Friday, June 28, 2013

Apple: Don't make nuclear weapons using iTunes

Contract





What exactly are you agreeing to when you click the little check box in the License and Terms statement? Are there hidden terms, like agreeing to not design or reproduce nuclear weapons with the help of the software you are using with Apple?


Warning


The warning in the End User License Agreement is protecting software makers against mass installation and distribution of their product. Most of us just scroll down to the bottom of the page and check the box.   Wanting to get rid of all that mumble jumble so we can get on with our gaming, right?  Maybe all that verbiage should be read with a little more caution. This could be what you are agreeing to without even knowing it:

  •  The company reserving the right to install spyware on your computer.

  •  The company reserving the right to change the agreement at any time...without your knowledge or consent.

  •  The right to publicly display and distribute content submitted from your computer.

  •  Giving up the right to sue.

Fake Flash Player 11 installer

These EULA's are not very user friendly.  How long would it take to read and understand an entire contract?  If I have a question about what's in the agreement is there a number I can call to get an answer right away or do I have to shoot someone an email or letter to get some answers?  I don't think the End User License Agreement is really meant for us to read...

The reason why I just scroll down and click agree is because I trust these companies.  Even if it's a new company or a product I've never used, when I see all the legal stuff I figure they have all their ducks in a row, so everything I just didn't read is most likely legit.

iTunes Paragraph G states:  ""You also agree that you will not use these products for any purposes prohibited by United States law, including, without limitation, the development, design, manufacture or production of nuclear, missiles, or chemical or biological weapons."


;

Are you the Owner


In some EULAs, the companies state that although you purchased the product with money, it's still not yours. You haven't actually bought the goods/services/software; you are temporarily licensing it.


Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:

CNET
http://news.cnet.com/8301-17852_3-57591531-71/apple-dont-make-nuclear-weapons-using-itunes/
Published June 28, 2013

TotallyWP
http://totallywp.com/2013/06/28/apple-dont-make-nuclear-weapons-using-itunes/
Published June 28, 2013

InputOutput
http://h30565.www3.hp.com/t5/Feature-Articles/5-Most-Ridiculous-EULA-Clauses/ba-p/657
Published Jan. 11, 2011

Image courtesy of [adamr] / FreeDigitalPhotos.net

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+

Google Goes Wild

Google Trekker has revealed their street view expansion project is being taken to new heights.  Google is recruiting  third-party organizations such as non-profits, tourism boards, research organizations, government agency's, Google Trekkerand universities to literally "take a hike"!   These hikers will strap on the Street View Trekker back-pack equipped with a 15-lens camera system that takes photos every 2.5 seconds.  The lens sticks up over your head to get a 360-degree view of the world less traveled.  It works similarly like the Google Maps Street View car cameras.

So now you can be a part of history, by taking the world to the secluded islands of Indonesia, or through the thick jungles of Costa Rica.  Hikers will gain the ability to visualize their hike before they even start packing for it.


"With 360-degree interactive imagery of the islands, people all over the world can see and explore the beautiful islands before they go, including some remote and hard-to-reach places they may never have discovered on their own," Google Street View program manager Deanna Yick wrote in a blog post.


Trekker for All Around TravelTrekker Trail


This amplification of the Trekker program will likely inspire people to travel more often, in turn boosting our Travel and Tourism.  Google is very ambitious to, "build the very best map of the world."   The decision to partner with third-party organizations are going to move this project along at lightening speed.   In March, Google Maps released a way for on goers to  visit the peaks of Mount Everest, Kilimanjaro, Aconcagua, and Mount Elbrus.

If you're heading to someplace awesome and want to take the world along with you, sign up for the Trekker backpack and start planning your adventure.   So instead of taking the guided tour on your next vacation, you can be our tour guide.  Happy Travels!

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:
Google loans out Street View Trekker for global exploration
http://news.cnet.com/8301-1023_3-57591455-93/google-loans-out-street-view-trekker-for-global-exploration/
Published June 27, 2013

Capture the World With a Borrowed Google Trekker Backpack
http://www.wired.com/gadgetlab/2013/06/borrow-a-google-trekker/
Published June 28, 2013

Google Trekker Gets You Off-Limits Access To Exotic Locations Like The Island From Bond’s Skyfall
http://techcrunch.com/2013/06/28/google-trekker-gets-you-off-limits-access-to-exotic-locations-like-the-island-from-bonds-skyfall/
Published June 28, 2013

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Thursday, June 27, 2013

XBox Update

Microsoft is bowing down to the fans.   They have removed the draconian restrictions on the Xbox One!  When the XBox One was first introduced, fans expressed great concern that  the system might demand unreasonable online requirements...they were right!  So now you don't have the internet check-ins every 24 hours and no fees for the used games.   If users didn't check in every Xbox One24 hours, Microsoft would block the entire games library.  Users would then be limited to only TV and Blu-ray ffunctionality.   Now the system only requires the internet set-up once during installation.   Even though, the system isn't as smart as we would like it to be.  When playing games online, you still have to make the connection, but offline, single-player games can be played for days, months, or however long you wish.

The XBox One will allow users to lend games freely among themselves, the same goes for the XBox 360.
"There will be no limitations to using and sharing games" - Don Mattrick, president of Microsoft's Interactive Entertainment Business

This "sharing" applies to disc-based games, even though, there is no convenient way to share downloadable titles.

One potential drawback is that the Xbox One disc-based games will require the disc in order to function, as does the Xbox 360.    Users used to be able to install entire games from discs.    Microsoft has not told us why this functionality was removed, but it may be to provide downloadable versions of titles with a feature to set them apart from physical copies.

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

[TechNewsDaily]

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Head-To-Head: Samsung vs. Apple


Apple-Samsung


Samsung ATIV Book 9 vs. Apple MacBook Air


The newly announced slim Samsung ATIV Book 9  runs Windows 8 comes with an industry-leading 3200 x 1800 display , but can it hold a candle to Apple’s newest Retina Display MacBook Air?  The two competing flagships seem evenly matched for the most part.

Samsung has tinkered with the 9's hinge to make it lock in place when open, for more stability.  If you want more leverage, you can disable the screen lock and push it back so it lies flat onto your surface area. With the battery pack withstanding 9 hours of life, this puts it in the same ballpark of the MacBook Air.  In comparison to Samsung's new line with Apple's latest MacBook Air series, which launched June 10.  There is mention that Apple, always on the cutting edge, built its new line using a chip that was unveiled only a week earlier--Intel's 4th generation Haswell chip, its most advanced and power-efficient processor to date.
New Specs

In performance, Apple’s 13-inch Retina Display MacBook Pro comes equipped with a 2.5-GHz dual-core Intel third generation Core i5 chip with 8GB of RAM configurable to Core i7.  If you opt for the $1,699 version instead of the $1,499 edition, you’ll get a slightly faster 2.6-GHz CPU instead.  Samsung’s ATIV Book 9 Plus comes with Intel’s new fourth generation Core i5 CPU and is configurable up to Core i7 with 8GB of RAM.

The Run Down


Currently, the Samsung ATIV Book 9 has better specs in every category with a newer processor, sharper screen, lighter chassis and higher-resolution screen.  With that said, the MacBook Air has Retina Display with a bigger battery life of Lithium polymer and 10 hours of movie playback or 12 hours of wireless web. As well as the Intel HD Graphics 5000 processor, and supports multi digital output ports with optional adapters. The ATIV Book 9 comes with a 1.4GHz Intel Core i5 2537M CPU with Intel HD Graphics 3000 and 1600x900 maximum resolution. Adding more pixels is great, but color quality is equally important, particularly when both displays are sharper than many human eyes can see.

Samsung offers seven different models while Apple is a bit simpler. Samsung's product is compelling compared to the MacBook Air, it stands up in nearly every aspect. With the MacBook Air, for about $100 more you get the same specs with a slightly lower resolution and slower dual-core but with more HD capabilities. So you choose...


Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.


References:



CRN
http://www.crn.com/slide-shows/mobility/240156973/head-to-head-samsung-ativ-book-9-vs-apple-macbook-air.htm?pgno=1
Published by Edward J. Correia June 20, 2013

CNET
http://www.cnet.com/laptops/samsung-ativ-book-9/4505-3121_7-35796875.html
Published on June 20, 2013

LAPTOP
http://blog.laptopmag.com/ativ-book-9-plus-vs-macbook-pro
Published by Lisa Eadicicco June 20, 2013



Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Wednesday, June 26, 2013

Criminals are Hacking Webcams to Spy on Young Girls!



British talk radio station has revealed the many hackers who spy on adolescent girls via webcams on compromised PCs.

eset-internet-security

An investigation by BC Radio Five Live, found a profitable underground market disposing access to victims, know as "slaves".  These attackers get into PCs using emailed malware, on top of them getting into your personal accounts, they are also making money from it!

They use "Remote Access Tools", known as "ratting", this allows the hackers to get into webcams and access hard drives and personal files on the compromised PCs.


Yahoo Defends Plan to Recycle User IDs Amid Identity Theft Fears


Yahoo! MailYahoo defended its plan to recycle inactive user IDs this week, saying that it had put in place safeguards to prevent the recycled usernames being used for identity theft.

The internet company claimed that only 7% of inactive IDs are tied to Yahoo! email accounts. The company also said that it had worked with major technology companies such as Google to reduce the rick the IDs could be used for fraud.

David Harley, Senior Research Fellow at ESET, says, “What Yahoo is missing here is that it isn’t just about deleting data formerly associated with a Yahoo account – I wouldn’t expect anything else from a ‘reset’. But Yahoo can only do that with data that it actually stores itself. Where an account is – or has been – linked with data that Yahoo doesn’t control, the risk will increase that those data are potentially exposed to a new user, possibly even a malicious user targeting a specific account.”

Dylan Casey, a senior director for consumer platforms at Yahoo said, “Can I tell you with 100 percent certainty that it’s absolutely impossible for anything to happen? No. But we’re going to extraordinary lengths to ensure that nothing bad happens to our users.”

Casey, speaking to Reuters, said that the risk of identity theft was “something we are aware of and we’ve gone through a bunch of different steps to mitigate that concern. We put a lot of thought, a lot of resources dedicated to this project.”

The post Yahoo defends plan to recycle user IDs amid identity theft fears appeared first on We Live Security.
Source:
WeLiveSecurity.com

Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet, “Like” us on Facebook or add us to your circle on Google+

BIOS Too Easily Bypassed

More and more hardware stores wish to use the NIST 800-155 specification in order to keep the firmware BIOS more secure for both PCs and laptops. However, a team of researchers belonging to the Computer SecurityMITRE Corporation state that the approach that is being presently used relies too much on the mechanisms responsible for access control. Their reason behind this is that these mechanisms are easily bypassed currently.



The researchers plan to unveil newly developed concepts that can slyly get past the TPM (Trusted Platform Module) chip and allow it to continue believing that nothing is wrong with the software. The malware can then continue infecting the BIOS even after it has been altered in any way, for example if it has been reset or flashed. Even an update may not be able to secure the software in this case.


How the Malware Gets Passed BIOS




As of now, the BIOS flash chip contains the code required for the system TPM chips to function.They are neededMotherboard so that the measurement and PCR (Platform Configuration Register) keep the BIOS from being infected. However, affecting this with the malware allows it to manipulate the PCR into changing its value, following an inconsistency between this and the TPM.



Two different malware that are said to be unveiled at Black Hat are now called the “tick” and the “flea” for their abilities to either be stealthy or be able to jump between BIOS revisions. The flea is said to be able to predict a firmware update and hide itself to be a part of the update as well.

Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Image courtesy of [Salvatore Vuono, wandee007] / FreeDigitalPhotos.net

Tuesday, June 25, 2013

Your Privacy is at Risk!

The Spy Next Door: Private Surveillance Has Never Been Easier



Government Spying
Do you feel like your personal information is being freely thrown around at your expense?  Not only can the government  spy on you, surveillance hardware and software are just a purchase away. These spying tools have never been more accessible or affordable than they are now.  Understanding how your privacy is at risk can help you gain control of your life.

What's more, the legal regulations dealing with privacy are unpolished and lacking in clarity. In other words,


"There's never been a better time to be the spy next door." -TechNewsDaily



To purchase the necessary spying gear isn't that hard. All you need is money!

Spy-goers can purchase cameras disguised as dictionaries, alarm clocks, house plants, desk lamps, teddy bears and sunglasses, from the range of $95-$300.

We're talking about going all James Bond status with the purchase of a few gadgets.


A License to Spy


Aaron SwartzThe Fourth Amendment protects against unreasonable searches and seizures. The wording of the Amendment is geared specifically towards the government, it does not apply to private citizens performing these acts.

Cindy Southworth, vice president of development and innovation at the National Network to End Domestic Violence, says that domestic surveillance becomes illegal when it becomes systemic.
"If you walk by once and hear something versus if you walk by every day for a year, that's a very difference. It's what differentiates domestic violence and stalking from other things. It's a pattern of behavior."


Aaron's Law


Legislation that would make it more difficult for the government to prosecute people for violating an online company's terms of service was introduced on June 20th, 2013 by U.S. Rep. Zoe Lofgren (D-Calif.).

The bill is called Aaron's Law. This is in remembrance of the activist Aaron Swartz. If passed, this law would modify the Computer Fraud and Abuse Act (CFAA), the law makes unauthorized use of computers or digital technology a federal offense. This bill would remove noted redundancies in the CFAA at which point a person can be charged multiple times for the same crime.

Swartz  was charged in 2011 for allegedly using Massachusetts Institute of Technology servers to download a total of 4 million academic journal articles from JSTOR, a digital library that offers subscription-based access.

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:

[via: technewsdaily]

Jillian Scharr, TechNewsDaily Staff Writer
Published June 20, 2013
http://www.technewsdaily.com/18402-spy-next-door.html?cmpid=527305

http://www.technewsdaily.com/18404-aarons-law-hacking.html?cmpid=527305



Don’t miss out on the latest tech news and computer security alerts! Follow us on Twitter at @hyphenet,  “Like” us on Facebook or add us to your circle on Google+

Monday, June 24, 2013

Dell Multifunction Color Printer C1765nfw for $339!

Empower your business to do more with the affordable and versatile Dell C1765nfw color printer from Dell. The Dell C1765nfw color printer offers print, scan, copy and fax functions in a single Multifunction Color Printerdevice. With fast printing speeds of up to 15 ppm in black and 12 ppm in color, this printer ensures excellent performance every time you print. The Dell C1765nfw color printer features versatile and easy network connectivity with embedded Ethernet and WiFi. Impress with crisp text and brilliant color prints with up to 600 x 600 dpi (up to 1200 dpi image quality). Handle high-volume printing jobs with a large duty cycle of up to 30,000 pages a month.

Get excellent print quality and reliable printing with Dell Clear View LED technology. Easy to use and operate with four-row LCD display and 34 button operator's panel. Optimize energy efficiency with the ENERGY STAR qualified Dell C1765nfw color printer featuring innovative LED printing technology. With Nuance PaperPort 14 software preloaded the Dell C1765nfw color printer can quickly scan, organize, view, edit and share documents and photos from your PC. Achieve professional quality color prints with this Multifunction Color Printer.

Special Features:


  • Dell Multifunction Color Printer C1765nfw

  • Multifunction printer - color - LED

  • Legal (8.5 in x 14 in) (original)

  • Legal (216 x 356 mm) (media)

  • up to 15 ppm (copying)

  • up to 15 ppm (printing)

  • 160 sheets - 33.6 Kbps

  • USB 2.0, LAN, USB host, Wi-Fi


Dell Multifunction

Call (619) 325-0990 to order a Dell Multifunction Color Printer today!



Buy of the Week offer valid through June 30th, 2013.


Note: Shipping and taxes apply.

Looking for something else? Check out our monthly deals or contact us to get a quote on the product you’re searching for.

Disposable Hardware

Coming To the Point Of Disposable Hardware


Today powerful hardware is available in the market for such cheap rates that researchers are considering developing hardware that is disposable. Due to the competition in the market producers today are coming out with more and more affordable gadgets. Today we can buy Android tablets for thirty dollars. Many people would assume that the specifications are terrible, but the truth is that it comes with a ten inch screen, fully Wi-Fi enabled, four GB worth of storage space, and a 512 RAM running the Android 4.1 software.
Disposable Hardware


What You Lose to Win


The truth is, today you lose almost nothing to get a bargain. Quite a few of us would doubt low cost hardware since we have this pre-conceived notion that the lower the cost for such gadgets, the lower the quality. Surprisingly however, you actually find that although the cost is dropping drastically, the hardware quality remains top-notch. An amazing feat, today you may purchase video recorders at eight dollars, cell phones at a meager eleven dollars (without a contract), and even a touch screen video player at less than thirty dollars a pop.


How Disposable Hardware Will Help


The fact is, although today you are able to get hardware at a reasonable price, people want more. This unfortunately means that whenever there is a new model out, the previous one is considered outdated, and is soon tossed. There are schemes where you get discounts for returning old hardware, however, something slightly more environment friendly could be incorporated.

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:

Hack Things
http://www.hackthings.com/get-ready-for-disposable-hardware/

Disposable Hardware
http://www.computorcompanion.com/LPMArticle.asp?ID=356

Android 4.1
http://gigaom.com/2012/09/24/android-4-1-update-samsung-galaxy-s-iii/



Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

Friday, June 21, 2013

Are Facebook and Microsoft Giving the Government your PersonalInformation?

Microsoft, Facebook Make No Mention of Government Requests


Earlier on, Microsoft and Facebook had requested their users to input personal data and said that it was as per the direction of authorities of the US government. When asked later what matter the information was for, the companies only said that they are still unable to disclose what matter the information was for. Some say that it was to help the search of a missing child. However, many people are upset by the way the companies sidelined the users and did not make any mention of the reason for taking personal data from the users.


Why People Are Upset


Some information may have actually been needed for certain operations regarding national security. But the people of America feel that having been active participants in the matter, they deserve some reconciliation. They feel they should know how their acceptance of allowing their personal details being given to the government has helped. It is understandable that this may have been for a very good cause, however, some are unhappy at the breach of privacy without good reason so far.


Facebook and Microsoft’s Comments on the Matter


The companies mentioned on their corporate blogs that they have been swamped by thousands of queries and comments sent in by users. They also mentioned that they are allowed to give out any data which the government deems to be a matter of national security. This may even include FISA Orders or Directives, according to John Frank, the current deputy counsel at Microsoft.

Facebook and Microsoft

 Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.

References:

Facebook can now say more on user surveillance
http://www.foxnews.com/tech/2013/06/15/facebook-can-now-say-more-on-user-surveillance/
Published June 15th, 2013

Facebook Microsoft Government Broader Surveillance Revelations
http://www.nydailynews.com/news/national/facebook-microsoft-government-broader-surveillance-revelations-article-1.1373545
Published June 15, 2013

Microsoft and Facebook Release Number of National
http://www.fool.com/investing/general/2013/06/15/microsoft-and-facebook-release-number-of-national.aspx
Published June 15, 2013

Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

Image courtesy of [Free Digital Photos] / FreeDigitalPhotos.net

Wednesday, June 19, 2013

Sony PS4 Remote Play

Remote Play with the PS4 and PSP Vita


PSP Remote Play



At the reveal event for the new Sony PS4, it was mentioned a few times that the new update to Sony’s gaming console the PlayStation may be able to interact with its equivalent handheld device, the PSP Vita. The newest IP, Knack, was used by Mark Cerny, a famous video game industry figure, as a demo piece to show how the device need not be connected only to your television set. Remote Play is an option that has been available in many previous versions of the PlayStation, but had not been supported well. You may now experience a new generation of gaming where you have the option of gaming on your console while you are connected to the internet.


What’s Good and What’s Not


Live streaming theoretically allows you to use your handheld PSP while you are on the move, and yet be connected to your console at home. This is similar to the way Microsoft’s Nintendo Wii U’s new gamepad controller works. Sony is trying to bring forth this feature, as it is under-used today, and is trying to propagate the usage of this option in gaming consoles worldwide, not only restricted to their own appliances. If everything goes as expected, Remote Play could become a feasible option and may even go to become standard for any new releases related to gaming consoles or other hardware devices. The only place this option is not feasible, however, is the fact that some titles require the camera of the PS4 for the entire experience.


Please visit http://www.hyphenet.com/blog/ for more blog posts on the latest technology and IT security news.


References:

PS4 Gaming Requires Remote Play Compatibility
Published June 1st, 2013 - http://www.bit-tech.net/news/gaming/2013/06/01/ps4-games-require-vita-remote-play-compatib/1



PS4 Games Require Vita Remote Play
Published May 30th, 2013 - http://metro.co.uk/2013/05/30/ps-vita-remote-play-mandatory-for-all-ps4-games-3820266/



Sony Mandates Vita Remote Play
Published May 29th, 2013 - http://www.eurogamer.net/articles/digitalfoundry-sony-mandates-vita-remote-play-for-ps4-games



Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

Monday, June 17, 2013

Dell XPS 12" UltraBook - Flip-hinge for $1125!

Dell_Ultrabook_Fliphinge

The XPS 12 convertible Ultrabook is constructed from durable materials - machined aluminum, bonded Corning Gorilla Glass and carbon fiber - for an experience that's premium in every way.

Dell XPS 12 - Ultrabook - Core i5 3337U / 1.8 GHz - Windows 8 Pro 64-bit - 4 GB RAM - 128 GB SSD - 12.5" TrueLife wide 1920 x 1080 / Full HD - Intel HD Graphics 4000

 

Product Features:


Dell_XPS

1 Year Dell NBD Warranty

MFR# 469-4075

Dell XPS - Fliphinge



Call (619) 325-0990 to order a Dell XPS 12" UltraBook - Flip-hinge today!


Buy of the Week offer valid through June 21st, 2013.

Note: Shipping and taxes apply.

Looking for something else? Check out our monthly deals or contact us to get a quote on the product you’re searching for.

Wednesday, June 12, 2013

Malware on the Rise

Microsoft is clearly the industry leader in terms of operating system and it still has a firm hold over that position. In recent times, the company has had a quiet time in terms of security risks, especiallyBackdoor Malware after the introduction of  Windows 8. However, a new type of malware is being distributed for the Windows OS through German spam that affects the boot record of the infected computer. Also, this malware can also give the hacker control of the infected computer.

Distributed Via Attachment


Trend Micro was the company that was responsible for the detection of this new type of malware. The researchers who analyzed this malware said that it was attached to the German spam mail, and is code named BKDR_MATSNU.MCB. The mail will claim that the recipient has to pay some money to the sender, and all the relevant details have been attached to the mail. Trend micro researchers claimed that this method is very effective in influencing the recipients to open the attachment.



Ransomware Reaction


Once the malware is downloaded and installed on the victim’s computer, the data is collected and sent to the hacker who planted the malware. Once that is done, the malware is capable of erasing the boot record on the drive, erasing data, and also locks the screen of the computer. The victim is then asked to pay a certain sum of money if the screen has to be unlocked, the classic ransomware approach.

 

Links:

German Ransomware Threatens Victims, Disables PCs | Security ...

www.technewsdaily.com/18282-german-ransomware-disables-computers...

6 days ago – If you become a victim of the BKDR_MATSNU.MCB ransomware, getting it off of your system may not be as simple as running a virus scan.

 

Compromised Japanese Sites Lead to ... - Threat Watch

www.trendmicro.eu/smartphone/content.php?m=TrendLabs...i...

Jun 5, 2013 – Like any backdoor, BKDR_MATSNU.MCB performs certain malicious commands, which include gathering machine-related information and ...

 

Backdoor.AndroidOS.Obad.a, an Advanced Android Malware Threatens Users

http://thedroidguy.com/2013/06/backdoor-androidos-obad-a-an-advanced-android-malware-threatens-users/

Jun 8, 2013 - A known computer security company revealed that there is an advanced Android malware..

 

Be sure to follow us on Twitter at @hyphenet or “Like” us on Facebook to stay up-to-date on the latest security threats.

 

Super Malware that Attacks Android Discovered

Android and security threats go almost hand in hand as new and imminent Android_Malware_Newsthreats are discovered on almost a weekly basis in today’s market. However, there was no threat that could potentially uproot Google’s Android as one of the most popular mobile operating systems in the world. But all that is set to change now, as a new virus has been detected that is very advanced and attacks the Android operating system in a new and innovative way. Also, the code is a little hard to completely remove, and can potentially detract users from using Android in the future.

Super_Malware_Android

Deadly Characteristics of the Virus


When a security researcher performs an assessment of any malicious software, he or she considers the most dangerous traits of that malicious software. From that viewpoint, this is one of the most dangerous Android malware discovered. Firstly, the code is so complex that it looks almost like a code that is written for a Windows computer, or even more advanced. The code also uses obfuscation techniques to confuse the OS about its true nature, thus evading detection. But the most dangerous trait of this malware is that it has been programmed to resist attempts of uninstallation by the user.

Kaspersky Labs behind the Discovery


Kaspersky, a leading security products company, detected this malware in Android and said that is has the capability of single handedly bringing down the Android operating system. They also reported that this malware exploits vulnerabilities in the Android OS that were previously, quite literally unknown.

References:
Android super-malware discovered – Is Google's platform in peril ...

virusfreephone.com/.../android-super-malware-discovered-is-googles-pla...

View shared post

4 days ago – Android super-malware discovered – Is Google's platform in peril? ... Android Mobile Attacks Spreading Across The Globe, McAfee Finds ›.

Android super-malware discovered – Is Google's platform in ..

malware.rsspump.com/?...android-super-malware-discovered--is...

View shared post

4 days ago – Android super-malware discovered – Is Google's platform in peril? ... and anti- malware software in light of the recent malicious attacks across  ...

Monday, June 3, 2013

Xerox DocuMate 3115 - Sheetfed Scanner for only $330 + shipping!

Xerox DocuMate 3115 - Sheetfed scanner - Duplex - Legal - 600 dpi - up to 15 ppm (mono) / up to 15 ppm (color) - ADF ( 20 sheets ) - up to 500 scans per day - USB 2.0Xerox DocuMate 3115

The Xerox DocuMate 3115 has all the features you expect in a powerful desktop scanner such as a 20-page automatic document feeder (ADF), 30 images per minute duplex scanning speed, and Visioneer OneTouch with Kofax VRS technology. Then at the push of a button, the DocuMate 3115 ejects from its docking station to become a full function mobile scanner. When undocked, the DocuMate 3115 can be powered by a second USB cable instead of an AC adapter, providing a true mobile experience for users on the go.

Modern offices are no longer defined by traditional walls and desks, so when your work space is not contained within four walls, you need a scanner with flexibility. Whether scanning contracts, forms, receipts, photos, ID cards, handwritten notes or virtually any document of varying size or complexity, the DocuMate 3115 does its job so you can do yours. It is the perfect companion for anyone in the fields of healthcare, real estate, construction, financial services or insurance.

If you can't search your scanned documents by their content, you might as well be looking at paper again. The DocuMate 3115 can scan automatically to searchable PDF. The Xerox DocuMate 3115 integrates Kofax VRS image enhancement technology into the OneTouch scanning process.

specs

 

Call (619) 325-0990 to order a Xerox DocuMate 3115!


Buy of the Week offer valid through June 7th, 2013.

Note: Shipping and taxes apply.


 

Saturday, June 1, 2013

More Digitally Signed Versions of OS X Spyware Found

The Mac has been one of the highly targeted operating systems for the online miscreants and it seems that the ‘KitM’ spyware has more versions than the online security firms had found. The KitM had caused a huge uproar in the Mac community due to its effect. Recently, researchers reported that they found the spyware from as long ago as 2012 December. This version was apparently targeting users who converse in the German language.

 

mac_spyware



What is HackBack?


The KitM virus is known by a lot of other names, ‘Kumar in the Mac’ and ‘HackBack’ being the most prominent of the lot. According to the security threat researchers that unearthed this spyware, this is a typical backdoor program. The spyware has the capability of taking screen shots of the infected computer screen without authorization, and sends these shots to the command and control server. The command and control server, also known popularly as C&C, is controlled by the miscreant that planted the spyware.

Another dangerous activity that the KitM virus enables is the reverse shell opening. This shell will enable the hacker to control the infected computer from the C&C server. Commands can be executed, data can be stolen, and the range of activities that can be executed is virtually unlimited.

 

Signed with Apple ID


The most amazing property of the KitM spyware, detected in a human rights activist’s computer, was that it had a valid Apple employee ID as a digital signature. The ID corresponded to one Rajinder Kumar. This enables the spyware to actually bypass the security checks of many older versions of the Mac system.

 

Reference Links:

Researchers find more versions of digitally signed Mac OS X spyware
www.macworld.com/.../researchers-find-more-versions-of-digita...

by Lucian Constantin - in 98 Google+ circles

May 23, 2013 – Researchers find more versions of digitally signed Mac OS X spyware. Security researchers have identified multiple samples of the recently ...

 

Slyck.com • View topic - Researchers Find More Versions Of ...
www.slyck.com/forums/viewtopic.php?t=61458

May 23, 2013 - 1 post - 1 author

Security researchers have identified multiple samples of the recently discovered " KitM" spyware for Mac OS X, including one dating back to ...

 

Researchers find more versions of digitally signed Mac OS X spyware
www.phoenixlocalshops.com/researchers-find-more-versions-of-digitally...

May 23, 2013 – Security researchers have identified multiple samples of the recently discovered “ KitM” spyware for Mac OS X, including one dating back to ...

 

Researchers find more versions of digitally signed Mac OS X spyware
news.yahoo.com/researchers-more-versions-digitally-signed-mac-os-x-1...

May 23, 2013 – Researchers find more versions of digitally signed Mac OS X spyware ... of the recently discovered "KitM" spyware for Mac OS X, including one ... Dog Found Standing Guard Over a Tornado Victim Reunited With Her Owner ...

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 2.0 Generic License.