<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6583027139354147229</id><updated>2024-08-28T17:03:37.313+07:00</updated><category term="security"/><category term="Fraud"/><category term="Latest Warnings"/><category term="Misc."/><category term="Safety Tips"/><category term="network"/><category term="software"/><category term="From the Bunker"/><category term="Hackers"/><category term="McAfee"/><category term="Security Fix"/><category term="Trojan"/><category term="Google"/><category term="Internet security"/><category term="Microsoft"/><category term="Mozilla Firefox"/><category term="OS X"/><category term="Patch"/><category term="Spyware"/><category term="Storm Worm"/><category term="Web Fraud 2.0"/><category term="Windows Vista"/><category term="YouTube.com"/><category term="computer"/><category term="2007"/><category term="AOL"/><category term="AVG"/><category term="Ad-Aware 2007"/><category term="Apple"/><category term="Attack"/><category term="Banner Ad"/><category term="Blogger.com"/><category term="Compromise"/><category term="Delphi"/><category term="Email Address"/><category term="FBI"/><category term="FDIC"/><category term="Free Anti-Virus"/><category term="Hacker"/><category term="ICSG"/><category term="IP Address"/><category term="Internet"/><category term="Internet Explorer"/><category term="Internet Explorer 7"/><category term="Internet coupons"/><category term="Java"/><category term="Kaspersky"/><category term="Kaspersky Lab"/><category term="Laptop Alarm"/><category term="Mac"/><category term="Malicious"/><category term="Maryland"/><category term="Microsoft Office"/><category term="Microsoft Patches"/><category term="Microsoft Windows"/><category term="MonaRonaDona virus"/><category term="Monster.com"/><category term="Morro"/><category term="MySpace"/><category term="Network Magic"/><category term="Networking"/><category term="Opera"/><category term="Pharmacy Spam Blogs"/><category term="Photobucket"/><category term="Porn"/><category term="Privacy"/><category term="Rik Fairlie"/><category term="Router"/><category term="Safari"/><category term="Scammer-Heavy"/><category term="Scammers"/><category term="Security Internet Overview"/><category term="Six Degrees"/><category term="Spam"/><category term="Sunbelt"/><category term="Supercomputers"/><category term="The Future of Anti-Virus Software"/><category term="Trojan Served"/><category term="Trust"/><category term="U.S. Government"/><category term="U.S.Host"/><category term="US"/><category term="USAJobs.gov"/><category term="Update"/><category term="Web sites"/><category term="Website"/><category term="Wi-Fi"/><category term="Wi-Fi Security"/><category term="World of Warcraft"/><category term="Worm"/><category term="Yahoo"/><category term="adware"/><category term="anti-spyware"/><category term="anti-virus"/><category term="antivirus"/><category term="bots"/><category term="browsing"/><category term="business"/><category term="chat bot"/><category term="chat problem"/><category term="children"/><category term="cleaner"/><category term="cnet"/><category term="codec"/><category term="don&#39;t join"/><category term="download.com"/><category term="eBay"/><category term="exploit"/><category term="fake"/><category term="firewall"/><category term="frustrating"/><category term="games"/><category term="iPhone"/><category term="iTouch"/><category term="iTunes"/><category term="malware"/><category term="online"/><category term="safe"/><category term="safety"/><category term="safety and integrity"/><category term="safety on the Internet"/><category term="scan"/><category term="secure"/><category term="security tools"/><category term="theft"/><title type='text'>[JP] Internet and Computer Security</title><subtitle type='html'>All about security on software, network, internet and computer. thank you for visited.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default?start-index=26&amp;max-results=25'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>70</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-3652691301646913030</id><published>2010-02-21T12:30:00.001+07:00</published><updated>2010-02-21T12:36:12.173+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hackers"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Fix"/><title type='text'>Hackers target unpatched Adobe Reader, Acrobat flaw</title><content type='html'>&lt;img style=&quot;display: block; float: none; margin-left: auto; margin-right: auto&quot; src=&quot;http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif&quot; width=&quot;240&quot; height=&quot;52&quot; /&gt;   &lt;p /&gt;  &lt;strong&gt;Adobe Systems Inc.&lt;/strong&gt; said Monday it is investigating reports that attackers are exploiting a previously unidentified security hole in its &lt;strong&gt;Acrobat&lt;/strong&gt; and &lt;strong&gt;PDF Reader&lt;/strong&gt; software to break into vulnerable computers. &lt;p /&gt; &lt;p align=&quot;center&quot;&gt;&lt;img src=&quot;http://voices.washingtonpost.com/securityfix/assets_c/2009/12/reader-thumb-120x117.jpg&quot; /&gt;&lt;/p&gt; &lt;p /&gt; The acknowledgment coincided with an alert published by the Shadowserver Foundation, a nonprofit group that tracks the spread of malicious programs that criminals use to control infected systems remotely. Shadowserver member &lt;strong&gt;Steven Adair&lt;/strong&gt; said the flaw is present in the most recent versions of Adobe Acrobat and Reader. &lt;p /&gt; Adair warned that security experts have observed cyber crooks using the vulnerability in targeted attacks since at least Dec. 11, but that more widespread attacks are likely to emerge over the next few weeks. In addition, few anti-virus vendors currently detect malicious PDF files harboring this exploit. &lt;p /&gt; At the moment, there is no patch available for this flaw, and Adobe&#39;s brief advisory offers little in the way of mitigation advice. &lt;p /&gt; However, Internet users can protect themselves from this attack in a couple of ways. First, this exploit doesn&#39;t work unless users have Javascript enabled in Adobe Acrobat/Reader.To disable Javascript, click &amp;quot;Edit,&amp;quot; then &amp;quot;Preferences&amp;quot; and then &amp;quot;Javascript,&amp;quot; and uncheck &amp;quot;Enable Acrobat Javascript.&amp;quot; &lt;p /&gt; As an alternative to Adobe, I generally recommend the free and lightweight Foxit Reader. But there are other free PDF readers, including Sumatra PDF and PDF-XChange Viewer. &lt;p /&gt; &lt;font face=&quot;Microsoft Sans Serif&quot; color=&quot;#C0C0C0&quot; size=&quot;-2&quot;&gt;http://voices.washingtonpost.com/securityfix/2009/12/hackers_target_unpatched_adobe.html?wprss=securityfix&lt;/font&gt;  </content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/3652691301646913030/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/3652691301646913030' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3652691301646913030'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3652691301646913030'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2010/02/hackers-target-unpatched-adobe-reader.html' title='Hackers target unpatched Adobe Reader, Acrobat flaw'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-4363365544621565334</id><published>2009-08-24T11:54:00.000+07:00</published><updated>2009-08-24T11:54:30.981+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacker"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Fix"/><title type='text'>TJX Hacker Indicted in Heartland, Hannaford Breaches</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; lk=&quot;true&quot; src=&quot;http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif&quot; width=&quot;340&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
A federal grand jury has indicted three individuals for allegedly hacking into credit and debit card payment processing giant &lt;strong&gt;Heartland Payment Systems&lt;/strong&gt; last year, as part of an investigation the Justice Department is calling the largest identity theft case ever prosecuted.&lt;br /&gt;
&lt;br /&gt;
According to indictments returned Monday in a New Jersey federal court, the government believes the same individuals were involved in a string of high-profile data breaches between October 2006 and May 2008, including intrusions at Hannaford Brothers Co., and &lt;strong&gt;7-Eleven&lt;/strong&gt;, Inc.&lt;br /&gt;
&lt;br /&gt;
In total, the government alleges the hackers stole data on more than 130 million credit and debit cards from Princeton, NJ-based Heartland.&lt;br /&gt;
&lt;br /&gt;
Read the full story, at this link here. A copy of the indictment is available here.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;http://voices.washingtonpost.com/securityfix/2009/08/heartland_payment_systems_hack.html?wprss=securityfix&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/4363365544621565334/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/4363365544621565334' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/4363365544621565334'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/4363365544621565334'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2009/08/tjx-hacker-indicted-in-heartland.html' title='TJX Hacker Indicted in Heartland, Hannaford Breaches'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-5692031569176684241</id><published>2009-08-24T10:11:00.003+07:00</published><updated>2009-08-24T10:15:19.871+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Java"/><category scheme="http://www.blogger.com/atom/ns#" term="OS X"/><category scheme="http://www.blogger.com/atom/ns#" term="Safari"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Fix"/><title type='text'>Security Patch Catchup: Java, Safari &amp; OS X</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; lk=&quot;true&quot; src=&quot;http://media.washingtonpost.com/wp-srv/blogs/images/krebs_lol_624.gif&quot; width=&quot;340&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;br /&gt;
&lt;strong&gt;Security Fix&lt;/strong&gt; took a mini-vacation last week, but that&#39;s all it takes to fall behind in important software security updates. Here&#39;s a quick pointer to some recent updates that have recently happened.&lt;br /&gt;
The last time I wrote about Java updates was at Update 13, but as several readers have pointed out, the latest version is now Update 16. Near as I could tell, Updates 14 and 16 did not include security updates. Indeed, Java maker Sun Microsystems says users who have Java SE 6 Update 15 have the latest security fixes and do not need to upgrade to version 16 to be current on security fixes.&lt;br /&gt;
&lt;br /&gt;
However, Update 15 shipped fixes for a number of serious security holes, so if you&#39;ve got an earlier version of this program installed, take a few minutes to update. Don&#39;t know whether you have Java or what version you may have? Visit this link.&lt;br /&gt;
&lt;br /&gt;
Unfortunately, Sun still hasn&#39;t made the process of updating Java as easy as it should be. When I tried to update one of my Vista machines from Update 13 using the Windows Control panel (by clicking the Java icon, then the Update tab, and then the &quot;Update Now&quot; button), the updater told me I had the latest version installed.&lt;br /&gt;
&lt;br /&gt;
To grab the latest version, I have to download and run a full installer from Java.com. The installer by default tries to install one of several programs the company has a deal with (mine offered the &lt;strong&gt;Yahoo!&lt;/strong&gt; toolbar), so if you don&#39;t want the extra software be sure to deselect that option. &lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Apple&lt;/strong&gt; also recently released several important updates. Among them was an update for the Safari Web browser that fixes at least six security holes. This patch brings Safari to version 4.0.3. Updates are available for Mac and Windows versions. Mac users can grab the update from Apple Downloads or Software Update, while Windows Safari users will need to use the bundled Apple Software Update tool.&lt;br /&gt;
&lt;br /&gt;
In addition, Apple has released an update that corrects an important security vulnerability in &lt;strong&gt;Mac OS X 10.4&lt;/strong&gt; and &lt;strong&gt;10.5&lt;/strong&gt; systems. That update is available through the Mac&#39;s built-in Apple Software Update feature.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;http://voices.washingtonpost.com/securityfix/2009/08/security_patch_catchup.html?wprss=securityfix&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/5692031569176684241/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/5692031569176684241' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/5692031569176684241'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/5692031569176684241'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2009/08/security-patch-catchup-java-safari-os-x.html' title='Security Patch Catchup: Java, Safari &amp; OS X'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-4860278189458680678</id><published>2009-08-24T09:50:00.001+07:00</published><updated>2009-08-24T09:52:17.870+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Delphi"/><category scheme="http://www.blogger.com/atom/ns#" term="McAfee"/><title type='text'>Induc Virus Abuses Delphi Compiler</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; lk=&quot;true&quot; src=&quot;http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The W32/Induc virus has been in the wild for at least a year. During this period it has succeeded in infecting a lot of Delphi installations, including manufacturers of some pretty popular software packages.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
On a victim’s machine this virus searches for the presence of a specific version (4.0, 5.0, 6.0 and 7.0) of the Delphi compiler. The virus gathers this information using the registry entry below.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.avertlabs.com/research/blog/index.php/2009/08/19/induc-virus-abuses-delphi-compiler/&quot;&gt;Read More ...&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;&lt;a href=&quot;http://www.avertlabs.com/research/blog/index.php/2009/08/19/induc-virus-abuses-delphi-compiler/&quot;&gt;http://www.avertlabs.com/research/blog/index.php/2009/08/19/induc-virus-abuses-delphi-compiler/&lt;/a&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/4860278189458680678/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/4860278189458680678' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/4860278189458680678'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/4860278189458680678'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2009/08/induc-virus-abuses-delphi-compiler.html' title='Induc Virus Abuses Delphi Compiler'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-2343118978620268355</id><published>2009-08-24T09:47:00.000+07:00</published><updated>2009-08-24T09:47:15.144+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="McAfee"/><category scheme="http://www.blogger.com/atom/ns#" term="Scammers"/><title type='text'>Scammers Love Your Money</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; lk=&quot;true&quot; src=&quot;http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
We generally classify email messages pretending to be from a family member of a (often African) dignitary or from a desperate young woman as scams. In the first case, the sender sometimes explains that following the death of an influential dignitary a large sum of money is blocked in a bank account somewhere. With the recipient’s help and using his or her financial backing for a money transfer, the sender says that it would be possible to release the money. Substantial compensation is offered to whoever agrees. In the second case, the unknown beauty becomes a friend with the victim and suddenly has a terrible money problem.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For some individuals, these swindles, called advance fee fraud (also known as 419 fraud) and romance scam, are a primary source of revenue. They also employ lottery and fake price scams.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.avertlabs.com/research/blog/index.php/2009/08/17/scammers-love-your-money/&quot;&gt;Read More ... &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;http://www.avertlabs.com/research/blog/index.php/2009/08/17/scammers-love-your-money/&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/2343118978620268355/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/2343118978620268355' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/2343118978620268355'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/2343118978620268355'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2009/08/scammers-love-your-money.html' title='Scammers Love Your Money'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-3462103004523652266</id><published>2009-08-24T09:44:00.000+07:00</published><updated>2009-08-24T09:44:13.827+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ICSG"/><category scheme="http://www.blogger.com/atom/ns#" term="McAfee"/><title type='text'>Introducing the IEEE Industry Connections Security Group</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; lk=&quot;true&quot; src=&quot;http://www.avertlabs.com/research/blog/wp-content/themes/avert-blog/_images/logo_mcafee.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Agreement and collaboration have been two of the greatest challenges the security community has faced from the very beginning. In an effort to address this, The Industry Connections Security Group (ICSG), a new offering from the IEEE, allows like-minded companies to come together to solve industry or business problems that center on information security. Industry Connections is a program under the IEEE that allows for a fast start-up toward industry collaboration. It also offers the support and infrastructure of an established and well known brand—the IEEE itself. This effort will allow the group to focus on the work of security standards and problem solving, rather than being slowed down with issues such as incorporation or intellectual property matters. McAfee is proud to be a founding member of this effort.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.avertlabs.com/research/blog/index.php/2009/08/17/introducing-the-ieee-industry-connections-security-group/&quot;&gt;Read More ...&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/3462103004523652266/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/3462103004523652266' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3462103004523652266'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3462103004523652266'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2009/08/introducing-ieee-industry-connections.html' title='Introducing the IEEE Industry Connections Security Group'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-9217310435200455464</id><published>2009-04-25T09:35:00.002+07:00</published><updated>2009-04-25T09:38:02.172+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="software"/><title type='text'>AVG Internet Security SBS Edition 8.5.322 + Serial</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.antivirus4u.com.my/prodimages/AVGinternetsecurity.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 250px; &quot; src=&quot;http://www.antivirus4u.com.my/prodimages/AVGinternetsecurity.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;AVG Internet Security SBS ensure complete security protection against all of the most serious Internet threats, including viruses, worms, trojans, spyware, adware, hackers and spam. AVG Internet Security SBS 8.5, includes the most recent anti-virus, anti-spyware, anti-spam , Anti-Rootkit , Web Shield &amp;amp; LinkScanne and firewall technologies with reliable automatic updates while consuming a low level of computer resources for convenient use.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;Download : &lt;/span&gt;&lt;a href=&quot;http://221473a3.linkbucks.com&quot;&gt;AVG Internet Security SBS Edition 8.5.322&lt;/a&gt; &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Serial:&lt;/div&gt;&lt;div&gt;8MEH-RF22Z-ANQGS-QDWMR-2ECTN-BEMBR-ACED&lt;/div&gt;&lt;div&gt;8MEH-RJR4R-7WKJ6-NL3DA-C3DZF-JEMBR-ACED&lt;/div&gt;&lt;div&gt;8MEH-RGHD3-SUAUO-SXPWA-P92GQ-9EMBR-ACED&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/9217310435200455464/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/9217310435200455464' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/9217310435200455464'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/9217310435200455464'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2009/04/avg-internet-security-sbs-edition-85322.html' title='AVG Internet Security SBS Edition 8.5.322 + Serial'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-3378844287481007233</id><published>2009-04-25T09:29:00.002+07:00</published><updated>2009-04-25T09:33:32.813+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="software"/><title type='text'>AVG Anti-Virus SBS Edition 8.5.322 + Serial</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.antivirus4u.com.my/prodimages/AVGne_small.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 200px; height: 243px;&quot; src=&quot;http://www.antivirus4u.com.my/prodimages/AVGne_small.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;div&gt;AVG Anti-Virus SBS ensure complete security protection against all of the most serious Internet threats, including viruses, worms, trojans, spyware, adware, and hackers . AVG Anti-Virus SBS 8.5, includes the most recent anti-virus, anti-spyware, Anti-Rootkit , Web Shield &amp;amp; LinkScanne and firewall technologies with reliable automatic updates while consuming a low level of computer resources for convenient use.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;Download :&lt;/span&gt; &lt;a href=&quot;http://ce429296.linkbucks.com&quot;&gt;AVG Anti-Virus SBS Edition 8.5.322&lt;/a&gt; &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Serial:&lt;/div&gt;&lt;div&gt;8MEH-RJR4R-7WJJ6-NL3DA-CYVWB-JEMBR-ACED&lt;/div&gt;&lt;div&gt;8MEH-RJXR4-2CBYP-2GB3A-DBLAA-PEMBR-ACED&lt;/div&gt;&lt;div&gt;8MEH-RE6B8-SRJ4Z-A489R-9832J-EEMBR-ACED&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/3378844287481007233/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/3378844287481007233' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3378844287481007233'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3378844287481007233'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2009/04/avg-anti-virus-sbs-edition-85322-serial.html' title='AVG Anti-Virus SBS Edition 8.5.322 + Serial'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-3743414232276800306</id><published>2009-04-25T09:22:00.003+07:00</published><updated>2009-04-25T09:29:17.135+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="software"/><title type='text'>Kaspersky Internet Security 2010 v9.0.0.323 Beta</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://www.picsat.com/images/okpa0xe28cgsxm0m8h.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 250px; &quot; src=&quot;http://www.picsat.com/images/okpa0xe28cgsxm0m8h.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;div&gt;Kaspersky Anti-Virus 2010 – the backbone of your PC’s security system, offering protection from a range of IT threats. Kaspersky Anti-Virus 2010 provides the basic tools needed to protect your PC.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Kaspersky Internet Security 2010 – the all-in-one security solution that offers a worry-free computing environment for you and your family. Kaspersky Internet Security 2010 has everything you need for a safe and secure Internet experience.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Kaspersky Internet Security 9.0 – is a new line of Kaspersky Labs products, which is designed for the multi-tiered protection of personal computers. This product is based on in-house protection components, which are based on variety of technologies for maximum levels of user protection regardless of technical competencies. This product utilizes several technologies, which were jointly developed by Kaspersky Labs and other companies; part of them is implemented via online-services.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Our products for home and home office are specifically designed to provide hassle-free and quality protection against viruses, worms and other malicious programs, as well as hacker attacks, spam and spyware.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;During product preparation several competitor offerings were considered and analyzed - firewalls, security suites systems, which position themselves as proactive in defence and HIPS systems. Combination of in-hosue innovative developments and results from analysis gathered through the industry allowed to jump onto a new level of protection for personal users, whereby offering even more hardened and less annoying computer protection from all types of electronic threats – malicious programs of different types, hacker attacks, spam mailings, program-root kits, phishing emails, advertisement popup windows etc.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;Download :&lt;/span&gt; &lt;a href=&quot;http://3942bb25.linkbucks.com&quot;&gt;Kaspersky Internet Security 2010 v9.0.0.323 Beta&lt;/a&gt; &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/3743414232276800306/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/3743414232276800306' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3743414232276800306'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3743414232276800306'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2009/04/kaspersky-internet-security-2010.html' title='Kaspersky Internet Security 2010 v9.0.0.323 Beta'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-90959825441266386</id><published>2009-01-11T15:20:00.001+07:00</published><updated>2009-01-11T15:34:26.833+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anti-spyware"/><category scheme="http://www.blogger.com/atom/ns#" term="anti-virus"/><category scheme="http://www.blogger.com/atom/ns#" term="Internet security"/><title type='text'>AVG Internet Security 8.0 Build 229a1410</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;CLEAR: both; TEXT-ALIGN: center&quot;&gt;&lt;a style=&quot;MARGIN-LEFT: 1em; MARGIN-RIGHT: 1em&quot; href=&quot;http://biggerbids.com/members/images/3415/public/422207_AVG-internetSecurity.jpg&quot; imageanchor=&quot;1&quot;&gt;&lt;img height=&quot;420&quot; src=&quot;http://biggerbids.com/members/images/3415/public/422207_AVG-internetSecurity.jpg&quot; width=&quot;325&quot; border=&quot;0&quot; vi=&quot;true&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;AVG Internet Security ensure complete security protection against all of the most serious Internet threats, including viruses, worms, trojans, spyware, adware, hackers and spam. AVG Internet Security 7.5, includes the most recent anti-virus, anti-spyware, anti-spam and firewall technologies with reliable automatic updates while consuming a low level of computer resources for convenient use.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Download : &lt;a href=&quot;http://8ea86886.linkbucks.com/&quot;&gt;AVG Internet Security 8.0 Build 229a1410 (50.1 MB)&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/90959825441266386/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/90959825441266386' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/90959825441266386'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/90959825441266386'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2009/01/avg-internet-security-80-build-229a1410.html' title='AVG Internet Security 8.0 Build 229a1410'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-5702947037504296378</id><published>2008-12-09T13:12:00.001+07:00</published><updated>2008-12-09T13:14:27.532+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus"/><category scheme="http://www.blogger.com/atom/ns#" term="Apple"/><category scheme="http://www.blogger.com/atom/ns#" term="Mac"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Apple deletes Mac antivirus suggestion</title><content type='html'>&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-style: italic; &quot;&gt;Updated 7:45 p.m. PST with expert comment, at 7:20 p.m. PST with context  on previous coverage, and at 7:08 p.m. PST with background.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt; &lt;p&gt;&lt;/p&gt;Apple removed an old item from its support site late Tuesday that urged  Mac customers to use multiple antivirus utilities and now says the Mac is safe  &quot;out of the box.&quot;  &lt;p&gt;&lt;/p&gt; &lt;p&gt;&quot;We have &lt;a href=&quot;http://support.apple.com/kb/HT2550&quot;&gt;removed the  KnowledgeBase article&lt;/a&gt; because it was old and inaccurate,&quot; Apple spokesperson  Bill Evans said. &lt;/p&gt; &lt;p&gt;&quot;The Mac is designed with built-in technologies that provide protection  against malicious software and security threats right out of the box,&quot; he said.  &quot;However, since no system can be 100 percent immune from every threat, running  antivirus software may offer additional protection.&quot;&lt;/p&gt; &lt;p&gt;Apple&#39;s &lt;a title=&quot;Apple suggests Mac users install antivirus software -- Monday, Dec 1, 2008&quot; href=&quot;http://news.cnet.com/8301-1009_3-10110852-83.html&quot;&gt;previous security message&lt;/a&gt; in its  KnowledgeBase, which serves as a tutorial for Mac users, was: &quot;Apple encourages  the widespread use of multiple antivirus utilities so that virus programmers  have more than one application to circumvent, thus making the whole virus  writing process more difficult.&quot; &lt;/p&gt; &lt;p&gt;Security experts, while pleased that Apple would urge Mac users to install  antivirus software, had warned that running multiple antivirus products could  cause problems and recommended against it. &lt;/p&gt; &lt;p&gt;Apple&#39;s antivirus support note was initially published last year and was  updated last month, despite reports that it was a new note. &lt;/p&gt; &lt;p&gt;One Apple expert speculated that Apple was merely removing a poorly worded  support note and said it probably wasn&#39;t ever Apple&#39;s intention to tell Mac  users they need antivirus. &lt;/p&gt; &lt;p&gt;&quot;I bet you it was a low-level support note and it hadn&#39;t gone through the  right approvals,&quot; said Rich Mogull, security editor of Apple news site &lt;a href=&quot;http://db.tidbits.com/&quot;&gt;TidBITS&lt;/a&gt;. &quot;That&#39;s my guess.&quot; &lt;/p&gt; &lt;p&gt;To some, Apple&#39;s latest move will be seen as back-tracking given that it  comes one day after those misleading reports circulated. The motive remains  unclear, particularly because Apple didn&#39;t replace the previously published  suggestion with an updated one. &lt;/p&gt; &lt;p&gt;The message that remains is that Mac users don&#39;t really need to take  additional steps to protect against viruses and other malware. Telling customers  they can run antivirus for &quot;additional protection&quot; could be interpreted as a way  to protect against any liability. &lt;/p&gt; &lt;p&gt;There are no known viruses in the wild that exploit a vulnerability in the  Mac OS, and Windows continues to be the overwhelming preference for malware  writers to target their programs. But malware isn&#39;t just taking advantage of  operating system weaknesses anymore. In fact, the majority of such threats now  come from code that targets weaknesses in browsers and other applications that  aren&#39;t platform specific. &lt;/p&gt; &lt;p&gt;Mogull said he doesn&#39;t recommend that the average Mac user install antivirus  software because of the low-level of malicious software seen for Macs at this  time. &lt;/p&gt; &lt;p&gt;To me, this new Apple statement poses more questions than it answers. &lt;/p&gt; &lt;p&gt;Regardless of the meaning of Apple&#39;s latest action, I&#39;m pleased to now have  open lines of communication with the company. Over the last few months, I have  had an increasingly difficult time getting any response to my e-mails and phone  calls. For instance, I got no response to my requests for comment on Monday&#39;s  article about this topic. However, after talking to several Apple spokespeople  on Tuesday about the matter I am confident that the situation has been cleared  up. &lt;/p&gt; &lt;p&gt;I also was reminded of how much collective knowledge CNET readers have about  Apple and would like to extend an invitation for people to feel free to contact  me directly at elinor.mills@cnet.com with any feedback and tips related to Apple  security issues. &lt;/p&gt;&lt;p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(102, 102, 102);&quot;&gt;Ref :: http://news.cnet.com/8301-1009_3-10111958-83.html&lt;/span&gt;&lt;/p&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/5702947037504296378/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/5702947037504296378' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/5702947037504296378'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/5702947037504296378'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/12/apple-deletes-mac-antivirus-suggestion.html' title='Apple deletes Mac antivirus suggestion'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-1283942398308448785</id><published>2008-12-09T13:09:00.002+07:00</published><updated>2008-12-09T13:12:07.138+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="AVG"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="Morro"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="Sunbelt"/><title type='text'>Antivirus firms shrug at Microsoft&#39;s free security suite</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://i.i.com.com/cnwk.1d/i/bto/20081119/microsoft_patch.jpg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 184px; height: 138px;&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/bto/20081119/microsoft_patch.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;div&gt;&lt;p&gt;&lt;i&gt;Updated at 1:15 p.m. PST Wednesday with comment from Symantec and at 11:45  a.m. PST Thursday with comments from McAfee and Kaspersky.&lt;/i&gt;&lt;/p&gt; &lt;p&gt;For some security companies, Microsoft&#39;s decision to offer a free  anti-malware product, &lt;a href=&quot;http://news.cnet.com/8301-1009_3-10101582-83.html&quot;&gt;code-named  Morro&lt;/a&gt;, won&#39;t result in a dramatic change in how they do business. &lt;/p&gt; &lt;p&gt;Morro will be available in the second half of 2009 and will protect against  viruses, spyware, rootkits, and Trojans, according to Microsoft.&lt;/p&gt; &lt;p&gt;&quot;With OneCare&#39;s market share of less than 2 percent, we understand  Microsoft&#39;s decision to shift attention to their core business,&quot; Joris Evers,  director of worldwide public relations for McAfee, said in an e-mail. &lt;/p&gt; &lt;p&gt;As for confronting a free malware solution from a software giant, Evers said,  &quot;With more malware attacks than ever before, we believe our advanced technology,  commitment to consumer education, superior protection, dedicated focus on  security, and our 20-plus years in this business will provide consumers the  confidence to choose McAfee as their trusted adviser and expert in security.&quot;  &lt;/p&gt; &lt;p&gt;Justin Priestley, senior vice president of consumer sales at Kaspersky Lab&#39;s  Americas division, also seemed not that concerned at the prospect of facing a  free security solution from Microsoft. &lt;/p&gt; &lt;p&gt;&quot;Having entered the U.S. consumer market at the same time as Microsoft, we  initially viewed them as a formidable player. They&#39;ve continued to hold a very  low market share in the consumer market, and we don&#39;t expect the exit of OneCare  to change the playing field drastically,&quot; Priestley said. &quot;With the increasing  threat malware and Web attacks pose, security is as important as ever, and we  believe people will continue to choose antimalware software based on the quality  of protection and will choose the highest-level product available.&quot;&lt;/p&gt; &lt;p&gt;Rowan Trollope, senior vice president of Symantec&#39;s consumer business,  characterized the announcement as a &quot;capitulation by Microsoft, and a  reinforcement of the notion that it&#39;s simply not in Microsoft&#39;s DNA to provide  high-quality, frequently updated security protection.&quot; &lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://news.cnet.com/8301-1009_3-10102376-83.html&quot;&gt;Read More ...&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/1283942398308448785/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/1283942398308448785' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/1283942398308448785'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/1283942398308448785'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/12/antivirus-firms-shrug-at-microsofts.html' title='Antivirus firms shrug at Microsoft&#39;s free security suite'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-5970453651694076851</id><published>2008-12-09T13:05:00.003+07:00</published><updated>2008-12-09T13:08:47.374+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Laptop Alarm"/><category scheme="http://www.blogger.com/atom/ns#" term="security"/><category scheme="http://www.blogger.com/atom/ns#" term="theft"/><title type='text'>Featured Freeware: Laptop Alarm</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://i.i.com.com/cnwk.1d/i/bto/20081118/laptop_alarm_SC_610x457.jpeg&quot;&gt;&lt;img style=&quot;display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 200px; &quot; src=&quot;http://i.i.com.com/cnwk.1d/i/bto/20081118/laptop_alarm_SC_610x457.jpeg&quot; border=&quot;0&quot; alt=&quot;&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;This simple program will sound an alarm through your laptop&#39;s speakers when  certain activities occur, helping to thwart laptop theft. &lt;a href=&quot;http://www.download.com/Laptop-Alarm/3000-2162_4-10708142.html&quot;&gt;Laptop Alarm&#39;s&lt;/a&gt; four-check-box  interface takes seconds to set. An option pop-up is as easily set to control  mouse sensitivity and set a program password.&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;Operating Laptop Alarm is a snap. Users merely run the executable and set the  alarm to sound if the laptop loses power the system is shut down or logged off,  if the USB mouse is unplugged, or if the mouse moved. Testers found the program  accurate with no false alarms. There&#39;s no method to alter the alarm sound, and  users aren&#39;t given the opportunity to enter the program password before the  alarm goes off. &lt;/p&gt; &lt;p&gt;Laptop Alarm performs well and as expected, but it doesn&#39;t run in the  background and must be reset each time you want to use it. Leaving your computer  is not an action we&#39;d recommend, but this freeware may at least hurt the ears of  a potential laptop thief.&lt;/p&gt;&lt;p&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(102, 102, 102);&quot;&gt; Ref :: http://www.download.com/8301-2007_4-10101869-12.html&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/5970453651694076851/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/5970453651694076851' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/5970453651694076851'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/5970453651694076851'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/12/featured-freeware-laptop-alarm.html' title='Featured Freeware: Laptop Alarm'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-3304279402090713732</id><published>2008-09-09T06:07:00.001+07:00</published><updated>2008-09-09T06:10:14.302+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="From the Bunker"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Warnings"/><category scheme="http://www.blogger.com/atom/ns#" term="Misc."/><category scheme="http://www.blogger.com/atom/ns#" term="Web Fraud 2.0"/><title type='text'>EstDomains: A Sordid History and a Storied CEO</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://voices.washingtonpost.com/securityfix/assets_c/2008/09/tsastsin-thumb-228x161.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px;&quot; src=&quot;http://voices.washingtonpost.com/securityfix/assets_c/2008/09/tsastsin-thumb-228x161.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;In this second part to an &lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/09/estdomains.html&quot;&gt;ongoing investigation&lt;/a&gt; into the notorious Web site host and domain name registrar &lt;strong&gt;EstDomains Inc.&lt;/strong&gt;, &lt;strong&gt;Security Fix&lt;/strong&gt; examines the company&#39;s history, the legacy of its current chief executive, and its future prospects.&lt;br /&gt;&lt;br /&gt;The &quot;Est&quot; in EstDomains is a nod to the company&#39;s origins: It was founded in &lt;a href=&quot;http://www.tartu.ee/?lang_id=2&quot;&gt;Tartu&lt;/a&gt;, the second largest city in Estonia (although the corporation is officially registered in Delaware). The chief executive of EstDomains is 27-year-old &lt;strong&gt;Vladimir Tsastsin&lt;/strong&gt;, pictured below.&lt;br /&gt;&lt;br /&gt;Tsastsin also is named as the head of &lt;a href=&quot;http://www.rovedigital.com/?page=intro&quot;&gt;Rove Digital&lt;/a&gt;, a company that appears to encompass a domain auction service named &lt;strong&gt;Bakler.com&lt;/strong&gt;, and a recently launched Web traffic-shaping service called &lt;strong&gt;Zmot&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/09/estdomains_a_sordid_history_an.html&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(153, 153, 153);&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/3304279402090713732/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/3304279402090713732' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3304279402090713732'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3304279402090713732'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/09/estdomains-sordid-history-and-storied.html' title='EstDomains: A Sordid History and a Storied CEO'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-1475206576627637322</id><published>2008-09-09T05:56:00.002+07:00</published><updated>2008-09-09T06:07:12.339+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="From the Bunker"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Warnings"/><category scheme="http://www.blogger.com/atom/ns#" term="Misc."/><category scheme="http://www.blogger.com/atom/ns#" term="Web Fraud 2.0"/><title type='text'>A Superlative Scam and Spam Site Registrar</title><content type='html'>Over the past week, a number of the Internet&#39;s largest data carriers have &lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/09/scam-heavy_us_isp_grows_more_i.html&quot;&gt;ceased providing online connectivity&lt;/a&gt; to Atrivo (a.k.a. &quot;Intercage&quot;), an ISP that security experts say is home to a huge number of scammers and spammers. This week, I&#39;m turning the spotlight on &lt;strong&gt;EstDomains Inc.&lt;/strong&gt;, Atrivo&#39;s most important customer and the single biggest reason &lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html&quot;&gt;so many experts have condemned Atrivo&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;According to &lt;a href=&quot;http://www.registrarstats.com/Public/RegistrarMarketShareMain.aspx&quot;&gt;RegistrarStats.com&lt;/a&gt;, EstDomains is the 49th largest domain name registrar, with more than 270,000 domains. Security Fix is still working on cataloging all of those domains, but for the purposes of this analysis we&#39;ll examine some 10,000 Web site names that are both registered through EstDomains and using the company&#39;s various domain name servers to route traffic to them.&lt;br /&gt;&lt;br /&gt;I chose to focus on that particular subset of 10,000 domains mainly so that EstDomains could not simply disavow knowledge of the sites&#39; activities by claiming it serves as nothing more than a registrar for those domains.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;http://voices.washingtonpost.com/securityfix/assets_c/2008/09/est-pharm1-thumb-228x193.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px;&quot; src=&quot;http://voices.washingtonpost.com/securityfix/assets_c/2008/09/est-pharm1-thumb-228x193.jpg&quot; alt=&quot;&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt; &lt;p&gt;Turns out, at least &lt;span class=&quot;mt-enclosure mt-enclosure-file&quot; style=&quot;display: inline;&quot;&gt;&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008-09-03_all_est.domains.surbl2.csv&quot;&gt;one-third of those domains&lt;/a&gt;&lt;/span&gt; (.CSV) are currently blacklisted by &lt;strong&gt;SURBL.org&lt;/strong&gt;, which tracks Web site names that are advertised in junk e-mail.&lt;/p&gt;&lt;p&gt;Have a look at the complete list of those 10,000 names -- which I&#39;ve made available &lt;span class=&quot;mt-enclosure mt-enclosure-file&quot; style=&quot;display: inline;&quot;&gt;&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008-09-03_all_est.domains.csv&quot;&gt;at this link here&lt;/a&gt;&lt;/span&gt; (.CSV file) -- and it should quickly become evident why so many are blacklisted.&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/09/estdomains.html&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(153, 153, 153);&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/span&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/1475206576627637322/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/1475206576627637322' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/1475206576627637322'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/1475206576627637322'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/09/superlative-scam-and-spam-site.html' title='A Superlative Scam and Spam Site Registrar'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-7191441722457117779</id><published>2008-09-09T05:54:00.001+07:00</published><updated>2008-09-09T05:56:02.765+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="Latest Warnings"/><category scheme="http://www.blogger.com/atom/ns#" term="Misc."/><category scheme="http://www.blogger.com/atom/ns#" term="Safety Tips"/><category scheme="http://www.blogger.com/atom/ns#" term="U.S. Government"/><title type='text'>FBI Warns of Hit Man Scam Resurgence</title><content type='html'>The &lt;strong&gt;FBI&lt;/strong&gt; is warning people not to be disturbed by an e-mail scam that threatens your life and orders you to pay up to avoid being the target of a hired hit man.&lt;br /&gt;&lt;br /&gt;The FBI &lt;a href=&quot;http://www.fbi.gov/cyberinvest/escams.htm&quot;&gt;said&lt;/a&gt; its &lt;strong&gt;Internet Crime Complaint Center&lt;/strong&gt; continues to receive thousands of reports concerning the hit man e-mail scheme. The FBI notes that while the content of the missive has evolved since similar hit man scams first surfaced in late 2006, the message remains the same, claiming the sender has been hired to kill the recipient.&lt;br /&gt;&lt;br /&gt;In some cases, the use of names, titles, addresses, and telephone numbers of government officials and business executives, and/or the victims&#39; personal information are used in an attempt to make the fraud appear more authentic, the FBI said.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/08/fbi_warns_of_hit_man_scam_resu.html&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(153, 153, 153);&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/7191441722457117779/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/7191441722457117779' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/7191441722457117779'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/7191441722457117779'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/09/fbi-warns-of-hit-man-scam-resurgence_09.html' title='FBI Warns of Hit Man Scam Resurgence'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-3703599127743771083</id><published>2008-09-07T14:48:00.000+07:00</published><updated>2008-09-07T14:52:53.708+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Scammer-Heavy"/><title type='text'>Scammer-Heavy U.S. ISP Grows More Isolated</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/assets_c/2008/09/glbxdepeer-thumb-228x203.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;178&quot; src=&quot;http://voices.washingtonpost.com/securityfix/assets_c/2008/09/glbxdepeer-thumb-228x203.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Last week, &lt;strong&gt;Security Fix&lt;/strong&gt; published an &lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html&quot;&gt;analysis of Atrivo&lt;/a&gt;, a California based Internet service provider, also known as &lt;strong&gt;Intercage&lt;/strong&gt;, that has proven to be a virtual magnet for cyber-criminal operations. Since that time, Atrivo&#39;s biggest network backbone provider decided it could no longer support the company, and stopped offering it direct connectivity.&lt;br /&gt;
&lt;br /&gt;
I first got wind of this change while reading &lt;a href=&quot;http://www.merit.edu/mail.archives/nanog/msg10923.html&quot;&gt;a post&lt;/a&gt; on the &lt;strong&gt;NANOG&lt;/strong&gt; mailing list, which caters to professionals employed by ISPs and various network providers. &lt;strong&gt;Marcus Sachs&lt;/strong&gt;, director of the &lt;a href=&quot;http://isc.sans.org/&quot;&gt;SANS Internet Storm Center&lt;/a&gt;, had said it looked like &lt;strong&gt;Global Crossing&lt;/strong&gt; had stopped handling long-haul Internet traffic for Atrivo/Intercage within hours after our story was published. I followed up with Marc, but he was unable to produce any conclusive data showing the change.&lt;br /&gt;
&lt;br /&gt;
Fast forward to today, and with the help of &lt;strong&gt;Jose Nazario&lt;/strong&gt; at &lt;a href=&quot;http://asert.arbornetworks.com/2008/08/atrivointercage-called-out-as-us-rbn/&quot;&gt;Arbor Networks&lt;/a&gt;, I was able to pull together a view of what happened. Global Crossing has in fact &quot;de-peered&quot; from Atrivo/Intercage, so it is no longer providing direct Internet connectivity.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/09/scam-heavy_us_isp_grows_more_i.html&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/3703599127743771083/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/3703599127743771083' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3703599127743771083'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3703599127743771083'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/09/scammer-heavy-us-isp-grows-more.html' title='Scammer-Heavy U.S. ISP Grows More Isolated'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-9205373401055559800</id><published>2008-09-07T14:42:00.000+07:00</published><updated>2008-09-07T14:47:12.197+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="security"/><title type='text'>Number of Bot-Infected PCs Skyrockets</title><content type='html'>The number of PCs compromised with software that lets cyber criminals control the machines from afar has more than quadrupled over the last quarter, security experts warn&lt;br /&gt;
&lt;br /&gt;
The estimates come from &lt;a href=&quot;http://www.shadowserver.org/&quot;&gt;Shadowserver&lt;/a&gt;, a group of volunteers that monitor activity from robot networks or &quot;botnets,&quot; large armies of hacked personal computers used for spam, phishing and all kinds of criminal activity. Shadowserver saw a rise from roughly 100,000 botted PCs to about 400,000 over the past three months.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;John Bambenek&lt;/strong&gt;, an incident handler with the &lt;strong&gt;SANS Internet Storm Center&lt;/strong&gt;, which tracks hacking trends, &lt;a href=&quot;http://isc.sans.org/diary.html?storyid=4963&quot;&gt;speculates&lt;/a&gt; that the spike is probably related to the massive numbers of Web sites that have been hacked by &lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/06/free_tools_to_secure_your_web_1.html&quot;&gt;SQL attacks&lt;/a&gt;, and seeded with browser exploits.&lt;br /&gt;
&lt;br /&gt;
While those numbers might seem high, they suggest more of a recent upward trend in bot counts rather than an accurate picture of just how many compromised PCs are out there. In fact, numerous other security experts this year have spotted single botnets that include &lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/04/kraken_creates_a_clash_of_the.html&quot;&gt;upwards of 350,000 compromised PCs&lt;/a&gt;. And by nearly all accounts, there are thousands of distinct botnets out there today under the thumb of criminal groups and individual hackers.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/09/number_of_bot-infected_pcs_sky.html&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;color: #999999;&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/9205373401055559800/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/9205373401055559800' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/9205373401055559800'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/9205373401055559800'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/09/number-of-bot-infected-pcs-skyrockets.html' title='Number of Bot-Infected PCs Skyrockets'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-747190803062857792</id><published>2008-09-01T06:08:00.002+07:00</published><updated>2008-09-01T06:13:06.829+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="FBI"/><title type='text'>FBI Warns of Hit Man Scam Resurgence</title><content type='html'>The FBI is warning people not to be disturbed by an e-mail scam that threatens your life and orders you to pay up to avoid being the target of a hired hit man.&lt;br /&gt;&lt;br /&gt;The FBI &lt;a href=&quot;http://www.fbi.gov/cyberinvest/escams.htm&quot;&gt;said&lt;/a&gt; its Internet Crime Complaint Center continues to receive thousands of reports concerning the hit man e-mail scheme. The FBI notes that while the content of the missive has evolved since similar hit man scams first surfaced in late 2006, the message remains the same, claiming the sender has been hired to kill the recipient.&lt;br /&gt;&lt;br /&gt;In some cases, the use of names, titles, addresses, and telephone numbers of government officials and business executives, and/or the victims&#39; personal information are used in an attempt to make the fraud appear more authentic, the FBI said.&lt;br /&gt;&lt;br /&gt;I&#39;ve heard about these scams before, but never actually seen one of the e-mails until today. Below is a copy of one of the scams making the rounds now.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;/blockquote&gt;&quot;Dear Friend,&lt;br /&gt;Goodday to you.&lt;br /&gt;Am very sorry for you my friend, is a pity that this is how your life is going to end as soon as you don&#39;t comply. As you can see there is no need of introducing myself to you because I don&#39;t have any business with you, my duty as I am mailing you now is just to KILL/ASSASINATE you and I have to do it as I have already been paid for that.&lt;br /&gt;Someone you call a friend wants you Dead by all means, and the person have spent a lot of money on this, the person also came to us and told me that he want you dead and he provided us with your name, picture and other necessary information&#39;s we needed about you. So I sent my boys to track you down and they have carried out the necessary investigation needed for the operation on you, and they have done that but I told them not to kill you that I will like to contact you and see if your life is Important to you or not since their findings shows that you are innocent.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/08/fbi_warns_of_hit_man_scam_resu.html&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color:#999999;&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/747190803062857792/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/747190803062857792' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/747190803062857792'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/747190803062857792'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/09/fbi-warns-of-hit-man-scam-resurgence.html' title='FBI Warns of Hit Man Scam Resurgence'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-2444704131508864466</id><published>2008-09-01T06:01:00.002+07:00</published><updated>2008-09-01T06:08:06.480+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Email Address"/><category scheme="http://www.blogger.com/atom/ns#" term="Spam"/><title type='text'>Report: Email Address Dictates Spam Volume</title><content type='html'>&lt;strong&gt;The first letter of your email address is one factor in your spam risk, a researcher says&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;By Kelly Jackson HigginsSenior Editor, Dark Reading&lt;br /&gt;&lt;br /&gt;Everyone knows that some people get more spam than others, but &lt;a href=&quot;http://www.cl.cam.ac.uk/~rnc1/aardvark.pdf&quot; target=&quot;new&quot;&gt;new research&lt;/a&gt; shows that it may have something to do with the first letter of your email address. &lt;br /&gt;Richard Clayton, a security researcher at the University of Cambridge in the U.K., says he found evidence that the more common the first letter in your email address is, the more spam you get: in other words, alice@company.com typically gets a higher volume of spam than quincy@company.com, or zach@company.com. He says that’s simply because there are more combinations of names that begin with “A” than with “Q” or “Z.”&lt;br /&gt;&lt;br /&gt;Over an eight-week period, Clayton studied around 8.9 million emails at a U.K. ISP and found that the email addresses that began with “A” received 35 percent spam in their inboxes, while “Z’s” got about 20 percent -- after sorting out real emails versus invalid ones that had likely been generated by a spamming tool. Clayton says it’s likely that spammers using dictionary attacks could be the cause of this disproportionate distribution of spam.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.darkreading.com/document.asp?doc_id=162585&amp;amp;WT.svl=news1_2&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color:#999999;&quot;&gt;Dark Reading.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/2444704131508864466/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/2444704131508864466' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/2444704131508864466'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/2444704131508864466'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/09/report-email-address-dictates-spam.html' title='Report: Email Address Dictates Spam Volume'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-7743769480019123253</id><published>2008-09-01T05:56:00.001+07:00</published><updated>2008-09-01T06:01:24.256+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="U.S.Host"/><title type='text'>Report Slams U.S. Host as Major Source of Badware</title><content type='html'>Last week, I examined a series of Web services that make profiting from cyber crime a &lt;a href=&quot;http://voices.washingtonpost.com/securityfix/web_fraud_20/&quot;&gt;point-and-click exercise&lt;/a&gt; that even the most novice hackers can master. Today, I&#39;d like to highlight the activities of Atrivo, a Concord, Calif., based network provider that hosts some of these services.&lt;br /&gt;&lt;br /&gt;Several noted security researchers are releasing &lt;a href=&quot;http://www.hostexploit.com/&quot;&gt;a report&lt;/a&gt; today that stems from many months of investigating malicious activity emanating from Atrivo&#39;s customers. Security experts say that Atrivo, also known as &quot;Intercage,&quot; has long been a major source of spyware, adware, viruses and fake anti-virus products.&lt;br /&gt;&lt;br /&gt;The report is an exhaustive and well-researched analysis of Atrivo and its operations. Some of the statistics on active exploits cited in that report come from data sets I commissioned during my own investigation of Atrivo and later shared with &lt;strong&gt;Jart Armin&lt;/strong&gt;, the principal author of the report and curator of the blog &lt;strong&gt;hostexploit.com.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Looking back several years, Atrivo&#39;s various networks were used heavily by the &lt;a href=&quot;http://en.wikipedia.org/wiki/Russian_Business_Network&quot;&gt;Russian Business Network&lt;/a&gt;, an ISP formerly based in St. Petersburg, Russia. RBN had gained notoriety for providing Web hosting services &lt;a href=&quot;http://www.washingtonpost.com/wp-dyn/content/article/2007/10/12/AR2007101202461.html&quot;&gt;catering exclusively to cyber criminals&lt;/a&gt;. But after increased media attention, RBN &lt;a href=&quot;http://blog.washingtonpost.com/securityfix/2007/11/russian_business_network_down.html&quot;&gt;dispersed its operations&lt;/a&gt; to other, less conspicuous corners of the Internet.&lt;br /&gt;&lt;br /&gt;The portions of Atrivo most heavily used by RBN were &lt;strong&gt;Hostfresh&lt;/strong&gt; -- which provides routing for Atrivo through Hong Kong and China -- and &lt;strong&gt;UkrTeleGroup&lt;/strong&gt; (also known as &lt;strong&gt;Inhoster&lt;/strong&gt;) out of Ukraine. These two networks remain core components of Atrivo&#39;s operation, and recent data suggests the company&#39;s reputation for supporting online criminals hasn&#39;t diminished since the disappearance of the RBN last year. As of last December, Atrivo boasted the largest concentration of malicious activity of any hosting company, according to a report released by security intelligence firm &lt;strong&gt;iDefense.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/08/report_slams_us_host_as_major.html&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color:#999999;&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/7743769480019123253/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/7743769480019123253' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/7743769480019123253'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/7743769480019123253'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/09/report-slams-us-host-as-major-source-of.html' title='Report Slams U.S. Host as Major Source of Badware'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-4390163295621521201</id><published>2008-09-01T05:52:00.002+07:00</published><updated>2008-09-01T05:56:10.473+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft Patches"/><title type='text'>Microsoft Patches 26 Security Holes</title><content type='html'>Microsoft today released updates to fix at least 26 security vulnerabilities in its Windows operating systems and other software. At least 17 of those flaws earned Microsoft&#39;s &quot;critical&quot; rating, meaning they could be exploited to break into vulnerable systems with little or no help from the victim.&lt;br /&gt;&lt;br /&gt;The 26 vulnerabilities are the most Microsoft has addressed since it had 25 in August of 2006, which also included 17 rated as critical, according to anti-virus firm Symantec.&lt;br /&gt;&lt;br /&gt;Microsoft patched two holes in that have already been used in &lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/07/microsoft_hackers_exploiting_u_2.html&quot;&gt;targeted attacks&lt;/a&gt; against people browsing the Web with Internet Explorer 6 and 7. In addition to those two fixes, one bundle of critical updates plugs five other security holes in Internet Explorer, most of which Microsoft said are present all versions of the browser.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://voices.washingtonpost.com/securityfix/2008/08/microsoft_patches_26_security.html&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color:#999999;&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/4390163295621521201/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/4390163295621521201' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/4390163295621521201'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/4390163295621521201'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/09/microsoft-patches-26-security-holes.html' title='Microsoft Patches 26 Security Holes'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-3180966227752888455</id><published>2008-07-12T09:44:00.002+07:00</published><updated>2008-07-12T09:49:38.151+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="iPhone"/><category scheme="http://www.blogger.com/atom/ns#" term="iTouch"/><category scheme="http://www.blogger.com/atom/ns#" term="iTunes"/><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft Windows"/><category scheme="http://www.blogger.com/atom/ns#" term="OS X"/><title type='text'>A Baker&#39;s Dozen of Security Updates for iPhone 2.0</title><content type='html'>As expected, the 2.0 version of &lt;strong&gt;iPhone&lt;/strong&gt; released today includes a number of security updates, patching more than a dozen holes in the slimmed-down &lt;strong&gt;OS X&lt;/strong&gt; operating system that powers the devices.&lt;br /&gt;
&lt;br /&gt;
That means for those who already own Apple&#39;s mobile device, it&#39;s time to update.&lt;br /&gt;
&lt;br /&gt;
As detailed &lt;a href=&quot;http://blog.washingtonpost.com/securityfix/2008/07/apple_iphone_four_months_behin_1.html&quot;&gt;in a column last week&lt;/a&gt;, a number of these patches are updates that Apple shipped earlier this year for Safari and/or the version of OS X designed for Mac desktop and laptop computers. iPhone 2.0 bundles &lt;a href=&quot;http://support.apple.com/kb/HT2351&quot;&gt;some 13 security updates&lt;/a&gt;, five of which address previously undocumented security flaws. &lt;br /&gt;
&lt;br /&gt;
Among the more notable (if not serious) patches: One fix for the gadget&#39;s Safari Web browser that was addressed by a number of other software makers (including Mozilla) &lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2783&quot;&gt;back in June 2006&lt;/a&gt;. Another Safari update plugs a security hole that Apple sealed in its &lt;strong&gt;Microsoft Windows&lt;/strong&gt; version of Safari last month. Another fix corrects &lt;a href=&quot;http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0177&quot;&gt;a bug&lt;/a&gt; in the iPhone&#39;s innards that Apple said could allow remote attackers to reset a targeted iPhone by sending it a specially crafted packet. An exploit for this vulnerability has been available online since February. &lt;br /&gt;
&lt;br /&gt;
The new software is available for iPhone 1.0 and &lt;strong&gt;iTouch&lt;/strong&gt; 1.1 devices, through &lt;strong&gt;iTunes&lt;/strong&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://blog.washingtonpost.com/securityfix/2008/07/a_bakers_dozen_security_update.html&quot;&gt;Read more ...&lt;/a&gt;&lt;br /&gt;
&lt;font color=&quot;#666666&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/font&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/3180966227752888455/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/3180966227752888455' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3180966227752888455'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3180966227752888455'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/07/bakers-dozen-of-security-updates-for.html' title='A Baker&#39;s Dozen of Security Updates for iPhone 2.0'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-3380582234936309031</id><published>2008-07-12T09:37:00.000+07:00</published><updated>2008-07-12T09:43:17.276+07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Maryland"/><title type='text'>Speeding In Maryland Could Be Hazardous to Your Identity</title><content type='html'>If you&#39;ve ever received a traffic ticket in Maryland, your name, birthday, Social Security number and address may be posted on the Maryland state Web site for anyone to find, Security Fix has learned.&lt;br /&gt;
&lt;br /&gt;
Reader &lt;strong&gt;Mark Webster&lt;/strong&gt; from Annandale, Va., alerted me that the official &lt;a href=&quot;http://casesearch.courts.state.md.us/inquiry/processDisclaimer.jis&quot;&gt;Maryland court records Web site&lt;/a&gt; lists the personal data of countless citizens. The citations listed go back more than 30 years, and include records even for routine traffic stops that were ultimately dismissed. &lt;br /&gt;
The records with sensitive data in them appear to be limited to tickets issued to people who currently or at one time lived in a state that previously used the Social Security number as the default driver&#39;s license or customer number. [..]&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://blog.washingtonpost.com/securityfix/2008/07/maryland_traffic_site_lists_so.html&quot;&gt;Read more ...&lt;br /&gt;
&lt;/a&gt;&lt;font color=&quot;#666666&quot;&gt;Brian Krebs on Computer Security. The Washington Post Company.&lt;/font&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/3380582234936309031/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/3380582234936309031' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3380582234936309031'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/3380582234936309031'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/07/speeding-in-maryland-could-be-hazardous.html' title='Speeding In Maryland Could Be Hazardous to Your Identity'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6583027139354147229.post-1700065039061413521</id><published>2008-04-03T05:40:00.000+07:00</published><updated>2008-04-03T05:40:29.798+07:00</updated><title type='text'>April Fool&#39;s Day Warning, And Some Fun - Security Fix</title><content type='html'>&lt;a href=&quot;http://blog.washingtonpost.com/securityfix/2008/04/april_fools_day_warning_and_so.html&quot;&gt;April Fool&#39;s Day Warning, And Some Fun - Security Fix&lt;/a&gt;: &quot;April Fool&#39;s Day Warning, And Some Fun&lt;br /&gt;&lt;br /&gt;This post has been updated. Please read through to the end.&lt;br /&gt;&lt;br /&gt;Original post:&lt;br /&gt;&lt;br /&gt;The cyber criminal(s) behind the Storm worm want to make an April Fool out of you today.&lt;br /&gt;&lt;br /&gt;The Storm worm author(s) likes to use holidays and other notable calendar occasions to launch new attacks. True to form, new versions of the Storm worm were blasted out yesterday as links in an e-mail that included a taunting image of an idiot in a fool&#39;s costume wearing a &#39;kick me&#39; sign. Anyone foolish enough to follow the embedded directions telling recipients to &#39;click here, if your download doesn&#39;t start in 5 seconds,&#39; will hand their PC over to the bad guys.&lt;br /&gt;&lt;br /&gt;Image F-Secure.com&lt;br /&gt;&lt;br /&gt;The security news on this first day of April isn&#39;t all hackers and viruses. In fact, you&#39;d do well not to take anything you read online today too seriously. Below are a few of the more entertaining fake security news stories spotted so far today (hat tip to the SANS Internet Storm Center).&lt;br /&gt;&lt;br /&gt;F-Secure: A new Trojan horse program that actually deposits money into your bank account.&lt;br /&gt;&lt;br /&gt;Google: Introducing &#39;Gmail Custom Time.&#39; Didn&#39;t send that presentation on time? No problemo! Now you can back-date your G-mail messages.&lt;br /&gt;&lt;br /&gt;NASA: Giant Space Station Robot Turns on Crew (image).&quot; [..]&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://blog.washingtonpost.com/securityfix/2008/04/april_fools_day_warning_and_so.html&quot;&gt;Read more...&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(153, 153, 153);&quot;&gt;Brian Krebs on Computer Security. The Washington  Post Company.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://jpsec.blogspot.com/feeds/1700065039061413521/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/6583027139354147229/1700065039061413521' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/1700065039061413521'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6583027139354147229/posts/default/1700065039061413521'/><link rel='alternate' type='text/html' href='http://jpsec.blogspot.com/2008/04/april-fools-day-warning-and-some-fun.html' title='April Fool&#39;s Day Warning, And Some Fun - Security Fix'/><author><name>KruJATU</name><uri>http://www.blogger.com/profile/12977626066999333658</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFgfu1qsOVEEOpacSnK26yv5AhWCp8muWYXX2QLxHYgomKBQbUYXa7D8THX0K_w1Fogi82bnqKu_cC-moAw-N4Yok0DkUsmPOhMplXqDCk9AQ7-Y03N4wmDiuOWNL0Rw/s113/%282558_08_19%29+jaturapad.jpg'/></author><thr:total>0</thr:total></entry></feed>