameful things on your friends’ walls. Could you brush it off and tell yourself, “It’s just the Internet. Who cares?” Probably not.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;a class=&quot;litmus_validated_good&quot; href=&quot;http://apina.biz/37075.png&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Hackers are out there&lt;/a&gt;&lt;a class=&quot;litmus_link_handler litmus_theme_colourful&quot; href=&quot;http://safeandsavvy.f-secure.com/2010/12/28/protect-your-facebook/#&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;img class=&quot;litmus_good&quot; src=&quot;http://safelinks-api.f-secure.com/images//colourful/handler_good.png&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-color: initial; border-color: initial; border-color: initial; border-style: initial; border-style: initial; border-width: initial; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-width: 100%; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px; vertical-align: middle;&quot; /&gt;&lt;/a&gt;—helping each other to take advantage of lax security. So here’s what you need to know to keep strangers out of your account. If you’re in a hurry, the most important information is on top.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;The Basics&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Use a strong password and don’t let your browser remember it&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
Your password is the key to your Facebook castle. If it isn’t strong, if it includes things that your friends and exes can guess, you’re leaving your drawbridge wide open. Creating and remembering strong passwords isn’t easy.&amp;nbsp;&lt;a href=&quot;http://safeandsavvy.f-secure.com/2010/03/15/how-to-create-and-remember-strong-passwords/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;That’s why we recommend this simple system&lt;/a&gt;.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;And tell Firefox, or whatever browser you use, that you don’t want it remembering your passwords. Don’t make life easier for hackers. (To clear your passwords in Firefox, go to “Tools” then “Clear Private Data” the close and reopen Firefox.)&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Use unique passwords for all of your important accounts (and update them whenever you go the dentist)&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
For any account that really matters—your email, your bank and credit card accounts, Facebook—you need to use a unique, strong password that you do not use for any other account. Whenever a site is hacked, you see that this creates a security crisis across the Web. Why? People reuse passwords. Don’t be one of those people.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;And yes, you should update the passwords of your most important accounts. How often? Some say every month. Some say every few months.&amp;nbsp; How about whenever you’ve just gotten home from the dentist? You’ll be in the mood for a little pain. And if you’re the kind of a person who sees a dentist more than twice a year, you should be as careful with your passwords as you are with your teeth.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Of course, if you recognize any suspicious account activity in your account, change your password immediately.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Make sure your system software and Internet security are updated&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
All the security in the world won’t help you if your PC is infected with a keylogger that can track every letter you type. Updated system and Internet Security can’t stop you from making security mistakes. But it can prevent most of the common attacks out there. Our free&amp;nbsp;&lt;a href=&quot;http://www.f-secure.com/en/web/home_global/protection/free-online-tools/free-online-tools&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Health Check&lt;/a&gt;&amp;nbsp;will tell you if your PC is protected.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Watch where you click and watch where you land&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
Cybercriminals have mastered a devious method of stealing passwords: they ask you for them. This method is called Phishing and it works because it’s easy to make any webpage in the world look official and reputable. A page that looks just like a Facebook profile can be replicated in minutes. That’s why you always need to check the URL in your browser to make sure you’re on Facebook whenever you enter your private information. And if you ever have any doubt about something that has been posted in your newsfeed, follow the&amp;nbsp;&lt;a href=&quot;http://safeandsavvy.f-secure.com/2010/05/26/the-golden-rule-security/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Golden Rule of Social Media Security&lt;/a&gt;and don’t click.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Always log out&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
You’re not keeping hackers out by staying logged in. They still can get in and you’re leaving your account open for a snarky co-worker or invasive family member to pry. And once someone is inside your account, they can change your password to keep you out.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;How To Make Sure You Can Get Your Account Back If It Is Hacked&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;If you start using a new email account, update Facebook settings&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
If your account is hacked, you need access to the email account you have in your settings. If you can’t get into that email because it’s closed, you’ve just greatly limited your chance of recovering your account.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Do what Facebook recommends&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
&lt;img alt=&quot;&quot; class=&quot;alignright size-full wp-image-3036&quot; height=&quot;187&quot; src=&quot;http://fsecureconsumer.files.wordpress.com/2010/12/fssecurity1.jpg?w=474&amp;amp;h=278&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: block; float: right; margin-bottom: 18px; margin-left: 20px; margin-right: 0px; margin-top: 0px; max-width: 100%; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; title=&quot;fssecurity1&quot; width=&quot;320&quot; /&gt;Facebook now rates how secure your account is. It’s a powerful feature, as long as you take it seriously. If your account “Overall Protection” is rated “low”, Facebook will prompt you to add some information. Do this!&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Add a secondary email&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
Facebook asks for a secondary email. This helps Facebook because now it will be able to connect you with more friends. And it helps you if you ever lose access to your primary email, or if your primary email gets hacked. So only add&amp;nbsp; a secure email account with a unique password.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;You can add your secondary email by going to “Account” &amp;gt; “Account Settings”&amp;gt; Find “Email” and click on “change”.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Add your mobile number&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
Adding your cell phone number gives you a secondary way to claim your hacked account. It also gives you the ability to get one-time passwords, which I’ll explain later. To change or add your mobile number,&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/help/?ref=pf#!/mobile/?settings&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;go here&lt;/a&gt;. On that same page, be sure to edit your notifications or Facebook will be texting you nonstop.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Keep in mind that your Facebook account security now depends on your mobile security, so I recommend that you have some way to lock or wipe your phone if you lose it. Our&amp;nbsp;&lt;a href=&quot;http://www.f-secure.com/en/web/home_global/protection/anti-theft-for-mobile/overview&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Free Anti-Theft for Mobile&lt;/a&gt;&amp;nbsp;does just that.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Add a strong security question&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
Make sure you choose a question that only you can answer. The last five digits of your driver’s license are probably better answer than the name of your first pet—since your friends and family may know that. The worst answer, of course, would be one that a stranger could figure out by looking at your profile.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;For Extra Protection&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Activate Account Protection&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
Want to be notified whenever a new computer logs into your account? Activate Account Protection.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Why would you want to do this? Because if someone gets into your account on a device you don’t recognize, you can login to Facebook and “end activity” on that login. Then you can, hopefully, change your password before the intruder does.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Once you activate this feature, you’ll have to identify ever device you login from. It’s slightly annoying, but it gives you the kind of control of your account that will keep your account safe.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;To activate Account Protection and “end activity” on any Facebook sessions you didn’t initiate, go to “Account” &amp;gt; “Account Settings”&amp;gt; Find “Account Protection” and click on “change”.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;em style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-style: italic; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Use One-Time Passwords on public computers&lt;/em&gt;&lt;/span&gt;&lt;br /&gt;
If you use Facebook on public computers, such as at school or the library, you should use Facebook’s One-Time password feature. On a public computer, you have no idea what kinds of programs are running that could be used to log your account information. By using a unique password each time, you remove the risk that your credentials will be stolen.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;To do this you need to set up and verify your SMS number.&amp;nbsp;&lt;a href=&quot;http://www.facebook.com/mobile/?settings&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Go here&lt;/a&gt;&amp;nbsp;and add in your mobile number. You’ll then need to verify the number by entering a code that will be sent to you. Once this is done, you can send a text message to 32665 with the message “&lt;span style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;otp&lt;/span&gt;” whenever you’re about to login on a public computer. Your One-Time Password will work for 20 minutes after you receive it.&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/6413437358886260732/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/6413437358886260732?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/6413437358886260732'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/6413437358886260732'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/03/how-to-protect-your-facebook-account.html' title='How to protect your Facebook account from hackers, spammers and clowns'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-8209042642485009375</id><published>2011-03-02T15:22:00.007+03:00</published><updated>2011-03-02T20:56:21.605+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>How to protect your data privacy on social networks</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #515151; font-family: Arial, sans-serif; font-size: 12px; line-height: 22px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignright size-medium wp-image-3114&quot; height=&quot;132&quot; src=&quot;http://fsecureconsumer.files.wordpress.com/2011/01/finger.jpg?w=300&amp;amp;h=199&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; display: block; float: right; font-size: 12px; margin-bottom: 18px; margin-left: 20px; margin-right: 0px; margin-top: 0px; max-width: 100%; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; title=&quot;finger&quot; width=&quot;200&quot; /&gt;&lt;b&gt;Studies have said public speaking makes as many as 3 out of 4 people anxious. But that was before Facebook.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;The 650 million people on Facebook suggest that most of us are getting over—or want to get over—that fear of communicating (or at least sharing pictures) in public. In just a few years, Twitter, YouTube and Facebook have given billions of people the chance to connect to an audience they would never had access to before.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;But now that you’re becoming comfortable in public, you may begin to wonder: Am I revealing too much? In a world with the NSA, TMZ and Wikileaks, do I have any privacy? Is it possible to be a public person and still protect my information from being misused?&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Friday January 28 is&lt;a class=&quot;litmus_validated_unknown&quot; href=&quot;http://dataprivacyday2011.org/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;Data Privacy Day 2011&lt;/a&gt;&lt;a class=&quot;litmus_link_handler litmus_theme_colourful&quot; href=&quot;http://safeandsavvy.f-secure.com/2011/01/27/protect-your-data-privacy/#&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;img class=&quot;litmus_unknown&quot; src=&quot;http://safelinks-api.f-secure.com/images//colourful/handler_unknown.png&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-style: initial; border-top-width: 0px; border-width: initial; font-size: 12px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-width: 100%; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px; vertical-align: middle;&quot; /&gt;&lt;/a&gt;, an international celebration of the dignity of the individual represented through personal information. Protecting your irreplaceable data is our mission and we take this mission very seriously. (Here is F-Secure’s&amp;nbsp;&lt;a href=&quot;http://www.f-secure.com/en_US/privacy.html&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;Privacy Policy&lt;/a&gt;.)&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;The risks&lt;/strong&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;The more visible, attractive or rich you are, the more you’re a target for the haters, the stalkers and online criminals of the 21st century. Heck, if you have a credit card, you’re a target for both the online criminals and unscrupulous marketers of the world.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Sharing personal information in an age where data can travel faster than lightning requires a 21st century view of data privacy. Some think it’s vain to worry about privacy. But don’t think about your ego, think about social engineering.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Wiktionary describes social engineering as “The practice of tricking a user into giving, or giving access to, sensitive information, thereby bypassing most or all protection.” Criminals have discovered that human error is the easiest vulnerability to exploit. If you’re not careful, your private data (or even public data) can be used to fool you into making mistakes that even your award-winning Internet Security can’t prevent.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Ignorance may be bliss, but it’s not an excuse. Once your private data is stolen, you’ll have to deal with the consequences. The good news is that you can do a lot to make your data more secure&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;My nephew once told me, “Facebook is so easy that even old people can use it.” And by old people, he meant me.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;I agree with my nephew. Most people who use social media don’t suffer significant negative consequences for doing so—or there wouldn’t be millions of new people trying it every day. Stories of people being fired or arrested for what they’ve done on Facebook are rare. But they get lots of attention because&amp;nbsp;&lt;a href=&quot;http://safeandsavvy.f-secure.com/2011/01/11/facebook-is-notshutting-down/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Facebook is the superstar everyone knows&lt;/a&gt;.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Only a small percentage of those on social media fall victim to the worst of identity theft, malware or scams. And that’s still too many people suffering needlessly—especially because most of these scourges are avoidable.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;The lessons&lt;/strong&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;If you learned to manage the benefits and risks of email, you can do the same for social media. Here a few things you can do to help keep your private data private.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;1. Decide why you’re social networking.&lt;/strong&gt;&lt;br /&gt;
&lt;b&gt;For some, social networking is an extension of your private life. You mostly interact with people you know or would like to know in the real world. The main topics of conversation are personal. Even when you delve into entertainment or politics or sports, it’s about sharing opinions to have fun and connect. Intimacy is the goal so private things are often shared nonchalantly. For instance, you might reveal what you did on a day when you played hooky from school or work.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;For others, social networking is like interacting at a conference. You’re seeking out people in your industry or whom you admire. Conversation is like a cocktail party—being interesting and on-topic matters. When you talk about entertainment or politics or sports, it’s a way to network and establish trust. You want people to feel like they know you, but getting too personal too fast raises red flags. For instance, you may reveal what you did on your vacation but only in a way that you wouldn’t mind your boss reading.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;For a growing number of people, social network is a chance to build a little fame or fortune. You’re looking for an audience who trusts and enjoys you to the point you might even sell them things. You converse with fellow influencers and friends but you also broadcast for a targeted or general audience. When you talk about entertainment or politics or sports, you’re entertaining or engaging an audience while establishing expertise. You may share extremely private details or never talk about your personal life. Either way, you’re establishing a persona that’s relatable to the audience you’re trying to attract. For instance, you may reveal a joke a well-known person shared with you.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;By the time you’re out of college for a few years, most people have tried out some variation of each of these approaches to social media. And your approach definitely affects your data security.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;The rule is: the bigger the audience you seek, the more you have to think about the information you share.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;All of us have to protect our ID, account and phone numbers, our address and our Mother’s maiden name. But if you’re an aspiring Disney star or class president, you have to think about which pictures you take—since you know they’ll all be posted eventually. And George Clooney probably shouldn’t use Foursquare to share his location unless he wants to spend his day shaking hands or filing restraining orders.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;We all need to be cautious about sharing details that can be used to scam us. If you achieve, or accidentally achieve, fame, your privacy will become even more precious. So if you want to be internet famous, you need to be savvy about which information you share online—or you’ll have to hire people who are.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;2. Secure your systems&lt;/strong&gt;&lt;br /&gt;
&lt;b&gt;Don’t use the default password for your voicemail or anything.&amp;nbsp;&lt;a href=&quot;http://safeandsavvy.f-secure.com/2010/03/15/how-to-create-and-remember-strong-passwords/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Use strong, unique passwords&lt;/a&gt;&amp;nbsp;for all your accounts. Don’t use work email addresses or passwords for social accounts. Put security software on your PC and your mobile device, if possible. Password protect your Wi-Fi networks.&lt;a class=&quot;litmus_validated_good&quot; href=&quot;http://www.facecrooks.com/blog/internet-safety-a-privacy/item/1026-secure-your-facebook-account-with-https-in-three-steps&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Turn on secure browsing on Facebook&lt;/a&gt;&lt;a class=&quot;litmus_link_handler litmus_theme_colourful&quot; href=&quot;http://safeandsavvy.f-secure.com/2011/01/27/protect-your-data-privacy/#&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;img class=&quot;litmus_good&quot; src=&quot;http://safelinks-api.f-secure.com/images//colourful/handler_good.png&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-style: initial; border-top-width: 0px; border-width: initial; font-size: 12px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-width: 100%; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px; vertical-align: middle;&quot; /&gt;&lt;/a&gt;. Put a&amp;nbsp;&lt;a href=&quot;http://www.f-secure.com/en/web/home_global/protection/anti-theft-for-mobile/overview&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;remote lock&lt;/a&gt;&amp;nbsp;on your mobile phone. Always lock your PC and mobile devices when you aren’t using them. Keep your system and application software updated. (Our free&lt;a href=&quot;http://www.f-secure.com/en/web/home_global/protection/free-online-tools/free-online-tools&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;Health Check&lt;/a&gt;&amp;nbsp;makes that easy.)&amp;nbsp;&lt;a class=&quot;litmus_validated_good&quot; href=&quot;http://www.switched.com/2011/01/24/keep-your-photos-exif-geotag-data-safe/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;Turn off GPS&lt;/a&gt;&lt;a class=&quot;litmus_link_handler litmus_theme_colourful&quot; href=&quot;http://safeandsavvy.f-secure.com/2011/01/27/protect-your-data-privacy/#&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;&lt;img class=&quot;litmus_good&quot; src=&quot;http://safelinks-api.f-secure.com/images//colourful/handler_good.png&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-color: initial; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-style: initial; border-top-width: 0px; border-width: initial; font-size: 12px; margin-bottom: 18px; margin-left: 0px; margin-right: 0px; margin-top: 0px; max-width: 100%; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px; vertical-align: middle;&quot; /&gt;&lt;/a&gt;&amp;nbsp;on your phone and pictures if you don’t want strangers to know your location.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;3. Choose services you trust&lt;/strong&gt;&lt;br /&gt;
&lt;b&gt;Any store, service or site that has your data, should have a privacy policy. A key feature of a good privacy policy is that your data will not be shared or sold. By 2011, most reputable online businesses have privacy policies that make that basic promise. But in addition to privacy also have to trust that any organization you trust with your data had security that won’t be compromised. Quality can have a price. If privacy is more important to you than cost, you can buy dedicated email services that won’t serve you ads. Regardless if they charge or not, you should only use reputable online services you trust. Before you enter any data into any website, think, “Do I trust this organization?” If there’s any doubt, ask others what they think.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;4. On a social network, your information could be shared with everyone– no matter what your privacy settings are.&lt;/strong&gt;&lt;br /&gt;
&lt;b&gt;Twitter is simple. There are two privacy settings: everyone or “Protect my tweets”. But even if you go with the protected option, your approved followers can still retweet your information to everyone. Facebook’s privacy settings are much more complex. They’re so complex that it almost feels like you should get college credits for really using them. Going with “Friends Only” is a good start, then you have to decide if you want your page on Google (if you don’t want your Facebook page to show up on Google, go to Account &amp;gt; Privacy Settings &amp;gt; Apps and Websites: Edit your settings &amp;gt; Public Search: Edit Settings &amp;gt; Uncheck Enable public search)&amp;nbsp; and if you want to automatically&amp;nbsp;&lt;a href=&quot;http://safeandsavvy.f-secure.com/2010/10/05/facebooks-instant-personalization-questions-and-answers/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;share your information with other websites&lt;/a&gt;.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;The safest rule is:&amp;nbsp;&lt;a href=&quot;http://safeandsavvy.f-secure.com/2010/08/05/protect-yourself-facebook/&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; background-position: initial initial; background-repeat: initial initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #d43e8c; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot; target=&quot;_blank&quot;&gt;get your settings right&lt;/a&gt;&amp;nbsp;and still assume that what you post could go public so only share information you wouldn’t mind a future boss (or fan) seeing. NEVER share information that could be used to crack your passwords. Also keep in mind that the information you’re sharing that could be used by identity thieves and social engineers.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: baseline;&quot;&gt;5. Be available or don’t&lt;/strong&gt;&lt;br /&gt;
&lt;b&gt;There is a difference between following and friending people. You can follow a lot of people but our brains can only handle around 130 friends. Rejecting or ignoring friend requests can be emotionally difficult, but your privacy is more important than others’ feelings. I say follow anyone on Twitter but on Facebook I’d recommend only befriending people you know or trust. And realize that the person is your friend, not their links. If anyone begins to spam you, let them know the problem. If they keep spamming, unfriend them. If anyone harasses you at all, block their communication. If you’re threatened, contact law enforcement.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: transparent; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-size: 12px; margin-bottom: 22px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: initial; outline-width: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;You have the right to keep your private data secure while living your digital life to the fullest. All you have to do is respect your own data privacy and do your best to make sure that the people and businesses you interact with do the same.&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/8209042642485009375/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/8209042642485009375?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/8209042642485009375'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/8209042642485009375'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/03/how-to-protect-your-data-privacy-on.html' title='How to protect your data privacy on social networks'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-1407792253758127933</id><published>2011-02-16T00:09:00.001+03:00</published><updated>2011-02-16T00:09:43.314+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>WiFi + Airport = Lost password</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial; font-size: 14px; line-height: 19px;&quot;&gt;As most travelers know, many airports and VIP lounges offer Wi-Fi connectivity but, unfortunately, these connection are rarely encrypted.&amp;nbsp;&amp;nbsp; Here’s an example:&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;c&quot; dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;1&quot; src=&quot;http://www.securelist.com/en/images/pictures/klblog/11163.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot; title=&quot;&quot; /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;All data sent and received travels in clear text, which means anyone could intercept the data for malicious purposes.&amp;nbsp; This unencrypted data could include passwords, logins, financial information like PIN codes, etc.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Many people also know that it’s always better to use a VPN connection.&amp;nbsp; However, in many cases,&amp;nbsp; VPN connection are filtered out and blocked by rules on the network firewall. I tried two different protocols and both were blocked.&amp;nbsp; Mostly network administrators don’t allow using VPNs from Public WiFi access points only because they want to make sure the network isn’t be used for malicious purposes without any readable network logs.&amp;nbsp; These policies actually allow to the bad guys to launch really easy&amp;nbsp; man-in-the-middle&amp;nbsp; attacks when all traffic pass through a malicious host.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;The reality is that using a public Wi-Fi service can expose your really sensitive data to cybercriminals. Recently, we saw some famous people lose their Facebook and other social network passwords by using open (insecure) Wi-Fi connections.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;So what is the solution when your VPN is blocked? Well, in some cases, an&amp;nbsp;&lt;span style=&quot;font-weight: bold;&quot;&gt;SSL (https)&lt;/span&gt;&amp;nbsp;connection may help. Please, before going to any Website, type in the address bar&amp;nbsp;&lt;span style=&quot;font-weight: bold;&quot;&gt;https://&lt;/span&gt;&amp;nbsp;and then the domain name. After the page is loaded, please check if the certificate used for encryption is a valid one and issued to the site you’re visiting. If you see something wrong with the certificate, stop using the site.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Another solution is to use a cable&amp;nbsp;&lt;span style=&quot;font-weight: bold;&quot;&gt;Ethernet&amp;nbsp;&lt;/span&gt;connection&amp;nbsp;&lt;span style=&quot;font-weight: bold;&quot;&gt;instead of a WiFi&lt;/span&gt;. Many lounges have such connection as well; it will be much safer for you.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;In any case if you’re connected from a public place, it’s better not to use eBanking or ePayment services. That data is the main target for criminals. So, travel safe and keep your personal data safe as well!&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/1407792253758127933/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/1407792253758127933?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1407792253758127933'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1407792253758127933'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/wifi-airport-lost-password.html' title='WiFi + Airport = Lost password'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-4794686276686565343</id><published>2011-02-15T01:23:00.002+03:00</published><updated>2011-02-15T01:24:37.707+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>iPhone passwords succumb to researchers&#39; attack</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postBody&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;div class=&quot;cnet-image-div image-REGULAR float-left&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: left; float: left; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 1em; margin-right: 1em; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline; width: 184px;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;cnet-image&quot; height=&quot;138&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/10/AppleiPhone.jpg&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot; width=&quot;184&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;Researchers at the Fraunhofer Institute for Secure Information Technology in Darmstadt, Germany, have found a way to steal passwords found in the&amp;nbsp;&lt;a href=&quot;http://www.cnet.com/apple-iphone.html&quot; section=&quot;luke_topic&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;Apple iPhone&lt;/a&gt;&#39;s keychain services within six minutes.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;In order to steal passwords, the researchers&amp;nbsp;&lt;a href=&quot;http://www.sit.fraunhofer.de/forschungsbereiche/projekte/Lost_iPhone.jsp&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;said&lt;/a&gt;, the attacker must have have the actual, physical iPhone in hand--this isn&#39;t a remote maneuver. First, the attacker has to jailbreak the iPhone, and from there then must install an SSH server on the smartphone to be able to run unrestricted programs. The researchers also created a &quot;keychain access script&quot; that they then copied to the iPhone. After executing that script, they found that they were able to decrypt and see some passwords saved in the keychain.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;Over the past year, several iPhone exploits have been revealed by researchers around the world, including some that attack&amp;nbsp;vulnerabilities in the mobile Safari browser. But at least so far, the issues have affected users who jailbreak their own devices. Even in the Fraunhofer Institute&#39;s case, a non-jailbroken iPhone will not reveal keychain passwords. Jailbreaking is the process of bypassing the restrictions that Apple sets up to keep users from tinkering with the device&#39;s underlying system software.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;Researchers said that this latest issue has to do with how iOS handles encryption--namely, that &quot;encryption is independent of the personal password to protect access to the device properly.&quot; In other words, even if a user protects access to the iPhone--or any other iOS-based device--with a passcode, it won&#39;t be enough to stop hackers from using this method to access saved passwords in the keychain.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;It should be noted that the proof-of-concept maneuver would not reveal passwords for Web sites. Services like Gmail, AOL Mail, Yahoo Mail, and others with &quot;protected&quot; passwords &quot;were available to the script only after entering the passcode to unlock the device, which by assumption, should not be possible for an attacker,&quot; the researchers noted.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;But the folks at Fraunhofer Institute don&#39;t necessarily believe that iPhone owners should assume that they will be safe if they don&#39;t jailbreak their iPhones. In their scenario, the researchers assumed that the iPhone was stolen and the person who took it knew how to jailbreak the device and create and run scripts. They said in their evaluation of their proof-of-concept that the difficulty level of exploiting the vulnerability is &quot;low.&quot;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&quot;Owners of a lost or stolen iOS device should therefore quickly initiate a change of all stored passwords,&quot; the researchers wrote in their report. &quot;Additionally, this should be also done for accounts not stored on the device but which might have equal or similar passwords, as an attacker might try out revealed passwords against the full list of known accounts.&quot;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;Malicious hackers are increasingly turning towardsthe mobile market to target unsuspecting victims.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;a href=&quot;http://micro-security.blogspot.com/2011/02/mcafee-mobile-threats-on-rise.html&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;Earlier this week&lt;/a&gt;, security firm McAfee revealed that mobile malware threats were up 46 percent last year. The company said that it expects &quot;cybercriminal activity&quot; in the mobile market to surge in 2011.&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px;&quot;&gt;&lt;span style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/4794686276686565343/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/4794686276686565343?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/4794686276686565343'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/4794686276686565343'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/researchers-at-fraunhofer-institute-for.html' title='iPhone passwords succumb to researchers&#39; attack'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-6216759411078864903</id><published>2011-02-15T01:03:00.000+03:00</published><updated>2011-02-15T01:03:30.304+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>Data theft attacks besiege oil industry, McAfee says</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;cnet-image-div image-REGULAR float-none&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline; width: 620px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-style: initial; font-style: inherit;&quot;&gt;&lt;img alt=&quot;A McAfee diagram of how the Night Dragon attacks proceeded.&quot; class=&quot;cnet-image&quot; height=&quot;387&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/10/night-dragon-diagram.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot; width=&quot;620&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;image-caption&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;A McAfee diagram of how the Night Dragon attacks proceeded.&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;image-credit&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;(Credit: McAfee)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;cnet-image-div image-REGULAR float-none&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline; width: 620px;&quot;&gt;&lt;span class=&quot;image-credit&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;For years, companies in the oil and energy industry have been the victims of attempts to steal e-mail and other sensitive information from hackers believed to be in China, according to a new report from McAfee.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;The attacks, to which McAfee gave the sinister name &quot;Night Dragon,&quot; penetrated company networks through Web servers, compromised desktop computers, bypassed safeguards by misusing administrative credentials, and used remote administration tools to obtain the information, the security firm said late yesterday. McAfee and other security companies now have identified the method and can provide a defense.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&quot;Well-coordinated, targeted attacks such as Night Dragon, orchestrated by a growing group of malicious attackers committed to their targets, are rapidly on the rise. These targets have now moved beyond the defense industrial base, government, and military computers to include global corporate and commercial targets,&quot; McAfee said in a&amp;nbsp;&lt;a href=&quot;http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;white paper (PDF)&lt;/a&gt;&amp;nbsp;published today.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;And the attack was at least partially successful, McAfee said: &quot;Files of interest focused on operational oil and gas field production systems and financial documents related to field exploration and bidding that were later copied from the compromised hosts or via extranet servers. In some cases, the files were copied to and downloaded from company Web servers by the attackers. In certain cases, the attackers collected data from SCADA systems,&quot; the supervisory control and data acquisition systems that control and monitor industrial processes.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;McAfee didn&#39;t reveal details about what SCADA data was involved, but it&#39;s a potentially serious matter: such systems are at the operational heart of everything from oil pipelines and refineries to factories and electrical power distribution networks.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;McAfee told&amp;nbsp;&lt;a href=&quot;http://online.wsj.com/article/SB10001424052748703716904576134661111518864.html&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;The Wall Street Journal&lt;/a&gt;&amp;nbsp;that the attacks appeared to be purely about espionage, not sabotage. The latter possibility has become a more vivid fear with the&amp;nbsp;&lt;a href=&quot;http://news.cnet.com/8301-27080_3-20022845-245.html&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;Stuxnet attack that apparently damaged Iranian nuclear operations&lt;/a&gt;. China is a particular concern: it&#39;s a rising industrial power that&amp;nbsp;&lt;a href=&quot;http://news.cnet.com/8301-27080_3-10434721-245.html&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;Google has implicated in attempts to crack its own network&lt;/a&gt;&amp;nbsp;and obtain sensitive information.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;McAfee notified the FBI of the Night Dragon attacks, and the FBI is investigating, the Journal reported.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;Several Night Dragon attacks were launched in November 2009, McAfee Chief Technology Officer George Kurtz said in a&amp;nbsp;&lt;a href=&quot;http://blogs.mcafee.com/corporate/cto/global-energy-industry-hit-in-night-dragon-attacks&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;blog post&lt;/a&gt;, but attacks have been going on for at least two years and likely as long as four.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&quot;We have strong evidence suggesting that the attackers were based in China,&quot; Kurtz said. &quot;The tools, techniques, and network activities used in these attacks originate primarily in China. These tools are widely available on the Chinese Web forums and tend to be used extensively by Chinese hacker groups.&quot;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;The attacks themselves used a variety of methods that, although described as &quot;relatively unsophisticated,&quot; were nonetheless effective.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;First came an attack to compromise a Web server that then became a host for a variety of hacking tools that could probe the company&#39;s internal network. Password cracking and other tools were used to gain access to PCs and servers. Remote administration software, including one called zwShell, let attackers control compromised Windows PCs to gather more data and push the attack toward more sensitive areas.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;An appendix of the white paper offers more details on the Chinese connection:&lt;/div&gt;&lt;blockquote class=&quot;&quot; style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;While we believe many actors have participated in these attacks, we have been able to identify one individual who has provided the crucial C&amp;amp;C infrastructure to the attackers--this individual is based in Heze City, Shandong Province, China. Although we don&#39;t believe this individual is the mastermind behind these attacks, it is likely this person is aware or has information that can help identify at least some of the individuals, groups, or organizations responsible for these intrusions.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;The individual runs a company that, according to the company&#39;s advertisements, provides &quot;Hosted Servers in the U.S. with no records kept&quot; for as little as 68 RMB (US$10) per year for 100 MB of space. The company&#39;s U.S.-based leased servers have been used to host the zwShell C&amp;amp;C [command and control] application that controlled machines across the victim companies.&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;Beyond the connection to the hosting services reseller operation, there is other evidence indicating that the attackers were of Chinese origin. Beyond the curious use of the &quot;zw.china&quot; password that unlocks the operation of the zwShell C&amp;amp;C Trojan, McAfee has determined that all of the identified data exfiltration activity occurred from Beijing-based IP [Internet Protocol] addresses and operated inside the victim companies weekdays from 9:00 a.m. to 5:00 p.m. Beijing time, which also suggests that the involved individuals were &quot;company men&quot; working on a regular job, rather than freelance or unprofessional hackers. In addition, the attackers employed hacking tools of Chinese origin and that are prevalent on Chinese underground hacking forums. These included Hookmsgina and WinlogonHack, tools that intercept Windows logon requests and hijack usernames and passwords...&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;Although it is possible that all of these indicators are an elaborate red-herring operation designed to pin the blame for the attacks on Chinese hackers, we believe this to be highly unlikely. Further, it is unclear who would have the motivation to go to these extraordinary lengths to place the blame for these attacks on someone else.&lt;/div&gt;&lt;/blockquote&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;cnet-image-div image-REGULAR float-none&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline; width: 619px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-color: initial; border-style: initial; font-style: inherit;&quot;&gt;&lt;img alt=&quot;The early phase of the Night Dragon attack gains access to Web servers.&quot; class=&quot;cnet-image&quot; height=&quot;470&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/10/night-dragon-sql-injection.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot; width=&quot;619&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div class=&quot;image-caption&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;The early phase of the Night Dragon attack gains access to Web servers.&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;image-credit&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;(Credit: McAfee&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px;&quot;&gt;&lt;span style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/6216759411078864903/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/6216759411078864903?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/6216759411078864903'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/6216759411078864903'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/data-theft-attacks-besiege-oil-industry.html' title='Data theft attacks besiege oil industry, McAfee says'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-2066865424188674932</id><published>2011-02-10T05:48:00.001+03:00</published><updated>2011-02-10T05:52:18.022+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>Sandboxing to come in Avast 6</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;postBody&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt; Free security suites have long been offering protection for Windows  computers that has ranged from adequate to excellent. After using the  Avast 6 beta for the past week, it looks like Avast 6 will land far  closer to the high end of the spectrum thanks to its new WebRep browser  add-on and sandbox environment, unique in the free antivirus  marketplace.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;cnet-image-div image-LARGE2 float-none&quot; style=&quot;width: 610px;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; class=&quot;cnet-image&quot; height=&quot;464&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/08/avast_6_beta_sandbox_610x464.png&quot; width=&quot;610&quot; /&gt;&lt;/b&gt; &lt;br /&gt;
&lt;div class=&quot;image-caption&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Avast 6 Free will come with a sandbox feature to isolate risky programs while they run.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;image-credit&quot;&gt;(Credit: Screenshot by Seth Rosenblatt)&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;cnet-image-div image-LARGE2 float-none&quot; style=&quot;width: 610px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;image-credit&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; &lt;/div&gt;&lt;b&gt; The security suite is available in three forms: &lt;a href=&quot;http://download.cnet.com/avast-free-antivirus/3000-2239_4-10977268.html&quot;&gt;Free Antivirus&lt;/a&gt;, which replicates the features available in the upcoming Avast 6 Free; &lt;a href=&quot;http://download.cnet.com/avast-free-antivirus/3000-2239_4-10977268.html&quot;&gt;Pro Antivirus&lt;/a&gt;, which offers a 30-day trial for checking out Avast&#39;s first level of paid security; and &lt;a href=&quot;http://download.cnet.com/avast-internet-security/3000-18510_4-75338138.html&quot;&gt;Internet Security&lt;/a&gt;, which ramps up the feature set to include more security tools.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; The biggest new feature is the AutoSandbox, which walls off suspicious  programs, preventing them from potentially damaging your system while  allowing them to run. Few details have been provided so far as to how  the AutoSandbox works, however a response from an Avast employee on  Avast&#39;s forums &lt;a href=&quot;http://forum.avast.com/index.php?topic=70912.msg594008#msg594008&quot;&gt;gave some indication&lt;/a&gt;  of how it works. Avast&#39;s sandbox allows the program to run, while  keeping track of which files are opened, created, or renamed, and what  it reads and writes from the Registry. These permanent changes are  virtualized, so when the process terminates itself, the system changes  it made will evaporate.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; The AutoSandbox settings are accessible from the new Additional  Protection option on the left nav. It defaults to asking the user  whether a program should be sandboxed, although you can set it to  automatically decide. There&#39;s a whitelist option for programs that you  always want to exclude from the sandbox, and you can deactivate the  feature entirely.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Avast 6 will come with an optional browser plug-in for Internet Explorer and &lt;a href=&quot;http://www.cnet.com/firefox-3/&quot;&gt;Firefox&lt;/a&gt;  called WebRep, which is Avast&#39;s new Web site reputation service. It  uses a combination of data from Avast&#39;s virus labs and user voting to  determine a safety score for a site. Similar add-ons are a common tool  available in most antivirus suites, so it&#39;s good to see Avast join them.  Like its competitors, Avast appears to have ignored Google Chrome and  its 10 percent market share when it comes to search result rating  add-ons. However, Avast has promised that the Chrome add-on will be  released soon.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; The browser add-ons install when installing Avast 6. If you don&#39;t want  them, it&#39;s actually easier to remove them from within Avast instead of  within the browser. Currently, removing the add-on using the browser&#39;s  interface will cue Avast to re-install the add-on the next time the  computer is rebooted.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Other new features have been introduced in Avast 6 beta. The  Troubleshooting section now comes with a &quot;restore factory settings&quot;  option, there&#39;s a new sidebar gadget for &lt;a href=&quot;http://www.cnet.com/windows-7/&quot;&gt;Windows 7&lt;/a&gt;  and Vista, and you can set automatic actions in the boot-time scan. Two  features that have filtered down to the free version are the Script  Shield and site blocking. The Script Shield now works with &lt;a href=&quot;http://download.cnet.com/Internet-Explorer/3000-2356_4-10013275.html&quot;&gt;Internet Explorer 8&lt;/a&gt;  and 9&#39;s protected mode. Meanwhile, the paid versions have gained some  new features, such as SafeZone, a virtualization feature for secure  online banking. The installer has shrunk for all versions by about 20  percent.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;cnet-image-div image-LARGE2 float-none&quot; style=&quot;width: 610px;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; class=&quot;cnet-image&quot; height=&quot;218&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/08/avast_6_beta_webrep_1_610x218.png&quot; width=&quot;610&quot; /&gt;&lt;/b&gt; &lt;br /&gt;
&lt;div class=&quot;image-caption&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Avast 6 Free also comes with the optional WebRep add-on, for rating search results and Web sites.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;image-credit&quot;&gt;(Credit: Screenshot by Seth Rosenblatt)&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;cnet-image-div image-LARGE2 float-none&quot; style=&quot;width: 610px;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;image-credit&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; &lt;/div&gt;&lt;b&gt; The initial build of the program was buggy and actually caused my  computer to enter into a crash loop that I escaped by booting into Safe  Mode and removing it. However, subsequent builds have proven to be far  more stable. Note that if you do install the beta, you&#39;ll have to  completely uninstall your current antivirus program, even if it&#39;s Avast  5. The company expects to have an upgrade mechanism in place by the time  Avast 6 is ready for wide distribution.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Other known problems in the beta include the fact that the SafeZone  feature doesn&#39;t work yet and that the firewall in the paid versions  contains a conflict with uTorrent. &lt;/b&gt;&lt;br /&gt;
&lt;b&gt; Performance benchmarks are not available because of the in-development  nature of this release. It&#39;s simply changing too quickly for benchmarks  to provide any useful information, given the time it takes to conduct  them.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Although the suite looks good and bodes well for the coming public  release, this is a beta product and so it&#39;s not recommended for security  duties on your primary or only computer. However, it&#39;s well worth  exploring on secondary machines, and it&#39;s encouraging to see Avast not  laying fallow after the gains made in version 5.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; The beta announcement thread on the Avast forums can be &lt;a href=&quot;http://forum.avast.com/index.php?topic=70435.0&quot;&gt;read here&lt;/a&gt;. &lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/2066865424188674932/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/2066865424188674932?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/2066865424188674932'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/2066865424188674932'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/free-security-suites-have-long-been.html' title='Sandboxing to come in Avast 6'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-469365612502287886</id><published>2011-02-09T05:36:00.000+03:00</published><updated>2011-02-09T05:36:46.385+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>Firefox beta to Web: &#39;Do Not Track&#39;</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;postBody&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;  &lt;b&gt;&lt;a href=&quot;http://www.cnet.com/firefox-3/&quot;&gt;Firefox&lt;/a&gt;  4 beta 11 has landed a useful security feature for people who are sick  of &quot;stalkertizements,&quot; those cookie-based ads that use your browsing  history to target ads at your perceived tastes. The new &quot;Do Not Track&quot;  feature in Firefox 4 beta 11 for &lt;a href=&quot;http://download.cnet.com/Mozilla-Firefox/3000-2356_4-10515987.html&quot;&gt;Windows&lt;/a&gt;, &lt;a href=&quot;http://download.cnet.com/Mozilla-Firefox/3000-2356_4-10596066.html&quot;&gt;Mac&lt;/a&gt;, and &lt;a href=&quot;http://download.cnet.com/Mozilla-Firefox/3000-2356_4-75219744.html&quot;&gt;Linux&lt;/a&gt; sends out a header that tells Web sites that you want to opt out of behavioral tracking, though &lt;a href=&quot;http://blog.mozilla.com/blog/2011/02/08/mozilla-firefox-4-beta-now-including-do-not-track-capabilities/&quot;&gt;Mozilla cautions&lt;/a&gt; in a blog post that it will take some time for sites and advertisers to respond to the header.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;cnet-image-div image-REGULAR float-none&quot; style=&quot;width: 569px;&quot;&gt; &lt;b&gt;&lt;img alt=&quot;&quot; class=&quot;cnet-image&quot; height=&quot;567&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/08/mozilla-dnt-diagram3.png&quot; width=&quot;569&quot; /&gt;&lt;/b&gt; &lt;div class=&quot;image-caption&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;This diagram shows how Firefox&#39;s new &#39;Do Not Track&#39; feature works.&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;image-credit&quot;&gt;(Credit: Mozilla)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;cnet-image-div image-REGULAR float-none&quot; style=&quot;width: 569px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;image-credit&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt; &lt;/div&gt;&lt;b&gt; The feature can be toggled via a check box in the Advanced tab of Firefox&#39;s Options window.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Mozilla privacy lead Alex Fowler said that the engineers decided to &lt;a href=&quot;http://firstpersoncookie.wordpress.com/2011/01/23/more-choice-and-control-over-online-tracking/&quot;&gt;base the feature in the header&lt;/a&gt;  sent from the browser because it&#39;s something that all Web pages read as  they load. A blacklist or cookie-based solution would be harder to  implement across different browsers. He acknowledged that successful  implementation of &quot;Do Not Track&quot; also depends on advertisers and site  owners respecting that incoming header.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; &lt;/b&gt;&lt;br /&gt;
&lt;b&gt; He added that the initial stages of a legislative fix are under way as  at least one member of Congress--Rep. Jackie Speier (D-Calif.)--plans to  introduce a bill &lt;a href=&quot;http://thehill.com/blogs/hillicon-valley/technology/142015-rep-speier-to-introduce-do-not-track-bill-next-week?sms_ss=twitter&amp;amp;at_xt=4d4b26ce928016f9,0&quot;&gt;ordering the Federal Trade Commission&lt;/a&gt;  to create a &quot;Do Not Track&quot; program for advertisers. However, a second  bill also being proposed does not include the &quot;Do Not Track&quot; option.  Both might have a hard time passing in today&#39;s antiprivacy climate,  although a bill with &quot;Do Not Track&quot; would be the harder sell because of  its stronger privacy controls.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Mozilla security and privacy engineer Sid Stamm has documented the &lt;a href=&quot;http://blog.sidstamm.com/2011/01/opting-out-of-behavioral-ads.html&quot;&gt;technical implementation of &quot;Do Not Track&lt;/a&gt;.&quot;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt; Other changes in Firefox 4 beta 11--which Mozilla hopes will be the  penultimate Firefox 4 beta--include moving connection status messages to  a small overlay window, re-enabling WebGL on Linux, disabling automatic  switching to offline mode when no network connection is detected, and a  redesign of the default about:home page. The full changelog is &lt;a href=&quot;https://www.mozilla.com/en-US/firefox/4.0b11/releasenotes/buglist.html&quot;&gt;available here&lt;/a&gt;. &lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/469365612502287886/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/469365612502287886?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/469365612502287886'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/469365612502287886'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/firefox-beta-to-web-do-not-track.html' title='Firefox beta to Web: &#39;Do Not Track&#39;'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-4225802664765259965</id><published>2011-02-09T05:19:00.001+03:00</published><updated>2011-02-09T05:22:15.293+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>McAfee: Mobile threats on the rise</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;cnet-image-div image-REGULAR float-right&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; width: 184px;&quot;&gt; &lt;b&gt;&lt;img alt=&quot;&quot; class=&quot;cnet-image&quot; height=&quot;138&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/08/080603_mcafee.jpg&quot; width=&quot;184&quot; /&gt;&lt;/b&gt; &lt;/div&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Mobile threats are spreading and spam continues to be a thorn in the  average person&#39;s side, according to a new McAfee report about the fourth  quarter.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Mobile malware threats increased by 46 percent last year as criminals continued to embrace new opportunities on smartphones and &lt;a href=&quot;http://reviews.cnet.com/tablets/&quot;&gt;tablets&lt;/a&gt;, the security firm said today.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt; &quot;One of the most important threats of the quarter&quot; among mobile devices  was the Android-based Geinimi Trojan that Zeus botnet creators &lt;a href=&quot;http://news.cnet.com/8301-1009_3-20026804-83.html&quot;&gt;unleashed&lt;/a&gt;. It was flanked by several other malware threats, like the Symbian OS-focused Zitmo.A, McAfee said.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://news.cnet.com/8301-13506_3-20030968-17.html#ixzz1DT3G8cYV&quot; style=&quot;color: #003399;&quot;&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&quot;Cybercriminals are keeping tabs on what&#39;s popular, and what will  have the biggest impact from the smallest effort,&quot; Vincent Weafer,  senior vice president of McAfee Labs, said in a statement. &quot;McAfee Labs  also sees the direct correlation between device popularity and  cybercriminal activity, a trend we expect to surge in 2011.&quot;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;McAfee&#39;s latest report could help bolster support for the company&#39;s  plans in 2011 to become increasingly invested in mobile security, thanks  to Intel, which &lt;a href=&quot;http://news.cnet.com/8301-1001_3-20014082-92.html&quot;&gt;announced plans to acquire the security firm last year&lt;/a&gt;  in a deal valued at $7.68 billion. Intel said at the time that it plans  to use McAfee&#39;s core security products to improve protection for mobile  devices, TVs, and other products that the chipmaker believes don&#39;t have  enough protection.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;McAfee found in its report that the &quot;lack of security awareness and  mobile safeguards&quot; will lead smartphone owners to face an increasing  number of botnet attacks this year.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;In addition, the growth of mobile devices and Web-connected products  like Internet TVs contributed to more Web-based threats in 2010, McAfee  said. The company found that phishing scams asking people to provide  information to the Internal Revenue Service, offering gift cards, and  stealing social-networking account information were quite &quot;popular&quot; in  the fourth quarter. Worst of all, McAfee said that 51 percent of the top  100 search results for the top daily search terms directed people to  malicious sites.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Adobe Systems also took a beating in McAfee&#39;s quarterly report. The  security firm found that all last year, malware creators were &quot;heavily&quot;  targeting Flash and PDF and that Adobe Acrobat was the most popular  place for malicious users to take aim at unsuspecting victims. Worst of  all, the security firm said it&#39;s &quot;certain&quot; that Adobe will continue to  be hit hard by malware in 2011.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Spam continues to be a major issue for people, accounting for 80  percent of all e-mail traffic in the fourth quarter, McAfee reported. At  that level, however, spam actually hit a low it hasn&#39;t touched since  the first quarter of 2007.&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt; When it came to malware, consumers weren&#39;t so lucky. Twenty million &quot;new pieces of malware&quot; were developed in 2010, McAfee said.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://news.cnet.com/8301-13506_3-20030968-17.html#ixzz1DT2PN83q&quot; style=&quot;color: #003399;&quot;&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/4225802664765259965/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/4225802664765259965?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/4225802664765259965'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/4225802664765259965'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/mcafee-mobile-threats-on-rise.html' title='McAfee: Mobile threats on the rise'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-2381592253490713478</id><published>2011-02-09T05:14:00.001+03:00</published><updated>2011-02-09T05:14:38.565+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Microsoft patches Windows, IE</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;postBody&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;cnet-image-div image-REGULAR float-right&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em; width: 184px;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;Microsoft logo&quot; class=&quot;cnet-image&quot; height=&quot;138&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/08/040610_microsoft.jpg&quot; width=&quot;184&quot; /&gt;&lt;/b&gt; &lt;/div&gt;&lt;b&gt;Microsoft today issued three &quot;critical&quot; security bulletins as part of  its monthly Patch Tuesday program. Together with nine other alerts,  which the company rated as &quot;important,&quot; the bulletins address 22  vulnerabilities spanning Microsoft products from Windows and Internet  Explorer to Office and Internet Information Services.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;On the top of the list is &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS11-003.mspx&quot;&gt;MS11-003&lt;/a&gt;,  which is a cumulative update for Internet Explorer that resolves four  vulnerabilities. Included is a fix for the nasty CSS bug outlined in &lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/2488013.mspx&quot;&gt;Security Advisory 2488013&lt;/a&gt;, a bug that could give attackers control of people&#39;s computers.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;In &lt;a href=&quot;http://mediadl.microsoft.com/mediadl/www/T/TWC/UpdateTuesdayFebruary2011.mp3&quot;&gt;a podcast&lt;/a&gt;  about the patches, Jerry Bryant, the group manager of response  communications for Microsoft&#39;s Trustworthy Computing Group, downplayed  the scope of the CSS issue, saying that the company had seen only  limited, targeted attacks focused on this vulnerability. To drive that  point home, the company has &lt;a href=&quot;http://blogs.technet.com/b/mmpc/archive/2011/02/08/cve-2010-3971-not-quite-the-weekend-warrior.aspx&quot;&gt;released telemetry&lt;/a&gt;  of how that vulnerability stacks up against an already-patched  vulnerability in the Windows Shell, to explain why a fix was not made  available outside the company&#39;s normal release cycle.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&quot;While our first priority is to protect customers from issues like  these, we also look to minimize disruption that issues like out-of-band  releases can bring,&quot; Bryant said.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The second critical item included in the list of patches is the  thumbnail image attack vulnerability, which is being addressed in &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS11-006.mspx&quot;&gt;MS11-006&lt;/a&gt;.  This fixes the security hole in Microsoft&#39;s Windows Graphics Rendering  Engine that could let attackers gain control of users&#39; computers by  having them load a specially formatted image. The problem affects  Windows XP, Server 2003, Windows Vista, and Windows Server 2008, but not &lt;a href=&quot;http://www.cnet.com/windows-7/&quot;&gt;Windows 7&lt;/a&gt; or Windows Server 2008 R2, the company said.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&quot;We have not seen any attacks against this vulnerability, but proof  of concept code is available to attackers, so we recommend customers put  this at the top of their priority list,&quot; Bryant said.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The third critical item that&#39;s being patched is the OpenType Compact Font exploit as part of &lt;a href=&quot;http://www.microsoft.com/technet/security/Bulletin/MS11-007.mspx&quot;&gt;MS11-007&lt;/a&gt;.  That particular vulnerability requires end users to load what Microsoft  classifies as a &quot;maliciously crafted&quot; font. Bryant explained that the  issue had privately been disclosed to the company, and that it was rated  a 2 in the &lt;a href=&quot;http://technet.microsoft.com/en-us/security/cc998259&quot;&gt;Exploitability Index&lt;/a&gt;, since Microsoft does not believe a reliable exploit code will show up within the next 30 days.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;One tier Lower on the company&#39;s deployment priority index (which is  how Microsoft dictates to customers the order in which to deploy patches  to machines) is the fix to the zero-day vulnerability with the FTP  services in IIS 7.0 and 7.5. It too has a rating of 2 in the  Exploitability Index, and it makes up part of MS11-004.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Along with those critical and important updates, Microsoft is  changing its Autorun functionality when users plug in USB thumb drives.  The company is disabling Autorun from USB thumb drives in versions of  Windows that are older than Windows 7, which already has such a security  feature. That&#39;s going out to users as an AutoUpdate in Windows Update.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;As mentioned in &lt;a href=&quot;http://news.cnet.com/8301-1009_3-20030613-83.html&quot; title=&quot;Microsoft to seal 22 security holes this month -- Thursday, Feb 3, 2011&quot;&gt;previous coverage&lt;/a&gt; about this month&#39;s batch of updates, Microsoft has not offered up more details on long-term fixes for the &lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/2501696.mspx&quot;&gt;MHTML vulnerability&lt;/a&gt; that &lt;a href=&quot;http://news.cnet.com/8301-10805_3-20030132-75.html&quot; title=&quot;Microsoft warns of script injection attacks in IE -- Monday, Jan 31, 2011&quot;&gt;cropped up last month&lt;/a&gt;  and affects Internet Explorer. But according to Jim Walter, the manager  of McAfee Threat Intelligence Service, the MHTML problem is smaller  than most.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&quot;The scope and impact of the MHTML vulnerability is relatively  limited compared to other recent zero-day code execution  vulnerabilities,&quot; Walter said in a statement. &quot;Based on the information  that is currently available, we are aware that successful exploitation  could lead to the running of arbitrary scripts, as well as the  disclosure of sensitive information.&quot;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;More details about the list of fixes, and ways to deploy them, can be found in &lt;a href=&quot;http://blogs.technet.com/b/msrc/archive/2011/02/08/february-2011-security-bulletin-release.aspx&quot;&gt;Microsoft&#39;s Security Response Center blog&lt;/a&gt;.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/2381592253490713478/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/2381592253490713478?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/2381592253490713478'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/2381592253490713478'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/microsoft-patches-windows-ie.html' title='Microsoft patches Windows, IE'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-1611494977118990717</id><published>2011-02-07T02:02:00.001+03:00</published><updated>2011-02-08T20:54:15.352+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>Did Sony add a rootkit to PS3 firmware update?</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;postBody&quot; dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;div class=&quot;cnet-image-div image-REGULAR float-right&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; clear: right; float: right; font-family: inherit; font-size: 16px; margin-bottom: 1em; margin-left: 1em; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline; width: 200px;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;&quot; class=&quot;cnet-image&quot; height=&quot;150&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/02/32733576-2-200-OVR-1.gif&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot; width=&quot;200&quot; /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Gamers on a forum accuse Sony of adding a rootkit to its latest version of&amp;nbsp;&lt;a href=&quot;http://www.cnet.com/ps3.html&quot; section=&quot;luke_topic&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; margin: 0px; outline-style: none; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;PlayStation 3&lt;/a&gt;&amp;nbsp;firmware.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Rootkits, in general, have a bad reputation. Security watchers often associate them with malware. In this case specifically, though, the alleged rootkit would allow Sony to peer into users&#39; system files without their knowledge.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;A user dubbed N.A., who first&amp;nbsp;&lt;a href=&quot;http://www.neogaf.com/forum/showpost.php?p=25640009&amp;amp;postcount=4848&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; margin: 0px; outline-style: none; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;mentioned&lt;/a&gt;&amp;nbsp;the alleged rootkit last week on the Neogaf forum and cited work performed by developer Mathieulh, alleged that a rootkit in firmware version 3.56 allows Sony to &quot;remotely execute code on the PS3&quot; when users connect to the PlayStation Network. Mathieulh informed people over Internet Relay Chat that the alleged rootkit can be used by Sony for &quot;verifying system files or searching for homebrew.&quot; It might also be used as a way to ensure users on the PlayStation Network are using Sony&#39;s own firmware.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;However, N.A. also pointed out that &quot;Sony hasn&#39;t activated any of this yet.&quot;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;For its part, Sony hasn&#39;t made any mention of a rootkit being added to its latest update. A&amp;nbsp;&lt;a href=&quot;http://us.playstation.com/support/systemupdates/ps3/&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; margin: 0px; outline-style: none; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;page&lt;/a&gt;&amp;nbsp;on the company&#39;s site describing the updates in firmware version 3.56 say only that a &quot;security patch has been added.&quot; Because of that, it should be noted that the claims made through Internet Relay Chat and forums are unsubstantiated, and there is currently no indication from Sony that a rootkit was added to its PlayStation 3 firmware.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;What is clear is that Sony is in the middle of a real battle with jailbreakers who continue to take issue with the way the company safeguards its console. With each new update released by Sony since the company&amp;nbsp;&lt;a href=&quot;http://news.cnet.com/8301-13506_3-10471356-17.html&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; margin: 0px; outline-style: none; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;made the decision to end support&lt;/a&gt;&amp;nbsp;for &quot;Other OS,&quot; allowing folks to run operating systems--typically Linux--on the console, jailbreakers have found ways to run so-called homebrew applications.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;PlayStation 3 firmware version 3.55 arguably attracted the most attention after well-known hacker George Hotz, known as his Web name, Geohot, found a way for users to run custom packages on the console. The move prompted Sony to&amp;nbsp;&lt;a href=&quot;http://news.cnet.com/8301-13506_3-20028248-17.html&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; margin: 0px; outline-style: none; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;request a restraining order against Geohot&lt;/a&gt;&amp;nbsp;to take his solution off the Web. After a lengthy court battle with each side trading shots,&amp;nbsp;&lt;a href=&quot;http://news.cnet.com/8301-13506_3-20029892-17.html&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; margin: 0px; outline-style: none; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;Sony was awarded the restraining order last week&lt;/a&gt;.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&quot;After consideration of the record and the arguments of counsel, the court finds that a temporary restraining order is warranted,&quot; U.S. District Court Judge Susan Illston wrote in a&amp;nbsp;&lt;a href=&quot;http://www.scribd.com/doc/47676628/51-Order-GRANTING-Plaintiff-s-Motion-For-a-Temporary-Restraining-Order&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; margin: 0px; outline-style: none; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;judgment&lt;/a&gt;&amp;nbsp;released last week. &quot;Plaintiff has submitted substantial evidence showing that defendant George Hotz has violated the Digital Millennium Copyright Act.&quot;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;For his part, Hotz contends that his jailbreak shouldn&#39;t violate the DMCA. He pointed out that the DMCA allows mobile phone owners to jailbreak their devices without fear of legal recourse. The far-reaching act fails to mention other devices, which allowed Sony to gain the upper hand in its battle against Hotz.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&quot;I think the same precedent should apply,&quot; Hotz said in an interview with G4TV last month. &quot;If you can jailbreak one closed system, why can&#39;t you jailbreak another?&quot;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;It&#39;s a sentiment that many in the Neogaf forums agree with. And rather than face the possibility of being locked into Sony&#39;s latest firmware, those who believe Mathieulh&#39;s claim that a rootkit is in the latest software have warned others not to upgrade to 3.56.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&quot;Official Firmware 3.56 released,&quot; an announcement reads on the forum. &quot;Do NOT update.&quot;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Sony did not immediately respond to request for comment.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Back in 2005, Sony BMG came under fire for&amp;nbsp;&lt;a href=&quot;http://news.cnet.com/Sony-settles-rootkit-class-action-lawsuit/2100-1002_3-6012173.html&quot; style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; margin: 0px; outline-style: none; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;including a rootkit&lt;/a&gt;&amp;nbsp;in software on some of the company&#39;s CDs. The rootkit was used to limit the widespread reproduction of music CDs at the time. Sony later reversed its stance, offering up a solution to remove the rootkit, and then eventually, recalled CDs with the rootkits installed.&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px;&quot;&gt;&lt;span style=&quot;border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/1611494977118990717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/1611494977118990717?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1611494977118990717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1611494977118990717'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/did-sony-add-rootkit-to-ps3-firmware.html' title='Did Sony add a rootkit to PS3 firmware update?'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-8374014257778683040</id><published>2011-02-07T01:53:00.000+03:00</published><updated>2011-02-07T01:53:10.090+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Microsoft to seal 22 security holes this month</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;cnet-image-div image-REGULAR float-right&quot; dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: right; float: right; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 1em; margin-left: 1em; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline; width: 184px;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;Microsoft logo&quot; class=&quot;cnet-image&quot; height=&quot;138&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2010/12/13/040610_microsoft.jpg&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot; width=&quot;184&quot; /&gt;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Microsoft today said it will address 22 vulnerabilities as part of next week&#39;s Patch Tuesday, three of which are critical.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Three of the 12 bulletin items released by Microsoft earlier today are classified as critical, and affect Microsoft&#39;s Windows operating system, with one affecting Microsoft&#39;s Internet Explorer browser as well. The rest are classified as &quot;important.&quot;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;In&amp;nbsp;&lt;a href=&quot;http://blogs.technet.com/b/msrc/archive/2011/02/03/advance-notification-service-for-the-february-2011-security-bulletin-release.aspx&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;a post&lt;/a&gt;&amp;nbsp;on Microsoft&#39;s Security Response Center blog, the company said it will be making fixes for vulnerabilities in the Windows Graphics Rendering Engine, as well as CSS exploit in Internet Explorer that could allow an attacker to gain remote code execution.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Along with the fixes for the rendering engine and the CSS exploit, Microsoft says it will be addressing zero-day flaws that created vulnerabilities in the FTP service found inside of Internet Information Services (IIS) 7.0 and 7.5.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Not included in this month&#39;s batch of announced patches is a fix for the recently-discovered&amp;nbsp;&lt;a href=&quot;http://news.cnet.com/8301-10805_3-20030132-75.html&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot; title=&quot;Microsoft warns of script injection attacks in IE -- Monday, Jan 31, 2011&quot;&gt;script injection attacks&lt;/a&gt;&amp;nbsp;that affect Internet Explorer. Acknowledged by the company last week in&amp;nbsp;&lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/2501696.mspx&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;Security Advisory 2501696&lt;/a&gt;, the exploit targeted the way IE handled MHTML on certain types of Web pages and document objects, and could provide hackers with access to user information.&amp;nbsp;&lt;a href=&quot;http://laws.qualys.com/2011/02/patch-tuesday---preview-for-fe.html&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;According to&lt;/a&gt;&amp;nbsp;Wolfgang Kandek, chief technology officer at Qualys, the best route to prevent those attacks&amp;nbsp;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;continues to be the workaround Microsoft outlined in its&amp;nbsp;&lt;a href=&quot;http://www.microsoft.com/technet/security/advisory/2501696.mspx&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;initial security advisory&lt;/a&gt;&amp;nbsp;about the problem.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Microsoft has a full list of the pending issues&amp;nbsp;&lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/ms11-feb.mspx&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;here&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px;&quot;&gt;&lt;span style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/8374014257778683040/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/8374014257778683040?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/8374014257778683040'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/8374014257778683040'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/microsoft-to-seal-22-security-holes.html' title='Microsoft to seal 22 security holes this month'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-1369706964242338229</id><published>2011-02-07T01:45:00.001+03:00</published><updated>2011-02-07T01:46:42.478+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="News"/><title type='text'>Report: Hackers penetrated Nasdaq computers</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;clear: right; float: right; font-size: 16px; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;cnet-image&quot; height=&quot;138&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/02/04/hacker.jpg&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot; width=&quot;184&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div class=&quot;postBody&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Federal authorities are investigating repeated intrusions into the computer network that runs the Nasdaq stock exchange, according to a&amp;nbsp;&lt;a href=&quot;http://online.wsj.com/article/SB10001424052748704709304576124502351634690.html&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;Wall Street Journal report&lt;/a&gt;&amp;nbsp;that cited people familiar with the matter.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;The intrusions did not compromise the tech-heavy exchange&#39;s trading platform, which executes investors&#39; trades, but it was unknown which other sections of the network were accessed, according to the report.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&quot;So far, [the perpetrators] appear to have just been looking around,&quot; one person involved in the Nasdaq matter told the Journal.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;The Secret Service reportedly initiated an investigation involving New York-based Nasdaq OMX Group last year, and the Federal Bureau of Investigation has launched a probe as well. Investigators are considering a range of motives for the breach, including national security threat, personal financial gain, and theft of trade secrets, the newspaper reported.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Nasdaq representatives could not be reached for comment.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;Investigators have not been able to follow the intruders&#39; path to any specific individual or country, but people familiar with the matter say some evidence points to Russia, according to the report. However, they caution that hackers may just be using Russia as a conduit for their activities.&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;b&gt;The Nasdaq, which is thought to be as critical from a security standpoint as the national power grid or air traffic control operations, has been targeted by hackers before. In 1999, a group called &quot;United Loan Gunmen&quot;&amp;nbsp;&lt;a href=&quot;http://www.zdnet.com/news/united-loan-gunmen-attack-again/103255&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #0066a0; cursor: pointer; font-family: inherit; font-size: 16px; font-style: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; vertical-align: baseline;&quot;&gt;defaced Nasdaq&#39;s public Web site&lt;/a&gt;&amp;nbsp;with a story headlined &quot;United Loan Gunmen take control of Nasdaq stock market.&quot; The vandalism was quickly erased, and Nasdaq officials said at the time that the exchange&#39;s internal network was unaffected.&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 16px;&quot;&gt;&lt;span style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: inherit; font-size: 16px; font-style: inherit; font-weight: inherit; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; vertical-align: baseline;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/1369706964242338229/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/1369706964242338229?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1369706964242338229'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1369706964242338229'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/federal-authorities-are-investigating.html' title='Report: Hackers penetrated Nasdaq computers'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-7440438073636049434</id><published>2011-02-06T23:10:00.001+03:00</published><updated>2011-02-06T23:10:33.437+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>A malicious addition to a Facebook link</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial; font-size: 14px; line-height: 19px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;In the last few days we have discovered that spam messages with malicious links are being sent via instant messenger services. It turns out that the mailings were carried out by the Zeroll IM worm. A bot generated various messages depending on the language of the recipient. Here are a few of them:&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;“Wie findest du das Foto?”&lt;br /&gt;
“seen this?? :D %s”&lt;br /&gt;
“This is the funniest photo ever!”&lt;br /&gt;
“bekijk deze foto :D”&lt;br /&gt;
“uita-te la aceasta fotografie :D”&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;Like lots of other similar incidents, the cybercriminals have made use of social engineering, asking users to look at pictures with alluring names. At the end of the message there is a link such as&lt;span style=&quot;color: blue; text-decoration: underline;&quot;&gt;http://www.facebook.com/l.php?u=********.org/Jenny.jpg&lt;/span&gt;. As well as the link to the Jenny.jpg file the messages included similar links to Sexy.jpg.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;The page that the http://www.facebook.com/l.php?u= link leads to is not actually malicious – it contains a warning from Facebook telling the user they are leaving the site.&lt;/div&gt;&lt;div class=&quot;c&quot; dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.securelist.com/en/images/pictures/klblog/346.jpg&quot; style=&quot;color: #3751ab; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;140&quot; src=&quot;http://www.securelist.com/en/images/pictures/klblog/347.jpg&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span class=&quot;small&quot; style=&quot;font: normal normal normal 11px/normal tahoma;&quot;&gt;&lt;strong&gt;Facebook warning&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;If you add a link to any random site after ‘l.php?u=’, then a window opens with a warning from Facebook. However, after the user clicks the ‘Continue’ button the link will direct the user to the corresponding site. This mechanism was used by the cybercriminals to make the link to the malicious site look more legitimate.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;When the browser redirects to the page ********.org/Jenny.jpg it leads to the file PIC1274214241-JPG-www.facebook.com.exe which is then launched by unsuspecting users. Hereafter, the terms jenny.jpg and sexy.jpg refer to this executable file.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;After analyzing jenny.jpg and sexy.jpg it turned out that they were typical downloaders, protected by packers and written in Visual Basic.&lt;/div&gt;&lt;div class=&quot;c&quot; dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.securelist.com/en/images/pictures/klblog/348.jpg&quot; style=&quot;color: #3751ab; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; src=&quot;http://www.securelist.com/en/images/pictures/klblog/349.jpg&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;small&quot; style=&quot;font: normal normal normal 11px/normal tahoma;&quot;&gt;&lt;strong&gt;Fragment of the downloader code after the jenny.jpg file is unpacked in full&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;The downloaders’ job is typical for these types of program – download another malicious program to the infected computer. In this case, it’s the file srce.exe. So that the user doesn’t suspect anything, the downloaders also open the picture that was promised in the original spam message. The picture is downloaded from the Internet (the link can be seen in the screenshot).&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;So what is srce.exe? It’s a dropper + downloader whose outer shell is also written in Visual Basic. It downloads IM-Worm.Win32.XorBot.a which uses Yahoo Messenger to send out messages to users.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;So what we have here is a link to a page on Facebook being used in instant messaging spam instead of a direct link to a malicious object. You could say that Facebook is being used a service along the lines of bit.ly: it allows links to be modified so that they are directed via the Facebook domain.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;Zeroll is still actively sending out spam. The messages contain links to different files, but with similar names such as Girls.jpg and Marisella.jpg. And even though people already know they shouldn’t just click any old links, even if it was sent by someone on their contact list, it’s worth reminding everyone again. If nothing else, cybercriminals are creative, and the Zeroll spam once again confirms this.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/7440438073636049434/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/7440438073636049434?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/7440438073636049434'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/7440438073636049434'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/malicious-addition-to-facebook-link.html' title='A malicious addition to a Facebook link'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-5713486208204151011</id><published>2011-02-06T22:35:00.003+03:00</published><updated>2011-02-06T22:36:27.796+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>A keygen with a twist</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial; font-size: 14px; line-height: 19px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;Programs for cracking commercial software are, sadly, not unpopular. They have also caught the attention of malware writers, who prepared a couple of surprises for those who don’t mind a free ride every now and then.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;A short time ago, we detected a Trojan dropper which passes itself off as a key generator for Kaspersky Lab products. The file’s name is kaspersky.exe.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;Once launched, the file displays a key generator window prompting the user to select a product. After one of the options is selected, the program proceeds to generate a key.&lt;/div&gt;&lt;div class=&quot;c&quot; dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;247&quot; src=&quot;http://www.securelist.com/en/images/pictures/klblog/352.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot; width=&quot;299&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;small&quot; style=&quot;font: normal normal normal 11px/normal tahoma;&quot;&gt;&lt;strong&gt;Keygen window&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;While the freebie lover is waiting for the result, two pieces of malware that were stealthily installed and launched by the dropper make themselves at home on the PC.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;One of these is detected by Kaspersky Lab as Trojan.MSIL.Agent.aor. It steals registration data for other programs, as well as passwords, mostly for online games. It rather considerately stores all the stolen data in one file. A fragment of the file is shown on the screenshot below.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=3401588452896501519&amp;amp;postID=5713486208204151011&quot; name=&quot;readmore&quot; style=&quot;color: #3751ab; text-decoration: none;&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;c&quot; dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: center;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;675&quot; src=&quot;http://www.securelist.com/en/images/pictures/klblog/353.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot; width=&quot;255&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;small&quot; style=&quot;font: normal normal normal 11px/normal tahoma;&quot;&gt;&lt;strong&gt;Fragment of a file that is filled in with registration data for the software listed in it&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;The Trojan also modifies the ‘hosts’ system file to block access to a number of websites. For example, such websites as virustotal.com and virusscan.jotti.org, which offer file scanning by solutions from many antivirus vendors, become inaccessible.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;Fragment of a modified hosts file:&lt;/div&gt;&lt;div class=&quot;color&quot; dir=&quot;ltr&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: #d9f9f3; background-image: initial; background-origin: initial; border-bottom-color: rgb(5, 73, 60); border-bottom-style: solid; border-bottom-width: 1px; border-left-color: rgb(5, 73, 60); border-left-style: solid; border-left-width: 1px; border-right-color: rgb(5, 73, 60); border-right-style: solid; border-right-width: 1px; border-top-color: rgb(5, 73, 60); border-top-style: solid; border-top-width: 1px; padding-bottom: 5px; padding-left: 20px; padding-right: 5px; padding-top: 5px; text-align: left;&quot;&gt;##Do not touch this file, changing it will cause SERIOUS damage to your computer&lt;br /&gt;
127.0.0.1 virustotal.com&lt;br /&gt;
127.0.0.1 www.virustotal.com&lt;br /&gt;
127.0.0.1 www.virusscan.jotti.org/&lt;br /&gt;
127.0.0.1 www.virusscan.jotti.org/en&lt;br /&gt;
127.0.0.1 www.virusscan.jotti.org/en&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;The second piece of malware installed by the dropper is a typical backdoor which also has keylogger functionality, collecting keystroke data. It is detected as Trojan.Win32.Liac.gfu.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;Thus, running a supposed key generator for Kaspersky Internet Security will plant a couple of very real malicious programs on your computer, which KIS will then have to deal with. Provided, of course, that the keys generated by the ‘keygen’ actually work.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/5713486208204151011/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/5713486208204151011?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/5713486208204151011'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/5713486208204151011'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/keygen-with-twist.html' title='A keygen with a twist'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-1631997634611409960</id><published>2011-02-06T21:40:00.002+03:00</published><updated>2011-02-09T00:18:18.613+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>Securing a wireless network</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e; font-family: arial; font-size: 14px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;font: bold 15px tahoma; margin: 0px 0px 1.1em; text-align: left;&quot;&gt;&lt;div style=&quot;background-image: url(&amp;quot;http://www.kaspersky.com/images/c_threats/ct_prm6.jpg&amp;quot;); background-position: 0% 0%; font: 13px tahoma; height: 203px; width: 600px;&quot;&gt;&lt;div style=&quot;padding: 40px 20px 10px 250px;&quot;&gt;&lt;div style=&quot;color: #239e7f; font-family: arial; font-size: 14px; line-height: 18px;&quot;&gt;&lt;u&gt;&lt;/u&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; font-size: large;&quot;&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Times,&#39;Times New Roman&#39;,serif; font-size: large;&quot;&gt;&lt;b&gt;Securing a wireless network&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;color: #239e7f; font-family: arial; font-size: 14px; font-weight: normal; line-height: 18px; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: #239e7f; font-family: arial; font-size: 14px; font-weight: normal; line-height: 18px; margin: 0px 0px 0.8em;&quot;&gt;If your wireless network is not secure, a hacker can easily intercept the data you send and receive, or access files saved on your computer – all from the comfort of their own sofa.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/h2&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;color: #239e7f; font: bold 15px tahoma; margin: 0px 0px 1.1em; text-align: left;&quot;&gt;Why is it necessary to secure my wireless network?&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px 0px 0.8em; text-align: left;&quot;&gt;These days, most computers are wireless-enabled: they let you connect to the Internet without a physical network cable. The major benefit, of course, is that you can use your computer anywhere in the house or office (as long as it’s within range of your wireless router). However, there are potential risks involved in wireless networking - unless you make your network secure:&lt;/div&gt;&lt;ul dir=&quot;ltr&quot; style=&quot;margin: 0.4em 0px 0.4em 24px; padding: 0px; text-align: left;&quot;&gt;&lt;li&gt;A hacker could intercept any data you send and receive;&lt;/li&gt;
&lt;li&gt;A hacker could get access to your wireless network;&lt;/li&gt;
&lt;li&gt;Another person could hijack your Internet access.&lt;/li&gt;
&lt;/ul&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px 0px 0.8em; text-align: left;&quot;&gt;Therefore, if your wireless network is not protected, a hacker could intercept any data you send; access your network, and therefore your shared files; use your connection to connect to the Internet - especially significant if you have a download limit on your internet package and your bandwidth is being swallowed up by a hijacker.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;wb_tl&quot; dir=&quot;ltr&quot; style=&quot;background-color: #f5f2e8; background-image: url(&amp;quot;http://images3.kaspersky-labs.com/en/c_threats/ct_wb_tl.gif&amp;quot;); background-position: 0% 0%; text-align: left;&quot;&gt;&lt;div class=&quot;wb_tr&quot; style=&quot;background-image: url(&amp;quot;http://images3.kaspersky-labs.com/en/c_threats/ct_wb_tr.gif&amp;quot;); background-position: 100% 0%;&quot;&gt;&lt;div class=&quot;wb_bl&quot; style=&quot;background-image: url(&amp;quot;http://images3.kaspersky-labs.com/en/c_threats/ct_wb_bl.gif&amp;quot;); background-position: 0% 100%;&quot;&gt;&lt;div class=&quot;wb_br&quot; style=&quot;background-image: url(&amp;quot;http://images3.kaspersky-labs.com/en/c_threats/ct_wb_br.gif&amp;quot;); background-position: 100% 100%;&quot;&gt;&lt;table class=&quot;w100&quot; style=&quot;border-collapse: collapse; font: 100% arial; margin: 0px; width: 500px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;color: #62736e; font: 14px/1.3 arial; padding: 24px 28px 20px;&quot;&gt;&lt;h2 style=&quot;color: #239e7f; font: bold 15px tahoma; margin: 0px 0px 1.1em;&quot;&gt;How do I secure my wireless network?&lt;/h2&gt;&lt;div style=&quot;margin: 0px 0px 0.8em;&quot;&gt;There are some simple steps you can take to secure your wireless network and router in order to minimise these risks:&lt;/div&gt;&lt;table class=&quot;w100&quot; style=&quot;border-collapse: collapse; font: 100% arial; margin: 0px; width: 570px;&quot;&gt;&lt;tbody&gt;
&lt;tr class=&quot;t&quot; style=&quot;vertical-align: top;&quot;&gt;&lt;td class=&quot;w50&quot; style=&quot;color: #62736e; font: 14px/1.3 arial; padding: 0px 14px 0px 0px; vertical-align: top; width: 313px;&quot;&gt;&lt;ul&gt;&lt;li&gt;Change the administrator password for your wireless router. It’s easy for a hacker to find out the manufacturer’s default password and use this to access your wireless network. And avoid using a password that can be guessed easily: follow the guidelines provided in the section below on&amp;nbsp;&lt;a href=&quot;http://micro-security.blogspot.com/2011/02/passwords-choosing-good-password-is.html&quot; style=&quot;color: #239e7f; text-decoration: underline;&quot;&gt;choosing a password&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&amp;nbsp;Switch off SSID (Service Set Identifier) broadcasting, to prevent your wireless device announcing its presence to the world.&lt;/li&gt;
&lt;/ul&gt;&lt;/td&gt;&lt;td class=&quot;w50&quot; style=&quot;color: #62736e; font: 14px/1.3 arial; padding: 0px 0px 0px 14px; vertical-align: top; width: 313px;&quot;&gt;&lt;ul&gt;&lt;li&gt;Enable encryption in your connection settings: WPA encryption is best, if your device supports it (if not, use WEP encryption).&lt;/li&gt;
&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;Change the default SSID name of your device. Again, it’s easy for a hacker to find out the manufacturer’s default name and then use this to locate your wireless network. Avoid using a name that can be guessed easily: you should follow the guidelines provided in the&amp;nbsp;&lt;a href=&quot;http://micro-security.blogspot.com/2011/02/passwords-choosing-good-password-is.html&quot; style=&quot;color: #239e7f; text-decoration: underline;&quot;&gt;&#39;Choosing a Password&#39;&lt;/a&gt;section.&lt;/li&gt;
&lt;/ul&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;color: #239e7f; font: bold 15px tahoma; margin: 0px 0px 1.1em; text-align: left;&quot;&gt;To secure your wireless network:&lt;/h2&gt;&lt;ul dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Change the administrator password;&lt;/li&gt;
&lt;li&gt;Enable WAP or WEP encryption;&lt;/li&gt;
&lt;li&gt;Switch off the SSID and change the default name of your wireless router;&lt;/li&gt;
&lt;/ul&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006448; font-family: arial; font-size: 15px;&quot;&gt;Follow the advice above on how to protect from malicious code and hacker attacks.&lt;/span&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/1631997634611409960/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/1631997634611409960?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1631997634611409960'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1631997634611409960'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/if-your-wireless-network-is-not-secure.html' title='Securing a wireless network'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-8081940864821050519</id><published>2011-02-06T21:17:00.002+03:00</published><updated>2011-02-09T00:14:48.734+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>Passwords</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e; font-family: arial; font-size: 14px; line-height: 18px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;background-image: url(&amp;quot;http://www.kaspersky.com/images/c_threats/ct_prm7.jpg&amp;quot;); background-position: 0% 0%; font: 13px tahoma; height: 203px; text-align: left; width: 620px;&quot;&gt;&lt;div style=&quot;padding: 40px 40px 30px 400px;&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia,&#39;Times New Roman&#39;,serif; font-size: x-large;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;Passwords&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial,Helvetica,sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e; line-height: normal;&quot;&gt;Choosing a good password is vital to being secure&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e;&quot;&gt;online. Just follow a few golden rules, which a&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e;&quot;&gt;surprising amount of people ignore. Three of the&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e;&quot;&gt;most common internet passwords? &#39;password&#39;,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&#39;monkey&#39; and &#39;123456&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: xx-small;&quot;&gt;&#39;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 14px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;color: #239e7f; font: bold 15px/18px tahoma; margin: 0px 0px 1.1em; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #62736e; font-family: arial; font-size: 14px; font-weight: normal;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;color: #239e7f; font: bold 15px tahoma; margin: 0px 0px 1.1em; text-align: left;&quot;&gt;Why are passwords important?&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px 0px 0.8em; text-align: left;&quot;&gt;We now use the Internet for a wide range of activities, including online banking, online shopping and online research. Increasingly, we’re also using the Internet to socialise. In the last few years there&#39;s been a massive growth in the number of social networking sites such as Facebook, MySpace, etc. We share all kinds of personal details as well as music, pictures, and videos.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px 0px 0.8em; text-align: left;&quot;&gt;Unfortunately, the more personal details we make available, the more exposed we are to online identify theft. Identity theft is when a criminal steals confidential personal data that lets them fraudulently obtain goods and services in your name. A cybercriminal could, for example, open a bank account, obtain a credit card or apply for a driving licence or passport. Or they could simply steal money directly from your bank account.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px 0px 0.8em; text-align: left;&quot;&gt;Given that passwords protect such valuable data, they&#39;re clearly very important. You should protect all your online accounts with passwords - but you must be careful when choosing them.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;margin: 0px 0px 0.8em; text-align: left;&quot;&gt;Passwords help safeguard you against identity theft. They make it harder for cybercriminals to profile you, access your bank account (or other online accounts) and steal your money.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;wb_tl&quot; dir=&quot;ltr&quot; style=&quot;background-color: #f5f2e8; background-image: url(&amp;quot;http://images3.kaspersky-labs.com/en/c_threats/ct_wb_tl.gif&amp;quot;); background-position: 0% 0%; text-align: left;&quot;&gt;&lt;div class=&quot;wb_tr&quot; style=&quot;background-image: url(&amp;quot;http://images3.kaspersky-labs.com/en/c_threats/ct_wb_tr.gif&amp;quot;); background-position: 100% 0%;&quot;&gt;&lt;div class=&quot;wb_bl&quot; style=&quot;background-image: url(&amp;quot;http://images3.kaspersky-labs.com/en/c_threats/ct_wb_bl.gif&amp;quot;); background-position: 0% 100%;&quot;&gt;&lt;div class=&quot;wb_br&quot; style=&quot;background-image: url(&amp;quot;http://images3.kaspersky-labs.com/en/c_threats/ct_wb_br.gif&amp;quot;); background-position: 100% 100%;&quot;&gt;&lt;table class=&quot;w100&quot; style=&quot;border-collapse: collapse; font: 100% arial; margin: 0px; width: 500px;&quot;&gt;&lt;tbody style=&quot;text-align: left;&quot;&gt;
&lt;tr style=&quot;text-align: left;&quot;&gt;&lt;td style=&quot;color: #62736e; font: 14px/1.3 arial; padding: 24px 28px 20px; text-align: left;&quot;&gt;&lt;div style=&quot;margin: 0px 0px 0.8em;&quot;&gt;Choosing a good password is an important part of lowering the risk of becoming a victim of cybercrime. The following guidelines should help you when choosing passwords for your online accounts.&lt;/div&gt;&lt;table class=&quot;w100&quot; style=&quot;border-collapse: collapse; font: 100% arial; margin: 0px; width: 570px;&quot;&gt;&lt;tbody style=&quot;text-align: left;&quot;&gt;
&lt;tr class=&quot;t&quot; style=&quot;text-align: left; vertical-align: top;&quot;&gt;&lt;td class=&quot;w50&quot; style=&quot;color: #62736e; font: 14px/1.3 arial; padding: 0px 14px 0px 0px; text-align: left; vertical-align: top; width: 313px;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;h2 style=&quot;color: #239e7f; font: bold 15px tahoma; margin: 0px 0px 1.1em;&quot;&gt;How to choose secure passwords&lt;/h2&gt;&lt;/li&gt;
&lt;li&gt;Make your passwords memorable, so that you don’t have to write them down or store them in a file on your computer (remember, this file could be stolen by cybercriminals).&lt;/li&gt;
&lt;li&gt;Don’t use real words that a hacker or cybercriminal can find in a dictionary.&lt;/li&gt;
&lt;li&gt;Use a mixture of uppercase and lowercase letters, numbers and non-alphanumeric characters such as punctuation marks (although the latter are not always allowed).&lt;/li&gt;
&lt;li&gt;Don’t recycle passwords, e.g. don’t use &#39;password1&#39;, &#39;password2&#39;, &#39;password3&#39;, etc. for different accounts.&lt;/li&gt;
&lt;li&gt;If possible, use a passphrase, rather than a single word.&lt;/li&gt;
&lt;li&gt;Don’t use the same password for multiple accounts. If a cybercriminal finds the password to one account, they can use to access other accounts.&lt;/li&gt;
&lt;/ul&gt;&lt;/td&gt;&lt;td class=&quot;w50&quot; style=&quot;color: #62736e; font: 14px/1.3 arial; padding: 0px 0px 0px 14px; text-align: left; vertical-align: top; width: 313px;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;h2 style=&quot;color: #239e7f; font: bold 15px tahoma; margin: 0px 0px 1.1em;&quot;&gt;How to keep your passwords safe&lt;/h2&gt;&lt;/li&gt;
&lt;li&gt;Don’t use obvious passwords that can be easily guessed, such as your spouse’s name, your child’s name, pet&#39;s name, car registration, postcode etc.&lt;/li&gt;
&lt;li&gt;Don’t tell anyone your password. If an organisation contacts you and asks for your password, even by phone, don&#39;t give them any of your personal details. Remember, you don’t know who’s at the other end of the telephone line.&lt;/li&gt;
&lt;li&gt;If an online store, or any web site, sends you an email confirmation that contains a new password, login again and change your password immediately.&lt;/li&gt;
&lt;li&gt;Check that your Internet security software blocks attempts by cybercriminals to intercept or steal passwords.&lt;/li&gt;
&lt;/ul&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/8081940864821050519/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/8081940864821050519?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/8081940864821050519'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/8081940864821050519'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/passwords-choosing-good-password-is.html' title='Passwords'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-6371955252221236518</id><published>2011-02-05T16:59:00.002+03:00</published><updated>2011-02-05T17:01:52.317+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>32 Ways to Secure Your Digital Life</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;For every freedom and convenience we enjoy in our digital lives,  there are countless cyber do-badders looking for ways to exploit them.  Fight back with these 32 ways to protect your digital life!&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Call us cynical or hard-edged, but we frankly believe that the world  is filled with hustlers, grifters, and crooks out to bamboozle us at  every turn.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Those suspicions are doubled for our digital lives. For no longer do  bunko artists need to trick you into buying that iPad box with a brick  in it. Today, they can rip you off by auto pilot. With the deadliness  and stealth of a UAV, these scumbags can steal your banking credentials,  clone your debit card, or infect your computer. Don&#39;t worry about being  too paranoid. There&#39;s really no such thing as being overly vigilant  when it comes to your &lt;a class=&quot;autolink&quot; href=&quot;http://gizmodo.com/tag/digitalsecurity/&quot; title=&quot;Click here to read more posts tagged #digitalsecurity&quot;&gt;digital security&lt;/a&gt;.&lt;/div&gt;&lt;h1 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Protect Your Desktop PC&lt;/h1&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Installing strong, up-to-date security software is a given. But it  takes much more than that to defend the epicenter of your digital life.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image340&quot; height=&quot;320&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/340x_cmstacker-system-2.jpg&quot; width=&quot;240&quot; /&gt;&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Keep Your OS Patched&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Could real people actually be as clueless as some of those characters  we see in movies? Sadly, you need no more evidence of that cliché than  the average computer user. Even though he or she knows that an OS update  is as critical as, say, nailing boards over your windows in a zombie  apocalypse, many choose to ignore the updates until something crawls in  and eats their brains.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;The most basic security step PC users should take-regardless of OS-is  to install the latest updates. Yes, we know, it can be  teeth-gritting-especially when the updates are larger than the original  OS-but it&#39;s necessary for patching holes being used by attackers to  squeeze into your PC.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Lose Windows XP&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Windows XP was a great operating system but it&#39;s now pushing 10 years  old and it&#39;s a popular target for attacks. Why? It&#39;s not as secure as  its replacements. It&#39;s also where the money is-literally-with 51 percent  of computers on the planet running it. Many attacks specifically target  XP and ignore Windows Vista and Windows 7 completely. Unless you like  to wrench on your OS all day, we recommend that you give XP the  retirement it has earned.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Keep Your Applications Patched&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Even Microsoft haters have to admit the company has done an admirable  job patching its operating systems in a reasonable amount of time.  Because of this, many of the weak spots on a PC aren&#39;t even the OS  anymore, but rather the third-party applications. While Microsoft will  patch its own products in Windows Update, it doesn&#39;t do squat about  anything else. With literally dozens of apps to check for updates every  week, you can see where the problem lies. That&#39;s why we run Secunia&#39;s  PSI Scanner (&lt;a href=&quot;http://www.secunia.com/&quot; target=&quot;_blank&quot;&gt;www.secunia.com&lt;/a&gt;).  The free app runs in the background and checks your installed apps and  plugins for available updates and then gives you a link of where to  download the patch. The latest beta version will actually install some  of the updates for you. The company also offers an online scanner but we  don&#39;t recommend it because it runs in Java.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/340x_secunia.jpg&quot; width=&quot;340&quot; /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Secunia&#39;s free PSI app will monitor the dozens of applications installed on your machine for available&amp;nbsp;security patches.&lt;/b&gt;&lt;/div&gt;&lt;h1 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Beware the Usual Suspects&amp;nbsp;&lt;/h1&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;When a massive malware outbreak occurs, you can almost always expect  to see these five shifty guys in the police lineup: Flash,  Acrobat/Reader, QuickTime, Java, and JavaScript.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Normally we&#39;d say just execute &#39;em, but it doesn&#39;t always work that  way. Yes, if you can, simply uninstall these offenders (save  JavaScript), but if you must have them, there is a way to at least  mitigate some of the damage.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Start by disabling Acrobat/Reader in your browser. In Firefox, go to  Tools, then Add-ons, then Plugins, and disable the Acrobat plugin. While  you&#39;re there, you should also probably disable QuickTime, Java, and  even the DivX Web Player if you want to be extra cautious.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/340x_plugins.jpg&quot; width=&quot;340&quot; /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Disabling plugins for Acrobat, QuickTime, and other media players can&amp;nbsp;mitigate some of the damage from new zero-day exploits.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;To disable these plugins in Chrome, go to Options, Under the Hood,  Content Settings, Plugins, and select &quot;Disable individual plugins.&quot;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Now, go into the Acrobat app, go to Edit, Preferences, Trust Manager,  and uncheck &quot;Allow opening of non-PDF file attachments with external  applications.&quot; While you&#39;re in Preferences, click the JavaScript option  and uncheck &quot;Enable Acrobat JavaScript.&quot; Also click on Internet and  uncheck &quot;Display PDF in browser.&quot; Or just dump the whole thing for Foxit  Reader (&lt;a href=&quot;http://www.foxitsoftware.com/&quot; target=&quot;_blank&quot;&gt;www.foxitsoftware.com&lt;/a&gt;).&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;For QuickTime, start the player, dig into Edit, Preferences,  QuickTime Preferences, Browser, and uncheck &quot;Play movies automatically.&quot;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;To mitigate the damages from Adobe Flash, consider running the  FlashBlock extension in Firefox and Chrome. This will prevent Flash from  being displayed on a page. In its place will be a place holder that,  when clicked, will play the Flash content.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Disabling JavaScript unilaterally can be problematic, as it breaks  many sites. Still, for the paranoid, there is a way. The NoScript  extension for Firefox is the leading contender. Chrome has no such  extension, but you can go to Tools, then Options, then Content Settings,  then JavaScript, and select &quot;Do not allow any site to run JavaScript.&quot;  This will place a small icon in the address bar that will let only your  favorite sites run JavaScript. Disabling JavaScript in Chrome can be  wonky, but it&#39;s worth investigating if you want to avoid one of the  primary ways crooks are targeting you.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Use a Virtualized Browser&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Since the vast majority of attacks are coming from the browser, one  of the safest ways to surf the web is from a virtualized browser or a  virtual machine. Dell offers its free KACE browser (&lt;a href=&quot;http://www.kace.com/&quot; target=&quot;_blank&quot;&gt;www.kace.com&lt;/a&gt;),  which virtualizes Firefox 3.6 along with Adobe Reader and Flash.  Malware that exploits holes in Firefox, Reader, or Flash would be  contained within the virtual machine. The bad news? If you do get an  infection and need to flush the virtual Firefox, you lose all of your  settings. That includes the numerous updates to Firefox that come out  seemingly every month and any bookmarks and plugins you installed. An  alternative is to build a virtual machine using either Virtual PC 2007 (&lt;a href=&quot;http://www.microsoft.com/&quot; target=&quot;_blank&quot;&gt;www.microsoft.com&lt;/a&gt;) or VM Ware Player (&lt;a href=&quot;http://www.vmware.com/&quot; target=&quot;_blank&quot;&gt;www.vmware.com&lt;/a&gt;).  Both are free, and both Microsoft and VM Ware offer free images that  include browsers. Microsoft offers Vista and XP with IE8 installed and  VM Ware offers Ubuntu with Firefox installed. Of the three options, VM  Ware&#39;s is the most solid but folks not used to Linux might be thrown for  a loop. Microsoft&#39;s images time out after three months, so you&#39;ll have  to download it again.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Get a Second Opinion&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Do you really know if that file is truly untainted? Many malware  writers are specifically crafting wares to avoid detection by antivirus  suites. If you have a file that you need to run, we recommend that you  incubate it for a few days or a few weeks if possible. This gives  security software a chance to catch up to any new exploit. We then  recommend that you get a second opinion from &lt;a href=&quot;http://virustotal.com/&quot; target=&quot;_blank&quot;&gt;Virustotal.com&lt;/a&gt;.  This website&amp;nbsp;lets you upload a file to be scanned by two dozen AV  engines. Just remember that malware writers are also using tools such&amp;nbsp;as  Virustotal.com to see if their wares can pass muster, so long  incubations are key.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Unshorten Those URLs&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Shortened URLs can conveniently turn unwieldy web address into  bite-size morsels, but they can also disguise a link to a malware-ridden  site. Though many of the URL shortening services check for malicious  websites, it&#39;s usually better to verify a shortened URL&#39;s destination.  For that, we use &lt;a href=&quot;http://longurlplease.com/&quot; target=&quot;_blank&quot;&gt;Longurlplease.com&lt;/a&gt;.  It supports 81 shortening services. As for cryptic shortened URLs,  visit Virustotal.com to have the address checked by six URL analysis  engines.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/340x_longurl.jpg&quot; width=&quot;340&quot; /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Although many URL shortening services claim to&amp;nbsp;scan for malware, it&#39;s  probably best to lengthen&amp;nbsp;those URLs before you click on them,  using&amp;nbsp;Longurlplease.com.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Run in a Standard User Account&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Running as an administrator in a Windows OS is a bit like giving  someone the right to walk into your home and rummage through every nook  and cranny. One easy way to avoid or greatly limit damage from malware  is to always run with standard user rights. As with all things, this is  no guarantee against harm. Some malware, even when executed in a  standard user account, can grant itself administrator privileges and  still run rampant through your PC, but running as a standard user  minimizes risk.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/340x_user.jpg&quot; width=&quot;340&quot; /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Running in standard user mode in a Windows OS has proven to be useful in beating back malware attacks.&lt;/b&gt;&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Use a Live CD/Linux Distro to Do Banking&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;That Windows is the number one target for cybercrime and mischief is  not news to any of us-naturally, owning 95 percent of the market makes  it an obvious target. That&#39;s why we agree with security journalist Brian  Krebs (&lt;a href=&quot;http://krebsonsecurity.com/&quot; target=&quot;_blank&quot;&gt;http://krebsonsecurity.com&lt;/a&gt;)  that members of the most at-risk group should do online banking with a  Linux Live CD. You can do your gaming and other Windows-based computing  booted from your hard drive. But once you have to go into secure mode,  whip out your Live CD and boot to it. Numerous Linux builds are  available, but the most popular, and among the easiest, is Ubuntu.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Restrict PC Access&amp;nbsp;for Others&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;So, you&#39;ve created this incredibly secure moat, ringed with razor  wire, claymores, and mines. And then you let your 14-year-old nephew  play some Flash games or &quot;check email.&quot; Right. The best solution is to  have visitors use a separate, secured guest PC. But if they must use  your machine, make sure you have the guest account activated. Another  option is to have them use a virtual machine. Once they&#39;re done, simply  shut down the VM and erase any trace of their activities. Or have them  use your HTPC, where they&#39;re working in the open instead of being left  alone in your office.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;PHYSICAL SECURITY: Put Your Laptop on Lockdown&lt;br /&gt;
&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/340x_lock_kensington-1287.jpg&quot; width=&quot;340&quot; /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Kensington&#39;s new ClickSafe key lock makes it an easy one-step process to&amp;nbsp;secure your laptop from snatch-and-grabs.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Obviously, all the same security risks and safety recommendations  that apply to your desktop computer also apply to your laptop. But your  laptop carries the added risk of being stolen. And let&#39;s face it: If you  haven&#39;t encrypted all your sensitive data or been diligent about  backups, the loss of your laptop could be mighty painful. One way to  prevent the potentially dire consequences is to use a laptop lock.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;The vast majority of notebooks have a slot to accommodate a physical  locking mechanism-it&#39;s usually designated by a padlock icon. The lock  itself is attached to a reinforced cable which cannot be easily cut  without the aid of a large and very noticeable set of bolt cutters. The  cable is either bolted to the floor-in your office&amp;nbsp;at work, for  instance-or looped around a substantial or immovable object. Kensington  is one of the biggest names in cable-lock makers, and offers both  combination and key locks, priced at $25 and $50, respectively.&lt;/div&gt;&lt;h1 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Protect Your Network&lt;/h1&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Keep your digital bits out of the hands of baddies.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/340x_80211a_router.jpg&quot; width=&quot;340&quot; /&gt;&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Use Google Public DNS&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;If the crooks can&#39;t convince you to visit their phony-baloney banking  webpage, the next step is to get you there against your will. One way  to do that is to poison the DNS cache you&#39;re using. The DNS server  translates URLs into IP addresses. By exploiting flaws in the DNS  software, crooks are able to redirect you to any sight of their  choice-even if you typed in the correct URL of your bank.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/340x_googledns.jpg&quot; width=&quot;340&quot; /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Bypass your ISP&#39;s DNS for one that&#39;s likely&amp;nbsp;faster and more secure, Google DNS.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;To avoid this, we recommend switching from your ISP&#39;s DNS to Google&#39;s public DNS (&lt;a href=&quot;http://bit.ly/7Ti5tM&quot; target=&quot;_blank&quot;&gt;http://bit.ly/7Ti5tM&lt;/a&gt;).  It&#39;s free and the company has implemented many of the recommended  safeguards against cache poisoning. To change the DNS on your client PC,  go to Network Connections, right-click on your connection, and  double-click Internet Protocol. Then simply enter the preferred DNS of  8.8.8.8 and alternate of 8.8.4.4 and click OK.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Conduct Personal Business at Home&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;You want a simple reason not to check your personal email at work?  Someone in your network could be using a so-called &quot;man in the middle&quot;  attack to spy on you. Whether by exploiting ARP cache poisoning, session  hijacking, or some other technique, MITM attacks let a crook steal the  credentials issued to your machine and then fool, say, Yahoo or Gmail  into thinking he&#39;s you.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;At work, with hundreds of computers and a network that stretches the  coasts, you really wouldn&#39;t know where the MITM attack is coming from.  This risk negates the possibility that your corporate network is more  secure than your home network. So, assuming you have secured your home  Wi-Fi (or don&#39;t use wireless) and that the other machines on your home  LAN are secure, save your personal email and banking for home.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Secure Your Wireless&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Quick, what&#39;s the most secure wireless available today? None. OK, we  jest, but probably no wireless protocol is 100 percent secure. But just  because there&#39;s a theoretical way to break the latest wireless  encryptions doesn&#39;t mean you should be using the weakest form. The  weakest, of course, is WEP. Easily broken in under a minute by anyone  capable of reading an Internet how-to, WEP is far less secure than WPA  or WPA2. If you&#39;re running WEP because some old hardware doesn&#39;t support  WPA2, consider junking the old equipment or upgrading your router to  one that supports guest networks. This lets you keep your internal  network behind WPA2, while keeping guests roped off with the weaker WEP  protocol to access the Internet. If you&#39;re running WPA2, the adage in  security circles is that the longer and more randomized the key, the  better.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Although not a guarantee, you can also set up your router&#39;s wireless  to only accept connections from known MAC addresses. These are the  unique IDs assigned to each computer&#39;s network card. The hole there is  that an intruder could easily spoof a MAC address from a trusted client  to still access your wireless network.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Check Each Machine&#39;s Shares and Services&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;You can check what files are shared on a machine by right-clicking My  Computer, selecting Manage, and clicking Shared&amp;nbsp;Folders. Great, now how  do you do it for&amp;nbsp;all of the machines on your network? One way is to use  NetBrute Scanner (&lt;a href=&quot;http://www.rawlogic.com/&quot; target=&quot;_blank&quot;&gt;www.rawlogic.com&lt;/a&gt;). This free utility will scan your internal network and report on shared resources that are available.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Scan Your Network&amp;nbsp;for Intruders and Piggybackers&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;If a neighbor has broken into your network so he or she could  download movie torrents, how would you know? Since most home networks  use DHCP, go into your browser&#39;s setup screen and check the DHCP screen  to see how many IP addresses are assigned. Then, try to match those up  with the systems on your network. If you have more IP addresses assigned  than devices (remember that your smartphone will eat an IP address if  it&#39;s using Wi-Fi), you may have an intruder. Another option is to use  RogueScanner (&lt;a href=&quot;http://www.paglo.com/&quot; target=&quot;_blank&quot;&gt;www.paglo.com&lt;/a&gt;),  a free tool that will query devices on your network and compare them to  an online database of devices to help you identify the machines.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image340&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/340x_roguescanner.jpg&quot; width=&quot;340&quot; /&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;Running an internal port scan may help reveal intruders freeloading on your network&#39;s bandwidth.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;So what do you do if you have an intruder or suspect one? Since the  person has likely infiltrated your network via wireless, you&#39;ll want to  lock down your wireless by switching to WPA2 and using a very long and  very random key.&lt;/div&gt;&lt;h1 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Smartphone Security&lt;/h1&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;It&#39;s a lot smaller than your desktop PC, but the risks are just as big.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;img alt=&quot;32 Ways to Secure Your Digital Life&quot; class=&quot;left image158&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2011/01/thumb160x_htc-beauty.jpg&quot; width=&quot;158&quot; /&gt;&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Hang on Tight&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Currently, the number one threat to smartphone users is having the  device end up in the wrong hands, through theft or loss. Your first line  of defense, therefore, is constant vigilance regarding your  smartphone&#39;s whereabouts.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Use a Password and Encryption&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Should your phone get lost or stolen, a good first layer of  protection is a password, an option many phone users neglect. Choose the  strongest password option available-a passphrase, for instance, rather  than a four-digit code or swipe pattern. Encryption options vary among  mobile OSes, but when possible, you should encrypt your storage card as  well as your device memory.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Back Up Your Data&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Just as with a PC, backing up your smartphone is important. Regularly  synching the device to a linked computer will do the trick. It&#39;s  insurance against the loss of your phone, corruption of your OS, or any  other event that jeopardizes your data.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Don&#39;t Store Sensitive Data&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;The surest way to guard your sensitive data is to keep it off your  smartphone altogether. Minimize the number and/or days of emails you  store on your phone, or better yet, save email and attachments to a  server. Make it a habit to regularly move or delete anything you  wouldn&#39;t want to share with strangers.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Practice App Awareness&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;An abundance of apps is both a blessing and a curse for  smartphones-there is no way every app that makes it to market can be  thoroughly vetted for 100 percent fail-safe security. By selecting  reputable apps, backed by favorable user reviews, from a trusted source,  you can diminish the risks. Avoid apps with scant reviews or that have  only recently been uploaded. Also be cautious when granting an app  permissions; consider the app&#39;s function and what it might reasonably  need access to.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Keep Software/Firmware Updated&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Make sure you are running the latest versions of your apps, OS, and  phone manufacturer software and firmware. This will ensure that any  security holes are patched and your device is less vulnerable to hacks.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Disable Bluetooth and Wi-Fi When Not in Use&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Unsecured wireless networks can be used by hackers to either attack  your phone or&amp;nbsp;steal information from it. You can protect yourself by  keeping Wi-Fi and Bluetooth off when you don&#39;t need them. When wireless  is needed, stick to known Wi-Fi networks using WPA2 and beware of public  networks, which are sometimes set up by crooks to snare people&#39;s data.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;When using Bluetooth, make sure it&#39;s in non-discoverable mode to  avoid hacks&amp;nbsp;like &quot;Bluesnarfing&quot; (stealing data), &quot;Bluejacking&quot; (sending  unsolicited messages), and &quot;Bluebugging&quot; (listening in on your calls).&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Beware of Links and Attachments&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;You&#39;ve long been warned about the risks&amp;nbsp;of opening strange links and  attachments-particularly those arriving in unsolicited&amp;nbsp;emails or text  messages. All those same warnings apply to smartphones. And those  warnings also apply to calling unfamiliar&amp;nbsp;phone numbers received in  messages, and clicking links for app &quot;updates.&quot; You can&amp;nbsp;ensure the  authenticity of an update by&amp;nbsp;going to the app&#39;s website. &amp;nbsp;&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;SMARTPHONE AV:&amp;nbsp;Add Extra Protection with a Third-Party Security App&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Currently, smartphone malware infections are rare-nothing like what  you see with PCs. But as proliferation of the devices grow, expect  viruses, worms, and trojans to become more of an issue. To combat these  threats, you need third-party software, and if you&#39;re like the majority  of smartphone users, you don&#39;t have it. But even if malware isn&#39;t a  pressing problem at the moment, a security app can offer other useful  benefits, such as browsing protection, telephone and text-message spam  blocking, and theft-protection features like locking down, wiping, or  even locating a stolen phone.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;You can find mobile security apps by many of the big names in PC protection. Independent security testing lab AV Comparatives (&lt;a href=&quot;http://www.av-comparatives.org/&quot; target=&quot;_blank&quot;&gt;www.av-comparatives.org&lt;/a&gt;)  recently evaluated mobile apps from ESET, F-Secure, Kaspersky, and  Trend Micro and gave them all &quot;Approved&quot; designations. See the full  report at &lt;a href=&quot;http://bit.ly/cGRySZ&quot; target=&quot;_blank&quot;&gt;http://bit.ly/cGRySZ&lt;/a&gt;.&lt;/div&gt;&lt;h1 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Webmail Safety&lt;/h1&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;In today&#39;s connected landscape where we enjoy Internet access not  only from our desktops and notebooks, but also from our smartphones,  tablets, and even our portable media players, it&#39;s easy to see why  free-to-use webmail has become so popular. Most webmail accounts now  offer several gigabytes of storage space, effectively turning us into  digital pack rats.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Everything you choose to save-from sensitive email exchanges to  confidential attachments-is not only accessible to you, but anyone who  manages to figure out your password, whether by brute force dictionary  attacks or by answering a series of weak security questions. And it&#39;s  not just your email history that&#39;s in danger; an unsecure webmail  account opens the door to other security breaches, like using your email  account to send spam and spread viruses. Here are some ways you can  avoid becoming just another statistic.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Create a Burly Password&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Your webmail account is only as secure as your password, so use a  strong one. The best way to do this is to use a combination of letters,  numbers, and even symbols if your webmail provider allows. Avoid using  real words at all costs, as these are easily cracked by any teenage  hacker using a brute force dictionary script. For particularly sensitive  accounts, use a random password generator (&lt;a href=&quot;http://bit.ly/bf9oB2&quot;&gt;http://bit.ly/bf9oB2&lt;/a&gt;).&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Use Multiple Passwords&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;The key to your house doesn&#39;t unlock your car door, nor does it work  with your safety deposit box. If it did, you&#39;d be three feet deep in  dung if it ever fell into the wrong hands, and the same concept applies  to your digital accounts. In practice, most people tend to use the same  password for various accounts, and that&#39;s a rookie mistake. Use a  different password for your email than you do your bank account, forum  login, and whatever else you do online. If you have trouble keeping  track of them all, store your passwords in a virtual safe, like KeePass  (free, &lt;a href=&quot;http://keepass.info/&quot;&gt;http://keepass.info&lt;/a&gt;).&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Log Out/Leave No Trace&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;It might be slightly inconvenient to log out of your webmail and  clear your browser cache, but if your notebook ends up lost or stolen,  you&#39;ll be glad you did. And if there are others around, log out and  close your browser before heading off for a bathroom break.&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;About Security Questions&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;Answering security questions can save your bacon if you forget your  login credentials, but keep in mind that anyone who knows you well can  probably guess the correct answer(s). Only rely on these if the  questions are particularly personal in nature, or if you&#39;re allowed to  create your own that are not easily guessable. And, for God&#39;s sake,  don&#39;t publish that information in your Facebook profile. There&#39;s no  point in having a security question of what city where you born in, or  what your pet&#39;s name is if your public profile gives the answer away.&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/6371955252221236518/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/6371955252221236518?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/6371955252221236518'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/6371955252221236518'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/32-ways-to-secure-your-digital-life.html' title='32 Ways to Secure Your Digital Life'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-7388773231489689622</id><published>2011-02-04T19:49:00.002+03:00</published><updated>2011-02-05T17:46:08.811+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Menu"/><title type='text'>The human factor and information security</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: arial; font-size: 14px; line-height: 19px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;h1 dir=&quot;ltr&quot; style=&quot;font: normal normal normal 150%/normal tahoma, arial; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px; text-align: left;&quot;&gt;The human factor and information security&lt;/h1&gt;&lt;div class=&quot;mCont&quot; dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;font-weight: bold; margin-bottom: 1em; margin-left: 2em; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;li style=&quot;margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Computer security as a system&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;People are part of the system&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Security vulnerabilities and some examples&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0.2em; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;Conclusion&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;This article has not been written in order to scare users, or to push them into buying security software for their computers. It&#39;s simply an attempt to share some thoughts which have come to mind in my work as a virus analyst, while analysing code, reading a range of forums and articles, and numerous daily messages from readers asking for help.&lt;/div&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=3401588452896501519&amp;amp;postID=7388773231489689622&quot; name=&quot;sys&quot; style=&quot;color: #3751ab; text-decoration: none;&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2 style=&quot;font: normal normal normal 18px/normal arial; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Computer security as a system&lt;/h2&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Information security cannot be thought of as a single, discrete, entity; it&#39;s a whole range of measures, and should be viewed as a system. Information security is as complex as any other system which combines a number of different aspects and approaches, none of which can be regarded as more or less important. This means that no single aspect or approach can be disregarded; if one area or part of the system is ignored, the system will not function correctly.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Information security differs very little from security in general. After all, no one would install a heavy security door with a pick-proof lock on a garden shed. Similarly, a car can have excellent tires, but if the brakes are faulty, the car will be unsafe. Protection against cyber threats works on the same principle: all possible weak points should be secured, whether on a desktop computer, an organization&#39;s server or a corporate network. Data should also be accessed via secure paths, although I&#39;m not going to discuss how any of this should be done in this article. Those who work with information should also be viewed as a part of the system, a link in the chain which ensures both data exchange and the security of the system overall.&lt;/div&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=3401588452896501519&amp;amp;postID=7388773231489689622&quot; name=&quot;human&quot; style=&quot;color: #3751ab; text-decoration: none;&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2 style=&quot;font: normal normal normal 18px/normal arial; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;People are part of the system&lt;/h2&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;There&#39;s a wide variety of security software available, including firewalls, intrusion detection systems, antivirus solutions etc. Each type of software is designed to perform very specific functions, and using such software will help protect a system. However, even using the very best software, which implements the most advanced technology and the most secure algorithms, cannot guarantee 100% system security. This is because people are involved in the development and implementation of software, and people make mistakes. Consequently people, who are a part of any system, are always going to be the weak point in a security system.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;The human factor is the underlying reason why many attacks on computers and systems are successful. Of course, there are a great many specific examples. Let&#39;s take a look at how and why hackers, virus writers and other malicious users exploit the human factor, using people as the chosen method to penetrate systems.&lt;/div&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=3401588452896501519&amp;amp;postID=7388773231489689622&quot; name=&quot;vulns&quot; style=&quot;color: #3751ab; text-decoration: none;&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2 style=&quot;font: normal normal normal 18px/normal arial; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Security vulnerabilities and some examples&lt;/h2&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;A lot of users don&#39;t understand that using software which contains vulnerabilities poses a genuine security risk to their computer or system. The majority of users see their computer as a black box; they don&#39;t understand how it works, and in reality, they don&#39;t really want to. They want to use computers in the same way as a vacuum cleaner, a fridge, a washing machine, or any other household appliance, without having to understand how the appliance performs its function. And many users think that viruses, hackers, and other cyber threats are simply the invention of security software vendors. In some ways, who can blame them, given that some of those working in the security industry regard viruses as &#39;something that happen to stupid users&#39; and antivirus software is simply a waste of money. &quot;I&#39;ll simply install an operating system which isn&#39;t susceptible to viruses, and software without any vulnerabilities, and then I&#39;ll have nothing to worry about&quot; so goes the theory.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Underestimating the severity of potential threats is only part of the problem, however. The human factor also comes into play in creating and implementing security policies and procedures, and many potentially exploitably loopholes appear at the drafting stage.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;The security of wireless networks is in a lamentable state due to the fact that errors were made when wireless protocols were being developed. There are as much written about secure programming as there are program errors; however, I&#39;m sure while programmers and testers will continue to identify loopholes which already exist, new ones will continue, albeit inadvertently, to be created. And even the most carefully developed software has to be implemented, which again brings humans into the equation: the best firewall in the world will not protect your system if you have a poorly trained system administrator.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;While I was writing this article, a worm was gaining ground on the Internet. Lupper spreads via known vulnerabilities, and if an administrator regularly reads vulnerability alerts and installs patches promptly, the system won&#39;t be vulnerable to Lupper. This is standard for all worms. The usual scenario is that a vulnerability advisory is issued, but most people don&#39;t pay much attention to it; then proof of concept code is released showing how the vulnerability can be created, but the majority of users still don&#39;t understand the gravity of the situation and take no action. Lupper follows this pattern, and confirms the fact that security issues are not taken seriously enough at an early stage.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Another example of an irresponsible approach to security is how users treat confidential information. An analogous situation in everyday life: who would leave their keys in the outside lock, or hang them on a hook where anyone could take them? No-one, of course. But lots of systems use an empty password, or the users&#39; name as a password, making it extremely easy to access the system. As an alternative, let&#39;s take the scenario where the administrator requires users to have passwords which are difficult to guess, and therefore better from a security point of view. This is all well and good, in theory, but I&#39;ve often seen such &#39;secure&#39; passwords written on a piece of paper and left lying on the user&#39;s desk, or stuck to the monitor. It&#39;s not surprising that malicious users take advantage of this situation.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Another human failing which malicious users exploit to the full is curiousity. The vast majority of us have encountered email worms at some time and know that these worms arrive as attachments to infected messages. Sending the worm out is only half the battle, however, for the virus writer or malicious user. The worm then has to be activated in order to spread further, and this is done by opening the attachment. You might thing that users have become wary of attachments to unexpected messages, and consequently don&#39;t open them. Unfortunately, the cyber criminals and vandals know how to pique users&#39; curiosity. An intriguing message referring to the attachment will be opened by the majority of users, as the graph below shows:&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;img alt=&quot;Why do you open suspicious attachments?&quot; border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://www.securelist.com/en/images/vlpub/0512_sapronov_hf_graph01_en.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot; width=&quot;300&quot; /&gt;&lt;br /&gt;
&lt;span class=&quot;small&quot; style=&quot;font: normal normal normal 11px/normal tahoma;&quot;&gt;Why do you open suspicious attachments?&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Interestingly, in spite of the fact that antivirus vendors constantly stress that suspicious attachments shouldn&#39;t be opened, the number of users who open these attachments remains stable. This can be explained by the fact that virus writers are constantly finding new ways to exploit human curiosity and gullibility.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;However, email worms don&#39;t only spread attached to messages. Recently, users have been receiving a ling to the body of the worm, rather than the worm file itself. The user is still part of the activation process, and has to be persuaded to click on the link in order to launch the worm. It seems that this is very simple: let&#39;s take&amp;nbsp;Email-Worm.Win32.Monikey, which sends emails like the one shown below:&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;img alt=&quot;Email sent by Email-Worm.Win32.Monikey&quot; border=&quot;0&quot; height=&quot;392&quot; src=&quot;http://www.securelist.com/en/images/vlpub/0512_sapronov_hf_shot01.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot; width=&quot;393&quot; /&gt;&lt;br /&gt;
&lt;span class=&quot;small&quot; style=&quot;font: normal normal normal 11px/normal tahoma;&quot;&gt;Email sent by Email-Worm.Win32.Monikey&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;At first glance, this seems to be a perfectly normal email, telling the user that s/he has received an e-greetings card. It&#39;s logical for the user to click on the link in order to view the card, and the malicious users who have sent the email are counting on this: the unsuspecting user, in trying to view the alleged card, will launch the worm. So what is the answer? How can malicious emails be distinguished from genuine emails? The screenshot below is a legitimate email sent out by the POSTCARD.RU service:&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;img alt=&quot;Email sent by POSTCARD.RU&quot; border=&quot;0&quot; height=&quot;510&quot; src=&quot;http://www.securelist.com/en/images/vlpub/0512_sapronov_hf_shot02.png&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot; width=&quot;394&quot; /&gt;&lt;br /&gt;
&lt;span class=&quot;small&quot; style=&quot;font: normal normal normal 11px/normal tahoma;&quot;&gt;Email sent by POSTCARD.RU.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Firstly, it should be highlighted that the email shown in screenshot 1 uses HTML code - this is used to mask the URL of the address where the worm is place, making it appear to be a link to POSTCARD.RU. Screenshot 2 shows the email from POSTCARD.RU which includes a warning, stating that all emails from POSTCARD.RU are in plain text only; any message containing HTML is not legitimate, and potentially malicious. If the user wants to view their card, they should copy the link into their browser - a genuine link will then cause the e-card to be displayed. Under no circumstances should users click on HTML links; in this case, as in many others, this opens a site containing malware, which will then be activated.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;A similar approach has been used recently in a spam mailing. Messages stated &#39;If you wish to unsubscribe from our mailing list, please click on the link below&#39;. You might ask what the problem is - of course users don&#39;t want to receive mountains of spam, and will try and use the link to unsubscribe. When the user clicks on the link, an HTML page is opened, which alledgedly checks the subscriber database, and then displays a message saying &#39;Your address has been removed&#39;. However, this is all an illusion - in actual fact, two malicious programs will be downloaded to the victim machine:Trojan-Dropper.Win32.Small.gr and Trojan-Spy.Win32.Banker.s. There&#39;s a clear lesson here - spammers are not going to worry about users wants and needs, and once they have got hold of an address, that address will receive spam regardless of any attempts to unsubscribe. In fact, attempts to unsubscribe usually result either in more spam, or in malicious code being downloaded. The best way to deal with spam is simply to delete the unwanted messages.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;The summer of 2005 brought a new type of mass mailing, with cleverly designed emails which targeted a clear group. Malicious users started spamming corporate email addresses with messages appearing to come from the user&#39;s manager. This was done by spoofing the address field. However, the real return address, which couldn&#39;t be seen, was the malicious user&#39;s address. Of course, conscientious employees are highly likely to do as they are told by their manager, and would therefore open the attachment and launch the malicious program. It should be noted that such incidents don&#39;t receive much publicity; those responsible for security in organizations which are targeted usually attempt to prevent the information from reaching the wider world.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;When malicious code is mass mailed, the senders often play on the popularity of antivirus solutions. This kills two birds with one stone: the user launches the malicious program, and antivirus vendors are discredited. This last point should be emphasised - if users receive enough messages appearing to be from antivirus companies, sooner or later they will start to think that the antivirus companies are sending out infected updates, and will stop updating their antivirus solutions. This, of course, makes antivirus software lose most of its efficacy. It must be stressed that no antivirus company distributes updates via mass mailing, and users should not install programs which arrive by email on their machines. Email-Worm.Win32.Swen successfully used this approach by presenting itself as a security patch issued by Microsoft. The worm managed to infect several hundred thousand computers around the world as users installed the alleged patch. The worm&#39;s authors had carefully waited for the moment when users would be most likely to install a security patch, having been frightened by the recent Lovesan incident.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;This case shows how virus writers exploit events in the world at large in order to infect more machines. They do this extremely quickly and effectively - recent cases include mass mailings of Trojans following the terrorist bombings on the London underground, the power cuts in Moscow, and Hurricane Katrina in the USA in 2005. The messages sent made reference to these and other disasters in order to entice users to open attachments or click on links.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Malicious code for instant messaging programs (ICQ, Miranda etc.) takes a very similar approach.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;How do computers get infected by instant messaging malware? More often than not, the malicious user sends a link to the body of the worm, which is activated once the user clicks on the link. In order to get users to click on the link, the same methods are used as with email. However, in some cases cyber criminals have gone further, as&amp;nbsp;Trojan-PSW.Win32.LdPinch&amp;nbsp;shows. The authors decided that having received the link, the recipient would probably want to chat, or at least say thank you. They developed a bot which would generate likely answers to be sent to the recipients&#39; questions or phrases.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;In spite of these new, more sophisticated methods, virus writers haven&#39;t forgotten about an older, tried and tested one - using links, which differ only slightly from trusted addresses and where the difference is not obvious at a first, cursory glance (e.g. changing an I to an |). This continues to be used as it is an effective way of enticing users into clicking on links. An example of this was detected in summer 2005, when we intercepted a worm which spread via MSN Messenger. The link sent by the worm, http://www.vbulettin.com/xxxxxxx, supposedly led to the site of a well regarded antivirus publication. Unsurprisingly, many users trusted this link, not realizing that Virus Bulletin is actually located at www.virusbtn.com, clicked, and activated the worm.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;The user receives the malicious program in some form or another in all the cases mentioned above. Although many users do launch the programs, some heed repeated warnings, and don&#39;t click on links or open attachments. Consequently, virus writers need to find other, more effective methods, to reach these security conscious users. It would be far more effective if the user didn&#39;t receive anything directly, but simply picked up the malicious program while surfing the web. Due to this, there has been an increase in the number of sites which have been compromised and had malicious programs placed on them. Malicious users naturally choose popular sites, often those of well-known companies. Although malicious programs placed on compromised sites usually only stay there a few days before they are removed, this is long enough for thousands of machines to be infected.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;One example of this is the email worm Monikey, which was mentioned above. Infected messages contain a link to the site where the body of the worm had been placed. The worm was placed on totally legal sites, and we haven&#39;t managed to establish exactly how this was done. However, we suspect that accounts which could be used to access the sites were stolen and the data used by the authors of Monikey. It&#39;s surprising that the administrators of compromised sites, although they removed the body of the worm, didn&#39;t block the accounts which had been misused. And the worm continues to appear on the same sites which often display the following announcement, assuring users that the site owners did not carry out any mass mailing, explaining that the site has been compromised, and apologizing for the inconvience.&lt;/div&gt;&lt;div align=&quot;center&quot;&gt;&lt;img alt=&quot;Announcement on compromised site&quot; border=&quot;1&quot; height=&quot;209&quot; src=&quot;http://www.securelist.com/en/images/vlpub/0512_sapronov_hf_shot03.gif&quot; style=&quot;border-bottom-width: 0px; border-color: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot; width=&quot;322&quot; /&gt;&lt;br /&gt;
&lt;span class=&quot;small&quot; style=&quot;font: normal normal normal 11px/normal tahoma;&quot;&gt;Announcement on compromised site&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Cyber vandals from Nizhni Novgorod came up with an even more inventive method of distributing their malicious code via the Internet. They offered webmasters, who agreed to place a Trojan on their site, 6 cents for every machine infected by the Trojan. It&#39;s a cause for some concern that a fair number of webmasters agreed to do this.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;All of the above shows that users are under considerable threat in a variety of ways when surfing the Internet.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;There are of course other ways of exploiting human nature, and the topic of social engineering deserves a separate article. Sometimes malicious users don&#39;t know where to start when trying to penetrate a system. One tried and tested method is to get to know someone within the target organization. This provides a foothold to conduct a range of attacks, often without resorting to technology, but simply by exploiting human fallibility. For instance, a potential hacker may call the organization being targeted, state that s/he is an employee, and be given a variety of information, ranging from telephone numbers to IP addresses. This information can then be used to attack the organization&#39;s network.&lt;/div&gt;&lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=3401588452896501519&amp;amp;postID=7388773231489689622&quot; name=&quot;results&quot; style=&quot;color: #3751ab; text-decoration: none;&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h2 style=&quot;font: normal normal normal 18px/normal arial; margin-bottom: 0.5em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Conclusion&lt;/h2&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Computers are becoming ever more widely used in every area of life. THe potential profits to be made from cybercrime are also increasing, and techniques used by cyber criminals are consequently evolving rapidly.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Creating a reliable and effective security system in the modern world is not at all easy. There are so many potential weak points that detecting new security loopholes and patching them is an unending process. New technologies are taking the place of old ones, and are being used to solve today&#39;s problems - but these new technologies have their own drawbacks. But hackers, virus writers and malicious users are inventing new tricks in order to evade the security software currently being used. The result is a continued stand off between cyber criminals and security professionals, with only intermittent success for the security industry. However, users have the ability to swing the balance one way or the other: unfortunately the unpredictability (or predictability) of human behaviour can bring the most concerted efforts made to secure systems to nothing.&lt;/div&gt;&lt;div style=&quot;line-height: 1.4; margin-bottom: 1em; margin-left: 0px; margin-right: 0px; margin-top: 0px;&quot;&gt;Despite this, I hope that this article may cause some readers to consider information security in more depth, and to pay more attention to security issues.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/7388773231489689622/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/7388773231489689622?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/7388773231489689622'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/7388773231489689622'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/human-factor-and-information-security.html' title='The human factor and information security'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-1826501197128295534</id><published>2011-02-04T16:55:00.000+03:00</published><updated>2011-02-04T16:55:53.251+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ESET and AVG"/><title type='text'>AVG Anti-Virus Free Edition for Linux</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXhKqjLMkrkoBsIeFP4lxPzFbge6BvORansze_hKEiozE5mtnJBPY5aE53K5M98JmSI0XUQlMRQAdGZOAI6xJN_IZ7-ULMMZDX80zMPq-D0VaJr3P9kqPoT00eLEAE3Aet9bIkgkZbPG0/s1600/AVG_Antivirus_Icon_by_Philosoraptus.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXhKqjLMkrkoBsIeFP4lxPzFbge6BvORansze_hKEiozE5mtnJBPY5aE53K5M98JmSI0XUQlMRQAdGZOAI6xJN_IZ7-ULMMZDX80zMPq-D0VaJr3P9kqPoT00eLEAE3Aet9bIkgkZbPG0/s200/AVG_Antivirus_Icon_by_Philosoraptus.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 11px; line-height: 15px;&quot;&gt;&lt;br /&gt;
&lt;h3 style=&quot;color: #737373; display: block; font-size: 15px; font-weight: normal; line-height: 1.3em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0.5em; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; text-transform: uppercase;&quot;&gt;AVG ANTI-VIRUS FREE EDITION FOR LINUX&lt;/h3&gt;&lt;div class=&quot;mbottom&quot; style=&quot;margin-bottom: 10px !important; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;img alt=&quot;AVG Anti-Virus Free Edition for Linux&quot; class=&quot;fleft mright mbottom&quot; src=&quot;http://free.avg.com/stc/img/downloads/box/box_avg_alf_90x120.jpg&quot; style=&quot;float: left; margin-bottom: 10px !important; margin-left: 10px; margin-right: 10px !important; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;div class=&quot;fleft width-570&quot; style=&quot;float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; width: 570px !important;&quot;&gt;Basic antivirus protection for Linux/FreeBSD available to download for free. Free virus protection for your PC. For private and non-commercial use only.&lt;/div&gt;&lt;/div&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table class=&quot;intab&quot; style=&quot;border-collapse: collapse; border-left-color: rgb(255, 255, 255); border-left-style: solid; border-left-width: 1px; border-top-color: rgb(255, 255, 255); border-top-style: solid; border-top-width: 1px; margin-bottom: 10px; margin-left: 2px; margin-right: 1px; margin-top: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; width: 655px;&quot;&gt;&lt;caption style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/caption&gt;&lt;caption style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/caption&gt;&lt;thead style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;tr style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;th class=&quot;norm&quot; style=&quot;background-color: transparent; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; font-size: 11px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 6px; padding-left: 7px; padding-right: 7px; padding-top: 6px; text-align: left; width: auto;&quot; width=&quot;310px&quot;&gt;&lt;br /&gt;
Name&lt;/th&gt;&lt;th class=&quot;norm&quot; style=&quot;background-color: transparent; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; font-size: 11px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 6px; padding-left: 7px; padding-right: 7px; padding-top: 6px; text-align: left; width: auto;&quot;&gt;Version&lt;/th&gt;&lt;th class=&quot;norm&quot; style=&quot;background-color: transparent; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; font-size: 11px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 6px; padding-left: 7px; padding-right: 7px; padding-top: 6px; text-align: left; width: auto;&quot;&gt;Type&lt;/th&gt;&lt;th class=&quot;norm&quot; style=&quot;background-color: transparent; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; font-size: 11px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 6px; padding-left: 7px; padding-right: 7px; padding-top: 6px; text-align: left; width: auto;&quot;&gt;&lt;br /&gt;
&lt;/th&gt;&lt;th class=&quot;norm&quot; style=&quot;background-color: transparent; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; font-size: 11px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 6px; padding-left: 7px; padding-right: 7px; padding-top: 6px; text-align: left; width: auto;&quot;&gt;Size&lt;/th&gt;&lt;/tr&gt;
&lt;/thead&gt;&lt;tbody style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;
&lt;tr style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot; width=&quot;310px&quot;&gt;&lt;a class=&quot;clr&quot; href=&quot;http://download.avgfree.com/filedir/inst/avg85flx-r863-a3205.i386.deb&quot; style=&quot;color: #008ebe; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;AVG Server Edition for Linux&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;(avg85flx-r863-a3205.i386.deb)&lt;/a&gt;&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;8.5.0863&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;deb&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;88 MB&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;dark&quot; style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot; width=&quot;310px&quot;&gt;&lt;a class=&quot;clr&quot; href=&quot;http://download.avgfree.com/filedir/inst/avg85flx-r863-a3205.i386.rpm&quot; style=&quot;color: #008ebe; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;AVG Server Edition for Linux&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;(avg85flx-r863-a3205.i386.rpm)&lt;/a&gt;&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;8.5.0863&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;rpm&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;88 MB&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot; width=&quot;310px&quot;&gt;&lt;a class=&quot;clr&quot; href=&quot;http://download.avgfree.com/filedir/inst/avg85flx-r863-a3205.i386.sh&quot; style=&quot;color: #008ebe; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;AVG Server Edition for Linux&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;(avg85flx-r863-a3205.i386.sh)&lt;/a&gt;&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;8.5.0863&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;sh&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;88 MB&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;dark&quot; style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot; width=&quot;310px&quot;&gt;&lt;a class=&quot;clr&quot; href=&quot;http://download.avgfree.com/filedir/inst/avg85flx-r863-a3205.i386.tar.gz&quot; style=&quot;color: #008ebe; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;AVG Server Edition for Linux&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;(avg85flx-r863-a3205.i386.tar.gz)&lt;/a&gt;&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;8.5.0863&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;tar.gz&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: #ebebeb; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;88 MB&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot; width=&quot;310px&quot;&gt;&lt;a class=&quot;clr&quot; href=&quot;http://download.avgfree.com/filedir/inst/avg85ffb-r863-a3205.i386.tar.gz&quot; style=&quot;color: #008ebe; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;AVG Server Edition for FreeBSD&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;(avg85ffb-r863-a3205.i386.tar.gz)&lt;/a&gt;&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;8.5.0863&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;tar.gz&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;&lt;/td&gt;&lt;td class=&quot;norm&quot; style=&quot;background-color: white; border-right-color: white; border-right-style: solid; border-right-width: 1px; color: #232323; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 7px; padding-left: 7px; padding-right: 7px; padding-top: 7px;&quot;&gt;89 MB&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;tfoot style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/tfoot&gt;&lt;/table&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/1826501197128295534/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/1826501197128295534?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1826501197128295534'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/1826501197128295534'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/avg-anti-virus-free-edition-for-linux.html' title='AVG Anti-Virus Free Edition for Linux'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXhKqjLMkrkoBsIeFP4lxPzFbge6BvORansze_hKEiozE5mtnJBPY5aE53K5M98JmSI0XUQlMRQAdGZOAI6xJN_IZ7-ULMMZDX80zMPq-D0VaJr3P9kqPoT00eLEAE3Aet9bIkgkZbPG0/s72-c/AVG_Antivirus_Icon_by_Philosoraptus.png" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-697998470628931835</id><published>2011-02-04T16:21:00.002+03:00</published><updated>2011-02-04T16:28:10.904+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ESET and AVG"/><title type='text'>AVG LINKSCANNER® FOR MAC</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;h1 class=&quot;avg11-boxes-title-05&quot; dir=&quot;ltr&quot; style=&quot;color: #737373; display: block; font-family: Verdana; font-size: 18px; font-weight: normal; line-height: 1.3em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0.5em; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; text-transform: uppercase;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIyx44chyphenhyphen1a7w9zHVY6RN6i5sICkPknttdFIBy3nVw9i0RquTNTzeqMag8QqQmpqXnOpPcjSlp1avug8C5X3A7KzsxPQx4xYRwiSqdDhHo2uc3Y9YtzGjTw_Lw1ScgTo74hURfNWSZ7k4/s1600/AVG_Antivirus_Icon_by_Philosoraptus.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIyx44chyphenhyphen1a7w9zHVY6RN6i5sICkPknttdFIBy3nVw9i0RquTNTzeqMag8QqQmpqXnOpPcjSlp1avug8C5X3A7KzsxPQx4xYRwiSqdDhHo2uc3Y9YtzGjTw_Lw1ScgTo74hURfNWSZ7k4/s200/AVG_Antivirus_Icon_by_Philosoraptus.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;a href=&quot;http://linkscanner.avg.com/Mac/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: none; background-origin: initial; color: #737373; display: block; font-size: 18px; font-weight: normal; line-height: 1.3em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; text-transform: uppercase;&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;a href=&quot;http://linkscanner.avg.com/Mac/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: none; background-origin: initial; color: #737373; display: block; font-size: 18px; font-weight: normal; line-height: 1.3em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; text-decoration: none; text-transform: uppercase;&quot; target=&quot;_blank&quot;&gt;AVG LINKSCANNER® FOR MAC&lt;/a&gt;&lt;/h1&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;strong class=&quot;avg11-boxes-subtitle-01&quot; style=&quot;color: #1f3c69; display: block; font-family: Verdana; font-size: 12px; font-weight: bold; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 13px; padding-left: 10px; padding-right: 10px; padding-top: 0px; text-align: left;&quot;&gt;Web protection for your Mac&lt;/strong&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;font-family: Verdana; font-size: 11px; line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;Online criminals are getting smarter, but we&#39;re one step ahead of them. Now you can surf, search, email, shop, and social network knowing that the pages you visit are safe. AVG LinkScanner® checks each web page in real time before it opens on your Mac. If it sees trouble ahead, it stops you. It&#39;s easy to use, won&#39;t get in your way and it&#39;s FREE.&lt;/div&gt;&lt;div class=&quot;avg11-box-btns-01&quot; dir=&quot;ltr&quot; style=&quot;font-family: Verdana; font-size: 11px; line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;a class=&quot;btn-11&quot; href=&quot;http://free.avg.com/ww-en/download-file-stb-lmf&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://free.avg.com/stc/tpl/crp/img/11-btn-sprite.png); background-origin: initial; background-position: 100% -162px; background-repeat: no-repeat no-repeat; color: white; cursor: pointer; display: inline-block; font-weight: bold; font: normal normal bold 12px/normal Verdana, sans-serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 2px; padding-top: 0px; text-align: center; text-decoration: none; text-transform: uppercase;&quot;&gt;&lt;strong class=&quot;width-105&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://free.avg.com/stc/tpl/crp/img/11-btn-sprite.png); background-origin: initial; background-position: 0% -135px; background-repeat: no-repeat no-repeat; color: white; display: inline; float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 6px; margin-top: 0px; padding-bottom: 5px; padding-left: 20px; padding-right: 10px; padding-top: 3px; text-align: left; width: 105px !important;&quot;&gt;DOWNLOAD&lt;/strong&gt;&lt;/a&gt;&lt;a class=&quot;btn-12&quot; href=&quot;http://linkscanner.avg.com/Mac/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://free.avg.com/stc/tpl/crp/img/11-btn-sprite.png); background-origin: initial; background-position: 100% -216px; background-repeat: no-repeat no-repeat; color: white; cursor: pointer; display: inline-block; font-weight: bold; font: normal normal bold 12px/normal Verdana, sans-serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 2px; padding-top: 0px; text-align: center; text-decoration: none; text-transform: uppercase;&quot; target=&quot;_blank&quot;&gt;&lt;strong class=&quot;width-115&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://free.avg.com/stc/tpl/crp/img/11-btn-sprite.png); background-origin: initial; background-position: 0% -189px; background-repeat: no-repeat no-repeat; color: white; display: inline; float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 6px; margin-top: 0px; padding-bottom: 5px; padding-left: 20px; padding-right: 10px; padding-top: 3px; text-align: left; width: 115px !important;&quot;&gt;FIND OUT MORE&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;font-size: 11px; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/697998470628931835/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/697998470628931835?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/697998470628931835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/697998470628931835'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/avg-linkscanner-for-mac.html' title='AVG LINKSCANNER® FOR MAC'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIyx44chyphenhyphen1a7w9zHVY6RN6i5sICkPknttdFIBy3nVw9i0RquTNTzeqMag8QqQmpqXnOpPcjSlp1avug8C5X3A7KzsxPQx4xYRwiSqdDhHo2uc3Y9YtzGjTw_Lw1ScgTo74hURfNWSZ7k4/s72-c/AVG_Antivirus_Icon_by_Philosoraptus.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-4546966484873665284</id><published>2011-02-04T16:00:00.004+03:00</published><updated>2011-02-04T16:30:49.682+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ESET and AVG"/><title type='text'>AVG LINKSCANNER® FOR PC</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;strong class=&quot;avg11-boxes-subtitle-01&quot; style=&quot;color: #1f3c69; display: block; font-family: Verdana; font-size: 12px; font-weight: bold; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 13px; padding-left: 10px; padding-right: 10px; padding-top: 0px; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #737373; font-family: ff-din-web-pro-1, ff-din-web-pro-2, Verdana, Arial, Helvetica, sans-serif; font-size: 18px; font-weight: normal; line-height: 23px; text-transform: uppercase;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;strong class=&quot;avg11-boxes-subtitle-01&quot; style=&quot;color: #1f3c69; display: block; font-family: Verdana; font-size: 12px; font-weight: bold; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 13px; padding-left: 10px; padding-right: 10px; padding-top: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggsWbjr-4TcgJzw-ZoQBsPQu-20upRk2dJaTp7r0q14sS8jibLhbXiuVvobP5c3VdglRwOawavU4LaLvHWbp7q1vmYqQzIoR36PWBHTXRE6fxp686tgQcmQbArnXWGBYhqO4W_3cx5U70/s1600/AVG_Antivirus_Icon_by_Philosoraptus.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggsWbjr-4TcgJzw-ZoQBsPQu-20upRk2dJaTp7r0q14sS8jibLhbXiuVvobP5c3VdglRwOawavU4LaLvHWbp7q1vmYqQzIoR36PWBHTXRE6fxp686tgQcmQbArnXWGBYhqO4W_3cx5U70/s200/AVG_Antivirus_Icon_by_Philosoraptus.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;strong class=&quot;avg11-boxes-subtitle-01&quot; style=&quot;color: #1f3c69; display: block; font-family: Verdana; font-size: 12px; font-weight: bold; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 13px; padding-left: 10px; padding-right: 10px; padding-top: 0px; text-align: left;&quot;&gt;&lt;a href=&quot;http://linkscanner.avg.com/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: none; background-origin: initial; background-position: initial initial; background-repeat: initial initial; color: #737373; display: block; font-size: 18px; font-weight: normal; line-height: 1.3em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; text-transform: uppercase;&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;a href=&quot;http://linkscanner.avg.com/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: none; background-origin: initial; background-position: initial initial; background-repeat: initial initial; color: #737373; display: block; font-size: 18px; font-weight: normal; line-height: 1.3em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; text-transform: uppercase;&quot; target=&quot;_blank&quot;&gt;AVG LINKSCANNER® FOR PC&lt;/a&gt;&lt;/strong&gt;&lt;strong class=&quot;avg11-boxes-subtitle-01&quot; style=&quot;color: #1f3c69; display: block; font-family: Verdana; font-size: 12px; font-weight: bold; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 13px; padding-left: 10px; padding-right: 10px; padding-top: 0px; text-align: left;&quot;&gt;Extra web protection, no matter what antivirus software you use&lt;/strong&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Verdana; font-size: 11px; line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;LinkScanner® keeps you safe wherever you go online by actively checking links and web pages in real time the only time it matters - before you click that link. LinkScanner® also places safety ratings next to your search results, allowing you to assess the safety of a site before visiting it.&lt;/div&gt;&lt;div class=&quot;avg11-box-btns-01&quot; style=&quot;font-family: Verdana; font-size: 11px; line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;a class=&quot;btn-11&quot; href=&quot;http://free.avg.com/ww-en/download-file-dm-smf&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://free.avg.com/stc/tpl/crp/img/11-btn-sprite.png); background-origin: initial; background-position: 100% -162px; background-repeat: no-repeat no-repeat; color: white; cursor: pointer; display: inline-block; font-weight: bold; font: normal normal bold 12px/normal Verdana, sans-serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 2px; padding-top: 0px; text-align: center; text-decoration: none; text-transform: uppercase;&quot;&gt;&lt;strong class=&quot;width-105&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://free.avg.com/stc/tpl/crp/img/11-btn-sprite.png); background-origin: initial; background-position: 0% -135px; background-repeat: no-repeat no-repeat; color: white; display: inline; float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 6px; margin-top: 0px; padding-bottom: 5px; padding-left: 20px; padding-right: 10px; padding-top: 3px; text-align: left; width: 105px !important;&quot;&gt;DOWNLOAD&lt;/strong&gt;&lt;/a&gt;&lt;a class=&quot;btn-12&quot; href=&quot;http://linkscanner.avg.com/&quot; rel=&quot;nofollow&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://free.avg.com/stc/tpl/crp/img/11-btn-sprite.png); background-origin: initial; background-position: 100% -216px; background-repeat: no-repeat no-repeat; color: white; cursor: pointer; display: inline-block; font-weight: bold; font: normal normal bold 12px/normal Verdana, sans-serif; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 2px; padding-top: 0px; text-align: center; text-decoration: none; text-transform: uppercase;&quot; target=&quot;_blank&quot;&gt;&lt;strong class=&quot;width-115&quot; style=&quot;background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://free.avg.com/stc/tpl/crp/img/11-btn-sprite.png); background-origin: initial; background-position: 0% -189px; background-repeat: no-repeat no-repeat; color: white; display: inline; float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 6px; margin-top: 0px; padding-bottom: 5px; padding-left: 20px; padding-right: 10px; padding-top: 3px; text-align: left; width: 115px !important;&quot;&gt;FIND OUT MORE&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana; font-size: 11px; line-height: 15px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 11px; line-height: 15px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/4546966484873665284/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/4546966484873665284?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/4546966484873665284'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/4546966484873665284'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/avg-linkscanner-for-pc.html' title='AVG LINKSCANNER® FOR PC'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEggsWbjr-4TcgJzw-ZoQBsPQu-20upRk2dJaTp7r0q14sS8jibLhbXiuVvobP5c3VdglRwOawavU4LaLvHWbp7q1vmYqQzIoR36PWBHTXRE6fxp686tgQcmQbArnXWGBYhqO4W_3cx5U70/s72-c/AVG_Antivirus_Icon_by_Philosoraptus.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-7808735865928432110</id><published>2011-02-04T15:36:00.002+03:00</published><updated>2011-02-04T16:34:26.410+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ESET and AVG"/><title type='text'>AVG Anti-Virus Free Edition 2011</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;&quot; dir=&quot;ltr&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana; font-size: 11px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVMk2T2emOPATMeJupsi6A6VNQabAa5D7XFumKDKRTstrYoKu_dmB60Ty7wWV74mlck2CLSTiYrkm7KIVpB2jqNjBVwMz5G80u4w9IpGkpWyWfhoIc_xtf09U1M6sL82GYeFXfFb1xjXM/s1600/avg-antivirus-2011-cover.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVMk2T2emOPATMeJupsi6A6VNQabAa5D7XFumKDKRTstrYoKu_dmB60Ty7wWV74mlck2CLSTiYrkm7KIVpB2jqNjBVwMz5G80u4w9IpGkpWyWfhoIc_xtf09U1M6sL82GYeFXfFb1xjXM/s200/avg-antivirus-2011-cover.jpg&quot; width=&quot;191&quot; /&gt;&lt;/a&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/strong&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana; font-size: 11px; line-height: 15px;&quot;&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;&quot; dir=&quot;ltr&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana; font-size: 11px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 16px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal; line-height: 15px;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;b&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Basic protection for surfing, searching and social networking&lt;/strong&gt;&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;b&gt;Millions of people around the world use AVG Anti-Virus Free for their basic online activities. Whether it&#39;s surfing the Internet, conducting web searches, or simply keeping up with friends on Facebook, AVG Anti-Virus Free has got you covered.&lt;/b&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 1.5em; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;b&gt;AVG Anti-Virus Free Edition 2011 allows you to:&lt;/b&gt;&lt;/div&gt;&lt;ul dir=&quot;ltr&quot; style=&quot;margin-bottom: 10px; margin-left: 10px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 27px;&quot;&gt;&lt;b&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;Surf and search with confidence&amp;nbsp;&lt;/strong&gt;AVG LinkScanner&#39;s® real-time protection .&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 27px;&quot;&gt;&lt;b&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;Stay protected on social networks&amp;nbsp;&lt;/strong&gt;with AVG Social Networking Protection.&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 27px;&quot;&gt;&lt;b&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&amp;nbsp;Enjoy a faster running PC&amp;nbsp;&lt;/strong&gt;AVG Smart Scanning works while you&#39;re away and runs in low-priority mode when you return .&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ul dir=&quot;ltr&quot; style=&quot;margin-bottom: 10px; margin-left: 10px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;/ul&gt;&lt;ul dir=&quot;ltr&quot; style=&quot;margin-bottom: 10px; margin-left: 10px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;/ul&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 27px;&quot;&gt;&lt;b&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Stay up-to-date&amp;nbsp;&lt;/strong&gt;with the latest threat information from the AVG Community Protection Network and AVG Protective Cloud Technology&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 27px;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 27px;&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue; font-size: large;&quot;&gt;&lt;a href=&quot;http://free.avg.com/us-en/download-file-dm-afh&quot;&gt;Download&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul dir=&quot;ltr&quot; style=&quot;margin-bottom: 10px; margin-left: 10px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;/ul&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;b&gt;&lt;span style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/7808735865928432110/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/7808735865928432110?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/7808735865928432110'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/7808735865928432110'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/avg-anti-virus-free-edition-2011.html' title='AVG Anti-Virus Free Edition 2011'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVMk2T2emOPATMeJupsi6A6VNQabAa5D7XFumKDKRTstrYoKu_dmB60Ty7wWV74mlck2CLSTiYrkm7KIVpB2jqNjBVwMz5G80u4w9IpGkpWyWfhoIc_xtf09U1M6sL82GYeFXfFb1xjXM/s72-c/avg-antivirus-2011-cover.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-2596534017697511490</id><published>2011-02-03T19:39:00.003+03:00</published><updated>2011-02-04T13:32:29.292+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Avira and Avast"/><title type='text'>Avest ! free antivirus</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFebGLZonjTNvF-odB8rRzHf1DW5D6BQH2QeNPDa0oLL7CE5wfvq39mhEKJBPTY7s75KtV6lhhILXWGKD66cYuh9DZvM1-VuHVJHuKCCU6OMvdSLx5NP7jbfaiK4FSJGi0Pe3xnz5nO7I/s1600/logoeq.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;190&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFebGLZonjTNvF-odB8rRzHf1DW5D6BQH2QeNPDa0oLL7CE5wfvq39mhEKJBPTY7s75KtV6lhhILXWGKD66cYuh9DZvM1-VuHVJHuKCCU6OMvdSLx5NP7jbfaiK4FSJGi0Pe3xnz5nO7I/s200/logoeq.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3c4044; font-family: Verdana, sans-serif; font-size: x-small; line-height: 18px;&quot;&gt;&lt;b&gt;Our avast! Free Antivirus often outperforms our competitors´ paid products and is the minimum protection you should have — it provides great protection against viruses and spyware. But for best protection against the latest and constantly changing internet threats,&amp;nbsp;&lt;a href=&quot;http://www.avast.com/internet-security&quot; style=&quot;color: #454d5a; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; outline-color: initial; outline-style: none; outline-width: initial; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot; title=&quot;Upgrade to avast! Internet Security&quot;&gt;upgrade to avast! Internet Security&lt;/a&gt;.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3c4044; font-family: Verdana, sans-serif; font-size: 12px; line-height: 18px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: center;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; line-height: 18px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: blue;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://dw.com.com/redir?edId=3&amp;amp;siteId=4&amp;amp;oId=3000-2239_4-10019223&amp;amp;ontId=2239_4&amp;amp;spi=6c4852d2837d6d1d44cd198ec0850d3f&amp;amp;lop=link&amp;amp;tag=tdw_dltext&amp;amp;ltype=dl_dlnow&amp;amp;pid=11678243&amp;amp;mfgId=85737&amp;amp;merId=85737&amp;amp;pguid=Y2RAkQoOYJQAAFK1wIUAAABS&amp;amp;destUrl=http%3A%2F%2Fdownload.cnet.com%2F3001-2239_4-10019223.html%3Fspi%3D6c4852d2837d6d1d44cd198ec0850d3f%26part%3Ddl-85737&quot;&gt;Download&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/2596534017697511490/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/2596534017697511490?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/2596534017697511490'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/2596534017697511490'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/avest-free-antivirus.html' title='Avest ! free antivirus'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFebGLZonjTNvF-odB8rRzHf1DW5D6BQH2QeNPDa0oLL7CE5wfvq39mhEKJBPTY7s75KtV6lhhILXWGKD66cYuh9DZvM1-VuHVJHuKCCU6OMvdSLx5NP7jbfaiK4FSJGi0Pe3xnz5nO7I/s72-c/logoeq.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-8524684725100197613</id><published>2011-02-03T16:00:00.005+03:00</published><updated>2011-02-04T15:40:51.450+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ESET and AVG"/><title type='text'>ESET SysInspector</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;height: 32px; line-height: 32px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXBfT5SpcvgSvg2Bw7VIR1Uwl7ToieEk_WnI-C06Buf58KSr8JDghr_tnT8C3vcuxDDyoht0U2sjhjm5bSQXf0QXzcI3K3g0Nn-JleSJBDL7Lo_t7wwdMX8QQGmBkv0io5Zhyczw5xftA/s1600/ESET.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;132&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXBfT5SpcvgSvg2Bw7VIR1Uwl7ToieEk_WnI-C06Buf58KSr8JDghr_tnT8C3vcuxDDyoht0U2sjhjm5bSQXf0QXzcI3K3g0Nn-JleSJBDL7Lo_t7wwdMX8QQGmBkv0io5Zhyczw5xftA/s200/ESET.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2 style=&quot;color: #006b6e; font-size: 16px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 17px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 12px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;ESET SysInspector® is a free, state of the art diagnostic tool for Windows systems. It is also an integral part of ESET Smart Security 4 and ESET NOD32 Antivirus 4. It peers into your operating system and captures details such as running processes, registry content, startup items and network connections. Once a snapshot of the system is made, ESET SysInspector applies heuristics to assign a risk level for each object logged. Its intuitive graphical user interface enables the user to easily slice through the large volume of data using a slider to select objects of a particular color coded risk level for closer examination. ESET SysInspector is a convenient utility for the tool box of every IT expert and first responder.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 17px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 12px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;color: #006b6e; font-size: 16px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;Key Benefits&lt;/h2&gt;&lt;ul dir=&quot;ltr&quot; style=&quot;list-style-image: initial; list-style-position: initial; list-style-type: square; margin-bottom: 15px; margin-left: 25px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Ability to generate and save a detailed log to be used by an IT expert or uploaded to an online forum for diagnosis&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Option to exclude private, personal information from being saved in logs&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Integrated Anti-Stealth technology allows discovering hidden objects (e.g. rootkits) in MBR, registry entries, drivers, services and processes&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Ability to compare two existing logs for differences makes it easy to detect changes over time&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Log entries are assigned a color code risk level for easy filtering&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Intuitive hierarchical navigation of logs&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Fast and compact single file executable, ideal for first responders to run from a USB drive without lengthy installation&lt;/li&gt;
&lt;/ul&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;color: #006b6e; font-size: 16px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;Download&lt;/h2&gt;&lt;div class=&quot;download_block&quot; dir=&quot;ltr&quot; style=&quot;line-height: 18px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; overflow-x: hidden; overflow-y: hidden; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left; width: 400px;&quot;&gt;&lt;div class=&quot;download_block_section&quot; style=&quot;border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;&quot;&gt;&lt;div class=&quot;download_block_info&quot; style=&quot;float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; width: 310px;&quot;&gt;&lt;h4 style=&quot;color: #006366; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;ESET&amp;nbsp;&lt;span class=&quot;sys_title&quot; style=&quot;color: #96c5d8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;SysInspector&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;gray_title_small&quot; style=&quot;color: #888888; font-size: 11px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;(32-bit)&lt;/span&gt;&lt;/h4&gt;&lt;h5 style=&quot;color: #666666; font-size: 11px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Microsoft® Windows® 7/Vista/XP/2008 R2/2008/2003 R2/2003/2000&lt;/h5&gt;&lt;h6 style=&quot;color: #666666; font-size: 11px; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Version: 1.2.026, File size: 2.55 MB,&amp;nbsp;&lt;a href=&quot;http://www.eset.com/joomla/index.php?option=com_content&amp;amp;task=view&amp;amp;id=5358&amp;amp;Itemid=5&quot; style=&quot;color: #006699; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot;&gt;Changelog&lt;/a&gt;&lt;/h6&gt;&lt;/div&gt;&lt;div class=&quot;download_block_download&quot; style=&quot;float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; width: 90px;&quot;&gt;&lt;a href=&quot;http://download.eset.com/download/sysinspector/32/ENU/SysInspector.exe&quot; style=&quot;background-attachment: scroll; background-clip: initial; background-color: transparent; background-image: url(http://www.eset.com/images/standard/download_button.png); background-origin: initial; background-position: 0px 0px; background-repeat: no-repeat no-repeat; color: #006699; display: block; float: left; height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; text-indent: -1000px; width: 90px;&quot;&gt;Download&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;download_block_section&quot; style=&quot;border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;&quot;&gt;&lt;div class=&quot;download_block_info&quot; style=&quot;float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; width: 310px;&quot;&gt;&lt;h4 style=&quot;color: #006366; font-size: 12px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;ESET&amp;nbsp;&lt;span class=&quot;sys_title&quot; style=&quot;color: #96c5d8; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;SysInspector&lt;/span&gt;&amp;nbsp;&lt;span class=&quot;gray_title_small&quot; style=&quot;color: #888888; font-size: 11px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;(64-bit)&lt;/span&gt;&lt;span class=&quot;red&quot; style=&quot;color: red; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;**&lt;/span&gt;&lt;/h4&gt;&lt;h5 style=&quot;color: #666666; font-size: 11px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Microsoft® Windows® 7/Vista/XP/2008 R2/2008/2003 R2/2003&lt;/h5&gt;&lt;h6 style=&quot;color: #666666; font-size: 11px; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Version: 1.2.026, File size: 3.23 MB,&amp;nbsp;&lt;a href=&quot;http://www.eset.com/joomla/index.php?option=com_content&amp;amp;task=view&amp;amp;id=5358&amp;amp;Itemid=5&quot; style=&quot;color: #006699; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot;&gt;Changelog&lt;/a&gt;&lt;/h6&gt;&lt;/div&gt;&lt;div class=&quot;download_block_download&quot; style=&quot;float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; width: 90px;&quot;&gt;&lt;a href=&quot;http://download.eset.com/download/sysinspector/64/ENU/SysInspector.exe&quot; style=&quot;background-attachment: scroll; background-clip: initial; background-color: transparent; background-image: url(http://www.eset.com/images/standard/download_button.png); background-origin: initial; background-position: 0px 0px; background-repeat: no-repeat no-repeat; color: #006699; display: block; float: left; height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 15px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none; text-indent: -1000px; width: 90px;&quot;&gt;Download&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;download_block_section&quot; style=&quot;border-bottom-color: rgb(238, 238, 238); border-bottom-style: solid; border-bottom-width: 1px; float: left; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 10px; padding-left: 0px; padding-right: 0px; padding-top: 10px;&quot;&gt;&lt;div class=&quot;download_block_disclaimer&quot; style=&quot;line-height: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;h5 style=&quot;color: #666666; font-size: 11px; font-weight: normal; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;/h5&gt;&lt;h4 style=&quot;color: #cc0000; font-size: 11px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;** Note for 64-bit users:&lt;/h4&gt;64-bit Windows Operating System is required for these installations. Typically these are found in servers and high-end workstations with high processing power. Be sure to&amp;nbsp;&lt;a href=&quot;http://kb.eset.com/esetkb/index?page=content&amp;amp;id=SOLN523&quot; style=&quot;color: #006699; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;&quot;&gt;check your operating system&lt;/a&gt;&amp;nbsp;carefully before downloading the 64-bit version.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/8524684725100197613/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/8524684725100197613?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/8524684725100197613'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/8524684725100197613'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/free-antivirus-utilities.html' title='ESET SysInspector'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXBfT5SpcvgSvg2Bw7VIR1Uwl7ToieEk_WnI-C06Buf58KSr8JDghr_tnT8C3vcuxDDyoht0U2sjhjm5bSQXf0QXzcI3K3g0Nn-JleSJBDL7Lo_t7wwdMX8QQGmBkv0io5Zhyczw5xftA/s72-c/ESET.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3401588452896501519.post-5971241907797302526</id><published>2011-02-03T14:41:00.007+03:00</published><updated>2011-02-04T15:41:24.579+03:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ESET and AVG"/><title type='text'>Free Antivirus Utilities</title><content type='html'>&lt;div dir=&quot;rtl&quot; style=&quot;text-align: right;&quot; trbidi=&quot;on&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;div style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIFCm4SgOODPg68oWAtT37lu1mU31e3cFxUrVZEaQupxh-bnjejTo50QVRjq5KmpMLSDHN_NW7Glhx8IgdoLN0SiI0Gt7I-im4Vo71gZkeSAqNM-Q1xjWTgIUOLj045vrqqvKM6USMR64/s1600/Eset-Logo.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;135&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIFCm4SgOODPg68oWAtT37lu1mU31e3cFxUrVZEaQupxh-bnjejTo50QVRjq5KmpMLSDHN_NW7Glhx8IgdoLN0SiI0Gt7I-im4Vo71gZkeSAqNM-Q1xjWTgIUOLj045vrqqvKM6USMR64/s200/Eset-Logo.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;ESET Online Scanner&quot; src=&quot;http://www.eset.com/images/online_scanner_banner.jpg&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Arial, Helvetica, sans-serif; font-size: 12px;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;h2 dir=&quot;ltr&quot; style=&quot;font-size: 16px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #006b6e;&quot;&gt;ESET&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;eos_color&quot; style=&quot;color: #38761d; font-size: 16px; font-weight: bold; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Online Scanner&lt;/span&gt;&lt;/h2&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 17px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 12px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;ESET Online Scanner is a user friendly, free and powerful tool which you can use to remove malware from any PC utilizing only your web browser without having to install anti-virus software. ESET Online Scanner uses the same ThreatSense® technology and signatures as ESET Smart Security/ESET NOD32 Antivirus, and is always up-to-date.&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;line-height: 17px; margin-bottom: 12px; margin-left: 0px; margin-right: 0px; margin-top: 12px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul dir=&quot;ltr&quot; style=&quot;list-style-image: initial; list-style-position: initial; list-style-type: none; margin-bottom: 15px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: left;&quot;&gt;&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Fast and Easy-to-Use:&lt;/strong&gt;&amp;nbsp;The scanner is installed and activated by a single click.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Always Up-to-Date:&lt;/strong&gt;&amp;nbsp;Uses the most current threat signatures and heuristic detection algorithms available from ESET&#39;s Threat Lab.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Comprehensive Malware Detection:&lt;/strong&gt;&amp;nbsp;Detects both known and unknown forms of malware, such as viruses, worms, Trojans, phishing and spyware.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Deep Scans:&lt;/strong&gt;&amp;nbsp;Scans inside archive files and runtime packed executables.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Cleaning:&lt;/strong&gt;&amp;nbsp;Cleans systems that became infected while running other security programs and allows easy troubleshooting and repair of many malware-related problems.&lt;/li&gt;
&lt;li style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 5px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;Privacy:&lt;/strong&gt;&amp;nbsp;The Online Scanner can be used anonymously. Contact information is not required to use the free service.&lt;/li&gt;
&lt;/ul&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #666666; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 17px;&quot;&gt;&lt;strong style=&quot;margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot;&gt;IMPORTANT:&lt;/strong&gt;&amp;nbsp;Administrator privileges are required to run ESET Online Scanner&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;a href=&quot;http://www.eset.com/online-scanner#&quot;&gt;&lt;img alt=&quot;ESET Online Scanner&quot; src=&quot;http://www.eset.com/images/online_scanner_button.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://micro-security.blogspot.com/feeds/5971241907797302526/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3401588452896501519/5971241907797302526?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/5971241907797302526'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3401588452896501519/posts/default/5971241907797302526'/><link rel='alternate' type='text/html' href='http://micro-security.blogspot.com/2011/02/eset-online-scanner.html' title='Free Antivirus Utilities'/><author><name>Microsecurity</name><uri>http://www.blogger.com/profile/11274740356691952456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIFCm4SgOODPg68oWAtT37lu1mU31e3cFxUrVZEaQupxh-bnjejTo50QVRjq5KmpMLSDHN_NW7Glhx8IgdoLN0SiI0Gt7I-im4Vo71gZkeSAqNM-Q1xjWTgIUOLj045vrqqvKM6USMR64/s72-c/Eset-Logo.png" height="72" width="72"/><thr:total>0</thr:total></entry></feed>