<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-9042932955176110817</atom:id><lastBuildDate>Sat, 07 Jun 2025 04:53:17 +0000</lastBuildDate><category>Security Times</category><category>Pen Testing And Exploit Research</category><category>PRODUCT REVIEWS GADGETS AND PRICES</category><category>WINDOWS HACKING TRIKS</category><category>ORKUT TRIKS</category><category>GAMES</category><category>Virus and Malware</category><category>WEBSITE HACKING AND PREVENTION</category><category>CELLPHONE HACKING TIPS AND TRIKS</category><category>Cyber Security</category><category>FACEBOOK TRIKS AND HACKS</category><category>REGISTRY TRIKS</category><category>DOWNLOAD WORLD</category><category>Vulnerabilities</category><category>E-MAIL HACKING</category><category>Scam</category><category>VIRUS MAKING</category><category>Data Breech</category><category>MOBILE SECURITY</category><category>Telecommunication</category><category>Anonymous</category><category>Blogger Tricks</category><category>Cyber Crime</category><category>DEFEAT BLACK HAT</category><category>Data Breach</category><category>ETHICAL HACKING</category><category>Facebook</category><category>GOOGLE PLUS TRICKS AND HACKS</category><category>Ransomware</category><category>Trojan</category><category>Fraud</category><category>GAME CHEATS AND HACKS</category><category>NOTEPAD TRIKS</category><category>android</category><category>Android Network Toolkit</category><category>Anonymity</category><category>CRACKING</category><category>DARPA</category><category>GREAT HACKING</category><category>Google Dorks</category><category>Google Hacking</category><category>HACKING E BOOKS</category><category>Hack Into System</category><category>Hash Cracking</category><category>International Atomic Energy Agency (IAEA)</category><category>Password Cracking</category><category>Smartphone Penetration testing tool</category><category>Windows 8</category><category>Wireless Hacking And Security</category><category>000 Christmas Gift Cards Scam</category><category>419s</category><category>ACTIVATER</category><category>ATM Security</category><category>ATM Skimmers</category><category>Android Hack Tools and app</category><category>Anonymous Hacks DEBKA.com</category><category>Anonymous Social Networking</category><category>Anti</category><category>Apple Maps</category><category>Atlassian Crowd</category><category>Audio Jack Hacking</category><category>Australian Power And Gas</category><category>Autonomous Robots</category><category>BIOS PASSWORD CRACK</category><category>BLUETOOTH HACKING</category><category>Backdoor</category><category>Bitcoin Miner</category><category>Botnet</category><category>Browser Event Hijacking</category><category>Bypass Windows 8 Password</category><category>Carberp</category><category>Chen Guangcheng</category><category>China</category><category>Christmas Themed Facebook Scam</category><category>Coding</category><category>Computer Forensics</category><category>Creating a online Ransomware unlocker</category><category>Credit Card Hacking And Security</category><category>Cross Site Port Attacks</category><category>DEBKA.com</category><category>DYI</category><category>Dalai Lama</category><category>Defacement</category><category>Diet spam</category><category>Dockster</category><category>Edward Snowden</category><category>Exforel</category><category>Exforel.A</category><category>FREE STUFF</category><category>Facebook News Reader App</category><category>Facebook and Walmart Offer $1</category><category>Fake Air Canada emails</category><category>Fake Antivirus</category><category>Fake Hotel</category><category>GOOGLE ADSENSE APPROVAL TRIKS</category><category>GPU Cluster</category><category>Gmail Phishing Scam</category><category>Google Webmaster Tools security breach</category><category>HACKING TOOLKIT 2011</category><category>HOW TO EXPLODE BLOG TRAFFIC</category><category>HOW TO INCREASE BLOG TRAFFIC</category><category>Hack Windows 8 To Get Free Games</category><category>Hacking tools</category><category>Hardware Hacking</category><category>Instagram</category><category>Instagram 3.1.2 For iOS</category><category>Instagram vulnerability</category><category>Install Google Play Android apps on Kindle Fire without root</category><category>Internet Explorer vulnerability</category><category>Internet Freedom</category><category>Joomla And WordPress Bulk Exploit</category><category>KEYLOGGER</category><category>Linux 3.10</category><category>MALCON</category><category>MD5 Hash</category><category>Mark Zuckerberg</category><category>Meebo Open-Redirect Vulnerability</category><category>Microsoft ERP hack</category><category>Microsoft Surface tablet</category><category>MyBB 1.6.9</category><category>MyBB Security Release</category><category>NSA</category><category>Necurs</category><category>No Email Day</category><category>Nokia Lumia 920</category><category>OSX/Dockster</category><category>PRISM</category><category>PSW.Win32.Tepfer.cqaj</category><category>Php</category><category>Police Ransomware</category><category>Privacy</category><category>Project  Ransomware Unlocker</category><category>Project mayhem 2012</category><category>ProjectWhiteFox</category><category>RapidFAX</category><category>SMS Spoofing</category><category>Samsung Location Spoofing</category><category>Security Predictions 2013</category><category>Security Training</category><category>Security Update</category><category>Sendrawpdu</category><category>Server</category><category>Sizzling Soul</category><category>Skynet Botnet</category><category>Source Code</category><category>Spying Software Found on Chinese Devices</category><category>State Of California Data Breach</category><category>Sweet Orange Exploit Kit</category><category>Synthetic Police</category><category>TOOLS</category><category>TR/Dldr.Kryptik.H</category><category>TROJ_REVETON.HM</category><category>Team GhostShell</category><category>Toolbox</category><category>Trojan Upclicker</category><category>Trojan-Spy.AndroidOS.Citmo</category><category>Trojan-Spy.Win32.Zbot.gtvm</category><category>Trojan.Lameshield</category><category>Tumblr Exploit</category><category>Twitter SMS-Spoofing Bug</category><category>U.S. is Spying on China</category><category>UDS:DangerousObject.Multi.Generic</category><category>Usb Cleaver</category><category>VPN</category><category>VirTool:WinNT</category><category>WINDOWS HACKING TRICKS</category><category>WORM_VOBFUS</category><category>WPA Cracker</category><category>Walmart Scam</category><category>Web Server Setup</category><category>Window Phone 8</category><category>Windows 8 Hacks</category><category>XSPA</category><category>Zero Day</category><category>dSploit</category><category>eFax</category><category>gyalwarinpoche.com</category><category>iPhone Hacks</category><category>kindle fire</category><category>owasp</category><category>root</category><category>ssrf</category><category>unface.me</category><title>INDIATRIKS</title><description>SECURITY MUSINGS &amp;amp; IN-DEPTH  INVESTIGATION</description><link>http://indiatriks.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>264</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-1548358902786804158</guid><pubDate>Mon, 01 Jul 2013 17:00:00 +0000</pubDate><atom:updated>2013-07-01T13:38:16.675-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android Hack Tools and app</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Usb Cleaver</category><title>Android Tool Designed to Steal Information from PCs</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYdc1pjbHRom5-TeISDNJWNjLJxw4V01EiK1tEaHZzgUZRXzeDuCToJAfA3MfkIejSmIrc-cDsZWDmbx4ajEG-rGLmh6h-rQsMKs5KwB16dWj1UwNt8IRzYqXgckst_gmEnzmv5dYkDUI/s108/usbcleaver.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYdc1pjbHRom5-TeISDNJWNjLJxw4V01EiK1tEaHZzgUZRXzeDuCToJAfA3MfkIejSmIrc-cDsZWDmbx4ajEG-rGLmh6h-rQsMKs5KwB16dWj1UwNt8IRzYqXgckst_gmEnzmv5dYkDUI/s200/usbcleaver.png&quot; width=&quot;183&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;Security researchers from F-Secure have managed to locate an interesting Android hack tool &lt;/span&gt;&lt;/span&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;identified as HackTool:Android/UsbCleaver.A, 
allows anyone to steal sensitive information from a PC by connecting an 
Android phone to it.&lt;br /&gt;
&lt;br /&gt;
The hacker must install an application called USB Cleaver on his/her 
Android device. Once executed, the app downloads additional files from a
 remote server.&lt;br /&gt;
&lt;br /&gt;
These files are actually various utilities designed to retrieve certain pieces of information from a Windows computer. &lt;br /&gt;
&lt;br /&gt;
When the Android device is connected to the Windows PC, it automatically
 starts collecting browser passwords, the Wi-Fi password and network 
information.&lt;br /&gt;
&lt;br /&gt;
The app allows the user to select what type of information should be 
harvested. The gathered information is copied into a folder from the 
Android device’s SD card. &lt;br /&gt;
&lt;br /&gt;
Fortunately, there’s a simple way for users to protect themselves 
against such hack tools. That’s because the app creates an autorun.inf 
file that triggers the automatic gathering of information.&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/07/android-tool-designed-to-steal.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjYdc1pjbHRom5-TeISDNJWNjLJxw4V01EiK1tEaHZzgUZRXzeDuCToJAfA3MfkIejSmIrc-cDsZWDmbx4ajEG-rGLmh6h-rQsMKs5KwB16dWj1UwNt8IRzYqXgckst_gmEnzmv5dYkDUI/s72-c/usbcleaver.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-7869869272093539658</guid><pubDate>Mon, 01 Jul 2013 08:30:00 +0000</pubDate><atom:updated>2013-07-01T13:16:01.123-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Linux 3.10</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><title>Linux 3.10 Is Out With a New Method of SSD Caching </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibjdX25XmcBN6bs8EYoHpSnfg-CR4w20hwb_xpFTyrp9uFQ_E8p_c5E4PCDe4RuC4BXnzkSCRHaAOV1zUbpcKMn-hya88Zd_7alhCxAwrPhACeIe2x20URt5LSS1sbafoFhy4YpwPZ43c/s160/Linux+3.10.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibjdX25XmcBN6bs8EYoHpSnfg-CR4w20hwb_xpFTyrp9uFQ_E8p_c5E4PCDe4RuC4BXnzkSCRHaAOV1zUbpcKMn-hya88Zd_7alhCxAwrPhACeIe2x20URt5LSS1sbafoFhy4YpwPZ43c/s320/Linux+3.10.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Linux 3.10 was released by Linus Torvalds last night, bringing with it a new method of SSD caching and some upgrades to the Radeon graphics driver.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The two most significant changes in Linux 3.10 are the aforementioned
 SSD caching &quot;and support for the newer Radeon graphics cores&#39; video 
decoder,&quot; Leemhuis wrote. &quot;The Radeon driver in the Linux kernel now 
offers interfaces for interacting with the Unified Video Decoder on 
Radeon HD 4000 and later HD graphics cards. An open source UVD driver 
which uses this interface will be included in the next major revision to
 Mesa 3D (version 9.2 or 10.0). The
 kernel now supports the graphics chip on the recently released Richland
 processor family, otherwise known as A4, A6, A8, and A10 series APUs. 
Linux can also now address Radeon Hainan GPUs.&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Other changes allow newer Intel GPUs to be overclocked. Systems with Intel GPUs can also now wake from standby faster.&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/07/linux-310-is-out-with-new-method-of-ssd.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibjdX25XmcBN6bs8EYoHpSnfg-CR4w20hwb_xpFTyrp9uFQ_E8p_c5E4PCDe4RuC4BXnzkSCRHaAOV1zUbpcKMn-hya88Zd_7alhCxAwrPhACeIe2x20URt5LSS1sbafoFhy4YpwPZ43c/s72-c/Linux+3.10.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-7066532683417761450</guid><pubDate>Sun, 30 Jun 2013 19:16:00 +0000</pubDate><atom:updated>2013-07-01T12:21:26.287-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Atlassian Crowd</category><category domain="http://www.blogger.com/atom/ns#">Backdoor</category><category domain="http://www.blogger.com/atom/ns#">Pen Testing And Exploit Research</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Virus and Malware</category><title>Beware of Unpatched Backdoor in Atlassian Crowd Authentication Service</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRozI2v9cMQoxt42E1u_f9CLABr93Cct0gBfn7ocZ62XjVDU4thKPKm9s42CfGNEoe5WUg9FstN00fpiz9zB-60BKGcrolNkGP_oETzR3M5b7q2OOQI_m_rmWreimaWvFBengl2mSBM20/s76/Atlassian+Crowd+Authentication+Service.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRozI2v9cMQoxt42E1u_f9CLABr93Cct0gBfn7ocZ62XjVDU4thKPKm9s42CfGNEoe5WUg9FstN00fpiz9zB-60BKGcrolNkGP_oETzR3M5b7q2OOQI_m_rmWreimaWvFBengl2mSBM20/s200/Atlassian+Crowd+Authentication+Service.jpeg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Over 25,000 companies from all over the world rely on Atlassian’s 
solutions, including organizations from the automotive, consulting, 
education, engineering, entertainment, government, health and other 
industries.
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;According to the advisory
 published by Command Five, Crowd users should update their 
installations as soon as possible because an exploit for a vulnerability
 discovered in 2012 has become widely available.
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The security hole can be leveraged by an attacker to retrieve data and 
files from the Crowd server by crafting entity URLs. In addition, the 
flaw can be leveraged for denial-of-service (DOS) attacks.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;“If a hacker uses the vulnerability to retrieve a file containing 
credentials, they can then authenticate with the Crowd	 server directly,
 or use the exploit again to bypass trusted proxy/remote address 
validation as described above,” the advisory reads.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
“Successful exploitation of this vulnerability can (but does not 
necessarily) lead to a hacker taking full control of an organization 
single sign­ on service, potentially resulting in a catastrophic security
 event. Regardless, successful exploitation is likely to enable high 
velocity lateral movement within the targeted organization,” researchers
 explain.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;However, the patched vulnerability is not the main concern. Command Five
 says there is at least one critical vulnerability in Crowd that hasn’t 
been patched.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The flaw can be exploited by an unauthenticated remote attacker to take full control of any Crowd server they can connect to.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;
Cyber criminals can compromise application credentials, user credentials,
 data storage, configured directories and dependent secure systems.&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/06/beware-of-unpatched-backdoor-in.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRozI2v9cMQoxt42E1u_f9CLABr93Cct0gBfn7ocZ62XjVDU4thKPKm9s42CfGNEoe5WUg9FstN00fpiz9zB-60BKGcrolNkGP_oETzR3M5b7q2OOQI_m_rmWreimaWvFBengl2mSBM20/s72-c/Atlassian+Crowd+Authentication+Service.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-2756470371874502843</guid><pubDate>Sun, 30 Jun 2013 09:30:00 +0000</pubDate><atom:updated>2013-07-01T12:45:04.543-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Diet spam</category><category domain="http://www.blogger.com/atom/ns#">Instagram</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><title>Diet spam campaign have moved to Instagram</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNMX5THAEKzvR8bp8rxwo8bHOOvLBvyOQYxiDEbcx1NQzxhE8aZ8ww5kUwuDcd_H3HFxTSIAPaP5vH5jc4YZredP5tXgw3Umg207scnVYD-CxEaL64XM_Q8TxwGkSfZ7N2xfsdQgYBF2o/s259/Instagram.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNMX5THAEKzvR8bp8rxwo8bHOOvLBvyOQYxiDEbcx1NQzxhE8aZ8ww5kUwuDcd_H3HFxTSIAPaP5vH5jc4YZredP5tXgw3Umg207scnVYD-CxEaL64XM_Q8TxwGkSfZ7N2xfsdQgYBF2o/s259/Instagram.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The messages that make the rounds on Instagram show pictures of fruit. 
The pictures are accompanied by a bogus BBC News message which promotes 
an “exclusive offer” for a fruit diet.

&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;In some cases, the spammers continue to trick users by claiming that the diet has been recommended by Dr. Oz.
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt; Unfortunately, the Instagram spam run appears to be highly successful. One of the links has been clicked more than 35,000 times already.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;“Earlier today a small portion of our users experienced a spam 
incident where unwanted photos were posted from their accounts. Our 
security and spam team quickly took actions to secure the accounts 
involved, and the posted photos are being deleted,”&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Facebook, which owns
 Instagram, has told Gigaom.&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Instagram has started resetting the passwords of the impacted users.&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Security expert Janne Ahlberg has been closely monitoring
 the evolution of the miracle diet spam campaign. Over the weekend, he 
reported that spam messages were spotted not only on Twitter, but on 
Facebook, Tumblr and Pinterest as well.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/06/diet-spam-campaign-have-moved-to.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNMX5THAEKzvR8bp8rxwo8bHOOvLBvyOQYxiDEbcx1NQzxhE8aZ8ww5kUwuDcd_H3HFxTSIAPaP5vH5jc4YZredP5tXgw3Umg207scnVYD-CxEaL64XM_Q8TxwGkSfZ7N2xfsdQgYBF2o/s72-c/Instagram.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-3994415274850583968</guid><pubDate>Mon, 24 Jun 2013 10:30:00 +0000</pubDate><atom:updated>2013-06-24T10:48:59.735-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Facebook News Reader App</category><category domain="http://www.blogger.com/atom/ns#">Mark Zuckerberg</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><title>Facebook Is Working On Mobile News App Reader</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh01aaDRE4nvs9p27J-3ctiZvNkgXoThHSCIwjCDFTR4-nKbnlXYLyq23F76QcBYJFAoLIzB9jB1m_InaPgkXEEekzZD-oVnPHIKhIpmwCjYCkYpYUCON87FE2rv1eCj3WRFN7NZTbXYQM/s1600/Facebook+News+Reader+App.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh01aaDRE4nvs9p27J-3ctiZvNkgXoThHSCIwjCDFTR4-nKbnlXYLyq23F76QcBYJFAoLIzB9jB1m_InaPgkXEEekzZD-oVnPHIKhIpmwCjYCkYpYUCON87FE2rv1eCj3WRFN7NZTbXYQM/s320/Facebook+News+Reader+App.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;According to the Wall&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Street Journal,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Facebook&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is working on&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;a service that&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;include&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;iPhone users&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;provides&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;news&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;The&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;business newspaper&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;relies on&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;unnamed&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;sources&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to come.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Organization itself&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;from&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Facebook&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Reader&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;news&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;would&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;bundling&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;both users and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;publishers&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;br /&gt;&lt;span class=&quot;hps&quot;&gt;&lt;/span&gt;&lt;span class=&quot;hps&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;&quot; id=&quot;result_box&quot; lang=&quot;en&quot;&gt;&lt;span class=&quot;hps&quot;&gt;Facebook would&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;already&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;more than a year&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;working on&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the service.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Reader&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;would&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;look like&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Flipboard&lt;/span&gt;&lt;span&gt;,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;app that&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;collects&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;news&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;based on&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;user preferences&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;The social network&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;refused to comment&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the Journal&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Facebook would&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;like to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;increase&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;with&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Reader&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Its attractiveness&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to advertisers&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in the mobile segment.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;hps&quot;&gt;According to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;anonymous&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;sources,&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Mark&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Zuckerberg&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;personally oversee&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the project&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;in contrast to&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;the development of other&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;services&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;is deliberately&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;taken the time&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to a&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;full-fledged&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;news service&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to make&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;it&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;as good as possible&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;to work&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;on&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;both&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;smartphone&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;and&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;tablet&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Reader&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Initially&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;targeted&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;at&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;Apple&#39;s iOS&lt;/span&gt; &lt;span class=&quot;hps&quot;&gt;as a platform&lt;/span&gt;&lt;span class=&quot;&quot;&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/06/facebook-is-working-on-mobile-news-app.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh01aaDRE4nvs9p27J-3ctiZvNkgXoThHSCIwjCDFTR4-nKbnlXYLyq23F76QcBYJFAoLIzB9jB1m_InaPgkXEEekzZD-oVnPHIKhIpmwCjYCkYpYUCON87FE2rv1eCj3WRFN7NZTbXYQM/s72-c/Facebook+News+Reader+App.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-4361903801888829590</guid><pubDate>Mon, 24 Jun 2013 09:00:00 +0000</pubDate><atom:updated>2013-06-24T10:39:35.486-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Chen Guangcheng</category><category domain="http://www.blogger.com/atom/ns#">China</category><category domain="http://www.blogger.com/atom/ns#">Cyber Crime</category><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Spying Software Found on Chinese Devices</category><title>Spying Software Found on Chinese Devices</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtCuIYXD5LokvEnpPDSCfvT2qZFoI4Jh8_9MvHte7k4CbcpSRJ9Q8FdeXPa2EAiErbeiKgzm8c52UrFf1FSOR9WnrtLkX2PzhW48lZx9wl_49AuAAy3RGqSfXi6GsAvK-MuGTQYZYjALE/s1600/Spying+Software.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;263&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtCuIYXD5LokvEnpPDSCfvT2qZFoI4Jh8_9MvHte7k4CbcpSRJ9Q8FdeXPa2EAiErbeiKgzm8c52UrFf1FSOR9WnrtLkX2PzhW48lZx9wl_49AuAAy3RGqSfXi6GsAvK-MuGTQYZYjALE/s320/Spying+Software.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;According to Reuters,
 several pieces of spying software have been identified on several 
devices owned by Chen, including an iPhone and an iPad he had received 
shortly after his arrival to the US from the wife of activist Bob Fu, 
the man who runs the Christian group called ChinaAid.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;After fleeing to the US last year in May, Chinese activist &lt;a href=&quot;http://en.wikipedia.org/wiki/Chen_Guangcheng&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Chen Guangcheng&lt;/a&gt;
 was given a fellowship at the New York University. Now that the period 
of his fellowship has come to an end, some interesting aspects of the 
story have come to light.&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
The presence of the spyware has been brought to light by NYU professor 
Jerome Cohen and another individual familiar with the incident.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
While some say that the devices were plagued with spy software right 
from the start, others point the finger at the NYU for installing the 
applications.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;

Among the spy applications, technicians found one that secretly turned 
the devices into a tracking system, and a password-protected program 
that uploaded data to a remote server.&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/06/spying-software-found-on-chinese-devices.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtCuIYXD5LokvEnpPDSCfvT2qZFoI4Jh8_9MvHte7k4CbcpSRJ9Q8FdeXPa2EAiErbeiKgzm8c52UrFf1FSOR9WnrtLkX2PzhW48lZx9wl_49AuAAy3RGqSfXi6GsAvK-MuGTQYZYjALE/s72-c/Spying+Software.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-1561321504316904356</guid><pubDate>Sun, 23 Jun 2013 18:00:00 +0000</pubDate><atom:updated>2013-06-23T12:50:21.386-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Anonymity</category><category domain="http://www.blogger.com/atom/ns#">Anonymous</category><category domain="http://www.blogger.com/atom/ns#">Anonymous Social Networking</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">unface.me</category><title>Anonymous Social Networking With Your Real Friends : Unface.Me</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjHiRlYjXLs76lD4PIO3-z0l5KlFbr79eL8IPvBIL_AZTY1cmGMpW5AvQkTxE6aEhksOpAZjR3qwqUka1oDpC3-FId9xMQA-xu8naQ90F_3YItzum-r8-Gckv5Eyzbrqx3ucMiJpSBfgg/s1600/unface.me.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;unface.me,Anonymous social networking&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjHiRlYjXLs76lD4PIO3-z0l5KlFbr79eL8IPvBIL_AZTY1cmGMpW5AvQkTxE6aEhksOpAZjR3qwqUka1oDpC3-FId9xMQA-xu8naQ90F_3YItzum-r8-Gckv5Eyzbrqx3ucMiJpSBfgg/s320/unface.me.jpeg&quot; title=&quot;Unface.me&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The world has changed, and it is important for us to face certain 
realities&lt;span style=&quot;font-size: large;&quot;&gt; i.e; &lt;/span&gt;there’s a greater reliance on technology&lt;span style=&quot;font-size: large;&quot;&gt;,&lt;/span&gt;this has led 
to significantly less face-to-face interactions&lt;span style=&quot;font-size: large;&quot;&gt;,&lt;/span&gt;even when such interactions occur, rarely are they wholly honest 
conversations&lt;span style=&quot;font-size: large;&quot;&gt; &lt;/span&gt;and this leaves most of us desperately resorting to 
the web to engage in anonymous discussion boards or to create alias 
Twitter accounts just to be heard.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj003NB9FIkBTm4JGAigU2Fc2m75_XNR2gZaq2rvd2q5ZgoRS-RKUFxV9KUK36UXXxsTGVGvqlvJjI9zQitqbUfxAIKSvB-2GoljPYRLNJlC5DbYMxuhD7DeRwiem2OrWP4Gt9oN_k6TnQ/s1600/unface-me.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj003NB9FIkBTm4JGAigU2Fc2m75_XNR2gZaq2rvd2q5ZgoRS-RKUFxV9KUK36UXXxsTGVGvqlvJjI9zQitqbUfxAIKSvB-2GoljPYRLNJlC5DbYMxuhD7DeRwiem2OrWP4Gt9oN_k6TnQ/s1600/unface-me.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The general idea behind unface.me: engage in anonymous and truthful 
discourse with people you already know. This is done by connecting your 
Facebook account to an unface.me alias (“AlterEgo”) that you create, and
 then interacting with other users from your current network of friends 
who also have AlterEgos.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;How can this be used toward forming better relationships? Well, for 
one thing, it will allow users to be completely honest about themselves.
 A lot of topics are difficult to talk about (such as one’s mental 
health) and have potential professional consequences (not getting hired 
because of a history of depression). Unface.me can give people this 
medium for expressing their emotions or thoughts honestly, without fear 
of people knowing their true identity.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;This anonymity also allows 
for the changing of personal behaviors and the development of overall 
empathy. As people learn sensitive things about their friends, they may 
become more socially aware of and self-identifying with the daily 
struggles of others, and thereby change their day-to-day behaviors or 
interactions with them. So, the result? Closer bonds with those around 
us.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;We don’t have to sacrifice honesty in the age of social media.
 If Dan Humphrey was able to pull off complete anonymity for five years 
and end up with a closer set of friends, why shouldn’t we?&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Try out&amp;nbsp;&lt;a href=&quot;http://en.unface.me/&quot;&gt;unface.me&lt;/a&gt;&amp;nbsp;for yourself.........!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/06/anonymous-social-networking-with-your.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjHiRlYjXLs76lD4PIO3-z0l5KlFbr79eL8IPvBIL_AZTY1cmGMpW5AvQkTxE6aEhksOpAZjR3qwqUka1oDpC3-FId9xMQA-xu8naQ90F_3YItzum-r8-Gckv5Eyzbrqx3ucMiJpSBfgg/s72-c/unface.me.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-2133279575575431509</guid><pubDate>Sun, 23 Jun 2013 05:30:00 +0000</pubDate><atom:updated>2013-06-23T12:13:15.605-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">DYI</category><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">FACEBOOK TRIKS AND HACKS</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><title>Facebook Issue May Have Leaked Your Email and Phone Number</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqheibRxMuy6LhqoEX8UvO0aNsxfwK1Mkokk1NlJOAH10vZ2nII3jl2jUlmwBX44j-38b4AosTftRPwjv_v9ZNxhyphenhyphenUdN6InePX93aXDO6mivHeXQI5WSNZw9zkcUFBUkUxNcTrGD3rzpI/s1600/DYI.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;DYI ,FACEBOOK,Facebook DYI,Facebook data breach &quot; border=&quot;0&quot; height=&quot;222&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqheibRxMuy6LhqoEX8UvO0aNsxfwK1Mkokk1NlJOAH10vZ2nII3jl2jUlmwBX44j-38b4AosTftRPwjv_v9ZNxhyphenhyphenUdN6InePX93aXDO6mivHeXQI5WSNZw9zkcUFBUkUxNcTrGD3rzpI/s400/DYI.JPG&quot; title=&quot;DYI &quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;Facebook just published a data breach notification on its security blog.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;You might not immediately notice that from the title of the article, 
which announces itself as an &quot;Important Message from Facebook&#39;s White 
Hat Program.&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&amp;nbsp;The cloud (bad pun intended) is that Facebook&#39;s systems made the fault possible in the first place.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;What Facebook seems to be admitting to, in Friday&#39;s breach notification message, is that it was careless with the aggregated data accumulated from contact list uploads.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;The problem, says Facebook, lay in its Download Your Information 
(DYI) feature, which exists so you can suck down everything you&#39;ve 
previously entrusted to the social networking giant.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&amp;nbsp;DYI improves availability, because it allows you to make your own off-site backup of everything you&#39;ve stored on Facebook. It improves transparency, because it acts as a record of everything you&#39;ve uploaded to Facebook over the years.But there was a bug in DYI, of the &lt;em&gt;data leakage/unauthorised disclosure&lt;/em&gt; sort.
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;Apparently, DYI was capable of letting you download &lt;em&gt;more&lt;/em&gt; than you&#39;d uploaded in the first place.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/06/facebook-issue-may-have-leaked-your.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqheibRxMuy6LhqoEX8UvO0aNsxfwK1Mkokk1NlJOAH10vZ2nII3jl2jUlmwBX44j-38b4AosTftRPwjv_v9ZNxhyphenhyphenUdN6InePX93aXDO6mivHeXQI5WSNZw9zkcUFBUkUxNcTrGD3rzpI/s72-c/DYI.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-1478653566146788362</guid><pubDate>Fri, 21 Jun 2013 18:50:00 +0000</pubDate><atom:updated>2013-06-23T11:53:13.042-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Security</category><category domain="http://www.blogger.com/atom/ns#">Edward Snowden</category><category domain="http://www.blogger.com/atom/ns#">NSA</category><category domain="http://www.blogger.com/atom/ns#">PRISM</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">U.S. is Spying on China</category><title>U.S. is Spying on China,Stealing ‘Millions’ of Texts : Edward Snowden </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9wAMYCIKbFqTpi5v0wOYT1wgvh4Sq72dSJhKwsdzV8gcNwtZBcjz_edvEWzUhE1h_LTTJfcecXpOdRbVUW2LRI4B26oT5O1zdCz4KfEYqMWGW_OMeBniTqRQ7TgE930xw_m_UwgaVi2A/s1600/edward-snowden.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Edward,Snowden,Edward Snowden,NSA contractor,NSA,PRISM&quot; border=&quot;0&quot; height=&quot;280&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9wAMYCIKbFqTpi5v0wOYT1wgvh4Sq72dSJhKwsdzV8gcNwtZBcjz_edvEWzUhE1h_LTTJfcecXpOdRbVUW2LRI4B26oT5O1zdCz4KfEYqMWGW_OMeBniTqRQ7TgE930xw_m_UwgaVi2A/s320/edward-snowden.JPG&quot; title=&quot;Edward Snowden &quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Former NSA contractor Edward Snowden revealed on Saturday that the U.S. is tapping into Chinese &lt;span style=&quot;font-family: inherit ! important; font-weight: inherit ! important; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;background-color: transparent; border-bottom: 1px solid rgb(31, 129, 229); font-family: inherit ! important; font-weight: inherit ! important; position: static;&quot;&gt;mobile &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;background-color: transparent; border-bottom: 1px solid rgb(31, 129, 229); font-family: inherit ! important; font-weight: inherit ! important; position: static;&quot;&gt;carriers&lt;/span&gt;&lt;/span&gt; to access customers’ text messages.
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;It’s not just a few messages, either. Snowden told the South China Morning Post that millions of Chinese text messages are being harvested by the U.S.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;“China should set up a national information security review commission as soon as possible,” Snowden told the paper.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Chinese &lt;span style=&quot;font-family: inherit ! important; font-weight: inherit ! important; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;font-family: inherit ! important; font-weight: inherit ! important; position: static;&quot;&gt;mobile &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;font-family: inherit ! important; font-weight: inherit ! important; position: static;&quot;&gt;users&lt;/span&gt;&lt;/span&gt;
 sent over 900 billion text messages in 2012, according to government 
statistics, so if Snowden’s claims are true, the United States’ 
surveillance isn’t too extensive in the grand scheme of things. (Chinese
 officials likely won’t see the situation in that light though.)&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The reveal will make an already rocky relationship between the U.S. 
and China even more tumultuous. President Obama and China’s new 
president Xi Jinping have already had several conversations about cybersecurity relations, and both leaders are also kicking off a series of regular talks between the two countries.&lt;/span&gt;&lt;br /&gt;
&lt;div id=&quot;r1PostCPBlock&quot; style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/06/us-is-spying-on-chinastealing-millions.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9wAMYCIKbFqTpi5v0wOYT1wgvh4Sq72dSJhKwsdzV8gcNwtZBcjz_edvEWzUhE1h_LTTJfcecXpOdRbVUW2LRI4B26oT5O1zdCz4KfEYqMWGW_OMeBniTqRQ7TgE930xw_m_UwgaVi2A/s72-c/edward-snowden.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-2245134733504089682</guid><pubDate>Thu, 20 Jun 2013 15:55:00 +0000</pubDate><atom:updated>2013-06-23T08:56:10.654-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">android</category><category domain="http://www.blogger.com/atom/ns#">CELLPHONE HACKING TIPS AND TRIKS</category><category domain="http://www.blogger.com/atom/ns#">MOBILE SECURITY</category><category domain="http://www.blogger.com/atom/ns#">Ransomware</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><title> Android Ransomware</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSim70tdx8D88c6wRKw3tn6l3zAxsFY3wBCdUhUo25a_pYRIeVWrzMAs7I3CIcSAFbINVD6-QnQjNR_K87rV_-1VqCTZbxsW_1zYTV8gkLZUF54yoNHbe4Cc_JWwjoRbiYNSBUQpIE_YQ/s1600/Android+Ransomware.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot; Android Phones Ransom,Ransom&quot; border=&quot;0&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSim70tdx8D88c6wRKw3tn6l3zAxsFY3wBCdUhUo25a_pYRIeVWrzMAs7I3CIcSAFbINVD6-QnQjNR_K87rV_-1VqCTZbxsW_1zYTV8gkLZUF54yoNHbe4Cc_JWwjoRbiYNSBUQpIE_YQ/s320/Android+Ransomware.jpeg&quot; title=&quot; Android Ransomware&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;These days, fake Antivirus programs that run under Windows look just as 
good as real, valid antivirus tools. They&#39;ll run a scan for free—a fast 
one, since there&#39;s no actual scanning going on. However, to remove the 
imaginary malware found by the scan, you&#39;ll have to pay up. In a recent 
blog post, Symantec researcher Joji Hamada reported that this type of 
malware has come to Android, and it&#39;s even more aggressive than the 
typical Windows fake antivirus. Symantec calls the malware sample 
featured in this post Android.Fakedefender, because it installs as a 
trial version calling itself Android Defender.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The typical Windows-based fake antivirus programs attempt to scare 
the user into paying for a registered version by displaying frightening 
scan results, hence the name scareware.
 They work hard to look just like a valid antivirus, to the point that 
some even offer tech support. It&#39;s not uncommon for victims to express 
outrage when a legitimate security product removes the fake one: &quot;Hey, 
that&#39;s my antivirus! I paid for that!&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;Porn Discovered :&lt;/strong&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;In what may be an attempt to 
discourage you from seeking help, the fake antivirus reports that it has
 detected malware attempting to steal pornographic content from the 
phone. How embarrassing! At this point, you can&#39;t delete the fake 
antivirus and can&#39;t launch any other apps. The only way to recover, 
short of a hard reset, is to purchase the full version. It&#39;s effectively
 holding your phone for ransom. Hamada didn&#39;t state whether paying the 
ransom actually unlocks the phone.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;F-Secure&#39;s Mikko Hypponen has gone on record stating that the biggest threat for Android users is losing your phone,
 not malware. Hamada begs to differ, pointing out that malware like this
 is really, really hard to remove once it gets a foothold. He advises 
running mobile security software to keep threats like this from 
installing in the first place.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2013/06/android-ransomware.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgSim70tdx8D88c6wRKw3tn6l3zAxsFY3wBCdUhUo25a_pYRIeVWrzMAs7I3CIcSAFbINVD6-QnQjNR_K87rV_-1VqCTZbxsW_1zYTV8gkLZUF54yoNHbe4Cc_JWwjoRbiYNSBUQpIE_YQ/s72-c/Android+Ransomware.jpeg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-3919756300768127119</guid><pubDate>Thu, 20 Dec 2012 02:30:00 +0000</pubDate><atom:updated>2012-12-19T22:26:52.907-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Pen Testing And Exploit Research</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Sweet Orange Exploit Kit</category><category domain="http://www.blogger.com/atom/ns#">Virus and Malware</category><title>Sweet Orange Exploit Kit</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Malware is a business; people make their living writing and distributing
 it. Exploit kits are an effective and streamlined methodology of 
distributing malware; they allow the Bad Guys to distribute payloads at a
 higher level than we have seen in the past. For this reason we&#39;ve seen 
exploit kits grow in popularity over the last few years.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh377M7SajmyjYiDqeSCDUe23i5A7omgz7aTC1Jx5Q3oXz9f16hoT1VpmQNTv3KG0xgzvvOaLX7BzcbtVcaLDC7zgSv80luzrzDizHZqb0tC7VDRqNYxb6t9RYVda9ZMcsEe1a7ochqI9Y/s1600/Sweet-Orange-Exploit+Kit.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Sweet Orange Exploit Kit &quot; border=&quot;0&quot; height=&quot;245&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh377M7SajmyjYiDqeSCDUe23i5A7omgz7aTC1Jx5Q3oXz9f16hoT1VpmQNTv3KG0xgzvvOaLX7BzcbtVcaLDC7zgSv80luzrzDizHZqb0tC7VDRqNYxb6t9RYVda9ZMcsEe1a7ochqI9Y/s400/Sweet-Orange-Exploit+Kit.jpg&quot; title=&quot;Sweet Orange Exploit Kit &quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;BlackHole is
 the most famous and the most utilized exploit kit these days, but that 
doesn’t mean there aren’t others that have the potential to compete with
 it. One of them is the Sweet Orange exploit kit, which is presumably 
capable of some impressive things.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt; &lt;span style=&quot;font-size: large;&quot;&gt;D&lt;/span&gt;evelopers of Sweet Orange boast that their 
creation has a small footprint, a high infection rate, and the ability 
to drive 150,000 unique daily visitors to a website.&lt;br /&gt;
&lt;br /&gt;
They claim that around 10% to 25% of those who land on the malicious 
website will be infected, meaning that at least 15,000 bots should be 
added to the botnet each day. &lt;br /&gt;
&lt;br /&gt;
So far, experts have managed to identify 45 different IP addresses and 
367 domains utilized by Sweet Orange, which makes the 150,000 unique 
daily visitors forecast sound valid.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;strong&gt;&lt;br /&gt;&amp;nbsp;
&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/sweet-orange-exploit-kit.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh377M7SajmyjYiDqeSCDUe23i5A7omgz7aTC1Jx5Q3oXz9f16hoT1VpmQNTv3KG0xgzvvOaLX7BzcbtVcaLDC7zgSv80luzrzDizHZqb0tC7VDRqNYxb6t9RYVda9ZMcsEe1a7ochqI9Y/s72-c/Sweet-Orange-Exploit+Kit.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-6442191722521217335</guid><pubDate>Sat, 15 Dec 2012 12:08:00 +0000</pubDate><atom:updated>2012-12-15T04:08:55.452-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">MyBB 1.6.9</category><category domain="http://www.blogger.com/atom/ns#">MyBB Security Release</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Security Update</category><title>MyBB Security Release</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;The SQL Injection vulnerability, which affected 
all MyBB versions, affected the post editing section. The second flaw 
allowed brute-force access because the CAPTCHA system was not effective.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjplnkKa0aVB4P7nAPhlnzfAkM-7wFCsIO8yiEyPx_6ARdGiOa0GY3PLkBh5it_lG1LNSA-VDCFS2Fh0HxW7_NKA6JfDuewBZTqcXre6fboi825Lfilr_T8B06hc1zO5U4JqdwxMVIBUOY/s1600/MyBB+Security+Release.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;MyBB Security Release&quot; border=&quot;0&quot; height=&quot;261&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjplnkKa0aVB4P7nAPhlnzfAkM-7wFCsIO8yiEyPx_6ARdGiOa0GY3PLkBh5it_lG1LNSA-VDCFS2Fh0HxW7_NKA6JfDuewBZTqcXre6fboi825Lfilr_T8B06hc1zO5U4JqdwxMVIBUOY/s400/MyBB+Security+Release.jpg&quot; title=&quot;MyBB Security Release&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;br /&gt;
An issue which prevented the editor from working in Firefox 16 and newer versions of the web browser has also been addressed. &lt;br /&gt;
&lt;br /&gt;
Users are advised to immediately update their installations, but not before backing up their forum files and databases. &lt;br /&gt;
&lt;br /&gt;
Those who identify similar vulnerabilities are advised to responsibly 
disclose them to the vendor via their contact page or via the Private 
Inquiries forum.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;
&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/mybb-security-release.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjplnkKa0aVB4P7nAPhlnzfAkM-7wFCsIO8yiEyPx_6ARdGiOa0GY3PLkBh5it_lG1LNSA-VDCFS2Fh0HxW7_NKA6JfDuewBZTqcXre6fboi825Lfilr_T8B06hc1zO5U4JqdwxMVIBUOY/s72-c/MyBB+Security+Release.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-6098283784555286442</guid><pubDate>Sat, 15 Dec 2012 05:04:00 +0000</pubDate><atom:updated>2012-12-14T21:04:39.238-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">000 Christmas Gift Cards Scam</category><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Facebook and Walmart Offer $1</category><category domain="http://www.blogger.com/atom/ns#">Scam</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Walmart Scam</category><title> Facebook and Walmart Offer $1,000 Christmas Gift Cards Scam</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;On Facebook &lt;/span&gt;&lt;/span&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;Some posts&lt;/span&gt;, claiming that the social 
media network has partnered up with Walmart and they’re giving away free
 $1,000 (764 Euro) gift cards.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaV0XR2b1QlXIq5IhZdLDDydIEUCesAybKGEPL6iHV7fHF6tmy83m5JGZiNoZa-tmTCINfVMWTgG8J-W3jrbmDTvGvm3CFvNOEix4JM2UqYCFklhniubAlaota7xjDZd_4F72XX6FjTmA/s1600/Facebook-and-Walmart-Offer-1-000-Christmas-Gift-Cards.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot; Facebook and Walmart Offer $1,000 Christmas Gift Cards Scam&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaV0XR2b1QlXIq5IhZdLDDydIEUCesAybKGEPL6iHV7fHF6tmy83m5JGZiNoZa-tmTCINfVMWTgG8J-W3jrbmDTvGvm3CFvNOEix4JM2UqYCFklhniubAlaota7xjDZd_4F72XX6FjTmA/s1600/Facebook-and-Walmart-Offer-1-000-Christmas-Gift-Cards.jpg&quot; title=&quot; Facebook and Walmart Offer $1,000 Christmas Gift Cards Scam&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;“Hey friends, I got a $1000 Gift Card from WALMART
 as a Christmas Gift! Get it right away! -&amp;gt; bil.ly,” the malicious 
Facebook posts read.&lt;br /&gt; &lt;br /&gt; &lt;span style=&quot;font-size: large;&quot;&gt;U&lt;/span&gt;sers who fall for it and click on the link are taken to a website
 where they’re presented with instructions on how to provide their &lt;span style=&quot;font-size: large;&quot;&gt;authentication tokens.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; Then they’re asked to install a bogus Walmart Facebook app and participate in all sorts of surveys.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;br /&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg210W5x-jTAOIapNOnHI5FnVcdh_VK3Wvu8Gr2Uir5q-9srmbP6vYQlDhfeQmkSbwef0mRaNX-Rc3mSYECudydxsZXRzrTaKnF2yac075AUNMRiTe1PJKZZLSBAnp1t5WgALIG7WMK5a0/s1600/my_local_walmart_scam_landingj.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img alt=&quot;Walmart Scam Landind Page&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg210W5x-jTAOIapNOnHI5FnVcdh_VK3Wvu8Gr2Uir5q-9srmbP6vYQlDhfeQmkSbwef0mRaNX-Rc3mSYECudydxsZXRzrTaKnF2yac075AUNMRiTe1PJKZZLSBAnp1t5WgALIG7WMK5a0/s1600/my_local_walmart_scam_landingj.jpg&quot; title=&quot; Facebook and Walmart Offer $1,000 Christmas Gift Cards Scam,Walmart Scam&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;br /&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;By doing what the scammers ask of you, you’re actually allowing them to
 post on your Facebook timeline. Furthermore, by participating in the 
surveys, you’re helping them make a profit.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;If you did make the mistake of installing the Facebook application, then
 you could be spamming the message to your friends. Clean up your 
newsfeed and profile to remove references to the scam. (click the “x” in
 the top right hand corner of the post).&amp;nbsp;&lt;/span&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/facebook-and-walmart-offer-1000.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaV0XR2b1QlXIq5IhZdLDDydIEUCesAybKGEPL6iHV7fHF6tmy83m5JGZiNoZa-tmTCINfVMWTgG8J-W3jrbmDTvGvm3CFvNOEix4JM2UqYCFklhniubAlaota7xjDZd_4F72XX6FjTmA/s72-c/Facebook-and-Walmart-Offer-1-000-Christmas-Gift-Cards.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-8595752520125434358</guid><pubDate>Fri, 14 Dec 2012 16:03:00 +0000</pubDate><atom:updated>2012-12-14T08:03:29.712-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Trojan Upclicker</category><category domain="http://www.blogger.com/atom/ns#">Virus and Malware</category><title>Trojan Upclicker: Using a Mouse To Evade Automated Analysis</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;We
came across another sample, called Trojan Upclicker, that went one step further:
using a mouse to evade automated analysis.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg41-0h4UQ4r7e5XoMOcK0HXXfLlYCt8iW6Ib1aC_qQVSFAM9KnM8OB3sk5LO6Zkiy3O9AZrwGqC_caXKAw9FwdU-6ewwCBN12Gsqyo2J07M-qbGxPo_VrMjPbciSMpdVig5w9BViZybSg/s1600/Upclicker.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Trojan Upclicker&quot; border=&quot;0&quot; height=&quot;148&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg41-0h4UQ4r7e5XoMOcK0HXXfLlYCt8iW6Ib1aC_qQVSFAM9KnM8OB3sk5LO6Zkiy3O9AZrwGqC_caXKAw9FwdU-6ewwCBN12Gsqyo2J07M-qbGxPo_VrMjPbciSMpdVig5w9BViZybSg/s400/Upclicker.png&quot; title=&quot;Trojan Upclicker&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;Per the code in Figure , the
function &lt;em&gt;SetWinodwsHookExA&lt;/em&gt; is called with 0Eh as a parameter. Per MSDN the parameter 0Eh is used to hook a mouse. Pointer fn is the pointer to the hooked procedure in the code.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;The Trojan analyzed by FireEye, Upclicker, is interesting because the 
malicious code is executed only after the user clicks the left mouse 
button and releases it.&lt;br /&gt;
Upclicker establishes malicious communication only when this particular action is performed.&lt;/span&gt; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Trojan Upclicker establishes malicious communication only when the left
mouse button is clicked and released. Since, in sandboxes, there is no 
mouse interaction, the malicious behavior of Upclicker remains dormant 
in a sandbox
environment. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;When the code runs, it waits 300,000 milliseconds, or five minutes, before executing the &lt;strong&gt;DecryptCode&lt;/strong&gt; subroutine. It then waits 20 minutes and executes the &lt;strong&gt;ModifyRegistry&lt;/strong&gt; subroutine. After executing the &lt;strong&gt;Network_main&lt;/strong&gt; subroutine, it waits another 20 minutes.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Automated threat analysis systems only spend a small amount of time on one file so they may not detect the code as malware.&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/trojan-upclicker-using-mouse-to-evade.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg41-0h4UQ4r7e5XoMOcK0HXXfLlYCt8iW6Ib1aC_qQVSFAM9KnM8OB3sk5LO6Zkiy3O9AZrwGqC_caXKAw9FwdU-6ewwCBN12Gsqyo2J07M-qbGxPo_VrMjPbciSMpdVig5w9BViZybSg/s72-c/Upclicker.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-5830619460556657858</guid><pubDate>Fri, 14 Dec 2012 15:46:00 +0000</pubDate><atom:updated>2012-12-14T07:46:11.996-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Carberp</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Trojan-Spy.AndroidOS.Citmo</category><category domain="http://www.blogger.com/atom/ns#">Virus and Malware</category><title> Carberp : Trojan-Spy.AndroidOS.Citmo</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZNgLZ-CsD0y5zJ-I1YMfoLrlxvVD0UD15JRc1oFw9cKpgeE5n88iNbu_WWss8GJ-YmA8yN7BgMzazkzmJ39Xsr2NKrg3qGJSPENsQim8MBBpCv6omlJQCFkiSj9MQx6ewTzjEYj2dsLE/s1600/Carberp-Trojan.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZNgLZ-CsD0y5zJ-I1YMfoLrlxvVD0UD15JRc1oFw9cKpgeE5n88iNbu_WWss8GJ-YmA8yN7BgMzazkzmJ39Xsr2NKrg3qGJSPENsQim8MBBpCv6omlJQCFkiSj9MQx6ewTzjEYj2dsLE/s1600/Carberp-Trojan.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;For a long time, only two families of such malware have been known: 
ZeuS-in-the-Mobile (ZitMo) and SpyEye-in-the-Mobile (SpitMo). ZitMo and 
SpitMo work together with their Windows ‘brothers’. Actually, without 
them, they would look like trivial SMS spy Trojans. It is necessary to 
mention that during the last two years such attacks have been observed 
only in some European countries like Spain, Italy, Germany, Poland and 
few others.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;In order to gain access to online banking 
accounts, the attackers need to get a hold not only of the victim’s 
username and password, but also of the mobile Transaction Authentication
 Number (mTAN) that’s used for two-factor authentication.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;But when the mobile version of Carberp Trojan appeared ,such attacks 
became real in Russia as well. There is no secret that online banking is
 becoming more and more popular in Russia; and banks are very active in 
promoting online banking with various authorization methods.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;

&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Carberp for Windows works in a similar way to the ZeuS Trojan. If a 
user tries to login into his online banking account using a machine 
infected by Carberp, the malware will modify the transaction so that 
user credentials are sent to a malicious server rather than a bank 
server.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;

&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;In addition to the login and password, cybercriminals still need 
mTANs in order to confirm any money transfer operation from a stolen 
account. That is why one of the Carberp modifications (we call it 
Trojan-Spy.Win32.Carberp.ugu and we&#39;ve added detection for it on 11th of
 December) alters the online banking web page on the fly, inviting the 
user to download and install an application which is allegedly necessary
 for logging into the system. And the user can get this link via SMS 
message by entering his phone number or by scanning a QR-code&lt;span style=&quot;font-size: large;&quot;&gt; .&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The CitMo Android Trojan works in almost the same way as ZitMo. It is
 able to hide particular SMS messages and resend them to the attacker&#39;s 
command server. Some versions of ZitMo resend SMS messages to particular
 cell phone numbers in addition to various web servers. Known versions 
of CitMo and the Windows module of Carberp 
(Trojan-Spy.Win32.Carberp.ugu) work only with the remote server 
‘bersta***.com’.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/carberp-trojan-spyandroidoscitmo.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZNgLZ-CsD0y5zJ-I1YMfoLrlxvVD0UD15JRc1oFw9cKpgeE5n88iNbu_WWss8GJ-YmA8yN7BgMzazkzmJ39Xsr2NKrg3qGJSPENsQim8MBBpCv6omlJQCFkiSj9MQx6ewTzjEYj2dsLE/s72-c/Carberp-Trojan.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-1441513873921202663</guid><pubDate>Thu, 13 Dec 2012 11:48:00 +0000</pubDate><atom:updated>2012-12-13T03:50:54.308-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Data Breach</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">State Of California Data Breach</category><title>California Department of Health Care Mistakenly Publishes Details of 14,000 People</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAFc4thzrkbbHCIQodVZHdm7Ntkla6km5TU865nDbrUG0uCn5mVtiHFWKpAYisFGfCCiVtX9pRbuxmC_OmgRXAiraOVNV1FP_4F5j8dlph83NJr_i5dFRlzJ1iQ_xb63boxNPOZT0kEtI/s1600/California-Department-of-Health-Care-Inadvertently-Exposes-Details-of-14-000-People.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;California Department of Health Care Mistakenly Publishes Details of 14,000 People&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAFc4thzrkbbHCIQodVZHdm7Ntkla6km5TU865nDbrUG0uCn5mVtiHFWKpAYisFGfCCiVtX9pRbuxmC_OmgRXAiraOVNV1FP_4F5j8dlph83NJr_i5dFRlzJ1iQ_xb63boxNPOZT0kEtI/s1600/California-Department-of-Health-Care-Inadvertently-Exposes-Details-of-14-000-People.png&quot; title=&quot;California Department of Health Care Mistakenly Publishes Details of 14,000 People&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;State of California has mistakenly published thousands of Social Security numbers on the Internet.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The list includes Medi-Cal providers in 25 California counties, 
including Amador, Calaveras, Colusa, Nevada, Placer, Sutter, Tuolumne 
and Yuba.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;T&lt;/span&gt;he information, belonging to Medi-Cal providers 
working for In-Home Supportive Services, had been posted on the Medi-Cal
 website for a period of nine days before someone noticed the error.&lt;br /&gt;
&lt;br /&gt;
Individuals from 25 countries are affected by the breach. Those impacted
 will be receiving notification letters and they’re being offered one 
year of free credit monitoring services. &lt;br /&gt;
&lt;br /&gt;
Additional measures are being deployed to avoid such incidents from occurring in the future.&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;The confidential information was available on the state&#39;s Medi-Cal 
website for anyone to see for a period of nine days, before the mistake 
was discovered and the numbers removed.&lt;/span&gt;Social Security numbers are a key ingredient for identity theft.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;This is the second time in the past 5 months when 
In-Home Supportive Services providers are affected by a data breach. 
Last time, a total of 750,000 people were exposed by a breach at the 
Department of Social Services.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/california-department-of-health-care.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAFc4thzrkbbHCIQodVZHdm7Ntkla6km5TU865nDbrUG0uCn5mVtiHFWKpAYisFGfCCiVtX9pRbuxmC_OmgRXAiraOVNV1FP_4F5j8dlph83NJr_i5dFRlzJ1iQ_xb63boxNPOZT0kEtI/s72-c/California-Department-of-Health-Care-Inadvertently-Exposes-Details-of-14-000-People.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-7293512386317655310</guid><pubDate>Wed, 12 Dec 2012 16:37:00 +0000</pubDate><atom:updated>2012-12-12T08:37:57.759-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet Explorer vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Vulnerabilities</category><title>Internet Explorer Can Track Your Mouse Cursor</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;article-title&quot; itemscope=&quot;&quot; itemtype=&quot;http://data-vocabulary.org/Breadcrumb&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Internet Explorer can track your mouse anywhere on the scree,even when you aren’t browsing&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1 class=&quot;article-title&quot; itemscope=&quot;&quot; itemtype=&quot;http://data-vocabulary.org/Breadcrumb&quot;&gt;
&lt;span style=&quot;font-weight: normal;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ9HoY1f-CZ0RJrLyos-K4fIYoF2yvtJam2NQDnPRl6BgruNJLvgy9voK5QRutgWTGfEMByOAH1HOT21_Q9YfZHQYU_iBD3BkrRU3s72pUH8TOtSXknp39HuT7Q0-UCPsZaTl5tbofhPo/s1600/Internet+Explorer+mouse+tracking+vulnerability.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Internet Explorer Data Leakage vulnerability&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ9HoY1f-CZ0RJrLyos-K4fIYoF2yvtJam2NQDnPRl6BgruNJLvgy9voK5QRutgWTGfEMByOAH1HOT21_Q9YfZHQYU_iBD3BkrRU3s72pUH8TOtSXknp39HuT7Q0-UCPsZaTl5tbofhPo/s1600/Internet+Explorer+mouse+tracking+vulnerability.jpg&quot; title=&quot;Internet Explorer Data Leakage vulnerability&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h1 class=&quot;article-title&quot; itemscope=&quot;&quot; itemtype=&quot;http://data-vocabulary.org/Breadcrumb&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp;&lt;span style=&quot;font-weight: normal;&quot;&gt;A new Internet Explorer vulnerability has been discovered that allows an
 attacker to track your mouse cursor anywhere on the screen, even if the
 browser is minimized. All supported versions of Microsoft’s browser are
 reportedly affected: IE6, IE7, IE8, IE9, and IE10.&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1 class=&quot;article-title&quot; itemscope=&quot;&quot; itemtype=&quot;http://data-vocabulary.org/Breadcrumb&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Explorer can track your mouse movements anywhere on the screen,&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;even if the Internet Explorer window is &lt;span style=&quot;font-size: large;&quot;&gt;minimized&lt;/span&gt;. The vulnerability is 
particularly troubling because it compromises the security of virtual 
keyboards and virtual keypads.. And Microsoft, which was informed of the massive 
potential security hole over two months ago, has no plans to fix it. 
Which means that as you explore the web, the web can explore you right 
back.&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1 class=&quot;article-title&quot; itemscope=&quot;&quot; itemtype=&quot;http://data-vocabulary.org/Breadcrumb&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Internet Explorer’s event model 
populates the global Event object with some attributes relating to mouse
 events, even in situations where it should not. Combined with the 
ability to trigger events manually using the fireEvent() method, this 
allows JavaScript in any webpage (or in any iframe within any webpage) 
to poll for the position of the mouse cursor anywhere on the screen and 
at any time—even when the tab containing the page is not active, or when
 the Internet Explorer window is unfocused or minimized. The fireEvent()
 method also exposes the status of the control, shift and alt keys.&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Affected properties of the Event object 
are altKey, altLeft, clientX, clientY, ctrlKey, ctrlLeft, offsetX, 
offsetY, screenX, screenY, shiftKey, shiftLeft, x and y.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;315&quot; src=&quot;http://www.youtube.com/embed/qxUa2VWnE8A&quot; width=&quot;420&quot;&gt;&lt;/iframe&gt;

&lt;h1 class=&quot;entry-title&quot;&gt;
 &lt;/h1&gt;
&lt;div style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;A demonstration of the security vulnerability may be seen here: &lt;strong&gt;&lt;a href=&quot;http://iedataleak.spider.io/demo&quot;&gt;iedataleak.spider.io/demo&lt;/a&gt;&lt;/strong&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;For the data to be useful, the attacker would have to know what website 
you are currently using. Given that it’s already being used by 
advertisers, however, this can’t be particularly hard to achieve. They 
can take note of where they place their malicious ads, and an attacker 
would of course know the layout of the malicious page they design, or 
the legitimate one they hijack for such a scheme. &lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/internet-explorer-can-track-your-mouse.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ9HoY1f-CZ0RJrLyos-K4fIYoF2yvtJam2NQDnPRl6BgruNJLvgy9voK5QRutgWTGfEMByOAH1HOT21_Q9YfZHQYU_iBD3BkrRU3s72pUH8TOtSXknp39HuT7Q0-UCPsZaTl5tbofhPo/s72-c/Internet+Explorer+mouse+tracking+vulnerability.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-2249669449907780726</guid><pubDate>Wed, 12 Dec 2012 07:18:00 +0000</pubDate><atom:updated>2012-12-11T23:18:37.696-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fake Antivirus</category><category domain="http://www.blogger.com/atom/ns#">Fraud</category><category domain="http://www.blogger.com/atom/ns#">Joomla And WordPress Bulk Exploit</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Virus and Malware</category><title>Joomla And WordPress Bulk Exploit serving Fake Antivirus Malware</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Many Joomla and some WordPress sites exploited and hosting IFRAMES pointing to bad places&lt;span style=&quot;font-size: large;&quot;&gt; :&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrhIhrr9uB4cMnymyUhyJZd-oWytFxwNHTLGIChsK1l4myNzFlHQcctTKDxtKzu_tbjrp-vR3qCYkVTULB-qvOPobszxBfJWcj_JhH1fQzlHXWdb_hGA85WUDo0l0UTiCmkcnKXRfV3cw/s1600/Fake+Antivirus+Malware.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Joomla And WordPress Bulk Exploit&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrhIhrr9uB4cMnymyUhyJZd-oWytFxwNHTLGIChsK1l4myNzFlHQcctTKDxtKzu_tbjrp-vR3qCYkVTULB-qvOPobszxBfJWcj_JhH1fQzlHXWdb_hGA85WUDo0l0UTiCmkcnKXRfV3cw/s1600/Fake+Antivirus+Malware.jpg&quot; title=&quot;Fake Antivirus&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
Fake antivirus threats display a fraudulent scanning result to intimidate users into “purchasing” the fake antivirus program.WordPress and Joomla exploits have existed for years, and cybercriminals
 have thus been exploiting them for a long time. Yet the situation may 
have gotten slightly more serious as of late, as there appears to be a 
bulk exploit tool being used in the wild, targeting sites running both 
popular content management systems, and having them serve up fake 
antivirus malware to visitors.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;T&lt;/span&gt;he biggest pain is around Joomla users, particularly with extensions 
which greatly increase the vulnerability footprint and the one thing 
helping WordPress is the really nice feature of 1-button upgrades (and 
upgrades which don&#39;t tend to break your website.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The IFRAMES seem to have rapidly changing FQDN&#39;s that it is using but 
the common element is /nightend.cgi?8. &amp;nbsp;Two of the bad IPs that seem to 
be frequent offenders are 78.157.192.72 and 108.174.52.38. &amp;nbsp;Ultimately 
it pulls FakeAV software to do it&#39;s badness.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;In other words, if you use WordPress or Joomla, get on the latest 
version as soon as possible. It’s unclear how widespread this attack is,
 but there is no excuse for using an insecure release of your content 
management system.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Make &lt;/span&gt;sure all your software is up-to-date and kept that way on a regular basis. &lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/joomla-and-wordpress-bulk-exploit.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgrhIhrr9uB4cMnymyUhyJZd-oWytFxwNHTLGIChsK1l4myNzFlHQcctTKDxtKzu_tbjrp-vR3qCYkVTULB-qvOPobszxBfJWcj_JhH1fQzlHXWdb_hGA85WUDo0l0UTiCmkcnKXRfV3cw/s72-c/Fake+Antivirus+Malware.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-401311063231690875</guid><pubDate>Wed, 12 Dec 2012 06:49:00 +0000</pubDate><atom:updated>2012-12-11T22:49:19.263-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gmail Phishing Scam</category><category domain="http://www.blogger.com/atom/ns#">Scam</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><title>Gmail Phishing Scam</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;Another phishing scam that relies on the 
old “account update” theme is currently making the rounds, attempting to
 trick Gmail users into handing over their usernames and passwords.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSW0YqToCOJW4GqKZzJCLdX-f2Q4GtLqvZxSxGtjR9hyq6hrSHL96YGyG29Uo56SG9EMY-2emulz5oMgZnxc0IJQeDsINnQJgLkEiNh1ptU6Tj9tjXFaFkIxu41ohyDX3ulgctGxpLrKA/s1600/Gmail-Phishing-Scam-Account-Update-for-Security-Purposes-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Gmail Phishing Scam&quot; border=&quot;0&quot; height=&quot;275&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSW0YqToCOJW4GqKZzJCLdX-f2Q4GtLqvZxSxGtjR9hyq6hrSHL96YGyG29Uo56SG9EMY-2emulz5oMgZnxc0IJQeDsINnQJgLkEiNh1ptU6Tj9tjXFaFkIxu41ohyDX3ulgctGxpLrKA/s640/Gmail-Phishing-Scam-Account-Update-for-Security-Purposes-2.jpg&quot; title=&quot;Gmail Phishing Scam,gmail login fake&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: xx-small;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Image credits:&lt;/b&gt; Hoax Slayer&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;users who click on the links contained in the email are taken to a site that almost perfectly replicates the Gmail sign-in page.&lt;br /&gt;
&lt;br /&gt;
Once they provide their usernames and passwords, victims are presented 
with a second phishing page on which they’re requested to enter their 
phone numbers, which are allegedly needed for verification purposes.&lt;br /&gt;
&lt;br /&gt;
In the final part of the scheme, users are asked to provide an alternate email address.&lt;br /&gt;
&lt;br /&gt;
Cybercriminals are leveraging the fact that it’s not difficult for 
internauts to click on a link and log in to their Gmail accounts. This 
is why it’s important for users to be suspicious of any notification 
that claims to come from Gmail, Facebook or any other popular website.&lt;br /&gt;&amp;nbsp;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;The message is not from Gmail and the claim that users will lose their 
accounts if they do not verify their information is a lie. The email is a
 phishing scam designed to steal login information for Gmail and other 
webmail accounts as well as trick victims into divulging their phone 
numbers to Internet criminals. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/gmail-phishing-scam.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSW0YqToCOJW4GqKZzJCLdX-f2Q4GtLqvZxSxGtjR9hyq6hrSHL96YGyG29Uo56SG9EMY-2emulz5oMgZnxc0IJQeDsINnQJgLkEiNh1ptU6Tj9tjXFaFkIxu41ohyDX3ulgctGxpLrKA/s72-c/Gmail-Phishing-Scam-Account-Update-for-Security-Purposes-2.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-2586550089479119409</guid><pubDate>Tue, 11 Dec 2012 19:30:00 +0000</pubDate><atom:updated>2012-12-11T11:30:06.079-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Australian Power And Gas</category><category domain="http://www.blogger.com/atom/ns#">Fraud</category><category domain="http://www.blogger.com/atom/ns#">Scam</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Virus and Malware</category><title>Beware Of Malware Receipt From Australian Power &amp; Gas </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 id=&quot;htitle&quot; style=&quot;letter-spacing: -2px; line-height: 34px; margin: 3px 0px 5px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Australian Power &amp;amp; Gas Payment Receipt&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;carry a piece of malware that’s disguised as a harmless-looking PDF file.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5BkNngnhbVGGKkkg7djVEwp6K8xYIM08HaC4fkxUZwgqD1Hw3G_8T3eYP-kCQU9qHXKL2S7PGPqbxJ4M-Skw4Wo4_oQ1b-YW_zMNmhCuwdICqicy-1zRXbL7r2gdVlKXsdOOnwWUVjoc/s1600/Australian-Power-Gas-Payment-Receipt-Malware-Alert.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;122&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5BkNngnhbVGGKkkg7djVEwp6K8xYIM08HaC4fkxUZwgqD1Hw3G_8T3eYP-kCQU9qHXKL2S7PGPqbxJ4M-Skw4Wo4_oQ1b-YW_zMNmhCuwdICqicy-1zRXbL7r2gdVlKXsdOOnwWUVjoc/s320/Australian-Power-Gas-Payment-Receipt-Malware-Alert.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;Australian users should beware of emails 
entitled “Approved Payment Receipt” that purport to come from the “team”
 at Australian Power &amp;amp; Gas.&lt;/span&gt;&lt;/span&gt;&lt;h1 id=&quot;htitle&quot; style=&quot;letter-spacing: -2px; line-height: 34px; margin: 3px 0px 5px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1 id=&quot;htitle&quot; style=&quot;letter-spacing: -2px; line-height: 34px; margin: 3px 0px 5px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;Example&lt;span style=&quot;color: red;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-size: large;&quot;&gt; :&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h1 id=&quot;htitle&quot; style=&quot;letter-spacing: -2px; line-height: 34px; margin: 3px 0px 5px;&quot;&gt;
&lt;br /&gt;&lt;/h1&gt;
&lt;i&gt;&lt;strong&gt;Subject: Approved Payment Receipt&lt;/strong&gt;&lt;/i&gt;
      &lt;i&gt;&lt;b&gt;&lt;br /&gt;
      Australian Power &amp;amp; Gas Payment Receipt&lt;br /&gt;
    Dear Customer, &lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;
    &lt;/b&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;We have recently received a credit card payment from you, for 
your Australian Power &amp;amp; Gas account. This payment has been 
successfully processed and receipt details are shown below in the 
attached file.&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;
    &lt;/b&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;Transaction Details&lt;br /&gt;
      Payment Time:	 Tue, 11 Dec 2012 07:43:54 +0900&lt;br /&gt;
      Reference One:	2404390362&lt;br /&gt;
      Reference Two:	01600833&lt;br /&gt;
      Payment Receipt Number : 	3530928186&lt;/b&gt;&lt;/i&gt;
    &lt;br /&gt;
&lt;i&gt;&lt;b&gt;
    &lt;/b&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;Note: This payment will appear on your credit card statement with the merchant reference `Australian Power &amp;amp; Gas`. &lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;
    &lt;/b&gt;&lt;/i&gt;&lt;i&gt;&lt;b&gt;Kind Regards, &lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;b&gt;
    The team at Australian Power &amp;amp; Gas&lt;/b&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;Australian Power &amp;amp; Gas representatives are aware of this spam campaign and they’ve even issued an &lt;a href=&quot;https://www.facebook.com/AustralianPowerGas/posts/361284550634877&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;alert on Facebook&lt;/a&gt; to warn their customers about it.&lt;/span&gt;&lt;span id=&quot;intelliTxt&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;The .zip file attachment harbours a malicious .exe file. Running the 
.exe file can install malware on the user&#39;s computer. If you receive one
 of these bogus emails, do not open any attachments or click on any 
links that it contains. &lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;b&gt; &lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/beware-of-malware-receipt-from.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg5BkNngnhbVGGKkkg7djVEwp6K8xYIM08HaC4fkxUZwgqD1Hw3G_8T3eYP-kCQU9qHXKL2S7PGPqbxJ4M-Skw4Wo4_oQ1b-YW_zMNmhCuwdICqicy-1zRXbL7r2gdVlKXsdOOnwWUVjoc/s72-c/Australian-Power-Gas-Payment-Receipt-Malware-Alert.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-4262321625666374318</guid><pubDate>Tue, 11 Dec 2012 16:00:00 +0000</pubDate><atom:updated>2012-12-11T10:41:28.028-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">GAME CHEATS AND HACKS</category><category domain="http://www.blogger.com/atom/ns#">Hack Windows 8 To Get Free Games</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Windows 8 Hacks</category><title>Hack Windows 8 To Get Free Games</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;A Nokia engineer who has previously pointed out security holes in 
Microsoft’s Windows 8 has now posted a detailed step-by-step explanation
 of how to hack Windows 8 games.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiET8TGIQO3bKEESIk4W0tPl-B-_mX9nJKT6QROwqxdy-yN81FYLh6khfGgzU8piwJIWg6NDPiRCi2TzxuD-hbr24QYj7vMVJxcOLVF6wiCPcJMG4o9Wy4DWfsmPD_SfLwre4EAPcuu7N8/s1600/Windows+8+hacking+to+get+free+games.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Hack Windows 8 To Get Free Games&quot; border=&quot;0&quot; height=&quot;223&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiET8TGIQO3bKEESIk4W0tPl-B-_mX9nJKT6QROwqxdy-yN81FYLh6khfGgzU8piwJIWg6NDPiRCi2TzxuD-hbr24QYj7vMVJxcOLVF6wiCPcJMG4o9Wy4DWfsmPD_SfLwre4EAPcuu7N8/s400/Windows+8+hacking+to+get+free+games.jpg&quot; title=&quot;Windows 8 hacking&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Unfortunately  &lt;a href=&quot;http://justinangel.net/HackingWindows8Games&quot; target=&quot;_blank&quot;&gt;his site&lt;/a&gt; is down now&lt;span style=&quot;font-size: large;&quot;&gt; :&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiZ-djuuZ-1ou4EIopxueGbWYATEoZKT2oBc3xlpDMzDdPFPzgE9jdGPAtLOAvR8nMas7NcVnx-AAfq4rbvWheZ7YEMdRqacVRk16PLGnfVhJboHGTOKtJZ_EjqDucyQmiD5gIS_Y3xAo/s1600/justinangel.net.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Hack Windows 8 To Get Free Games&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiZ-djuuZ-1ou4EIopxueGbWYATEoZKT2oBc3xlpDMzDdPFPzgE9jdGPAtLOAvR8nMas7NcVnx-AAfq4rbvWheZ7YEMdRqacVRk16PLGnfVhJboHGTOKtJZ_EjqDucyQmiD5gIS_Y3xAo/s320/justinangel.net.png&quot; title=&quot;Hack Windows 8 To Get Free Games&quot; width=&quot;260&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Angel shows how to hack Windows 8 in not one, not two, and not even 
three ways … but no less than five different ways, showing users how to:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;ol&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;get free in-app purchases by modifying encrypted IsoStore files&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;crack trial apps and get paid versions for free&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;remove in-app ads from free games&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;reduce the cost of in-game paid items&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;unlock paid levels by a script-injection techniques&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;wp-caption alignright&quot; id=&quot;attachment_587860&quot; style=&quot;width: 310px;&quot;&gt;
&lt;div class=&quot;wp-caption-text&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px; top: 3741px; word-spacing: 5px;&quot;&gt;#1: Compromising in-app&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px; top: 3948px; word-spacing: 4px;&quot;&gt;purchases by modifying IsoStore&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;span class=&quot;g&quot; style=&quot;top: 4284px;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 493px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;g&quot; style=&quot;top: 4284px;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 493px;&quot;&gt;The Win8 game&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 1496px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.greatwindowsapps.com/app/soulcraft&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Soulcraft&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2062px;&quot;&gt;is a&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 2303px; word-spacing: -2px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;https://play.google.com/store/apps/details?id=de.mobilebits.soulcraft&amp;amp;hl=en&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;top game on Android&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 3586px; word-spacing: -2px;&quot;&gt;and is&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4421px; word-spacing: -2px;&quot;&gt;subjectively one of best examples of its genre on&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4558px; word-spacing: -2px;&quot;&gt;Windows 8. It’s a basic RPG where you play an archangel&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4696px; word-spacing: -2px;&quot;&gt;battling the forces of evil in stylish 3D. You’ve got &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;a&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4833px; word-spacing: -2px;&quot;&gt;character, its got equipment and you pay with gold with&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4970px; word-spacing: -1px;&quot;&gt;gold to buy better equipment. The gold has to be&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5108px; word-spacing: -3px;&quot;&gt;purchased for real money using the &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;platform’s in-app &lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: -3px;&quot;&gt;purchase. For example on Android here &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;are the prices for&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 687px;&quot;&gt;gold:&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1198px; word-spacing: -2px;&quot;&gt;I’ve spent 20$+ on game gold for&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 2560px; top: 1198px; word-spacing: -3px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;https://play.google.com/store/apps/details?id=de.mobilebits.soulcraft&amp;amp;hl=en&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Soulcraft THD&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 3414px; top: 1198px; word-spacing: -1px;&quot;&gt;on my&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1336px; word-spacing: -2px;&quot;&gt;Google Nexus 7 so far. So I asked myself how does that&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1473px; word-spacing: -2px;&quot;&gt;game’s gold data gets stored on Windows 8, and whether&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1611px; word-spacing: -2px;&quot;&gt;or not we can change it.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1866px; word-spacing: -3px;&quot;&gt;Quick refresher from the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 2025px; top: 1866px; word-spacing: -5px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://justinangel.net/ReverseEngineerWin8Apps&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;previous article&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2977px; top: 1866px; word-spacing: -3px;&quot;&gt;all Windows 8&lt;/span&gt;apps are stored on your local HD at:&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;text_layer&quot; style=&quot;z-index: 2;&quot;&gt;
&lt;div class=&quot;ie_fix&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2004px; word-spacing: -2px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff0&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2259px; word-spacing: -8px;&quot;&gt;C:\Program &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;Files\Windows&lt;span class=&quot;l6&quot;&gt;Apps&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2514px; word-spacing: -2px;&quot;&gt;So for example all the assemblies for Soulcraft on&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2651px; word-spacing: -2px;&quot;&gt;Windows 8 will be stored at:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff0&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2907px;&quot;&gt;C:\Program&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3044px;&quot;&gt;Files\WindowsA&lt;span class=&quot;l6&quot;&gt;pps\MobileBit&lt;span class=&quot;l6&quot;&gt;sGmbH.SoulCraft_0.8.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3182px;&quot;&gt;5.3_neutral__n3knxnwpdbgdc&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3693px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3948px; word-spacing: -2px;&quot;&gt;Also, all IsoStore files are stored at:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff0&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4203px;&quot;&gt;C:\Users\&amp;lt;username&amp;gt;\AppData\Local\Packages\&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4458px; word-spacing: -2px;&quot;&gt;So on my machine Soulcraft’s IsoStore is at:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff0&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4714px;&quot;&gt;C:\Users\Justin\AppData\Local\Packages\MobileBits&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4851px;&quot;&gt;GmbH.SoulCraft_n3knxnwpdbgdc\LocalState&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4851px;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 805px; word-spacing: -2px;&quot;&gt;When opening up these files in Notepad we can see some&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 943px; word-spacing: -2px;&quot;&gt;of these files are encrypted while others are not.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1454px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1709px; word-spacing: -2px;&quot;&gt;So now the question becomes, can we decrypt the&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 493px; top: 1847px;&quot;&gt; AccountData.xml&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1583px; top: 1847px; word-spacing: -2px;&quot;&gt; file, edit the amount of gold our&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1984px; word-spacing: -2px;&quot;&gt;character has and simply run the game? Well, as it turns&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2121px; word-spacing: -3px;&quot;&gt;out the answer is &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;“Yes”. Normally encrypted files are bad&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2259px; word-spacing: -2px;&quot;&gt;news if you’re trying to tamper with apps. But we should&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2396px; word-spacing: -2px;&quot;&gt;remember this is all running on the local machine. We&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2533px; word-spacing: -2px;&quot;&gt;have the algorithm used for encryption, we have the hash&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2671px; word-spacing: -2px;&quot;&gt;key and we have the encrypted data. Once we have all of&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2808px; word-spacing: -2px;&quot;&gt;those it’s pretty simple to decrypt - anything.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3319px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3319px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;g&quot; style=&quot;top: 3575px;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px;&quot;&gt;Using&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 899px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://dotpeek.com/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;dotPeek&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1376px;&quot;&gt;/&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 1416px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://ilspy.net/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;ILSpy&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1736px;&quot;&gt;/&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 1737px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.telerik.com/products/decompiler.aspx&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;JustDecompile&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2658px; word-spacing: -2px;&quot;&gt;it’s possible to&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3712px; word-spacing: -2px;&quot;&gt;reverse engineer most of the Soulcraft source code and&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3850px; word-spacing: -1px;&quot;&gt;find out how the&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1497px; top: 3850px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt; &lt;/span&gt;AccountData.xml&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2587px; top: 3850px; word-spacing: -2px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt; &lt;/span&gt;gets stored and how to&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3987px; word-spacing: -2px;&quot;&gt;change it. Let’s assume we’ve done that and we know&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4124px; word-spacing: -3px;&quot;&gt;which classes and assemblies are used to decrypt, &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;edit&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4261px; word-spacing: -2px;&quot;&gt;and encrypt this XML file. We’ll start off by create a new&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4399px; word-spacing: -3px;&quot;&gt;Win8 app and reference the &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;appropriate DLLs from the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4536px; word-spacing: -4px;&quot;&gt;Soulcraft game.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5047px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;


&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;link_layer&quot; style=&quot;z-index: 4;&quot;&gt;
&lt;div class=&quot;ie_fix&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;image_layer&quot; style=&quot;z-index: 3;&quot;&gt;
&lt;div class=&quot;ie_fix&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;ff0&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: -3px;&quot;&gt;Next, since these assemblies read files from IsoStore &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;we’ll&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 687px; word-spacing: -2px;&quot;&gt;copy the encrypted game files to our own App2 &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;IsoStore.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1198px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1454px; word-spacing: -3px;&quot;&gt;Now we’ve staged a new &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;app with the proper &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;assemblies&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1591px; word-spacing: -3px;&quot;&gt;and populated IsoStore with &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;Soulcraft’s Data. The next&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1729px; word-spacing: -3px;&quot;&gt;step is to &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;reverse engineer the assemblies and figure out&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1866px; word-spacing: -2px;&quot;&gt;the correct calling order for methods. For example this&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2004px; word-spacing: -2px;&quot;&gt;code would load up AccountData.xml, edit the amount of&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2141px; word-spacing: -2px;&quot;&gt;gold and save it again.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2396px; word-spacing: -2px;&quot;&gt;Here’s the before and after of the XML file:&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2907px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3162px; word-spacing: -3px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff0&quot; style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff0&quot; style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3162px; word-spacing: -3px;&quot;&gt;Copying the file back to &lt;span class=&quot;w8&quot;&gt;&lt;/span&gt;Soulcraft’s IsoStore and starting&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3300px; word-spacing: -3px;&quot;&gt;Soulcraft we can see a &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;first level character with&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3437px; word-spacing: -1px;&quot;&gt;1,000,000 gold.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3948px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4203px; word-spacing: -2px;&quot;&gt;At this point some of you &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;must be thinking “so what? it’s&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4340px; word-spacing: -3px;&quot;&gt;fake game money”. True, but &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;this fake in-game money&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4478px; word-spacing: -2px;&quot;&gt;would be worth over a thousand dollar on Android and&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4615px; word-spacing: -2px;&quot;&gt;iOS. Without a secure storage location for game state, we&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4753px; word-spacing: -2px;&quot;&gt;can’t be surprised that 3rd party cracking will arise to&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4890px; word-spacing: -4px;&quot;&gt;make consumers avoid in-app &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;purchases.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff0&quot; style=&quot;text-align: left;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff0&quot; style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;ff0&quot; style=&quot;font-size: 177px;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px; top: 560px; word-spacing: 3px;&quot;&gt;#2: Cracking trial apps to paid&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 766px; word-spacing: -4px;&quot;&gt;versions for free&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1102px; word-spacing: -2px;&quot;&gt;One of the top revenue streams for Windows 8&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1239px; word-spacing: -2px;&quot;&gt;developers is by shipping paid apps. At the same time&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1377px; word-spacing: -2px;&quot;&gt;consumers tend to be loss averse and are afraid to “lose”&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1514px; word-spacing: -2px;&quot;&gt;money on apps. The solution to that &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;are Trial apps. Paid&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1652px; word-spacing: -2px;&quot;&gt;apps can offer a free version with limited functionality or&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1789px; word-spacing: -3px;&quot;&gt;on a time &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;limited basis. That works fine unless consumers&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1927px; word-spacing: -2px;&quot;&gt;attempt to manipulate this tentative status-quo by&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2064px; word-spacing: -2px;&quot;&gt;cracking trial apps. To emphasize the impact of this&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2202px; word-spacing: -2px;&quot;&gt;problem we can look at the Windows Phone ecosystem&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2339px;&quot;&gt;where&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 937px; top: 2339px; word-spacing: -2px;&quot;&gt;45% of paid apps offer trials&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2831px; top: 2339px;&quot;&gt;.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2850px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2850px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3105px; word-spacing: -2px;&quot;&gt;Let’s have a look at&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 1727px; top: 3105px; word-spacing: -5px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.greatwindowsapps.com/app/meteor-madness&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Meteor Madness&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2697px; top: 3105px; word-spacing: -2px;&quot;&gt;. It’s a cool arcade&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3242px; word-spacing: -3px;&quot;&gt;asteroid shooter game. Meteor madness costs 1.5$USD&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3380px; word-spacing: -3px;&quot;&gt;and offers a free trial with &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;limited functionality. It also&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3517px; word-spacing: -2px;&quot;&gt;happens to be&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 1414px; top: 3517px; word-spacing: -2px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.codeproject.com/Articles/480771/Meteor-Madness&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;open source&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2178px; top: 3517px; word-spacing: -2px;&quot;&gt;so you can go check that o&lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;ut&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3655px;&quot;&gt;too.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4166px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4421px; word-spacing: -2px;&quot;&gt;When downloading the app as a trial we can see that it&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4558px; word-spacing: -2px;&quot;&gt;offers the options to buy the game and &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;locks some game&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4696px; word-spacing: -2px;&quot;&gt;options. Note the “Buy now” rock at &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;the bottom left and&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4833px; word-spacing: -2px;&quot;&gt;the locked “Arcade” game rock on the top right.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4833px; word-spacing: -2px;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;
&lt;div class=&quot;text_layer&quot; style=&quot;z-index: 2;&quot;&gt;
&lt;div class=&quot;ie_fix&quot;&gt;
&amp;nbsp;
&lt;br /&gt;
&lt;div class=&quot;ff3&quot; style=&quot;font-size: 118px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 805px; word-spacing: -3px;&quot;&gt;In the previous section &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;we’ve seen there’s a fundamental&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 943px; word-spacing: -2px;&quot;&gt;problem when storing game data on Windows 8. Storing&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1080px; word-spacing: -3px;&quot;&gt;encrypted data locally, alongside with the &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;algorithm and&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1218px; word-spacing: -3px;&quot;&gt;the algorithm key/hash is a recipe &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;for security incidents.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1355px; word-spacing: -2px;&quot;&gt;One of the problems with allowing offline execution of&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1493px; word-spacing: -2px;&quot;&gt;trial apps is that it mandates the “&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2565px; top: 1493px; word-spacing: -3px;&quot;&gt;trial flag&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 3057px; top: 1493px; word-spacing: -1px;&quot;&gt;” to be stored&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1630px; word-spacing: -2px;&quot;&gt;locally. And as we’ve seen, if it’s stored locally, we can&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1768px; word-spacing: -2px;&quot;&gt;find it, read it and modify it.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2023px; word-spacing: -2px;&quot;&gt;Specifically the License for Windows 8 apps is stored in&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2160px; word-spacing: -3px;&quot;&gt;the following file:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2415px;&quot;&gt;C:\Windows\ServiceProfiles\LocalService\AppData\L&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2553px;&quot;&gt;ocal\Microsoft\WSLicense\tokens.dat&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;span class=&quot;a&quot; style=&quot;left: 2986px; top: 2553px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2808px; word-spacing: -2px;&quot;&gt;When we open this file up in Notepad we can find t&lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;he&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2946px; word-spacing: -3px;&quot;&gt;license for Meteor Madness and where it &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;says it’s a trial&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3083px;&quot;&gt;purchase.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3594px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3850px; word-spacing: -2px;&quot;&gt;Also, in the same file we can see there are other apps&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3987px; word-spacing: -3px;&quot;&gt;installed. Such as free apps, paid apps &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;and preinstalled&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4124px; word-spacing: -2px;&quot;&gt;apps. Here for example if the “&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2359px; top: 4124px;&quot;&gt;Full&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2568px; top: 4124px; word-spacing: -2px;&quot;&gt;” installation of Bing.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4635px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4890px; word-spacing: -3px;&quot;&gt;An educational WinForms app named&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 2784px; top: 4890px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.nsaneforums.com/topic/150140-updated-wsservice-tokens-extractor-v142-windows-8-application-store-crack/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;WSService_crk&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 3754px; top: 4890px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5028px; word-spacing: -2px;&quot;&gt;loads this file into memory, shows the License XMLs and&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5165px; word-spacing: -3px;&quot;&gt;modifies it as a &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;“Full Preinstalled” license. There’s a lot&lt;span style=&quot;font-size: large;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: -2px;&quot;&gt;going on here other then simply reading and modifying&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px; top: 687px;&quot;&gt;files.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 847px; top: 687px;&quot;&gt;WSService_crk&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1855px; top: 687px; word-spacing: 5px;&quot;&gt;has &lt;span class=&quot;l7&quot;&gt;to &lt;span class=&quot;w&quot; style=&quot;width: 32px;&quot;&gt;&lt;/span&gt;decrypt &lt;span class=&quot;l7&quot;&gt;the f&lt;span class=&quot;l6&quot;&gt;ile, &lt;span class=&quot;l7&quot;&gt;re-encrypt&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 825px; word-spacing: -2px;&quot;&gt;it and then store it. All of &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;that is documented with&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 962px;&quot;&gt;WSService_crk&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1539px; top: 962px; word-spacing: -2px;&quot;&gt;as it’s distributed with full source code.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1218px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1473px; word-spacing: -2px;&quot;&gt;When opening up&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1608px; top: 1473px;&quot;&gt;WSService_crk&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2616px; top: 1473px; word-spacing: -2px;&quot;&gt;on my machine shows&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1611px; word-spacing: -2px;&quot;&gt;the following list of installs apps.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2121px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2376px;&quot;&gt;WSService_crk&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;

&lt;span class=&quot;a&quot; style=&quot;left: 1539px; top: 2376px; word-spacing: -2px;&quot;&gt;can then show the current license and&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2514px; word-spacing: -2px;&quot;&gt;even modify it from a Trial to a &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;Full Preinstalled License.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3025px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3280px; word-spacing: -2px;&quot;&gt;When running Meteor Madness now we can see that it no&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3418px; word-spacing: -3px;&quot;&gt;longer has any trial app &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;functionality limitations.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;div class=&quot;ff0&quot; style=&quot;font-size: 177px;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px; top: 4194px; word-spacing: 3px;&quot;&gt;#3: Removing in-app ads from&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4399px; word-spacing: -3px;&quot;&gt;games by editing XAML files&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4735px; word-spacing: -3px;&quot;&gt;Another way developers monetize their apps is &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;through&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4873px; word-spacing: -3px;&quot;&gt;in-app advertising. Developers often take the path o&lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;f&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5010px; word-spacing: -2px;&quot;&gt;least resistance and it’s quite easy to add ads to your&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5148px; word-spacing: -3px;&quot;&gt;app. If apps are popular &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;and the viewcounts are racking&lt;span style=&quot;font-size: large;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: -2px;&quot;&gt;up it could become quite profitable. As a result&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 687px; word-spacing: -2px;&quot;&gt;consumers don’t have to pay for some great titles and&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 825px; word-spacing: -3px;&quot;&gt;successful developers can get paid. That all &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;works pretty&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 962px; word-spacing: -2px;&quot;&gt;well unless opportunistic consumers choose to keep the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1100px; word-spacing: -2px;&quot;&gt;free app but disable ads. To emphasize the importance of&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1237px; word-spacing: -2px;&quot;&gt;mobile app ads let’s mention that some&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 2922px; top: 1237px; word-spacing: -2px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.kpcb.com/insights/2012-internet-trends-update&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;3rd party&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 531px; top: 1375px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.kpcb.com/insights/2012-internet-trends-update&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;estimates&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1149px; top: 1375px; word-spacing: -2px;&quot;&gt;put the field at over 10B in &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;overall yearly&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px; top: 1512px;&quot;&gt;revenue.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2023px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2278px; word-spacing: -3px;&quot;&gt;One app that is &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;now (surprisingly) advertising supported&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2415px; word-spacing: -3px;&quot;&gt;on Windows 8 &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;is Microsoft’s Minesweeper.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2926px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3182px; word-spacing: -3px;&quot;&gt;As we’ve seen previously the executable of &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;all Windows 8&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3319px; word-spacing: -3px;&quot;&gt;apps can be located &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;easily. Minesweeper is installed&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3457px; word-spacing: -2px;&quot;&gt;locally at:&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3712px;&quot;&gt;C:\Program&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3850px;&quot;&gt;Files\WindowsA&lt;span class=&quot;l6&quot;&gt;pps\Microsoft.M&lt;span class=&quot;l6&quot;&gt;icrosoftMinesweepe&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3987px;&quot;&gt;r_1.1.0.0_x86__8wekyb3d8bbwe&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4242px; word-spacing: -2px;&quot;&gt;In that folder we can find the file&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2500px; top: 4242px;&quot;&gt;MainPageAd.xaml&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4379px; word-spacing: -2px;&quot;&gt;under the&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1145px; top: 4379px;&quot;&gt;\Common\AdsModule\View&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;

&lt;span class=&quot;a&quot; style=&quot;left: 2761px; top: 4379px; word-spacing: -5px;&quot;&gt;folder. Alongside&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4517px; word-spacing: -3px;&quot;&gt;with other in-app ads used &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;by Minesweeper.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;ff3&quot; style=&quot;font-size: 118px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: -2px;&quot;&gt;We can make this ad disappear by simply adding the&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 687px;&quot;&gt;Visibility=”Collapsed”&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;

&lt;span class=&quot;a&quot; style=&quot;left: 1862px; top: 687px; word-spacing: -3px;&quot;&gt;property to the &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;aforementioned&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 825px; word-spacing: -2px;&quot;&gt;root user control.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1336px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1591px; word-spacing: -3px;&quot;&gt;After we’ve made this small change, when &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;we run the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1729px; word-spacing: -2px;&quot;&gt;Minesweeper app we won’t be able to see the ad&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1866px;&quot;&gt;anymore.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2376px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2632px; word-spacing: -2px;&quot;&gt;By simply editing XAML files we can hide away in-apps&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2769px; word-spacing: -2px;&quot;&gt;ads from Windows 8 ads.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;div class=&quot;ff0&quot; style=&quot;font-size: 177px;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3290px; word-spacing: -3px;&quot;&gt;#4: Reducing the cost of in-game&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3496px; word-spacing: -3px;&quot;&gt;items by editing game data files&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;/span&gt;
&lt;div class=&quot;ff3&quot; style=&quot;font-size: 118px;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3832px; word-spacing: -2px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff3&quot; style=&quot;font-size: 118px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3832px; word-spacing: -2px;&quot;&gt;Most games out there are composed of two distinctive&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3970px; word-spacing: -2px;&quot;&gt;pieces: a game engine and game data files used by the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4107px; word-spacing: -2px;&quot;&gt;engine. For more on this dichotomy you can read this&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4245px; word-spacing: -4px;&quot;&gt;great article&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 1290px; top: 4245px; word-spacing: -3px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.aosabook.org/en/wesnoth.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Battle for Wesnoth&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2434px; top: 4245px; word-spacing: -3px;&quot;&gt;from the creative&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4382px; word-spacing: -2px;&quot;&gt;commons book&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 1430px; top: 4382px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.aosabook.org/en/index.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;The Architecture of Ope&lt;span class=&quot;l6&quot;&gt;n Source&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 531px; top: 4519px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://www.aosabook.org/en/index.html&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Applications&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1252px; top: 4519px; word-spacing: 2px;&quot;&gt;. Let’s look &lt;span class=&quot;l7&quot;&gt;at a &lt;span class=&quot;l6&quot;&gt;real wor&lt;span class=&quot;l6&quot;&gt;ld example &lt;span class=&quot;l7&quot;&gt;in the&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4656px; word-spacing: -2px;&quot;&gt;form of the windows 8 game&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 2258px; top: 4656px; word-spacing: -4px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://apps.microsoft.com/webpdp/en-US/app/ultraviolet-dawn/0fe7f555-c8ad-4d0d-915f-ca2459f9a327&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Ultraviolet Dawn&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 3242px; top: 4656px; word-spacing: -2px;&quot;&gt;. The game&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4794px; word-spacing: -2px;&quot;&gt;is my all time favouri&lt;span style=&quot;font-size: large;&quot;&gt;te ipa&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2630px; top: 4794px; word-spacing: -2px;&quot;&gt;d game is a cool 2D space&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4931px; word-spacing: -3px;&quot;&gt;shooter. Like other games players start-off with a certain&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5069px; word-spacing: -2px;&quot;&gt;amount of in-game currency and can buy items to&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: -4px;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt; &lt;/span&gt;improve their spaceship.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1061px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1316px; word-spacing: -2px;&quot;&gt;If we go back to the dichotomy we’ve heard about earlier&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1454px; word-spacing: -2px;&quot;&gt;then we can see how it applies to Ultraviolet Dawn.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 493px; top: 1591px;&quot;&gt;&amp;nbsp;There’s a ga&lt;span class=&quot;l6&quot;&gt;me engine that knows &lt;span class=&quot;l6&quot;&gt;about “store items”&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1729px; word-spacing: -2px;&quot;&gt;and there’s going to be a list somewhere of what they&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1866px; word-spacing: -2px;&quot;&gt;are. So one thing we could do is take advantage of&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2004px; word-spacing: -2px;&quot;&gt;Windows 8 on-disk storage and modify the game’s data&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2141px; word-spacing: -3px;&quot;&gt;files. As we’ve previously seen executables for windows 8&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2278px; word-spacing: -3px;&quot;&gt;apps can be located and modified. Specifically,&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2415px; word-spacing: -3px;&quot;&gt;Ultraviolet’s Dawn can be found here:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2671px;&quot;&gt;C:\Program&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2808px;&quot;&gt;Files\WindowsApps\8DF9EE77.UltravioletDawn_1.0.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2946px;&quot;&gt;0.37_x86__dd4ev9dvfndxm&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3201px; word-spacing: -2px;&quot;&gt;We can open up the “&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1818px; top: 3201px;&quot;&gt;res_store_items.txt&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;

&lt;span class=&quot;a&quot; style=&quot;left: 2946px; top: 3201px; word-spacing: -2px;&quot;&gt;” file and edit the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3339px; word-spacing: -2px;&quot;&gt;price of in-game items. In our example we’ll edit all the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3476px; word-spacing: -2px;&quot;&gt;weapons to be free.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3987px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4242px; word-spacing: -2px;&quot;&gt;When we run Ultraviolet Dawn again we can see the price&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4379px; word-spacing: -2px;&quot;&gt;of items in the store is now &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;0.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5069px; word-spacing: -2px;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2769px; word-spacing: -2px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5146px; word-spacing: -2px;&quot;&gt;We’ve just shown that using the simplest tools we can &lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: -2px;&quot;&gt;edit game files to compromise the experience of Windows&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 687px; word-spacing: -3px;&quot;&gt;8 games.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;div class=&quot;ff0&quot; style=&quot;font-size: 177px;&quot;&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px; top: 1209px; word-spacing: 5px;&quot;&gt;#5: Compromising In-app&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px; top: 1414px; word-spacing: 4px;&quot;&gt;purchase items by injecting&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1620px; word-spacing: -4px;&quot;&gt;scripts into the IE10 process&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1956px; word-spacing: -3px;&quot;&gt;Even though we’ve already shown that &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;in-app purchases&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2093px; word-spacing: -2px;&quot;&gt;are comprisable I’d like for us to see an example of that&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2231px; word-spacing: -2px;&quot;&gt;with Windows 8 HTML &amp;amp; JS apps. Up &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;until now we’ve seen&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2368px; word-spacing: -2px;&quot;&gt;examples of C# and C++ apps, so let’s see that with&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2506px; word-spacing: -2px;&quot;&gt;WinJS apps. Let’s have a look at the massively popular&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2643px; word-spacing: -3px;&quot;&gt;and successful WInJS Windows 8 game&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 2862px; top: 2643px; word-spacing: -1px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://apps.microsoft.com/webpdp/en-us/app/cut-the-rope/2d85eb97-3ee6-4aff-9618-3f6cdfd68291&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Cut the Rope&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 3636px; top: 2643px; word-spacing: -2px;&quot;&gt;. The&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2781px; word-spacing: -3px;&quot;&gt;game follows a freemium model where &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;the first few levels&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2918px; word-spacing: -2px;&quot;&gt;are free and additional levels cost 4.99$ to unlock.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3429px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3684px; word-spacing: -2px;&quot;&gt;As we know by now executables for Windows 8 games&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3822px; word-spacing: -2px;&quot;&gt;can be found on the local disk. Specifically&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 3084px; top: 3822px; word-spacing: -1px;&quot;&gt;Cut the Rope&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3959px; word-spacing: -3px;&quot;&gt;executeables can be found at:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff0&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4214px;&quot;&gt;C:\Program&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4352px;&quot;&gt;Files\WindowsA&lt;span class=&quot;l6&quot;&gt;pps\ZeptoLabUKLi&lt;span class=&quot;l6&quot;&gt;mited.CutTheRop&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4489px;&quot;&gt;e_1.1.0.9_neutral__sq9zxnwrk84pj&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;g&quot; style=&quot;top: 4745px;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; word-spacing: -2px;&quot;&gt;If we open up the&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;g&quot; style=&quot;top: 4745px;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1601px;&quot;&gt;default.js&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2185px; top: 4745px; word-spacing: -2px;&quot;&gt;file in the&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;span class=&quot;a&quot; style=&quot;left: 2740px; top: 4745px;&quot;&gt;&amp;nbsp;js&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2910px; top: 4745px; word-spacing: -3px;&quot;&gt;folder we can see&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4882px; word-spacing: -2px;&quot;&gt;the following code that obviously governs the in-app&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5020px; word-spacing: -3px;&quot;&gt;purchasing logic. We can see there &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;are&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5157px; word-spacing: -7px;&quot;&gt;IS_PAID_FULL_VERSION and &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;SIMULATE_PURCHASE&lt;span class=&quot;l6&quot;&gt;S&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;div class=&quot;ff3&quot; style=&quot;font-size: 118px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: 2px;&quot;&gt;variables &lt;span class=&quot;l6&quot;&gt;set to f&lt;span class=&quot;l6&quot;&gt;alse. &lt;span class=&quot;w&quot; style=&quot;width: 32px;&quot;&gt;&lt;/span&gt;One wonder &lt;span class=&quot;l8&quot;&gt;what happen&lt;span class=&quot;l6&quot;&gt;s if we&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 687px; word-spacing: -2px;&quot;&gt;change those values to true.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1198px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1454px; word-spacing: -2px;&quot;&gt;We don’t really have to understand the specifics but we&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1591px; word-spacing: -3px;&quot;&gt;can see there’s an&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1660px; letter-spacing: -1px; top: 1591px;&quot;&gt;if-else&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2053px; top: 1591px; word-spacing: -3px;&quot;&gt;condition that determines in-&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1729px; word-spacing: -3px;&quot;&gt;app purchases. We can’t directly change Javascript files&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1866px; word-spacing: -3px;&quot;&gt;as that’ll corrupt the Javascript package and &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;Windows 8&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2004px; word-spacing: -2px;&quot;&gt;will refuse to open the app. So instead of changing the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2141px; word-spacing: -2px;&quot;&gt;files on the local disk, we can inject JS scripts at runtime&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2278px; word-spacing: -2px;&quot;&gt;into IE10 process.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2533px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2789px; word-spacing: -3px;&quot;&gt;Visual Studio 2012 has &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;a built-in debugging mechanism&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2926px; word-spacing: -2px;&quot;&gt;for any installed Windows 8 app. Even if that wasn’t there&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3064px; word-spacing: -2px;&quot;&gt;we could still easily inject scripts to IE10, but since it &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;is&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3201px; word-spacing: -2px;&quot;&gt;there we can use that familiar tool. Let’s use VS2012 to&lt;/span&gt;&lt;span class=&quot;g&quot; style=&quot;top: 3339px;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px;&quot;&gt;“&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 592px; top: 3339px; word-spacing: -3px;&quot;&gt;Debug Installed App Package&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2321px; top: 3339px; word-spacing: -2px;&quot;&gt;”. (Here are the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 3247px; top: 3339px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://msdn.microsoft.com/en-us/library/windows/apps/hh771032.aspx&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;Jacascript&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;g&quot; style=&quot;top: 3476px;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 531px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://msdn.microsoft.com/en-us/library/windows/apps/hh771032.aspx&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;docs&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 804px;&quot;&gt;,&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;color: #0000e9; left: 879px; word-spacing: -2px;&quot;&gt;&lt;a class=&quot;ll&quot; href=&quot;http://msdn.microsoft.com/en-us/library/windows/apps/hh781607.aspx&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;C# docs and C++ docs&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2297px; word-spacing: -2px;&quot;&gt;to those unfamiliar with the&lt;/span&gt;&lt;/span&gt;
&lt;span class=&quot;a&quot; style=&quot;left: 531px; letter-spacing: -1px; top: 3614px;&quot;&gt;feature)&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4124px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4379px; word-spacing: -2px;&quot;&gt;Next we’ll choose to Debug&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2191px; top: 4379px; word-spacing: -2px;&quot;&gt;Cut The Rope.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 3065px; top: 4379px; word-spacing: -3px;&quot;&gt;Make sure to&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4517px; word-spacing: -2px;&quot;&gt;check the “Stop at first Statement” checkbox since we’ll&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4654px; word-spacing: -2px;&quot;&gt;use it to navigate to&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1759px; top: 4654px;&quot;&gt;default.js&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;div class=&quot;ff3&quot; style=&quot;font-size: 118px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: -2px;&quot;&gt;After we click start we can see we’re debugging the&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 3639px; top: 550px;&quot;&gt;Cut&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 687px; word-spacing: -1px;&quot;&gt;the Rope&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff3&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1101px; top: 687px; word-spacing: -2px;&quot;&gt;app. This is the important bit, we’ve now got t&lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;he&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 825px; word-spacing: -2px;&quot;&gt;full force of VS2012 Javascript runtime debugging in a&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 962px; word-spacing: -2px;&quot;&gt;Win8 store app. This first breakpoint will always be the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1100px; word-spacing: -2px;&quot;&gt;same file at the same row: the first row of the&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 3282px; letter-spacing: -1px; top: 1100px;&quot;&gt;base.js&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;

&lt;span class=&quot;a&quot; style=&quot;left: 3732px; letter-spacing: -1px; top: 1100px;&quot;&gt;file&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1237px; word-spacing: -3px;&quot;&gt;from the WinJS framework.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1748px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2004px; word-spacing: -2px;&quot;&gt;Using a smart combination of “Step over” and using the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2141px; word-spacing: -2px;&quot;&gt;Solution Explorer we can set the following breakpoint&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2278px; word-spacing: -3px;&quot;&gt;after setting the variables we’ve previously seen.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2533px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3044px; word-spacing: -2px;&quot;&gt;Stepping over this deceleration we can then see the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3182px; word-spacing: -3px;&quot;&gt;following values in our Locals window.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3693px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 3948px; word-spacing: -2px;&quot;&gt;And now using the Immediate Window we can execute&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4085px; word-spacing: -2px;&quot;&gt;any javascript we’d like. For the purpose of this demo&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4222px; word-spacing: -3px;&quot;&gt;we’ll set SIMULATE_PURCHASES=true. We could have&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4360px; word-spacing: -3px;&quot;&gt;saved some time by &lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;setting IS_PAID_FULL_VERSION=true,&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4497px; word-spacing: -2px;&quot;&gt;but I’d like for us to see t&lt;span class=&quot;w6&quot;&gt;&lt;/span&gt;his runtime behaviour.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;ff1&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4497px; word-spacing: -2px;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 550px; word-spacing: -2px;&quot;&gt;Now when we click the purchase button we can see&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 687px; word-spacing: -2px;&quot;&gt;Windows 8 in-app purchase simulator. We’ll tell it that the&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 825px; word-spacing: -5px;&quot;&gt;purchase was successful.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1336px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 1591px; word-spacing: -3px;&quot;&gt;And now we can &lt;span class=&quot;w7&quot;&gt;&lt;/span&gt;see all game levels are unlocked.&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2102px;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2357px; word-spacing: -2px;&quot;&gt;We’ve just shown how to inject arbitrary javascript into a&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2494px; word-spacing: -2px;&quot;&gt;Win8 store bought WinJS IE10 app and we’ve affected in-&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 2632px; word-spacing: -3px;&quot;&gt;app purchase items inventory.&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 1759px; top: 4654px;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span class=&quot;a&quot; style=&quot;left: 2305px; top: 4654px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4833px; word-spacing: -2px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 4890px; word-spacing: -4px;&quot;&gt;&lt;/span&gt;&lt;span class=&quot;a&quot; style=&quot;left: 531px; top: 5146px;&quot;&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/hack-windows-8-to-get-free-games.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiET8TGIQO3bKEESIk4W0tPl-B-_mX9nJKT6QROwqxdy-yN81FYLh6khfGgzU8piwJIWg6NDPiRCi2TzxuD-hbr24QYj7vMVJxcOLVF6wiCPcJMG4o9Wy4DWfsmPD_SfLwre4EAPcuu7N8/s72-c/Windows+8+hacking+to+get+free+games.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-6619628610660327212</guid><pubDate>Tue, 11 Dec 2012 12:58:00 +0000</pubDate><atom:updated>2012-12-11T04:58:36.847-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Meebo Open-Redirect Vulnerability</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Vulnerabilities</category><title>Open Redirect Vulnerability Identified in Meebo</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;An open-redirect vulnerability Identified in the popular instant messaging platform Meebo.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6dETxfYRTyAun5ZILj7OactqCNhy9FfE79rvGP3wZ3fSv-1RihVEhTKcP4p0ui8mUcuXXO9XcjWG0YyYpIxEiPUmSVXqgo5JfyFQ9FiJR3BXsAoleKg0sg0h4H8Y5rzM2PkA1aJ-nNVk/s1600/Meebo+Open+Redirect+Vulnerability.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6dETxfYRTyAun5ZILj7OactqCNhy9FfE79rvGP3wZ3fSv-1RihVEhTKcP4p0ui8mUcuXXO9XcjWG0YyYpIxEiPUmSVXqgo5JfyFQ9FiJR3BXsAoleKg0sg0h4H8Y5rzM2PkA1aJ-nNVk/s1600/Meebo+Open+Redirect+Vulnerability.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;intelliTxt&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;Open-redirect vulnerabilities can be leveraged by 
cybercriminals to lure their victims to arbitrary domains. The user 
believes that he/she is visiting a legitimate, reputable site, when 
they’re actually seamlessly redirected to a malicious one.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot; class=&quot;article_ad&quot; style=&quot;margin: 10px 0 10px 15px;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;ins style=&quot;border: none; display: inline-table; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 300px;&quot;&gt;&lt;ins id=&quot;aswift_1_anchor&quot; style=&quot;border: none; display: block; height: 250px; margin: 0; padding: 0; position: relative; visibility: visible; width: 300px;&quot;&gt;&lt;/ins&gt;&lt;/ins&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The security hole has been reported to Google, which &lt;a href=&quot;http://news.softpedia.com/news/Google-Just-Bought-Meebo-273718.shtml&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;bought Meebo&lt;/strong&gt;&lt;/a&gt;
 back in June, but the search giant’s security team told the expert that
 “the security benefits of a well-implemented and carefully monitored 
URL redirector tend to outweigh the perceived risks.”&lt;br /&gt;
&lt;br /&gt;
They’ve pointed him to the &lt;a href=&quot;http://www.google.com/about/appsecurity/reward-program/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;bug bounty page&lt;/a&gt; where they explain why such URL redirection vulnerabilities are not included in their reward program. &lt;br /&gt;
&lt;br /&gt;
“Some members of the security community argue that open redirectors are a
 security issue,” reads the section on URL redirection. &lt;br /&gt;
&lt;br /&gt;
“The common argument in favor of this view is that some users, when 
presented with a carefully crafted link, may be duped into thinking that
 they will be taken to a trusted page - but will be not be attentive 
enough to examine the contents of the address bar after the redirection 
takes place.”&lt;br /&gt;
&lt;br /&gt;
It continues, “On the other hand, we recognize that the address bar is 
the only reliable security indicator in modern browsers; and 
consequently, we think that any user who could be misled by a URL 
redirector can also be tricked in other ways, without relying on any 
particular trusted website to act as a relying party.&amp;nbsp;&lt;/span&gt;&lt;strong&gt;
&lt;/strong&gt;&lt;br /&gt;
&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/open-redirect-vulnerability-identified.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6dETxfYRTyAun5ZILj7OactqCNhy9FfE79rvGP3wZ3fSv-1RihVEhTKcP4p0ui8mUcuXXO9XcjWG0YyYpIxEiPUmSVXqgo5JfyFQ9FiJR3BXsAoleKg0sg0h4H8Y5rzM2PkA1aJ-nNVk/s72-c/Meebo+Open+Redirect+Vulnerability.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-2167279547286715422</guid><pubDate>Tue, 11 Dec 2012 11:00:00 +0000</pubDate><atom:updated>2012-12-11T09:05:06.152-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">No Email Day</category><title>No Email Day 12-12-12</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;h1 class=&quot;article-title&quot; itemscope=&quot;&quot; itemtype=&quot;http://data-vocabulary.org/Breadcrumb&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;Tomorrow is No Email Day: Ignore your inbox and do something more useful instead&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_Gab5R_tYGEcr9Gp5jzJW_CrOaqGSRQXgltumBsinTe8uZNfHZMEoHyS2pbzM6LVTQm0YPQzSvX0PQCqOFY_tN1qFw_VOQGwnOLnRcpnumsWN9_RLEquSpwiplFJ1eTf2mJ6SfZf3QnI/s1600/No+Email+Day.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_Gab5R_tYGEcr9Gp5jzJW_CrOaqGSRQXgltumBsinTe8uZNfHZMEoHyS2pbzM6LVTQm0YPQzSvX0PQCqOFY_tN1qFw_VOQGwnOLnRcpnumsWN9_RLEquSpwiplFJ1eTf2mJ6SfZf3QnI/s1600/No+Email+Day.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Looking at your ever-growing inbox and looking for a reason to ignore
 it? Tomorrow you have that excuse, as it will be the second annual &lt;a href=&quot;http://plandigitaluk.com/no-email-day/&quot;&gt;No Email Day&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;iframe allowfullscreen=&quot;allowfullscreen&quot; frameborder=&quot;0&quot; height=&quot;511&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; mozallowfullscreen=&quot;mozallowfullscreen&quot; scrolling=&quot;no&quot; src=&quot;http://www.slideshare.net/slideshow/embed_code/8825282&quot; style=&quot;border-width: 1px 1px 0; border: 1px solid #CCC; margin-bottom: 5px;&quot; webkitallowfullscreen=&quot;webkitallowfullscreen&quot; width=&quot;479&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;http://www.slideshare.net/lordlancaster/no-email-day-by-paul-lancaster&quot; target=&quot;_blank&quot; title=&quot;NO EMAIL DAY by Paul Lancaster&quot;&gt;NO EMAIL DAY by Paul Lancaster&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;http://www.slideshare.net/lordlancaster&quot; target=&quot;_blank&quot;&gt;Paul Lancaster&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;A year ago, UK-based Paul Lancaster declared a No Email Day
 and managed to get coverage for it everywhere from The Next Web to the 
Wall Street Journal. It’s easy to see why, too.&amp;nbsp;Honestly, does anyone 
like email? I can’t remember the last time I didn’t view my inbox as a 
chore.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;So what do you do on No Email Day? Simple – ignore your email. Don’t 
look at your inbox at all and see what else you can achieve. As 
Lancaster wrote in his original manifesto last year (embedded 
below),&amp;nbsp;”If you do need to contact someone on this day, emails should be
 strictly off limits – replaced instead by real life, face-to-face 
interaction, picking up the phone or perhaps even writing a letter 
(remember those) Better still, if you can spend time away from work to 
be inspired and re-connect with the offline world.”&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Of course, it might be a bit&amp;nbsp;naive&amp;nbsp;to believe that it’s possible to 
get by entirely without email, even for a day. Here at The Next Web we’d
 miss important news tips we need to share with you, and we can hardly 
walk down the corridor to chat to the entrepreneurs and investors with 
communicate with every day – they’re based in all sorts of places around
 the world. &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Then of course, once you come back to your email the following day 
you might have to spend the whole morning catching up with people 
wondering why you didn’t reply to their urgent missive.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Still, No Email Day is a useful reminder that there’s more to life 
than your unread messages count. Do you dare ignore &amp;nbsp;your email 
completely for 24 hours?&lt;/span&gt;&lt;br /&gt;
&lt;h1 class=&quot;article-title&quot; itemscope=&quot;&quot; itemtype=&quot;http://data-vocabulary.org/Breadcrumb&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/no-email-day-12-12-12.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_Gab5R_tYGEcr9Gp5jzJW_CrOaqGSRQXgltumBsinTe8uZNfHZMEoHyS2pbzM6LVTQm0YPQzSvX0PQCqOFY_tN1qFw_VOQGwnOLnRcpnumsWN9_RLEquSpwiplFJ1eTf2mJ6SfZf3QnI/s72-c/No+Email+Day.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-4864938997319006586</guid><pubDate>Tue, 11 Dec 2012 04:40:00 +0000</pubDate><atom:updated>2012-12-10T20:40:39.424-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fake Hotel</category><category domain="http://www.blogger.com/atom/ns#">Scam</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><title> Fake Hotels Awaiting Unwary Guests</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVGcMh9VKvbY0usJRuN-1uNEuEUhl1HEPLYMO4CRv6RzNkb1HpaQDxB0Kj5YpRBVmIjg1lVewDnOG96CF7fbXMu0yQ0HcKewGqVwcEegJ6fFrHq-LZ1BS4m0tmFhtQYwcyEVQ-aNPwEEs/s1600/fakes-and-frauds-welcome-to-our-bogus-hotel-2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;271&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVGcMh9VKvbY0usJRuN-1uNEuEUhl1HEPLYMO4CRv6RzNkb1HpaQDxB0Kj5YpRBVmIjg1lVewDnOG96CF7fbXMu0yQ0HcKewGqVwcEegJ6fFrHq-LZ1BS4m0tmFhtQYwcyEVQ-aNPwEEs/s320/fakes-and-frauds-welcome-to-our-bogus-hotel-2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Cyber-criminals have prepared some dirty tricks for tourists looking for a room over the holidays. And it’s not the same old reception RATs,
 banking Trojans, wrong hotel transactions and social media baits. Now, 
they’ve created their own fake hotels and are awaiting unwary guests.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;The fake websites usually leverage the names and 
reputations of famous brands. For instance, if the legitimate company’s 
domain is sheratonskyline.com, the crooks will likely set up their site 
on a domain that looks something like sheraton-skyline.com.&lt;br /&gt;
&lt;br /&gt;
Most major companies have purchased all the variations of their domain 
names to protect themselves against typosquatters, but it’s likely that 
hotels haven’t taken such fraud sites into consideration. &lt;br /&gt;
&lt;br /&gt;
Unlike phishing sites, these fraud websites aren’t promoted via email or
 social media spam. Instead, they’re kept secret to ensure that the 
domain will not be seized by authorities.&lt;br /&gt;
&lt;br /&gt;
Also, such scammy webpages don’t necessarily replicate the design of the genuine hotel.&lt;br /&gt;
&lt;br /&gt;
Users are advised to rely on common sense and a decent security solution to protect themselves against such threats. &lt;br /&gt;
&lt;br /&gt;
The simplest way to identify fake hotel sites is by typing their names 
into a search engine followed by the words “scam” or “fraud.” In many 
cases, you’ll find professional advisories or posts published by other 
users.&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/fake-hotels-awaiting-unwary-guests.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVGcMh9VKvbY0usJRuN-1uNEuEUhl1HEPLYMO4CRv6RzNkb1HpaQDxB0Kj5YpRBVmIjg1lVewDnOG96CF7fbXMu0yQ0HcKewGqVwcEegJ6fFrHq-LZ1BS4m0tmFhtQYwcyEVQ-aNPwEEs/s72-c/fakes-and-frauds-welcome-to-our-bogus-hotel-2.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9042932955176110817.post-1446249791590197714</guid><pubDate>Mon, 10 Dec 2012 20:21:00 +0000</pubDate><atom:updated>2012-12-10T12:21:31.141-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Exforel</category><category domain="http://www.blogger.com/atom/ns#">Exforel.A</category><category domain="http://www.blogger.com/atom/ns#">Security Times</category><category domain="http://www.blogger.com/atom/ns#">Trojan</category><category domain="http://www.blogger.com/atom/ns#">VirTool:WinNT</category><category domain="http://www.blogger.com/atom/ns#">Virus and Malware</category><title>Exforel Backdoor  Implemented At Network Driver Interface Specification level</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLNU7qajTvyRWhCQE6wBlNBSowEUtKqC3IzRgPzR6ZUTFM6BimRfmX7nthK2bFEp_lKoRp5lKzioVP4znUEcxElg7wmXECtW6JwQNegky8eovW3WhK0TQYdeYi4KRlGt8whSoPDL_atqc/s1600/Exforel+backdoor.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLNU7qajTvyRWhCQE6wBlNBSowEUtKqC3IzRgPzR6ZUTFM6BimRfmX7nthK2bFEp_lKoRp5lKzioVP4znUEcxElg7wmXECtW6JwQNegky8eovW3WhK0TQYdeYi4KRlGt8whSoPDL_atqc/s1600/Exforel+backdoor.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;span id=&quot;intelliTxt&quot;&gt;Security researchers &lt;/span&gt;&lt;span id=&quot;intelliTxt&quot;&gt;have identified a variant of the Exforel 
backdoor malware, VirTool:WinNT/Exforel.A, that’s somewhat different 
from other malicious elements of this kind.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwyiomJ3Afcb8lccNhI2FGVcUeeD5cg5H8AFW7HGRX-qnQSYZl7eifRR_7cRKO5Y_1y6ci-IgKPdIjs7hdqH8H9RlOQebwy1Yx2GpztIoybUc-3pNQyw_LNYo-3Xeo0h20MwUVw3SQk44/s1600/Exforel1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;275&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwyiomJ3Afcb8lccNhI2FGVcUeeD5cg5H8AFW7HGRX-qnQSYZl7eifRR_7cRKO5Y_1y6ci-IgKPdIjs7hdqH8H9RlOQebwy1Yx2GpztIoybUc-3pNQyw_LNYo-3Xeo0h20MwUVw3SQk44/s640/Exforel1.png&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;The NDIS-level backdoor used by VirTool:WinNT/Exforel.A is much more 
low-level and stealthy than that used by traditional backdoors&amp;nbsp;– there 
is no connecting/listening port so it is more difficult to&amp;nbsp;notice.&amp;nbsp;The 
backdoor traffic is&amp;nbsp;completely invisible to user-mode applications.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt; &lt;span style=&quot;font-size: large;&quot;&gt;Functionalities:
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Uploading files&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Downloading files&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Executing files&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Routing TCP/IP packets&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;
&lt;/span&gt;&lt;span style=&quot;font-size: large;&quot;&gt;This sample appears to be used for a specific attack targeting a certain organization.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://indiatriks.blogspot.com/2012/12/exforel-backdoor-implemented-at-network.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLNU7qajTvyRWhCQE6wBlNBSowEUtKqC3IzRgPzR6ZUTFM6BimRfmX7nthK2bFEp_lKoRp5lKzioVP4znUEcxElg7wmXECtW6JwQNegky8eovW3WhK0TQYdeYi4KRlGt8whSoPDL_atqc/s72-c/Exforel+backdoor.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>