<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6012758317847145877</id><updated>2024-12-19T14:27:49.217+11:00</updated><category term="Security"/><category term="English"/><category term="Phishing"/><category term="Spanish"/><category term="Internet"/><category term="Attacks"/><category term="Hackers"/><category term="Seguridad"/><category term="Banks"/><category term="Linux"/><category term="news"/><category term="Facebook"/><category term="LinuxManPage"/><category term="PCI"/><category term="Passwords"/><category term="RedHat"/><category term="Tip"/><category term="TrojanHorse"/><category term="Virus"/><category term="Vulnerability"/><category term="Blackberry"/><category term="IDS"/><category term="Malware"/><category term="Tools"/><category term="configuración"/><category term="unbelievable"/><category term="Atari"/><category term="Blog"/><category term="CEH"/><category term="Chrome"/><category term="Cisco"/><category term="Conceptos"/><category term="Crypto"/><category term="Humor"/><category term="Intellinx"/><category term="Law"/><category term="Lenguajes"/><category term="LiveCD"/><category term="Microsoft"/><category term="Oracle10g"/><category term="Patchs"/><category term="Pentest"/><category term="Persona"/><category term="SIEM"/><category term="Snort"/><category term="SocialHacking"/><category term="SocialNetwork"/><category term="Tech"/><category term="To be Proud"/><category term="US-CERT Cyber Security Bulletin"/><category term="Windows"/><category term="cybercrime"/><category term="respaldo"/><title type='text'>HACKING AUSTRALIA</title><subtitle type='html'>IT Security is a dynamic environment, every company/person need to guarantee their assess in order to achieve their goals. This blog focus on that and other topics of security manners, like: Information Security, Ethical Hacking, Vulnerability among others.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://ajcborges.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>141</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-6829140198546783536</id><published>2015-02-16T17:24:00.001+11:00</published><updated>2015-02-16T17:25:48.650+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cybercrime"/><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>The Daily Beast: Hacking Ring Steals Up To $1B From Banks.</title><content type='html'>&lt;p dir=&quot;ltr&quot;&gt;An international hacking ring that&#39;s been active since at least the end of 2013 has stolen up to $1 billion from banks around the world, according to a cybersecurity firm report released Monday. &lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The group has&amp;#160;breached more than 100 banks in 30 countries through methods including programming ATMs to release money at certain times and transferring money to fake accounts, according to Russian security company Kaspersky Lab.&amp;#160;The hackers become familiar with banks&#39; systems through phishing,&amp;#160;taking screen shots as well as filming employees using work computers, the report said. &lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;The theft targets banks instead of customers, which means the hackers are focused on stealing money rather than information, according to Kaspersky principal security researcher Vicente Diaz. &lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Financial institutions in the U.S., Russia, Germany, China and Ukraine have been targeted, but the hackers may be casting a bigger net to include banks in Africa and Europe.&amp;#160;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Source: http://google.com/newsstand/s/CBIw68zrvyA&lt;/p&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/6829140198546783536'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/6829140198546783536'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2015/02/the-daily-beast-hacking-ring-steals-up.html' title='The Daily Beast: Hacking Ring Steals Up To $1B From Banks.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-2420470866352925448</id><published>2014-11-23T10:46:00.000+11:00</published><updated>2014-11-23T10:46:48.114+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>A deep look into the Brazilian underground cyber-market</title><content type='html'>&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;text-align: justify;&quot;&gt;
 &lt;tbody&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt;&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&lt;fb:like href=&quot;http://securityaffairs.co/wordpress/30350/cyber-crime/brazilian-underground-cyber-market.html&quot; layout=&quot;button_count&quot; share=&quot;false&quot; show_faces=&quot;false&quot; width=&quot;450&quot;&gt;&lt;/fb:like&gt;Trend
  Micro has published a new study on black cyber-markets focusing on product
  and services offered on the Brazilian underground.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;Trend Micro has published a
  new interesting report on the &lt;a href=&quot;http://resources.infosecinstitute.com/pricing-policies-cyber-criminal-underground/&quot; target=&quot;_blank&quot; title=&quot;http://resources.infosecinstitute.com/pricing-policies-cyber-criminal-underground/&quot;&gt;underground
  cyber-markets&lt;/a&gt;, this is a third study focused on the Brazilian
  cyber-underground offer, the previous ones&amp;nbsp;analyzed &lt;a href=&quot;http://securityaffairs.co/wordpress/24440/cyber-crime/evolution-russian-underground.html&quot; target=&quot;_blank&quot; title=&quot;Evolution of the Russian underground offer&quot;&gt;Russian&lt;/a&gt;
  and &lt;a href=&quot;http://securityaffairs.co/wordpress/22797/cyber-crime/trend-micro-report-chinese-mobile-underground-market.html&quot; target=&quot;_blank&quot; title=&quot;Trend Micro report on Chinese Mobile Underground Market&quot;&gt;Chinese
  marketplaces&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;The new study, exactly like
  previous analysis,&amp;nbsp;describes a thriving marketplace where cyber
  criminals proposes their services and products to criminal crews that instead
  of creating&amp;nbsp;their own attack tools from scratch&amp;nbsp;could benefit of
  the&amp;nbsp;competitive offer.&amp;nbsp;The study reports the principal solution and
  services proposed to the crooks in a model of sale known as &lt;a href=&quot;http://securityaffairs.co/wordpress/16855/cyber-crime/the-rise-of-hacking-services.html&quot; target=&quot;_blank&quot; title=&quot;Cybercrime-as-a-Service, the rise of hacking services&quot;&gt;crime-as-a-service&lt;/a&gt;&amp;nbsp;that
  is able to attract new actors in the cyber arena.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;A first data that
  immediately catches the attacention of the experts is decrease of prices
  recently offered, this is a further element of attractive for criminals that
  look to the cyber crime with increasing interest.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;em&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;“The barriers to
  launching cybercrime have decreased. Toolkits are becoming more available and
  cheaper; some are even offered free of charge. Prices are lower and features
  are richer. Underground forums are thriving worldwide, particularly in
  Russia, China, and Brazil. These have become popular means to sell products
  and services to cybercriminals in the said countries. Cybercriminals are also
  making use of the Deep Web to sell products and services outside the indexed
  or searchable World Wide Web, making their online “shops” harder for law
  enforcement to find and take down.” states the &lt;a href=&quot;http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-the-brazilian-underground-market.pdf&quot; target=&quot;_blank&quot; title=&quot;http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-the-brazilian-underground-market.pdf&quot;&gt;‘The
  Brazilian Underground Market’ report&lt;/a&gt;.&lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;Another element of
  distinction between the&amp;nbsp;Brazilian underground and the Russian and
  Chinese ones, is the availability of&amp;nbsp;training services, for this reason
  the Brazilian underground ecosystem is also considered as the market for
  cybercriminal Wannabes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;em&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;“What distinguishes the
  Brazilian underground from others is the fact that it also offers training
  services for cybercriminal wannabes,” according to the whitepaper.
  “Cybercriminals in Brazil particularly offer FUD (fully undetectable) crypter
  programming and fraud training by selling how-to videos and providing support
  services via Skype. Anyone who is Internet savvy and has basic computing
  knowledge and skill can avail of training services to become cybercriminals.
  How-to videos and forums where they can exchange information with peers
  abound underground. Several trainers offer services as well. They even offer
  support when training ends.”&lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;The Brasilian cyber
  criminals&amp;nbsp;seem to be more ruthless in the use of media platforms like
  Facebook,&amp;nbsp;&lt;a href=&quot;http://securityaffairs.co/wordpress/22582/cyber-crime/youtube-ads-network-serving-caphaw-banking-trojan.html&quot; target=&quot;_blank&quot; title=&quot;YouTube ads network serving Caphaw Banking Trojan&quot;&gt;YouTube&lt;/a&gt;,
  Twitter, &lt;a href=&quot;http://securityaffairs.co/wordpress/13502/cyber-crime/how-cybercrime-uses-compromised-skype-account.html&quot; target=&quot;_blank&quot; title=&quot;How cybercrime uses a compromised Skype account&quot;&gt;Skype&lt;/a&gt;,
  and &lt;a href=&quot;http://securityaffairs.co/wordpress/26789/security/whatsapp-profile-picture-risky-feature.html&quot; target=&quot;_blank&quot; title=&quot;WhatsApp profile picture: a risky feature? In the mind of a hacker&quot;&gt;WhatsApp&lt;/a&gt;,&amp;nbsp;differently
  from Russian and Chinese players that “hide in the &lt;a href=&quot;http://securityaffairs.co/wordpress/9409/security/the-deep-web-part-1-introduction-to-the-deep-web-and-how-to-wear-clothes-online.html&quot; target=&quot;_blank&quot; title=&quot;The Deep Web Part 1: Introduction to the Deep Web and how to wear clothes online!&quot;&gt;Deep&amp;nbsp;Web&lt;/a&gt;
  and use tools that ordinary users&amp;nbsp;do not such as Internet Relay Chat
  (IRC)&amp;nbsp;channels”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Calibri, sans-serif;&quot;&gt;For several years, Brazil
  has been known for the offer of&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://securityaffairs.co/wordpress/26359/cyber-crime/massive-boleto-fraud-brazil.html&quot; style=&quot;font-family: Calibri, sans-serif;&quot; target=&quot;_blank&quot; title=&quot;Massive Boleto fraud in Brazil caused 3,75 USD billion losses&quot;&gt;banking
  Trojan&lt;/a&gt;&lt;span style=&quot;font-family: Calibri, sans-serif;&quot;&gt;s, many malware were designed by Brazilian which targeted internal
  banking users and that implemented several&amp;nbsp;techniques to steal victims’&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;
credentials.&amp;nbsp;Brazil ranks second worldwide in terms of&amp;nbsp;online
  banking fraud and malware infection, on a global scale it accounts for
  almost&amp;nbsp;9% of the total number of &lt;a href=&quot;http://securityaffairs.co/wordpress/16207/malware/group-ib-new-android-banking-trojan-appeared-on-the-blackmarket.html&quot; target=&quot;_blank&quot; title=&quot;Group-IB: New Android banking trojan appeared on the blackmarket&quot;&gt;online-banking
  malicious code&lt;/a&gt; that&amp;nbsp;compromised&lt;/div&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;

  &lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;&lt;a href=&quot;http://securityaffairs.co/wordpress/wp-content/uploads/2014/11/Brazilian-underground-banking-malware.png&quot;&gt;&lt;span style=&quot;text-decoration: none; text-underline: none;&quot;&gt;&lt;img alt=&quot;Brazilian underground banking malware&quot; border=&quot;0&quot; class=&quot;aligncenter wp-image-30354&quot; height=&quot;350&quot; id=&quot;_x0000_i1026&quot; src=&quot;http://securityaffairs.co/wordpress/wp-content/uploads/2014/11/Brazilian-underground-banking-malware.png&quot; title=&quot;A deep look into the Brazilian underground cyber market&quot; width=&quot;480&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;

  &lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;Banking Trojan
  source&amp;nbsp;codes are sold for around US$386 each, the offer allows buyers
  to&amp;nbsp;modify their codes according their needs,&amp;nbsp;they
  can&amp;nbsp;obfuscate strings,&amp;nbsp;customize the composition of
  payloads&amp;nbsp;and add&amp;nbsp;crypters&amp;nbsp;and other solution to evade the
  detection. Another product very popular are &amp;nbsp;&lt;a href=&quot;http://securityaffairs.co/wordpress/26359/cyber-crime/massive-boleto-fraud-brazil.html&quot; target=&quot;_blank&quot; title=&quot;Massive Boleto fraud in Brazil caused 3,75 USD billion losses&quot;&gt;Bolware&lt;/a&gt;
  kits and toolkits used to create bolware&amp;nbsp;that are offered for around
  US$155, the applications offered by cybercriminals are user-friendly and
  implements an easy to use&amp;nbsp;control panel for monitoring and managing
  infections and malicious activities.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;&lt;a href=&quot;http://securityaffairs.co/wordpress/wp-content/uploads/2014/11/Brazilian-underground-banking-malware-prices.png&quot;&gt;&lt;span style=&quot;text-decoration: none; text-underline: none;&quot;&gt;&lt;img alt=&quot;Brazilian underground banking malware prices&quot; border=&quot;0&quot; class=&quot;aligncenter wp-image-30357&quot; height=&quot;197&quot; id=&quot;_x0000_i1027&quot; src=&quot;http://securityaffairs.co/wordpress/wp-content/uploads/2014/11/Brazilian-underground-banking-malware-prices.png&quot; title=&quot;A deep look into the Brazilian underground cyber market&quot; width=&quot;480&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;

  &lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;The Brazilian underground
  also offers&amp;nbsp;a&amp;nbsp;bank fraud&amp;nbsp;courses&amp;nbsp;for&amp;nbsp;aspiring
  cyber-criminals, the courses are very articulated and propose detailed
  information for beginners to the criminal activities. The courses starts
  presenting the fraud workflow and tools necessary to arrange a cyber fraud.
  Some coursed are arranged in modules that propose interesting information on
  the illegal practices to&amp;nbsp;cybercriminal wannabes that can acquire
  also&amp;nbsp;interactive guides and practical exercises (e.g., simulating
  attacks). A 10-module corse for example is offered for US$468, the operators
  also offer updates and a&amp;nbsp;Skype contact service.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;According to the author of
  the study on the Brazilian underground market,&amp;nbsp;Trend Micro Senior Threat
  Researcher Fernando Merces, several factors have contributed to the growth of
  cyber-criminal activity in the country like limited resources assigned to law
  enforcement and the existence of a flexible underground market.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;em&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;“For example, Brazil
  has a lack of concrete laws and limited law enforcement agency resources that
  address cybercrime in the country,” he noted. “Additionally, the
  technological and consumer landscape in Brazil, which has a&amp;nbsp;&lt;a href=&quot;http://www.forbes.com/sites/ricardogeromel/2014/07/03/brazil-by-numbers-must-know-facts-about-the-host-of-the-fifa-world-cup/&quot;&gt;50%
  Internet penetration rate&lt;/a&gt;,&amp;nbsp;and a 69% credit card penetration rate,
  has made the country all too appealing for cybercriminals. However, another
  factor may have also contributed to Brazilian cybercrime: the existence of a
  flexible underground market with different offerings, ranging from banking
  Trojan development to online fraud training. The latter is highly notable as
  this is the most unique item in the market, which may not be found in other
  underground markets.” &lt;a href=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/localized-tools-and-services-prominent-in-the-brazilian-underground/&quot; target=&quot;_blank&quot; title=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/localized-tools-and-services-prominent-in-the-brazilian-underground/&quot;&gt;explained
  Merces in a blog post&lt;/a&gt;. &amp;nbsp;&lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;The report details prices
  and products for many other products and services, including Credit card credentials
  and number generators, SMS-spamming services and&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://securityaffairs.co/wordpress/27935/cyber-crime/apwg-q2-2014-report.html&quot;&gt;phishing&lt;/a&gt;&amp;nbsp;pages
  for popular banks.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;Let me close the post with
  a meaningful statement from the author of the study that explain how is
  simple today to become a dangerous cyber criminals with limited resources.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;em&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;“In Brazil, it’s
  possible to start a new career in cybercrime armed with only US$500,” Merces
  blogged. “Would-be cybercriminals are supported and helped by tools, forums,
  and experts from the dark side of the Internet. These bad guys do not fear
  the authorities and their groups get bigger in a short span of time.”&lt;/span&gt;&lt;/em&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;Let me suggest you to read
  the full&amp;nbsp;&lt;a href=&quot;http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/wp-the-brazilian-underground-market.pdf&quot;&gt;report&lt;/a&gt;&amp;nbsp;published
  by Trend Micro, it is full of interesting data.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;&lt;a href=&quot;http://www.linkedin.com/pub/pierluigi-paganini/b/742/559&quot; target=&quot;_blank&quot; title=&quot;http://www.linkedin.com/pub/pierluigi-paganini/b/742/559&quot;&gt;Pierluigi&amp;nbsp;Paganini&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;(&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;&lt;a href=&quot;http://securityaffairs.co/wordpress/&quot; target=&quot;_blank&quot; title=&quot;http://securityaffairs.co/wordpress/&quot;&gt;Security Affairs&lt;/a&gt;&lt;b&gt;&amp;nbsp;–
  &amp;nbsp;Brazilian underground&lt;strong&gt;,
  cybercrime&lt;/strong&gt;)&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;The post &lt;a href=&quot;http://securityaffairs.co/wordpress/30350/cyber-crime/brazilian-underground-cyber-market.html&quot;&gt;A
  deep look into the Brazilian underground cyber-market&lt;/a&gt; appeared first on &lt;a href=&quot;http://securityaffairs.co/wordpress&quot;&gt;Security Affairs&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Calibri, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,sans-serif;&quot;&gt;
&lt;a href=&quot;http://securityaffairs.co/wordpress/30350/cyber-crime/brazilian-underground-cyber-market.html&quot;&gt;View
article...&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/2420470866352925448'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/2420470866352925448'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2014/11/a-deep-look-into-brazilian-underground.html' title='A deep look into the Brazilian underground cyber-market'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-5101513305235015648</id><published>2014-11-06T21:28:00.001+11:00</published><updated>2014-11-06T21:28:00.302+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>New technique makes phishing sites easier to create, more difficult to&#xa;spot.</title><content type='html'>&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);&quot;&gt;Posted on 05 November 2014.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br&gt;&lt;/div&gt;&lt;div&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);&quot;&gt;Researchers have spotted a new technique used by phishers which could trick even more users into believing they are entering their information in a legitimate web form.&lt;br&gt;&lt;br&gt;Instead of replicating as faithfully as possible a legitimate website - for example an e-commerce site - the attackers need only to set up a phishing page with a proxy program which will act as a relay to the legitimate site, and create a few fake pages for when users need to enter their personal and financial information.&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;center style=&quot;text-align: start;&quot;&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);&quot;&gt;&lt;img src=&quot;http://www.net-security.org/images/articles/phish-05112014.jpg&quot;&gt;&lt;/span&gt;&lt;/center&gt;&lt;span style=&quot;-webkit-text-size-adjust: auto; background-color: rgba(255, 255, 255, 0);&quot;&gt;&lt;br&gt;&quot;So long as the would-be-victim is just browsing around the site, they see the same content as they would on the original site. It is only when any payment information is entered that modified pages are displayed to the user,&quot; Trend Micro Senior Threat Researcher Noriaki Hayashi&amp;nbsp;&lt;a href=&quot;http://blog.trendmicro.com/trendlabs-security-intelligence/new-phishing-technique-outfoxes-site-owners-operation-huyao/&quot; target=&quot;_new&quot;&gt;explains&lt;/a&gt;.&lt;br&gt;&lt;br&gt;&quot;It does not matter what device (PC/laptop/smartphone/tablet) or browser is used, as the attacker proxies all parts of the victim’s HTTP request and all parts of the legitimate server’s response.&quot;&lt;br&gt;&lt;br&gt;In the spotted attack, users are directed to the malicious site by clicking on a search result they got by entering a product&#39;s name. The attackers used a number of blackhat SEO techniques to make the URL appear in the results. But spam emails and messages can also be used to lure potential victims to the malicious site.&lt;br&gt;&lt;br&gt;The actual attack begins when the user clicks on the “Add to Basket” button on the legitimate site - the attacker has re-written the function so that the user is redirected to a spoofed e-cart page that leads to more fake pages simulating the checkout process.&lt;br&gt;&lt;br&gt;The first page asks the victims to enter their personal information (name, address, phone number) as well as their email address and password. The second one requests the entry of credit card information (including the card&#39;s security code). The third one asks for additional information that is sometimes required to authorize a transaction.&lt;br&gt;&lt;br&gt;Once the victims have submitted all this information, they will receive a fake confirmation email for the purchase to the email address submitted - and the illusion is complete.&lt;br&gt;&lt;br&gt;&quot;So far, we have only identified this attack targeting one specific online store in Japan. However, if this attack becomes more prominent, it could become a very worrying development: this makes phishing harder to detect by end users, as the phishing sites will be nearly identical to the original sites,&quot; Hayashi noted.&lt;br&gt;&lt;br&gt;This approach makes phishing websites much easier to set up, and very difficult for the owners of the legitimate websites to detect.&amp;nbsp;&lt;br&gt;&lt;br&gt;Undoubtedly, we&#39;ll be seeing more similar attacks in the future.&lt;br&gt;&lt;br&gt;&lt;a href=&quot;mailto:zeljka.zorz(at)net-security.org&quot;&gt;&lt;img src=&quot;http://www.net-security.org/images/articles/zeljka.jpg&quot; border=&quot;0&quot; align=&quot;left&quot;&gt;&lt;/a&gt;&lt;br&gt;&lt;br&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/5101513305235015648'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/5101513305235015648'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2014/11/new-technique-makes-phishing-sites.html' title='New technique makes phishing sites easier to create, more difficult to&#xa;spot.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-6667227618073107333</id><published>2014-10-12T20:55:00.001+11:00</published><updated>2014-10-12T20:55:47.070+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>How To Protect Yourself From Phishing Scams</title><content type='html'>&lt;h1 style=&quot;font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, &#39;Nimbus Sans L&#39;, sans-serif; color: rgb(33, 33, 33); font-size: 1.3em; line-height: 1.32692em; margin-top: 0em; margin-bottom: 0.35938em;&quot;&gt;
		&lt;/h1&gt;&lt;h1 style=&quot;font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, &#39;Nimbus Sans L&#39;, sans-serif; color: rgb(33, 33, 33); font-size: 1.3em; line-height: 1.32692em; margin-top: 0em; margin-bottom: 0.35938em;&quot;&gt;&lt;br&gt;&lt;/h1&gt;
	
	&lt;div&gt;
      
              
														&lt;/div&gt;
	&lt;div style=&quot;font-size:0.75em;line-height:1.34167em;color:rgb(135, 135, 135);margin-bottom:1em;&quot;&gt;
          By: &lt;a style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; href=&quot;https://community.norton.com/users/nadiakovacs&quot;&gt;Nadia_Kovacs&lt;/a&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Posted: 30-Sep-2014 | &lt;a x-apple-data-detectors-result=&quot;1&quot; x-apple-data-detectors=&quot;true&quot; x-apple-data-detectors-type=&quot;calendar-event&quot;&gt;10:16AM&lt;/a&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;font-size:0.75em;line-height:1.34167em;color:rgb(135, 135, 135);margin-bottom:1em;&quot;&gt;&lt;img width=&quot;600&quot; x-evernote-mime=&quot;image/png&quot; src=&quot;evernotecid://08AB2683-124D-455F-A18F-586529739075/ENResource/p1577&quot; height=&quot;400&quot; style=&quot;font-family: &#39;Helvetica Neue Light&#39;, HelveticaNeue-Light, helvetica, arial, sans-serif; font-size: 17px; line-height: normal;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin:1.2em 0px 1.5em;&quot;&gt;&lt;div style=&quot;margin-top:1.2em;margin-bottom:1.2em;&quot;&gt;&lt;div&gt;


																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;October is National Cyber Security Awareness month. Phishing is one of the oldest&amp;nbsp;tricks in the Internet book that tries to trick you out of divulging your personal information. This is part 4 in a series of blog posts we will be publishing on various topics aimed at educating you on how to stay protected on today’s Internet landscape.&lt;/p&gt;




																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;Phishing is essentially an online con game and phishers are nothing more than tech-savvy con artists and identity thieves. They use SPAM, malicious web sites, email messages and instant messages to trick people into divulging sensitive information, such as bank and credit card accounts, usernames and passwords.&lt;/p&gt;




																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;&lt;strong&gt;How Do You Know It’s A Scam?&lt;/strong&gt;&lt;/p&gt;


																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;There are different forms of phishing tactics. Criminals may try to trick you into giving away your personal information via emails, Social Media messages, IMs, text messages, and even Internet chat rooms. Sometimes criminals may try to fool you into installing a malicious program, known as spyware, which can track and record the information you enter into your computer. Below are some of the commonly used tactics and warning signs you should be on the lookout for:&lt;/p&gt;


																	
				&lt;ul style=&quot;margin:1.4375em 0px;padding:0px 0px 0px 1.4em;&quot;&gt;
																		
					&lt;li&gt;Phishers, pretending to be legitimate companies, may use email to request personal information and direct recipients to respond through malicious websites. Phishers have been known to use real company logos, and will also use a spoofed email address, which is an email address that is similar to the actual company’s address. However, the address may be misspelled slightly or come from a spoofed domain.&lt;/li&gt;
	
																		
					&lt;li&gt;Emails may come in the form of a help desk support ticket, a message from your bank, or from someone soliciting money via a &lt;a rel=&quot;nofollow&quot; style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; href=&quot;http://www.symantec.com/connect/blogs/beyond-nigerian-prince-modern-419-scams&quot;&gt;419 scam&lt;/a&gt;.&lt;/li&gt;
	
																		
					&lt;li&gt;Phishers tend to use a call to action. You may get a notice that an account is being shut down and you need to log into it to avoid that from happening. They may also request personal information in order to verify your identity.&lt;/li&gt;
	
																		
					&lt;li&gt;Phishing websites can look remarkably like legitimate sites because they tend to use the copyrighted images the original sites.&lt;/li&gt;
	
																		
					&lt;li&gt;Fraudulent messages are often not personalized and will often have misspellings of words and company names.&lt;/li&gt;

																	
				&lt;/ul&gt;
																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;&lt;strong&gt;How Do You Know If You Have Spyware?&lt;/strong&gt;&lt;/p&gt;


																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;Spyware can be downloaded from web sites, email messages, instant messages, and from direct file-sharing connections. Additionally, a user may unknowingly receive spyware by installing a software program, and the spyware piggybacks onto that installation as additional suggested software. Users may also be unaware that some browser add-ons contain spyware.&lt;/p&gt;


																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;Spyware frequently attempts to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. However, sometimes there can be signs that you may be infected:&lt;/p&gt;


																	
				&lt;ul style=&quot;margin:1.4375em 0px;padding:0px 0px 0px 1.4em;&quot;&gt;
																		
					&lt;li&gt;Your computer starts to run slower than usual.&lt;/li&gt;
	
																		
					&lt;li&gt;You start to receive an unusual amount of pop up ads.&lt;/li&gt;
	
																		
					&lt;li&gt;There are new toolbars on your browser that you did not install.&lt;/li&gt;
	
																		
					&lt;li&gt;Your browser’s home page has changed to a page that you are unfamiliar with.&lt;/li&gt;
	
																		
					&lt;li&gt;Your web searches become redirected to other spam sites.&lt;/li&gt;

																	
				&lt;/ul&gt;
																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;&lt;strong&gt;How Do I Avoid Spyware?&lt;/strong&gt;&lt;/p&gt;


																	
				&lt;ul style=&quot;margin:1.4375em 0px;padding:0px 0px 0px 1.4em;&quot;&gt;
																		
					&lt;li&gt;Be selective about what you download to your computer.&lt;/li&gt;
	
																		
					&lt;li&gt;Watch out for anti-spyware scams.&lt;/li&gt;
	
																		
					&lt;li&gt;Beware of clickable ads.&lt;/li&gt;
	
																		
					&lt;li&gt;Use &lt;a rel=&quot;nofollow&quot; style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; href=&quot;http://us.norton.com/norton-security-antivirus/&quot;&gt;Norton Security&lt;/a&gt; to provide anti-spyware protection and proactively protect from other security risks.&lt;/li&gt;
	
																		
					&lt;li&gt;Do not accept or open suspicious error dialogs from within the browser.&lt;/li&gt;
	
																		
					&lt;li&gt;Spyware may come as part of a &quot;free deal&quot; offer - do not accept free deals.&lt;/li&gt;
	
																		
					&lt;li&gt;Keep software and security patches up to date.&lt;/li&gt;

																	
				&lt;/ul&gt;
																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;&lt;strong&gt;How Do I Protect My Privacy?&lt;/strong&gt;&lt;/p&gt;


																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;If you happen to run across any of these red flags, here are some tips to keep yourself safe and protect your privacy:&lt;/p&gt;


																	
				&lt;ul style=&quot;margin:1.4375em 0px;padding:0px 0px 0px 1.4em;&quot;&gt;
																		
					&lt;li&gt;Never give out any personal information via email, social media platforms, text messages or instant messages.&lt;/li&gt;
	
																		
					&lt;li&gt;If the call to action is to click on a link and sign into the site with your username and password, never click on the link. Instead, go to your web browser and type in the website’s URL. Be sure to look for the verified https:/ at the beginning of the URL in the task bar.&lt;/li&gt;
	
																		
					&lt;li&gt;Never download a program or file from a suspicious email. These may contain programs such as spyware and keyloggers.&lt;/li&gt;

																	
				&lt;/ul&gt;
																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;&lt;strong&gt;How Can You Help?&lt;/strong&gt;&lt;/p&gt;


																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;Please contact the Symantec Security Response team if:&lt;/p&gt;


																	
				&lt;ul style=&quot;margin:1.4375em 0px;padding:0px 0px 0px 1.4em;&quot;&gt;
																		
					&lt;li&gt;&lt;a rel=&quot;nofollow&quot; style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; href=&quot;https://submit.symantec.com/antifraud/false_positive.cgi&quot;&gt;A legitimate web page has been misidentified as a known or suspected phishing site.&lt;/a&gt;&lt;/li&gt;
	
																		
					&lt;li&gt;&lt;a rel=&quot;nofollow&quot; style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; href=&quot;https://submit.symantec.com/antifraud/phish.cgi&quot;&gt;A phishing site has not been properly identified.&lt;/a&gt;&lt;/li&gt;

																	
				&lt;/ul&gt;
																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;This is part 4 of a series of blogs for&amp;nbsp;&lt;a style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; rel=&quot;nofollow&quot; href=&quot;http://www.dhs.gov/national-cyber-security-awareness-month-2014&quot;&gt;National Cyber Security Awareness Month&lt;span style=&quot;background-image: url(https://community.norton.com/sites/all/modules/contrib/extlink/extlink_s.png); width: 10px; height: 10px; padding-right: 12px; background-position: 2px 50%; background-repeat: no-repeat no-repeat;&quot;&gt;&lt;span style=&quot;clip:rect(1px 1px 1px 1px);overflow:hidden;height:1px;position:absolute;&quot;&gt; (link is external)&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;.&lt;/p&gt;


																	
				&lt;p style=&quot;margin:0.14375em 0px 0.8625em;&quot;&gt;For more information on various topics, check out:&lt;br&gt;&lt;a style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; rel=&quot;nofollow&quot; href=&quot;https://community.norton.com/blogs/norton-protection-blog/5-ways-you-didnt-know-you-could-get-virus-malware-or-your-social&quot;&gt;5 Ways You Didn&#39;t Know You Could Get a Virus, Malware, or Your Social Account Hacked&lt;/a&gt;&lt;br&gt;&lt;a style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; rel=&quot;nofollow&quot; href=&quot;https://community.norton.com/blogs/norton-protection-blog/how-choose-secure-password&quot;&gt;How To Choose a Secure Password&lt;/a&gt;&lt;br&gt;&lt;a style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; rel=&quot;nofollow&quot; href=&quot;https://community.norton.com/blogs/norton-protection-blog/how-avoid-identity-theft-online&quot;&gt;How To Avoid Identity Theft Online&lt;/a&gt;&lt;br&gt;&lt;a rel=&quot;nofollow&quot; style=&quot;color: rgb(73, 82, 211); text-decoration: none;&quot; href=&quot;https://community.norton.com/blogs/norton-protection-blog/how-protect-yourself-cyberstalkers&quot;&gt;How To Protect Yourself From Cyberstalkers&lt;/a&gt;&lt;/p&gt;
			&lt;/div&gt;
		&lt;/div&gt;
	&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/6667227618073107333'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/6667227618073107333'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2014/10/how-to-protect-yourself-from-phishing.html' title='How To Protect Yourself From Phishing Scams'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne Melbourne</georss:featurename><georss:point>-37.748587 144.913346</georss:point></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-4636300225285463839</id><published>2014-07-30T16:50:00.000+10:00</published><updated>2014-07-30T16:50:49.105+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Avoid using Instagram on public Wi-Fi...</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://cdn.slashgear.com/wp-content/uploads/2013/07/Instagram-logo2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://cdn.slashgear.com/wp-content/uploads/2013/07/Instagram-logo2.jpg&quot; height=&quot;208&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
A configuration problem in Facebook&#39;s popular Instagram application for Apple devices could allow a hacker to hijack a person&#39;s account if they&#39;re both on the same public Wi-Fi network.&lt;br /&gt;
&lt;br /&gt;
Stevie Graham, who describes himself as a &quot;hacker at large&quot; based in London, wrote on Twitter that Facebook won&#39;t pay him a reward for reporting the flaw, which he said he found years ago.&lt;br /&gt;
&lt;br /&gt;
Graham wrote he hopes to draw more attention to the issue by writing a tool that could quickly compromise many Instagram accounts. He cheekily calls the tool &quot;Instasheep,&quot; a play onFiresheep, a Firefox extension that can compromise online accounts in certain circumstances.&lt;br /&gt;
&lt;br /&gt;
&quot;I think this attack is extremely severe because it allows full session hijack and is easily automated,&quot; according to Graham&#39;s technical writeup. &quot;I could go to the Apple Store tomorrow and reap thousands of accounts in one day, and then use them to post spam.&quot;&lt;br /&gt;
&lt;br /&gt;
Graham&#39;s finding is a long-known configuration problem that has prompted many Web companies to fully encrypt all connections made with their servers. The transition to full encryption, signified by &quot;https&quot; in a browser URL bar and by the padlock symbol, can be technically challenging.&lt;br /&gt;
&lt;br /&gt;
Instagram&#39;s API (application programming interface) makes unencrypted requests to some parts of its network, Graham wrote. That poses an opportunity for a hacker who is on the same Wi-Fi network that doesn&#39;t use encryption or uses the outdated WEP encryption, which can be easily cracked.&lt;br /&gt;
&lt;br /&gt;
Some of those Instagram API calls transmit an unencrypted session cookie, or a data file that lets Instagram know a user is still logged in. By collecting the network traffic, known as a man-in-the-middle attack, the session cookie can be stolen and used by an attacker to gain control of the victim&#39;s account.&lt;br /&gt;
&lt;br /&gt;
Facebook officials didn&#39;t have an immediate comment, but Instagram&#39;s co-founder, Mike Krieger, wrote on Ycombinator&#39;s Hacker News feed that Instagram has been &quot;steadily increasing&quot; use of full encryption.&lt;br /&gt;
&lt;br /&gt;
Its &quot;Instagram Direct&quot; service, which allows photos to be shared with only small groups of people, is fully encrypted, he wrote. For more latency-sensitive endpoints, such as Instagram&#39;s main feed, the service is trying to make sure the transition to https doesn&#39;t affect performance, he wrote.&lt;br /&gt;
&lt;br /&gt;
&quot;This is a project we&#39;re hoping to complete soon, and we&#39;ll share our experiences in our [engineering] blog so other companies can learn from it as well,&quot; Krieger wrote.&lt;br /&gt;
&lt;br /&gt;
Google offered full encryption as an option for Gmail in 2008, but two years later made it the default. Facebook switched it on by default in January 2011&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Jeremy Kirk (IDG News Service) on 29 July, 2014 15:47&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;i&gt;&lt;b&gt;Source&lt;/b&gt;: http://www.computerworld.com.au/article/551120/using_instagram_public_wi-fi_poses_risk_an_account_hijack_researcher_says&lt;/i&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4636300225285463839'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4636300225285463839'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2014/07/avoid-using-instagram-on-public-wi-fi_30.html' title='Avoid using Instagram on public Wi-Fi...'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-6455066339251150545</id><published>2014-07-14T15:44:00.002+10:00</published><updated>2014-07-14T15:45:46.927+10:00</updated><title type='text'>¿Qué tienen en común un phishing y una imagen?</title><content type='html'>&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Recientemente hemos
recibido en el Laboratorio de Investigación de ESET Latinoamérica un &lt;a href=&quot;http://www.welivesecurity.com/la-es/tag/phishing-la/&quot;&gt;&lt;em&gt;phishing&lt;/em&gt;&lt;/a&gt; del banco
BBVA, al cual se accedía desde un correo en Perú. Aunque ya hemos visto casos
parecidos &lt;a href=&quot;http://www.welivesecurity.com/la-es/2013/03/01/usuarios-banco-argentino-afectados-phishing/&quot;&gt;en
Argentina&lt;/a&gt;, &lt;a href=&quot;http://www.welivesecurity.com/la-es/2014/06/11/phishing-casi-perfecto-conocido-banco-espanol/&quot; target=&quot;_blank&quot; title=&quot;Phishing “casi perfecto” de un conocido banco español - We Live Security&quot;&gt;España&lt;/a&gt;
y también &lt;a href=&quot;http://www.welivesecurity.com/la-es/2013/04/12/phishing-banco-chileno-intenta-vulnerar-doble-autenticacion/&quot;&gt;en
Chile&lt;/a&gt;, este nos llamó la atención y procederemos a describirlo en detalle,
porque estaba compuesto&lt;strong&gt;
pura y exclusivamente por imágenes.&lt;/strong&gt; Esto significa que no
contenía archivos de programación HTML ni PHP; no tenía trabajo de programación
&lt;em&gt;web&lt;/em&gt; alguno,
sino que sólo eran imágenes.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Antes que nada, debemos
aclarar que&lt;strong&gt; no hay una
vulnerabilidad en el sitio oficial, &lt;/strong&gt;solo es una réplica exacta
creada con imágenes y pequeños programas que se encargan de&lt;strong&gt; robar la información&lt;/strong&gt;.
Aquí cabe destacar que estas entidades financieras y demás servicios de
Internet intentan acabar con estos sitios de estafas para proteger a los usuarios,
por lo que estas campañas exceden a las empresas.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Por eso, queremos
mostrarles &lt;strong&gt;el
funcionamiento de este tipo de estafas, &lt;/strong&gt;para que desde sus
hogares puedan&lt;strong&gt;
detectarlas sin la necesidad de conocimiento técnico&lt;/strong&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;La trampa que hoy
analizamos estaba destinada a &lt;strong&gt;robar
información de usuarios y empresas.&lt;/strong&gt; A continuación mostramos
una captura del correo que recibía la víctima:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/correo.jpg&quot;&gt;&lt;span style=&quot;text-decoration: none; text-underline: none;&quot;&gt;&lt;img alt=&quot;correo&quot; border=&quot;0&quot; class=&quot; wp-image-47653 aligncenter&quot; src=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/correo-1024x409.jpg&quot; height=&quot;159&quot; id=&quot;_x0000_i1025&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;Buscando en el cuerpo
del mensaje llegamos a ese recuadro gris donde se encuentra el cursor, donde se
encuentra el botón para acceder al enlace malicioso (por algún motivo no
aparece el botón pero sí permite acceder al enlace).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Una vez que se accede a ese
sitio fraudulento, la víctima se encontrará con el siguiente portal:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/011.jpg&quot;&gt;&lt;span style=&quot;text-decoration: none; text-underline: none;&quot;&gt;&lt;img alt=&quot;01&quot; border=&quot;0&quot; class=&quot; wp-image-47654 aligncenter&quot; src=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/011-1024x397.jpg&quot; height=&quot;155&quot; id=&quot;_x0000_i1026&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
Al hacer clic en la solapa “Persona” y luego en el botón de color verde (botón
llamativo a la derecha), el portal invita a la víctima a ingresar con su&lt;strong&gt; número de tarjeta y su clave
personal&lt;/strong&gt;. En la siguiente captura se aprecia el modo de
ingreso:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/031.jpg&quot;&gt;&lt;span style=&quot;text-decoration: none; text-underline: none;&quot;&gt;&lt;img alt=&quot;03&quot; border=&quot;0&quot; class=&quot; wp-image-47655 aligncenter&quot; src=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/031-1024x450.jpg&quot; height=&quot;175&quot; id=&quot;_x0000_i1027&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
Debemos destacar que &lt;strong&gt;se
podía acceder ingresando cualquier número de tarjeta y cualquier contraseña&lt;/strong&gt;,
mientras que &lt;strong&gt;una
entidad oficial verifica &lt;/strong&gt;el número de tarjeta y comprueba la
contraseña; también cabe remarcar que después de algunos intentos fallidos de
ingreso, el usuario es bloqueado. Un detalle que se puede apreciar en la primer
pestaña: &lt;strong&gt;la letra “V”
de la entidad está compuesta por barra y contra barra&lt;/strong&gt; (\/),
formando una V.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Una vez dentro de la
supuesta cuenta, el sitio comenzará a solicitar información personal sensible,
aparte de la información bancaria, tal como se observa en la siguiente captura:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/051.jpg&quot;&gt;&lt;span style=&quot;text-decoration: none; text-underline: none;&quot;&gt;&lt;img alt=&quot;05&quot; border=&quot;0&quot; class=&quot; wp-image-47656 aligncenter&quot; src=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/051.jpg&quot; height=&quot;255&quot; id=&quot;_x0000_i1028&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
Como puede verse en el ejemplo, solicita número de documento o identificación,
teléfono móvil, ciudad, dirección y también fecha de caducidad. Pero algo
interesante para prestar atención&lt;strong&gt;,
es el código ATM de 4 dígitos que solicita, es decir que también pide la
contraseña para acceder desde un terminal (cajero automático)&lt;/strong&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Una vez completados los
datos solicitados (en este caso con datos al azar), se procede a hacer clic en
el botón “Continuar”, para procesar el formulario.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Como si todo esto no
bastara, el sitio no posee SSL, por lo que no vemos “HTTPS” en la barra de
direcciones. Esto significa que al capturar la comunicación entre el equipo de
la víctima y el sitio en cuestión, se puede ver cómo &lt;strong&gt;toda la información viaja sin
cifrar:&lt;/strong&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;a href=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/11.jpg&quot;&gt;&lt;span style=&quot;text-decoration: none; text-underline: none;&quot;&gt;&lt;img alt=&quot;11&quot; border=&quot;0&quot; class=&quot; wp-image-47657 aligncenter&quot; src=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/11-1024x454.jpg&quot; height=&quot;177&quot; id=&quot;_x0000_i1029&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
Como habrán visto, es necesario tener todos estos detalles en cuenta, los cuales
bastarán para prevenir este tipo de fraudes sin tener conocimientos técnicos.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Desde el Laboratorio de
Investigación de ESET Latinoamérica les recomendamos ser precavidos con este
tipo de correos electrónicos, &lt;a href=&quot;http://www.welivesecurity.com/la-es/2013/03/01/2011/04/01/descubriendo-enlaces-enganosos/&quot;&gt;estos
enlaces suelen ser engañosos&lt;/a&gt; y prácticas como pasar por encima de un menú
sin que cambie el cursor, sin poder acceder a estos, puede ser un gran indicio
de que &lt;strong&gt;se está
simplemente frente a una imitación de la imagen de un sitio bancario y no tiene
nada que ver con el sitio oficial&lt;/strong&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;A la hora de hacer
consultas u operaciones de &lt;em&gt;home
banking&lt;/em&gt; recomendamos acceder al sitio oficial a través de sitios
seguros con HTTPS. Afortunadamente, en el transcurso del análisis, el sitio fue
dado de baja en el servidor donde estaba alojado, por lo cual &lt;strong&gt;ya no afectará a más víctimas.&lt;/strong&gt;
Pero no queríamos pasarlo por alto, para que vean lo simple que es detectar una
estafa a tiempo.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;






























&lt;br /&gt;
&lt;address&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Créditos imagen: &lt;a href=&quot;https://www.flickr.com/photos/62904109@N00/388659524/in/photostream/&quot; target=&quot;_blank&quot; title=&quot;Flickr&quot;&gt;©palindrome6996/Flickr&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/address&gt;
&lt;address&gt;
&lt;/address&gt;
&lt;address&gt;
Autor Ignacio Pérez, ESET&lt;/address&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/6455066339251150545'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/6455066339251150545'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2014/07/que-tienen-en-comun-un-phishing-y-una_14.html' title='¿Qué tienen en común un phishing y una imagen?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-3313073115775017129</id><published>2014-07-14T15:38:00.000+10:00</published><updated>2014-07-14T15:38:22.450+10:00</updated><title type='text'>Boleto Malware: dos nuevas variantes descubiertas</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/boleto-623x428.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.welivesecurity.com/wp-content/uploads/2014/07/boleto-623x428.jpg&quot; height=&quot;273&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;Hace pocos días se dio a
conocer la existencia de &lt;a href=&quot;http://www.welivesecurity.com/la-es/2014/07/03/bolware-miles-de-millones-de-dolares-robados-en-nueva-estafa/&quot; target=&quot;_blank&quot; title=&quot;Bolware: miles de millones de dólares robados en nueva estafa - We Live Security&quot;&gt;&lt;strong&gt;Bolware&lt;/strong&gt; o &lt;strong&gt;Boleto Malware&lt;/strong&gt;, un
fraude sofisticado en Brasil&lt;/a&gt; que involucra un ataque &lt;a href=&quot;http://www.welivesecurity.com/la-es/2014/07/11/man-in-the-browser-como-pueden-interceptar-navegador/&quot; target=&quot;_blank&quot; title=&quot;Man In The Browser: ¿cómo pueden interceptar tu navegador? - We Live Security&quot;&gt;MITB
(Man In The Browser)&lt;/a&gt;, &lt;strong&gt;atacando
transacciones en línea y modificándolas del lado del cliente&lt;/strong&gt;.
Ahora se han descubierto &lt;strong&gt;dos
nuevas familias&lt;/strong&gt; que apuntan al sistema de pago oficial &lt;strong&gt;Boleto Bancario&lt;/strong&gt; de
Brasil.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;La compañía RSA,
responsable del descubrimiento inicial, dijo que la sumatoria de las
transacciones ilícitas con esta técnica &lt;a href=&quot;https://blogs.rsa.com/rsa-uncovers-boleto-fraud-ring-brazil/&quot; target=&quot;_blank&quot; title=&quot;02Jul 2014 RSA Uncovers Boleto Fraud Ring in Brazil - RSA&quot;&gt;habían
logrado robar &lt;/a&gt;&lt;strong&gt;&lt;a href=&quot;https://blogs.rsa.com/rsa-uncovers-boleto-fraud-ring-brazil/&quot; target=&quot;_blank&quot; title=&quot;02Jul 2014 RSA Uncovers Boleto Fraud Ring in Brazil - RSA&quot;&gt;3,75 mil
millones de dólares&lt;/a&gt;,&lt;/strong&gt; pero luego el sitio &lt;a href=&quot;http://www.linhadefensiva.com/2014/07/lies-damn-lies-and-media-the-largest-cybercrime-heist-that-wasnt&quot; target=&quot;_blank&quot; title=&quot;Lies, damn lies and media: the largest cybercrime heist that wasn’t&quot;&gt;Linha
Defensiva&lt;/a&gt; argumentó que era un cálculo inexacto y algo &lt;strong&gt;exagerado. &lt;/strong&gt;De
cualquier manera, la importancia del caso reside en que los Boletos representan
alrededor del&lt;strong&gt; 30% de
todas las transacciones de pago en línea en Brasil.&lt;/strong&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;El &lt;em&gt;malware&lt;/em&gt; en cuestion le
permite al atacante&lt;strong&gt;
interceptar las transacciones&lt;/strong&gt; utilizando este sistema alterando
información financiera que se ingresa en los sitios afectados. Una de las
nuevas variantes es capaz de modificar el &lt;em&gt;Document
Object Model&lt;/em&gt; (DOM) en diferentes versiones de &lt;strong&gt;Internet Explorer,&lt;/strong&gt;
lo que le permite cambiar los datos internos de los sitios afectados.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;La otra descarga e instala
extensiones maliciosas en &lt;strong&gt;Firefox&lt;/strong&gt;
y &lt;strong&gt;Chrome,&lt;/strong&gt;
luego de lo cual escanea sitios en busca de números de Boletos Bancarios, para
alterarlos y sustituirlos por otros números predefinidos, y&lt;strong&gt; desviar fondos desde cuentas de
clientes hacia cuentas “mula”. &lt;/strong&gt;Investigadores de &lt;a href=&quot;http://securityintelligence.com/boleto-malware-two-new-variants-discovered/#.U8BBbBBEk1w&quot; target=&quot;_blank&quot; title=&quot;Boleto Malware: Two New Variants Discovered - Trusteer&quot;&gt;Trusteer,
una compañía de IBM&lt;/a&gt;, encontraron que aproximadamente&lt;strong&gt; una de cada 900 computadoras en
Brasil está infectada con alguna forma de Bolware, &lt;/strong&gt;lo cual no
nos sorprende si tenemos en cuenta que &lt;a href=&quot;http://www.welivesecurity.com/la-es/2014/06/24/por-que-cibercriminales-brasilenos-diferentes/&quot; target=&quot;_blank&quot; title=&quot;¿Por qué los cibercriminales brasileños son diferentes al resto? - We Live Security&quot;&gt;Brasil
es el líder en la propagación de troyanos bancarios&lt;/a&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;En términos de seguridad,
el único consejo válido aquí es la prevención: si el malware no es identificado
en el dispositivo, todos los métodos de prevención posteriores como
autenticación pueden ser salteados por el atacante. Por lo tanto, no está de
más recordar la importancia contar con una solución de seguridad.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;address&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;Créditos imagen: &lt;a href=&quot;https://www.flickr.com/photos/pedrojconcha/4398839563/in/photostream/&quot; target=&quot;_blank&quot; title=&quot;Flickr&quot;&gt;©Pedro J. Concha/Flickr&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/address&gt;
&lt;address&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/address&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt;El post &lt;a href=&quot;http://www.welivesecurity.com/la-es/2014/07/11/boleto-malware-dos-nuevas-variantes-descubiertas/&quot;&gt;Boleto
Malware: dos nuevas variantes descubiertas&lt;/a&gt; aparece primero en &lt;a href=&quot;http://www.welivesecurity.com/la-es&quot;&gt;We Live Security en Español&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-ansi-language: EN-US; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-US; mso-fareast-theme-font: minor-latin;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;Autor&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.welivesecurity.com/la-es/author/spagnotta/&quot; style=&quot;background-color: white; color: #0084b6; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px; margin: 0px; outline: none; padding: 0px; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;&quot;&gt;Sabrina Pagnotta&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial, sans-serif; font-size: 14px; line-height: 20px;&quot;&gt;, ESET&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/3313073115775017129'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/3313073115775017129'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2014/07/boleto-malware-dos-nuevas-variantes.html' title='Boleto Malware: dos nuevas variantes descubiertas'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-4463973365651636629</id><published>2014-06-06T11:16:00.000+10:00</published><updated>2014-06-06T11:16:33.859+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tip"/><title type='text'>Tip Of The Day! - Don&#39;t enter your username and password on any computer you don&#39;t control.</title><content type='html'>&lt;h3 style=&quot;color: #436184; font-family: &#39;Diavlo Light&#39;, Arial, Helvetica, sans-serif; font-size: 24px; font-weight: normal; line-height: 1.2em; margin: 10px 0px 0px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.robertdstrong.com/wp-content/uploads/2013/12/tip.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.robertdstrong.com/wp-content/uploads/2013/12/tip.gif&quot; height=&quot;200&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;div style=&quot;color: #555555; font-family: Arial, Helvetica, sans-serif; line-height: 17.33333396911621px; padding: 0px 2px 10px;&quot;&gt;
Using public computers will always carry the risk of exposing your personal data. &quot;Public&quot; computers — as in college library computers.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: #555555; font-family: Arial, Helvetica, sans-serif; line-height: 17.33333396911621px; padding: 0px 2px 10px;&quot;&gt;
A Kentucky college student has been charged with identity theft and unlawful access to a computer for allegedly breaking into other students&#39; email accounts at the University of the Cumberlands, and using the access and information to blackmail them.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: #555555; font-family: Arial, Helvetica, sans-serif; line-height: 17.33333396911621px; padding: 0px 2px 10px;&quot;&gt;
He did this by allegedly placing spyware on computers at the college library to harvest the information he needed to access the email accounts. Then he threatened to divulge the contents of certain messages unless the students complied with his demands.&lt;/div&gt;
&lt;div style=&quot;color: #555555; font-size: 12px; line-height: 17.33333396911621px; padding: 0px 2px 10px;&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace;&quot;&gt;For more information:&amp;nbsp;&lt;a href=&quot;http://blogs.techrepublic.com.com/10things/?p=322&quot; style=&quot;color: #a23096; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;http://blogs.techrepublic.com.com/10things/?p=322&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4463973365651636629'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4463973365651636629'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2014/06/tip-of-day-dont-enter-your-username-and.html' title='Tip Of The Day! - Don&#39;t enter your username and password on any computer you don&#39;t control.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-4568338465697812280</id><published>2014-06-04T16:12:00.001+10:00</published><updated>2014-06-04T16:14:37.176+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tip"/><title type='text'>Tip Of The Day! - Change the combination on opened laptop locks.</title><content type='html'>&lt;h3 style=&quot;color: #436184; font-family: &#39;Diavlo Light&#39;, Arial, Helvetica, sans-serif; font-size: 24px; font-weight: normal; line-height: 1.2em; margin: 10px 0px 0px; padding: 0px;&quot;&gt;
&lt;/h3&gt;
&lt;h3 style=&quot;color: #436184; font-family: &#39;Diavlo Light&#39;, Arial, Helvetica, sans-serif; font-size: 24px; font-weight: normal; line-height: 1.2em; margin: 10px 0px 0px; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://www.robertdstrong.com/wp-content/uploads/2013/12/tip.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.robertdstrong.com/wp-content/uploads/2013/12/tip.gif&quot; height=&quot;200&quot; width=&quot;186&quot; /&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 17.33333396911621px;&quot;&gt;When people have cables with combination locks for securing their laptops at their workstation, they always remember to turn the tumblers when they secure the laptop. But what happens when they unsecure the laptop?&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 17.33333396911621px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 17.33333396911621px;&quot;&gt;Many people won&#39;t turn the tumblers on the opened lock because it is much easier to lock the laptop later if the combination is already set. About half a dozen laptops in our office disappeared one day.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 17.33333396911621px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 17.33333396911621px;&quot;&gt;The laptops were stolen by someone who came by when the laptops were not there and noted the combination. They came back later when the laptops were there and used the combination they had noted earlier.&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; line-height: 17.33333396911621px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: xx-small;&quot;&gt;Source:&amp;nbsp;http://www.sans.org/tip_of_the_day.php#72&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4568338465697812280'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4568338465697812280'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2014/06/tip-of-day-change-combination-on-opened.html' title='Tip Of The Day! - Change the combination on opened laptop locks.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-2032865233990801495</id><published>2014-06-03T15:54:00.000+10:00</published><updated>2014-06-04T16:15:46.025+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Tip"/><category scheme="http://www.blogger.com/atom/ns#" term="Virus"/><title type='text'>Tip Of The Day! - Prevent USB Drives from Spreading Viruses</title><content type='html'>&lt;h3 style=&quot;color: #436184; font-family: &#39;Diavlo Light&#39;, Arial, Helvetica, sans-serif; font-size: 24px; font-weight: normal; line-height: 1.2em; margin: 10px 0px 0px; padding: 0px;&quot;&gt;
&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.robertdstrong.com/wp-content/uploads/2013/12/tip.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.robertdstrong.com/wp-content/uploads/2013/12/tip.gif&quot; height=&quot;200&quot; width=&quot;187&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style=&quot;line-height: 1.2em;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &#39;Diavlo Light&#39;, Arial, Helvetica, sans-serif; font-weight: normal; line-height: 1.2em; margin: 10px 0px 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 17.33333396911621px;&quot;&gt;When you stick a thumb drive infected with a worm like Conficker/Downadup into a clean system, the normally handy AutoPlay feature launches the worm and spreads the infection.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: &#39;Diavlo Light&#39;, Arial, Helvetica, sans-serif; font-weight: normal; line-height: 1.2em; margin: 10px 0px 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif; line-height: 17.33333396911621px;&quot;&gt;You can prevent this by flipping the master switch.&lt;/span&gt;&lt;span style=&quot;color: #436184; font-family: Verdana, sans-serif; font-size: large; line-height: 17.33333396911621px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;line-height: 17.33333396911621px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;line-height: 17.33333396911621px;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Here&#39;s how:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ol&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Click on the &quot;Start&quot; button and pick &quot;Run.&quot;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Enter the text GPEDIT.MSC and press Enter. After a moment, the Group Policy editor window will open.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;In the left panel, double-click on &quot;Computer Configuration.&quot;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Double-click on &quot;Administrative Templates.&quot;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Double-click on &quot;System.&quot;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;In the right panel near the bottom of the list, double-click on &quot;Turn off autoplay.&quot;/&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;The default setting is the &quot;Not configured.&quot; Put a bullet in &quot;Enabled.&quot;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Make sure &quot;Turn off Autoplay on:&quot; is set to &quot;All drives.&quot;&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Click on &quot;Apply,&quot; and then &quot;OK&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Close the Group Policy editor window.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Courier New, Courier, monospace; font-size: xx-small;&quot;&gt;&lt;b&gt;Source&lt;/b&gt;:&amp;nbsp;http://www.sans.org/tip_of_the_day.php#1257&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/2032865233990801495'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/2032865233990801495'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2014/06/tip-of-day-prevent-usb-drives-from.html' title='Tip Of The Day! - Prevent USB Drives from Spreading Viruses'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-2725640714515761264</id><published>2013-10-26T13:57:00.001+11:00</published><updated>2013-10-26T13:57:31.973+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Ransomware: Why This New Malware is So Dangerous and How to Protect Yourself</title><content type='html'>&lt;p dir=&quot;ltr&quot;&gt;&amp;#160;&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Published on October 25th, 2013&amp;#160;&amp;#160;|&amp;#160;&amp;#160;Written by: Chris Hoffman&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Ransomware is a type of malware that tries to extort money from you. One of the nastiest examples, CryptoLocker, takes your files hostage and holds them for ransom, forcing you to pay hundreds of dollars to regain access.Most malware is no longer created by bored teenagers looking to cause some chaos. Much of the current malware is now produced by organized crime for profit and is becoming increasingly sophisticated.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;How Ransomware Works&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Not all ransomware is identical. The key thing that makes a piece of malware &amp;#8220;ransomware&amp;#8221; is that it attempts to extort a direct payment from you.Some ransomware may be disguised. It may function as &amp;#8220;scareware,&amp;#8221; displaying a pop-up that says something like &amp;#8220;Your computer is infected, purchase this product to fix the infection&amp;#8221; or &amp;#8220;Your computer has been used to download illegal files, pay a fine to continue using your computer.&amp;#8221;In other situations, ransomware may be more up-front. It may hook deep into your system, displaying a message saying that it will only go away when you pay money to the ransomware&amp;#8217;s creators. This type of malware could be bypassed via malware removal tools or just by reinstalling Windows.Unfortunately, Ransomware is becoming more and more sophisticated. One of the latest examples, CryptoLocker, starts&amp;#160;encrypting&amp;#160;your personal files as soon as it gains access to your system, preventing access to the files without knowing the encryption key. CryptoLocker then displays a message informing you that your files have been locked with encryption and that you have just a few days to pay up. If you pay them $300, they&amp;#8217;ll hand you the encryption key and you can recover your files. CryptoLocker helpfully walks you through choosing a payment method and, after paying, the criminals seem to actually give you a key that you can use to restore your files.You can never be sure that the criminals will keep their end of the deal, of course. It&amp;#8217;s not a good idea to pay up when you&amp;#8217;re extorted by criminals. On the other hand, businesses that lose their only copy of business-critical data may be tempted to take the risk &amp;#8212; and it&amp;#8217;s hard to blame them.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Protecting Your Files From Ransomware&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;This type of malware is another good example of why backups are essential. You should regularly back up files to an external hard drive or a remote file storage server. If all your copies of your files are on your computer, malware that infects your computer could encrypt them all and restrict access &amp;#8212; or even delete them entirely.RELATED ARTICLEWhat Files Should You Backup On Your Windows PC?Everybody always tells you to make sure that you are backing up your PC, but what does that really mean? And what files do you actually need to backup? Today we&#39;ll walk you through the basics of backing up your PC, what you should back up, and why.&amp;#160;[Read Article]When backing up files, be sure to&amp;#160;back up your personal filesto a location where they can&amp;#8217;t be written to or erased. For example, place them on a removable hard drive or upload them to a remote backup service like CrashPlan that would allow you to revert to previous versions of files. Don&amp;#8217;t just store your backups on an internal hard drive or network share you have write access to. The ransomware could encrypt the files on your connected backup drive or on your network share if you have full write access.Frequent backups are also important. You wouldn&amp;#8217;t want to lose a week&amp;#8217;s worth of work because you only back up your files every week. This is part of the reason why automated back-up solutions are so convenient.If your files do become locked by ransomware and you don&amp;#8217;t have the appropriate backups, you can try&amp;#160;recovering them with ShadowExplorer. This tool accesses &amp;#8220;Shadow Copies,&amp;#8221; which Windows uses for System Restore &amp;#8212; they will often contain some personal files.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;How to Avoid Ransomware&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;RELATED ARTICLE10 Important Computer Security Practices You Should FollowAntivirus programs aren&amp;#8217;t perfect &amp;#8212; especially Microsoft Security Essentials. If you&amp;#8217;re relying on your antivirus alone to protect you, you&amp;#8217;re...&amp;#160;[Read Article]Aside from using a proper backup strategy, you can avoid ransomware in the same way you avoid other forms of malware. CryptoLocker has been verified to arrive through email attachments, via the Java plug-in, and installed on computers that are part of the Zeus botnet.Use a good antivirus product that will attempt to stop ransomware in its tracks. Antivirus programs are never perfect and you could be infected even if you run one, but it&amp;#8217;s an important layer of defense.Avoid running suspicious files. Ransomware can arrive in .exe files attached to emails, from illicit websites containing pirated software, or anywhere else that malware comes from. Be alert and exercise caution over the files you download and run.Keep your software updated. Using an old version of your web browser, operating system, or a browser plugin can allow malware in through open security holes. If you have Java installed,&amp;#160;you should probably uninstall it.For more tips, read&amp;#160;our list of important security practices you should be following.Ransomware &amp;#8212; CryptoLocker in particular &amp;#8212; is brutally efficient and smart. It just wants to get down to business and take your money. Holding your files hostage is an effective way to prevent removal by antivirus programs after it&amp;#8217;s taken root, but CryptoLocker is much less scary if you have good backups.This sort of malware demonstrates the importance of backups as well as proper security practices. Unfortunately, CryptoLocker is probably a sign of things to come &amp;#8212; it&amp;#8217;s the kind of malware we&amp;#8217;ll likely be seeing more of in the future.&lt;/p&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/2725640714515761264'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/2725640714515761264'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2013/10/ransomware-why-this-new-malware-is-so.html' title='Ransomware: Why This New Malware is So Dangerous and How to Protect Yourself'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-3329133731604780453</id><published>2013-10-08T17:30:00.000+11:00</published><updated>2013-10-08T17:30:01.935+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Chrome"/><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="US-CERT Cyber Security Bulletin"/><title type='text'>SB13-280: Vulnerability Summary for the Week of September 30, 2013</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://cdn.macworld.com.au/wp-content/uploads/2012/10/Google-Chrome-Pwnium-hacker-macworld-australia.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;145&quot; src=&quot;http://cdn.macworld.com.au/wp-content/uploads/2012/10/Google-Chrome-Pwnium-hacker-macworld-australia.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background: white; line-height: 19.2pt; margin-bottom: 14.4pt; margin-left: 0cm; margin-right: 0cm; margin-top: 14.4pt; text-align: justify; vertical-align: baseline;&quot;&gt;
&lt;!--[if gte vml 1]&gt;&lt;v:shapetype
 id=&quot;_x0000_t75&quot; coordsize=&quot;21600,21600&quot; o:spt=&quot;75&quot; o:preferrelative=&quot;t&quot;
 path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; filled=&quot;f&quot; stroked=&quot;f&quot;&gt;
 &lt;v:stroke joinstyle=&quot;miter&quot;/&gt;
 &lt;v:formulas&gt;
  &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;/&gt;
  &lt;v:f eqn=&quot;sum @0 1 0&quot;/&gt;
  &lt;v:f eqn=&quot;sum 0 0 @1&quot;/&gt;
  &lt;v:f eqn=&quot;prod @2 1 2&quot;/&gt;
  &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;/&gt;
  &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;/&gt;
  &lt;v:f eqn=&quot;sum @0 0 1&quot;/&gt;
  &lt;v:f eqn=&quot;prod @6 1 2&quot;/&gt;
  &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;/&gt;
  &lt;v:f eqn=&quot;sum @8 21600 0&quot;/&gt;
  &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;/&gt;
  &lt;v:f eqn=&quot;sum @10 21600 0&quot;/&gt;
 &lt;/v:formulas&gt;
 &lt;v:path o:extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot;/&gt;
 &lt;o:lock v:ext=&quot;edit&quot; aspectratio=&quot;t&quot;/&gt;
&lt;/v:shapetype&gt;&lt;v:shape id=&quot;Picture_x0020_1&quot; o:spid=&quot;_x0000_s1026&quot; type=&quot;#_x0000_t75&quot;
 alt=&quot;chrome_patch&quot; style=&#39;position:absolute;left:0;text-align:left;
 margin-left:1.5pt;margin-top:14.4pt;width:121.15pt;height:71.4pt;z-index:1;
 visibility:visible;mso-wrap-style:square;mso-wrap-distance-left:9pt;
 mso-wrap-distance-top:0;mso-wrap-distance-right:9pt;
 mso-wrap-distance-bottom:0;mso-position-horizontal:absolute;
 mso-position-horizontal-relative:text;mso-position-vertical:absolute;
 mso-position-vertical-relative:text&#39;&gt;
 &lt;v:imagedata src=&quot;file:///C:\Users\ALFRED~1\AppData\Local\Temp\msohtmlclip1\01\clip_image001.jpg&quot;
  o:title=&quot;chrome_patch&quot;/&gt;
 &lt;w:wrap type=&quot;square&quot;/&gt;
&lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;color: #444444; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.0pt; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-hansi-theme-font: minor-latin;&quot;&gt;There are 20 fresh security patches in Google Chrome, including
fixes for a number of high-severity vulnerabilities. Google regularly pushes
out new versions of its browser every few weeks, and sometimes will only have a
handful of security fixes. &amp;nbsp;&lt;/span&gt;&lt;u&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: red; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;Chrome users should update their browsers as soon
as possible to protect against attacks using these vulnerabilities.&lt;/span&gt;&lt;/u&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #444444; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.0pt; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-hansi-theme-font: minor-latin;&quot;&gt;The vulnerabilities are based on the&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://cve.mitre.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;vulnerability naming standard and are
organized according to severity, determined by the&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;Common Vulnerability Scoring System&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;apple-converted-space&quot;&gt;&amp;nbsp;&lt;/span&gt;(CVSS) standard. The division of high,
medium, and low severities correspond to the following scores:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #222222; font-family: &amp;quot;Calibri&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.0pt; mso-ascii-theme-font: minor-latin; mso-bidi-font-family: Arial; mso-hansi-theme-font: minor-latin;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial; margin-left: 44.65pt; text-align: justify; text-indent: -18pt;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #444444; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol; mso-fareast-language: EN-US;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt;&quot;&gt;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: red; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;&lt;a href=&quot;https://mail.google.com/mail/ca/u/0/#14192a864ef63043_high&quot;&gt;&lt;span style=&quot;color: red; mso-bidi-font-weight: normal; text-decoration: none; text-underline: none;&quot;&gt;High&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #444444; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #444444; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;- Vulnerabilities will be labeled High severity if they have a CVSS base
score of 7.0 - 10.0&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial; margin-left: 44.65pt; text-align: justify; text-indent: -18pt;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #444444; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol; mso-fareast-language: EN-US;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt;&quot;&gt;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #f79646; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;&lt;a href=&quot;https://mail.google.com/mail/ca/u/0/#14192a864ef63043_medium&quot;&gt;&lt;span style=&quot;color: #f79646; mso-bidi-font-weight: normal; mso-themecolor: accent6; text-decoration: none; text-underline: none;&quot;&gt;Medium&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #444444; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #444444; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;- Vulnerabilities
will be labeled Medium severity if they have a CVSS base score of 4.0 - 6.9&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial; margin-left: 44.65pt; text-align: justify; text-indent: -18pt;&quot;&gt;
&lt;!--[if !supportLists]--&gt;&lt;span style=&quot;color: #444444; font-family: Symbol; font-size: 10.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol; mso-fareast-language: EN-US;&quot;&gt;·&lt;span style=&quot;font-family: &#39;Times New Roman&#39;; font-size: 7pt;&quot;&gt;&amp;nbsp;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;!--[endif]--&gt;&lt;b&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #0070c0; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;&lt;a href=&quot;https://mail.google.com/mail/ca/u/0/#14192a864ef63043_low&quot;&gt;&lt;span style=&quot;color: #0070c0; mso-bidi-font-weight: normal; text-decoration: none; text-underline: none;&quot;&gt;Low&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #444444; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #444444; font-family: Calibri, sans-serif; font-size: 10pt;&quot;&gt;- Vulnerabilities will be labeled
Low severity if they have a CVSS base score of 0.0 - 3.9&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background: white; color: #444444; font-size: 10.0pt; line-height: 115%; mso-bidi-font-family: Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background: white; color: #444444; font-size: 10.0pt; line-height: 115%; mso-bidi-font-family: Arial;&quot;&gt;Here
is the list:&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background: white; color: #444444; font-size: 10.0pt; line-height: 115%; mso-bidi-font-family: Arial;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: red;&quot;&gt;High Vulnerabilities&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;

&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;background: white; mso-cellspacing: 1.5pt; mso-table-layout-alt: fixed; mso-yfti-tbllook: 1184;&quot;&gt;
 &lt;tbody&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 71.65pt;&quot; width=&quot;96&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center; word-break: break-all;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;span style=&quot;color: #222222;&quot;&gt;Primary&lt;/span&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center; word-break: break-all;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Vendor --
  Product&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 211.1pt;&quot; width=&quot;281&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Description&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.3pt;&quot; width=&quot;83&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Published&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 41.05pt;&quot; width=&quot;55&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;CVSS Score&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.2pt;&quot; width=&quot;83&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Source &amp;amp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;color: #222222;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;Patch Info&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 71.65pt;&quot; width=&quot;96&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 211.1pt;&quot; width=&quot;281&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Use-after-free vulnerability in Blink, as used in Google Chrome before
  30.0.1599.66, allows remote attackers to cause a denial of service or
  possibly have unspecified other impact via vectors related to inline-block
  rendering for bidirectional Unicode text in an element isolated from its
  siblings.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.3pt;&quot; width=&quot;83&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 41.05pt;&quot; width=&quot;55&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2909&amp;amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;7.5&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.2pt;&quot; width=&quot;83&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2909&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2909&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 71.65pt;&quot; width=&quot;96&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 211.1pt;&quot; width=&quot;281&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Use-after-free vulnerability in
  modules/webaudio/AudioScheduledSourceNode.cpp in the Web Audio implementation
  in Blink, as used in Google Chrome before 30.0.1599.66, allows remote
  attackers to cause a denial of service or possibly have unspecified other
  impact via unknown vectors.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.3pt;&quot; width=&quot;83&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 41.05pt;&quot; width=&quot;55&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2910&amp;amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;7.5&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.2pt;&quot; width=&quot;83&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2910&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2910&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 71.65pt;&quot; width=&quot;96&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 211.1pt;&quot; width=&quot;281&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Use-after-free vulnerability in the PepperInProcessRouter::SendToHost
  function in content/renderer/pepper/pepper_in_process_router.cc in the Pepper
  Plug-in API (PPAPI) in Google Chrome before 30.0.1599.66 allows remote
  attackers to cause a denial of service or possibly have unspecified other
  impact via vectors involving a resource-destruction message.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.3pt;&quot; width=&quot;83&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 41.05pt;&quot; width=&quot;55&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2912&amp;amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;7.5&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.2pt;&quot; width=&quot;83&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2912&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2912&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 71.65pt;&quot; width=&quot;96&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 211.1pt;&quot; width=&quot;281&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Use-after-free vulnerability in the
  RenderBlock::collapseAnonymousBlockChild function in
  core/rendering/RenderBlock.cpp in the DOM implementation in Blink, as used in
  Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial
  of service or possibly have unspecified other impact by leveraging incorrect
  handling of parent-child relationships for anonymous blocks.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.3pt;&quot; width=&quot;83&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 41.05pt;&quot; width=&quot;55&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2918&amp;amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;7.5&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.2pt;&quot; width=&quot;83&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2918&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2918&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 71.65pt;&quot; width=&quot;96&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 211.1pt;&quot; width=&quot;281&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Google V8, as used in Google Chrome before 30.0.1599.66, allows remote
  attackers to cause a denial of service (memory corruption) or possibly have
  unspecified other impact via unknown vectors.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.3pt;&quot; width=&quot;83&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 41.05pt;&quot; width=&quot;55&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2919&amp;amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;7.5&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.2pt;&quot; width=&quot;83&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2919&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2919&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 71.65pt;&quot; width=&quot;96&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 211.1pt;&quot; width=&quot;281&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Multiple unspecified vulnerabilities in Google Chrome before 30.0.1599.66
  allow attackers to cause a denial of service or possibly have other impact
  via unknown vectors.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.3pt;&quot; width=&quot;83&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 41.05pt;&quot; width=&quot;55&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2923&amp;amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;7.5&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.2pt;&quot; width=&quot;83&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2923&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2923&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 71.65pt;&quot; width=&quot;96&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 211.1pt;&quot; width=&quot;281&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Use-after-free vulnerability in International Components for Unicode
  (ICU), as used in Google Chrome before 30.0.1599.66 and other products,
  allows remote attackers to cause a denial of service or possibly have
  unspecified other impact via unknown vectors.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.3pt;&quot; width=&quot;83&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 41.05pt;&quot; width=&quot;55&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2924&amp;amp;vector=(AV:N/AC:L/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;7.5&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 62.2pt;&quot; width=&quot;83&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2924&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2924&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 0cm; margin-right: 5.75pt; margin-top: 0cm; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; background-position: initial initial; background-repeat: initial initial;&quot;&gt;
&lt;b&gt;&lt;span style=&quot;background-position: initial initial; background-repeat: initial initial; color: #f79646; font-size: 10pt;&quot;&gt;Medium Vulnerabilities&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot;&gt;

&lt;table border=&quot;1&quot; cellpadding=&quot;0&quot; class=&quot;MsoNormalTable&quot; style=&quot;background: white; mso-cellspacing: 1.5pt; mso-yfti-tbllook: 1184; width: 100%px;&quot;&gt;
 &lt;tbody&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Multiple
  race conditions in the Web Audio implementation in Blink, as used in Google
  Chrome before 30.0.1599.66, allow remote attackers to cause a denial of
  service or possibly have unspecified other impact via vectors related to
  threading in core/html/HTMLMediaElement.cpp,
  core/platform/audio/AudioDSPKernelProcessor.cpp,
  core/platform/audio/HRTFElevation.cpp, and modules/webaudio/ConvolverNode.cpp.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2906&amp;amp;vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;6.8&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2906&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2906&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;The
  Window.prototype object implementation in Google Chrome before 30.0.1599.66
  allows remote attackers to cause a denial of service (out-of-bounds read) via
  unspecified vectors.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2907&amp;amp;vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;5.0&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2907&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2907&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Google
  Chrome before 30.0.1599.66 uses incorrect function calls to determine the
  values of NavigationEntry objects, which allows remote attackers to spoof the
  address bar via vectors involving a response with a 204 (aka No Content)
  status code.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2908&amp;amp;vector=(AV:N/AC:L/Au:N/C:N/I:P/A:N)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;5.0&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2908&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2908&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Use-after-free
  vulnerability in the XSLStyleSheet::compileStyleSheet function in
  core/xml/XSLStyleSheetLibxslt.cpp in Blink, as used in Google Chrome before
  30.0.1599.66, allows remote attackers to cause a denial of service or
  possibly have unspecified other impact by leveraging improper handling of
  post-failure recompilation in unspecified libxslt versions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2911&amp;amp;vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;6.8&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2911&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2911&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Use-after-free
  vulnerability in the XMLDocumentParser::append function in
  core/xml/parser/XMLDocumentParser.cpp in Blink, as used in Google Chrome before
  30.0.1599.66, allows remote attackers to cause a denial of service or
  possibly have unspecified other impact via vectors involving an XML document.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2913&amp;amp;vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;6.8&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2913&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2913&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Use-after-free
  vulnerability in the color-chooser dialog in Google Chrome before
  30.0.1599.66 on Windows allows remote attackers to cause a denial of service
  or possibly have unspecified other impact via vectors related to
  color_chooser_dialog.cc and color_chooser_win.cc in browser/ui/views/.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2914&amp;amp;vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;6.8&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2914&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2914&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Google
  Chrome before 30.0.1599.66 preserves pending NavigationEntry objects in
  certain invalid circumstances, which allows remote attackers to spoof the
  address bar via a URL with a malformed scheme, as demonstrated by a
  nonexistent:12121 URL.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2915&amp;amp;vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;4.3&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2915&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2915&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Blink,
  as used in Google Chrome before 30.0.1599.66, allows remote attackers to
  spoof the address bar via vectors involving a response with a 204 (aka No
  Content) status code, in conjunction with a delay in notifying the user of an
  attempted spoof.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2916&amp;amp;vector=(AV:N/AC:M/Au:N/C:N/I:P/A:N)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;4.3&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2916&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2916&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;The
  ReverbConvolverStage::ReverbConvolverStage function in
  core/platform/audio/ReverbConvolverStage.cpp in the Web Audio implementation
  in Blink, as used in Google Chrome before 30.0.1599.66, allows remote
  attackers to cause a denial of service (out-of-bounds read) via vectors
  related to the impulseResponse array.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2917&amp;amp;vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;5.0&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2917&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2917&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;The
  DoResolveRelativeHost function in url/url_canon_relative.cc in Google Chrome
  before 30.0.1599.66 allows remote attackers to cause a denial of service
  (out-of-bounds read) via a relative URL containing a hostname, as
  demonstrated by a protocol-relative URL beginning with a //&lt;a href=&quot;http://www.google.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;www.google.com/&lt;/span&gt;&lt;/a&gt;substring.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2920&amp;amp;vector=(AV:N/AC:L/Au:N/C:N/I:N/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;5.0&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2920&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2920&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Double
  free vulnerability in the ResourceFetcher::didLoadResource function in
  core/fetch/ResourceFetcher.cpp in the resource loader in Blink, as used in Google
  Chrome before 30.0.1599.66, allows remote attackers to cause a denial of
  service or possibly have unspecified other impact by triggering certain
  callback processing during the reporting of a resource entry.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2921&amp;amp;vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;6.8&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2921&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2921&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 15.66%;&quot; width=&quot;15%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; word-break: break-all;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;google -- chrome&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 46.18%;&quot; width=&quot;46%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;Use-after-free
  vulnerability in core/html/HTMLTemplateElement.cpp in Blink, as used in
  Google Chrome before 30.0.1599.66, allows remote attackers to cause a denial
  of service or possibly have unspecified other impact via crafted JavaScript
  code that operates on a TEMPLATE element.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.62%;&quot; width=&quot;13%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;2013-10-02&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 8.98%;&quot; width=&quot;8%&quot;&gt;
  &lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt; text-align: center;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/cvss.cfm?version=2&amp;amp;name=CVE-2013-2922&amp;amp;vector=(AV:N/AC:M/Au:N/C:P/I:P/A:P)&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;6.8&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style=&quot;padding: .75pt .75pt .75pt .75pt; width: 13.6%;&quot; width=&quot;13%&quot;&gt;
  &lt;div class=&quot;MsoNormal&quot; style=&quot;margin-bottom: 0.0001pt;&quot;&gt;
&lt;span style=&quot;color: #222222; font-size: 9.0pt; mso-bidi-font-family: Arial; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-AU;&quot;&gt;&lt;a href=&quot;http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2922&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: #1155cc;&quot;&gt;CVE-2013-2922&lt;/span&gt;&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 0cm; margin-right: 5.75pt; margin-top: 0cm; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 0cm; margin-right: 5.75pt; margin-top: 0cm; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: 15.6pt; margin-bottom: .0001pt; margin-bottom: 0cm; margin-left: 0cm; margin-right: 5.75pt; margin-top: 0cm; vertical-align: baseline;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/3329133731604780453'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/3329133731604780453'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2013/10/sb13-280-vulnerability-summary-for-week.html' title='SB13-280: Vulnerability Summary for the Week of September 30, 2013'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-286106926705012984</id><published>2013-07-27T16:16:00.001+10:00</published><updated>2013-07-27T16:19:09.145+10:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Crypto"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Spanish"/><title type='text'>¿Podemos fiarnos de TrueCrypt?</title><content type='html'>&lt;p dir=&quot;ltr&quot;&gt;Nadie discute que hoy d&amp;#237;a el est&amp;#225;ndar de facto para cifrar discos duros / datos en un HD es TrueCrypt.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Funciona bien, es un software muy estable, y est&amp;#225; disponible para m&amp;#250;ltiples plataformas.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Pero &amp;#191;Nos podemos fiar de TrueCrypt? &amp;#191;Es realmente un software libre de toda sospecha? &amp;#191;Podr&amp;#237;a ser un &#39;honeypot&#39; de la CIA?&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Hace tiempo encontr&amp;#233; un post en el que se apuntaban ciertas partes oscuras con respecto a TrueCrypt y sobre qui&amp;#233;n est&amp;#225; tras el proyecto. Todo lo que se expone es muy &#39;conspiranoico&#39; pero es cierto que proyecta sombras sobre el proyecto. No obstante, despu&amp;#233;s de Stuxnet, Flame y amigos, la capacidad de asombro y de negaci&amp;#243;n ha quedado muy mermada.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;El art&amp;#237;culo original plantea las siguientes cuestiones (mis comentarios personales sin negrita):&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;El dominio truecrypt.org se registr&amp;#243; con una direcci&amp;#243;n falsa, en concreto &#39;NAVAS Station, Antarctica&#39;. Esto, per se, a mi no me parece nada sospechoso, mucha gente lo hace.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Nadie sabe quienes son los desarrolladores de TrueCrypt (su identidad, se desconoce). Esto SI me parece algo a tener muy en cuenta, me parece genial que en ciertos foros donde se liberan herramientas m&amp;#225;s &#39;ofensivas&#39;, estas herramientas sean firmadas por pseudos o nicks, pero todo lo que tenga que ver con criptograf&amp;#237;a debe ser totalmente transparente.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Los creadores de TrueCrypt trabajan gratis. Aseveraci&amp;#243;n un poco discutible en mi opini&amp;#243;n. Mucha gente trabaja &#39;gratis&#39; en proyectos opensource, escribe blogs, etc etc.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Compilar TrueCrypt es complicado. Lo que apuntan en el post original es que, la mejor forma de incentivar la descarga de binarios pre-compilados por el equipo de TrueCrypt es hacer complicada la compilaci&amp;#243;n del software. Tiene l&amp;#243;gica&lt;br&gt;
La licencia de TrueCrypt no es realmente OpenSource. Bueno, tampoco indica nada en especial, es cierto que TrueCrypt ha sido rechazado de muchas distribuciones Linux (en el post citan a Fedora), pero eso no lo tiene porque hacer necesariamente sospechoso&lt;br&gt;
El c&amp;#243;digo de TrueCrypt nunca ha sido auditado. El autor del post se queja de que nadie ha publicado un estudio sobre el c&amp;#243;digo de TrueCrypt, en parte tiene raz&amp;#243;n, pero resulta muy aventurado decir que nadie lo ha hecho. Lo que si est&amp;#225; claro es que si alguien realiza esa auditor&amp;#237;a y encuentra algo, es su pasaporte a la fama. Cuesta creer que nadie haya puesto sus ojos en el tema.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Existe censura en los foros de TrueCrypt. Parece que en los foros de TrueCrypt no se puede hablar de otras soluciones de cifrado ni de herramientas para atacar a TrueCrypt.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;No ser&amp;#233; yo quien desacredite un producto como TrueCrypt que tantas alabanzas ha cosechado, pero del post original, tengo que decir que hay varios puntos que s&amp;#237; me preocupan bastante.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Lo de la identidad desconocida es bastante grave, &amp;#191;usar&amp;#237;as un algoritmo de cifrado del que desconozcas su autor&amp;#237;a? probablemente no, como dec&amp;#237;a m&amp;#225;s arriba, criptograf&amp;#237;a = transparencia como axioma&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Respecto a introducir un backdoor en el software, es t&amp;#233;cnicamente posible, y voy mas all&amp;#225;: de estar ah&amp;#237;, puede ser REALMENTE complicado encontrarlo. Y si no, que se lo digan a Theo&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Que cada cual saque sus propias conclusiones.&lt;/p&gt;
&lt;p dir=&quot;ltr&quot;&gt;Source:&lt;br&gt;
http://t.co/0CR23MDubN&lt;/p&gt;
</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/286106926705012984'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/286106926705012984'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2013/07/podemos-fiarnos-de-truecrypt.html' title='¿Podemos fiarnos de TrueCrypt?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-9178409870815317096</id><published>2012-07-11T10:37:00.001+10:00</published><updated>2012-07-11T10:37:34.733+10:00</updated><title type='text'>OFFTOPIC: DC SHOES: KEN BLOCK&#39;S GYMKHANA FIVE: ULTIMATE URBAN PLAYGROUND; SAN FRAN...</title><content type='html'>&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;270&quot; src=&quot;http://www.youtube.com/embed/LuDN2bCIyus?fs=1&quot; width=&quot;480&quot;&gt;&lt;/iframe&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/9178409870815317096'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/9178409870815317096'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/07/offtopic-dc-shoes-ken-blocks-gymkhana.html' title='OFFTOPIC: DC SHOES: KEN BLOCK&#39;S GYMKHANA FIVE: ULTIMATE URBAN PLAYGROUND; SAN FRAN...'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/LuDN2bCIyus/default.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-274950203829874712</id><published>2012-03-22T07:30:00.000+11:00</published><updated>2012-03-22T07:30:00.450+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerability"/><title type='text'>Did you know that tagcloud.swf allows CrossSite Scripting?</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.roytanck.com/wp-content/uploads/2008/03/wp-cumulus.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://www.roytanck.com/wp-content/uploads/2008/03/wp-cumulus.gif&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span name=&quot;Document&quot;&gt;&lt;span class=&quot;fixed&quot;&gt;I would like to warn you about security vulnerabilities in plugin WP-Cumulus for
WordPress.
These are Full path disclosure and Cross-Site Scripting vulnerabilities.
Which is a &lt;/span&gt;&lt;/span&gt;web-application vulnerabilities which 
allow attackers to bypass client-side security mechanisms normally 
imposed on web content by modern &lt;a href=&quot;http://en.wikipedia.org/wiki/Web_browser&quot; title=&quot;Web browser&quot;&gt;web browsers&lt;/a&gt;.
 By finding ways of injecting malicious scripts into web pages, an 
attacker can gain elevated access-privileges to sensitive page content, 
session cookies, and a variety of other information maintained by the 
browser on behalf of the user. &lt;br /&gt;&lt;span name=&quot;Document&quot;&gt;&lt;span class=&quot;fixed&quot;&gt;
&lt;br /&gt;&lt;u&gt;&lt;b&gt;Full path disclosure:
&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;
&lt;br /&gt;http://site/wp-content/plugins/wp-cumulus/wp-cumulus.php
&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;&lt;u&gt;XSS:
&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;http://site/wp-content/plugins/wp-cumulus/tagcloud.&lt;br /&gt;swf?mode=tags&amp;amp;tagcloud=%3Ctags%3E%3Ca+href=&#39;javascript:&lt;br /&gt;alert(document.cookie)&#39;+style=&#39;font-size:&lt;br /&gt;+40pt&#39;%3EClick%20me%3C/a%3E%3C/tags%3E
&lt;br /&gt;&lt;br /&gt;Code will execute after click. It&#39;s strictly social XSS.
&lt;/span&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;There are a lot of vulnerable tagcloud.swf file in Internet (according to Google):&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span name=&quot;Document&quot;&gt;&lt;span class=&quot;fixed&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span name=&quot;Document&quot;&gt;&lt;span class=&quot;fixed&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;http://www.google.com.au/search?q=filetype:swf+inurl:tagcloud.swf&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span name=&quot;Document&quot;&gt;&lt;span class=&quot;fixed&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;So to all flash developers, I recommend you to attend to security of their flash files. And for the owners of sites, with vulnerables flashes like tagcloud.swf, fix them&amp;nbsp; or turn over to your development team&amp;nbsp; to fix it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;code&gt;&amp;nbsp;&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;code&gt;&amp;nbsp;&lt;/code&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;code&gt;&lt;/code&gt;&lt;span name=&quot;Document&quot;&gt;&lt;span class=&quot;fixed&quot;&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;Kind Regards,&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;code&gt;&amp;nbsp;&lt;/code&gt;&lt;/div&gt;
&lt;pre&gt;&lt;code&gt;Alfredo Cedeno&lt;/code&gt;&lt;/pre&gt;
&lt;pre&gt;&lt;code&gt;IT Security Analyst &amp;amp; Advisor
http://ajcborges.blogspot.com &lt;/code&gt;&lt;/pre&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/274950203829874712'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/274950203829874712'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/03/did-you-know-that-tagcloudswf-allows.html' title='Did you know that tagcloud.swf allows CrossSite Scripting?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Port Melbourne VIC, Australia</georss:featurename><georss:point>-37.836926 144.94455</georss:point><georss:box>-37.8620065 144.905068 -37.8118455 144.98403199999998</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-6714398565887625207</id><published>2012-03-21T07:30:00.000+11:00</published><updated>2012-03-21T07:30:01.217+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Attacks"/><category scheme="http://www.blogger.com/atom/ns#" term="Banks"/><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><title type='text'>Phishing gang steals victim&#39;s life savings of $1.6M</title><content type='html'>&lt;b&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;span class=&quot;byline&quot;&gt;By
            &lt;a href=&quot;http://www.zdnet.co.uk/member-profile/2000331828/&quot; rel=&quot;author&quot;&gt;&lt;span&gt; Tom Espiner&lt;/span&gt;&lt;/a&gt;,
                ZDNet UK,         &lt;a href=&quot;http://www.zdnet.co.uk/2012/03/15/&quot;&gt;&lt;span&gt;15 March, 2012 16:09&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.zdnet.co.uk/i/z5/illo/nw/story_graphics/11sept/police-policeman-back-300.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.zdnet.co.uk/i/z5/illo/nw/story_graphics/11sept/police-policeman-back-300.jpg&quot; /&gt;&lt;/a&gt;The 12 men and two women were &lt;a href=&quot;http://www.zdnet.co.uk/blogs/security-bullet-in-10000166/police-swoop-on-1m-uk-phishing-suspects-10025635/&quot; target=&quot;&quot; title=&quot;&quot;&gt;detained on Thursday morning&lt;/a&gt;
 in raids in London and the West Midlands. More arrests may follow in 
the coming days, according to Metropolitan Police Central eCrime Unit 
(PCeU) head &lt;a href=&quot;http://www.zdnet.co.uk/news/security-threats/2011/09/30/police-take-down-illegal-drug-websites-40094075/&quot;&gt;Charlie McMurdie&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;


&quot;These were dawn raids,&quot; McMurdie told ZDNet UK. &quot;Enquiries are still ongoing regarding potential further arrests.&quot;&lt;br /&gt;
&lt;br /&gt;


The &lt;a href=&quot;http://www.zdnet.co.uk/news/security-threats/2012/01/16/facebook-scammers-go-phishing-in-chat-sessions-40094822/&quot;&gt;phishing&lt;/a&gt;
 gang sent out unsolicited emails with links to a fake banking website. 
It used a series of bank accounts assigned to individual &#39;money mules&#39; 
to launder £1m siphoned from the life-savings account of one woman who 
had divulged her details. The cash was transferred via the internet, the
 Metropolitan Police said in a statement.&lt;br /&gt;
&lt;br /&gt;


&quot;The stolen money was spent over a three-day period, after suspects 
embarked on a spending spree during the Christmas sales,&quot; the Met said. 
&quot;The victim, a UK citizen currently living abroad after relocating to 
care for an ill relative, saw her savings disappear overnight after her 
bank account details were illegally obtained and unauthorised access to 
the account was gained.&quot;&lt;br /&gt;
&lt;br /&gt;


The suspected &#39;money mule&#39; launderers received between £9,000 and 
£75,000 each from the account. All of the 14 suspects were in custody at
 the time of writing, according to the Met.&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;


Around 150 police officers were involved in the operation. They included
 members of the PCeU, 50 special constables, and police from &lt;a href=&quot;http://www.zdnet.co.uk/news/security/2012/02/09/police-set-to-launch-three-30m-e-crime-hubs-40095008/&quot;&gt;three regional e-crime hubs&lt;/a&gt; in the East Midlands, York and Humber, and the North West.&lt;br /&gt;
&lt;br /&gt;


&quot;We wanted to make the best use of resources in relation to where the suspects were located,&quot; McMurdie said.&lt;br /&gt;
&lt;br /&gt;
The
 police said the &quot;sophisticated&quot; phishing operation highlighted the need
 for people to take care when doing banking online, warning the public 
not to click on links in unsolicited emails.&lt;br /&gt;
&lt;br /&gt;

&lt;br /&gt;
&quot;This is an example of how cybercrime creates real victims 
through the indiscriminate actions of the criminals involved,&quot; Detective
 Inspector Stewart Garrick said in the PCeU&#39;s statement.&lt;br /&gt;


&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;copyright&quot; rel=&quot;item-license license&quot;&gt;&lt;em&gt;Article Source.&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;copyright&quot; rel=&quot;item-license license&quot;&gt;&lt;em&gt;Dawn raids net 14 suspects in £1m phishing thef &lt;/em&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span class=&quot;copyright&quot; rel=&quot;item-license license&quot;&gt;&lt;em&gt;Security Threats | ZDNet UK http://goo.gl/MYzKu&lt;/em&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='https://ajcborges.blogspot.com/feeds/6714398565887625207/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://ajcborges.blogspot.com/2012/03/phishing-gang-steals-victims-life.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/6714398565887625207'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/6714398565887625207'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/03/phishing-gang-steals-victims-life.html' title='Phishing gang steals victim&#39;s life savings of $1.6M'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total><georss:featurename>Port Melbourne VIC, Australia</georss:featurename><georss:point>-37.836926 144.94455</georss:point><georss:box>-37.862013999999995 144.905068 -37.811838 144.98403199999998</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-8843125024644638513</id><published>2012-02-15T07:30:00.000+11:00</published><updated>2012-02-15T07:30:01.095+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Identify a Phishing Message in Five Steps</title><content type='html'>&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;strong&gt;From IT Business Edge&lt;/strong&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://img.itbe.com/itd/inline/94615.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;169&quot; src=&quot;http://img.itbe.com/itd/inline/94615.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Spear phishing, a type of email spoof, targets individuals or 
departments within organizations and attempts to elicits a desired 
action that could install malware, compromise login names and passwords 
and steal data. Use Paul Mah&#39;s simple checklist to spot potential 
phishing messages.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;From the network breach at RSA to theft of intellectual property in 
Operation Aurora, it is no secret that some of the most visible hacking 
involves the use of spear phishing. A targeted form of phishing that is 
custom-made for a specific organization, a spear phishing email message 
seeks to elicit a desired action that could result in a Trojan being 
loaded, or the unintended leaking of confidential or privileged data.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;As
 Paul Mah has written in the past, defending against spear phishing is a
 challenging task that mandates some amount of user training. To assist 
organizations on this front, Paul has come up with a simple checklist to
 help identify a potential phishing message.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;To have access to&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Paul&#39;s&amp;nbsp; &lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;checklist visit the following URL:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;http://goo.gl/lmpZR&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/8843125024644638513'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/8843125024644638513'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/02/identify-phishing-message-in-five-steps.html' title='Identify a Phishing Message in Five Steps'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8131869 144.9629796</georss:point><georss:box>-37.8382759 144.92349760000002 -37.7880979 145.0024616</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-1352884466356663718</id><published>2012-02-14T07:30:00.000+11:00</published><updated>2012-02-14T07:30:01.099+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>This February 14 be a Valentine not a Victim</title><content type='html'>&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
As Valentine’s Day approaches, Better Business Bureau of Southern 
Arizona warns that Cupid’s arrow may be aimed directly at consumers’ 
wallets. Those who find themselves awash in love’s emotion should 
remember that con artists thrive on the fact that emotion can trump 
logic.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
There are three categories of scams that we all should be aware of at this romantic season as well as throughout the year.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;strong&gt;Online Dating&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Their photo may be attractive and their story may sound compelling 
but that person you met through an online dating site may turn out to be
 the very opposite of your soul mate. Photos, profiles and stories can 
be easily faked on dating sites. One common tactic is to claim to be a 
successful overseas businessperson with no family.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
After what seems like sincere conversation in which many questions 
are asked of you, the scammer can skillfully employ psychology to say 
precisely what you want to hear.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Once the ice is broken and a comfort level has been reached on your 
part, the heart of the matter is arrived at: they need financial 
assistance. They may want you to cash a check for them or otherwise help
 them out of a financial difficulty. It could be travel expenses, 
medical expenses or some other type of debt. At any rate it is your 
money less than your heart that they are after. MoneyGram, one of the 
major global money transfer companies, has estimated that romance scams 
defraud victims of over $10,000 for each occurrence. For those so 
victimized, whatever the amount, a website called romancescams.org can 
be helpful.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;strong&gt;Online Florists&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
When love is in bloom many rely on the traditional symbol of 
thoughtfulness, the bouquet, to convey their feelings for that special 
person. But be aware that online florists are not always reliable. If 
the flowers that are actually received by your loved one are inferior 
arrangements from those ordered, or even not delivered at all, it can be
 a wilting experience.&lt;span id=&quot;more-766&quot;&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Scammers may send you emails saying that the flowers you ordered 
cannot be delivered unless you log in to their site and re-enter your 
credit card information. These emails are sent out in large numbers 
hoping to eventually find the inboxes of someone who has really sent 
flowers to their sweetheart. They are playing on consumers emotions by 
planting the fear that the bouquet may not reach the intended and that 
person will feel forgotten on Valentine’s Day. If you think the message 
may be legitimate, go to the florist’s website or give them a phone 
call, using the original site from which you ordered rather than the 
link on the email.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
The best way to assure that flowers reach your beloved just as you 
ordered them is to rely on a local florist. A website devoted to 
uncovering florist scammers can be found at floristdetective.com.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;strong&gt;E-card Scams&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Phishing attempts abound around the e-card industry. A frequently 
used technique is to email a message saying you have a card waiting to 
be viewed. You are then directed to a fake website that resembles a 
popular site like Hallmark or American Greetings.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Once you are there a prompt tells you to download the latest version 
of Flash Player in order to view the e-card. Click that link and a virus
 is quickly downloaded and attacks your computer. Instead of having your
 loved one steal your heart, a scammer has stolen your identity.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Consumers should always exercise care in opening emails, links or 
attachments from those you do not know. Especially suspicious are 
unsolicited messages with subject lines saying “Someone just sent you an
 e-card” or “Send your loved one a Valentines Card today.”&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Avoid becoming victimized by scammers who rely on the old adage that 
“love is blind.” Keep a clear head and open eyes this Valentine’s Day. 
Contact BBB by calling (520)888-5353 with questions or concerns if you 
think someone is going less for your heart and more for your wallet.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Source Article: http://goo.gl/zaSED &lt;/span&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;by &lt;a href=&quot;http://tucsoncitizen.com/bbbconsumeralert/author/bbbconsumeralert/&quot; rel=&quot;author&quot; title=&quot;Posts by bbbconsumeralert&quot;&gt;bbbconsumeralert&lt;/a&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/1352884466356663718'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/1352884466356663718'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/02/this-february-14-be-valentine-not.html' title='This February 14 be a Valentine not a Victim'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8131869 144.9629796</georss:point><georss:box>-37.8382759 144.92349760000002 -37.7880979 145.0024616</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-4611656686419505872</id><published>2012-02-13T07:30:00.000+11:00</published><updated>2012-02-13T07:30:00.753+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Hackers Ask &#39;Will You Be My Valentine?&#39;</title><content type='html'>&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

 &lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;a href=&quot;http://www.cso.com.au/author/685856492/tony-bradley/articles&quot;&gt;by Tony Bradley&lt;/a&gt; (PC World (US online))&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
With Valentine&#39;s Day around the corner, cyber criminals are ramping up 
spam, phishing, and other attacks targeting the lover&#39;s holiday.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div id=&quot;article_body&quot; style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;


 





 
 
 
 
 
 









 
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
There are only five days to Valentine&#39;s Day. Those 
of you who are shocked by that revelation are prime targets for 
Valentine&#39;s Day related spam and phishing attacks as hackers hope to 
catch you with your guard down for this day of romance.&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
Messages targeting Valentine&#39;s Day are expected to quadruple globally in the coming days -- in part because &lt;a href=&quot;http://www.pcworld.com/businesscenter/article/245093/fighting_malware_and_cybercrime_with_old_school_criminology.html&quot; target=&quot;_blank&quot;&gt;cyber criminals are adept&lt;/a&gt;
 at targeting holidays and current events as bait for attacks. An offer 
for a dozen roses for $5 might get some traction any time of the year, 
but with the clock quickly counting down to Valentine&#39;s Day it has much 
higher odds of duping frantic lovers in search of a last minute gift.&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
A &lt;a href=&quot;https://blogs.mcafee.com/consumer/consumer-threat-notices/love-and-cyber-scams&quot; target=&quot;_blank&quot;&gt;blog post from McAfee&lt;/a&gt;
 warns, &quot;Many consumers look for a little romance on Valentine&#39;s Day, 
whether it is a thoughtful gift, a romantic getaway, or a heartfelt 
e-card, but if you&#39;re looking for these things online, beware.&quot;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
McAfee points out a number of types of Valentine&#39;s Day themed threats you should be aware of:&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;Phishing Scams&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
Attackers
 will send out spam promoting bargains for flowers, romantic dinners, 
jewelry, or other Valentine&#39;s Day gift related themes. Clicking on the 
offer might &lt;a href=&quot;http://www.pcworld.com/businesscenter/article/247370/45000_facebook_accounts_compromised_what_to_know.html&quot; target=&quot;_blank&quot;&gt;take you to a malicious site&lt;/a&gt;
 that could compromise a vulnerable PC, or it could take you to a site 
that looks legitimate, and asks for your credit card, and other personal
 information to &quot;complete the order&quot;.&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
Malicious eCards&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
Any
 holiday that traditionally involves giving and receiving cards is a 
prime target for cyber criminals. Everyone loves to receive a 
personalized greeting card -- especially if it seems to be from someone 
that may be romantically interested.&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
Seriously, though, what are the odds that someone you don&#39;t know decided to &lt;a href=&quot;http://www.pcworld.com/businesscenter/article/244816/fake_itunes_gift_certificate_could_ruin_your_black_friday.html&quot; target=&quot;_blank&quot;&gt;send you an ecard&lt;/a&gt; for Valentine&#39;s Day out of the blue? Right.&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
Mr. (or Mrs.) Wrong&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
Another
 scam to watch out for are fake profiles on online dating sites. Cyber 
criminals create online dating profiles designed to be as attractive as 
possible to lure unsuspecting love seekers. The idea is to make 
connections, and establish trust as a means to further criminal 
activity.&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
McAfee outlines some additional 
threats to watch out for in its blog post. To steer clear of Valentine&#39;s
 Day cyber threats, follow the &lt;a href=&quot;http://www.pcworld.com/businesscenter/article/245566/warning_tips_for_secure_mobile_holiday_shopping.html&quot; target=&quot;_blank&quot;&gt;basic principles of online common sense&lt;/a&gt;.
 Don&#39;t open emails or file attachments, or click on links from people or
 sources you are not familiar with -- and even if you do know the 
sender, think twice about whether that person would really send you a 
Valentine&#39;s Day email.&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
Another basic rule is 
that if it sounds too good to be true, it probably is. Don&#39;t fall for 
unbelievable last minute Valentine&#39;s Day gift ideas no matter how 
desperate you are for a gift.&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
Protect your wallet, your identity, and your heart by avoiding Valentine&#39;s Day cyber scams.&amp;nbsp;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;Source Article:&lt;/b&gt; http://goo.gl/NEVuU&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;storybody&quot; style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4611656686419505872'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4611656686419505872'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/02/hackers-ask-will-you-be-my-valentine.html' title='Hackers Ask &#39;Will You Be My Valentine?&#39;'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8131869 144.9629796</georss:point><georss:box>-37.8382759 144.92349760000002 -37.7880979 145.0024616</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-4348715940947794383</id><published>2012-02-10T07:30:00.000+11:00</published><updated>2012-02-10T07:30:01.265+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Free Email Providers Launch DMARC.org To Prevent Phishing Scams</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://cbsdetroit.files.wordpress.com/2012/02/90247152.jpg?w=300&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;135&quot; src=&quot;http://cbsdetroit.files.wordpress.com/2012/02/90247152.jpg?w=300&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;strong&gt;&lt;/strong&gt;Leading free email providers like 
Google, Microsoft and Yahoo are teaming up in an effort to prevent 
“phishing” scams. As WWJ’s Rob Sanford reports, the unprecedented effort
 was announced this week.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
The companies have created a working group – &lt;a href=&quot;http://dmarc.org/&quot; target=&quot;_blank&quot;&gt;DMARC.org&lt;/a&gt; – to promote a standard set of email technologies that they say will lead to more secure email.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
According to its website, DMARC, which stands for “Domain-based 
Message Authentication, Reporting &amp;amp; Conformance,” standardizes&amp;nbsp;how 
email receivers perform email authentication. This means that senders 
will experience consistent authentication results for their messages at 
AOL, Gmail, Hotmail, Yahoo! and any other email receiver implementing 
DMARC.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;entry-injected-ad narrow&quot; style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

 
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
With the rise of the social internet and e-commerce, spammers have a 
tremendous financial incentive to compromise user accounts, enabling 
theft of passwords, bank accounts, credit cards and more. Email is easy 
to manipulate and criminals have found spoofing to be a proven way to 
exploit user trust of well-known brands. Simply inserting the logo of a 
well-known brand into an email gives it instant legitimacy with many 
users.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
CNET executive editor Molly Wood said phishing is threatening the legitimacy of email.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
“I think it’s hard sometimes for these companies to work together. 
They don’t always think it’s in their best interest to come together, 
but I think it’s gotten to the point now where phishing scams are so 
prevalent, that all of these companies are worried that their customers 
are going to stop trusting their legitimate email,” said Wood.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
The arrangement will not stop all spam or phishing but will stop what
 they call a “significant chunk” of malicious messages sent.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
DMARC helps email senders and receivers work together to better 
secure emails, protecting users and brands from painfully costly abuse. 
Find more information at &lt;a href=&quot;http://dmarc.org/&quot; target=&quot;_blank&quot;&gt;DMARC.org&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;b&gt;Source: &lt;/b&gt;http://cbsloc.al/zhdnzo &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4348715940947794383'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/4348715940947794383'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/02/free-email-providers-launch-dmarcorg-to.html' title='Free Email Providers Launch DMARC.org To Prevent Phishing Scams'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8131869 144.9629796</georss:point><georss:box>-37.8382759 144.92349760000002 -37.7880979 145.0024616</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-5706595544464755674</id><published>2012-02-09T07:30:00.000+11:00</published><updated>2012-02-09T07:30:01.896+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>I will NEVER ask for your password</title><content type='html'>&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;a class=&quot;internal-link view-user-profile&quot; href=&quot;http://windowsteamblog.com/members/Dick-Craddock/default.aspx&quot;&gt;by Dick Craddock&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
There are a lot of bad things on the Internet, and few are worse than
 phishing scams. But there is a certain class of phishing scam that has 
earned a special level of disdain and disgust, at least from me. I’m 
talking about the phishing scams that target Hotmail customers using &lt;u&gt;my&lt;/u&gt; name, &lt;u&gt;my&lt;/u&gt; picture, and even &lt;u&gt;my&lt;/u&gt; signature. Grrrr.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Let me clear something up right off the bat: I will &lt;u&gt;never&lt;/u&gt; ask for your password. No one from &lt;a href=&quot;http://explore.live.com/windows-live-hotmail&quot; target=&quot;_blank&quot;&gt;Hotmail&lt;/a&gt; or Microsoft will ever ask for your password. In fact, &lt;u&gt;no&lt;/u&gt; legitimate service will ever ask for your password. If you ever get an email asking for &lt;u&gt;any&lt;/u&gt; password to &lt;u&gt;any&lt;/u&gt;
 service, you can be sure, without a shadow of a doubt, that the email 
is a phishing scam. Just junk it. (Or, in Hotmail, mark it as a phishing
 scam using the “Mark As” menu.)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Phishing scams&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Spammers want to send spam. That’s what they do. As I said in my &lt;a href=&quot;http://windowsteamblog.com/windows_live/b/windowslive/archive/2011/08/03/90-less-spam-in-hotmail-15-less-spam-on-the-internet.aspx&quot; target=&quot;_blank&quot;&gt;last post&lt;/a&gt;,
 we’ve made it hard for them to send spam with new accounts due to the 
effectiveness of our account reputation work. So, spammers have turned 
to hijacking customer accounts in order to send more spam. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Phishing
 scams are one of the simplest ways that spammers use to gain control of
 your account. The spammer sends an email that asks for your password, 
usually with a threat that your account is about to be closed. You 
reply, providing your password, and, Voila! Your account (and 
reputation) is hacked.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Spammers do this on all networks and all 
services – Hotmail, Gmail, Yahoo!, Facebook, AOL – spammers do not 
discriminate, and no service is immune. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
How my picture got out there&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Hotmail
 sends email to our customers fairly regularly to update people on 
various things, such as the availability of new software or features, or
 even to remind people about security measures, like creating a strong 
password or adding your mobile phone number to your account.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
About
 a year ago, we decided that we would make these messages more personal 
by including my name, my picture, and my signature. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
That decision has really come back to haunt me.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
A gift to spammers&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Almost
 immediately, the spammers copied that email, including my picture, name
 and signature, and modified the content so that it said something like 
“Your account is about to be shut down unless you reply to this email 
with your account name and password.”&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
This is a classic example of a phishing scam, and one of the most common ways that accounts get compromised. Here’s an example:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-53-82-metablogapi/2438.An_2D00_example_2D00_of_2D00_a_2D00_phishing_2D00_scam_5F00_73CD6C72.png&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;An example of a phishing scam&quot; border=&quot;0&quot; height=&quot;363&quot; src=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-53-82-metablogapi/3288.An_2D00_example_2D00_of_2D00_a_2D00_phishing_2D00_scam_5F00_thumb_5F00_7B08E085.png&quot; style=&quot;background-image: none; border-bottom: 0px; border-left: 0px; border-right: 0px; border-top: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;An example of a phishing scam&quot; width=&quot;530&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
The bottom of that same email looks like this:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-53-82-metablogapi/8372.Phishing_2D00_scams_2D00_use_2D00_Dick_2D00_Craddocks_2D00_name_2D00_and_2D00_picture_5F00_05D59C01.png&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Phishing scams use Dick Craddock&#39;s name and picture&quot; border=&quot;0&quot; height=&quot;315&quot; src=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-53-82-metablogapi/8666.Phishing_2D00_scams_2D00_use_2D00_Dick_2D00_Craddocks_2D00_name_2D00_and_2D00_picture_5F00_thumb_5F00_35B03DC2.png&quot; style=&quot;background-image: none; border-bottom: 0px; border-left: 0px; border-right: 0px; border-top: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;Phishing scams use Dick Craddock&#39;s name and picture&quot; width=&quot;235&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Yep. That’s me, all right. But that email is definitely &lt;u&gt;not&lt;/u&gt; from me.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Even smart people fall for it&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Phishing
 messages can look very real and convincing, so even smart, tech-savvy 
people fall for them. I get asked about this quite a bit. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Here’s
 a conversation that took place on my public Facebook page. The first 
person asks, “I got this message, is it really you?” In response, our 
Development Manager, Eliot, displayed both his penchant for pithiness 
and his mastery of high school French:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-53-82-metablogapi/2350.Facebook_2D00_messages_5F00_36E4B0D4.png&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Facebook messages&quot; border=&quot;0&quot; height=&quot;329&quot; src=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-53-82-metablogapi/5226.Facebook_2D00_messages_5F00_thumb_5F00_41C1921C.png&quot; style=&quot;background-image: none; border-bottom: 0px; border-left: 0px; border-right: 0px; border-top: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;Facebook messages&quot; width=&quot;470&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Phishing
 scammers know that they’ll get better response rates by using my 
pictures and my signature to produce email messages that look 
legitimate. They even translate their scams into multiple languages to 
broaden their reach.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
The telltale signs of a phishing message&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
As I’ve said, &lt;u&gt;any&lt;/u&gt;
 email that asks for your password is a phishing scam and shouldn’t be 
trusted. You don’t need to look any further to know the message is a 
fake. Nonetheless, it’s interesting to see how “creative” the scammers 
can get. Here are some tactics scammers use to get people to provide 
their account info:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;b&gt;They copy Hotmail’s marketing images.&lt;/b&gt; These phishing messages usually contain the latest image from Hotmail’s own marketing campaigns, like this one:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-53-82-metablogapi/2018.Hotmail_2D00_header_5F00_100674C7.png&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Hotmail header&quot; border=&quot;0&quot; height=&quot;157&quot; src=&quot;http://windowsteamblog.com/cfs-file.ashx/__key/CommunityServer-Blogs-Components-WeblogFiles/00-00-00-53-82-metablogapi/7573.Hotmail_2D00_header_5F00_thumb_5F00_0B604440.png&quot; style=&quot;background-image: none; border-bottom: 0px; border-left: 0px; border-right: 0px; border-top: 0px; display: inline; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;Hotmail header&quot; width=&quot;530&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;b&gt;They provide a bogus reason for needing your password.&lt;/b&gt;
 The messages usually contain an introduction that offers a false 
explanation about why they need your password. Some of my favorites 
include:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;li&gt;&lt;i&gt;“We are currently upgrading our data base and e-mail account center.”&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;“We are deleting all unused accounts to create more space for new accounts.”&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;“We
 encountered a problem with our database and a lot of records were lost,
 we are restoring our database to enable us serve you better.”&lt;/i&gt;&lt;/li&gt;
&lt;li&gt;&lt;i&gt;“We are having too many congested email due to the anonymous registration of Hotmail Msn-Live Accounts in our database system.”&lt;/i&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Rest assured: NONE of these will EVER be a legitimate reason to ask for your password. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;b&gt;They design a subject line to scare you.&lt;/b&gt; The subject lines call for your immediate attention and are often intended to be scary. Here are a few common examples:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;li&gt;Some variation of “Account Alert!!!”, or “Account upgrade alert,” or “Email account alert.”&lt;/li&gt;
&lt;li&gt;Some variation of “Account renewal process,” or “Verify your account details.”&lt;/li&gt;
&lt;li&gt;Some variation of “Email Warning!!!”, or “Verify your email now to avoid being closed!!!!!”&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
(Scammers really like to use exclamation points!!!! A lot!!!)&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;b&gt;They send the email from a bad “From” address.&lt;/b&gt;
 The “From” address in the email is often a dead giveaway. At a glance, 
it might look like you’ve gotten mail from the Hotmail Team. But if you 
look at the actual email address, it’s almost always something fishy 
(phishy?). Typically, scammers just use the name of a Hotmail customer 
account. &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Get educated, educate others&lt;/h3&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
In a perfect 
world, no one would ever give out their password, and the phishing scams
 would be ineffective, and would just stop. You’ve already taken a step 
to helping us get there by reading this post, and now you can help pay 
it forward by educating others.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;u&gt;Any&lt;/u&gt; email that asks for 
your password is a phishing scam. If anyone ever asks you, “Hey, is this
 email legit?” just say, “If it asks you for your password, then it is 
absolutely, definitely, without question &lt;u&gt;a scam&lt;/u&gt;! Report it as junk!”&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
As a final note, some of you might be wondering, &lt;i&gt;Why can’t Hotmail detect these scams?&lt;/i&gt;
 We can detect these scams and do detect many of them. But it’s just a 
numbers game, and spammers are capable of producing a huge volume of 
phishing scams, with enough variation in the text and images to fool our
 filters a small percentage of the time. In addition, it’s important for
 us to keep the false positives low – meaning that we don’t want to 
mistakenly identify a legitimate email sent from a good user as spam.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;  &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
So,
 until we get to that perfect world without spammers, we’ll be here 
building better and better systems to battle the bad guys. Thanks for 
reading, and thanks for using Hotmail.&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/5706595544464755674'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/5706595544464755674'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/02/i-will-never-ask-for-your-password.html' title='I will NEVER ask for your password'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8131869 144.9629796</georss:point><georss:box>-37.8382759 144.92349760000002 -37.7880979 145.0024616</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-3377581687346238423</id><published>2012-02-08T07:30:00.000+11:00</published><updated>2012-02-08T07:30:00.200+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Sir Spamalot and Lady Phishing</title><content type='html'>&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;By &lt;a href=&quot;http://www.securityweek.com/authors/jon-louis-heimerl&quot;&gt;Jon-Louis Heimerl&lt;/a&gt; &lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;I am a millionaire. Actually, I’m a 
multi-millionaire. Or rather I could be if I helped the honorable Mr. 
Nagumba get his money out of Nigeria, or helped Barbara get her money 
out of Brazil, or picked up my unclaimed lottery winnings, or helped 
another half dozen people in the last month.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
I have won $1500 several times a day for the last few months. I have 
won a new car. I have important packages waiting to pick up from FedEx 
and UPS. I am being audited by the IRS and they sent me an attachment 
that included an executable notice with instructions. I won a 15 day 
cruise if I qualified – they only needed a credit card number to confirm
 my identity and that I am over 18. I can get my teeth whitened or Lasik
 eye surgery for 80% off. I have qualified for a special deal on a new 
BMW 335 with experimental pricing, and can get in a brand new one for 
under $15,000. Two of my credit cards have been compromised so I needed 
to log onto the included website to verify and change my account 
information. As a matter of fact, another credit card that I don’t even 
have was also compromised, and I needed to log on there too. One of my 
bank accounts appears to have some out-of-date information associated 
with it. I can get really cheap Viagra (sic) cheap online, Heather 
thinks I’m hot, and there seems to be way too many people interested in 
my manhood.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;img alt=&quot;Analyzing Spam&quot; height=&quot;223&quot; src=&quot;http://www.securityweek.com/sites/default/files/SPAMALOT.jpg&quot; style=&quot;float: right; margin: 5px;&quot; title=&quot;Spam&quot; width=&quot;175&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
My personal spam folder is pretty thin. I try to trim spam 
aggressively. Just in the last 24 hours I have received 42 emails. Three
 from family, 21 advertisements from retailers (it’s beyond me why I 
need a daily reminder from a retailer telling me that they are still 
open and selling the same stuff they’ve been selling for the last five 
years), and 18 spam. Now, I have no idea how much spam my ISP trims 
before it even gets to me, but I assume it is a lot. A quick search 
shows unofficial estimates that spam is somewhere between 60 and 97% of 
all email sent. By the best accounts I can find, that means around 40 
billion spam emails every day (give or take a few billion). The numbers 
are down slightly from 2010 partially because three botnets (Rustock, 
Lethic, and Xarvester) have been somewhat throttled. The closure of spam
 specialist Spamit helped as well. But, as we all know, spam has not 
gone away.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Unfortunately, spam means money. Spam brings with it a variety of 
issues, but it also delivers chunks of money and other opportunities to 
those who generate it. Pay-per-click sites still exist, and if you send 
100 million spam messages and get 1% of recipients to click through – 
ka-ching! Say you send 50 million spam messages that contain a link for a
 free virus scan, and you can get .5% of those recipients to follow 
through with a fake purchase for ONLY $29.99 – that’s $7.5million – 
ka-ching! Credit card information is not worth what it used to be, but 
if you can send 100 million fake “change your password” notices to 
BigBlueBank customers, and 1% of them go through your fake link and 
update their password – ka-ching! And even if they can’t get something 
from you, maybe they can compromise some low percentage of recipients 
with a Trojan or sniffer. The numbers add up quickly because of volume.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
But spam and phishing emails are not always obvious, are they? Well, 
some of them are. If the email subject line includes things like 
“Cialis” or “Replica Handbags” I think the chances it is spam is 
probably something around 100%. But do we always know?  I included an 
example of a recent phishing email I received (names have been changed).
 It looks pretty good at a glance, but there is a lot wrong with it if 
you pay attention.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Let’s look through it in detail.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;img alt=&quot;Spam Example&quot; height=&quot;506&quot; src=&quot;http://www.securityweek.com/sites/default/files/Spam-Examples.jpg&quot; style=&quot;margin: 5px;&quot; title=&quot;Spam Example&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Let’s work on the premise that the logo and all the colors are 
correct, and that at a glance, this looks authentic – it appears to be 
an email from BigBlueBank, where you have an account registered with 
online access. What is wrong with the email?&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
1. BigBlueBank Online may be the correct 
name, but the chances that return email address is correct is low (read 
“low”, think “nonexistent”). Notice that it is @onlinesvc.com. If this 
was really from BigBlueBank chances are pretty good that it would be 
@BigBlueBank.com. If the return address just shows as BigBlueBank 
Online, hold your cursor over the name. The actual associated email 
address should show in a mouse-over or in the lower left corner of your 
browser.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
2. “To: undisclosed-recipients” - If this
 was genuine, it would actually be to your specific email address, and 
NOT show as a bulk email with hidden addressees. Check what you bank 
emails you now – they are all to your real email address.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
3. “UPDATE YOUR INFORMATION!” – This 
pushes an immediate sense of urgency. Not necessarily a blazing orange 
flag, but it should raise your skepticism when you get an email so 
obviously trying to raise your personal sense of alarm.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
4. “This message is a critical one…” This
 is obviously a person to whom English is not their primary language. 
Normal English phrasing would be “This is a critical message…”. If 
BigBlueBank is based in South Carolina this should get your attention. 
If they are based in Germany, it probably still should, but not quite as
 much.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
5. “It has come to our attentions,” “This
 require” - The extra “s” on attention and the missing “s” are perfect 
examples of disagreement in tense, and errors. These are strong 
indicators that the writer is not a natural English speaker, and that 
whoever sent the email did not spend enough time proof reading and 
editing the content. If BigBlueBank is a top 10 bank in the Americas, 
what are the chances that they would not have a proof reader check 
everything that went out (Hint: the answer is 0%).&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
6. “Your Account information” and “The 
Account update…” – What is with the random capitalization of “Account”? 
Errors like this should be blazing a hole in your brain by now.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
7. “Is also a new BigBlueBank” – This is 
just an awkward sentence. Read the whole sentence from the email. 
Perhaps “the account update also includes” or something similar, but 
again, it is an error in grammatical construction that should tell you 
this is not a professional email.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
8. “Services security statement…” – Again with the random capitalization of “Services”? Brain. Hole. Burning.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
9. “Goes according” – Perhaps if it read 
“is in accordance” this would not raise alarms, but the misuse of the 
“ing” is a common error for a non-natural English speaker.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
10. “On our terms of service” – “in” our 
terms of service would be appropriate for an English speaker, and even 
more appropriate in a professionally prepared communication.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
11. 5:55 AM 20/01/2012 – This is actually
 the first thing I saw in the email that made me say “fake”. The date is
 shown as day/month/year, which is predominantly European or other 
international convention. Standard in the United States would be 
01/20/2012. I know the other way sorts better, but it is aberrant 
construction in the U.S. If you are not from the U.S., this probably 
does not bother you as much as it did me.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
12. “May result on a suspension of your 
account” – “on” is again wrong. A natural English speaker would say 
“in”. This also implies a threat designed to increase your sense of 
urgency and decrease your vigilance.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
13. BigBlueBank Upgrade Home – Look at 
that. How convenient it was of them to include a link back to 
Bigbluebank for you. Just hold your mouse over the hyperlink (don’t 
bother; it won’t work on the example, since the hyperlink has been 
removed). By now you realize the chances that the link actually has 
anything to do with bigbluebank is exactly 0%. In the example of this 
email, it actually linked to something like the following – the fact 
that bigbluebank is not the domain should be an obvious clue: 
http//generalupdates.gh.ost.de/bigbluebank/account_update/index.php.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
14. 1-888-XXX-XXXX – Very nice to have an
 included phone number. It really does help make the whole thing look 
better. Especially if you dial the number and someone in a call center 
answers it “Big Blue Bank – Customer Service, how can I help you?” First
 of all, check the provided number against the customer service number 
on your bank statements or against the number provided on Bigbluebank’s 
real website. It may be close but it will not match. Your second clue is
 that someone actually answered the phone and you did not have to go 
through a Voice Response system – when was the last time that happened?&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
15. “Will be helping” – there is that 
“ing” again. “This will help us” would not raise alarm, but the improper
 English should have your spinal column on fire by now. You should 
almost expect it say to “will to be helping us” like some alien speaking
 through an electronic translator.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; padding-left: 30px; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
If in doubt, bring up the genuine bigbluebank.com website by typing 
it into your browser yourself (completely ignoring their link, if you 
please), and check for information there. Locate their contact 
information to email, or call them to ask if they sent the information. 
Chances are that bigbluebank has its own security group that is 
interested in abuse and phishing emails. They may want you to forward a 
copy of the email to them for their own review if you feel like going 
that far.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Perhaps this was not the best example because this email was chock 
full o’ clues. But these are exactly the types of indicators you will 
see in many phishing emails. The fact that you even got this email 
should immediately raise your level of awareness, so everything else 
should follow.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/3377581687346238423'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/3377581687346238423'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/02/sir-spamalot-and-lady-phishing.html' title='Sir Spamalot and Lady Phishing'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8131869 144.9629796</georss:point><georss:box>-37.8382759 144.92349760000002 -37.7880979 145.0024616</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-3318638822947508578</id><published>2012-02-07T07:30:00.000+11:00</published><updated>2012-02-07T07:30:00.757+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Social Engineering Yourself A BotNet</title><content type='html'>&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Not too long ago the announcement about an 
Internet Sponsorship Law, SOPA, basically caused the Internet to blow up
 with people voting, supporting,
 and showing how much they disliked this proposed bill. The way the 
“Internet Community” came together is a lesson in mass influence itself,
 but we are going to focus on a different aspect of this drama.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.social-engineer.org/social-engineering/social-engineering-yourself-a-botnet/attachment/botnet/&quot; rel=&quot;attachment wp-att-2500&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;BotNet Social Engineering Yourself A BotNet&quot; class=&quot;alignleft  wp-image-2500&quot; height=&quot;260&quot; src=&quot;http://www.social-engineer.org/wp-content/uploads/2012/01/BotNet.jpg&quot; style=&quot;border: 2px solid black; margin: 2px;&quot; title=&quot;BotNet&quot; width=&quot;378&quot; /&gt;&lt;/a&gt;The hacktivist group Anonymous reared its head in this debate to show
 it’s disdain for any law that would censor or prohibit the use of the 
Internet, and they do so using a form of social engineering.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
One of the less influence based forms of social engineering involves 
drawing people to a website that is either loaded with malicious 
software/code or has downloads that are dangerous or infected. 
Apparently, Anonymous used this form of social engineering to create, in
 essence, one of the world’s largest botnets full of unsuspecting 
participants.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;

&lt;span id=&quot;more-2499&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;How?&lt;/strong&gt;&lt;br /&gt;
Anonymous used its legions of faithful supporters to spread shortened 
links that drew interested parties to certain links. Since a user can’t 
possibly know what to expect when they load a URL, Anonymous capitalized
 on this to create it’s botnet.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
As users went to the list of URL’s, their browsers were hijacked and 
then some code was executed. Once executed it causes the users browser 
to make a massive amount of requests to the targets websites (in this 
case DOJ and FBI). When you get hundreds or thousands or even more 
people hitting these malicious URL’s so much traffic is sent that it 
DDoS’ the sites in question.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
What are the implications of this type of attack? This form of social
 engineering is pretty malicious. Even simple curiosity can make the 
site visitor an unwilling participant in an act that could be considered
 terrorism. This, of course, is a very serious matter as traffic from 
home or work users becomes inundated with this malicious traffic.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
In the age of shortened URL’s, this kind of a story just makes it 
ever more clear that the user needs to take responsibility before 
clicking a link. These types of attacks are how people’s computers get 
hacked and how accounts are compromised. Now, it’s how massive botnets 
are created.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;    &lt;/span&gt;&lt;br style=&quot;font-family: Verdana,sans-serif;&quot; /&gt;&lt;br style=&quot;font-family: Verdana,sans-serif;&quot; /&gt;&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
     &lt;span style=&quot;font-size: xx-small;&quot;&gt;Posted in &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;a href=&quot;http://www.social-engineer.org/category/social-engineering/&quot; rel=&quot;category tag&quot; style=&quot;font-family: Verdana,sans-serif;&quot; title=&quot;View all posts in Social Engineering&quot;&gt;Social Engineering&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/3318638822947508578'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/3318638822947508578'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/02/social-engineering-yourself-botnet.html' title='Social Engineering Yourself A BotNet'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8131869 144.9629796</georss:point><georss:box>-37.8382759 144.92349760000002 -37.7880979 145.0024616</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-1184848155814289936</id><published>2012-02-06T07:30:00.000+11:00</published><updated>2012-02-06T07:30:00.340+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Phishing"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>Be on the Lookout for Phishing Emails</title><content type='html'>&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;Posted on: February 2, 2012 in Industry Issues by Chris Williams&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
If you keep up with tech news, you might have seen &lt;a href=&quot;http://thenextweb.com/google/2012/01/30/google-microsoft-facebook-and-more-team-up-to-tackle-email-spam-and-phishing/&quot; target=&quot;_blank&quot;&gt;the story recently about a new technology standard developed by Microsoft, Yahoo, Google, and Facebook&lt;/a&gt;
 to cut down on spam emails and phishing attempts. It’s an exciting new 
technology that will help protect users by increasing checks and 
reporting on sent emails.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
However, even with stricter standards for spam filtering, the 
occasional phishing email might still find its way to your inbox. 
Phishing emails are standard emails from people trying to convince you 
to give them information like passwords, usernames, credit card numbers,
 social security numbers, or other secure data. Every email user needs 
to know how to spot phishing emails so they can be deleted.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Here are five easy things to look for that you can use to spot phishing emails before you respond with sensitive information.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Emails from companies or people asking for information they should already have, such as accounts and passwords – &lt;strong&gt;a company will never ask you for your password.&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Emails asking for personal identity information – &amp;nbsp;your date of 
birth, bank account information, social security number, or other 
personal information. &lt;strong&gt;There’s no reason to ever give personal information via email. &lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Emails with weird formatting, spelling mistakes, or bad grammar – &lt;strong&gt;most phishing attempts come from overseas, so they often contain mistakes a native English speaker wouldn’t make.&lt;/strong&gt; Others are hurriedly prepared, so they may contain mistakes as well.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Links or attachments you didn’t request – &lt;strong&gt;never click on a link in an email, or open an attachment, if you didn’t request for a link or attachment to be sent to you.&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Unknown senders or strange domain names – &lt;strong&gt;if the domain name 
of the sender looks strange, or the sender is unknown to you, learn more
 about the sender or company before you take action&lt;/strong&gt;. If it looks strange, delete or report the email.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Here’s an example of a phishing email:&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;a href=&quot;http://blog.iowanetworkservices.com/wp-content/uploads/2012/02/spam_email.png&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;aligncenter size-full wp-image-4871&quot; height=&quot;441&quot; src=&quot;http://blog.iowanetworkservices.com/wp-content/uploads/2012/02/spam_email.png&quot; title=&quot;spam_email&quot; width=&quot;536&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
For more information on spotting a phishing email, &lt;a href=&quot;http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx&quot; target=&quot;_blank&quot;&gt;check Microsoft’s support page&lt;/a&gt;. If you’re a Google user and receive phishing emails, &lt;a href=&quot;http://consumerscams.org/scam_safety_tips/how_to_report_phishing_scam&quot; target=&quot;_blank&quot;&gt;you can learn how to report them to Google here&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
Remember the first step is staying vigilant. Don’t provide personal 
or sensitive information through email if you can avoid it, especially 
to people you don’t know.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
...don&#39;t forget to leave a comment... thanks.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif; text-align: justify;&quot;&gt;
 &lt;/div&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/1184848155814289936'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/1184848155814289936'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/02/be-on-lookout-for-phishing-emails.html' title='Be on the Lookout for Phishing Emails'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8131869 144.9629796</georss:point><georss:box>-37.8382759 144.92349760000002 -37.7880979 145.0024616</georss:box></entry><entry><id>tag:blogger.com,1999:blog-6012758317847145877.post-7848956677279383482</id><published>2012-02-03T07:30:00.000+11:00</published><updated>2012-02-03T07:30:00.979+11:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="English"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Security"/><title type='text'>9 Reasons to Enforce Web Security within the Organization</title><content type='html'>&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;span class=&quot;byline&quot;&gt;&lt;em&gt;&lt;/em&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
Considering the wide range of malicious content threatening your 
users, implementing strong web security within the organization is a 
crucial part of any defense-in-depth strategy. Web security doesn’t have
 to mean blocking your users’ access to the Internet, but it does mean 
protecting them from the types of threats they will encounter every day.
 Here’s a rundown of the top nine threats that are there to help you 
understand the importance of strong web security. Some of these are 
threats to your users; others are threats to their productivity. All are
 things web security can help you protect against.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;b&gt;1.Compromised sites hosting malware&lt;/b&gt;&lt;br /&gt;
 Every day you can read about sites that have been compromised by 
attackers. Hacked sites hosting malware are a common way to spread the 
damage to hundreds or thousands of others very quickly. Strong web 
security can protect your users by blocking access to compromised sites,
 and by scanning any downloads for malware.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;b&gt;2.Cross-site scripting attacks&lt;/b&gt;&lt;br /&gt;
 Cross-site scripting can steal credentials, direct users to sites 
specifically hosting malware, and worse. Web security can detect when an
 XSS is attempted and protect users from the effects.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;b&gt;3.Typo-squatters&lt;/b&gt;&lt;br /&gt;
 It’s common for people to register domains that are either misspelled, 
or simple one-offs from other sites to try to get traffic from users’ 
typos. Sometimes these sites simply have aggressive sales content; other
 times they are set up to look like the real site to fool users. Either 
way, web security can prevent this all too common mistake from doing 
damage.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;b&gt;4.Phishing sites&lt;/b&gt;&lt;br /&gt; Phishing emails almost always include
 links to sites, where the real damage can be done. Web security can 
block access to these phishing sites.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;b&gt;5.Adult content&lt;/b&gt;&lt;br /&gt; The last
 thing you need is an HR issue to deal with because someone clicked the 
wrong link in some search results. Web security can enforce the 
acceptable use policy, preventing both the intentional and accidental 
violations from occurring.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;b&gt;6.Controversial content&lt;/b&gt;&lt;br /&gt; Adult 
content is not the only risk; political and religious sites may not be 
appropriate for users to access while at work and web security can 
ensure that Internet access is business appropriate.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;b&gt;7.Time sinks&lt;/b&gt;&lt;br /&gt;
 If you have ever surfed the web, you have probably experienced the time
 loss that comes from a planned 30 second check-in that becomes a 30 
minute catch up with what else is going on. “Just one more click…” can 
cost your company hours of lost productivity. Web security doesn’t have 
to block all personal Internet access; it can permit that within 
reasonable time limits.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;b&gt;8.Bandwidth hogs&lt;/b&gt;&lt;br /&gt; One Internet audio 
stream may seem like it uses an insignificant amount of bandwidth, but 
with everyone streaming music, your pipe can quickly become clogged. Web
 security can monitor and identify the major bandwidth users, or block 
access to streaming media completely to save that bandwidth for 
important things, like customer orders.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;b&gt;9.Copyright violations&lt;/b&gt;&lt;br /&gt;
 If a user downloads a pirated movie from your network, you could face 
liability. Web security can block access to these download sites, and 
block torrents and peer-to-peer sharing so you don’t worry about C&amp;amp;D
 letters or lawsuits.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
With strong web security protection 
technology in place, you protect your users, your infrastructure, your 
data and, ultimately, your company. Look at web security as a critical 
component of your information security strategy.&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;This post was provided by Casper Manes on behalf of GFI Software Ltd.&lt;/span&gt;</content><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/7848956677279383482'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/6012758317847145877/posts/default/7848956677279383482'/><link rel='alternate' type='text/html' href='https://ajcborges.blogspot.com/2012/02/9-reasons-to-enforce-web-security.html' title='9 Reasons to Enforce Web Security within the Organization'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/08298128264948784456</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><georss:featurename>Melbourne VIC, Australia</georss:featurename><georss:point>-37.8131869 144.9629796</georss:point><georss:box>-37.8382669 144.92349760000002 -37.788106899999995 145.0024616</georss:box></entry></feed>