<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6243155472409305423</atom:id><lastBuildDate>Fri, 08 Nov 2024 14:55:33 +0000</lastBuildDate><category>internet</category><category>hacking</category><category>Tbits-in</category><category>hacker</category><category>0 day vulnerabilities</category><category>flaw</category><category>cyber crime</category><category>security</category><category>Computers</category><category>scam</category><category>Computer tricks</category><category>Latest Tech</category><category>Technology</category><category>facebook</category><category>windows</category><category>cyber security</category><category>phishing</category><category>spying</category><category>wikileaks</category><category>Intel</category><category>US government</category><category>andriod apps</category><category>deep web</category><category>eticla hacking</category><category>hacked</category><category>malware</category><category>privacy</category><category>wordpress flaw</category><category>CIA</category><category>CMD</category><category>CMD Tricks</category><category>CPU Flaw</category><category>antivirus</category><category>arrested</category><category>attack</category><category>best apps</category><category>bitcoin</category><category>cryptocurrencies</category><category>data breaches</category><category>mac</category><category>microsoft</category><category>mysteries</category><category>online money</category><category>tricks</category><category>vpn</category><category>whatsApp</category><category>wifi</category><category>AMD</category><category>ARM</category><category>AT&amp;T</category><category>Adrian Lamo Death</category><category>AlphaBay</category><category>Anti-Ransomware</category><category>Bluestack</category><category>Crack</category><category>DDOS</category><category>Data</category><category>Data Compromised</category><category>Dell Inspiron</category><category>IBM</category><category>IDM</category><category>IDM universal crack</category><category>MIMT</category><category>Man in The Middle Attack</category><category>Mark Zuckerberg</category><category>Network</category><category>Ransomware</category><category>android</category><category>app</category><category>apple</category><category>avast</category><category>best browsers</category><category>best security</category><category>best web-hosting</category><category>bitdefender</category><category>black marcket</category><category>blogging</category><category>botnet</category><category>chating</category><category>coder</category><category>comcast</category><category>comcast xfinity</category><category>conspiracies</category><category>crash</category><category>developer</category><category>digital currency</category><category>earning</category><category>encryption</category><category>express vpn</category><category>fappening</category><category>file hiding</category><category>firefox</category><category>free vpn</category><category>freelancing</category><category>google</category><category>google glases</category><category>hub-pages</category><category>kespersky</category><category>kodi</category><category>latest news</category><category>linkedin</category><category>media players</category><category>message</category><category>messenger</category><category>online course</category><category>pegasus</category><category>phone</category><category>programmer</category><category>project pegasus</category><category>pure vpn</category><category>snapchat</category><category>telegram</category><category>time travel</category><category>torrent</category><category>usb</category><category>vlc</category><category>web-hosting</category><category>website</category><category>yahoo</category><category>zenmate</category><title> му TBits-iи </title><description>Here you can find free stuff Like Antiviruses, Free Web-Hosting Plans, Free Games and many more. </description><link>https://usamaasif.blogspot.com/</link><managingEditor>noreply@blogger.com (T-W-S)</managingEditor><generator>Blogger</generator><openSearch:totalResults>76</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:image href="https://www.google.com.pk/search?q=angel+on+fire&amp;source=lnms&amp;tbm=isch&amp;sa=X&amp;ved=0ahUKEwitkN2I3I_QAhXJORQKHfTbAOsQ_AUICCgB&amp;biw=1280&amp;bih=666#tbm=isch&amp;q=angel+on+fire+png&amp;imgrc=jH5QS2EQKJWUsM%3A"/><itunes:subtitle>Here you can find free stuff Like Antiviruses, Free Web-Hosting Plans, Free Games and many more. </itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-2926808026307078753</guid><pubDate>Fri, 06 Apr 2018 19:38:00 +0000</pubDate><atom:updated>2018-04-07T00:38:26.336+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Data</category><category domain="http://www.blogger.com/atom/ns#">Data Compromised</category><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">Mark Zuckerberg</category><title>Facebook admits public data of its 2.2 billion users has been compromised </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Facebook admits public data of its 2.2 billion users has been compromised&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;img alt="Image result for Facebook admits public data of its 2.2 billion users has been compromised" height="320" src="https://debuglies.com/wp-content/uploads/2018/04/Facebook-admits-public-data-of-its-2.2-billion-users-has-been-compromised.png" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div id="aim15369088878580361139" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
Facebook dropped another bombshell on its users by admitting that all of its 2.2 billion users should assume malicious third-party scrapers have compromised their public profile information.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;On Wednesday, Facebook CEO Mark Zuckerberg revealed that "malicious actors" took advantage of "Search" tools on its platform to discover the identities and collect information on most of its 2 billion users worldwide.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The revelation once again underlines the&amp;nbsp;&lt;a href="https://thehackernews.com/2018/03/facebook-android-data.html" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;failure of the social-media&lt;/a&gt;&amp;nbsp;giant to protect users’ privacy while generating billions of dollars in revenue from the same information.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The revelation came weeks after the disclosure of the&amp;nbsp;&lt;a href="https://thehackernews.com/2018/03/facebook-cambridge-analytica.html" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Cambridge Analytica scandal&lt;/a&gt;, wherein personal data of 77 million users was improperly gathered and misused by the political consultancy firm, who reportedly also helped Donald Trump win the US presidency in 2016.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="clear" id="insidearticlead" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="clear" id="load-rest" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 15px 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim25369088878580361139" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;However, the latest scam revealed by the social media giant about the abuse of Facebook's search tools over the course of several years impacts almost all of its 2.2 billion users, making it the worst year for the world's largest social network.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"It is clear now that we didn't do enough, we didn't focus enough on preventing abuse," Zuckerberg told press reporters. "We didn't take a broad enough view of what our responsibility is, and that was a huge mistake."&lt;/blockquote&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The company said it had disabled the feature—which allows anyone to look up users by entering phone numbers or email addresses into Facebook's search tool—in its site's search function that enabled malicious actors to scrape public profile information.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;h3 style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.3em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Here's How Scrapped Data Could Have Helped Cybercriminals&lt;/h3&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;As mentioned above, the source of this scam was Facebook's search function, which was turned on by default. Hackers took help of "Dark Web," where criminals post personal information of users stolen from data breaches over the years, to collect.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Once they had their hands on email addresses and phone numbers, the hackers then used automated computer programs to feed the email addresses and phone numbers into Facebook’s "search" box.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;This scan allowed them to find out the full names of people associated with the email addresses or phone numbers, along with the Facebook profile information they chose to make public, which often includes names, profile photos, and hometown.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;This collected information was then more likely to be used by cybercriminals to target particular individual using social engineering or other cyber attacks.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"Until today, people could enter another person’s phone number or email address into Facebook search to help find them. This has been especially useful for finding your friends in languages which take more effort to type out a full name, or where many people have the same name," Facebook Chief Technology Officer Mike Schroepfer said in a&amp;nbsp;&lt;a href="https://newsroom.fb.com/news/2018/04/restricting-data-access/" rel="nofollow" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;blog post&lt;/a&gt;&amp;nbsp;describing changes the company has made to its service to protect its users’ data better.&lt;/blockquote&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"However, malicious actors have also abused these features to scrape public profile information by submitting phone numbers or email addresses they already have through search and account recovery. Given the scale and sophistication of the activity we’ve seen, we believe most people on Facebook could have had their public profile scraped in this way."&lt;/blockquote&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;While apologizing "second time" to its users, Zuckerberg said this feature has immediately been turned off, noting that the scraped profile information was only limited to what was publically viewable.&lt;/div&gt;
&lt;div class="second-place clear" id="second-place" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div id="aim35369088878580361139" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;However, Zuckerberg defended gathering users' data for a business model, arguing "People tell us that if they’re going to see ads, they want the ads to be good."&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"On the one hand, people want relevant experiences, and on the other hand there is some discomfort about how data is used," Zuck added. "I think the overwhelming feedback is for wanting a good experience."&lt;/blockquote&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Also, it was initially reported that Cambridge Analytica quiz app gathered data on some 50 million Facebook users, but Facebook revised that number upward by 74 percent, i.e., over 77 million.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;In an effort to protect its users private data, Facebook is now restricting third-party apps from accessing users’ information about their relationship status, religious or political views, work history, education, habits, interest, video watching, and games—basically almost every information data brokers and businesses collect to build profiles of their customers' tastes.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The company is all set to roll out a new feature on Monday that will inform users who were affected by the Cambridge Analytica data leak.&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2018/04/facebook-admits-public-data-of-its-22.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-6844732105399760782</guid><pubDate>Fri, 06 Apr 2018 18:56:00 +0000</pubDate><atom:updated>2018-04-06T23:56:03.031+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anti-Ransomware</category><category domain="http://www.blogger.com/atom/ns#">microsoft</category><category domain="http://www.blogger.com/atom/ns#">Ransomware</category><title>Microsoft Office 365 Gets Built-in Ransomware Protection and Enhanced Security Features </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Microsoft Office 365 Gets Built-in Ransomware Protection and Enhanced Security Features&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;img alt="Image result for Microsoft Office 365 Gets Built-in Ransomware Protection and Enhanced Security Features" src="https://image.slidesharecdn.com/cloudapplicationsecurity-171211121103/95/microsoft-cloud-application-security-overview-8-638.jpg?cb=1512994375" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div id="aim11331935517607030276" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
Ransomware has been around for a few years, but it has become an albatross around everyone's neck, targeting big businesses, hospitals, financial institutions and individuals worldwide and extorting millions of dollars.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Last year, we saw some major ransomware outbreaks, including&amp;nbsp;&lt;a href="https://thehackernews.com/2017/05/how-to-wannacry-ransomware.html" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;WannaCry&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://thehackernews.com/2017/06/petya-ransomware-attack.html" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;NotPetya&lt;/a&gt;, which wreaked havoc across the world, hitting hundreds of thousands of computers and business networks worldwide.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;From small to mid-range businesses,&amp;nbsp;&lt;a href="https://thehackernews.com/2016/06/ransomware-msoffice.html" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Microsoft Office 365&lt;/a&gt;&amp;nbsp;remains the most widely used and fastest-growing work office suite, so it's no surprise that it has become a primary target for viruses, ransomware, and phishing scams.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="clear" id="insidearticlead" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="clear" id="load-rest" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 15px 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim21331935517607030276" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;In fact, most strains of ransomware target Microsoft productivity apps such as Word, Excel and encrypt sensitive data to hold the company hostage until the ransom is paid.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Now, to combat such cyber attacks, Microsoft has announced some new security features for Office 365 that can help users mitigate the damage done by ransomware and other malware infections.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The new features were initially introduced for OneDrive for Business, but that the company is now rolling them out to anyone who has signed up for an Office 365 Home or Personal subscription, Microsoft Office&amp;nbsp;&lt;a href="https://blogs.office.com/en-us/2018/04/05/defend-yourself-from-cybercrime-with-new-office-365-capabilities/" rel="nofollow" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;blog&lt;/a&gt;says.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Here below I have briefed the list of new features:&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;h3 style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.3em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
File Recovery and Anti-Ransomware&lt;/h3&gt;
&lt;ul style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Files Restore—&lt;/span&gt;Microsoft Office 365 now allows users to restore entire OneDrive to a previous point in time within the last 30 days. This feature can be used to recover files from an accidental mass delete, file corruption, ransomware, or any catastrophic event.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Ransomware detection &amp;amp; recovery—&lt;/span&gt;Office 365 had also introduced a new security feature that detects ransomware attacks and alerts you through an email, mobile, or desktop notification while helping you restore your OneDrive to a point before the malware compromised files.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.3em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Security and Privacy Features&lt;/h3&gt;
&lt;div class="separator" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; clear: both; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIakcThu5xID_asUbfg4BeHs-5sgkDXIHihf_QNQvEodXZZspO8X4OXqo7213OPpA_7EDOZGsLQ_r78GMUWurLWDgb7LMcrGo7RLo2SyeOEQrn2qgRnFhmz1Nlobv23fICIRlin8ForakP/s728/Office-365-security-blog-image-Sharing-Links.gif" imageanchor="1" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; clear: left; color: #157bda; cursor: default; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 1em 0px 0px; outline: none; padding: 0px; pointer-events: none; text-decoration-line: none; vertical-align: baseline;"&gt;&lt;img alt="Office-365-security-blog-image-Sharing-Links" border="0" data-original-height="621" data-original-width="900" height="441" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIakcThu5xID_asUbfg4BeHs-5sgkDXIHihf_QNQvEodXZZspO8X4OXqo7213OPpA_7EDOZGsLQ_r78GMUWurLWDgb7LMcrGo7RLo2SyeOEQrn2qgRnFhmz1Nlobv23fICIRlin8ForakP/s640/Office-365-security-blog-image-Sharing-Links.gif" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; clear: both; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; max-width: 728px; outline: none; padding: 0px; vertical-align: baseline;" title="Office-365-security-blog-image-Sharing-Links" width="640" /&gt;&lt;span style="color: #222222;"&gt;Office 365 has added three new features to help keep your confidential or personal data (such as tax documents, family budgets, or a new business proposal) secure and private when sharing them online.&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;div style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;ul style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Password protected sharing links—&lt;/span&gt;This feature allows you to set a password for your shared file and folders, preventing unauthorized access even if your recipient accidentally forwards protected documents to others.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Email encryption—&lt;/span&gt;This feature allows users to send/receive&amp;nbsp;&lt;a href="https://thehackernews.com/2016/03/the-best-way-to-send-and-receive-end-to.html" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;end-to-end encrypted emails&lt;/a&gt;&amp;nbsp;in Outlook over a secure connection, providing additional protection to minimize the threat of being intercepted.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Prevent forwarding—&lt;/span&gt;Microsoft now enables you to restrict your email recipients from forwarding or copying emails you send to them from Outlook. Besides this, any MS Office document attached to your emails will remain encrypted even after downloading, so if the recipient shares your attachment with others, they will not be able to open it.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="second-place clear" id="second-place" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div id="aim31331935517607030276" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;h3 style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.3em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Advanced Protection from Viruses and Cybercrime&lt;/h3&gt;
&lt;ul style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Advanced link checking in Word, Excel, and PowerPoint—&lt;/span&gt;Office 365 also offers built-in real-time web protection, which monitors every link you click in Word, Excel, and PowerPoint and notifies you if it is suspicious.&lt;/li&gt;
&lt;/ul&gt;
File Recovery and Anti-Ransomware features began rolling out starting today and will be available to all Office 365 users soon, while features to help keep your information secure and private (including password protected sharing links, email encryption, and prevent forwarding) will start rolling out in the coming weeks.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Advanced link checking and advanced attachment scanning are already available in MS Outlook that protects you from previously unseen viruses and phishing scams in real-time. However, advanced link checking in Word, Excel, and PowerPoint will roll out in the second half of 2018.&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2018/04/microsoft-office-365-gets-built-in.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIakcThu5xID_asUbfg4BeHs-5sgkDXIHihf_QNQvEodXZZspO8X4OXqo7213OPpA_7EDOZGsLQ_r78GMUWurLWDgb7LMcrGo7RLo2SyeOEQrn2qgRnFhmz1Nlobv23fICIRlin8ForakP/s72-c/Office-365-security-blog-image-Sharing-Links.gif" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-8969746427948900088</guid><pubDate>Fri, 06 Apr 2018 18:53:00 +0000</pubDate><atom:updated>2018-04-06T23:53:08.925+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">hacked</category><title>Finland's 3rd Largest Data Breach Exposes 130,000 Users' Plaintext Passwords </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 align="justify" class="post-title url" itemprop="headline" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #222222; font-family: Source Sans Pro, sans-serif; font-size: x-large;"&gt;Finland's 3rd Largest Data Breach Exposes 130,000 Users' Plaintext Passwords&amp;nbsp;&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;img alt="Image result for Finland's 3rd Largest Data Breach Exposes 130,000 Users' Plaintext Passwords" height="465" src="https://www.troyhunt.com/content/images/2017/07/Pwned-Password-Found.jpg" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div id="aim15401471469067958251" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
Over 130,000 Finnish citizens have had their credentials compromised in what appears to be third largest data breach ever faced by the country, local media&amp;nbsp;&lt;a href="https://svenska.yle.fi/artikel/2018/04/06/jattelikt-dataintrang-i-sajt-for-affarsideer-i-finland" rel="nofollow" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;reports&lt;/a&gt;.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Finnish Communications Regulatory Authority (FICORA) is&amp;nbsp;&lt;a href="https://www.viestintavirasto.fi/kyberturvallisuus/varoitukset/2018/varoitus-2018-01.html" rel="nofollow" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;warning&lt;/a&gt;&amp;nbsp;users of a large-scale data breach in a website maintained by the New Business Center in Helsinki ("Helsingin Uusyrityskeskus"), a company that provides business advice to entrepreneurs and help them create right business plans.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Unknown attackers managed to hack the website (&lt;i style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;http://liiketoimintasuunnitelma.com&lt;/i&gt;) and stole over 130,000 users’ login usernames and passwords, which were stored on the site in plain-text without using any cryptographic hash.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="clear" id="insidearticlead" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="clear" id="load-rest" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 15px 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim25401471469067958251" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Right after knowing of the breach on 3rd April, the company took down the affected website, which is currently showing "under maintenance" notice with a press release about the incident on its homepage.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"We are very sorry for all the people who have been subjected to crime and who may be affected by mental or financial disadvantages. Unfortunately, we are not yet able to know exactly how many people are and what information this information breaks. We have filed an offense report, and the parties do not need to report to the police separately," says Jarmo Hyökyvaara, Chairman of the Board of the New Business Center of Helsinki.&lt;/blockquote&gt;
&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"The maintenance and security of our service was the responsibility of our subcontractor, our long-term partner. Unfortunately, the security of the service has not been enough to prevent this kind of attack. This is, in part, our mistake, and as a subscriber and owner of the service we are responsible for this."&lt;/blockquote&gt;
The company also ensures that the detailed information of its customers was stored on a different system, which was not affected by the data breach.&lt;/div&gt;
&lt;div class="second-place clear" id="second-place" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div id="aim35401471469067958251" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The incident has been reported to the Helsinki police, who is currently investigating the case as a gross fraud.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;As soon as the website returns, users who have an account with the affected website are strongly recommended to change their passwords.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Since the plain-text passwords have been exposed to hackers, it would be a great idea for users to change their passwords for any other website, in case they are using identical to the one used on this website.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2018/04/finlands-3rd-largest-data-breach.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-2190924135004276547</guid><pubDate>Tue, 20 Mar 2018 23:14:00 +0000</pubDate><atom:updated>2018-03-21T04:15:21.456+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Adrian Lamo Death</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">latest news</category><title>Ex-Hacker Adrian Lamo Dies at Age 37  - Mr. R3x</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Ex-Hacker Adrian Lamo Dies at Age 37&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;img alt="Image result for Ex-Hacker Adrian Lamo Dies at Age 37" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXDoFqL4-vXTiuCsrjcXD0_TlEWP_kMa_ioOpmLxtaSt-Vizw9CZQBkrCXCcSWfz-WWqBLBp_-iZ9St7i01pESlBKwpguO0UV4d3YbKaVPaPHG_HCB5aQ1M31hAE1S4-G-ZB8p5nH-dZ6y/s1600-e20/adrian-lamo-hacker-dies.png" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div id="aim17345885752163356601" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
Adrian Lamo, the hacker who tipped off the FBI about Wikileaks whistleblower Chelsea Manning, dies at the age of 37, according to a Facebook post by his father Mario Lamo-Jiménez.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"With great sadness and a broken heart I have to let know all of Adrian's friends and acquaintances that he is dead. A bright mind and compassionate soul is gone, he was my beloved son..."&amp;nbsp; he posted.&lt;/blockquote&gt;
At this moment the cause of death is unknown, though reportedly Adrian was diagnosed with Asperger Syndrome in July 2010 and briefly hospitalized.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Adrian was a former hacker, threat analyst, and writer, who had previously been behind several high-profile security breaches but gained headlines after breaking into The New York Times computer systems in 2002.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="clear" id="insidearticlead" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="clear" id="load-rest" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 15px 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim27345885752163356601" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Adrian was given the appellation "&lt;span style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Homeless Hacker&lt;/span&gt;" by the media because once when he was unemployed he wandered the country by Greyhound bus and hacked corporations from inside abandoned buildings.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;He spent almost six months on home detention and studied journalism before becoming a threat analyst.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;When former US Army intelligence analyst Chelsea Manning (then Bradley Manning) read about his hacking profile in Wired magazine, Manning contacted him, and the pair started exchanging messages online.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Manning found Adrian a "kindred spirit" and told him about his role as an informer for WikiLeaks and how he leaked the most controversial combat&amp;nbsp;&lt;a href="https://www.youtube.com/watch?v=5rXPrfnU3G0" rel="nofollow" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;video footage&lt;/a&gt;&amp;nbsp;of a helicopter shooting unarmed Iraqi civilians and 260,000 classified diplomatic cables to the whistleblowing website.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;However, Adrian then decided to report him and informed the US military of the breach. In an&amp;nbsp;&lt;a href="https://www.theguardian.com/world/2013/jan/03/adrian-lamo-bradley-manning-q-and-a" rel="nofollow" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;interview&lt;/a&gt;&amp;nbsp;with the Guardian in 2013, Adrian defended his decision to turn Chelsea over to the FBI and said:&lt;/div&gt;
&lt;div class="second-place clear" id="second-place" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div id="aim37345885752163356601" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"There were no right choices that day, only less wrong ones. It was cold, it was needful, and it was no one's to make except mine. I couldn't just do anything, knowing lives were in danger, it's classified information, and when you play Russian roulette, how do you know there's not a bullet in the next chamber?"&lt;/blockquote&gt;
&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"Choosing to interdict a man's freedom knowing it could mean his life, is something that's easy to judge but can only really be understood by living it."&lt;/blockquote&gt;
Manning was arrested in May 2010 and sentenced to 35 years in prison for leaking classified documents, though her sentence was later reduced by President Barack Obama, and she was set free last year.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2018/03/ex-hacker-adrian-lamo-dies-at-age-37-mr.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXDoFqL4-vXTiuCsrjcXD0_TlEWP_kMa_ioOpmLxtaSt-Vizw9CZQBkrCXCcSWfz-WWqBLBp_-iZ9St7i01pESlBKwpguO0UV4d3YbKaVPaPHG_HCB5aQ1M31hAE1S4-G-ZB8p5nH-dZ6y/s72-c-e20/adrian-lamo-hacker-dies.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-6792292179620496461</guid><pubDate>Tue, 20 Mar 2018 22:34:00 +0000</pubDate><atom:updated>2018-03-21T03:34:19.561+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">0 day vulnerabilities</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Windows Remote Assistance Exploit Lets Hackers Steal Sensitive Files - Mr. R3x</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;&lt;span style="font-size: x-large;"&gt;Windows Remote Assistance Exploit Lets Hackers Steal Sensitive Files&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;img alt="Image result for Windows Remote Assistance Exploit Lets Hackers Steal Sensitive Files" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikk-sccmu2I7L0JJEk1jRsL8NxCP-n2dbREzJSwfOiOczdhZ2yAWLc6dcnXZa95cDaxxs3jfAZv1js_KIhxmmETN1q2eVsUGxBvSIr1jPIbEfB88Wwo62rldkxICfNQgmU2_BlJ1m9VrRT/s1600-e20/Windows-Remote-Assistance-hacking.jpg" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div id="aim11302873841249249766" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
You have always been warned not to share remote access to your computer with untrusted people for any reason—it's a basic cybersecurity advice, and common sense, right?&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;But what if, I say you should not even trust anyone who invites or offer you full remote access to their computers.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;A critical vulnerability has been discovered in Microsoft's&amp;nbsp;&lt;span style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Windows Remote Assistanc&lt;/span&gt;e (Quick Assist) feature that affects all versions of Windows to date, including Windows 10, 8.1, RT 8.1, and 7, and allows remote attackers to steal sensitive files on the targeted machine.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Windows Remote Assistance is a built-in tool that allows someone you trust to take over your PC (or you to take remote control of others) so they can help you fix a problem from anywhere around the world.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="clear" id="insidearticlead" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="clear" id="load-rest" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 15px 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim21302873841249249766" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The feature relies on the Remote Desktop Protocol (RDP) to establish a secure connection with the person in need.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;However, Nabeel Ahmed of Trend Micro Zero Day Initiative&amp;nbsp;&lt;a href="https://krbtgt.pw/windows-remote-assistance-xxe-vulnerability/" rel="nofollow" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;discovered&lt;/a&gt;&amp;nbsp;and reported an information disclosure vulnerability (CVE-2018-0878) in Windows Remote Assistance that could allow attackers to obtain information to further compromise the victim's system.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The vulnerability, which has been fixed by the company in this month's patch Tuesday, resides in the way Windows Remote Assistance processes XML External Entities (XXE).&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The vulnerability affects Microsoft Windows Server 2016, Windows Server 2012 and R2, Windows Server 2008 SP2 and R2 SP1, Windows 10 (both 32- and 64-bit), Windows 8.1 (both 32- and 64-bit) and RT 8.1, and Windows 7 (both 32- and 64-bit).&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;h3 style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.3em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Exploiting Windows Remote Assistance to Steal Files&lt;/h3&gt;
&lt;div class="separator" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; clear: both; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3HFsMoKm7Wzdq2wQgtk5s3TKYNikYdV6p7T027TV3Ag0LfTU4GIKFPyCZ2CQ1u6zkBIUTGBW6hZejNoA5D8Sh61Uvty4jevZwcbF4KoGnNQOfJb7xA_lGuNRFQFC7EZmoVWwgfMcaSSXG/s1600-e20/Windows-Remote-Assistance-2-min.jpg" imageanchor="1" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; clear: left; color: #157bda; cursor: default; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 1em 0px 0px; outline: none; padding: 0px; pointer-events: none; text-decoration-line: none; vertical-align: baseline;"&gt;&lt;span style="color: #222222;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3HFsMoKm7Wzdq2wQgtk5s3TKYNikYdV6p7T027TV3Ag0LfTU4GIKFPyCZ2CQ1u6zkBIUTGBW6hZejNoA5D8Sh61Uvty4jevZwcbF4KoGnNQOfJb7xA_lGuNRFQFC7EZmoVWwgfMcaSSXG/s1600-e20/Windows-Remote-Assistance-2-min.jpg" imageanchor="1" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; clear: left; color: #157bda; cursor: default; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 1em 0px 0px; outline: none; padding: 0px; pointer-events: none; text-decoration-line: none; vertical-align: baseline;"&gt;&lt;span style="color: #222222;"&gt;Since a security patch for this vulnerability is now available, the researcher has finally released technical details and proof-of-concept exploit code for the flaw to the public.&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;In order to exploit this flaw, which resides in MSXML3 parser, the hacker needs to use "Out-of-Band Data Retrieval" attack technique by offering the victim access to his/her computer via Windows Remote Assistance.&lt;/div&gt;
&lt;div class="second-place clear" id="second-place" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div id="aim31302873841249249766" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;While setting up Windows Remote Assistance, the feature gives you two options—Invite someone to help you and Respond to someone who needs help.&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Selecting the first option helps users generate an invitation file, i.e. 'invitation.msrcincident,' which contains XML data with a lot of parameters and values required for authentication.&lt;/div&gt;
&lt;div id="aim31302873841249249766" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7sMHd3TdPfjW4ScEqcVYT4VWC5EVcC9NdMNWDjMYnagxmDH1uyo1t8afFB-dIZWWBFiBXGQO38mN6fMN0__Dt-XgVtVOF9tZGSsa5L1q6j-Odw7wigw34lB1cd8zT5ojZPu_N9A37BSCm/s1600-e20/windows-hacking-min.jpg" imageanchor="1" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; clear: left; cursor: default; display: inline !important; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 1em 0px 0px; outline: none; padding: 0px; pointer-events: none; text-decoration-line: none; vertical-align: baseline;"&gt;Since the parser does not properly validate the content, the attacker can simply send a specially crafted Remote Assistance invitation file containing a malicious payload to the victim, tricking the targeted computer to submit the content of specific files from known locations to a remote server controlled by the attackers.&lt;/a&gt;&lt;/div&gt;
&lt;div id="aim31302873841249249766" style="-webkit-font-smoothing: antialiased; background-color: white; border: 0px; box-sizing: border-box; font-family: &amp;quot;Source Sans Pro&amp;quot;, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="-webkit-font-smoothing: antialiased; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; color: #222222; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"The stolen information could be submitted as part of the URL in HTTP request(s) to the attacker. In all cases, an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action," Microsoft&amp;nbsp;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0878" rel="nofollow" style="-webkit-font-smoothing: antialiased; border: 0px; box-sizing: border-box; color: #157bda; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;explains&lt;/a&gt;.&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class="tr_bq" style="-webkit-font-smoothing: antialiased; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; color: #222222; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"This XXE vulnerability can be genuinely used in mass scale phishing attacks targeting individuals believing they are truly helping another individual with an IT problem. Totally unaware that the .msrcincident invitation file could potentially result in loss of sensitive information," Ahmed warns.&lt;/blockquote&gt;
&lt;span style="color: #222222;"&gt;Among patching other critical vulnerabilities fixed this month, Windows users are highly recommended to install the latest update for Windows Remote Assistance as soon as possible.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2018/03/windows-remote-assistance-exploit-lets.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikk-sccmu2I7L0JJEk1jRsL8NxCP-n2dbREzJSwfOiOczdhZ2yAWLc6dcnXZa95cDaxxs3jfAZv1js_KIhxmmETN1q2eVsUGxBvSIr1jPIbEfB88Wwo62rldkxICfNQgmU2_BlJ1m9VrRT/s72-c-e20/Windows-Remote-Assistance-hacking.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-7897088012355006254</guid><pubDate>Fri, 12 Jan 2018 12:09:00 +0000</pubDate><atom:updated>2018-01-12T17:09:28.422+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">0 day vulnerabilities</category><category domain="http://www.blogger.com/atom/ns#">CPU Flaw</category><category domain="http://www.blogger.com/atom/ns#">flaw</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: center;"&gt;
&lt;b style="font-size: xx-large;"&gt;[Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;img alt="Image result for [Guide] How to Protect Your Devices Against Meltdown and Spectre Attacks" height="409" src="https://tctechcrunch2011.files.wordpress.com/2018/01/code_meltdown_spectre_2.jpg" width="640" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;Recently uncovered two huge processor vulnerabilities called&amp;nbsp;&lt;/span&gt;&lt;a href="https://thehackernews.com/2018/01/meltdown-spectre-vulnerability.html" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Meltdown and Spectre&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&amp;nbsp;have taken the whole world by storm, while vendors are rushing out to patch the vulnerabilities in its products.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;The issues apply to all modern processors and affect nearly all operating systems (Windows, Linux, Android, iOS, macOS, FreeBSD, and more), smartphones and other computing devices made in the past 20 years.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 1.3em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
What are Spectre and Meltdown?&lt;/h3&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;We have&amp;nbsp;&lt;/span&gt;&lt;a href="https://thehackernews.com/2018/01/meltdown-spectre-vulnerability.html" rel="" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;explained both&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;, Meltdown (CVE-2017-5754) and Spectre (CVE-2017-5753, CVE-2017-5715), exploitation techniques in our previous article.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;In short, Spectre and Meltdown are the names of security vulnerabilities found in many processors from Intel, ARM and AMD that could allow attackers to steal your passwords, encryption keys and other private information.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div id="aim2313467908897683871" style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Both attacks abuse 'speculative execution' to access privileged memory—including those allocated for the kernel—from a low privileged user process like a malicious app running on a device, allowing attackers to steal passwords, login keys, and other valuable information.&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;h3 style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.3em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Protect Against Meltdown and Spectre CPU Flaws&lt;/h3&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
Some, including US-CERT, have suggested the only true patch for these issues is for chips to be replaced, but this solution seems to be impractical for the general user and most companies.&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
Vendors have made significant progress in rolling out fixes and firmware updates. While the Meltdown flaw has already been patched by most companies like Microsoft, Apple and Google, Spectre is not easy to patch and will haunt people for quite some time.&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
Here's the list of available patches from major tech manufacturers:&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;h4 style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.1em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Windows OS (7/8/10) and Microsoft Edge/IE&lt;/h4&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
Microsoft has already released an out-of-band security update (&lt;a href="https://www.catalog.update.microsoft.com/Search.aspx?q=KB4056892" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;KB4056892&lt;/a&gt;) for Windows 10 to address the Meltdown issue and will be releasing patches for Windows 7 and Windows 8 on January 9th.&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
But if you are running a third-party antivirus software then it is possible your system won’t install patches automatically. So, if you are having trouble installing the automatic security update, turn off your antivirus and use Windows Defender or Microsoft Security Essentials.&lt;br /&gt;
&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"The compatibility issue is caused when antivirus applications make unsupported calls into Windows kernel memory," Microsoft noted in a&amp;nbsp;&lt;a href="https://support.microsoft.com/en-us/help/4072699/important-information-regarding-the-windows-security-updates-released" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;blog post&lt;/a&gt;. "These calls may cause stop errors (also known as blue screen errors) that make the device unable to boot."&lt;/blockquote&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;h4 style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.1em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Apple macOS, iOS, tvOS, and Safari Browser&lt;/h4&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
Apple noted in its&amp;nbsp;&lt;a href="https://support.apple.com/en-us/HT208394" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;advisory&lt;/a&gt;, "All Mac systems and iOS devices are affected, but there are no known exploits impacting customers at this time."&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
To help defend against the Meltdown attacks, Apple has already released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2, has planned to release mitigations in Safari to help defend against Spectre in the coming days.&lt;br /&gt;
&lt;h4 style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.1em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Android OS&lt;/h4&gt;
&lt;div style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
Android users running the most recent version of the mobile operating system released on January 5 as part of the&amp;nbsp;&lt;a href="https://source.android.com/security/bulletin/2018-01-01" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Android January security patch&lt;/a&gt;&amp;nbsp;update are protected, according to Google.&lt;/div&gt;
&lt;div class="clear" style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;ins class="adsbygoogle" data-ad-client="ca-pub-7983783048239650" data-ad-format="auto" data-ad-slot="8662821141" data-adsbygoogle-status="done" style="border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 90px; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;So, if you own a Google-branded phone, like Nexus or Pixel, your phone will either automatically download the update, or you'll simply need to install it. However, other Android users have to wait for their device manufacturers to release a compatible security update.&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
The tech giant also noted that it's unaware of any successful exploitation of either Meltdown or Spectre on ARM-based Android devices.&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;h4 style="border: 0px; box-sizing: border-box; font-size: 1.1em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Firefox Web Browser&lt;/h4&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
Mozilla has released&amp;nbsp;&lt;a href="https://www.mozilla.org/en-US/security/advisories/mfsa2018-01/" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Firefox version 57.0.4&lt;/a&gt;&amp;nbsp;which includes mitigations for both Meltdown and Spectre timing attacks. So users are advised to update their installations as soon as possible.&lt;br /&gt;
&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"Since this new class of attacks involves measuring precise time intervals, as a partial, short-term mitigation we are disabling or reducing the precision of several time sources in Firefox," Mozilla software engineer Luke Wagner wrote in a&amp;nbsp;&lt;a href="https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;blog post&lt;/a&gt;.&lt;/blockquote&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;h4 style="border: 0px; box-sizing: border-box; font-size: 1.1em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Google Chrome Web Browser&lt;/h4&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
Google has scheduled the patches for Meltdown and Spectre exploits on January 23 with the release of Chrome 64, which will include mitigations to protect your desktop and smartphone from web-based attacks.&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
In the meantime, users can enable an experimental feature called "Site Isolation" that can offer some protection against the web-based exploits but might also cause performance problems.&lt;br /&gt;
&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"Site Isolation makes it harder for untrusted websites to access or steal information from your accounts on other websites. Websites typically cannot access each other's data inside the browser, thanks to code that enforces the Same Origin Policy." Google&amp;nbsp;&lt;a href="https://www.chromium.org/Home/chromium-security/site-isolation" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;says&lt;/a&gt;.&lt;/blockquote&gt;
Here's how to turn on Site Isolation:&lt;br /&gt;
&lt;div style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;ul style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Copy chrome://flags/#enable-site-per-process and paste it into the URL field at the top of your Chrome web browser, and then hit the Enter key.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Look for Strict Site Isolation, then click the box labelled Enable.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Once done, hit Relaunch Now to relaunch your Chrome browser.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;h4 style="border: 0px; box-sizing: border-box; font-size: 1.1em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Linux Distributions&lt;/h4&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
The Linux kernel developers have also released patches for the Linux kernel with releases including versions 4.14.11, 4.9.74, 4.4.109, 3.16.52, 3.18.91 and 3.2.97, which can be downloaded from&amp;nbsp;&lt;a href="https://kernel.org/" style="border: 0px; box-sizing: border-box; color: #428bca; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;"&gt;Kernel.org&lt;/a&gt;.&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;h4 style="border: 0px; box-sizing: border-box; font-size: 1.1em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
VMware and Citrix&lt;/h4&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
A global leader in cloud computing and virtualisation, VMware, has also&amp;nbsp;&lt;a href="https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;released&lt;/a&gt;&amp;nbsp;a list of its products affected by the two attacks and security updates for its ESXi, Workstation and Fusion products to patch against Meltdown attacks.&lt;br /&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
On the other hand, another popular cloud computing and virtualisation vendor Citrix did not release any security patches to address the issue. Instead, the company guided its customers and&amp;nbsp;&lt;a href="https://support.citrix.com/article/CTX231399" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;recommended&lt;/a&gt;&amp;nbsp;them to check for any update on relevant third-party software.&lt;ins id="aswift_2_expand" style="background-color: transparent; border: none; box-sizing: border-box; display: inline-table; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 90px; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 728px;"&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2018/01/guide-how-to-protect-your-devices.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-6641147234542300017</guid><pubDate>Fri, 12 Jan 2018 12:02:00 +0000</pubDate><atom:updated>2018-01-12T17:02:59.444+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">flaw</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><category domain="http://www.blogger.com/atom/ns#">whatsApp</category><title>WhatsApp Flaw Could Allow 'Potential Attackers' to Spy On Encrypted Group Chats </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: x-large;"&gt;WhatsApp Flaw Could Allow 'Potential Attackers' to Spy On Encrypted Group Chats&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;img alt="Image result for WhatsApp Flaw Could Allow 'Potential Attackers' to Spy On Encrypted Group Chats" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcRTXZFkpnHVHqyEcrYrm2EWn15g0grgUIz4HoZ-iu71W44Er5_SPCfq4Va-9wTeWjnnbCHzKwceXJ8T2p1RUul-CtVP5WVpGzWjhzYAsdeI71sWz95YdvVv7B8m0QOdxU9ppKBZ2g2H15/s640/whatsapp-group-encryption-spying.png" width="640" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;A more dramatic revelation of 2018—an outsider can secretly eavesdrop on your private end-to-end encrypted group chats on WhatsApp and Signal messaging apps.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Considering protection against three types of attackers—malicious user, network attacker, and malicious server—an end-to-end encryption protocol plays a vital role in securing instant messaging services.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The primary purpose of having end-to-end encryption is to stop trusting the intermediate servers in such a way that no one, not even the company or the server that transmits the data, can decrypt your messages or abuse its centralized position to manipulate the service.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div id="aim21530723366280062674" style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
In order words—assuming the worst-case scenario—a corrupt company employee should not be able to eavesdrop on the end-to-end encrypted communication by any mean.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;However, so far even the popular end-to-end encrypted messaging services, like WhatsApp, Threema and Signal, have not entirely achieved zero-knowledge system.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Researchers from Ruhr-Universität Bochum (RUB) in Germany found that anyone who controls WhatsApp/Signal servers can covertly add new members to any private group, allowing them to spy on group conversations, even without the permission of the administrator.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;As described by the researchers, in the pairwise communication (when only two users communicate with each other) server plays a limited role, but in case of multi-user chats (group chat where encrypted messages are broadcasted to many users), the role of servers increases to manage the entire process.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;That's where the issue resides, i.e. trusting the company's servers to manage group members (who eventually have full access to the group conversation) and their actions.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;As explained in the newly&amp;nbsp;&lt;a href="https://eprint.iacr.org/2017/713.pdf" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;published&lt;/a&gt;&amp;nbsp;RUB paper, titled&lt;i style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;"More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema,"&lt;/i&gt;&amp;nbsp;since both Signal and WhatsApp fail to properly authenticate that who is adding a new member to the group, it is possible for an unauthorized person—not a group administrator or even a member of the group—to add someone to the group chat.&lt;/div&gt;
&lt;div class="clear" style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;ins class="adsbygoogle" data-ad-client="ca-pub-7983783048239650" data-ad-format="auto" data-ad-slot="8662821141" data-adsbygoogle-status="done" style="border: 0px; box-sizing: border-box; display: block; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 90px; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;What's more? If you are wondering that adding a new member to the group will show a visual notification to other members, it is not the case.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;According to the researchers, a compromised admin or rogue employee with access to the server could manipulate (or block) the group management messages that are supposed to alert group members of a new member.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"The described weaknesses enable attacker A, who controls the WhatsApp server or can break the transport layer security, to take full control over a group. Entering the group, however, leaves traces since this operation is listed in the graphical user interface. The WhatsApp server can therefore use the fact that it can stealthily reorder and drop messages in the group," the paper reads.&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"Thereby it can cache sent messages to the group, read their content first and decide in which order they are delivered to the members. Additionally, the WhatsApp server can forward these messages to the members individually such that a subtly chosen combination of messages can help it to cover the traces."&lt;/blockquote&gt;
WhatsApp has acknowledged the issue, but argued that if any new member is added to a group, let's say by anyone, other group members will get notified for sure.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"We've looked at this issue carefully. Existing members are notified when new people are added to a WhatsApp group. We built WhatsApp so group messages cannot be sent to a hidden user," a WhatsApp spokesperson&amp;nbsp;&lt;a href="https://www.wired.com/story/whatsapp-security-flaws-encryption-group-chats/" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;told&lt;/a&gt;&amp;nbsp;Wired.&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"The privacy and security of our users is incredibly important to WhatsApp. It's why we collect very little information and all messages sent on WhatsApp are end-to-end encrypted."&lt;/blockquote&gt;
But if you are not part of a group with very selected members, I'm sure many of you would relatively ignore such notifications easily.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Researchers also advised companies to fix the issue just by adding an authentication mechanism to make sure that the "signed" group management messages come from the group administrator only.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;However, this attack is not easy (exception—services under legal pressure) to execute, so users should not be worried about it.&lt;ins id="aswift_2_expand" style="background-color: transparent; border: none; box-sizing: border-box; display: inline-table; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: 90px; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 728px;"&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2018/01/whatsapp-flaw-could-allow-potential.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcRTXZFkpnHVHqyEcrYrm2EWn15g0grgUIz4HoZ-iu71W44Er5_SPCfq4Va-9wTeWjnnbCHzKwceXJ8T2p1RUul-CtVP5WVpGzWjhzYAsdeI71sWz95YdvVv7B8m0QOdxU9ppKBZ2g2H15/s72-c/whatsapp-group-encryption-spying.png" width="72"/><thr:total>0</thr:total><enclosure length="1341282" type="application/pdf" url="https://eprint.iacr.org/2017/713.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>WhatsApp Flaw Could Allow 'Potential Attackers' to Spy On Encrypted Group Chats&amp;nbsp; A more dramatic revelation of 2018—an outsider can secretly eavesdrop on your private end-to-end encrypted group chats on WhatsApp and Signal messaging apps.Considering protection against three types of attackers—malicious user, network attacker, and malicious server—an end-to-end encryption protocol plays a vital role in securing instant messaging services.The primary purpose of having end-to-end encryption is to stop trusting the intermediate servers in such a way that no one, not even the company or the server that transmits the data, can decrypt your messages or abuse its centralized position to manipulate the service. In order words—assuming the worst-case scenario—a corrupt company employee should not be able to eavesdrop on the end-to-end encrypted communication by any mean.However, so far even the popular end-to-end encrypted messaging services, like WhatsApp, Threema and Signal, have not entirely achieved zero-knowledge system.Researchers from Ruhr-Universität Bochum (RUB) in Germany found that anyone who controls WhatsApp/Signal servers can covertly add new members to any private group, allowing them to spy on group conversations, even without the permission of the administrator.As described by the researchers, in the pairwise communication (when only two users communicate with each other) server plays a limited role, but in case of multi-user chats (group chat where encrypted messages are broadcasted to many users), the role of servers increases to manage the entire process.That's where the issue resides, i.e. trusting the company's servers to manage group members (who eventually have full access to the group conversation) and their actions.As explained in the newly&amp;nbsp;published&amp;nbsp;RUB paper, titled&amp;nbsp;"More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema,"&amp;nbsp;since both Signal and WhatsApp fail to properly authenticate that who is adding a new member to the group, it is possible for an unauthorized person—not a group administrator or even a member of the group—to add someone to the group chat. What's more? If you are wondering that adding a new member to the group will show a visual notification to other members, it is not the case.According to the researchers, a compromised admin or rogue employee with access to the server could manipulate (or block) the group management messages that are supposed to alert group members of a new member. "The described weaknesses enable attacker A, who controls the WhatsApp server or can break the transport layer security, to take full control over a group. Entering the group, however, leaves traces since this operation is listed in the graphical user interface. The WhatsApp server can therefore use the fact that it can stealthily reorder and drop messages in the group," the paper reads.&amp;nbsp; "Thereby it can cache sent messages to the group, read their content first and decide in which order they are delivered to the members. Additionally, the WhatsApp server can forward these messages to the members individually such that a subtly chosen combination of messages can help it to cover the traces." WhatsApp has acknowledged the issue, but argued that if any new member is added to a group, let's say by anyone, other group members will get notified for sure. "We've looked at this issue carefully. Existing members are notified when new people are added to a WhatsApp group. We built WhatsApp so group messages cannot be sent to a hidden user," a WhatsApp spokesperson&amp;nbsp;told&amp;nbsp;Wired.&amp;nbsp; "The privacy and security of our users is incredibly important to WhatsApp. It's why we collect very little information and all messages sent on WhatsApp are end-to-end encrypted." But if you are not part of a group with very selected members, I'm sure many of you would relatively ignore such notifications easily.Researchers also advised companies to fix the issue just by adding an authentication mechanism to make sure that the "signed" group management messages come from the group administrator only.However, this attack is not easy (exception—services under legal pressure) to execute, so users should not be worried about it.</itunes:subtitle><itunes:author>noreply@blogger.com (T-W-S)</itunes:author><itunes:summary>WhatsApp Flaw Could Allow 'Potential Attackers' to Spy On Encrypted Group Chats&amp;nbsp; A more dramatic revelation of 2018—an outsider can secretly eavesdrop on your private end-to-end encrypted group chats on WhatsApp and Signal messaging apps.Considering protection against three types of attackers—malicious user, network attacker, and malicious server—an end-to-end encryption protocol plays a vital role in securing instant messaging services.The primary purpose of having end-to-end encryption is to stop trusting the intermediate servers in such a way that no one, not even the company or the server that transmits the data, can decrypt your messages or abuse its centralized position to manipulate the service. In order words—assuming the worst-case scenario—a corrupt company employee should not be able to eavesdrop on the end-to-end encrypted communication by any mean.However, so far even the popular end-to-end encrypted messaging services, like WhatsApp, Threema and Signal, have not entirely achieved zero-knowledge system.Researchers from Ruhr-Universität Bochum (RUB) in Germany found that anyone who controls WhatsApp/Signal servers can covertly add new members to any private group, allowing them to spy on group conversations, even without the permission of the administrator.As described by the researchers, in the pairwise communication (when only two users communicate with each other) server plays a limited role, but in case of multi-user chats (group chat where encrypted messages are broadcasted to many users), the role of servers increases to manage the entire process.That's where the issue resides, i.e. trusting the company's servers to manage group members (who eventually have full access to the group conversation) and their actions.As explained in the newly&amp;nbsp;published&amp;nbsp;RUB paper, titled&amp;nbsp;"More is Less: On the End-to-End Security of Group Chats in Signal, WhatsApp, and Threema,"&amp;nbsp;since both Signal and WhatsApp fail to properly authenticate that who is adding a new member to the group, it is possible for an unauthorized person—not a group administrator or even a member of the group—to add someone to the group chat. What's more? If you are wondering that adding a new member to the group will show a visual notification to other members, it is not the case.According to the researchers, a compromised admin or rogue employee with access to the server could manipulate (or block) the group management messages that are supposed to alert group members of a new member. "The described weaknesses enable attacker A, who controls the WhatsApp server or can break the transport layer security, to take full control over a group. Entering the group, however, leaves traces since this operation is listed in the graphical user interface. The WhatsApp server can therefore use the fact that it can stealthily reorder and drop messages in the group," the paper reads.&amp;nbsp; "Thereby it can cache sent messages to the group, read their content first and decide in which order they are delivered to the members. Additionally, the WhatsApp server can forward these messages to the members individually such that a subtly chosen combination of messages can help it to cover the traces." WhatsApp has acknowledged the issue, but argued that if any new member is added to a group, let's say by anyone, other group members will get notified for sure. "We've looked at this issue carefully. Existing members are notified when new people are added to a WhatsApp group. We built WhatsApp so group messages cannot be sent to a hidden user," a WhatsApp spokesperson&amp;nbsp;told&amp;nbsp;Wired.&amp;nbsp; "The privacy and security of our users is incredibly important to WhatsApp. It's why we collect very little information and all messages sent on WhatsApp are end-to-end encrypted." But if you are not part of a group with very selected members, I'm sure many of you would relatively ignore such notifications easily.Researchers also advised companies to fix the issue just by adding an authentication mechanism to make sure that the "signed" group management messages come from the group administrator only.However, this attack is not easy (exception—services under legal pressure) to execute, so users should not be worried about it.</itunes:summary><itunes:keywords>flaw, Tbits-in, whatsApp</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-8888494554860048440</guid><pubDate>Fri, 12 Jan 2018 12:00:00 +0000</pubDate><atom:updated>2018-01-12T17:00:16.224+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AMD</category><category domain="http://www.blogger.com/atom/ns#">ARM</category><category domain="http://www.blogger.com/atom/ns#">CPU Flaw</category><category domain="http://www.blogger.com/atom/ns#">Intel</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Meltdown and Spectre CPU Flaws Affect Intel, ARM, AMD Processors </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: x-large;"&gt;Meltdown and Spectre CPU Flaws Affect Intel, ARM, AMD Processors&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;img alt="Image result for Meltdown and Spectre CPU Flaws Affect Intel, ARM, AMD Processors" height="428" src="https://www.safeharboroncyber.com/Blog/wp-content/uploads/2018/01/Spectre-meltdown.jpg" width="640" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;Unlike the&amp;nbsp;&lt;/span&gt;&lt;a href="https://thehackernews.com/2018/01/intel-kernel-vulnerability.html" rel="nofollow" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;initial reports&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&amp;nbsp;suggested about Intel chips being vulnerable to some severe ‘memory leaking’ flaws, full technical details about the vulnerabilities have now been emerged, which revealed that almost every modern processor since 1995 is vulnerable to the issues.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;Disclosed today by&amp;nbsp;&lt;/span&gt;&lt;a href="https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html" rel="nofollow" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Google Project Zero&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;, the vulnerabilities potentially impact all major CPUs, including those from AMD, ARM, and Intel—threatening almost all PCs, laptops, tablets, and smartphones, regardless of manufacturer or operating system.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;These hardware vulnerabilities have been categorized into&amp;nbsp;&lt;/span&gt;&lt;a href="https://meltdownattack.com/" rel="nofollow" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;two attacks&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;, named&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; font-stretch: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Meltdown&lt;/span&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&amp;nbsp;(CVE-2017-5754) and&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; font-stretch: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Spectre&lt;/span&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&amp;nbsp;(CVE-2017-5753 and CVE-2017-5715), which could allow attackers to steal sensitive data which is currently processed on the computer.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;Both attacks take advantage of a feature in chips known as "speculative execution," a technique used by most modern CPUs to optimize performance.&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq" style="background-color: white; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
"In order to improve performance, many CPUs may choose to speculatively execute instructions based on assumptions that are considered likely to be true. During speculative execution, the processor is verifying these assumptions; if they are valid, then the execution continues. If they are invalid, then the execution is unwound, and the correct execution path can be started based on the actual conditions," Project Zero says.&lt;/blockquote&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;source sans pro&amp;quot; , , &amp;quot;blinkmacsystemfont&amp;quot; , &amp;quot;source sans pro&amp;quot; , &amp;quot;open sans&amp;quot; , &amp;quot;segoe ui&amp;quot; , &amp;quot;roboto&amp;quot; , &amp;quot;oxygen&amp;quot; , &amp;quot;ubuntu&amp;quot; , &amp;quot;cantarell&amp;quot; , &amp;quot;fira sans&amp;quot; , &amp;quot;droid sans&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;Therefore, it is possible for such speculative execution to have "side effects which are not restored when the CPU state is unwound and can lead to information disclosure," which can be accessed using side-channel attacks.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 1.3em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Meltdown Attack&lt;/h3&gt;
&lt;iframe allow="autoplay; encrypted-media" allowfullscreen="" frameborder="0" height="440" src="https://www.youtube.com/embed/bReA1dvGJ6Y" width="710"&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The first issue, Meltdown (&lt;/span&gt;&lt;a href="https://meltdownattack.com/meltdown.pdf" rel="nofollow" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;paper&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;), allows attackers to read not only kernel memory but also the entire physical memory of the target machines, and therefore all secrets of other programs and the operating system.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq" style="background-color: white; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
“Meltdown is a related microarchitectural attack which exploits out-of-order execution in order to leak the target’s physical memory.”&lt;/blockquote&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Meltdown uses speculative execution to break the isolation between user applications and the operating system, allowing any application to access all system memory, including memory allocated for the kernel.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq" style="background-color: white; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
“Meltdown exploits a privilege escalation vulnerability specific to Intel processors, due to which speculatively executed instructions can bypass memory protection.”&lt;/blockquote&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Nearly all desktop, laptop, and cloud computers affected by Meltdown.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 1.3em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Spectre Attack&lt;/h3&gt;
&lt;div class="separator" style="background-color: white; border: 0px; box-sizing: border-box; clear: both; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO5A_S4KekpHMEgR-NRuBV7CGBMi0bMxxZFv3nzXr-VV_BkS9-YJK5jXadxthOLGKLjQdk0RVyJNKSiCsmBn6cenk11fRv1ASQLPqWOqc_M5uA2_DWFQgItd7OH3Bk-4BcBcXktapBllz_/s1600/exploit-for-spectre-vulnerability.png" imageanchor="1" style="border: 0px; box-sizing: border-box; clear: left; color: #428bca; cursor: default; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 1em 0px 0px; outline: none; padding: 0px; pointer-events: none; text-decoration-line: none; vertical-align: baseline;"&gt;&lt;img alt="exploit-for-spectre-vulnerability" border="0" data-original-height="144" data-original-width="728" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO5A_S4KekpHMEgR-NRuBV7CGBMi0bMxxZFv3nzXr-VV_BkS9-YJK5jXadxthOLGKLjQdk0RVyJNKSiCsmBn6cenk11fRv1ASQLPqWOqc_M5uA2_DWFQgItd7OH3Bk-4BcBcXktapBllz_/s1600/exploit-for-spectre-vulnerability.png" style="border: 0px; box-sizing: border-box; clear: both; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; max-width: 728px; outline: none; padding: 0px; vertical-align: baseline;" title="exploit-for-spectre-vulnerability" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The second problem, Spectre (&lt;/span&gt;&lt;a href="https://spectreattack.com/spectre.pdf" rel="nofollow" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;paper&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;), is not easy to patch and will haunt people for quite some time since this issue requires changes to processor architecture in order to fully mitigate.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Spectre attack breaks the isolation between different applications, allowing the attacker-controlled program to trick error-free programs into leaking their secrets by forcing them into accessing arbitrary portions of its memory, which can then be read through a side channel.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Spectre attacks can be used to leak information from the kernel to user programs, as well as from virtualization hypervisors to guest systems.&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq" style="background-color: white; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
“In addition to violating process isolation boundaries using native code, Spectre attacks can also be used to violate browser sandboxing, by mounting them via portable JavaScript code. We wrote a JavaScript program that successfully reads data from the address space of the browser process running it.” the paper explains.&lt;/blockquote&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;
&lt;blockquote class="tr_bq" style="background-color: white; border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(238, 238, 238); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 15px 0px; outline: 0px; padding: 0px 15px; quotes: none; vertical-align: baseline;"&gt;
“KAISER patch, which has been widely applied as a mitigation to the Meltdown attack, does not protect against Spectre.”&lt;/blockquote&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;According to researchers, this vulnerability impacts almost every system, including desktops, laptops, cloud servers, as well as smartphones—powered by Intel, AMD, and ARM chips.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;h3 style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 1.3em; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
What You Should Do: Mitigations And Patches&lt;/h3&gt;
&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Many vendors have security patches available for one or both of these attacks.&lt;/span&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Windows —&lt;/span&gt;&amp;nbsp;Microsoft has issued an out-of-band patch update for Windows 10, while other versions of Windows will be patched on the traditional Patch Tuesday on January 9, 2018&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;MacOS —&lt;/span&gt;&amp;nbsp;Apple had already fixed most of these security holes in macOS High Sierra 10.13.2 last month, but MacOS 10.13.3 will enhance or complete these mitigations.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Linux —&lt;/span&gt;&amp;nbsp;Linux kernel developers have also released patches by implementing kernel page-table isolation (KPTI) to move the kernel into an entirely separate address space.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Android&amp;nbsp;—&lt;/span&gt;&amp;nbsp;Google has released security patches for Pixel/Nexus users as part of the Android January security patch update.&amp;nbsp; Other users have to wait for their device manufacturers to release a compatible security update.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; box-sizing: border-box; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;h4 style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: 1.1em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Mitigations for Chrome Users&lt;/span&gt;&lt;/h4&gt;
&lt;div style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Since this exploit can be executed through the website, Chrome users can turn on Site Isolation feature on their devices to mitigate these flaws.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Here's how to turn Site Isolation on Windows, Mac, Linux, Chrome OS or Android:&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;ul style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Copy&amp;nbsp;&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;chrome://flags/#enable-site-per-process&lt;/i&gt;&lt;/span&gt;&amp;nbsp;and paste it into the URL field at the top of your Chrome web browser, and then hit the Enter key.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Look for Strict Site Isolation, then click the box labeled Enable.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Once done, hit&amp;nbsp;&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Relaunch Now&lt;/i&gt;&lt;/span&gt;&amp;nbsp;to relaunch your Chrome browser.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;There is no single fix for both the attacks since each requires protection independently.&lt;/span&gt;&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2018/01/meltdown-and-spectre-cpu-flaws-affect.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/bReA1dvGJ6Y/default.jpg" width="72"/><thr:total>0</thr:total><enclosure length="263245" type="application/pdf" url="https://meltdownattack.com/meltdown.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Meltdown and Spectre CPU Flaws Affect Intel, ARM, AMD Processors&amp;nbsp; Unlike the&amp;nbsp;initial reports&amp;nbsp;suggested about Intel chips being vulnerable to some severe ‘memory leaking’ flaws, full technical details about the vulnerabilities have now been emerged, which revealed that almost every modern processor since 1995 is vulnerable to the issues. Disclosed today by&amp;nbsp;Google Project Zero, the vulnerabilities potentially impact all major CPUs, including those from AMD, ARM, and Intel—threatening almost all PCs, laptops, tablets, and smartphones, regardless of manufacturer or operating system. These hardware vulnerabilities have been categorized into&amp;nbsp;two attacks, named&amp;nbsp;Meltdown&amp;nbsp;(CVE-2017-5754) and&amp;nbsp;Spectre&amp;nbsp;(CVE-2017-5753 and CVE-2017-5715), which could allow attackers to steal sensitive data which is currently processed on the computer. Both attacks take advantage of a feature in chips known as "speculative execution," a technique used by most modern CPUs to optimize performance. "In order to improve performance, many CPUs may choose to speculatively execute instructions based on assumptions that are considered likely to be true. During speculative execution, the processor is verifying these assumptions; if they are valid, then the execution continues. If they are invalid, then the execution is unwound, and the correct execution path can be started based on the actual conditions," Project Zero says. Therefore, it is possible for such speculative execution to have "side effects which are not restored when the CPU state is unwound and can lead to information disclosure," which can be accessed using side-channel attacks. Meltdown Attack The first issue, Meltdown (paper), allows attackers to read not only kernel memory but also the entire physical memory of the target machines, and therefore all secrets of other programs and the operating system. “Meltdown is a related microarchitectural attack which exploits out-of-order execution in order to leak the target’s physical memory.” Meltdown uses speculative execution to break the isolation between user applications and the operating system, allowing any application to access all system memory, including memory allocated for the kernel. “Meltdown exploits a privilege escalation vulnerability specific to Intel processors, due to which speculatively executed instructions can bypass memory protection.” Nearly all desktop, laptop, and cloud computers affected by Meltdown. Spectre Attack The second problem, Spectre (paper), is not easy to patch and will haunt people for quite some time since this issue requires changes to processor architecture in order to fully mitigate.Spectre attack breaks the isolation between different applications, allowing the attacker-controlled program to trick error-free programs into leaking their secrets by forcing them into accessing arbitrary portions of its memory, which can then be read through a side channel. Spectre attacks can be used to leak information from the kernel to user programs, as well as from virtualization hypervisors to guest systems. “In addition to violating process isolation boundaries using native code, Spectre attacks can also be used to violate browser sandboxing, by mounting them via portable JavaScript code. We wrote a JavaScript program that successfully reads data from the address space of the browser process running it.” the paper explains. “KAISER patch, which has been widely applied as a mitigation to the Meltdown attack, does not protect against Spectre.” According to researchers, this vulnerability impacts almost every system, including desktops, laptops, cloud servers, as well as smartphones—powered by Intel, AMD, and ARM chips. What You Should Do: Mitigations And Patches Many vendors have security patches available for one or both of these attacks. Windows —&amp;nbsp;Microsoft has issued an out-of-band patch update for Windows 10, while other versions of Windows will be patched on the traditional Patch Tuesday on January 9, 2018 MacOS —&amp;nbsp;Apple had already fixed most of these security holes in macOS High Sierra 10.13.2 last month, but MacOS 10.13.3 will enhance or complete these mitigations. Linux —&amp;nbsp;Linux kernel developers have also released patches by implementing kernel page-table isolation (KPTI) to move the kernel into an entirely separate address space. Android&amp;nbsp;—&amp;nbsp;Google has released security patches for Pixel/Nexus users as part of the Android January security patch update.&amp;nbsp; Other users have to wait for their device manufacturers to release a compatible security update. Mitigations for Chrome Users Since this exploit can be executed through the website, Chrome users can turn on Site Isolation feature on their devices to mitigate these flaws. Here's how to turn Site Isolation on Windows, Mac, Linux, Chrome OS or Android: Copy&amp;nbsp;chrome://flags/#enable-site-per-process&amp;nbsp;and paste it into the URL field at the top of your Chrome web browser, and then hit the Enter key. Look for Strict Site Isolation, then click the box labeled Enable. Once done, hit&amp;nbsp;Relaunch Now&amp;nbsp;to relaunch your Chrome browser. There is no single fix for both the attacks since each requires protection independently.</itunes:subtitle><itunes:author>noreply@blogger.com (T-W-S)</itunes:author><itunes:summary>Meltdown and Spectre CPU Flaws Affect Intel, ARM, AMD Processors&amp;nbsp; Unlike the&amp;nbsp;initial reports&amp;nbsp;suggested about Intel chips being vulnerable to some severe ‘memory leaking’ flaws, full technical details about the vulnerabilities have now been emerged, which revealed that almost every modern processor since 1995 is vulnerable to the issues. Disclosed today by&amp;nbsp;Google Project Zero, the vulnerabilities potentially impact all major CPUs, including those from AMD, ARM, and Intel—threatening almost all PCs, laptops, tablets, and smartphones, regardless of manufacturer or operating system. These hardware vulnerabilities have been categorized into&amp;nbsp;two attacks, named&amp;nbsp;Meltdown&amp;nbsp;(CVE-2017-5754) and&amp;nbsp;Spectre&amp;nbsp;(CVE-2017-5753 and CVE-2017-5715), which could allow attackers to steal sensitive data which is currently processed on the computer. Both attacks take advantage of a feature in chips known as "speculative execution," a technique used by most modern CPUs to optimize performance. "In order to improve performance, many CPUs may choose to speculatively execute instructions based on assumptions that are considered likely to be true. During speculative execution, the processor is verifying these assumptions; if they are valid, then the execution continues. If they are invalid, then the execution is unwound, and the correct execution path can be started based on the actual conditions," Project Zero says. Therefore, it is possible for such speculative execution to have "side effects which are not restored when the CPU state is unwound and can lead to information disclosure," which can be accessed using side-channel attacks. Meltdown Attack The first issue, Meltdown (paper), allows attackers to read not only kernel memory but also the entire physical memory of the target machines, and therefore all secrets of other programs and the operating system. “Meltdown is a related microarchitectural attack which exploits out-of-order execution in order to leak the target’s physical memory.” Meltdown uses speculative execution to break the isolation between user applications and the operating system, allowing any application to access all system memory, including memory allocated for the kernel. “Meltdown exploits a privilege escalation vulnerability specific to Intel processors, due to which speculatively executed instructions can bypass memory protection.” Nearly all desktop, laptop, and cloud computers affected by Meltdown. Spectre Attack The second problem, Spectre (paper), is not easy to patch and will haunt people for quite some time since this issue requires changes to processor architecture in order to fully mitigate.Spectre attack breaks the isolation between different applications, allowing the attacker-controlled program to trick error-free programs into leaking their secrets by forcing them into accessing arbitrary portions of its memory, which can then be read through a side channel. Spectre attacks can be used to leak information from the kernel to user programs, as well as from virtualization hypervisors to guest systems. “In addition to violating process isolation boundaries using native code, Spectre attacks can also be used to violate browser sandboxing, by mounting them via portable JavaScript code. We wrote a JavaScript program that successfully reads data from the address space of the browser process running it.” the paper explains. “KAISER patch, which has been widely applied as a mitigation to the Meltdown attack, does not protect against Spectre.” According to researchers, this vulnerability impacts almost every system, including desktops, laptops, cloud servers, as well as smartphones—powered by Intel, AMD, and ARM chips. What You Should Do: Mitigations And Patches Many vendors have security patches available for one or both of these attacks. Windows —&amp;nbsp;Microsoft has issued an out-of-band patch update for Windows 10, while other versions of Windows will be patched on the traditional Patch Tuesday on January 9, 2018 MacOS —&amp;nbsp;Apple had already fixed most of these security holes in macOS High Sierra 10.13.2 last month, but MacOS 10.13.3 will enhance or complete these mitigations. Linux —&amp;nbsp;Linux kernel developers have also released patches by implementing kernel page-table isolation (KPTI) to move the kernel into an entirely separate address space. Android&amp;nbsp;—&amp;nbsp;Google has released security patches for Pixel/Nexus users as part of the Android January security patch update.&amp;nbsp; Other users have to wait for their device manufacturers to release a compatible security update. Mitigations for Chrome Users Since this exploit can be executed through the website, Chrome users can turn on Site Isolation feature on their devices to mitigate these flaws. Here's how to turn Site Isolation on Windows, Mac, Linux, Chrome OS or Android: Copy&amp;nbsp;chrome://flags/#enable-site-per-process&amp;nbsp;and paste it into the URL field at the top of your Chrome web browser, and then hit the Enter key. Look for Strict Site Isolation, then click the box labeled Enable. Once done, hit&amp;nbsp;Relaunch Now&amp;nbsp;to relaunch your Chrome browser. There is no single fix for both the attacks since each requires protection independently.</itunes:summary><itunes:keywords>AMD, ARM, CPU Flaw, Intel, windows</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-2888798341838621046</guid><pubDate>Fri, 12 Jan 2018 11:54:00 +0000</pubDate><atom:updated>2018-01-12T16:54:15.761+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">0 day vulnerabilities</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><category domain="http://www.blogger.com/atom/ns#">windows</category><title>Microsoft Releases Patches for 16 Critical Flaws, Including a Zero-Day</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Microsoft Releases Patches for 16 Critical Flaws, Including a Zero-Day&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;img alt="Related image" height="306" src="https://i1.wp.com/securityaffairs.co/wordpress/wp-content/uploads/2016/11/windows-zero-day.png?resize=702%2C336" width="640" /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;If you think that only CPU updates that address this year's major security flaws—&lt;/span&gt;&lt;a href="https://thehackernews.com/2018/01/meltdown-spectre-patches.html" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Meltdown and Spectre&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;—are the only ones you are advised to grab immediately, there are a handful of major security flaws that you should pay attention to.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Microsoft has issued its first Patch Tuesday for 2018 to address 56 CVE-listed flaws, including a zero-day vulnerability in MS Office related that had been actively exploited by several threat groups in the wild.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Sixteen of the security updates are listed as critical, 38 are rated important, one is rated moderate, and one is rated as low in severity. The updates address security flaws in Windows, Office, Internet Explorer, Edge, ChakraCore, ASP.NET, and the .NET Framework.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The zero-day vulnerability (&lt;/span&gt;&lt;a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0802" rel="nofollow" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;CVE-2018-0802&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;), described by Microsoft as a memory corruption flaw in Office, is already being targeted in the wild by several threat actor groups in the past few months.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The vulnerability, discovered by several researchers from Chinese companies Tencent and Qihoo 360, ACROS Security's 0Patch Team, and Check Point Software Technologies, can be exploited for remote code execution by tricking a targeted user into opening a specially crafted malicious Word file in MS Office or WordPad.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;According to the company, this security flaw is related to CVE-2017-11882—a 17-year-old&amp;nbsp;&lt;/span&gt;&lt;a href="https://thehackernews.com/2017/11/microsoft-office-rce-exploit.html" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;vulnerability in the Equation Editor&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;functionality (EQNEDT32.EXE), which Microsoft addressed in November.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;When researchers at 0Patch were analysing CVE-2017-11882, they discovered a new, related vulnerability (CVE-2018-0802). More details of CVE-2018-0802 can be found in a&amp;nbsp;&lt;/span&gt;&lt;a href="https://research.checkpoint.com/another-office-equation-rce-vulnerability/" rel="nofollow" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;blog post&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;published by Check Point.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Besides CVE-2018-0802, the company has addressed nine more remote code execution and memory disclosure vulnerabilities in MS Office.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;A spoofing vulnerability (CVE-2018-0819) in Microsoft Outlook for MAC, which has been listed as publicly disclosed (&lt;/span&gt;&lt;a href="https://thehackernews.com/2017/12/email-spoofing-client.html" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Mailsploit attack&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;), has also addressed by the company. The vulnerability does not allow some versions Outlook for Mac to handle the encoding and display of email addresses properly, causing antivirus or anti-spam scanning not to work as intended.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Microsoft also addressed a certificate validation bypass vulnerability (CVE-2018-0786) in .NET Framework (and .NET Core) that could allow malware authors to show their invalid certificates as valid.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;"An attacker could present a certificate that is marked invalid for a specific use, but the component uses it for that purpose," describes Microsoft. "This action disregards the Enhanced Key Usage taggings."&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The company has also patched a total of 15 vulnerabilities in the scripting engine used by Microsoft Edge and Internet Explorer.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;All these flaws could be exploited for remote code execution by tricking a targeted user into opening a specially-crafted webpage that triggers a memory corruption error, though none of these has been exploited in the wild yet.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Meanwhile, Adobe has&amp;nbsp;&lt;/span&gt;&lt;a href="https://helpx.adobe.com/security/products/flash-player/apsb18-01.html" rel="nofollow" style="background-color: white; border: 0px; box-sizing: border-box; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-east-asian: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;patched&lt;/a&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;a single, out of bounds read flaw (CVE-2018-4871) this month that could allow for information disclosure, though no active exploits have been seen in the wild.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Users are strongly advised to apply security patches as soon as possible to keep hackers and cybercriminals away from taking control of their computers.&lt;/span&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; box-sizing: border-box; color: #222222; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #222222; font-family: &amp;quot;Source Sans Pro&amp;quot;, -apple-system, BlinkMacSystemFont, &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Open Sans&amp;quot;, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Fira Sans&amp;quot;, &amp;quot;Droid Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;For installing security updates, simply head on to Settings → Update &amp;amp; security → Windows Update → Check for updates, or you can install the updates manually.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2018/01/microsoft-releases-patches-for-16.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-4181504870573914336</guid><pubDate>Thu, 17 Aug 2017 17:45:00 +0000</pubDate><atom:updated>2017-08-17T22:45:37.790+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><title>8 More Chrome Extensions Hijacked to Target 4.8 Million Users</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 align="justify" class="post-title url" itemprop="headline name" style="background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #212121; font-family: Source Sans Pro, Helvetica Neue, Helvetica, Helvetica, Arial, sans-serif; font-size: x-large;"&gt;8 More Chrome Extensions Hijacked to Target 4.8 Million Users&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;img alt="Image result for 8 More Chrome Extensions Hijacked to Target 4.8 Million Users" height="420" src="data:image/jpeg;base64,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" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div id="aim11246810080710201017" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
Google's Chrome web browser Extensions are under attack with a series of developers being hacked within last one month.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Almost two weeks ago, we reported how unknown attackers managed to compromise the Chrome Web Store account of a developer team and&amp;nbsp;&lt;a href="http://thehackernews.com/2017/07/chrome-extention-hacking-adware.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;hijacked Copyfish extension&lt;/a&gt;, and then modified it to distribute spam correspondence to users.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Just two days after that incident, some unknown attackers then&amp;nbsp;&lt;a href="http://thehackernews.com/2017/08/chrome-extension-for-web-developers.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;hijacked another popular extension&lt;/a&gt;'&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Web Developer&lt;/span&gt;' and then updated it to directly inject advertisements into the web browser of over its 1 million users.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="clear" id="insidearticlead" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="clear" style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 15px 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim21246810080710201017" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;After Chris Pederick, the creator of 'Web Developer' Chrome extension that offers various web development tools to its users, reported to Proofpoint that his extension had been compromised, the security vendor analysed the issue and found further add-ons in the Chrome Store that had also been altered.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;According to the latest report&amp;nbsp;&lt;a href="https://www.proofpoint.com/us/threat-insight/post/threat-actor-goes-chrome-extension-hijacking-spree" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;published&lt;/a&gt;&amp;nbsp;by the researchers at Proofpoint on Monday, the expanded list of compromised Chrome Extensions are as below:&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;ul style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Chrometana (1.1.3)&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Infinity New Tab (3.12.3)&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;CopyFish (2.8.5)&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Web Paint (1.2.1)&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Social Fixer (20.1.1)&lt;/li&gt;
&lt;/ul&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Proofpoint researcher Kafeine also believes Chrome extensions TouchVPN and Betternet VPN were also compromised in the same way at the end of June.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;In all the above cases, some unknown attackers first gained access to the developers' Google web accounts by sending out phishing emails with malicious links to steal account credentials.&lt;/div&gt;
&lt;div class="clear" id="load-rest" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div id="aim31246810080710201017" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Once the attackers gained access to the accounts, either they hijacked their respective extensions and then modified them to perform malicious tasks, or they add malicious Javascript code to them in an attempt to hijack traffic and expose users to fake ads and password theft in order to generate revenue.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;In the case of the&amp;nbsp;&lt;a href="http://thehackernews.com/2017/07/chrome-extention-hacking-adware.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Copyfish extension&lt;/a&gt;, the attackers even moved the whole extension to one of its developers' accounts, preventing the software company from removing the infected extension from the Chrome store, even after being spotted compromised behaviour of the extension.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(221, 221, 221); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px 30px; quotes: none; vertical-align: baseline;"&gt;
"Threat actors continue to look for new ways to drive traffic to affiliate programs and effectively surface malicious advertisements to users," researchers concluded. "In the cases described here, they are leveraging compromised Chrome extensions to hijack traffic and substitute advertisements on victims' browsers."&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(221, 221, 221); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px 30px; quotes: none; vertical-align: baseline;"&gt;
"Once they obtain developer credentials through emailed phishing campaigns, they can publish malicious versions of legitimate extensions."&lt;/blockquote&gt;
At this time, it is unclear who is behind the hijackings of Chrome Web extensions.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The best way to protect yourself from such attacks is always to be suspicious of uninvited documents sent over a phishing email and never click on links inside those documents unless verifying the source.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/08/8-more-chrome-extensions-hijacked-to.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-380676865400698812</guid><pubDate>Thu, 17 Aug 2017 17:42:00 +0000</pubDate><atom:updated>2017-08-17T22:42:28.374+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><title>Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 align="justify" class="post-title url" itemprop="headline name" style="background-color: white; border: 0px; box-sizing: border-box; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #212121; font-family: Source Sans Pro, Helvetica Neue, Helvetica, Helvetica, Arial, sans-serif; font-size: x-large;"&gt;Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;img alt="Image result for Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwOXrRf3y20AFHej-ypofMNtfK3lzHlYgyHsIuzDPJ_cNrEN4nanNwym-UGUSk_HJximW2ym6fj8dPJGNGwt6qHSBl1ZGP3o4nXEJl6hueCNg9ZgpAAV8zJsDluewdtIzH8oLSXRA8Kj6T/s640/hotel-wifi-hacking.png" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div id="aim13068994232813007895" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
An infamous Russian-linked cyber-espionage group has been found re-using the same leaked NSA hacking tool that was deployed in the&amp;nbsp;&lt;a href="http://thehackernews.com/2017/05/how-to-wannacry-ransomware.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;WannaCry&lt;/a&gt;&amp;nbsp;and NotPetya outbreaks—this time to target Wi-Fi networks to spy on hotel guests in several European countries.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Security researchers at FireEye have&amp;nbsp;&lt;a href="https://www.fireeye.com/blog/threat-research/2017/08/apt28-targets-hospitality-sector.html" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;uncovered&lt;/a&gt;&amp;nbsp;an ongoing campaign that remotely steals credentials from high-value guests using Wi-Fi networks at European hotels and attributed it to the&amp;nbsp;&lt;a href="http://thehackernews.com/2016/11/windows-zeroday-exploit.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Fancy Bear&lt;/a&gt;hacking group.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Fancy Bear&lt;/span&gt;—also known as APT28, Sofacy, Sednit, and Pawn Storm—has been operating since at least 2007 and also been accused of&amp;nbsp;&lt;a href="http://thehackernews.com/2016/07/hillary-clinton-hacked.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;hacking the Democratic National Committee&lt;/a&gt;&amp;nbsp;(DNC) and Clinton Campaign in an attempt to influence the U.S. presidential election.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="clear" id="insidearticlead" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="clear" style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 15px 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim23068994232813007895" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The newly-discovered campaign is also exploiting the Windows SMB exploit (CVE-2017-0143), called&amp;nbsp;&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://thehackernews.com/2017/04/swift-banking-hacking-tool.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;EternalBlue&lt;/a&gt;&lt;/span&gt;, which was one of many exploits allegedly used by the NSA for surveillance and leaked by the Shadow Brokers in April.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;EternalBlue is a security vulnerability which leverages a version of Windows' Server Message Block (SMB) version 1 networking protocol to laterally spread across networks and also allowed the WannaCry and Petya ransomware to spread across the world quickly.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Since the EternalBlue code is available for anyone to use, cyber criminals are widely trying to use the exploit to make their malware more powerful.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Just last week, a new version of credential stealing&amp;nbsp;&lt;a href="http://thehackernews.com/2017/08/trickbot-banking-trojan.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;TrickBot banking Trojan&lt;/a&gt;&amp;nbsp;was found leveraging SMB to spread locally across networks, though the trojan was not leveraging EternalBlue at that time.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;However, researchers have now found someone deploying the exploit to upgrade their attack.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="border-bottom-color: initial; border-bottom-style: initial; border-image: initial; border-left-color: rgb(221, 221, 221); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 0px 2px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px 30px; quotes: none; vertical-align: baseline;"&gt;
"To spread through the hospitality company's network, APT28 used a version of the EternalBlue SMB exploit," FireEye researchers write. "This is the first time we have seen APT28 incorporate this exploit into their intrusions."&lt;/blockquote&gt;
Researchers have seen ongoing attacks targeting a number of companies in the hospitality sector, including hotels in at least seven countries in Europe and one Middle Eastern country.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;h3 style="border: 0px; box-sizing: border-box; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.3em; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Here's How the Attack is Carried Out&lt;/h3&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The attacks began with a spear phishing email sent to one of the hotel employees. The email contains a malicious document named "Hotel_Reservation_Form.doc," which uses macros to decode and deploy GameFish, malware known to be used by&amp;nbsp;&lt;a href="http://thehackernews.com/2017/07/russian-fancy-bear-hacking-group.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Fancy Bear&lt;/a&gt;.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Once installed on the targeted hotel's network,&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;GameFish&lt;/span&gt;&amp;nbsp;uses the&amp;nbsp;&lt;a href="http://thehackernews.com/2017/05/wannacry-ransomware-windows.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;EternalBlue SMB exploit&lt;/a&gt;&amp;nbsp;to laterally spread across the hotel network and find systems that control both guest and internal Wi-Fi networks.&lt;/div&gt;
&lt;div class="clear" id="load-rest" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div id="aim33068994232813007895" style="background-color: white; border: 0px; box-sizing: border-box; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Once under control, the malware deploys&amp;nbsp;&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://github.com/SpiderLabs/Responder" rel="nofollow" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Responder&lt;/a&gt;&lt;/span&gt;, an open source penetration testing tool created by Laurent Gaffie of SpiderLabs, for NetBIOS Name Service (NBT-NS) poisoning in order to steal credentials sent over the wireless network.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;While the hacking group carried out the attack against the hotel network, researchers believe that the group could also directly target "hotel guests of interest"—generally business and government personnel who travel in a foreign country.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The researchers revealed one such incident that occurred in 2016 where Fancy Bear accessed the computer and Outlook Web Access (OWA) account of a guest staying at a hotel in Europe, 12 hours after victim connected to the hotel’s Wi-Fi network.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;This is not the only attack that apparently aimed at guests of hotels. South Korea-nexus Fallout Team (also known as&amp;nbsp;&lt;a href="http://thehackernews.com/2014/11/darkhotel-apt-malware-targets-global.html" style="border: 0px; box-sizing: border-box; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;DarkHotel&lt;/a&gt;) has previously carried out such attacks against Asian hotels to steal information from senior executives from large global companies during their business trips.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Duqu 2.0 malware also found targeting the WiFi networks of European hotels used by participants in the Iranian nuclear negotiations. Also, high-profile people visiting Russia and China may have their laptops and other electronic devices accessed.&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="box-sizing: border-box; content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;The easiest way to protect yourself is to avoid connecting to hotel Wi-Fi networks or any other public or untrusted networks, and instead, use your mobile device hotspot to get access to the Internet.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/08/cyberspies-are-using-leaked-nsa-hacking.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwOXrRf3y20AFHej-ypofMNtfK3lzHlYgyHsIuzDPJ_cNrEN4nanNwym-UGUSk_HJximW2ym6fj8dPJGNGwt6qHSBl1ZGP3o4nXEJl6hueCNg9ZgpAAV8zJsDluewdtIzH8oLSXRA8Kj6T/s72-c/hotel-wifi-hacking.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-2224347806396994480</guid><pubDate>Fri, 07 Jul 2017 15:08:00 +0000</pubDate><atom:updated>2017-07-07T20:08:25.888+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">0 day vulnerabilities</category><category domain="http://www.blogger.com/atom/ns#">android</category><category domain="http://www.blogger.com/atom/ns#">cyber security</category><category domain="http://www.blogger.com/atom/ns#">hacked</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">malware</category><title>CopyCat Android Rooting Malware Infected 14 Million Devices</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="background-color: white; margin-bottom: 21px;"&gt;
&lt;span style="color: #080e14; font-family: Raleway, sans-serif; font-size: x-large;"&gt;&lt;b&gt;CopyCat Android Rooting Malware Infected 14 Million Devices&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
&lt;img alt="hackingsmartphonepd.jpg" height="426" src="http://zdnet1.cbsistatic.com/hub/i/r/2017/07/07/c32c69de-dae9-417c-976e-580cd83553c8/resize/770xauto/5f4b3820fee52d862ed11a883f0c8c4e/hackingsmartphonepd.jpg" width="640" /&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
CopyCat Android mobile malware was able to infect over 14 million devices last year and root eight million of them, researchers have revealed.&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
The malware, spread through popular apps repackaged with the malicious code and distributed through third-party stores and phishing scams -- but not Google Play -- infects devices in order to generate and steal advertising revenue.&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
&lt;a href="http://blog.checkpoint.com/2017/07/06/how-the-copycat-malware-infected-android-devices-around-the-world/" style="color: #1174c7; cursor: pointer; text-decoration-line: none;"&gt;According to Check Point researchers&lt;/a&gt;, the hackers behind the campaign were able to earn roughly $1.5 million in two months, infecting 14 million devices globally and rooting 8 million of them in what the security team calls an "an unprecedented success rate."&lt;/div&gt;
&lt;figure class="image  image-full-width shortcode-image" style="background-color: white; clear: both; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin: 0px; padding-bottom: 20px; width: 770px;"&gt;&lt;span class="img aspect-set " style="display: block; padding-bottom: 508.188px; position: relative;"&gt;&lt;img alt="screen-shot-2017-07-07-at-08-47-01.jpg" class="" data-original="    http://zdnet3.cbsistatic.com/hub/i/r/2017/07/07/e0cc51f7-40c1-416f-8d54-17fa9c9e7eee/resize/770xauto/b19535e0aa5bdace6225721bae77a322/screen-shot-2017-07-07-at-08-47-01.jpg" height="423" src="http://zdnet3.cbsistatic.com/hub/i/r/2017/07/07/e0cc51f7-40c1-416f-8d54-17fa9c9e7eee/resize/770xauto/b19535e0aa5bdace6225721bae77a322/screen-shot-2017-07-07-at-08-47-01.jpg" style="animation: fadeIn 0.5s; border: 0px; display: block; font-size: 0.33333em; left: 0px; margin: 0px auto 21px; max-width: 100%; position: absolute; top: 0px;" width="640" /&gt;&lt;/span&gt;&lt;figcaption style="font-size: 0.75em; font-style: italic; line-height: 1.5; margin: 14px 0px 28px; text-align: center;"&gt;&lt;span class="credit"&gt;Check Point&lt;/span&gt;&lt;/figcaption&gt;&lt;/figure&gt;&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
Once a device is infected, CopyCat waits until a restart to allay suspicion then attempts to root the device. Check Point says that CopyCat was able to successfully root 54 percent of all the devices it infected, "which is very unusual even with sophisticated malware."&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
In order to achieve root status, the malicious code uses six different vulnerabilities for Android versions 5 and earlier through an "upgrade" pack pulled from Amazon web storage. Some of the flaws the malware tests for are extremely old and the most modern ones were discovered over two years ago -- and so should your device be patched and up-to-date, CopyCat should not be a worry.&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
"These old exploits are still effective because users patch their devices infrequently, or not at all," the researchers note.&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
The malware then injects malicious code into the Zygote app launching process, which permits attackers to generate fraudulent revenue by installing apps and substituting the user's referrer ID with their own, as well as display fraudulent ads and applications.&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
This technique was first used by the Triada Trojan.&amp;nbsp;&lt;a href="https://securelist.com/everyone-sees-not-what-they-want-to-see/74997/" style="color: #1174c7; cursor: pointer; text-decoration-line: none;"&gt;According to Kaspersky Labs&lt;/a&gt;, the malware targeted the same process to gain superuser privileges before using regular Linux debugging tools to embed its DLL and target mobile browsers.&lt;/div&gt;
&lt;section class="sharethrough-top" data-component="medusaContentRecommendation" data-medusa-content-recommendation-options="{&amp;quot;promo&amp;quot;:&amp;quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&amp;quot;,&amp;quot;spot&amp;quot;:&amp;quot;dfp-in-article&amp;quot;}" style="background-color: white; clear: both; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin: 0px 0px 10px; padding: 0px; width: 770px;"&gt;&lt;/section&gt;&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
In total, fraudulent ads were displayed on 26 percent of infected devices, while 30 percent were used to steal credit for installing apps on Google Play. In addition, Check Point says the malware would also send device brand, model, OS version and country to CopyCat command and control (C&amp;amp;C) centers.&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
At the peak of the campaign in April and May 2016, CopyCat mainly infected users in Asia, although over 280,000 infections were also recorded in the United States.&lt;/div&gt;
&lt;figure class="image  image-full-width shortcode-image" style="background-color: white; clear: both; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin: 0px; padding-bottom: 20px; width: 770px;"&gt;&lt;span class="img aspect-set " style="display: block; padding-bottom: 500.5px; position: relative;"&gt;&lt;img alt="screen-shot-2017-07-07-at-08-46-48.jpg" class="" data-original="    http://zdnet4.cbsistatic.com/hub/i/r/2017/07/07/aa1c4875-b338-410c-b91e-1a6ded9f22e2/resize/770xauto/ed70295ab9d462e31ad4eadb19576cf5/screen-shot-2017-07-07-at-08-46-48.jpg" height="418" src="http://zdnet4.cbsistatic.com/hub/i/r/2017/07/07/aa1c4875-b338-410c-b91e-1a6ded9f22e2/resize/770xauto/ed70295ab9d462e31ad4eadb19576cf5/screen-shot-2017-07-07-at-08-46-48.jpg" style="animation: fadeIn 0.5s; border: 0px; display: block; font-size: 0.33333em; left: 0px; margin: 0px auto 21px; max-width: 100%; position: absolute; top: 0px;" width="640" /&gt;&lt;span style="font-size: 0.75em; font-style: italic; text-align: center;"&gt;Check Poin&lt;/span&gt;&lt;/span&gt;&lt;/figure&gt;&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
Google was able to quell the campaign, and now the current number of infected devices is far lower -- but those affected by the malware may still be generating revenue for the attackers today.&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
The researchers are not sure who is behind the malware campaign but has tentatively linked MobiSummer as some of the malware's code is signed by the Chinese ad network.&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
&lt;strong&gt;See also:&amp;nbsp;&lt;a href="http://www.zdnet.com/article/windows-ransomware-found-to-be-incredibly-rare/" style="color: #1174c7; cursor: pointer; text-decoration-line: none;"&gt;Windows ransomware found to be incredibly rare&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #080e14; font-family: Raleway, sans-serif; font-size: 18px; margin-bottom: 21px;"&gt;
Earlier this week, a UK teenager was&amp;nbsp;&lt;a href="http://www.zdnet.com/article/uk-teenager-charged-over-ddos-for-hire-service-used-in-global-attacks/" style="color: #1174c7; cursor: pointer; text-decoration-line: none;"&gt;charged for supplying malware&lt;/a&gt;&amp;nbsp;for use in distributed denial-of-service (DDoS) attacks and assisting criminals in striking high-profile targets worldwide, including NatWest, Vodafone, O2, BBC, BT, Amazon, Netflix, and Virgin Media, among others.r&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/07/copycat-android-rooting-malware.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-4485011405289970083</guid><pubDate>Fri, 07 Jul 2017 14:59:00 +0000</pubDate><atom:updated>2017-08-17T22:48:20.560+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">AlphaBay</category><category domain="http://www.blogger.com/atom/ns#">black marcket</category><category domain="http://www.blogger.com/atom/ns#">deep web</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">scam</category><title>AlphaBay Dark Web Market Goes Down; Users Fear Exit-Scam</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-size: x-large;"&gt;&lt;b&gt;AlphaBay Dark Web Market Goes Down; Users Fear Exit-Scam&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;img alt="Image result for AlphaBay Dark Web Market Goes Down; Users Fear Exit-Scam W AlphaBay Dark Web Market Goes Down; Users Fear Exit-Scam" height="360" src="https://pbs.twimg.com/media/DEAcWIbXkAAzqvJ.jpg" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div id="aim16865667508338673415" style="border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
AlphaBay Market, one of the largest&amp;nbsp;&lt;a href="http://thehackernews.com/2016/02/deep-web-search-engine.html" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Dark Web&lt;/a&gt;&amp;nbsp;marketplaces for drugs, guns, and other illegal goods, suddenly disappeared overnight without any explanation from its admins, leaving its customers who have paid large sums in panic.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
&lt;a href="http://thehackernews.com/2017/01/alphabay-darkweb.html" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;AlphaBay&lt;/a&gt;, also known as "the new Silk Road," has been shut down since Tuesday night. The site also came in the news at the beginning of this year when a hacker successfully&amp;nbsp;&lt;a href="http://thehackernews.com/2017/01/alphabay-darkweb.html" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;hacked the AlphaBay site&amp;nbsp;&lt;/a&gt;and stole over 200,000 private unencrypted messages from several users.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
Although the website sometimes goes down for maintenance, customers are speculating that the admins have stolen all their Bitcoins for good measure, when heard no words from the site's admins on the downtime.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="clear" id="insidearticlead" style="border: 0px; clear: both; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="clear" style="border: 0px; clear: both; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 15px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim26865667508338673415" style="border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
Some users at Reddit and Twitter are claiming that AlphaBay's admins may have shut down the marketplace to withdraw a huge number of bitcoins from the site's accounts.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
The withdrawal&amp;nbsp;&lt;a href="https://blockchain.info/address/359FSXmTtzgpgphvRf439XdwmiQkWPDcyX" rel="nofollow" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Bitcoin transactions&lt;/a&gt;&amp;nbsp;total 1,479.03904709 Bitcoin (roughly $3.8 Million), which led to suspicion from some users that the site’s admins may have pulled an exit scam to steal user funds.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
In March 2015, the largest (at the time) dark web market '&lt;a href="http://thehackernews.com/2015/03/evolution-drug-market-bitcoin.html" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Evolution' suddenly disappeared&lt;/a&gt;&amp;nbsp;overnight from the Internet, stealing millions of dollars worth of Bitcoins from its customers.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
However, users no need to worry—at least right now when nothing is confirmed, and the timing of the two incidents—site downtime and Bitcoin withdrawals—may be just coincidental.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
This is not the first time AlphaBay goes offline. Last year, the site went down for about four days. Also, the blockchain transactions of about $3.8 Million are not enough for AlphaBay moderators to go offline.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
One user on Reddit&amp;nbsp;&lt;a href="https://www.reddit.com/r/AlphaBayMarket/comments/6ldxp8/chill_the_fuck_out_everyone/?st=j4s3nvnm&amp;amp;sh=561ab738" rel="nofollow" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;calls&lt;/a&gt;&amp;nbsp;for calm and patience, saying "Now I'll admit I don't know for sure what's going on, and I am a bit nervous myself because if this is the end then I've lost a couple of hundred dollars myself But think about it Last year alphabay went down for about 4 days."&lt;/div&gt;
&lt;div class="clear" style="border: 0px; clear: both; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div id="aim36865667508338673415" style="border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
"Everyone was saying for sure that this was it, but it was not. It took the alphabay moderators days to update people on what was going on too; they're known to do this. Also about that blockchain transaction.. 44 bitcoins rounds off to about 4 million US. [I don’t know] about you but that doesn't sound like nearly enough money."&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
While AlphaBay continues to be down, and AlphaBay-associated Redditor who goes by moniker Big_Muscles has&amp;nbsp;&lt;a href="https://www.reddit.com/user/Big_Muscles" rel="nofollow" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;called&lt;/a&gt;&amp;nbsp;users to calm down, saying the site's servers are under update and will be "back online soon."&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
Also unlike&amp;nbsp;&lt;a href="http://thehackernews.com/2016/07/bitcoin-silk-road.html" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Silk Road&lt;/a&gt;, there is no indication that the law enforcement took down the AlphaBay marketplace.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
&lt;a href="http://thehackernews.com/2014/04/silk-road-dealer-plead-guilty-for_25.html" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Silk Road was shut down&lt;/a&gt;&amp;nbsp;in 2013 after the arrest of its unassuming founder,&amp;nbsp;&lt;a href="http://thehackernews.com/2015/05/silk-road-ross-ulbricht.html" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Ross William Ulbricht&lt;/a&gt;. The FBI seized bitcoins (worth about $33.6 million, at the time) from the site, which were later&amp;nbsp;&lt;a href="http://thehackernews.com/2016/08/bitcoin-auction.html" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;sold in a series of auctions&lt;/a&gt;&amp;nbsp;by the United States Marshals Service (USMS).&lt;/div&gt;
&lt;span style="color: #212121; font-family: &amp;quot;source sans pro&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 17px;"&gt;AlphaBay Market, one of the largest Dark Web marketplaces for drugs, guns, and other illegal goods, suddenly disappeared overnight without any explanation from its admins, leaving its customers who have paid large sums in panic. AlphaBay, also known as "the new Silk Road," has been shut down since Tuesday night. The site also came in the news at the beginning of this year when a hacker successfully hacked the AlphaBay site and stole over 200,000 private unencrypted messages from several users. Although the website sometimes goes down for maintenance, customers are speculating that the admins have stolen all their Bitcoins for good measure, when heard no words from the site's admins on the downtime. Some users at Reddit and Twitter are claiming that AlphaBay's admins may have shut down the marketplace to withdraw a huge number of bitcoins from the site's accounts. The withdrawal Bitcoin transactions total 1,479.03904709 Bitcoin (roughly $3.8 Million), which led to suspicion from some users that the site’s admins may have pulled an exit scam to steal user funds. In March 2015, the largest (at the time) dark web market 'Evolution' suddenly disappeared overnight from the Internet, stealing millions of dollars worth of Bitcoins from its customers. However, users no need to worry—at least right now when nothing is confirmed, and the timing of the two incidents—site downtime and Bitcoin withdrawals—may be just coincidental. This is not the first time AlphaBay goes offline. Last year, the site went down for about four days. Also, the blockchain transactions of about $3.8 Million are not enough for AlphaBay moderators to go offline. One user on Reddit calls for calm and patience, saying "Now I'll admit I don't know for sure what's going on, and I am a bit nervous myself because if this is the end then I've lost a couple of hundred dollars myself But think about it Last year alphabay went down for about 4 days." "Everyone was saying for sure that this was it, but it was not. It took the alphabay moderators days to update people on what was going on too; they're known to do this. Also about that blockchain transaction.. 44 bitcoins rounds off to about 4 million US. [I don’t know] about you but that doesn't sound like nearly enough money." While AlphaBay continues to be down, and AlphaBay-associated Redditor who goes by moniker Big_Muscles has called users to calm down, saying the site's servers are under update and will be "back online soon." Also unlike Silk Road, there is no indication that the law enforcement took down the AlphaBay marketplace. Silk Road was shut down in 2013 after the arrest of its unassuming founder, Ross William Ulbricht. The FBI seized bitcoins (worth about $33.6 million, at the time) from the site, which were later sold in a series of auctions by the United States Marshals Service (USMS).&lt;/span&gt;&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/07/alphabay-dark-web-market-goes-down.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-53160830898403712</guid><pubDate>Fri, 07 Jul 2017 13:53:00 +0000</pubDate><atom:updated>2017-07-07T18:53:04.243+05:00</atom:updated><title>This newly discovered bug allows any website to crash a Windows Vista, 7, or 8 PC</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="post-title item fn" itemprop="name" style="background-color: white; border: 0px; color: #19232d; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; margin: 0px 35px 0px 0px; padding: 0px 0px 0px 18px; position: relative; vertical-align: baseline;"&gt;
&lt;span style="font-size: x-large;"&gt;This newly discovered bug allows any website to crash a Windows Vista, 7, or 8 PC&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;img alt="How To Crash A Windows Computer With Newly Discovered Bug" height="306" src="https://www.techworm.net/wp-content/uploads/2017/05/hack-like-pro-crash-your-roommates-windows-7-pc-with-link.1280x600.jpg" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Windows 7 users may want to forget this month as soon as possible. Recently, the widely spread WannaCry ransomware virus had infected computers around the world, of which majority of those affected were Windows 7 users. And, now in what looks like a major throwback from the 1990s, a new bug has been discovered that can slow down and crash systems running Windows Vista, Windows 7 or Windows 8/8.1, reports&amp;nbsp;&lt;a href="https://arstechnica.co.uk/information-technology/2017/05/in-a-throwback-to-the-90s-ntfs-bug-lets-anyone-hang-or-crash-windows-7-8-1/" rel="noopener noreferrer" style="border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration-line: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;ArsTechnica&lt;/a&gt;. Malicious users can abuse this bug to attack other people’s systems by using certain bad filenames to lock their system or crash it with a blue screen of death (BSOD).&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
For those unfamiliar, this newly discovered bug is an upgraded version of an annoying old bug known as&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;concon&lt;/strong&gt;. This was a computer bug that appeared in the Windows 95 and Windows 98 operating systems and was considered as a security vulnerability because malicious web pages would crash systems with links such as&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;file:///C:/con/con&lt;/strong&gt;.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
So, how does this new iteration of bug work? This bug allows a malicious website to load an image file with the “&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;$MFT&lt;/strong&gt;” name in the directory path. “$MFT” is a filename given to a special metadata file that’s used by Windows’ NTFS filesystems. Since the file exists in the root directory of each NTFS volume, it’s hidden from view and inaccessible to most software. However, it is handled by the NTFS driver in special ways.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
When someone tries embedding certain bad filenames by using them as image sources, it can lock the system or occasionally crash with a BSOD. For instance, if you are trying to open the file c:\$MFT\123, the NTFS driver locks the filesystem and never releases it, which in turn prevents any apps that are running from accessing data on the hard drive. This ultimately causes the affected system to slow down, hang, or worse, crash by making way for the dreaded BSOD. The only way that you can get yourself out of this situation is by rebooting your system.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
While Microsoft has been informed of the bug, it is not clear as of yet when it will release a fix for the problem. Meanwhile, Windows 10 users remain unaffected by the new bug.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/07/this-newly-discovered-bug-allows-any.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-6784376194379040532</guid><pubDate>Fri, 07 Jul 2017 13:48:00 +0000</pubDate><atom:updated>2017-07-07T18:59:19.069+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bitcoin</category><category domain="http://www.blogger.com/atom/ns#">cryptocurrencies</category><category domain="http://www.blogger.com/atom/ns#">hacked</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><title>Largest Cryptocurrency Exchange Hacked! Over $1 Million Worth Bitcoin and Ether Stolen</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 align="justify" class="post-title url" itemprop="headline name" style="background-color: #fafafa; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-size: x-large;"&gt;Largest Cryptocurrency Exchange Hacked! Over $1 Million Worth Bitcoin and Ether Stolen&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;img alt="Image result for Largest Cryptocurrency Exchange Hacked! Over $1 Million Worth Bitcoin and Ether Stolen" height="426" src="https://i2.wp.com/securityaffairs.co/wordpress/wp-content/uploads/2017/07/Bithumb-hacked.jpg?resize=725%2C483" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div id="aim12718861094696346763" style="background-color: #fafafa; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
One of the world's largest Bitcoin and Ether cryptocurrencies exchanges Bithumb has recently been hacked, resulting in loss of more than $1 Million in cryptocurrencies after a number of its user accounts compromised.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
Bithumb is South Korea's largest cryptocurrency exchange with 20% of global ether trades, and roughly 10% of the global bitcoin trade is exchanged for South Korea's currency, the Won.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
Bithumb is currently the&amp;nbsp;&lt;a href="https://coinmarketcap.com/exchanges/volume/24-hour/all/" rel="nofollow" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;fourth largest&lt;/a&gt;&amp;nbsp;Bitcoin exchange and the biggest&amp;nbsp;&lt;a href="https://coinmarketcap.com/currencies/ethereum/#markets" rel="nofollow" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Ethereum exchange&lt;/a&gt;&amp;nbsp;in the world.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
Last week, a cyber attack on the cryptocurrency exchange giant&amp;nbsp;&lt;a href="https://bravenewcoin.com/news/fourth-largest-bitcoin-exchange-bithumb-hacked-for-billions-of-won/" rel="nofollow" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;resulted&lt;/a&gt;&amp;nbsp;in a number of user accounts being compromised, and billions of South Korean Won were stolen from customers accounts.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="clear" id="insidearticlead" style="background-color: #fafafa; border: 0px; clear: both; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="clear" style="border: 0px; clear: both; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 15px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div id="aim22718861094696346763" style="background-color: #fafafa; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
Around 10 Million Won worth of bitcoins were allegedly stolen from a single victim's account, according to the Kyunghyang Shinmun, a major local newspaper.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
A survey of users who lost cryptocurrencies in the cyber attack reveals "&lt;i style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;it is estimated that hundreds of millions of won [worth of cryptocurrencies] have been withdrawn from accounts of one hundred investors. One member claims to have had&amp;nbsp;&lt;a href="http://biz.khan.co.kr/khan_art_view.html?artid=201707031758001&amp;amp;code=920100" rel="nofollow" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;1.2 billion won stolen&lt;/a&gt;.&lt;/i&gt;"&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
Besides digital currencies, hackers were succeeded in stealing the personal information of 31,800 Bithumb website users, including their names, email addresses, and mobile phone numbers, the South Korean government-funded Yonhap News&amp;nbsp;&lt;a href="http://english.yonhapnews.co.kr/national/2017/07/03/52/0302000000AEN20170703010400320F.html" rel="nofollow" style="border: 0px; color: #365899; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;reported&lt;/a&gt;.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
However, Bithumb claims that this number represents approximately 3% of its customers.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
The exchange also told Yonhap that it contacted South Korea's cybercrime watchdog on June 30, Friday after it learned of the hack on June 29.&lt;/div&gt;
&lt;div class="clear" style="background-color: #fafafa; border: 0px; clear: both; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div id="aim32718861094696346763" style="background-color: #fafafa; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 17px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
Bithumb believes that one of its employee's home computer was hacked in the attack and not its entire network and no passwords were compromised, so it is impossible for hackers to gain direct access to user accounts.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
The digital currency exchange says that the loss of funds is the result of using "disposable passwords" in order to carry out digital transactions online.&lt;br /&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
&lt;blockquote class="tr_bq" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; quotes: none; vertical-align: baseline;"&gt;
"The employee PC, not the head office server, was hacked. Personal information such as mobile phone and email address of some users were leaked," Bithumb told the newspaper. "However, some customers were found to have been stolen from because of the disposable password used in electronic financial transactions."&lt;/blockquote&gt;
&lt;br style="margin: 0px; outline: 0px; padding: 0px;" /&gt;
While more than 100 Bithumb customers have already filed a complaint with the National Police Agency's cybercrime report center regarding the hack, South Korean officials are now investigating the incident.&lt;/div&gt;
&lt;span style="background-color: #fafafa; color: #212121; font-family: &amp;quot;source sans pro&amp;quot; , &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 17px;"&gt;One of the world's largest Bitcoin and Ether cryptocurrencies exchanges Bithumb has recently been hacked, resulting in loss of more than $1 Million in cryptocurrencies after a number of its user accounts compromised. Bithumb is South Korea's largest cryptocurrency exchange with 20% of global ether trades, and roughly 10% of the global bitcoin trade is exchanged for South Korea's currency, the Won. Bithumb is currently the fourth largest Bitcoin exchange and the biggest Ethereum exchange in the world. Last week, a cyber attack on the cryptocurrency exchange giant resulted in a number of user accounts being compromised, and billions of South Korean Won were stolen from customers accounts. Around 10 Million Won worth of bitcoins were allegedly stolen from a single victim's account, according to the Kyunghyang Shinmun, a major local newspaper. A survey of users who lost cryptocurrencies in the cyber attack reveals "it is estimated that hundreds of millions of won [worth of cryptocurrencies] have been withdrawn from accounts of one hundred investors. One member claims to have had 1.2 billion won stolen." Besides digital currencies, hackers were succeeded in stealing the personal information of 31,800 Bithumb website users, including their names, email addresses, and mobile phone numbers, the South Korean government-funded Yonhap News reported. However, Bithumb claims that this number represents approximately 3% of its customers. The exchange also told Yonhap that it contacted South Korea's cybercrime watchdog on June 30, Friday after it learned of the hack on June 29. Bithumb believes that one of its employee's home computer was hacked in the attack and not its entire network and no passwords were compromised, so it is impossible for hackers to gain direct access to user accounts. The digital currency exchange says that the loss of funds is the result of using "disposable passwords" in order to carry out digital transactions online. "The employee PC, not the head office server, was hacked. Personal information such as mobile phone and email address of some users were leaked," Bithumb told the newspaper. "However, some customers were found to have been stolen from because of the disposable password used in electronic financial transactions." While more than 100 Bithumb customers have already filed a complaint with the National Police Agency's cybercrime report center regarding the hack, South Korean officials are now investigating the incident.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/07/largest-cryptocurrency-exchange-hacked.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-5411061817540019921</guid><pubDate>Wed, 21 Jun 2017 13:25:00 +0000</pubDate><atom:updated>2017-06-21T18:25:33.028+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber security</category><category domain="http://www.blogger.com/atom/ns#">data breaches</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">privacy</category><category domain="http://www.blogger.com/atom/ns#">scam</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><title>WebSites Found Collecting Data from Online Forms Evena Before You Click Submit</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;&lt;span style="font-size: x-large;"&gt;WebSites Found Collecting Data from Online Forms Evena Before You Click Submit&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;img alt="Image result for WebSites Found Collecting Data from Online Forms Even Before You Click Submit" height="332" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoZanKJVvrY_aO4cuJy98fhr0mj_iksuKPiDob3lfGh4YTzONDOaXymio1rCXs_RyKXXQa_hGMw6j8lTWl9V5nz_OZTeFh0naUstBRGgko__3aQa3qZTC8vNafiuhBm1VkJ7oVi5oo5yR7/s640/online-form-data-collection.png" width="640" /&gt;&lt;br /&gt;
&lt;span style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;'Do I really need to give this website so much about me?'&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;That's exactly what I usually think after filling but before submitting a web form online asking for my personal details to continue.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;I am sure most of you would either close the whole tab or would edit already typed details (or filled up by browser's auto-fill feature) before clicking 'Submit' — Isn't it?&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;But closing the tab or editing your information hardly makes any difference because as soon as you have typed or&amp;nbsp;&lt;/span&gt;&lt;a href="http://thehackernews.com/2017/01/browser-autofill-phishing.html" style="background-color: #f4f4f4; border: 0px; color: #365899; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;auto-filled anything&lt;/a&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;into the online form, the website captures it automatically in the background using JavaScript, even if you haven't clicked the Submit button.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;During an investigation, Gizmodo has&amp;nbsp;&lt;/span&gt;&lt;a href="http://gizmodo.com/before-you-hit-submit-this-company-has-already-logge-1795906081" rel="nofollow" style="background-color: #f4f4f4; border: 0px; color: #365899; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;discovered&lt;/a&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;that code from NaviStone used by hundreds of websites, invisibly grabs each piece of information as you fill it out in a web form before you could hit 'Send' or 'Submit.'&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;NaviStone is an Ohio-based startup that advertises itself as a service to unmask anonymous website visitors and find out their home addresses.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;There are at least 100 websites that are using NaviStone's code, according to BuiltWith, a service that tells you what tech sites employ.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Gizmodo tested dozens of those websites and found that majority of sites captured visitors' email addresses only, but some websites also captured their personal information, like home addresses and other typed or auto-filled information.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;h3 style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: inherit; font-stretch: inherit; font-variant-numeric: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
How Websites Collect 'Data' Before Submitting Web Forms&lt;/h3&gt;
&lt;div class="separator" style="background-color: #f4f4f4; border: 0px; clear: both; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdzLR1Bb07F3qel05aye_DTSqYTRmSzhVdG4uP7ZTR0xqmEYXk5ZHvb38piGWzO83mmxJwbey_h138XA7z3HksqvmP4XE10ahuGiiLUrKc2G_4Zt0xFScYKnHAw6eYEFDebDHry77S0hU8/s1600/websites-collect-data.png" imageanchor="1" style="border: 0px; clear: left; color: #365899; cursor: default; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 1em 0px 0px; outline: 0px; padding: 0px; pointer-events: none; text-decoration-line: none; vertical-align: baseline;"&gt;&lt;img alt="websites-collect-data" border="0" data-original-height="380" data-original-width="728" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdzLR1Bb07F3qel05aye_DTSqYTRmSzhVdG4uP7ZTR0xqmEYXk5ZHvb38piGWzO83mmxJwbey_h138XA7z3HksqvmP4XE10ahuGiiLUrKc2G_4Zt0xFScYKnHAw6eYEFDebDHry77S0hU8/s1600/websites-collect-data.png" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; vertical-align: baseline;" title="websites-collect-data" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Using JavaScript, the websites in question were sending user's typed or auto-filled information of an online form to a server at "murdoog.com," which is owned by NaviStone, leaving no option for people who immediately change their minds and close the page.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;When the publication asked NaviStone that how it unmasks anonymous website visitors, the company denied revealing anything, saying that&lt;/span&gt;&lt;i style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;"its technology is proprietary and awaiting a patent."&lt;/i&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;However, when asked whether email addresses are gathered in order to identify the person and their home addresses, the company's chief operating officer Allen Abbott said NaviStone does not&amp;nbsp;&lt;/span&gt;&lt;i style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;"use email addresses in any way to link with postal addresses or any other form of PII [Personal Identifiable Information]."&lt;/i&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq" style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; quotes: none; vertical-align: baseline;"&gt;
"Rather than use email addresses to generate advertising communications, we actually use the presence of an email address as a suppression factor, since it indicates that email, and not direct mail, is their preferred method of receiving advertising messages," Abbott said.&lt;/blockquote&gt;
&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Some websites using NaviStone's code are collecting information on visitors who are not even their customers and do not share any relationship with the companies.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;blockquote class="tr_bq" style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; quotes: none; vertical-align: baseline;"&gt;
"Three sites—hardware site Rockler.com, gift site CollectionsEtc.com, and clothing site BostonProper.com—sent us emails about items we'd left in our shopping carts using the email addresses we'd typed onto the site but had not formally submitted," Gizmodo writes.&lt;/blockquote&gt;
&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;After the story had gone live, NaviStone agreed to no longer collect email addresses from visitors this way, as Abbott said,&amp;nbsp;&lt;/span&gt;&lt;i style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;"While we believe our technology has been appropriately used, we have decided to change the system operation such that email addresses are not captured until the visitor hits the 'submit' button."&lt;/i&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;h3 style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: inherit; font-stretch: inherit; font-variant-numeric: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Disable Auto-Fill; It’s Leaking Your Information!&lt;/h3&gt;
&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;In order to protect yourself from such websites collecting your data without your consent, you should consider disabling auto-fill form feature, which is turned on by default, in your browser, password manager or extension settings.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;At the beginning this year, we also&amp;nbsp;&lt;/span&gt;&lt;a href="http://thehackernews.com/2017/01/browser-autofill-phishing.html" style="background-color: #f4f4f4; border: 0px; color: #365899; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;warned you about the Auto-fill&lt;/a&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;feature, which automatically fills out web form based on data you have previously entered in similar fields but can be misused by attackers hiding fields (out of sight) in the web form and stealing your personal information without your knowledge.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Here's how to turn this feature off in&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Chrome&lt;/span&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;:&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Go to Settings → Show Advanced Settings at the bottom, and under the Passwords and Forms section uncheck Enable Autofill box to fill out web forms with a single click.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;In&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Opera&lt;/span&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;, go to Settings → Autofill and turn it off.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;In&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: #f4f4f4; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Safari&lt;/span&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;, go to Preferences and click on AutoFill to turn it off.&lt;/span&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Also, think twice before filling your details into any web form, before it gets too late.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f4f4f4; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/websites-found-collecting-data-from.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoZanKJVvrY_aO4cuJy98fhr0mj_iksuKPiDob3lfGh4YTzONDOaXymio1rCXs_RyKXXQa_hGMw6j8lTWl9V5nz_OZTeFh0naUstBRGgko__3aQa3qZTC8vNafiuhBm1VkJ7oVi5oo5yR7/s72-c/online-form-data-collection.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-3044812015789202601</guid><pubDate>Sat, 03 Jun 2017 10:47:00 +0000</pubDate><atom:updated>2017-06-03T15:47:48.151+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">bitcoin</category><category domain="http://www.blogger.com/atom/ns#">digital currency</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><title>What is Bitcoin and Bitcoin Mining? Bitcoin explained in dummy language</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="post-title item fn" itemprop="name" style="background-color: white; border: 0px; color: #19232d; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; margin: 0px 35px 0px 0px; padding: 0px 0px 0px 18px; position: relative; vertical-align: baseline;"&gt;
&lt;span style="font-size: x-large;"&gt;What is Bitcoin and Bitcoin Mining? Bitcoin explained in dummy language&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;img alt="What is Bitcoin and Bitcoin Mining? Bitcoin explained in dummy language" height="306" src="https://www.techworm.net/wp-content/uploads/2017/06/bitcoin-etf-sec-record.jpg" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Bitcoin has been in news for past few days. One of the reasons is that, a few days ago, the WannaCry ransomware struck the world and made headlines. One aspect of this attack, however, was the demand by the attackers to be paid in Bitcoin rather than traditional currencies of Dollar, Pound or Euros.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
However, we are much interested in the second reason. Bitcoin touched a lifetime high of $2400 last week and will soon be touching $2500. Which means if you had bought Bitcoins in the period July 2010 to December 2013 when it was $7 to $25 a piece, you could be a multimillionaire now. Bitcoin as a currency that was debunked and criticized by central bankers of almost all nations has now suddenly become the toast of the Internet. Why? Through this article, we explain what is Bitcoin and how it is produced (mined)!&lt;/div&gt;
&lt;h2 style="background-color: white; border: 0px; color: #19232d; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 21px; line-height: 1.5; margin: 0px 0px 24px; padding: 0px; vertical-align: baseline;"&gt;
New Age Currency- Bitcoin Cryptocurrency&lt;/h2&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Bitcoin is a virtual currency of the Internet also called “cryptocurrency”. A person known only by the name of&amp;nbsp;Satoshi Nakamoto introduced the world to&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Bitcoin back in 2009&lt;/strong&gt;. His true identity still remains hidden though many websites have claimed to have identified him or rather found him, over past 8 years.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Bitcoins in simple terms are virtual coins that are transferred over the internet. &amp;nbsp;A bitcoin like mentioned earlier, is a currency, meaning it has a foreign exchange value just as the Euro does against the US Dollar. However, the only difference is that dollars, pounds, and euros can be stored in your pant wallet while Bitcoin can only be saved online. The reason such cryptocurrencies are in demand is because of their ability to be transferred directly between individuals bypassing the banking system and thus making the sender and receiver of every bitcoin transaction nominally anonymous though he/she can be tracked through blockchain exchange.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Bitcoin is a digital currency that isn’t regulated by anybody leave alone any central bank. Therefore it has no interest rate, repo rate or any other rate that central bankers decide to levy on their respective currencies. It is a currency that is generated by painstaking mathematical computations and policed by millions of computer users called ‘miners’. Bitcoins are basically electricity, converted into a long string of code that has monetary value. The value of a single bitcoin also varies just as any other currency with it hitting a high of $1000 USD in 2015 – the same time when its popularity spread into mainstream conscience and it has dipped significantly since before rebounding again in 2016 and now touching lifetime highs of $2500 per bitcoin.&lt;/div&gt;
&lt;h2 style="background-color: white; border: 0px; color: #19232d; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 21px; line-height: 1.5; margin: 0px 0px 24px; padding: 0px; vertical-align: baseline;"&gt;
Bitcoin Mining&lt;/h2&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Now that we understand what a bitcoin is, the next thing is to understand how is it generated. One way to get bitcoins is to buy one through many of the online Bitcoin exchanges. You will need to have a bitcoin wallet installed on one your devices or use an online wallet by one of many service providers and then one can send and receive bitcoins just as one would emails.&amp;nbsp;Bitcoin is underpinned by a peer-to-peer computer network made up of its users’ machines, similar to the networks that underpin BitTorrent, a file-sharing system. Bitcoins are mathematically generated as computers in this network carry out complex number-crunching tasks – a procedure termed bitcoin mining.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Bitcoin mining is a serious business with many tech companies manufacturing special computers called ASIC computers. These ASIC computers cost lots of moolah and are capable of doing the painstaking calculations for bitcoin mining.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJuJTUZQkW1s931wzZuHF5zH36ahi95AfVGMUOVJzY8jFUv5cf9BmL58geX7DHI4TM0n3xQ6FwuxXxp_4JUdZe809N4cGrNdFsvY9prmyoccRIfJVAqPUi0A3r7k2vteF9tHHDH0mhZcf6/s1600/sdg.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="587" data-original-width="646" height="579" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJuJTUZQkW1s931wzZuHF5zH36ahi95AfVGMUOVJzY8jFUv5cf9BmL58geX7DHI4TM0n3xQ6FwuxXxp_4JUdZe809N4cGrNdFsvY9prmyoccRIfJVAqPUi0A3r7k2vteF9tHHDH0mhZcf6/s640/sdg.PNG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="background-color: white; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px;"&gt;Once you have installed a Bitcoin wallet, you will receive an encrypted address with the ability to generate more whenever needed. This address can then be shared with anyone from whom you wish to receive payment in the form of bitcoins.&amp;nbsp;This system is secured by a concept called blockchain. Workers or miners are paid freshly created bitcoins for verifying Bitcoin transactions.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
The mathematics of the bitcoin system was created in such a way that there is an upper limit to the number of bitcoins that can be mined. The ceiling is said to be around 21 million. The mining of bitcoins gets tougher and tougher the closer we get to the ceiling. Being unable to be regulated by any agency, Bitcoin also has the added advantage of not having it value diluted because a government somewhere decided to jump onto the bandwagon and release bitcoins of its own.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
If you did not buy bitcoins when they were available for $7-25 a piece, you probably missed the bus but you can always buy them now with a hope of a single bitcoin touching $10000 as predicted by many bitcoin aficionados.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/what-is-bitcoin-and-bitcoin-mining.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJuJTUZQkW1s931wzZuHF5zH36ahi95AfVGMUOVJzY8jFUv5cf9BmL58geX7DHI4TM0n3xQ6FwuxXxp_4JUdZe809N4cGrNdFsvY9prmyoccRIfJVAqPUi0A3r7k2vteF9tHHDH0mhZcf6/s72-c/sdg.PNG" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-589227578918777909</guid><pubDate>Sat, 03 Jun 2017 10:42:00 +0000</pubDate><atom:updated>2017-06-03T15:42:41.873+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><category domain="http://www.blogger.com/atom/ns#">torrent</category><title>Extratorrent.cc shutdown effect – The Pirate Bay keeps crashing intermittently</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="post-title item fn" itemprop="name" style="background-color: white; border: 0px; color: #19232d; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; margin: 0px 35px 0px 0px; padding: 0px 0px 0px 18px; position: relative; vertical-align: baseline;"&gt;
&lt;span style="font-size: x-large;"&gt;Extratorrent.cc shutdown effect – The Pirate Bay keeps crashing intermittently&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;img alt="Extratorrent.cc shutdown effect - The Pirate Bay keeps crashing intermittently" height="311" src="https://www.techworm.net/wp-content/uploads/2017/06/171257957-e1455374536401-690x336.jpg" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Have you noticed a peculiar thing since the ExtraTorrent.cc shut down permanently?&amp;nbsp;Visit The Pirate Bay and you will find it working normally. Search for a movie, TV show or any other torrent and the torrent website will suddenly throw up a CloudFlare error. A couple of tries later you may get your torrent download as you wished but it seems that the world’s most popular torrent website, The Pirate Bay is not able to cope up with the deluge of torrent downloaders after the demise of ExtraTorrent.cc.&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; list-style: square; margin: 0px 0px 1.857em 42px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://www.techworm.net/2017/05/extratorrent-shuts-permanently-top-3-alternatives.html" rel="noopener noreferrer" style="border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration-line: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;ExtraTorrent shuts down permanently; Top 3 alternatives&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
The problem is somewhat aggravated by the sudden spurt of ExtraTorrent clones and proxies which are filled with malware, adware and viruses. Torrent users prefer the cleaner and safer TPB to these clones and as such are flocking to TPB resulting in users getting constant errors when browsing TPB.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
For the uninitiated, ExtraTorrent.cc used to be the second most visited torrent website after TPB and was used to download games, movies, music, NFSW stuff, and e-book torrents. &amp;nbsp;When the ExtraTorrent ship seemed to sail in calm waters, out of blue SAM the owner of ExtraTorrent mysteriously shut down the world’s second-largest torrent download website on May 17th.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Like SAM warned, the Internet was soon filled with wannabe ExtraTorrent clones and mirror websites. Most of these websites were using ExtraTorrent skin almost fooling the torrent community into believing they were genuine ExtraTorrent heirs. A similar site called ExtraTorrent.cd was resurrected by so-called ‘former admins.’ But soon torrent downloaders found the site filled with malicious software and viruses. So, to fulfill their torrent needs, users flocked to The Pirate Bay.&amp;nbsp; TPB apparently wasn’t prepared to handle the huge influx of former ET users.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Speaking with&amp;nbsp;&lt;a href="https://torrentfreak.com/torrent-sites-see-traffic-boost-after-extratorrent-shutdown-170528/" style="border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration-line: none; transition: all 0.4s ease-in-out; vertical-align: baseline;"&gt;TorrentFreak&lt;/a&gt;, a TPB staffer said that the ‘big wave of new visitors’ has caused ‘gateway errors’ a tech lingo for website downtime due to heavy traffic. TPB admin Spud17 says that though TPB has seen a heavy increase in torrent downloaders, their membership registrations remain constant suggesting that torrent users are just seeking an alternative torrent download website.&lt;/div&gt;
&lt;blockquote style="background: rgb(242, 242, 242); border-bottom-color: transparent; border-bottom-style: solid; border-image: initial; border-left-color: rgb(217, 217, 217); border-left-style: solid; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 1px 3px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin: 0px 0px 1.857em; padding: 1.857em 1.857em 0px; quotes: none; vertical-align: baseline;"&gt;
&lt;div style="border: 0px; font-family: inherit; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
“&lt;em style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Registrations haven’t suddenly increased or anything like that, and visitor numbers to the forum are about the same as usual.&lt;/em&gt;”&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Indians had been great fans of ExtraTorrent.cc and India accounted for over 50% of the total ExtraTorrent.cc visitors. Now, Spud17 says that over 40% of new visits registered on The Pirate Bay came from India. Mind you, ExtraTorrent was blocked by the top Indian communications watchdog, TRAI in 2016 and could be visited only by using VPN or proxies.&lt;/div&gt;
&lt;h2 style="background-color: white; border: 0px; color: #19232d; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 21px; line-height: 1.5; margin: 0px 0px 24px; padding: 0px; vertical-align: baseline;"&gt;
More Torrent website shutdowns to come?&lt;/h2&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
We had reported at the start of 2017 that the media companies, anti-piracy groups, and authorities were creating extra pressure on torrent websites to shut down their business. The ExtraTorrent’s shutdown comes in the wake of other popular torrent site closures. &amp;nbsp;Authorities successfully shut down KickAssTorrents and Torrentz.eu last year and it was followed by the shutdown of popular movie streaming websites like Putlocker.ch and Coke&amp;amp;Popcorn. TPB has been the top target of such anti-piracy groups but it has withheld the pressure preferring to shift its hydra-like domain to different addresses. With Google, Microsoft and other tech companies joining hands with ISPs to root out torrents websites altogether from the face of the earth, TPB and the remaining torrent websites face a daunting task to stay afloat.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/extratorrentcc-shutdown-effect-pirate.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-4513221837999163887</guid><pubDate>Sat, 03 Jun 2017 10:40:00 +0000</pubDate><atom:updated>2017-06-03T15:40:06.223+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">microsoft</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><category domain="http://www.blogger.com/atom/ns#">wordpress flaw</category><title>Microsoft accidentally releases faulty Windows 10 internal build 16212 which bricks PCs and Laptops</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="post-title item fn" itemprop="name" style="background-color: white; border: 0px; color: #19232d; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; margin: 0px 35px 0px 0px; padding: 0px 0px 0px 18px; position: relative; vertical-align: baseline;"&gt;
&lt;span style="font-size: x-large;"&gt;Microsoft accidentally releases faulty Windows 10 internal build 16212 which bricks PCs and Laptops&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;img alt="Microsoft accidentally releases faulty Windows 10 internal build 16212 which bricks PCs and Laptops" height="306" src="https://www.techworm.net/wp-content/uploads/2017/06/windows-crash-troubleshooting-guide-994x400.jpg" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Microsoft is known for its bungled updates and patches but this one takes the cake. Due to some inadvertent&amp;nbsp;error, Microsoft released an internal Windows 10 build to users. The problem with the released build is that it was in testing phase and never meant to be released. As you all know, Windows 10 automatically updates the releases that Microsoft issues. The same happened with this faulty build and the members of Windows 10 Insider Program automatically updated and bricked their PC/laptops.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
The issue was first noticed by&amp;nbsp;&lt;a href="https://mspoweruser.com/microsoft-accidentally-releases-windows-10-mobile-build-which-bricks-your-device/" style="border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration-line: none; transition: all 0.4s ease-in-out; vertical-align: baseline;"&gt;MSPowerUser&amp;nbsp;&lt;/a&gt;which reported that PC/laptops which automatically updated the faulty update. Microsoft accidentally rolled out the Windows 10 build 16212 for x86 PCs and phones running Windows 10. The immediate result of the update was bricked PC/laptops and smartphone running on Windows 10.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
While such faulty update releases from Microsoft are a part of the tech folklore, this internal build 16212 was probably meant for internal testing by Microsoft engineers. It can be safely said that the internal build 16212 that was released was not even an alpha update. Geeks would know that companies generally release beta candidates to their testers for bugs and error reporting. As soon as the PCs/laptops and mobiles which updated to the new build, they crashed.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Some users reported that their Pcs/laptops/mobiles went to a boot loop after being updated this internal build 16212 PCs.MSPowerUser also reported that the Build 16212 causes Windows 10 Mobile devices to enter a boot loop, requiring users to reset their device using the Windows Device Recovery Tool. Resetting your device&amp;nbsp;means losing your personal data which every person hates.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
The internal build 16212 was also released to some regular users who aren’t part of the Windows Insider program. This may mean that some Windows 10 users who are not part of the Windows 10 Insiders Program may also become part of the mayhem. Dona Sarkar of Windows Insiders community tweeted warning both power&amp;nbsp;users and testers not to update their PCs/mobiles with the new update.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="SandboxRoot env-bp-350" data-twitter-event-id="0" style="background: 0px 0px; color: #1c2022; direction: ltr; display: block; font-family: Helvetica, Roboto, &amp;quot;Segoe UI&amp;quot;, Calibri, sans-serif; font-size: 16px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: 1.4; position: relative; text-align: left; white-space: initial;"&gt;
&lt;div class="EmbeddedTweet js-clickToOpenTarget tweet-InformationCircle-widgetParent" data-click-to-open-target="https://twitter.com/donasarkar/status/870398131141201920" data-dt-abbr="%{number}%{symbol}" data-dt-am="AM" data-dt-full="%{hours12}:%{minutes} %{amPm} - %{day} %{month} %{year}" data-dt-h="h" data-dt-hour="hour" data-dt-hours="hours" data-dt-long="%{day} %{month} %{year}" data-dt-m="m" data-dt-minute="minute" data-dt-minutes="minutes" data-dt-months="Jan|Feb|Mar|Apr|May|Jun|Jul|Aug|Sep|Oct|Nov|Dec" data-dt-now="now" data-dt-pm="PM" data-dt-s="s" data-dt-second="second" data-dt-seconds="seconds" data-dt-short="%{day} %{month}" data-iframe-title="Twitter Tweet" data-scribe="page:tweet" data-twitter-event-id="1" id="twitter-widget-0" lang="en" style="background-color: white; border-radius: 4px; border: 1px solid rgb(225, 232, 237); cursor: pointer; max-width: 520px; overflow: hidden; position: relative;"&gt;
&lt;div class="EmbeddedTweet-tweet" style="padding: 20px 20px 11.6px;"&gt;
&lt;blockquote cite="https://twitter.com/donasarkar/status/870398131141201920" class="Tweet h-entry js-tweetIdInfo subject expanded
                   is-deciderHtmlWhitespace" data-scribe="section:subject" data-tweet-id="870398131141201920" style="border: none; list-style: none; margin: 0px; padding: 0px;"&gt;
&lt;div class="Tweet-header u-cf" style="padding-left: 45px; position: relative; white-space: nowrap;"&gt;
&lt;div class="Tweet-brand u-floatRight" style="float: right !important; position: relative; z-index: 1;"&gt;
&lt;span class="u-hiddenInNarrowEnv"&gt;&lt;a class="FollowButton follow-button profile" data-scribe="component:followbutton" href="https://twitter.com/donasarkar" role="button" style="background-color: white; border-radius: 4px; border: 1px solid rgb(85, 172, 238); color: #55acee; display: inline-block; font-size: 14px; font-weight: 700; line-height: 1; outline: 0px; padding: 5.5px 13px 6.5px 11.5px; text-decoration: none;" title="Follow Dona Sarkar on Twitter"&gt;&lt;span class="FollowButton-bird" style="display: inline-block; position: relative; top: 1px;"&gt;&lt;div aria-label="" class="Icon Icon--twitter " role="presentation" style="background-image: url(&amp;quot;data:image/svg+xml; background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 1.25em;" title=""&gt;
&lt;/div&gt;
&lt;/span&gt;&amp;nbsp;Follow&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="TweetAuthor " data-scribe="component:author" style="line-height: 0; margin-top: 2px; max-width: 100%; overflow: hidden !important; text-overflow: ellipsis !important; white-space: nowrap !important; word-wrap: normal !important;"&gt;
&lt;a aria-label="Dona Sarkar (screen name: donasarkar)" class="TweetAuthor-link Identity u-linkBlend" data-scribe="element:user_link" href="https://twitter.com/donasarkar" style="background-color: transparent; color: inherit; font-weight: inherit; line-height: 1.2; outline: 0px; text-decoration: inherit;"&gt;&lt;span class="TweetAuthor-avatar Identity-avatar" style="background-color: transparent; border-radius: 4px; display: inline-block; height: 36px; left: 0px; overflow: hidden; position: absolute; top: 0px; width: 36px;"&gt;&lt;img alt="" class="Avatar" data-scribe="element:avatar" data-src-1x="https://pbs.twimg.com/profile_images/793677732290834432/N1PR37By_normal.jpg" data-src-2x="https://pbs.twimg.com/profile_images/793677732290834432/N1PR37By_bigger.jpg" src="https://pbs.twimg.com/profile_images/793677732290834432/N1PR37By_normal.jpg" style="border: 0px; max-height: 100%; max-width: 100%;" /&gt;&lt;/span&gt;&lt;span class="TweetAuthor-name Identity-name customisable-highlight" data-scribe="element:name" style="font-weight: 700;" title="Dona Sarkar"&gt;Dona Sarkar&lt;/span&gt;&amp;nbsp;&lt;span class="TweetAuthor-verifiedBadge" data-scribe="element:verified_badge" style="position: absolute; top: 0px;"&gt;&lt;div aria-label="Verified Account" class="Icon Icon--verified " role="img" style="background-image: url(&amp;quot;data:image/svg+xml; background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 1.11111em;" title="Verified Account"&gt;
&lt;/div&gt;
&lt;b class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; font-style: normal; font-weight: 400; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;"&gt;✔&lt;/b&gt;&lt;/span&gt;&lt;span class="TweetAuthor-screenName Identity-screenName" data-scribe="element:screen_name" dir="ltr" style="color: #697882; font-size: 14px;" title="@donasarkar"&gt;@donasarkar&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="Tweet-body e-entry-content" data-scribe="component:tweet" style="margin-top: 14px;"&gt;
&lt;div class="Tweet-text e-entry-title" dir="ltr" lang="en" style="border: none; cursor: text; direction: ltr; list-style: none; margin: 0px; padding: 0px; text-align: left; white-space: normal;"&gt;
&lt;a class="PrettyLink hashtag customisable" data-query-source="hashtag_click" data-scribe="element:hashtag" dir="ltr" href="https://twitter.com/hashtag/WindowsInsiders?src=hash" rel="tag" style="background-color: transparent; color: #2b7bb9; outline: 0px; text-decoration: none;"&gt;&lt;span class="PrettyLink-prefix"&gt;#&lt;/span&gt;&lt;span class="PrettyLink-value"&gt;WindowsInsiders&lt;/span&gt;&lt;/a&gt;: pls do not install any builds being offered til you hear from us with a blog post. If you have installed, reset with WDRT.&lt;/div&gt;
&lt;div class="Tweet-metadata dateline" style="color: #697882; font-size: 14px; margin-top: 3.2px;"&gt;
&lt;a class="u-linkBlend u-url customisable-highlight long-permalink" data-datetime="2017-06-01T21:54:20+0000" data-scribe="element:full_timestamp" href="https://twitter.com/donasarkar/status/870398131141201920" style="background-color: transparent; color: inherit; font-weight: inherit; outline: 0px; text-decoration: inherit;"&gt;&lt;time class="dt-updated" datetime="2017-06-01T21:54:20+0000" pubdate="" title="Time posted: 01 Jun 2017, 21:54:20 (UTC)"&gt;2:54 AM - 2 Jun 2017&lt;/time&gt;&lt;/a&gt;&amp;nbsp;·&amp;nbsp;&lt;a class="u-linkBlend customisable-highlight" href="https://twitter.com/search?q=place%3A7291a25672e0d4b1" style="background-color: transparent; color: inherit; font-weight: inherit; outline: 0px; text-decoration: inherit;"&gt;Redmond, WA&lt;/a&gt;&lt;/div&gt;
&lt;ul aria-label="Tweet actions" class="Tweet-actions" data-scribe="component:actions" role="menu" style="border: none; list-style: none; margin: 8.4px 0px 0px; padding: 0px;"&gt;
&lt;li class="Tweet-action" style="display: inline-block;"&gt;&lt;a class="TweetAction TweetAction--reply web-intent" data-scribe="element:reply" href="https://twitter.com/intent/tweet?in_reply_to=870398131141201920" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"&gt;&lt;div aria-label="Reply" class="Icon Icon--reply TweetAction-icon" role="img" style="background-image: url(&amp;quot;data:image/svg+xml; background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.07639em;" title="Reply"&gt;
&lt;/div&gt;
&lt;/a&gt;&lt;/li&gt;
&amp;nbsp;
&lt;li class="Tweet-action" style="display: inline-block; margin-left: 14px;"&gt;&lt;a class="TweetAction TweetAction--retweet web-intent" data-scribe="element:retweet" href="https://twitter.com/intent/retweet?tweet_id=870398131141201920" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"&gt;&lt;div aria-label="Retweet" class="Icon Icon--retweet TweetAction-icon" role="img" style="background-image: url(&amp;quot;data:image/svg+xml; background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.28472em;" title="Retweet"&gt;
&lt;/div&gt;
&amp;nbsp;&lt;span aria-hidden="true" class="TweetAction-stat" data-scribe="element:retweet_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;"&gt;284&lt;/span&gt;&lt;span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;"&gt;284 Retweets&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&amp;nbsp;
&lt;li class="Tweet-action" style="display: inline-block; margin-left: 14px;"&gt;&lt;a class="TweetAction TweetAction--heart web-intent" data-scribe="element:heart" href="https://twitter.com/intent/like?tweet_id=870398131141201920" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"&gt;&lt;div aria-label="Like" class="Icon Icon--heart TweetAction-icon" role="img" style="background-image: url(&amp;quot;data:image/svg+xml; background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 0.9375em;" title="Like"&gt;
&lt;/div&gt;
&amp;nbsp;&lt;span aria-hidden="true" class="TweetAction-stat" data-scribe="element:heart_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;"&gt;355&lt;/span&gt;&lt;span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;"&gt;355 likes&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;div class="tweet-InformationCircle--bottom tweet-InformationCircle" style="bottom: 3px; margin: 10px 20px; position: absolute; right: 0px;"&gt;
&lt;a class="Icon Icon--informationCircleWhite" href="https://support.twitter.com/articles/20175256" style="background-color: transparent; background-image: url(&amp;quot;data:image/svg+xml; background-repeat: no-repeat; background-size: contain; color: #2b7bb9; display: inline-block; height: 18px; outline: 0px; text-decoration: none; vertical-align: text-bottom; width: 15px;" title="Twitter Ads info and privacy"&gt;&lt;span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;"&gt;Twitter Ads info and privacy&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class="resize-sensor" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;"&gt;
&lt;div class="resize-sensor-expand" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;"&gt;
&lt;div style="height: 217px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 560px;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="resize-sensor-shrink" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;"&gt;
&lt;div style="height: 414.344px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 1100px;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style="-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px 0px 1.857em; orphans: 2; padding: 0px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 2; word-spacing: 0px;"&gt;
&lt;/div&gt;
&lt;h2 style="-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: #19232d; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 21px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: bold; letter-spacing: normal; line-height: 1.5; margin: 0px 0px 24px; orphans: 2; padding: 0px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 2; word-spacing: 0px;"&gt;
Here is what you should do if your PC/laptop/mobile is updated with the new Internal Build 16212&lt;/h2&gt;
&lt;div style="-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px 0px 1.857em; orphans: 2; padding: 0px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 2; word-spacing: 0px;"&gt;
At present it is unclear exactly how many Windows 10 users have updated this faulty build. Microsoft has said that its analysis shows only a small portion of Insiders got these builds. If you are one of the users who has already updated the internal build 16212, Microsoft has issued the following advice.&lt;/div&gt;
&lt;div style="-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: #0e0b0b; float: none; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px; orphans: 2; padding: 0px; text-align: center; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 2; word-spacing: 0px;"&gt;
&lt;ins class="adsbygoogle" data-ad-client="ca-pub-9567424144805280" data-ad-slot="2710193057" data-adsbygoogle-status="done" style="border: 0px; display: inline-block; font-family: inherit; font-size: 17px; height: 15px; margin: 0px; padding: 0px; vertical-align: baseline; width: 468px;"&gt;&lt;ins id="aswift_6_expand" style="background-color: transparent; border: none; display: inline-table; font-family: inherit; font-size: 17px; height: 15px; margin: 0px; padding: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"&gt;&lt;ins id="aswift_6_anchor" style="background-color: transparent; border: none; display: block; font-family: inherit; font-size: 17px; height: 15px; margin: 0px; padding: 0px; position: relative; vertical-align: baseline; visibility: visible; width: 468px;"&gt;&lt;iframe allowfullscreen="true" allowtransparency="true" frameborder="0" height="15" hspace="0" id="aswift_6" marginheight="0" marginwidth="0" name="aswift_6" scrolling="no" style="border: 0px; font-family: inherit; font-size: 17px; height: 15px; left: 0px; margin: 0px; padding: 0px; position: absolute; top: 0px; vertical-align: baseline; width: 468px;" vspace="0" width="468"&gt;&lt;/iframe&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/ins&gt;&lt;/div&gt;
&lt;div style="-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px 0px 1.857em; orphans: 2; padding: 0px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 2; word-spacing: 0px;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: 12pt; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;“If you received this build (from RS_EDGE_CASE) on your PC: Please be aware that this build was never intended to go out to Windows Insiders and may include issues that impact&amp;nbsp;&lt;/span&gt;&lt;span style="border: 0px; font-family: arial, helvetica, sans-serif; font-size: 12pt; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;usability&lt;/span&gt;&lt;span style="border: 0px; font-family: inherit; font-size: 12pt; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;of your PC – more so than the normal builds we give you.&lt;/span&gt;&lt;/div&gt;
&lt;div style="-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px 0px 1.857em; orphans: 2; padding: 0px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 2; word-spacing: 0px;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: 12pt; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;“You can either sit tight and wait for us to publish a newer build to you or you can roll-back to the previous build via&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Settings&lt;/strong&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Update &amp;amp; security&lt;/strong&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-size: 16px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Recovery&lt;/strong&gt;. And check your Windows Insider Program settings.&lt;/span&gt;&lt;/div&gt;
&lt;div style="-webkit-text-stroke-width: 0px; background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; font-style: normal; font-variant-caps: normal; font-variant-ligatures: normal; font-weight: normal; letter-spacing: normal; margin: 0px 0px 1.857em; orphans: 2; padding: 0px; text-align: left; text-decoration-color: initial; text-decoration-style: initial; text-indent: 0px; text-transform: none; vertical-align: baseline; white-space: normal; widows: 2; word-spacing: 0px;"&gt;
&lt;em style="border: 0px; font-family: inherit; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; font-size: 17px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;NOTE: You have up to 10 days to roll-back and this will only work if you did not do Disk Cleanup to remove your previous Windows installation.&lt;/strong&gt;&lt;/em&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/microsoft-accidentally-releases-faulty.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-3845035668844304011</guid><pubDate>Sat, 03 Jun 2017 10:35:00 +0000</pubDate><atom:updated>2017-06-03T15:35:45.840+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber security</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><title>5 Reasons why internet security is crucial in 2017</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="post-title item fn" itemprop="name" style="background-color: white; border: 0px; color: #19232d; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; margin: 0px 35px 0px 0px; padding: 0px 0px 0px 18px; position: relative; vertical-align: baseline;"&gt;
&lt;span style="font-size: x-large;"&gt;5 Reasons why internet security is crucial in 2017&lt;/span&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;img alt="5 Reasons why internet security is crucial in 2017" height="306" src="https://www.techworm.net/wp-content/uploads/2017/06/global-internet-security.jpg" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Ever imagined a week without the internet? That sounds crazy, especially if your bread and butter require that you always stay online. As we live in the Internet Age, it is next to impossible to imagine life without staying connected. The internet is a useful tool in many aspects of our life, from communication down to business.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;While the internet is proven to be useful, it also comes with a few drawbacks. Some people are using the Internet to cause harm to others. In the United Kingdom alone, there were an estimated 6.2 million incidents of cyber crime in 2016. Even Singapore, which is dubbed as the safest country in Asia, is not free from online scams.&amp;nbsp;&lt;/span&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;The government, as well as many private organizations, are becoming more proactive in dealing with the growing rate of cyber security. Here are some reasons why Internet security is of the utmost importance in 2017:&lt;/span&gt;&lt;/div&gt;
&lt;ol style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1.857em 42px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Computer viruses and malware are more complex than ever.&lt;/b&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;The Locky ransomware, by far, is the most dangerous computer virus you could have. The intruders will send you a fake email demanding you to open an attached Word document. Once you open the document, it will enable Macro commands and the malware could get inside your computer.&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Scammers are using more advanced ways of tricking users.&lt;/b&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;PhishMe’s chief technology and officer Aaron Higbee said the recent Google Docs phish scam tricks the user into granting permissions to a third-party app. The scammers will not lead you to fake websites for you to give up your passwords. They will not use malware to cause harm. The scammers are pretty good at mimicking Google web pages you would think they are authentic.&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Data breaches in 2017 are the worst so far.&lt;/b&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;When an unauthorized individual used your sensitive and confidential data, you just became a victim of data breaching. Aside from individuals, popular hotel chains, fast food chains, and even job-seeking websites have been victims of data breaching.&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;There are hackers who will do everything they can to cause disruption.&amp;nbsp;&lt;/b&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Some hackers will not harm your computer with a virus but will steal your data for their advantage. Hackers usually target government networks because it becomes easier for them to access people’s personal information, including social security numbers and fingerprints.&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Business Email Compromise (BEC) attack would likely continue to grow according to FBI.&lt;/b&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;In this kind of phishing scam, the attacker will impersonate a company’s executive and will encourage customers or employees to transfer funds. You may use an email protection kit to stop attacks before they reach your inbox.&amp;nbsp;&lt;/span&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="background-color: white; border: 0px; color: #0e0b0b; font-family: Arial, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, sans-serif; font-size: 17px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;How will you protect yourself from any form of phishing? The best way to do that is to install a legitimate antivirus software that offers an overall protection from threats.&amp;nbsp;&lt;/span&gt;&lt;a href="http://computer-fixperts.com/antivirus/best-antivirus-for-pc-and-mac/" style="border: 0px; color: #487be4; font-family: inherit; margin: 0px; padding: 0px; text-decoration-line: none; transition: all 0.4s ease-in-out; vertical-align: baseline;"&gt;The best computer antivirus according to Computer Fixperts&lt;/a&gt;&lt;span style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;has a thorough malware detection. Furthermore, it should safeguard you against dangerous websites, harmful downloads, and suspicious emails. For maximum protection against online threats, make sure that your antivirus software is up-to-date.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/5-reasons-why-internet-security-is.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-6460805817832165489</guid><pubDate>Sat, 03 Jun 2017 10:23:00 +0000</pubDate><atom:updated>2017-06-03T15:23:26.260+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">linkedin</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><title>LinkedIn Hacker, Wanted by US &amp; Russian, Can be Extradited to Either State </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;LinkedIn Hacker, Wanted by US &amp;amp; Russian, Can be Extradited to Either State&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;img alt="Image result for LinkedIn Hacker, Wanted by US &amp;amp; Russian, Can be Extradited to Either State" height="355" src="https://cdn.rt.com/files/2017.05/original/592d9732c361885f4d8b45ce.jpg" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The alleged Russian hacker, who was&amp;nbsp;&lt;/span&gt;&lt;a href="http://thehackernews.com/2016/10/linkedin-russian-hacker.html" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;arrested by the Czech police in Prague&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;last October on suspicion of massive 2012 data breach at LinkedIn, can be extradited to either the United States or Russia, a Czech court ruled on Tuesday.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;a href="http://thehackernews.com/2016/10/russian-hacker-fbi.html" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Yevgeniy Aleksandrovich Nikulin&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;, a 29-years-old Russian national, is accused of allegedly hacking not just&amp;nbsp;&lt;/span&gt;&lt;a href="http://thehackernews.com/2016/05/linkedin-account-hack.html" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;LinkedIn&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;, but also the online cloud storage platform&amp;nbsp;&lt;/span&gt;&lt;a href="http://thehackernews.com/2016/08/dropbox-data-breach.html" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Dropbox&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;, and now-defunct social-networking company Formspring.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;However, he has repeatedly denied all accusations.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Nikulin was arrested in Prague on October 5 by the Czech police after Interpol issued an international arrest warrant against him.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Nikulin appeared at a court hearing held inside a high-security prison in Prague on Tuesday and emaciated after eight months in solitary confinement.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The court ruling, pending appeals, left the final decision in the hands of Czech Justice Minister Robert Pelikan, who can approve extradition to one of the countries and block the other.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The United States has requested Nikulin extradition for carrying out hacking attacks and stealing information from several American social networking companies, including LinkedIn, Dropbox, and Formspring, between March 2012 to July 2012.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;However, Russia, where Nikulin is facing a lesser charge, has requested his extradition on a separate cyber theft charge of stealing $3,450 via the Internet in 2009.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq" style="background: rgb(250, 250, 250); border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px; quotes: none; vertical-align: baseline;"&gt;
"Both [case] documents are very, very sufficient for reasonable suspicion that [the offenses] took place and that there is a reason to press charges," the judge said.&lt;/blockquote&gt;
&lt;h3 style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.7em; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Hacker Claims FBI Pressured Him to Confess to US Election Hacks&lt;/h3&gt;
&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Nikulin's arrest last October came three days before the United States officially accused Russia of hacking the Democratic National Committee (DNC) and interfering in the 2016 presidential election.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Nikulin's lawyer says the case is a set-up, indicating that his arrest may have deeper inclinations than over the cyber attacks against American firms.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The Guardian&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.theguardian.com/technology/2017/may/30/suspected-russian-hacker-step-closer-to-us-extradition-yevgeniy-nikulin" rel="nofollow" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;reported&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;Nikulin was interrogated in Prague, where he currently remains imprisoned, by FBI special agent Jeffrey Miller.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Nikulin wrote in a letter from prison that during his interrogation, Miller reportedly brought up the US election hacking and claimed that the FBI agent pressured him to admit to the DNC hack and promised him good treatment if he accepted to cooperate.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Nikulin wrote in the letter that he rejected the offer. His lawyer indicated that Nikulin was not a hacker, but just a victim of an FBI plot.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq" style="background: rgb(250, 250, 250); border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px; quotes: none; vertical-align: baseline;"&gt;
"Do you really imagine that a high-ranking FBI agent is going to travel all the way from San Francisco just to read this guy his rights?," Nikulin lawyer said.&lt;/blockquote&gt;
&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Mark Galeotti, a senior security researcher at the Institute of International Relations Prague, also showed his concern about an FBI agent traveling to another country to extradite a hacker.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq" style="background: rgb(250, 250, 250); border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px; quotes: none; vertical-align: baseline;"&gt;
"An FBI agent traveling from the US to a third country as part of an extradition request is extremely unusual and highlights that the case is seen as significant," Galeotti said, as quoted by the Guardian.&lt;/blockquote&gt;
&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Nikulin's Russian lawyer stated that his client's life revolved around buying and selling luxury cars, adding that Nikulin was "useless with computers" and capable of checking his email and no more and, far from being a super-hacker who can hack big firms.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Tuesday's court hearing was held in a tiny room inside the prison for security reasons, to which Nikulin’s Czech lawyer said: "&lt;/span&gt;&lt;i style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;In all my 25 years as a lawyer, I don’t remember any cases being tried inside the prison, including serial killers or organized crime cases.&lt;/i&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;"&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Now, the final decision is in the hands of the Czech Justice Minister Robert Pelikan, who is slated to decide where Nikulin will be extradited: The United States, where he can face a "disproportionately harsh" sentence of 54 years behind bars, or Russia, where he faces a lesser charge of cyber theft.&lt;/span&gt;&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/linkedin-hacker-wanted-by-us-russian.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-326223568399432179</guid><pubDate>Sat, 03 Jun 2017 10:17:00 +0000</pubDate><atom:updated>2017-06-03T15:17:32.989+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyber security</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">Tbits-in</category><title>Online Training for CISA, CISM, and CISSP Cyber Security Certifications </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;&lt;span style="font-size: x-large;"&gt;Online Training for CISA, CISM, and CISSP Cyber Security Certifications&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;img alt="Image result for Online Training for CISA, CISM, and CISSP Cyber Security Certifications" height="334" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEI4PKLm_f5gJPERfUUKlmD687Hd3owK2oJyrIcGv_LyGNIU05vpaTZspoT8_37EuoWrBrysVQcZMslYviD-DuJIJAvdDkUqTHUlqdgbtNO6s3MZWMvqQ7fhfrcUiCO9yYY6uAX_NQQYTY/s640/cyber-security-certification-training.png" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Believe it or not, but any computer connected to the Internet is vulnerable to cyber attacks.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;With more money at risk and data breaches at a rise, more certified cyber security experts and professionals are needed by every corporate and organisation to prevent themselves from hackers and cyber thieves.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;That's why jobs in the cyber security field have gone up 80% over the past three years than any other IT-related job. So, this is the right time for you to consider a new career as a cyber security professional.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Cyber security experts with industry-standard certification are coming from a wide range of backgrounds, who prepare themselves to protect computer systems and networks from viruses and hackers.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;But before getting started your career as a cyber security expert, it's important to understand basics of networks and how data moves from place to place, and for this, you are highly advised to gain some valuable cyber security certifications.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Cyber security certifications not only boost your skills but also verify your knowledge and credibility.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;THN Deals Store this week brings you the&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://deals.thehackernews.com/sales/cyber-security-certification-mega-bundle?utm_source=thehackernews.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=cybersecurity-cert-training" rel="nofollow" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Cybersecurity Certification Mega Bundle&lt;/a&gt;&lt;/span&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;, which will walk you through the skills and concepts you need to master three elite cyber security certification exams: CISA, CISM, and CISSP.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;h3 style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.7em; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Online Training for CISA, CISM, and CISSP Certifications&lt;/h3&gt;
&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;With this online training course, you will get the materials you require to dive deep into the most proven and practical methods for protecting vulnerable networks and any business environment.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;From the fundamentals of cryptography and encryption to the security holes in computer networks and mobile apps, this course will help you learn about information security audits, assurance, guidelines, standards, and best cyber security practices in the industry.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;If you don't know what are CISA, CISM, and CISSP certifications, below you can find brief information about the courses and their importance in IT industry.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;h4 style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.4em; font-stretch: inherit; font-variant-numeric: inherit; font-weight: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://deals.thehackernews.com/sales/cyber-security-certification-mega-bundle?utm_source=thehackernews.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=cybersecurity-cert-training" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;CISA - Certified Information Systems Auditor&lt;/a&gt;&lt;/h4&gt;
&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The CISA certification is renowned across the world as the standard of achievement for those who audit, monitor, access and control information technology and business systems.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Being CISA-certified showcases candidates for their audit experience, skills, and knowledge, and signifies that you are an expert in managing vulnerabilities, instituting controls and ensuring compliance within the enterprise.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;h4 style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.4em; font-stretch: inherit; font-variant-numeric: inherit; font-weight: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://deals.thehackernews.com/sales/cyber-security-certification-mega-bundle?utm_source=thehackernews.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=cybersecurity-cert-training" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;CISM - Certified Information Security Manager&lt;/a&gt;&lt;/h4&gt;
&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The demand for skilled information security managers is on the rise, and CISM is the globally accepted certification standard of achievement in this area.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The uniquely management-focused CISM certification ensures you are re-equipped with the best practices in the IT industry and recognises your expertise to manage, design, and oversee and assess an enterprise's information security.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;h4 style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.4em; font-stretch: inherit; font-variant-numeric: inherit; font-weight: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://deals.thehackernews.com/sales/cyber-security-certification-mega-bundle?utm_source=thehackernews.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=cybersecurity-cert-training" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;CISSP - Certified Information Systems Security Professional&lt;/a&gt;&lt;/h4&gt;
&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The CISSP certification is a globally-recognised certification in the field of information security and has become a standard of achievement that is acknowledged worldwide.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Offered by the International Information Systems Security Certification Consortium, commonly known as (ISC)², CISSP is an objective measure of excellence, which requires a broad level of knowledge.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;h3 style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.7em; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
How to Join Cybersecurity Certification Training?&lt;/h3&gt;
&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;If you want to select the best and cost-efficient course to pass CISA, CISM, and CISSP certifications, the&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Cybersecurity Certification Mega Bundle&lt;/span&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;course is the one for you to begin with.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;You can get Cybersecurity Certification Mega&amp;nbsp;&lt;/span&gt;&lt;a href="https://deals.thehackernews.com/sales/cyber-security-certification-mega-bundle?utm_source=thehackernews.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=cybersecurity-cert-training" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Bundle for just $69 (after 93% discount)&lt;/span&gt;&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;at the THN Deals Store.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;So, to Sign-up for the Cybersecurity Certification Mega Bundle course,&amp;nbsp;&lt;/span&gt;&lt;a href="https://deals.thehackernews.com/sales/cyber-security-certification-mega-bundle?utm_source=thehackernews.com&amp;amp;utm_medium=referral&amp;amp;utm_campaign=cybersecurity-cert-training" rel="nofollow" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;click on this link&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;and get your online course now.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;We also provide 15-Day Money Back Guarantee. So in case, you are not satisfied with this course for any reason, we will issue a refund within 15 days of purchase. We want you to be happy with every course you purchase!&lt;/span&gt;&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/online-training-for-cisa-cism-and-cissp.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiEI4PKLm_f5gJPERfUUKlmD687Hd3owK2oJyrIcGv_LyGNIU05vpaTZspoT8_37EuoWrBrysVQcZMslYviD-DuJIJAvdDkUqTHUlqdgbtNO6s3MZWMvqQ7fhfrcUiCO9yYY6uAX_NQQYTY/s72-c/cyber-security-certification-training.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-3197083617563827095</guid><pubDate>Sat, 03 Jun 2017 10:11:00 +0000</pubDate><atom:updated>2017-06-03T15:11:29.558+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">spying</category><title>How to Hack Someone's Facebook Account Just by Knowing their Phone Numbers </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;How to Hack Someone's Facebook Account Just by Knowing their Phone Numbers&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: x-large;"&gt;&lt;img alt="Image result for How to Hack Someone's Facebook Account Just by Knowing their Phone Numbers" height="348" src="http://www.underground-hackers.com/wp-content/uploads/2016/06/hack-facebook-password-735x400.jpg" width="640" /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style="font-size: x-large;"&gt;&lt;span style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Update:&lt;/span&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;If you think this technique is old and can not be used to hack your social media, bank or any online accounts, then you are mistaken. A&amp;nbsp;&lt;/span&gt;&lt;a href="http://thehackernews.com/2017/05/ss7-vulnerability-bank-hacking.html" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;real-world SS7 attack&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;has been spotted this month when some unknown hackers exploited the design flaws in the Signaling System 7 (SS7) to drain victims' bank accounts.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;a href="http://usamaasif.blogspot.com/2017/06/heres-facebook-hacking-tool-that-can.html" rel="nofollow" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Hacking Facebook account&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;is one of the major queries on the Internet today. It's hard to find — how to hack Facebook account, but researchers have just proven by taking control of a Facebook account with only the target's phone number and some hacking skills.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Yes, your Facebook account can be hacked, no matter how strong your password is or how much extra security measures you have taken. No joke!&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Hackers with skills to exploit the SS7 network can hack your Facebook account. All they need is your phone number.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The weaknesses in the part of global telecom network SS7 not only let hackers and spy agencies&amp;nbsp;&lt;/span&gt;&lt;a href="http://usamaasif.blogspot.com/2017/06/hackers-can-spy-on-your-calls-and-track.html" rel="nofollow" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;listen to personal phone calls&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;and intercept SMSes on a potentially massive scale but also let them hijack social media accounts to which you have provided your phone number.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;SS7 or Signalling System Number 7 is a telephony signaling protocol that is being used by more than 800 telecommunication operators worldwide to exchange information with one another, cross-carrier billing, enabling roaming, and other features.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;However, an&amp;nbsp;&lt;/span&gt;&lt;a href="http://thehackernews.com/2015/08/hacking-phone.html" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;issue with the SS7 network&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;is that it trusts text messages sent over it regardless of their origin. So, malicious hackers could trick SS7 into diverting text messages as well as calls to their own devices.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;All they need is the target’s phone number and some details of the target’s device to initiate the silent snooping.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The researchers from Positive Technologies, who recently showed how they could&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.forbes.com/sites/thomasbrewster/2016/06/01/whatsapp-telegram-ss7-hacks/#282343745e04" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;hijack WhatsApp&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;and Telegram accounts, now gave the demonstration of the Facebook hack using similar tricks, Forbes&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.forbes.com/sites/thomasbrewster/2016/06/15/hackers-steal-facebook-account-ss7/#620735ba8fa7" rel="nofollow" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;reported&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;SS7 has long been known to be&amp;nbsp;&lt;/span&gt;&lt;a href="http://thehackernews.com/2014/09/how-cell-phone-user-can-be-secretly_17.html" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;vulnerable&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;, despite the most advanced encryption used by cellular networks. The&amp;nbsp;&lt;/span&gt;&lt;a href="http://thehackernews.com/2014/12/hackers-can-read-your-private-sms-and.html" style="background-color: white; border: 0px; color: #428bca; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;designing flaws in SS7&lt;/a&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&amp;nbsp;have been in circulation since 2014 when the team of researchers at German Security Research Labs alerted the world to it.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br /&gt;
&lt;h3 style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.7em; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Here's How to Hack Any Facebook Account:&lt;/h3&gt;
&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The attacker first needs to click on the "Forgot account?" link on the Facebook.com homepage. Now, when asked for a phone number or email address linked to the target account, the hacker needs to provide the legitimate phone number.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The attacker then diverts the SMS containing a one-time passcode (OTP) to their own computer or phone, and can login to the target’s Facebook account.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;The issue affects all Facebook users who have registered a phone number with Facebook and have authorized Facebook Texts.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Besides Facebook, researchers' work shows that any service, including Gmail and Twitter, that uses SMS to verify its user accounts has left open doors for hackers to target its customers.&lt;/span&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="background-color: white; color: #212121; content: &amp;quot; &amp;quot;; display: block; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;span style="background-color: white; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Although the network operators are unable to patch the hole sometime soon, there is little the smartphone users can do.&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Do not link your phone number to social media sites, rather rely solely on emails to recover your Facebook or other social media accounts.&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Use two-factor authentication that does not use SMS texts for receiving codes.&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Use communication apps that offer "end-to-end encryption" to encrypt your data before it leaves your smartphone over your phone's standard calling feature.&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Update:&amp;nbsp;&lt;/span&gt;However, the important thing to note is that the issue has actually nothing to do with Facebook security or other website's security, instead it is the weakness in the telecom network.&amp;nbsp;&lt;/div&gt;
&lt;blockquote style="background: rgb(250, 250, 250); border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px; quotes: none; vertical-align: baseline;"&gt;
"Because this technique [SSL exploitation] requires significant technical and financial investment, it is a very low risk for most people," Facebook spokesperson told The Hacker News.&amp;nbsp;&lt;/blockquote&gt;
&lt;blockquote style="background: rgb(250, 250, 250); border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px; quotes: none; vertical-align: baseline;"&gt;
"As an added precaution, we recommend turning on two-factor authentication, called Login Approvals, in your Facebook security settings. Doing this will disable recovery via SMS on your account so even if someone has your phone number, they'll still need your password to access your account."&lt;/blockquote&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/how-to-hack-someones-facebook-account.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-1441402657262834134</guid><pubDate>Sat, 03 Jun 2017 10:09:00 +0000</pubDate><atom:updated>2017-06-03T15:09:35.501+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">internet</category><category domain="http://www.blogger.com/atom/ns#">spying</category><title>Hackers can spy on your calls and track location, using just your phone number </title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Hackers can spy on your calls and track location, using just your phone number&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;img alt="Image result for Hackers can spy on your calls and track location, using just your phone number" height="360" src="http://cdns.yournewswire.com/wp-content/uploads/2016/04/Computer_hacker_security_attack_thumb800-678x381.jpg" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="in-short" style="background: rgb(245, 245, 245); border-radius: 3px; border: 1px solid rgb(226, 226, 226); color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 20px; outline: 0px; padding: 20px 36.3125px; vertical-align: baseline;"&gt;
&lt;h2 style="border-bottom-color: rgb(222, 222, 222); border-bottom-style: solid; border-image: initial; border-left-color: initial; border-left-style: initial; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 1px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; letter-spacing: 1px; line-height: 1.4; margin: 0px 0px 10px; outline: 0px; padding: 0px 0px 10px; text-align: justify; text-transform: uppercase; vertical-align: baseline;"&gt;
&amp;nbsp;IN BRIEF&lt;/h2&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
The famous ‘60 Minutes’ television show shocked some viewers Sunday evening when a team of German hackers demonstrated how they spied on an iPhone used by U.S. Congressman, then recorded his phone calls and tracked his movement through Los Angeles.&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;Hackers leverage a security flaw in SS7 (Signalling System Seven) protocol that allows hackers to track phone locations, listen in on calls and text messages.&lt;/div&gt;
&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
The global telecom network&amp;nbsp;&lt;a href="http://thehackernews.com/2015/08/hacking-phone.html" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;SS7 is still vulnerable&lt;/a&gt;&amp;nbsp;to several security flaws that could let hackers and spy agencies listen to personal phone calls and intercept SMSes on a potentially massive scale, despite the most advanced encryption used by cellular networks.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
All one need is the target's phone number to track him/her anywhere on the planet and even eavesdrop on the conversations.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;SS7&amp;nbsp;&lt;/span&gt;or&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Signalling System Number 7&lt;/span&gt;&amp;nbsp;is a telephony signaling protocol used by more than 800 telecommunication operators around the world to exchange information with one another, cross-carrier billing, enabling roaming, and other features.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.7em; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Hackers Spied on US Congressman's Smartphone&lt;/h3&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
With US Congressman Ted Lieu's permission for a piece broadcast Sunday night by&amp;nbsp;&lt;a href="http://www.cbsnews.com/news/60-minutes-hacking-your-phone/" rel="nofollow" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;60 Minutes&lt;/a&gt;, Karsten Nohl of German Security Research Labs was able to intercept his iPhone, record phone call made from his phone to a reporter, and track his precise location in real-time.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
During the phone call about the cell phone network hacking, Lieu said:&amp;nbsp;&lt;i style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;"First, it's really creepy, and second, it makes me angry."&lt;/i&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq" style="background: rgb(250, 250, 250); border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px; quotes: none; text-align: justify; vertical-align: baseline;"&gt;
"Last year, the President of the United States called me on my phone, and we discussed some issues," he added. "So if hackers were listening in, they'd know that phone conversation, and that is immensely troubling."&lt;/blockquote&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
What's more awful is that the designing flaws in SS7 have been in&amp;nbsp;&lt;a href="http://thehackernews.com/2014/12/hackers-can-read-your-private-sms-and.html" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;circulation since 2014&lt;/a&gt;, when the same German researchers' team alerted the world to it. Some flaws were patched, but few apparently remain or intentionally left, as some observers argue, for governments to snoop on its targets.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
The major&amp;nbsp;&lt;a href="http://thehackernews.com/2014/09/how-cell-phone-user-can-be-secretly_17.html" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;problem with SS7&lt;/a&gt;&amp;nbsp;is that if any one of the telecom operators is hacked or employs a rogue admin, a large scale of information, including voice calls, text messages, billing information, relaying metadata and subscriber data, is wide open to interception.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
The weakness&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;affects all phones&lt;/span&gt;, whether it's iOS, Android, or whatever, and is a major security issue. Although the network operators are unwilling or unable to patch the hole, there is little the smartphone users can do.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;h3 style="border: 0px; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.7em; font-stretch: inherit; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
How Can You Avoid this Hack?&lt;/h3&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
The best mitigation is to use communication apps – that offers "&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;end-to-end encryption&lt;/span&gt;" to encrypt your data before it leaves your smartphone – over your phone's standard calling feature.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Lieu, who sits on House subcommittees for information technology and national security, also argues for Strong Encryption that, according to the Federal Bureau of Investigation (FBI), make it&amp;nbsp;&lt;a href="http://thehackernews.com/2015/12/fbi-end-to-end-encryption.html" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;harder to solve crimes&lt;/a&gt;.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Lieu strongly criticized the United States agencies, if any, that may have ignored such serious vulnerabilities that affect Billions of cellular customers.&lt;/div&gt;
&lt;blockquote class="tr_bq" style="background: rgb(250, 250, 250); border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px; quotes: none; text-align: justify; vertical-align: baseline;"&gt;
"The people who knew about this flaw [or flaws] should be fired," Lieu said on the show. "You can't have 300-some Million Americans—and really, right, the global citizenry — be at risk of having their phone conversations intercepted with a known flaw, simply because some intelligence agencies might get some data."&lt;/blockquote&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Few of such apps that are popular and offers end-to-end encryption are&amp;nbsp;&lt;a href="http://thehackernews.com/2015/03/signal-encrypted-ios-text-calls.html" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Signal&lt;/a&gt;,&amp;nbsp;&lt;a href="http://thehackernews.com/2016/04/whatsapp-end-to-end-encryption.html" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;WhatsApp&lt;/a&gt;, and&amp;nbsp;&lt;a href="http://thehackernews.com/2016/02/most-secure-messaging-app.html" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;Apple's iMessage&lt;/a&gt;&amp;nbsp;service that keep users communications safe from prying eyes and ears.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/hackers-can-spy-on-your-calls-and-track.html</link><author>noreply@blogger.com (T-W-S)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6243155472409305423.post-3641735675968156208</guid><pubDate>Sat, 03 Jun 2017 10:05:00 +0000</pubDate><atom:updated>2017-06-03T15:05:57.391+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">facebook</category><category domain="http://www.blogger.com/atom/ns#">hacking</category><category domain="http://www.blogger.com/atom/ns#">phishing</category><category domain="http://www.blogger.com/atom/ns#">scam</category><title>Here's the Facebook Hacking Tool that Can Really Hack Accounts, But</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;Here's the Facebook Hacking Tool that Can Really Hack Accounts, But...&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;img alt="Image result for Here's the Facebook Hacking Tool that Can Really Hack Accounts, But" height="371" src="http://fossbytes.com/wp-content/uploads/2016/02/facebook-hack.jpg" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Yes, you heard me right.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
A newly discovered Facebook hacking tool actually has the capability to hack Facebook account, but&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;YOURS&lt;/span&gt;, and not the one you desire to hack.&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;i style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;How to Hack Facebook account? How to Hack my Girlfriends Facebook account? My boyfriend is cheating on me, How do I hack his Facebook Account?&lt;/i&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #212121; font-family: &amp;quot;Source Sans Pro&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Helvetica, Arial, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;i style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
These are the queries that most of the Internet users search on Google.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
But Beware! If you come across any Facebook hacking tool that promises you to help you hack your friends Facebook accounts, you may end up downloading a hacking tool that could hack you, instead of them.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;h3 style="border: 0px; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.7em; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Facebook&amp;nbsp; Hacking Tool that Can Really Hack, But Your Accounts&lt;/h3&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="separator" style="border: 0px; clear: both; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWvAUFIfYJr3XVOGmc3yU8MP07i3tplXDZEciJPyh_3l-HtoG_WjS9SgMfN1LVnq3_YaU-pyh9lmSDLaDuh7Y3cuuC2DQJkfgXHpr-plT_zKIdoZ6jXdAS6JVeu_OZgsJlupgUpnfkewU/s1600/facebook-hacking-tools.png" imageanchor="1" style="border: 0px; clear: left; color: #428bca; cursor: default; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 1em 0px 0px; outline: none; padding: 0px; pointer-events: none; text-decoration-line: none; vertical-align: baseline;"&gt;&lt;img alt="Facebook Hacking Tool" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWvAUFIfYJr3XVOGmc3yU8MP07i3tplXDZEciJPyh_3l-HtoG_WjS9SgMfN1LVnq3_YaU-pyh9lmSDLaDuh7Y3cuuC2DQJkfgXHpr-plT_zKIdoZ6jXdAS6JVeu_OZgsJlupgUpnfkewU/s1600/facebook-hacking-tools.png" style="border: 0px; clear: both; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; max-width: 728px; outline: none; padding: 0px; vertical-align: baseline;" title="Facebook Hacking Tool" /&gt;&lt;/a&gt;&lt;/div&gt;
Dubbed&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Remtasu&lt;/span&gt;, the tool is marketing itself as a Facebook hacking tool but actually is a&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Windows-based Trojan&lt;/i&gt;&lt;/span&gt;&amp;nbsp;that has accelerated globally over the past year, and has now capability to disguise itself as an app for accessing people's Facebook account credentials.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
The tool contains a&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Keylogger&lt;/span&gt;&amp;nbsp;that can capture all your keystrokes and store them in a file that is subsequently sent to the attacker's server.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
The malicious Facebook hacking tool is exploiting&amp;nbsp;&lt;i style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;"the constant desire of a lot of users to take control of accounts from this well-known social network,"&amp;nbsp;&lt;/i&gt;according to a Monday&amp;nbsp;&lt;a href="http://www.welivesecurity.com/2016/02/08/remtasu-disguising-tool-appropriate-facebook-accounts/" rel="nofollow" style="border: 0px; color: #428bca; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none; padding: 0px; text-decoration-line: none; vertical-align: baseline;" target="_blank"&gt;blog post&lt;/a&gt;&amp;nbsp;by IT security company ESET.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;h3 style="border: 0px; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.7em; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
How Remtasu Works:&lt;/h3&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
The malicious tool is delivered via direct download websites.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-style: normal; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Once a user visits one of these websites, the dangerous&amp;nbsp;&lt;i style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Win32/Remtasu.Y&amp;nbsp;&lt;/i&gt;malware automatically gets downloaded and executed on victim's machine and hide itself among other files.&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Remtasu has capability to:&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;ul style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Open and obtain information from the clipboard.&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Capture keystrokes.&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Store all the data in a file which is subsequently sent to an FTP server.&lt;/li&gt;
&lt;/ul&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;ul style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 20px 20px 35px; outline: 0px; padding: 0px 0px 0px 5px; vertical-align: baseline;"&gt;&lt;/ul&gt;
&lt;h4 style="border: 0px; font-family: &amp;quot;Roboto Condensed&amp;quot;, sans-serif; font-size: 1.4em; font-stretch: inherit; font-variant-numeric: inherit; font-weight: inherit; line-height: 1.5em; margin: 0px 0px 10px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
The worst part is yet to come:&lt;/h4&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
The malware remains on the infected computer even when the victim reboots their system or attempts to find the malware threat in the list of active processes.&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq" style="background: rgb(250, 250, 250); border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 20px 0px; outline: 0px; padding: 15px; quotes: none; text-align: justify; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;"In this case, the malware replicates itself, saving the copy in a folder that it also creates within the system32 folder,"&lt;/span&gt;&amp;nbsp;reads the post.&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;"The new InstallDir folder remains hidden inside the system files, making it difficult for users to access."&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="content: &amp;quot; &amp;quot;; display: block; margin: 20px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
Most affected parts of the world include Colombia, Turkey, Thailand and elsewhere. In past, Remtasu was distributed through malicious files attached to phishing emails purporting to be from legitimate government or businesses organisations.&lt;/div&gt;
&lt;/div&gt;
&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>https://usamaasif.blogspot.com/2017/06/heres-facebook-hacking-tool-that-can.html</link><author>noreply@blogger.com (T-W-S)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWvAUFIfYJr3XVOGmc3yU8MP07i3tplXDZEciJPyh_3l-HtoG_WjS9SgMfN1LVnq3_YaU-pyh9lmSDLaDuh7Y3cuuC2DQJkfgXHpr-plT_zKIdoZ6jXdAS6JVeu_OZgsJlupgUpnfkewU/s72-c/facebook-hacking-tools.png" width="72"/><thr:total>1</thr:total></item></channel></rss>