Cyberweapons: Bold steps in a digital darkness?
Cyberweapons: Bold steps in a digital darkness? In the world of armaments, cyber weapons may require the fewest national resources to build. That is not to say that highly developed nations are not without their advantages during early stages. Countries like Israel and the United States may have more money and more talented hackers. Their software engineers may be more skilled and exhibit more creativity and critical thinking owing to better training and education. However, each new cyberattack becomes a template for other nations — or sub-national actors — looking for ideas. Stuxnet revealed numerous clever solutions that are now part of a standard playbook. A Stuxnet-like attack can now …
Affiliate Downloader
Don’t really have an article to comment on this time. Instead let me add a little something that jumped in my lap. Or maybe you could say, jumped on my computer. It may be that you too run into this and after reading about it here, you will have the answers on how to remove it. My little episode began with my antivirus running out. So I thought I would try another with an equivalent level of protection. Sadly, the new antivirus would not install without removing the firewall in place. I started then just to go back to what I knew worked except trying new stuff is how you …
How to detect computer viruses in pirated software
The software, music, movies piracy is a reality of our days, we like it or not. Although it’s illegal, some argue the use of pirated software(warez) mentioning the high cost of it, the lack of money or simply is using it because “it is there”, on some warez forums or blogs, without thinking too much at legal issues. This article has not as topic this debate if the warez use is justified or not, it’s everyone’s responsibility how they answer to this question and what are their actions. Certainly, embedding malware, especially computer trojans in program’s setup files and spreading the links via warez forums is one of the different …
After the hack
After the hack According to published reports, Visa and MasterCard recently warned card-issuing banks that a third-party payments processor suffered a security breach. This breach may have exposed the Track 1 and Track 2 data needed to counterfeit cards. The compromise, according to both KrebsonSecurity and The Wall Street Journal, happened sometime between January 21 and February 25. It’s not clear if attackers had access for that entire period. Source Here is where the driving force is to tame the internet. To turn it into the merchant’s wet dream. The idea of having a store with unlimited shelf space, without having to meet all the requirements of a brick and …
ABCs for ISPs
ABCs for ISPs The Anti-Bot Code of Conduct for Internet Service Providers A Voluntary Industry Code to Help Reduce End-User Bots The Federal Communications Commission’s CSRIC Working Group #7 released a new voluntary code of conduct for ISPs and network operators on March 22, 2012 as a cooperative industry-government initiative. The Anti-Bot Code of Conduct for Internet Service Providers (ABCs for ISPs), included in the FCC CSRIC Final Report of March 2012 includes the opportunity for participating network operators to be listed publicly on their own and official industry websites. Source The spammers and bot-herders will have to come up with a new method should this take hold. Those ISPs …
A mass infection system or a file sharing website? fileze.com
Maybe some of you have met the next weird situation: you want to download a trial of a program, a shareware, from a well established downloading site but when you click the download button instead of the wanted program, another little program is downloaded and executed in the computer, it’s the so-called “download manager” which in its turn downloads the desired program. Nobody fully understands this scheme, why is needed by this “download manager” instead of offering directly the wanted program but a lot suspect this program of “grey” missions. The concerns are raised when the antivirus software detect these “download managers” as adware or spyware and there must be …
Critical Windows bug…
Critical Windows bug could make worm meat of millions of high-value machines Microsoft has plugged a critical hole in all supported versions of Windows that allows attackers to hit high-value computers with self-replicating attacks that install malicious code with no user interaction required. The vulnerability in the Remote Desktop Protocol is of particular concern to system administrators in government and corporate settings because they often use the feature to remotely trouble-shoot e-mail servers, point-of-sale terminals and other machines when they experience problems. RDP is also the default way to manage Windows machines that connect to Amazon’s EC2 and other cloud services. That means potentially millions of endpoints are at risk …