<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2778125637743201552</id><updated>2025-07-27T06:57:37.268+05:30</updated><category term="Hacking news"/><category term="Windows Tips n Tricks"/><category term="Internet"/><category term="Facebook scams"/><category term="Security speak"/><category term="PC Tools"/><category term="Windows tweaks"/><category term="Corporate catch"/><category term="Mobile Downloads"/><category term="Just4fun"/><category term="Zero-day vulnerabilities"/><category term="Android"/><category term="Mobile menace"/><category term="Give-Away"/><category term="Cloud Security"/><category term="SCADA Security"/><title type='text'>PC SNEAKERS</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>479</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-8285421889117122862</id><published>2012-10-23T22:18:00.001+05:30</published><updated>2012-10-23T22:31:22.882+05:30</updated><title type='text'>MyWall-Your own little firewall</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;i&gt;A simple, small yet useful utility&amp;nbsp;&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;i&gt;to save your time from unwanted websites.&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;All of us have one or the other important tasks to complete in the next couple of hours&lt;i&gt;,&lt;/i&gt; but most of us usually waste most of our time socializing or hovering here and there over the internet and hence cannot focus on our work because of the turmoils coming from websites like facebook, twitter, youtube, etc.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;It would be unfair to crown these sites as time-wasting, however because of the continuous updates, its actually very late when we realize that we have wasted a lot of time... atleast happens with me... :-P&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;Wondering, we had something that would disable these temporarily without much overhead....?&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;&quot;&gt;&lt;b&gt;MyWall-Your own little firewall will help you toggle these (if you wish) in just a click &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;Did i forget to tell... You can also use this as a firewall to block as many sites you wish.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;Useful in schools, small offices, even for your kids&lt;/span&gt;&lt;i&gt;..&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;b&gt;MyWall &lt;/b&gt;is a simple script written by me that will just in a click do&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;all the overhead required to block and unblock websites in the&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;back-end, which is usually a complex task to do. &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;I made this coz I&#39;m lazy moving to antivirus firewall or the hosts file to&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;block/unblock things... &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;You can &lt;a href=&quot;https://www.box.com/s/3x4osx4h286cfo7cnrnt&quot; target=&quot;_blank&quot;&gt;Download MyWall from here.&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;All you have to do is extract the zip to a place.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Just a click will block the unwanted websites&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;and clicking it again will unblock them.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;PS: You may see a User Access Control warning dialog in Windows Vista or 7 – just say yes. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Don&#39;t worry its not a virus...! Its a home-made script... ;) &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Also, if the script doesn&#39;t execute, whitelist it in your antivirus.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;My Kaspersky blocks it...I whitelisted it and it works fine..!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Ya, you must be wondering which sites and how would it block...? &#39;eh&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Yes..! The list is editable.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Just open the MyWall.vbs file (which you would get after extracting) in a text editor.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Notepad as usual. However I recommend &lt;a href=&quot;http://download.tuxfamily.org/notepadplus/6.2/npp.6.2.Installer.exe&quot; target=&quot;_blank&quot;&gt;Notepad++&lt;/a&gt; as it would make things more clear.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Now edit &lt;b&gt;WebsitesToBlock &lt;/b&gt;section (its in the beginning of the script)&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;to include/remove any/other website(s) in the banned list.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;My predefined list &lt;span style=&quot;font-size: x-small;&quot;&gt;whic&lt;span style=&quot;font-size: x-small;&quot;&gt;h you&#39;ll already see in the script &lt;/span&gt;&lt;/span&gt;is:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;&quot;&gt;WebsitesToBlock=Array(&quot;twitter.com&quot;, &quot;www.youtube.com&quot;, &quot;facebook.com&quot;)&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/blockquote&gt;
&lt;pre&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Simple &#39;eh... :)&lt;/span&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;span style=&quot;font-family: Georgia, &amp;quot;Times New Roman&amp;quot;, serif;&quot;&gt;Cheers :)&amp;nbsp;&lt;/span&gt; &lt;/pre&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/8285421889117122862/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/10/mywall-your-own-little-firewall.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8285421889117122862'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8285421889117122862'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/10/mywall-your-own-little-firewall.html' title='MyWall-Your own little firewall'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-1008698235255521163</id><published>2012-08-25T00:55:00.001+05:30</published><updated>2012-08-25T00:55:23.909+05:30</updated><title type='text'>Fork Bombs... Destructive Simplicity</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;h6 class=&quot;uiStreamMessage&quot; data-ft=&quot;{&amp;quot;type&amp;quot;:1,&amp;quot;tn&amp;quot;:&amp;quot;K&amp;quot;}&quot;&gt;
&lt;span class=&quot;messageBody&quot; data-ft=&quot;{&amp;quot;type&amp;quot;:3}&quot;&gt;Have you heard of fork bombs...?&lt;br /&gt; If no try this...Experience yourself... ;)&lt;br /&gt; &lt;br /&gt; PS: Try this on a VM (Virtual Machine) not on the actual machine&lt;br /&gt; &lt;br /&gt;&lt;div class=&quot;text_exposed_show&quot;&gt;
 Copy this in a notepad file&lt;br /&gt; &lt;br /&gt; -----------copy--here---------&lt;wbr&gt;&lt;/wbr&gt;&lt;span class=&quot;word_break&quot;&gt;&lt;/span&gt;----&lt;br /&gt; :fork&lt;br /&gt; start %0&lt;br /&gt; %0|%0&lt;br /&gt; goto :fork&lt;br /&gt; -----------copy--here---------&lt;wbr&gt;&lt;/wbr&gt;&lt;span class=&quot;word_break&quot;&gt;&lt;/span&gt;----&lt;br /&gt; &lt;br /&gt; save as anything.bat&lt;br /&gt; Execute...!!&lt;br /&gt; Enjoy...! make ur custom bombs... ;)&lt;br /&gt; &lt;br /&gt; This is just to demonstrate how small codes can crash a system...&lt;br /&gt; Don&#39;t try it on host machines...&lt;br /&gt; &lt;br /&gt; For Linux (Fedora, Ubuntu, Redhat, CentOS)&lt;br /&gt; this small piece of code will do the trick...&lt;br /&gt; &lt;br /&gt; :(){ :|:&amp;amp; };:&lt;br /&gt; &lt;br /&gt; type the above characters in a shell or terminal and press enter...&lt;br /&gt; &lt;br /&gt; Don&#39;t Misuse....&lt;br /&gt; This is just for knowledge...&lt;/div&gt;
&lt;/span&gt;&lt;/h6&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/1008698235255521163/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/08/fork-bombs-destructive-simplicity.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/1008698235255521163'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/1008698235255521163'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/08/fork-bombs-destructive-simplicity.html' title='Fork Bombs... Destructive Simplicity'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-88825969323742525</id><published>2012-05-02T14:12:00.001+05:30</published><updated>2012-05-02T14:12:18.182+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cloud Security"/><title type='text'>Zeus Variant Targets Cloud-Based Payroll Service</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;content&quot;&gt;

    &lt;div style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; With critical business services migrating to the cloud, service 
providers have become a prime target for cybercriminals. In the latest 
example of financial malware targeting enterprises, we have discovered a
 Zeus attack that focuses on cloud payroll service providers. These 
attacks are designed to route funds to criminals, and bypass industrial 
strength security controls maintained by larger businesses.&lt;br /&gt;

&lt;br /&gt;
&lt;a href=&quot;http://www.trusteer.com/sites/default/files/Ceridian2.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Ceridian image-based authentication example&quot; border=&quot;0&quot; height=&quot;228&quot; src=&quot;http://www.trusteer.com/sites/default/files/Ceridian2.png&quot; width=&quot;308&quot; /&gt;&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The researchers have captured a Zeus configuration that targets 
Ceridian, a Canadian human resources and payroll solutions provider. In 
this attack, Zeus captures a screenshot of a Ceridian payroll services 
web page (&lt;a href=&quot;https://clients.powerpay.ca/powerpay/Logon*&quot; title=&quot;https://clients.powerpay.ca/powerpay/Logon*&quot;&gt;https://clients.powerpay.ca/powerpay/Logon*&lt;/a&gt;)
 when a corporate user whose machine is infected with the Trojan visits 
this website. This allows Zeus to steal the user id, password, company 
number and the icon selected by the user for the image-based 
authentication system.&lt;br /&gt;


&amp;nbsp; &lt;br /&gt;

&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The financial losses associated with this type of attack can be 
significant. In August of last year, Cyberthieves reportedly funneled 
$217,000 from the Metropolitan Entertainment &amp;amp; Convention Authority 
(MECA). According to published reports an employee at MECA was 
victimized by a phishing e-mail and infected with malware that stole 
access credentials to the organization’s payroll system. With valid credentials, the cyberthieves were able to add fictitious 
employees to the MECA payroll. These money mules, who were hired through
 work-at-home scams, then received payment transfers from MECA&#39;s bank 
account which they sent to the fraudsters.&lt;br /&gt;

&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We expect to see increased cybercriminal activity using this type of fraud scheme for the following reasons:&lt;br /&gt;

1) Targeting enterprise payroll systems enables attackers to 
siphon much larger amounts of money than by targeting individual 
consumers.&lt;br /&gt;

&lt;br /&gt;
2) By stealing the login credentials belonging to enterprise 
users of these payroll services, fraudsters have everything they need to
 route payments to money mules before raising any red flags. Using these
 valid credentials fraudsters can also access personal, corporate and 
financial data without the need to hack into systems, while leaving very
 little evidence that malicious access is occurring.&lt;br /&gt;

&lt;br /&gt;
3) By targeting a cloud service provider, the criminals are 
bypassing tight security mechanisms that are typically employed by 
medium to large enterprises. In a cloud service provider environment, 
the enterprise customers who use the service have no control over the 
vendor’s IT systems and thus little ability to protect their backend 
financial assets.&lt;br /&gt;

&lt;br /&gt;
4) Cloud services can be accessed using unmanaged devices that 
are typically less secure and more vulnerable to infection by financial 
malware (e.g. Zeus)&lt;br /&gt;

&lt;br /&gt;

&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.trusteer.com/sites/default/files/ceridian1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Malware Attack Steals Cloud Applications Credentials&quot; border=&quot;0&quot; height=&quot;231&quot; src=&quot;http://www.trusteer.com/sites/default/files/ceridian1.jpg&quot; width=&quot;341&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Unfortunately, traditional antivirus security mechanisms are largely 
unable to protect corporate users from becoming infected with Zeus. 
That’s because attacks like this one are surgical in nature and use 
targeted reconnaissance combined with signature detection evasion 
techniques to get a foothold inside corporate computers.&lt;br /&gt;

&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A better alternative for protecting sensitive cloud payroll, 
treasury, and other financial applications is to prevent malware from 
getting onto the endpoint in the first place. This requires a layered 
approach to security that looks for specific Crime Logic footprints, not
 signatures, to prevent malware on an infected machine from stealing 
login credentials.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; For example, Prevent malware from 
installing on a machine and secure communication between the computer 
and cloud service provider website to prevent common attack methods like
 HTML injection keylogging and screen capturing from grabbing data. Protect other web-based applications like 
VPNs, CRM, and collaboration systems that can be exploited by malware to
 steal user credentials and breach an enterprise’s security perimeter 
completely undetected.&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/88825969323742525/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/zeus-variant-targets-cloud-based.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/88825969323742525'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/88825969323742525'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/zeus-variant-targets-cloud-based.html' title='Zeus Variant Targets Cloud-Based Payroll Service'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-3731172279246199235</id><published>2012-05-02T13:59:00.000+05:30</published><updated>2012-05-02T13:59:09.266+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Corporate catch"/><title type='text'>Shocking Statistics From The Latest Internet Threat Report</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Anti malware company &lt;b&gt;Symantec&lt;/b&gt; released its threat report for 2011 on Monday. The statistics are as follows:-&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves/&gt;
  &lt;w:TrackFormatting/&gt;
  &lt;w:PunctuationKerning/&gt;
  &lt;w:ValidateAgainstSchemas/&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF/&gt;
  &lt;w:LidThemeOther&gt;EN-IN&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables/&gt;
   &lt;w:SnapToGridInCell/&gt;
   &lt;w:WrapTextWithPunct/&gt;
   &lt;w:UseAsianBreakRules/&gt;
   &lt;w:DontGrowAutofit/&gt;
   &lt;w:SplitPgBreakAndParaMark/&gt;
   &lt;w:EnableOpenTypeKerning/&gt;
   &lt;w:DontFlipMirrorIndents/&gt;
   &lt;w:OverrideTableStyleHps/&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;
   &lt;m:brkBin m:val=&quot;before&quot;/&gt;
   &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;
   &lt;m:smallFrac m:val=&quot;off&quot;/&gt;
   &lt;m:dispDef/&gt;
   &lt;m:lMargin m:val=&quot;0&quot;/&gt;
   &lt;m:rMargin m:val=&quot;0&quot;/&gt;
   &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;
   &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;
   &lt;m:intLim m:val=&quot;subSup&quot;/&gt;
   &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;267&quot;&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;
  &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin-top:0cm;
 mso-para-margin-right:0cm;
 mso-para-margin-bottom:10.0pt;
 mso-para-margin-left:0cm;
 line-height:115%;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;
 mso-fareast-language:EN-US;}
&lt;/style&gt;
&lt;![endif]--&gt;

&lt;br /&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;mso-list: l1 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;A.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Religious and ideological sites have triple the
average number of threats per infected sites that pornographic Web sites contain.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;text-indent: -18pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l1 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;B.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Top 10 categories of most infected Web sites:&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;1.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Blogs&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;2.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Web communications&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;3.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Religious websites&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;4.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Personally hosted sites&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;5.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Business sites&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;6.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Shopping education&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;7.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Automative themed sites&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;8.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Health and medicine sites&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90.0pt; mso-add-space: auto; mso-list: l0 level1 lfo2; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;9.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Porn sites&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;margin-left: 90pt; text-indent: -18pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l1 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;C.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;3/4 spam messages were pharma themed. ¼ spam
messages were Sex and dating-themed.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-indent: -18pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l1 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;D.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Spam volumes dropped by around 20 billion
messages year over year, to an average of 75% of all e-mail last year, compared
with 88.5% in 2010.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-indent: -18pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l1 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;E.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;U.S. was the top source of every category of
malicious activity.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-indent: -18pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l1 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;F.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;u&gt;&lt;i&gt;&lt;b&gt;
&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;u&gt;&lt;i&gt;&lt;b&gt;India leads in creation of malware and the use
of spam zombies&lt;/b&gt;&lt;/i&gt;&lt;/u&gt;. (I am proud of it.) ;-)&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-indent: -18pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;mso-list: l1 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;G.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Around 13% of bot activity originated in the
U.S. and around 34% of Web based attacks. Close to half of all phishing Web
sites were based in the U.S.&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;text-indent: -18pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;mso-list: l1 level1 lfo1; text-indent: -18.0pt;&quot;&gt;
&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;H.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;China saw a steep drop in malicious activity by
about 10%.&lt;span style=&quot;mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;text-indent: -18pt;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;text-indent: -18pt;&quot;&gt;
&lt;span&gt;&lt;span&gt;I.&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;Reports of vulnerabilities in industrial control
and SCADA systems rose from 15 in 2010 to 129 in 2011.&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/3731172279246199235/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/shocking-statistics-from-latest.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/3731172279246199235'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/3731172279246199235'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/shocking-statistics-from-latest.html' title='Shocking Statistics From The Latest Internet Threat Report'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-7663773875903560705</id><published>2012-05-02T13:32:00.000+05:30</published><updated>2012-05-02T13:32:18.885+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><category scheme="http://www.blogger.com/atom/ns#" term="Zero-day vulnerabilities"/><title type='text'>Skype IP address Vulnerability may not be so new</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim12468850443988373798&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div id=&quot;aim22468850443988373798&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC6eYEedYjaG46myrmLktjwGf6f28typsSeaijbTGBSeI6efLeT82O0uZeN1d1Dlb3aE_55ycSY6KifmhLBdxKeZS3NTM5iXOeRKXbb9UIXbAncriMiOhg-e225l1if-HvpELhLccHyqf8/s1600/Skype+Vulnerability+Exposing+User+IP+Addresses.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Skype+Vulnerability+Exposing+User+IP+Addresses&quot; border=&quot;0&quot; height=&quot;170&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC6eYEedYjaG46myrmLktjwGf6f28typsSeaijbTGBSeI6efLeT82O0uZeN1d1Dlb3aE_55ycSY6KifmhLBdxKeZS3NTM5iXOeRKXbb9UIXbAncriMiOhg-e225l1if-HvpELhLccHyqf8/s320/Skype+Vulnerability+Exposing+User+IP+Addresses.jpg&quot; title=&quot;Skype+Vulnerability+Exposing+User+IP+Addresses&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Skype is warning users 
following the launch of a site devoted to harvesting user IP 
addresses.The Skype IP-Finder site allowed third-parties to see a user&#39;s
 last known IP address by simply typing in a user name.&lt;/div&gt;
&lt;div id=&quot;aim22468850443988373798&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div id=&quot;aim22468850443988373798&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A script has been uploaded to 
Github that offers these options. According to the page, it can be used 
to lookup IP addresses of online Skype accounts, and return both the 
remote and the local IP of that account on a website.&lt;/div&gt;
&lt;div id=&quot;aim22468850443988373798&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The script is available&lt;a href=&quot;http://skype-ip-finder.tk/&quot; rel=&quot;follow&quot;&gt;&lt;/a&gt;. You need to just enter the user name of a Skype user, fill out the captcha, and 
click the search button to initiate the lookup. You will receive the 
user’s remote IP and port, as well as the local IP and port.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Adrian Asher, director of product Security, Skype&amp;nbsp;“&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;We
 are investigating reports of a new tool that captures a Skype user’s 
last known IP address. This is an ongoing, industry-wide issue faced by 
all peer-to-peer software companies. We are committed to the safety and 
security of our customers and we are takings measures to help protect 
them&lt;/span&gt;&lt;/i&gt;.” The proof of concept is fairly 
simple. All an attacker needs to do is download a special Skype variant 
and alter a few registry keys to enable debug-log file creation.When 
adding a Skype contact, before sending the actual request, the victim’s 
information card can be viewed. At this point, the log file records the 
user’s IP address.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The software, posted on Pastebin,
 works on a patched version of Skype 5.5 and involves adding a few 
registry keys that allow the attacker to check the IP address of users 
currently online. Services like Whois will then give some other details 
on the city, country, internet provider and/or the internal IP-address 
of the target.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This particular flaw was discussed in a &lt;a href=&quot;http://cis.poly.edu/%7Eross/papers/skypeIMC2011.pdf&quot; rel=&quot;follow&quot;&gt;paper&lt;/a&gt; presented by an international team of researchers in November at the Internet Measurement Conference 2011 in Berlin.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; There is currently no way of 
protecting yourself against the lookup of the IP address, other than not
 logging in to Skype when the software is not needed. The only other 
option would be the use of a virtual private network or proxy to hide 
the IP address from users who look it up.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/7663773875903560705/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/skype-ip-address-vulnerability-may-not.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/7663773875903560705'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/7663773875903560705'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/skype-ip-address-vulnerability-may-not.html' title='Skype IP address Vulnerability may not be so new'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC6eYEedYjaG46myrmLktjwGf6f28typsSeaijbTGBSeI6efLeT82O0uZeN1d1Dlb3aE_55ycSY6KifmhLBdxKeZS3NTM5iXOeRKXbb9UIXbAncriMiOhg-e225l1if-HvpELhLccHyqf8/s72-c/Skype+Vulnerability+Exposing+User+IP+Addresses.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-1384127465060444080</id><published>2012-05-02T13:13:00.002+05:30</published><updated>2012-05-02T13:13:54.927+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>Is $10,000 per day from Google Ads less for the Flashback malware Creator?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim11394090869498177598&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;img alt=&quot;Flashback+malware+Creater+earning+$10,000+per+day+from+Google+Ads&quot; border=&quot;0&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXWskyQYJr-29bfysKYGUpu-l7TfFutTJSx8bCgDhnc07SRubwWYUu4LtPz_c4mDOz8neLsz3py57KSab77rPKLVA8hQrRyOFc4UWU90WubeT6q0gEeIFFc6RNVlrVJgwL1RZvThrPJdCQ/s320/Flashback+malware+Creater+earning+$10,000+per+day+from+Google+Ads.jpg&quot; title=&quot;Flashback+malware+Creater+earning+$10,000+per+day+from+Google+Ads&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In a recent analysis of 
the business model behind the Flashback Trojan, Symantec security 
researchers reported that the main objective of the malware is revenue 
generation through an ad-clicking component. Security researchers at 
Symantec are estimating that the cyber-crimibals behind the Flashback 
Mac OS X botnet may have raked in about $10,000 a day.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dr. Web, the Russian security firm 
that firm discovered the massive Flashback botnet last month, has 
provided new data on the number of Macs still infected with the 
software. The results show that while close to 460,000 machines remain 
infected, the botnet is shrinking at a rate of close to a hundred 
thousand machines a week as Mac users get around to downloading Apple’s 
tool for disinfecting their machines or installing antivirus.&lt;br /&gt;
&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
When an infected user conducts a Google search, Google will return its 
normal search results. Flashback waits for someone to click on an ad, 
and once this happens the user is silently directed to another, 
irrelevant ad that generates revenue for the attackers. As a result, 
Google doesn&#39;t know someone has clicked into its client&#39;s ad, and the 
client never knows its ad wasn&#39;t delivered. Ultimately, Google&#39;s 
advertising clients are paying for Flashback&#39;s attackers to host ads on 
Google.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;b&gt;Story Posted on Symantec’s blog:&lt;/b&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The 
Flashback ad-clicking component is loaded into Chrome, Firefox, and 
Safari where it can intercept all GET and POST requests from the 
browser. Flashback specifically targets search queries made on Google 
and, depending on the search query, may redirect users to another page 
of the attacker’s choosing, where they receive revenue from the click . 
(Google never receives the intended ad click.)&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The
 ad click component parses out requests resulting from an ad click on 
Google Search and determines if it is on a whitelist. If not, it 
forwards the request to a malicious server.&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
Hackers tricked Mac 
users into downloading the virus by disguising it as an update to Adobe 
Flash video viewing software.&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/1384127465060444080/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/is-10000-per-day-from-google-ads-less.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/1384127465060444080'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/1384127465060444080'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/is-10000-per-day-from-google-ads-less.html' title='Is $10,000 per day from Google Ads less for the Flashback malware Creator?'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXWskyQYJr-29bfysKYGUpu-l7TfFutTJSx8bCgDhnc07SRubwWYUu4LtPz_c4mDOz8neLsz3py57KSab77rPKLVA8hQrRyOFc4UWU90WubeT6q0gEeIFFc6RNVlrVJgwL1RZvThrPJdCQ/s72-c/Flashback+malware+Creater+earning+$10,000+per+day+from+Google+Ads.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-8966652787013545775</id><published>2012-05-02T13:06:00.000+05:30</published><updated>2012-05-02T13:06:47.488+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Zero-day vulnerabilities"/><title type='text'>New zero day exploit in Oracle Database</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim1415373754116105914&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;img alt=&quot;Oracle+Database+new+zero+day+exploit+put+users+at+risk&quot; border=&quot;0&quot; height=&quot;179&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinEMb_KWDbrd3IzFrMiZ16INzVndsNFwwkcYsu7CNCpWFMeCzcXfzo3_uf3_2NmhJ0PRL2KdPdZuVaFSe_kacXs9xR23dNf34p2Fhj1FnbKHGNo9r3-PoUEN20kz1A3nKR4BrMsnVWd0Q5/s320/Oracle+Database+new+zero+day+exploit+put+users+at+risk.jpg&quot; title=&quot;Oracle+Database+new+zero+day+exploit+put+users+at+risk&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Oracle has 
recommended workarounds for a zero-day Oracle Database flaw that was not
 fixed in the company&#39;s April critical patch update.&amp;nbsp;Oracle issued a security alert
 for Oracle TNS Poison,&amp;nbsp;the vulnerability, disclosed by researcher 
Joxean Koret after he mistakenly thought it had been fixed by Oracle, 
allows an attacker to hijack the information exchanged between clients 
and databases.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim2415373754116105914&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Koret originally reported the 
vulnerability to Oracle in 2008, four years ago! and said he was 
surprised to see it had been fixed in Oracle’s most recent Critical 
Patch Update without any acknowledgment of his work.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
”&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;This
 vulnerability is remotely exploitable without authentication, and if 
successfully exploited, can result in a full compromise of the targeted 
Database&lt;/span&gt;&lt;/i&gt;,” the company warned.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
“&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;This
 security alert addresses the security issue CVE-2012-1675, a 
vulnerability in the TNS listener which has been recently disclosed as 
&#39;TNS Listener Poison Attack&#39; affecting the Oracle Database Server. This 
vulnerability may be remotely exploitable without authentication, i.e., 
it may be exploited over a network without the need for a username and 
password. A remote user can exploit this vulnerability to impact the 
confidentiality, integrity and availability of systems that do not have 
recommended solution applied&lt;/span&gt;&lt;/i&gt;”, Oracle wrote.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
A TNS Listener feature known as 
remote registration dates back to at least 1999 with version 8i of the 
Oracle Database. By sending a simple query to the service, an attacker 
can hijack connections legitimate users have already established with 
the database without the need of a password or other authentication. 
From then on, data traveling between legitimate users and the server 
pass through the connection set up by the attacker.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Oracle released a &lt;a href=&quot;http://www.oracle.com/technetwork/topics/security/alert-cve-2012-1675-1608180.html&quot; rel=&quot;follow&quot;&gt;critical update&lt;/a&gt; for versions 10g and 11g database products fixing this vulnerability.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/8966652787013545775/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/new-zero-day-exploit-in-oracle-database.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8966652787013545775'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8966652787013545775'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/05/new-zero-day-exploit-in-oracle-database.html' title='New zero day exploit in Oracle Database'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinEMb_KWDbrd3IzFrMiZ16INzVndsNFwwkcYsu7CNCpWFMeCzcXfzo3_uf3_2NmhJ0PRL2KdPdZuVaFSe_kacXs9xR23dNf34p2Fhj1FnbKHGNo9r3-PoUEN20kz1A3nKR4BrMsnVWd0Q5/s72-c/Oracle+Database+new+zero+day+exploit+put+users+at+risk.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-1875646274792233314</id><published>2012-04-03T15:11:00.000+05:30</published><updated>2012-04-03T15:11:09.266+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>Chinese hacker targeting Indian government and Tibetan activists Sites</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim18121910658545135140&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;img alt=&quot;Chinese+hacker+targeting+Indian+government+and+Tibetan+activists+Sites&quot; border=&quot;0&quot; height=&quot;151&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaYqEQn8zQ9cPE0rIYbcOS8Mr5YvBGUmyFtVQ_3np7K2heebFad_2IKU0BmZDt0J5dj-kI59Rxeb3HSsHMDVIhwx6oZMN9neQs6K8fVnP9-1ljKOQxBvWSF_CPTRvfHsNXEnbdht_5_AJB/s320/Chinese+hacker+targeting+Indian+government+and+Tibetan+activists+Sites.jpg&quot; title=&quot;Chinese+hacker+targeting+Indian+government+and+Tibetan+activists+Sites&quot; width=&quot;320&quot; /&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Websites of Indian 
government and Tibetan activists in the country are under attack in a 
cyber attack campaign engineered by a Chinese hacker, working with one 
of the world&#39;s largest e-tailers Tencent.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The cyber criminal in question 
is Gu Kaiyuan, once a graduate student at a Chinese university that 
receives government financial support for its computer security program 
and currently an employee at Chinese portal Tencent. Before Kaiyuan 
initiated the exploits, collectively called the &lt;b&gt;Luckycat campaign&lt;/b&gt;, he was involved in recruiting students for his school’s computer security and defense research. &lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim28121910658545135140&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The Luckycat cyber campaign, has been 
linked to 90 attacks in recent past against targets in India and Japan, 
as well as against Tibetan activists, said the report released by the 
Japanese network security firm. &#39;Luckycat&#39; has been able to compromise 
about 233 computers many of which are in India.&amp;nbsp;A report on the campaign
 from cloud security company Trend Micro shows that the Luckycat 
perpetrators began around June 2011.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Also, Trend Micro was able to find a set of campaign codes used to monitor compromised systems. “&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;The
 campaign codes often contain dates that indicate when each malware 
attack was launched. This demonstrates how actively and frequently the 
attackers launched attacks,&lt;/span&gt;&lt;/i&gt;” the report reads. “&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;The campaign codes also reveal the attackers’ intent, as some of these referenced the intended targets&lt;/span&gt;&lt;/i&gt;.”&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The report did not directly 
implicate the Chinese government, but security researchers believed that
 the style of the attacks and the types of targets indicated 
state-sponsored spying.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/1875646274792233314/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/04/chinese-hacker-targeting-indian.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/1875646274792233314'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/1875646274792233314'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/04/chinese-hacker-targeting-indian.html' title='Chinese hacker targeting Indian government and Tibetan activists Sites'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaYqEQn8zQ9cPE0rIYbcOS8Mr5YvBGUmyFtVQ_3np7K2heebFad_2IKU0BmZDt0J5dj-kI59Rxeb3HSsHMDVIhwx6oZMN9neQs6K8fVnP9-1ljKOQxBvWSF_CPTRvfHsNXEnbdht_5_AJB/s72-c/Chinese+hacker+targeting+Indian+government+and+Tibetan+activists+Sites.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-9022505483672540601</id><published>2012-04-03T15:08:00.000+05:30</published><updated>2012-04-03T15:08:10.925+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><title type='text'>DKFBootKit - First Android BootKit Malware</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim16485673130578531731&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcOfnkr9f9Wu860mOaGcJnJ8jNC76NWTi6VY8uNcXdqH8JEnafLfF_GHm6zibx5JnpyLiFTEExgz4k-7Doq5P6RwFtZxn3ONHPmfQcByictUL7xUJ7s2r2TIm9TC0IOh6zg3LNqevinvB9/s1600/DKFBootKit+-+First+Android+BootKit+Malware.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;DKFBootKit+-+First+Android+BootKit+Malware&quot; border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcOfnkr9f9Wu860mOaGcJnJ8jNC76NWTi6VY8uNcXdqH8JEnafLfF_GHm6zibx5JnpyLiFTEExgz4k-7Doq5P6RwFtZxn3ONHPmfQcByictUL7xUJ7s2r2TIm9TC0IOh6zg3LNqevinvB9/s320/DKFBootKit+-+First+Android+BootKit+Malware.jpg&quot; title=&quot;DKFBootKit+-+First+Android+BootKit+Malware&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; NQ Mobile Security&lt;/b&gt; Research Center has recently uncovered a new malware &lt;b&gt;DKFBootKit. &lt;/b&gt;This
 malware is identified when monitoring and analyzing the evolution of 
earlier DroidKungFu variants. What sets DKFBootKit apart from malware 
like DroidDream, is that DKFBootKit replaces certain boot processes and 
can begin running even before the system is completely booted up.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DKFBootKit repackages legitimate
 apps by enclosing its own malicious payloads in them. However, the 
victim apps it chooses to infect are utility apps which require the root
 privilege to work properly.&amp;nbsp;NQ says the malicious code has already 
infected 1,657 Android devices in the past two weeks and has appeared on
 at least 50 different mobile apps.&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim26485673130578531731&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div id=&quot;aim26485673130578531731&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; These apps seem to have legitimate 
reasons to request root privilege for their own functionality. It is 
also reasonable to believe that users will likely grant the root 
privilege to these apps.&amp;nbsp;DKFBootKit makes use of the granted root 
privilege for other malicious purposes, namely comprising the system 
integrity.&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In order to avoid being infected by this beast, NQ recommends three commonsense steps:&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;First, don&#39;t download any apps from sketchy app stores.&lt;/li&gt;
&lt;li&gt;Second, don&#39;t accept app permissions from unknown sources and always be sure to read the permissions an app is requesting.&lt;/li&gt;
&lt;li&gt;Third, download a security app that can scan your apps for you to search for malicious code.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
NQ Mobile Security for Android is available for &lt;a href=&quot;http://www.nq.com/mobilesecurity&quot; rel=&quot;follow&quot;&gt;download&lt;/a&gt;.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/9022505483672540601/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/04/dkfbootkit-first-android-bootkit.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/9022505483672540601'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/9022505483672540601'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/04/dkfbootkit-first-android-bootkit.html' title='DKFBootKit - First Android BootKit Malware'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcOfnkr9f9Wu860mOaGcJnJ8jNC76NWTi6VY8uNcXdqH8JEnafLfF_GHm6zibx5JnpyLiFTEExgz4k-7Doq5P6RwFtZxn3ONHPmfQcByictUL7xUJ7s2r2TIm9TC0IOh6zg3LNqevinvB9/s72-c/DKFBootKit+-+First+Android+BootKit+Malware.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-3879533790658454179</id><published>2012-04-03T14:34:00.000+05:30</published><updated>2012-04-03T14:34:15.674+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>50K Cards Compromised using Credit Card Processor</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim16228392182300104936&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;img alt=&quot;50K+Cards+Compromised+using+Credit+Card+Processor&quot; border=&quot;0&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmr18SMFfDyaJonirllhQKBSM1qTSNN6uvNT6RFMbsr9rSKiy0MRctIh5esXgWNoNngtkXNllPx90YUVBVbPPtBmkTKJQ2CnE0OgMclB1P2fl0SILYxpPOm1RHSpCRjDE9Mqq_o-953DkK/s320/50K+Cards+Compromised+using+Credit+Card+Processor.jpg&quot; title=&quot;50K+Cards+Compromised+using+Credit+Card+Processor&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Some 50,000 
credit and debit cardholders may have their information exposed 
following a security breach at Global Payments. The breach occurred 
sometime between between Jan. 21, 2012 and Feb. 25, 2012.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim26228392182300104936&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Both Visa and MasterCard have 
confirmed they have warned U.S. banks that a credit card processor was 
reportedly breached. Both firms say their own security systems were not 
compromised. MasterCard said law enforcement 
has been notified of the matter and an &quot;independent data security 
organization&quot; is conducting a forensic review of the matter.&amp;nbsp;&quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;MasterCard&#39;s own systems have not been compromised in any manner,&lt;/span&gt;&lt;/i&gt;&quot; a company spokesman said in a statement. The company will &quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;continue to both monitor this event and take steps to safeguard account information&lt;/span&gt;&lt;/i&gt;.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Because it sits in this middle 
ground directing where payment information goes, an attack on its system
 would leave a lot of private financial data exposed. Alerts sent out to
 U.S. banks late last week advised them that certain cards may have been
 compromised.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;While
 the scope and details of the attack are not yet known, it shows that 
three years after the Heartland Payment Systems breach of 130 million 
credit card numbers, credit card data is still vulnerable&lt;/span&gt;&lt;/i&gt;,&quot; Roiter said.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/3879533790658454179/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/04/50k-cards-compromised-using-credit-card.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/3879533790658454179'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/3879533790658454179'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/04/50k-cards-compromised-using-credit-card.html' title='50K Cards Compromised using Credit Card Processor'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmr18SMFfDyaJonirllhQKBSM1qTSNN6uvNT6RFMbsr9rSKiy0MRctIh5esXgWNoNngtkXNllPx90YUVBVbPPtBmkTKJQ2CnE0OgMclB1P2fl0SILYxpPOm1RHSpCRjDE9Mqq_o-953DkK/s72-c/50K+Cards+Compromised+using+Credit+Card+Processor.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-4062041432834115490</id><published>2012-03-30T19:57:00.000+05:30</published><updated>2012-03-30T19:57:30.164+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>Kelihos Botnet with 110,000 PCs take down finally</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim18890394100829300137&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;img alt=&quot;Kelihos+Botnet+with+110,000+PCs+take+down+finally&quot; border=&quot;0&quot; height=&quot;209&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUQ_oYUMw6Z09rc-MncQYTwiw-34SPaB-wcydJCFRV-pOfVXOU8_GRK4oZmiIkdl2g_9jxPWQEtsXnV4_-pXOEL3e3vBEBwSddLVDLL6D3GRcYQrko0wWCBNI0DSqUwICpkxbHCK-m_90t/s320/Kelihos+Botnet+with+110,000+PCs+take+down+finally.jpg&quot; title=&quot;Kelihos+Botnet+with+110,000+PCs+take+down+finally&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Botnets are particularly 
insidious, using thousands of virus-infected computers which their 
owners are unaware are being used for sending out spam, launching 
denial-of-service attacks and stealing data. But taking down a botnet 
poses challenges. The main problem is that legitimate security companies
 can’t use the same type of weapons as criminals.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A group of malware experts from 
security companies Kaspersky Lab, CrowdStrike, Dell SecureWorks and the 
Honeynet Project, have worked together to disable the second version of 
the Kelihos botnet, which is significantly bigger than the one shut down
 by Microsoft and its partners.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Kelihos is used to send spam, carry 
out DDoS attacks, and steal online currency such as bitcoin wallets. It 
operates as a so-called &quot;peer-to-peer&quot; bot network, which are more 
difficult to take down than those with a centralized command and control
 servers (C&amp;amp;C), according to Tillmann Werner, a senior researcher at
 CrowdStrike.&lt;br /&gt;
&lt;div id=&quot;aim28890394100829300137&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Seculert reports that Kelihos-B,
 which was distributed as a Facebook worm over recent weeks, is still 
active and spreading - even after the shutdown attempt by CrowdStrike 
and Kaspersky Labs this week.&amp;nbsp;The peer-to-peer Kelihos botnet, also 
known as Hlux, was sucked into a &#39;sinkhole&#39; by a small group of security
 experts from Kaspersky Lab, Dell SecureWorks, CrowdStrike Intelligence 
Team and the Honeynet Project.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; It&#39;s unclear who is behind 
Kelihos, he said. It was created last October after Microsoft used a 
sinkhole to halt the original Kelihos botnet, which had infected about 
41,000 computers. The latest Kelihos used servers with hosts registered 
in Sweden, Russia and Ukraine that were controlled by a botmaster, 
according to CrowdStrike.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The machines are still infected,
 and the researchers are relying on ISPs to inform affected users.&amp;nbsp;What 
is to say this botnet won’t just morph itself again? “&lt;b&gt;That is a possibility,&lt;/b&gt;” said Crowdstrike’s Mr. Meyers. “&lt;b&gt;But when that happens, we’ll be there to take it back down&lt;/b&gt;.”&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/4062041432834115490/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/kelihos-botnet-with-110000-pcs-take.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/4062041432834115490'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/4062041432834115490'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/kelihos-botnet-with-110000-pcs-take.html' title='Kelihos Botnet with 110,000 PCs take down finally'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUQ_oYUMw6Z09rc-MncQYTwiw-34SPaB-wcydJCFRV-pOfVXOU8_GRK4oZmiIkdl2g_9jxPWQEtsXnV4_-pXOEL3e3vBEBwSddLVDLL6D3GRcYQrko0wWCBNI0DSqUwICpkxbHCK-m_90t/s72-c/Kelihos+Botnet+with+110,000+PCs+take+down+finally.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-9189016110742245930</id><published>2012-03-30T19:34:00.000+05:30</published><updated>2012-03-30T19:34:43.919+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>A Russian Zeus attacker Sentenced from Million Dollar Fraud</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim16507955096790053292&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;img alt=&quot;A+Russian+Zeus+attacker+Sentenced+from+Million+Dollar+Fraud&quot; border=&quot;0&quot; height=&quot;278&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjU858Ntc7g-qG8JrlcQ74APfKuz4Tg7uqbq52P7cBxEqCQyH4GO6LP6Nn1L8MjtJl5iwla_4iTNEHMKBXZ1ZkgiPC2I7jK5GIlrjKitxGlpSW2T_5E4f8V77uFCUpRuD6uDjDFV-KEV8vH/s320/A+Russian+Zeus+attacker+Sentenced+from+Million+Dollar+Fraud.jpg&quot; title=&quot;A+Russian+Zeus+attacker+Sentenced+from+Million+Dollar+Fraud&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A Russian Hacker, who was part of an elaborate Cyber attack that used Zeus Banking&amp;nbsp;Trojan&amp;nbsp;in
 U.S. visas to move cash stolen from U.S. businesses out of the country 
was sentenced on March 23 to two years in U.S. federal prison.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Nikokay Garifulin&lt;/b&gt; 
received a two-year prison term for his involvement in a global bank 
fraud scheme that used hundreds of phone bank accounts to steal over $3 
million from dozens of U.S.accounts that were compromised by malware 
attacks.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim26507955096790053292&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div id=&quot;aim26507955096790053292&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; According to court documents and 
statements, Garifulin was part of a cyber bank fraud scheme, backed by 
Eastern European hackers to steal money from the bank accounts of small 
and mid-sized businesses throughout the U.S. The cyber attacks included 
Zeus Trojan, would embed itself in victims’ computers and record 
keystrokes as they logged into their online bank accounts.&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The hackers responsible for the 
malware then used the account information to take over the victims’ bank
 accounts and make unauthorized transfers of thousands of dollars at a 
time to accounts controlled by co-conspirators, including Garifulin, who
 were members of a money mule organization.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Garifulin&amp;nbsp;collected money that 
had been withdrawn by mules from the phony accounts in the United States
 and, under the direction of the organization’s leader, distributed it 
to other co-conspirators and transported it back to Eastern Europe. 
GARIFULIN also arranged for fake passports to be transferred from 
Eastern Europe to mules in the United States.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In addition to his prison term, 
Garifulin, 23, of Volgograd, Russia, was sentenced to three years of 
supervised release. He was also ordered to forfeit $100,000 and to pay 
$192,123,122 in restitution.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/9189016110742245930/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/russian-zeus-attacker-sentenced-from.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/9189016110742245930'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/9189016110742245930'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/russian-zeus-attacker-sentenced-from.html' title='A Russian Zeus attacker Sentenced from Million Dollar Fraud'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjU858Ntc7g-qG8JrlcQ74APfKuz4Tg7uqbq52P7cBxEqCQyH4GO6LP6Nn1L8MjtJl5iwla_4iTNEHMKBXZ1ZkgiPC2I7jK5GIlrjKitxGlpSW2T_5E4f8V77uFCUpRuD6uDjDFV-KEV8vH/s72-c/A+Russian+Zeus+attacker+Sentenced+from+Million+Dollar+Fraud.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-8082511481504735496</id><published>2012-03-30T19:30:00.000+05:30</published><updated>2012-03-30T19:30:20.065+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security speak"/><title type='text'>Japan orders Google to remove auto-complete function over privacy complaint</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim11951257899494635205&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;img alt=&quot;Japan+orders+Google+to+remove+auto-complete+function+over+privacy+complaint&quot; border=&quot;0&quot; height=&quot;126&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicbDzYwnQB2LBhWglPdMmdVfCr_E6sj6T3QIUZtzaRe1_gyR5OuzC64SFNbllyBpL0RKRNRt4NWqXe4aanJzosr9LrrFuMqzecjKLE86bGk5lTPf5wxwX8x3GmPGdOW72dznOL5Eka2DuN/s320/Japan+orders+Google+to+remove+auto-complete+function+over+privacy+complaint.png&quot; title=&quot;Japan+orders+Google+to+remove+auto-complete+function+over+privacy+complaint&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Google has been ordered 
to disable part of its autocomplete function in Japan after complaints 
it violates privacy.&amp;nbsp;According to a report by The Japan Times, the court
 was acting on a petition accusing Google’s autocomplete feature of 
being defamatory.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The petition was filed by a 
Japanese man (name not disclosed) who alleged that some of the 
autocomplete suggestions accompanying his name were not only defamatory 
but also breached his privacy. The unnamed petitioner, in fact, claimed 
that these defamatory search suggestions even cost him his job. The man came to this conclusion after 
discovering that when people type his name into Google&#39;s search engine, 
words suggesting criminal acts, which he is unfamiliar with, 
automatically appear. If a computer-suggested term is selected, more 
than 10,000 items defaming or disparaging him show up in a list, Tomita 
said.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim21951257899494635205&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Google has so far not carried out the court&#39;s request - but said it was &quot;&lt;b&gt;reviewing the order&lt;/b&gt;&quot;.&amp;nbsp;&quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;A Japanese court issued a provisional order requesting Google to delete specific terms from autocomplete&lt;/span&gt;&lt;/i&gt;,&quot; the Google spokesperson said in a statement. &quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;The judge did not require Google to completely suspend the autocomplete function.&lt;/span&gt;&lt;/i&gt;&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Google defended the system, 
arguing that as results were generated mechanically - rather than by an 
individual it was not an invasion of privacy.&quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt; These searches are produced by a number of factors including the popularity of search terms&lt;/span&gt;&lt;/i&gt;,&quot; the company said.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Google has been having a few 
problems with these sorts of cases. Last year when a British man was 
falsely accused of being a paedophile in a Google Places review the 
company had to pull it. The search engine also had to give in to an 
Indian law directing internet companies to block religiously offensive 
information from searches.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/8082511481504735496/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/japan-orders-google-to-remove-auto.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8082511481504735496'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8082511481504735496'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/japan-orders-google-to-remove-auto.html' title='Japan orders Google to remove auto-complete function over privacy complaint'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEicbDzYwnQB2LBhWglPdMmdVfCr_E6sj6T3QIUZtzaRe1_gyR5OuzC64SFNbllyBpL0RKRNRt4NWqXe4aanJzosr9LrrFuMqzecjKLE86bGk5lTPf5wxwX8x3GmPGdOW72dznOL5Eka2DuN/s72-c/Japan+orders+Google+to+remove+auto-complete+function+over+privacy+complaint.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-5155505032967340786</id><published>2012-03-30T19:27:00.000+05:30</published><updated>2012-03-30T19:27:38.378+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>Return of Lulzsec, Dump 170937 accounts from Military Dating Site</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim18250826260828639998&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Another Hacking group after &lt;b&gt;Lulzsec&lt;/b&gt;, comes with name &lt;b&gt;LulzsecReborn&lt;/b&gt; has posted names, usernames, passwords, and emails of 170,937 accounts on MilitarySingles.com on Pastebin
 as part of the group’s Operation Digiturk.&amp;nbsp;LulzSec was a major ticket 
item last year as the group hacked a number of high profile Web sites 
all in the name of the “lulz.” After their so called “50 Day Cruise,” 
the group broke up and went their separate ways.Hacker claim that, There
 are emails such as @us.army.mil ; @carney.navy.mil ; 
@greatlakes.cnet.navy.mil ; @microsoft.com ; etc.. in dump.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In response to a query by the Office 
of Inadequate Security, ESingles, the parent company of 
MilitarySingles.com, said that there is “&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;no
 actual evidence that MilitarySingles.com was hacked and it is possible 
that the Tweet from Operation Digiturk is simply a false claim.&lt;/span&gt;&lt;/i&gt;”. LulzSecReborn hack the site and added his deface page here, (as shown in above page) and replied “&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;Stupid Administrator: ‘There is no evidence MilitarySingles is hacked’. Well guess what?&lt;/span&gt;&lt;/i&gt;”Commenting on the breach, the Office of Inadequate Security said: “&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;If
 you know a member of the military who uses or has used the site, do 
them a favor and suggest they change their password on any site where 
they may have reused it – including their mil.gov email account&lt;/span&gt;&lt;/i&gt;.”&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In a video posted to YouTube last weekend and titled LulzSec Returns, the group says it decided to &quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;bring back our humble hacking group and set sail towards the interwebs again&lt;/span&gt;&lt;/i&gt;&quot;. Referring to the arrests, it said these had &quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;merely disrupted the active faction&lt;/span&gt;&lt;/i&gt;&quot;.&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/5155505032967340786/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/return-of-lulzsec-dump-170937-accounts.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/5155505032967340786'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/5155505032967340786'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/return-of-lulzsec-dump-170937-accounts.html' title='Return of Lulzsec, Dump 170937 accounts from Military Dating Site'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-4839232326895361807</id><published>2012-03-30T19:25:00.000+05:30</published><updated>2012-03-30T19:25:04.397+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook scams"/><title type='text'>Facebook profiles can be hijacked by Chrome extensions malware</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;author&quot;&gt;&lt;/span&gt;&lt;span class=&quot;clock&quot;&gt;&lt;/span&gt; &lt;span class=&quot;comm&quot;&gt;&lt;/span&gt;




&lt;br /&gt;
&lt;div id=&quot;aim17366219421236554414&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6oE9h0kSRTtWkJHV7f5Edku44-8ZzYBbxTIhBmH02Bt5DfL1pG_dYC-s9O2-5mXIIw-MqPogcD5qWTu2CuFVaMJD-L6cg5f34AtXJLAPdX4O_JsVwESX9Oa-pl3JMkFIo3RAPXxKicxVN/s1600/Facebook+profiles+can+be+hijacked+by+Chrome+extensions+malware.png&quot; rel=&quot;follow&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Facebook+profiles+can+be+hijacked+by+Chrome+extensions+malware&quot; border=&quot;0&quot; height=&quot;130&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6oE9h0kSRTtWkJHV7f5Edku44-8ZzYBbxTIhBmH02Bt5DfL1pG_dYC-s9O2-5mXIIw-MqPogcD5qWTu2CuFVaMJD-L6cg5f34AtXJLAPdX4O_JsVwESX9Oa-pl3JMkFIo3RAPXxKicxVN/s640/Facebook+profiles+can+be+hijacked+by+Chrome+extensions+malware.png&quot; title=&quot;Facebook+profiles+can+be+hijacked+by+Chrome+extensions+malware&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cybercriminals
 are uploading malicious Chrome browser extensions to the official 
Chrome Web Store and use them to hijack Facebook accounts, according to 
security researchers from Kaspersky Lab.&amp;nbsp;The rogue extensions are 
advertised on Facebook by scammers and claim to allow changing the color
 of profile pages, tracking profile visitors or even removing social 
media viruses.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim27366219421236554414&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div id=&quot;aim27366219421236554414&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;img alt=&quot;Facebook+profiles+can+be++hijacked+by+Chrome+extensions+malware&quot; border=&quot;0&quot; height=&quot;167&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQvvMWpdctVsf4UovYJFjhtg52Pb6Iv7-rFYJZYuXPg3Oexh8I-2go0xftP5J1BjikLeNnsL-vaeDnxJ7nW3Isb8-dN3XxMsQ7MZ3eu-iExuP9_B2W8TEIjXWig2wwwG3W9V3S_yakJ_qD/s320/Facebook+profiles+can+be++hijacked+by+Chrome+extensions+malware.png&quot; title=&quot;Facebook+profiles+can+be++hijacked+by+Chrome+extensions+malware&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The attacks manifest as suggestions to
 download Facebook apps. Those apps are, alas, not real. Instead they 
are malware and, in one case, a malware-laden Chrome extension hosted in
 Google&#39;s very own Chrome Web Store.&amp;nbsp;To do that, they must follow a 
series of steps, which include installing a fake Adobe Flash Player 
Chrome extension.&amp;nbsp;The launchpad for the fake Flash Player is a Facebook 
app called “&lt;b&gt;Aprenda&lt;/b&gt;”. If Aprenda is installed it redirects users to Chrome Web Store, encouraging them to install the fake Flash extension.&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; “&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;This
 last one caught our attention not because it asks the user to install a
 malicious extension, but because the malicious extension is hosted at 
the official Google&#39;s Chrome Web Store. If the user clicks on ‘install 
application’ he will be redirected to the official store. The malicious 
extension presents itself as “Adobe Flash Player&lt;/span&gt;&lt;/i&gt;”, wrote Fabio Assolini. &quot;&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;Be careful when using Facebook. And think twice before installing a Google Chrome extension&lt;/span&gt;&lt;/i&gt;,&quot; he adds.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Uploading multiple rogue 
extensions on the Chrome Web Store and running several Facebook spam 
campaigns to advertise them allows attackers to quickly compromise 
thousands of accounts.&amp;nbsp;The malware operates in much the same way as 
other Facebook scams, such as inviting friends to install it, however 
the purpose of the highjacking accounts is to generate fraudulent 
&quot;Likes&quot; which are sold for about US$27 per 1,000.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Now, the extension Assolini 
found was concentrated in Brazil, where Chrome enjoys 45% of the browser
 market and Facebook is by far the most popular social network. That 
does not, however, mean that the problem is isolated to Brazil. The 
malicious extension was installed in numerous countries, including the 
U.S. With these potential security risks in mind, &quot;&lt;b&gt;Think twice before installing a Google Chrome extension&lt;/b&gt;&quot;.
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/4839232326895361807/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/facebook-profiles-can-be-hijacked-by.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/4839232326895361807'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/4839232326895361807'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/facebook-profiles-can-be-hijacked-by.html' title='Facebook profiles can be hijacked by Chrome extensions malware'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6oE9h0kSRTtWkJHV7f5Edku44-8ZzYBbxTIhBmH02Bt5DfL1pG_dYC-s9O2-5mXIIw-MqPogcD5qWTu2CuFVaMJD-L6cg5f34AtXJLAPdX4O_JsVwESX9Oa-pl3JMkFIo3RAPXxKicxVN/s72-c/Facebook+profiles+can+be+hijacked+by+Chrome+extensions+malware.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-7222284509118674278</id><published>2012-03-29T12:23:00.000+05:30</published><updated>2012-03-29T12:23:15.493+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Facebook scams"/><title type='text'>Facebook Profile Viewer rogue application spreads on social network</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href=&quot;http://sophosnews.files.wordpress.com/2012/03/profile-viewer-5.jpg?w=640&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Facebook Profile Viewer rogue application&quot; border=&quot;0&quot; data-lazy-loaded=&quot;true&quot; height=&quot;213&quot; jquery171019272391750352086=&quot;89&quot; scrollin=&quot;0&quot; sonarbodyheight=&quot;5466&quot; sonarelemtop=&quot;2508&quot; src=&quot;http://sophosnews.files.wordpress.com/2012/03/profile-viewer-5.jpg?w=640&quot; style=&quot;display: inline; zoom: 1;&quot; title=&quot;Facebook Profile Viewer rogue application&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;A rogue application which claims to allow you to see who has viewed your Facebook profile is spreading between accounts on the popular social network. Messages claiming that Facebook has issued a new update which allows you to check who has visited your profile are making the rounds. &lt;div class=&quot;entry-content&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&lt;div style=&quot;clear: right; cssfloat: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;
&lt;noscript&gt;&lt;/noscript&gt;&lt;/div&gt;
&lt;div style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;
&lt;noscript&gt;&lt;/noscript&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: right; cssfloat: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;
&lt;img alt=&quot;Facebook Profile Viewer rogue application&quot; data-lazy-loaded=&quot;true&quot; height=&quot;227&quot; jquery171019272391750352086=&quot;82&quot; scrollin=&quot;0&quot; sonarbodyheight=&quot;5466&quot; sonarelemtop=&quot;1160&quot; src=&quot;http://sophosnews.files.wordpress.com/2012/03/profile-viewer-2.jpg?w=640&quot; style=&quot;display: inline; zoom: 1;&quot; title=&quot;Facebook Profile Viewer rogue application&quot; width=&quot;320&quot; /&gt;&lt;noscript&gt;&lt;/noscript&gt;&lt;/div&gt;
&lt;div style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;
&lt;noscript&gt;&lt;/noscript&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: left; cssfloat: left; float: left; height: 256px; margin-bottom: 1em; margin-right: 1em; width: 321px;&quot;&gt;
&lt;a href=&quot;http://sophosnews.files.wordpress.com/2012/03/profile-viewer-4.jpg?w=640&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; cssfloat: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Facebook Profile Viewer rogue application&quot; border=&quot;0&quot; data-lazy-loaded=&quot;true&quot; height=&quot;301&quot; jquery171019272391750352086=&quot;88&quot; scrollin=&quot;0&quot; sonarbodyheight=&quot;5466&quot; sonarelemtop=&quot;1977&quot; src=&quot;http://sophosnews.files.wordpress.com/2012/03/profile-viewer-4.jpg?w=640&quot; style=&quot;display: inline; zoom: 1;&quot; title=&quot;Facebook Profile Viewer rogue application&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;noscript&gt;&lt;/noscript&gt;&lt;/div&gt;
&lt;blockquote style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&lt;tt&gt;New Update from facebook. Now you can check who visited your profile. check here --------&amp;gt;&amp;gt;&amp;gt;FAŒBOOK PROFILE VIEWER ®&amp;lt;&amp;lt;&amp;lt;&amp;lt;------&lt;br /&gt;Who Watching your Profile ?&lt;/tt&gt;&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If you are intrigued by the Facebook Profile Viewer enough to click on the link, you are asked to permit an application to access your profile. You should always be very careful, of course, about allowing applications to read and write to your &lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Facebook profile. And this time is no exception. Because although at first you may believe that the application is showing you the details of people who have viewed your profile..&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
..behind the scenes, it is posting a message to your Facebook page without your explicit permission, encouraging others to also use the application.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://sophosnews.files.wordpress.com/2012/03/profile-viewer-3.jpg?w=640&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; cssfloat: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Facebook Profile Viewer rogue application&quot; border=&quot;0&quot; data-lazy-loaded=&quot;true&quot; height=&quot;217&quot; jquery171019272391750352086=&quot;87&quot; scrollin=&quot;0&quot; sonarbodyheight=&quot;5466&quot; sonarelemtop=&quot;1620&quot; src=&quot;http://sophosnews.files.wordpress.com/2012/03/profile-viewer-3.jpg?w=640&quot; style=&quot;display: inline; zoom: 1;&quot; title=&quot;Facebook Profile Viewer rogue application&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Clearly rogue applications like this could be used for scooping up personal information, or spreading spam and scams across the social network. So if you fell for it, remove the messages from your timeline, revoke the app&#39;s publishing rights and report it as spam to Facebook, and ensure that you have revoked its access to your account.&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
And remember this - Facebook &lt;strong&gt;does not&lt;/strong&gt; give you any way to find out who has been viewing your profile. Any application or link which claims it can reveal to you who has should be treated with great suspicion.&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/7222284509118674278/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/facebook-profile-viewer-rogue.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/7222284509118674278'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/7222284509118674278'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/facebook-profile-viewer-rogue.html' title='Facebook Profile Viewer rogue application spreads on social network'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-4867046709467259835</id><published>2012-03-29T11:55:00.000+05:30</published><updated>2012-03-29T11:55:49.334+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>Breaching Hundreds of KPN Servers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Dutch Police Arrest 17-year-old Suspected of The Dutch High Tech Crime Team has arrested a 17-year-old suspected of compromising customer account data on hundreds of servers belonging to telecommunications operator KPN. The teenager was arrested last Tuesday in the Dutch town of Barendrecht, where police seized an encrypted computer, two laptops and other storage media including external hard drives, DVDs and USB sticks, the Dutch Public Prosecution Service announced on Monday.&lt;/div&gt;
&lt;div class=&quot;spacer&quot; id=&quot;articleText&quot;&gt;
&lt;div class=&quot;articleBodyContent&quot;&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &quot;He has made a confession,&quot; said Wim de Bruin, spokesman for the Public Prosecution Service.&lt;br /&gt;
The arrested teenager called himself &quot;xS&quot;, &quot;Yoshioka&quot; and &quot;Yui&quot; online, and is suspected of breaching the security of hundreds of KPN servers last January, compromising user data and damaging KPN&#39;s infrastructure, said the Prosecution Service.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; KPN, the biggest telecom operator in the Netherlands, was forced to overhaul its systems to get rid of installed malicious software after the hack was discovered. The National Cyber Security Center of the Netherlands also assessed the security breach and concluded that national security was not compromised.In the wake of the hack, KPN suspended access to 2 million email accounts and asked users to change their passwords, after account details of KPN customers were leaked on Pastebin in early February.&amp;nbsp;The KPN data that appeared online was filtered from the captured database.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The arrested teenager was followed online for weeks and the Dutch police collaborated closely with the Cyber Terror Response Center in South Korea and the Australian Federal Police, according to the Prosecution Service. A person using the aliases &quot;Yui&quot;, &quot;Yoshiaka&#39; and &quot;xS&quot;, appeared to have bragged about the KPN hack in a chat channel for students at the Korea Advanced Institute of Science and Technology (KAIST), the prosecution said.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Besides hacking KPN the 17-year-old is also suspected of hacking computers at KAIST and at Trondheim University in Norway, and of breaching the security of Tokohu University in Japan. He is also thought to have been running a website used for selling stolen credit card data, according to the prosecution.&lt;br /&gt;
According to De Bruin the teenager did not confess to the other allegations. &quot;Those are still being investigated,&quot; he said.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; After the teenager&#39;s arrest, a judge ruled that he was to be kept in custody for at least two weeks. After that period, the Prosecution Service will assess if he has to be kept in custody, or can be freed until his trial. The suspect has legal support from a solicitor and was visited by the Dutch council for child protection, said the Prosecution Service. According to De Bruin, the maximum penalty the teenager faces is two years in prison. The maximum penalty is reduced due to his age. &quot;For an adult the maximum penalty would be six years imprisonment,&quot; De Bruin said.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; In the wake of the hacking, KPN said last week it will appoint a Chief Security Officer (CSO), and later this year will set up a permanent control center to monitor its systems. The company has replaced the compromised systems and will spend months checking the security of all its other systems.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/4867046709467259835/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/breaching-hundreds-of-kpn-servers.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/4867046709467259835'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/4867046709467259835'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/breaching-hundreds-of-kpn-servers.html' title='Breaching Hundreds of KPN Servers'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-7942624349185961341</id><published>2012-03-29T11:49:00.000+05:30</published><updated>2012-03-29T11:49:18.170+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>Justin Bieber&#39;s Twitter account - hacked!</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Lend a little sympathy to pop star Justin Bieber today, after his Twitter account was hacked and an unauthorised message was sent to his 19 million fans.&lt;br /&gt;
&lt;img alt=&quot;Justin Bieber hacked on Twitter&quot; data-lazy-loaded=&quot;true&quot; jquery171017705440527487276=&quot;78&quot; scrollin=&quot;0&quot; sonarbodyheight=&quot;4467&quot; sonarelemtop=&quot;544&quot; src=&quot;http://sophosnews.files.wordpress.com/2012/03/justin-bieber-hacked.jpg?w=640&quot; style=&quot;display: inline; zoom: 1;&quot; title=&quot;Justin Bieber hacked on Twitter&quot; /&gt;&lt;noscript&gt;&lt;/noscript&gt;&lt;br /&gt;
&lt;blockquote&gt;
&lt;tt&gt;19 million my ass. #biebermyballs&lt;/tt&gt;&lt;/blockquote&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Fortunately the message was rapidly deleted, and it appears that the account was compromised more to spread embarrassing graffiti rather than with more malicious intention. Just imagine how much worse things would have been if millions of Justin Bieber fans had seen a tweet from their hero offering, say, free concert tickets - and the link had really pointed to a website designed to strike their computers with malware.&lt;br /&gt;
&lt;img align=&quot;right&quot; alt=&quot;Justin Bieber&quot; data-lazy-loaded=&quot;true&quot; hspace=&quot;10&quot; jquery171017705440527487276=&quot;82&quot; scrollin=&quot;0&quot; sonarbodyheight=&quot;4467&quot; sonarelemtop=&quot;890&quot; src=&quot;http://sophosnews.files.wordpress.com/2012/03/bieber-170.jpg?w=640&quot; style=&quot;display: inline; zoom: 1;&quot; title=&quot;Justin Bieber&quot; vspace=&quot;10&quot; /&gt;&lt;noscript&gt;&lt;/noscript&gt;&lt;/img&gt;That&#39;s not to say that the hacker didn&#39;t do any serious damage at all, of course. According to reports whoever broke into Justin Bieber&#39;s Twitter account, also began to unfollow and block some of the folks that the Canadian singer follows.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; If you&#39;re one of Justin Bieber&#39;s many fans, please learn something from your idol&#39;s misfortune. Always choose a strong, secure password for your Twitter account and make sure that you are not using it on any other websites, and never share it with anyone else.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Furthermore, be careful that you only log into your Twitter account from a computer that is properly protected with up-to-date anti-virus software and security patches - in other words, maybe you shouldn&#39;t trust that computer in a hotel lobby or your friend&#39;s PC. Keylogging spyware can grab your password without you knowing, and pass it onto malicious hackers.&lt;br /&gt;
And remember that just because a Twitter account is &quot;verified&quot;, doesn&#39;t necessarily mean you can trust every message that is posted to it.&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/7942624349185961341/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/justin-biebers-twitter-account-hacked.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/7942624349185961341'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/7942624349185961341'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/justin-biebers-twitter-account-hacked.html' title='Justin Bieber&#39;s Twitter account - hacked!'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-3973880294425118153</id><published>2012-03-23T16:10:00.000+05:30</published><updated>2012-03-23T16:10:20.239+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>User IDs and Clear-Text Passwords Leaked from US Army’s CECOM</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Black Jester, the hacker who yesterday 
demonstrated that he managed to gain unauthorized access to a NASA site,
 leaked sensitive &lt;em&gt;contract information&lt;/em&gt; from a site connected to the US Army Communications and Electronics Command (CECOM).&lt;br /&gt;
&lt;/strong&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
A number of 30 record sets that include names, user IDs, physical 
addresses, email addresses, telephone numbers, and clear-text passwords 
were published in a Pastebin document. “Old crappy server, but has good info inside it. The list is not 
complete due the lazy condition and msaccess db , enjoy!” the hacker 
wrote next to the data dump.&lt;br /&gt;
&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
The Pastebin post doesn’t contain the name of the site from where the 
data was leaked, but the hacker provided us with the IP address 
associated with it. That IP address led us to a Software Engineering 
Services site on which only “eligible users” may register.&lt;br /&gt;
&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
We couldn’t reach the hacker for further comment, but he told us on a 
different occasion that the names of such sites would not be disclosed 
to the public to prevent “script kiddiez” from breaching them.&lt;br /&gt;

We have sent an email to the webmaster of the site in question and 
notified him on the incident, but so far we haven’t received any 
response. &lt;br /&gt;
&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
Black Jester is known in the hacker community as the one who wanted to &lt;strong&gt;help the United Nations&lt;/strong&gt;
 patch up a couple of its public websites. Instead of doing what most 
security researchers do in this situation and send an email, he went 
down to their offices in person.&lt;br /&gt;
&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
His other hacks, which he claims are unrelated to the UN incident, &lt;strong&gt;targeted NASA&lt;/strong&gt; and a &lt;strong&gt;Qwest datacenter&lt;/strong&gt;, whose servers he &lt;em&gt;held hostage&lt;/em&gt; with the purpose of forcing the company to patch up the vulnerabilities. &lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/3973880294425118153/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/user-ids-and-clear-text-passwords.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/3973880294425118153'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/3973880294425118153'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/user-ids-and-clear-text-passwords.html' title='User IDs and Clear-Text Passwords Leaked from US Army’s CECOM'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-7554787198947547200</id><published>2012-03-23T16:07:00.000+05:30</published><updated>2012-03-23T16:07:29.731+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>Carberp Banking Trojan Scam - 8 Arrested in Russia</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim13115959658043086313&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnLtrcEGqpXsBHnFX17ls9LHV0qSypvHLkTEIvMD7On-gYYfy8ByIAs3nANvT5NL36oWcUYmLggpir7LYT3_4Qbr3jumcPKvpqwTicNQuoqUElztTIKCAoGSax50gPpN13SK3e4HIBt4Yg/s1600/Carberp+Banking+Trojan+Scam+-+8+Arrested+in+Russia.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Carberp+Banking+Trojan+Scam+-+8+Arrested+in+Russia&quot; border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnLtrcEGqpXsBHnFX17ls9LHV0qSypvHLkTEIvMD7On-gYYfy8ByIAs3nANvT5NL36oWcUYmLggpir7LYT3_4Qbr3jumcPKvpqwTicNQuoqUElztTIKCAoGSax50gPpN13SK3e4HIBt4Yg/s320/Carberp+Banking+Trojan+Scam+-+8+Arrested+in+Russia.jpg&quot; title=&quot;Carberp+Banking+Trojan+Scam+-+8+Arrested+in+Russia&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;/span&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8 Men suspected of being 
involved in the Carberp phishing scam have been arrested in Russia.&amp;nbsp;The 
men were arrested after a joint investigation by the Russian Ministry of
 Internal Affairs (MVD) and Federal Security Service (FSB).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; According to the MVD, the 
investigation found that two brothers were the ringleaders of the gang, 
and developed a plan to steal money from the accounts of online banking 
customers.&amp;nbsp;The eight suspects allegedly stole more than 60 million 
Rubles ($2 million) from 90 victims using the Carberp Trojan.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Russian security firm who 
assisted with the investigation, pegged the stolen loot at 130 million 
Rubles ($4.5 million). Police confiscated computers, bank cards, notary 
equipment, fake documentation, and more than 7 million Rubles ($240,000)
 in cash during the raid.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim23115959658043086313&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The gang used the Carberp and RDP-door
 Trojans to snare victims. Carberp is a well-known Trojan that was 
recently seen on Facebook as part of a scam where attackers notify 
Facebook users that their accounts are temporarily locked. All they had 
to do to get them back was provide their first and last names, email 
addresses, dates of birth, passwords, and a 20-euro Ukash voucher.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The suspects will be accused of 
creating, using and disseminating of harmful computer programs, theft 
and illegal access to computer information and, if convicted, could be 
jailed for up to 10 years. In addition to bank fraud, the gang was also involved in distributed denial-of-service attacks, the security firm found.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/7554787198947547200/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/carberp-banking-trojan-scam-8-arrested.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/7554787198947547200'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/7554787198947547200'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/carberp-banking-trojan-scam-8-arrested.html' title='Carberp Banking Trojan Scam - 8 Arrested in Russia'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnLtrcEGqpXsBHnFX17ls9LHV0qSypvHLkTEIvMD7On-gYYfy8ByIAs3nANvT5NL36oWcUYmLggpir7LYT3_4Qbr3jumcPKvpqwTicNQuoqUElztTIKCAoGSax50gPpN13SK3e4HIBt4Yg/s72-c/Carberp+Banking+Trojan+Scam+-+8+Arrested+in+Russia.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-8913670200959770430</id><published>2012-03-22T20:21:00.000+05:30</published><updated>2012-03-22T20:21:26.105+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security speak"/><title type='text'>Mystery of Duqu Programming Language Solved</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim13215439132171068807&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; An appeal for help
 from the programming community has allowed antivirus analysts to 
classify the unknown language used to develop key components of the Duqu
 Trojan.&amp;nbsp;The sections responsible for downloading and executing 
additional modules in the Duqu Trojan, referred to by some as Stuxnet 
2.0, were written in standard C++.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim23215439132171068807&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div id=&quot;aim23215439132171068807&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Kaspersky Lab experts now say with a 
high degree of certainty that the Duqu framework was written using a 
custom object-oriented extension to C, generally called “OO C” and 
compiled with Microsoft Visual Studio Compiler 2008 (MSVC 2008) with 
special options for optimizing code size and inline expansion.&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Kaspersky’s Igor Soumenkov wrote,&amp;nbsp;“&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;No
 matter which of these two variants is true, the implications are 
impressive. The Payload DLL contains 95 Kbytes of event-driven code 
written with OO C, a language that has no automatic memory management or
 safe pointers&lt;/span&gt;&lt;/i&gt;,”.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Kaspersky’s analysis now concludes:&lt;/b&gt;&lt;/div&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;The Duqu Framework consists of “C” code compiled with MSVC 2008 using the special options “/O1″ and “/Ob1″&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;The code was most likely written with a custom extension to C, generally called “OO C”&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;The event-driven architecture was developed as a part of the Duqu Framework or its OO C extension&lt;/li&gt;
&lt;li style=&quot;text-align: justify;&quot;&gt;The C&amp;amp;C code could have been reused from an already existing software project and integrated into the Duqu Trojan&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The Duqu Framework may have been 
created by a different programming team, since it is unique to Duqu, 
unlike many parts of Duqu that seem to be directly borrowed from 
Stuxnet.&amp;nbsp;It’s believed that the developers are old school that don’t 
trust C++ and that’s probably why they relied on C. Another reason for 
using OO C is because back in the good old days it was more portable 
than C++.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Knowing the techniques used to 
develop the malware allows Kaspersky&#39;s researchers to make better 
guesses about who might be behind the code.&amp;nbsp;Creating Duqu was a major 
project, so it’s possible that an entirely different team was 
responsible for creating the Duqu Framework, while others worked on 
creating drivers and system infection exploits. In this scenario it&#39;s 
even possible that those who created the Duqu framework were ignorant of
 the real purpose of their work.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Duqu was first detected in 
September 2011, but Kaspersky Lab believes it has seen the first pieces 
of Duqu-related malware dating back to August 2007. The Russian security
 firm also notes Duqu, like Stuxnet before it, is highly targeted and 
related to Iran’s nuclear program.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/8913670200959770430/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/mystery-of-duqu-programming-language.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8913670200959770430'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8913670200959770430'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/mystery-of-duqu-programming-language.html' title='Mystery of Duqu Programming Language Solved'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-8762291996229738814</id><published>2012-03-22T20:17:00.000+05:30</published><updated>2012-03-22T20:17:55.397+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security speak"/><title type='text'>The Pirate Bay plans Low Orbit Server Drones to beat Censorship</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div id=&quot;aim1862911432633548005&quot;&gt;

&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;&quot;&gt;
&lt;img alt=&quot;The+Pirate+Bay+plans+Low+Orbit+Server+Drones+to+beat+Censorship&quot; border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7pohf8csKfDP7gPAbneRLiVDSw6E47-ffmjqU8L_wDr2jDHyJuDbVv7SRaGA55y1xxpq_LgOdfDjEmSNWaRBLVrpNSNTLIZGZAveUhydPgxKmu7qSHXoElT_BWkaAXApOn3NigQnrVOpT/s320/The+Pirate+Bay+plans+Low+Orbit+Server+Drones+to+beat+Censorship.jpg&quot; title=&quot;The+Pirate+Bay+plans+Low+Orbit+Server+Drones+to+beat+Censorship&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: medium;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; One of the world’s largest BitTorrent sites “&lt;strong&gt;The Pirate Bay&lt;/strong&gt;”
 is going to put servers on GPS-controlled aircraft drones in order to 
evade authorities who are looking to shut the site down.&amp;nbsp;In a Sunday 
blog post, The Pirate Bay announced new “Low Orbit Server Stations” that will house the site’s servers and files on unmanned, GPS-controlled, aircraft drones.

&lt;div&gt;
&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;TPB said:&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;em&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; With the development of GPS controlled drones, far-reaching 
cheap radio equipment and tiny new computers like the Raspberry Pi, 
we’re going to experiment with sending out some small drones that will 
float some kilometers up in the air. This way our machines will have to 
be shut down with aeroplanes in order to shut down the system. A real 
act of war.&lt;/em&gt;&lt;/div&gt;
&lt;em&gt;&amp;nbsp;&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;em&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We’re just starting so we haven’t figured everything out yet. 
But we can’t limit ourselves to hosting things just on land anymore. 
These Low Orbit Server Stations (LOSS) are just the first attempt. With 
modern radio transmitters we can get over 100Mbps per node up to 50km 
away. For the proxy system we’re building, that’s more than enough.&lt;/em&gt;

Low earth orbit is 100 miles up and requires a launch vehicle capable of
 achieving speeds of 17,000 miles an hour. At “some kilometers up in the
 air,” these drones would require significant power to stay afloat, and 
that’s even before the power required to transmit megabits per second 
over a wireless connection.
The LOSS are already in development, writes the blog from TPB.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; As you
 might wish to solve the energy problem, you have not thought about it 
well. And that will probably be the weak point. In the air it is hardly 
the drones now at least can fill up with energy. You will need to load 
them somewhere where they will be charged. By then, the authorities can 
access and turn off the drones easily&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/8762291996229738814/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/pirate-bay-plans-low-orbit-server.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8762291996229738814'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/8762291996229738814'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/pirate-bay-plans-low-orbit-server.html' title='The Pirate Bay plans Low Orbit Server Drones to beat Censorship'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7pohf8csKfDP7gPAbneRLiVDSw6E47-ffmjqU8L_wDr2jDHyJuDbVv7SRaGA55y1xxpq_LgOdfDjEmSNWaRBLVrpNSNTLIZGZAveUhydPgxKmu7qSHXoElT_BWkaAXApOn3NigQnrVOpT/s72-c/The+Pirate+Bay+plans+Low+Orbit+Server+Drones+to+beat+Censorship.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-6098038155761422304</id><published>2012-03-16T20:35:00.000+05:30</published><updated>2012-03-16T20:35:19.968+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Android"/><title type='text'>Samsung Rolls Out Ice Cream Sandwich for the Galaxy S II</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDJCA1T72YG3NYMONxoA41OIYHbKLH8K1ALLC2UXvI7ffQHlBkgTIRnSCzLTvPhhbDhfGm0xqeaU6OjHoR4ZuSsIp9oSFwaqQAO171tfx0TNsxHZgqzL-Fap_NBPGRsy48aPJDlMum6gc/s1600/s2deals.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;155&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDJCA1T72YG3NYMONxoA41OIYHbKLH8K1ALLC2UXvI7ffQHlBkgTIRnSCzLTvPhhbDhfGm0xqeaU6OjHoR4ZuSsIp9oSFwaqQAO171tfx0TNsxHZgqzL-Fap_NBPGRsy48aPJDlMum6gc/s200/s2deals.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
After a very long waiting period, Galaxy S2 owners have a sign of 
relief as Samsung has finally rolled out the latest Android 4.0 Ice 
Cream Sandwich update for the Samsung Galaxy S II smartphone. The official announcement was made via the company’s &lt;a href=&quot;http://global.samsungtomorrow.com/?p=12233&quot; target=&quot;_blank&quot;&gt;Samsung Tomorrow blog&lt;/a&gt;
 stating that the update will initially be available in Europe, with 
Poland, Hungary and Sweden mentioned specifically, as well as in Korea. 
This initial phase will make way for a wider roll out soon after.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvTon1s3FqxshzZe6qhz1jfxZfBOJGGr1oL6lwo0A3xZjo1F9sjK2OOn9YwS3Rxd9Kdut1QgtQffngnQ-LpvX-0V0mpl_HqLBSvOPZUWH3CcEd2vspAXXwEwdwSBgqF-DUKNdmsDNYVP4/s1600/ics.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;146&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvTon1s3FqxshzZe6qhz1jfxZfBOJGGr1oL6lwo0A3xZjo1F9sjK2OOn9YwS3Rxd9Kdut1QgtQffngnQ-LpvX-0V0mpl_HqLBSvOPZUWH3CcEd2vspAXXwEwdwSBgqF-DUKNdmsDNYVP4/s200/ics.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;The update to the latest version of the Android OS is done using 
Samsung’s Kies software. However, users who wish not to wait any longer 
can follow the instructions on the&amp;nbsp;&lt;a href=&quot;http://forum.xda-developers.com/showthread.php?t=1544487&quot;&gt;XDA developers forum&lt;/a&gt; to manually update their Samsung Galaxy S2 smartphones.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
JK Shin, President of Samsung’s IT and Mobile Communications Group, says -&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;blockquote&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;i&gt;We expect that our customers will enjoy an enhanced 
experience with their Galaxy device through this upgrade. Samsung is 
committed to satisfying our customer needs.&lt;/i&gt;&lt;/blockquote&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Samsung also made a public announcement on its &lt;a href=&quot;https://www.facebook.com/notes/samsung-mobile/android-40-ice-cream-sandwich-upgrade-for-galaxy-s-ii/390405030989148&quot; target=&quot;_blank&quot;&gt;Samsung Mobile’s Facebook page&lt;/a&gt;. Moments later, the announcement brought in over 700+ comments from fans and users of the Samsung Galaxy 2 smartphone.&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/6098038155761422304/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/samsung-rolls-out-ice-cream-sandwich.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/6098038155761422304'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/6098038155761422304'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/03/samsung-rolls-out-ice-cream-sandwich.html' title='Samsung Rolls Out Ice Cream Sandwich for the Galaxy S II'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDJCA1T72YG3NYMONxoA41OIYHbKLH8K1ALLC2UXvI7ffQHlBkgTIRnSCzLTvPhhbDhfGm0xqeaU6OjHoR4ZuSsIp9oSFwaqQAO171tfx0TNsxHZgqzL-Fap_NBPGRsy48aPJDlMum6gc/s72-c/s2deals.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-2111830767036525188</id><published>2012-01-20T19:47:00.001+05:30</published><updated>2012-01-20T19:51:13.927+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking news"/><title type='text'>Tit for Tat - Anonymous Hackers Brings Down FBI website for  #OpMegaupload</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;Megaupload.com&lt;/b&gt;, one of the world&#39;s most popular sources of online piracy, has been shut down by a federal indictment issued Thursday,&amp;nbsp;which seized and charged seven people connected with it with running an international enterprise based on internet piracy.&amp;nbsp;Online piracy by the two companies - Megaupload Ltd and Vestor Ltd - generated more than $ 175 million in criminal proceeds and caused more than half a billion dollars in harm to copyright owners &lt;br /&gt;
&lt;div id=&quot;aim12743900735173374958&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDCslndMMAbcFCGrZpm9cb-f05thSVcN50h7z8Qq8VB7ncHRIzhblr9lxUUQJXZcJuAxvjYcRLbdp-ZsvApulVSL2JoDa3rBTx7GzlmSjjxt0Q20zb-7mXBElM6RbnSEh3rOlSa46rqVi9/s1600/FBI+HACKED.jpg&quot; imageanchor=&quot;1&quot; rel=&quot;follow&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;FBI+HACKED&quot; border=&quot;0&quot; closure_uid_8rsib6=&quot;3&quot; height=&quot;207px&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDCslndMMAbcFCGrZpm9cb-f05thSVcN50h7z8Qq8VB7ncHRIzhblr9lxUUQJXZcJuAxvjYcRLbdp-ZsvApulVSL2JoDa3rBTx7GzlmSjjxt0Q20zb-7mXBElM6RbnSEh3rOlSa46rqVi9/s320/FBI+HACKED.jpg&quot; title=&quot;FBI+HACKED&quot; width=&quot;320px&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hacking group Anonymous said Thursday it knocked out the websites of the FBI, U.S. Department of Justice, and several entertainment industry sites as retribution for anti-piracy efforts by both the government and the entertainment industry. Anonymous said it was &quot;&lt;a href=&quot;https://twitter.com/#!/YourAnonNews/status/160135858895335424&quot; rel=&quot;follow&quot;&gt;&lt;span style=&quot;color: #034e9d;&quot;&gt;the largest attack ever&lt;/span&gt;&lt;/a&gt;,&quot; with 5,635 participants involved in bringing down the sites.&amp;nbsp;The two government sites were up and running again after several hours.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id=&quot;aim22743900735173374958&quot;&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Megaupload stood as one of the most popular file storage services on the internet, allowing users to upload and share files that included movies and music, among other media. With a timeliness that borders on satirical, public uproars over antipiracy bills SOPA and PIPA in Congress ran in tandem with the arrests and seizure.&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgG_3SYVJPIsWXOh7X9UDPbQbX5au1mQptu21WSv7qu446-YHRtX1t2ZlfKSEvlNgrKYdcyc9CpXm2g_lKJTl8qfA9Uv-EMGZDz-VVIxkgzEwpeQFu33nzUV-OfjOCyEgLLp6PwulMpSnGs/s1600/Motion+Picture+Association+of+America+%2528MPAA%2529+and+US+Democratic+party+leaders.gif&quot; imageanchor=&quot;1&quot; rel=&quot;follow&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Motion+Picture+Association+of+America+%2528MPAA%2529+and+US+Democratic+party+leaders&quot; border=&quot;0&quot; closure_uid_8rsib6=&quot;4&quot; height=&quot;180px&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgG_3SYVJPIsWXOh7X9UDPbQbX5au1mQptu21WSv7qu446-YHRtX1t2ZlfKSEvlNgrKYdcyc9CpXm2g_lKJTl8qfA9Uv-EMGZDz-VVIxkgzEwpeQFu33nzUV-OfjOCyEgLLp6PwulMpSnGs/s320/Motion+Picture+Association+of+America+%2528MPAA%2529+and+US+Democratic+party+leaders.gif&quot; title=&quot;Motion+Picture+Association+of+America+%2528MPAA%2529+and+US+Democratic+party+leaders&quot; width=&quot;320px&quot; /&gt;&lt;/a&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Anonymous have &lt;span style=&quot;color: #034e9d;&quot;&gt;compiled and published&lt;/span&gt; a dossier containing personal information about employees of the Motion Picture Association of America (MPAA) and US Democratic party leaders and their families.&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Megaupload has preemptively defended these charges with the following assertion:&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmA7QUTkUakPfV_ekMkMMSE5brYyFZVgqsAjQct4TR0-66KkO2W4KuOxusy3qyIGg8UTjTf4xqOVVk4cIZFHoPvxET6jzadsWZfdLyI9l44C2mNlCxGfrHH7YZ1jHKPRjvWDVoqRark5rU/s1600/Anonymous+Hackers+Brings+Down+FBI+website+for+%2523OpMegaupload.gif&quot; imageanchor=&quot;1&quot; rel=&quot;follow&quot; style=&quot;clear: right; cssfloat: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Anonymous+Hackers+Brings+Down+FBI+website+for+%2523OpMegaupload&quot; border=&quot;0&quot; closure_uid_8rsib6=&quot;5&quot; height=&quot;180px&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmA7QUTkUakPfV_ekMkMMSE5brYyFZVgqsAjQct4TR0-66KkO2W4KuOxusy3qyIGg8UTjTf4xqOVVk4cIZFHoPvxET6jzadsWZfdLyI9l44C2mNlCxGfrHH7YZ1jHKPRjvWDVoqRark5rU/s320/Anonymous+Hackers+Brings+Down+FBI+website+for+%2523OpMegaupload.gif&quot; title=&quot;Anonymous+Hackers+Brings+Down+FBI+website+for+%2523OpMegaupload&quot; width=&quot;320px&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none; text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mega has over 150 million registered users and over 50 million daily unique visitors. Employees of over 70% of the world’s Fortune 500 companies have accounts with us. We have become the de-facto standard for sending files that are too big to email. We are the most popular hard disk in the cloud. We host more backups than any other company. If Mega is a rogue operator as we have been unfairly labelled by the MPAA and RIAA, then what about Google? What about Yahoo? And every single ISP? At any given time, they all host pirated, illegal or even criminal content for which they are not liable nor legally obliged to prevent their users from posting. They are, like Megaupload, online service providers who are in no position to monitor or restrict their users’ activities. There are technical, practical and legal reasons why these entities as a whole enjoy safe harbor protection all over the world. Service providers like Megaupload are simply better off focusing on providing a better service to their customers than fending off lawsuits from third parties unhappy about content.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;color: #990000;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; That said, all service providers have to deal with the challenge of online piracy, just like us. Google probably hosts the world’s largest index of pirated content and yet no one has characterized them as rogue. Why not sue the manufacturers of external USB hard drives or burnable DVDs? They can be used for illegal purposes, too. Microsoft’s Windows operating system is the world’s largest enabler of piracy. Windows is used to transfer and consume pirated content on a massive scale every day. And yet Microsoft is not rogue. This double standard should not be imposed on Megaupload since it finds no basis in either logic or the law. All we want is equal treatment.&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/2111830767036525188/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/01/tit-for-tat-anonymous-hackers-brings.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/2111830767036525188'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/2111830767036525188'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/01/tit-for-tat-anonymous-hackers-brings.html' title='Tit for Tat - Anonymous Hackers Brings Down FBI website for  #OpMegaupload'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhDCslndMMAbcFCGrZpm9cb-f05thSVcN50h7z8Qq8VB7ncHRIzhblr9lxUUQJXZcJuAxvjYcRLbdp-ZsvApulVSL2JoDa3rBTx7GzlmSjjxt0Q20zb-7mXBElM6RbnSEh3rOlSa46rqVi9/s72-c/FBI+HACKED.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2778125637743201552.post-6050258177385394054</id><published>2012-01-19T23:16:00.000+05:30</published><updated>2012-01-19T23:16:26.137+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Just4fun"/><title type='text'>Open Multiple Websites at Once With A Desktop Shortcut</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;entry-content&quot; sizcache=&quot;6&quot; sizset=&quot;33&quot;&gt;
&lt;div class=&quot;KonaBody&quot; sizcache=&quot;6&quot; sizset=&quot;33&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; We&amp;nbsp;visit multiple websites, multiple times daily. Typing the names of these websites over and over again becomes too time consuming and obviously, boring.&amp;nbsp;So,&amp;nbsp;the easiest solution is&amp;nbsp;to create a desktop shortcut for it through which&amp;nbsp;we can open unlimited number of websites in multiple browser tabs.&lt;br /&gt;
&lt;div sizcache=&quot;6&quot; sizset=&quot;33&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div sizcache=&quot;6&quot; sizset=&quot;33&quot;&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Basically we have to &lt;span style=&quot;color: #1591c0;&quot;&gt;&lt;u&gt;&lt;em&gt;create a batch file&lt;/em&gt;&lt;/u&gt;&lt;/span&gt; to open multiple websites.&amp;nbsp;To begin, create a new text document in the desktop and type,&lt;/div&gt;
&lt;blockquote&gt;
@echo off&lt;/blockquote&gt;
Now below it write,&lt;br /&gt;
&lt;blockquote&gt;
start “website name” “website url”&lt;/blockquote&gt;
and add as many websites as you like. After you have typed all the websites that you want to open, save the file as test.bat or you can name it anything, but note to save it as batch file(.bat). &lt;br /&gt;
Below is an example of my batch file,&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsQynfdARSB9J-_M74j-4J7_3bR1NLkT4pJAKPvCtruzQxwKwW2KGXrRim5jiUMar-UivzbMub0RBgE0pYULrn3F7NDevIeFgNkQjLBMqSgqiGKUg1kKFhyBPMcam3lEAlKfbfdmSTo70/s1600/untitled.PNG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; nfa=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsQynfdARSB9J-_M74j-4J7_3bR1NLkT4pJAKPvCtruzQxwKwW2KGXrRim5jiUMar-UivzbMub0RBgE0pYULrn3F7NDevIeFgNkQjLBMqSgqiGKUg1kKFhyBPMcam3lEAlKfbfdmSTo70/s1600/untitled.PNG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border-bottom: medium none; border-left: medium none; border-right: medium none; border-top: medium none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
Now clicking the batch file will open multiple websites in different tabs of your default browser, in my case it was Firefox. It’s that easy. Enjoy!&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;For more Information security updates, check out -
www.easyhacks.tk&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://pcsneakers.blogspot.com/feeds/6050258177385394054/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://pcsneakers.blogspot.com/2012/01/open-multiple-websites-at-once-with.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/6050258177385394054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2778125637743201552/posts/default/6050258177385394054'/><link rel='alternate' type='text/html' href='http://pcsneakers.blogspot.com/2012/01/open-multiple-websites-at-once-with.html' title='Open Multiple Websites at Once With A Desktop Shortcut'/><author><name>PC Sneakers</name><uri>http://www.blogger.com/profile/04255588874497782821</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsQynfdARSB9J-_M74j-4J7_3bR1NLkT4pJAKPvCtruzQxwKwW2KGXrRim5jiUMar-UivzbMub0RBgE0pYULrn3F7NDevIeFgNkQjLBMqSgqiGKUg1kKFhyBPMcam3lEAlKfbfdmSTo70/s72-c/untitled.PNG" height="72" width="72"/><thr:total>1</thr:total></entry></feed>