Tuesday, April 28, 2009

Hide your tracks at work ???

· 0 comments

 

We all spend some of our time at work doing things that have nothing to do with our job. We surf the Web. We play games. Sure, we all need our downtime, and the enlightened manager knows that. But still, we'd rather just surf in private than deal with the raised eyebrows.

That's why we need ways to ensure that when our boss surprises us or sneaks up behind us, she'll think that we're actually working. Here's a list of apps and services that help.

Camouflaged Web services

SpreadTweet If you're a Twitter fanatic, try SpreadTweet. The software hides your Twitter stream in what looks like an Excel window. It displays everything in plain text to make it look like a real spreadsheet. It's sure to fool any boss.

1cup1coffee 1cup1coffee looks like a Windows Explorer pane (so don't use it on a Mac), but all those Word documents and Powerpoint presentations are actually a collection of Flash games. 1cup1coffeeSimply click on one of the "files" and you can play a game in what looks like your Windows Explorer window. If you hear your boss, you can hit the back button and you'll be brought back to the file listing.

Anonymizer If you don't want the IT folks to know what you're up to, spend $30 and get Anonymizer. The software redirects your Web traffic through its servers to not only safeguard your IP from outside sources, but also to get your employer's IT people off your trail.

C.H.I.M.P. Rearview Monitor Mirror chimpWhile playing a game or doing something you shouldn't, just glance up at the C.H.I.M.P. Rearview Monitor Mirror to see if your boss is approaching from behind. The mirror won't hide what you're doing, but it will give you some time to switch to something more appropriate. And in case you're wondering, C.H.I.M.P. stands for Chimp Has Invincible Monkey Powers. Yeah, I don't get it either. But it is worth the $6.99 price tag.

Don's Boss Page Don's Boss Page (no relation) is full of great boss trickery. If you want to aimlessly browse the Web, but make it sound like you're working, you can keep clicking the site's keyboard audio clips to make others think you're typing.

Quick tip: Resize your windows When I was an accountant, I used Outlook. To make everyone think I was so engrossed in my e-mail, I resized Firefox to fit perfectly in the Outlook preview pane. Anyone who walked by thought I was just reading an e-mail. If they ever got too close, I'd switch to another message. It worked beautifully.

Don't Panic 1.2 If you don't want to get busted by the boss, try installing Don't Panic 1.2 onto your Windows machine. The software will allow you to minimize multiple windows at the same time. You can also maximize multiple windows simultaneously to ensure your boss will be happy when they walk by.

Or just use keyboard shortcuts Brush up on your knowledge of keyboard shortcuts. Whenever you hear someone coming, you can quickly drop a few keys and you'll immediately look like you're working.  

StealthSwitch You'll have to pay $40 to get it, but StealthSwitch is worth the price -- until your boss finds it. Once connected to your computer via USB, StealthSwitch sits on the floor. While playing a game or doing something you shouldn't at work, you can quickly tap the StealthSwitch when you hear your boss approaching. It immediately makes the current window invisible and brings you back to a window that's related to your work. Once your boss walks away, you can tap the StealthSwitch again to get back to your game.

panicbuttonThe Last ( and my fav. too smile_tongue)  $25 USB Panic Button is similar, if you're quicker with your hands than your mouse and don't mind a garish missile-launch control button sitting on your desk. Simply push the plastic covering up, press the red button, and the tool will automatically change the screen on your computer to a spreadsheet, your favorite picture, your company's Web site, or anything else you set it to switch to.

from CNET

Njoy … (your work) … fingerscrossed

Saturday, April 25, 2009

Hackers created 1.6m security threats last year !!!

· 0 comments

 

Hackers were responsible for creating 1.6 million new security threats last year, says Symantec.

According to the security vendor's Internet Security Threat Report, the web was the primary source of infection, with hackers relying on methods to embed malicious code into websites.

"As malicious code continues to grow at a record pace we're also seeing that attackers have shifted away from mass distribution of a few threats to micro-distribution of millions of distinct threats," said Stephen Trilling, vice president at Symantec Security Technology and Response.

The report also revealed that 90 percent of attacks were designed to steal personal information such as names, addresses and credit card details.

"The unfortunate reality is that innocent web surfers can visit a compromised website and unknowingly place their personal and financial information at risk," added Marc Fossi, executive editor of the report.

"Computer users have to be extra vigilant about their security practices."

Symantec said that phishing websites had increased by 66 percent since 2007, with 55,389 found on the web. Spam also increased by 192 percent.

Symantec said that 349 billion spam messages were received in 2008, compared to the 119 billion in 2007. The security vendor blamed botnets, saying were responsible for 90 percent of the spam received.

from PCADVISOR

Njoy … fingerscrossed

Friday, April 24, 2009

H-1B visa filing drops by 50 percent !!!

· 0 comments

 

he protectionist measures and the economic slump in the U.S. have hit the demand for the H -1B visas as the U.S. Citizen and Immigration Council (USCIS) is yet to reach the targeted cap of 65,000 petitions for fiscal 2010. The council has received around 42,000 applications, which is just 'about half' the applications it needs for the quota to be filled.

H-1B-visa2

"The visa cap has not been met yet as there is not enough business in the U.S. The visa update also validates our argument that H-1Bs are not being used to replace American workers, because if that was so, companies would have flocked to file petitions amid lay-offs in the US. That has not happened," said Nasscom President, Som Mittal told Business Line. The Indian firms, which had filed around 11,000 visas last year have opted for less applications this year.
Poorvi Chothani, a U.S. immigration attorney based in Mumbai, admits her firm has seen a 50 percent drop in H-1B filings this time. "Besides the fact that the basic demand is less, other factors such as a possible fear of a backlash in employing foreign professionals, and Troubled Assets Relief Program (TARP) curbs are likely to have influenced the filings," she said. The USCIS maintained that due to the lowered rate of filing, it will continue accepting petitions till it receives the required number of petitions to meet the respective caps.

 

from SiliconIndia

Njoy … fingerscrossed

Thursday, April 23, 2009

DOD says … We're always under cyberattack

· 0 comments

 

In an interview for an upcoming edition of 60 Minutes, CBS News anchor Katie Couric asked Gates about the nation's cybersecurity after hackers stole specifications from a $300 billion fighter jet development program as well as other sensitive information.

In a series of spy attacks, hackers stole information about the Pentagon's F-35 Joint Strike Fighter project and the Air Force's air traffic control system, according to a Wall Street Journal report Tuesday.

The computer spies copied several terabytes of data from the Joint Strike Fighter project, the most expensive in Defense Department history, pertaining to the electronics and design systems of the aircraft, several current and former officials told the Journal. Officials said the separate incursion into the air traffic control system could allow intruders to interfere with military aircraft.DoD_Logo

Gates would not discuss the specifics of the attacks, but said, "I believe we still have security of the sensitive systems." Generally, "We think we have pretty good control of our sensitive information both with respect to intelligence and equipment systems, but we, like everybody else, is under attack. Banks are under attack. Every country is under attack," Gates told Couric.

But, he said, "It's sometimes very difficult to figure out a home address on these attacks so one of the things that I am doing in the budget is significantly increasing the resources for cyber experts. We're going to more than quadruple the number of experts that we have in this area. We're devoting a lot more money to it."

The source of the espionage appears to be China, according to a former official, though the origin of any attacks could be masked. Chinese officials deny any involvement and say U.S. suspicion is the result of a "Cold War mentality." Similar attacks have become more frequent in recent months, underscoring the increasingly heated battles taking place in cyberspace. Earlier this month, the Wall Street Journal reported that Russian and Chinese spies gained access to the U.S. electrical grid, inserting software that could disrupt the system.

In the Joint Strike Fighter attack, officials said that while spies made off with some data, the most sensitive information is stored on separate, non-networked computers. But the vulnerability lies in the Pentagon's reliance on private defense contractors, some foreign, who have less-than-secure networks. The breaches apparently took place in Turkey and another U.S. ally nation, according to the report.

While there is no U.S. agency currently dedicated solely to cybersecurity, the Obama administration is expected tode propose a senior White House post to coordinate military efforts to guard against further breaches. The White House may also look to extend a $17 billion security initiative originally planned by the Bush administration.

"This is going to be an enduring problem and it is going to be a challenge not just for the Department of Defense but for the entirety of the United States," Gates said.

from ZDnet ..

Njoy ??? … fingerscrossed

Wednesday, April 22, 2009

Supporting Piracy !!!

· 0 comments

 

The convictions and prison sentences handed down to the defendants in The Pirate Bay case have prompted Sweden's youth to action. The Pirate Party reports booming support as demonstrators turn out in force on Saturday.

The Pirate Party organized demonstrations against the convictions at several cities across Sweden on Saturday. More than 1,000 people turned out in Stockholm to show support for The Pirate Bay defendents and the practice of file sharing.
"We young people have a whole platform on the internet, where we have all our social contacts - it is there that we live. The state is trying to control the internet and, by extension, our private lives," said Malin Littorin-Ferm of the party's Ung Pirat youth league to the assembled crowd in Stockholm on Saturday. Since the Stockholm district court passed judgment on April 17th the Pirate Party confirmed on Saturday afternoon that its membership has swelled to 21,000. The party's youth league is now, with its 10,000 members, larger than all of the parliamentary party youth organizations.
To claim seats in the European parliament, to which elections will be held on June 7th in Sweden, the party must gain at least four percent of the vote and the support of Sweden's younger voters will be crucial to achieving this.
In the last European parliamentary elections the Swedish voter turnout was a mere 27 percent.
The debate around file sharing and the future of the internet has piqued the interest of many young people and could increase the voter turnout among the unusually large number of first time voters, concluded Henrik Oscarsson, a political scientist at Gothenburg University.
"If they can mobilize their passive support to the voting booth on June 7th then voter turnout could increase among this group. It is a long way to the four percent threshold," he pointed out.
The Pirate Party's leader Rickard Falkvinge is confident of the attraction of the party's platform.
"These citizens have never previously had a significant issue with which to become involved. It is not that politics does not interest young people - it is that the former generation's problems and political solutions do not interest the youth," he said.

Just a day before this demonstration … Internet service providers refuse to cooperate with an entertainment industry group's demand to shut down The Pirate Bay. The International Federation of the Phonographic Industry (IFPI) is demanding that Pirate Bay website be shut down.
But Internet service providers (ISPs) refuse to cooperate, reports the Svenska Dagbladet newspaper.
Neither has the judgement slowed down file sharing. Several minutes after the Stockholm District Court delivered the verdict, almost ten billion files were being downloaded.
The ISPs maintain that the ruling doesn't apply to them.
"In part, this is not a legally binding decision, but above all, this is a judgement against Pirate Bay and nothing that effects any service provider. We will not take any action (to block) the contents if we are not compelled to do so," Patrik Hiselius, a lawyer at Telia Sonera, told Svenska Dagbladet. Bredbandsbolaget and Com Hem had the same reply. Jon Karlung, managing director of Bahnhofs, said the judgement does not change anything.
"We will not censor sites for our customers; that is not our job. I am against anything that contradicts the principle of a free and open Internet."

By reading all these news , it seems that these pirate guys will not be convicted … or even if they will be , then they will not be charged notably … which will be not good , because it will encourage more piracy all around the world !!!smile_zipit

 

from theLocal ….

Njoy … fingerscrossed

Saturday, April 18, 2009

PIN Crackers Nab Holy Grail of Bank Card Security ….

· 0 comments

 

Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator.  The attacks involve both unencrypted PINs and encrypted PINs that attackers have found a way to crack, according to an investigator behind a new report looking at the data breaches.

The attacks, says Bryan Sartin, director of investigative response for Verizon Business, are behind some of the millions of dollars in fraudulent ATM withdrawals that have occurred around the United States.

"We're seeing entirely new attacks that a year ago were thought to be only academically possible," says Sartin. Verizon Business released a report Wednesday that examines trends in security breaches. "What we see now is people going right to the source ... and stealing the encrypted PIN blocks and using complex ways to un-encrypt the PIN blocks."

The revelation is an indictment of one of the backbone security measures of U.S. consumer banking: PIN codes. In years past, attackers were forced to obtain PINs  piecemeal through phishing attacks, or the use of skimmers and cameras installed on ATM and gas station card readers. Barring these techniques, it was believed that once a PIN was typed on a keypad and encrypted, it would traverse  bank processing networks with complete safety, until it was decrypted and authenticated by a financial institution on the other side.

But the new PIN-hacking techniques belie this theory, and threaten to destabilize the banking-system transaction process. Information about the theft of encrypted PINs first surfaced in an indictment last year against 11 alleged hackers accused of stealing some 40 million debit and credit card details from TJ Maxx and other U.S. retail networks. The affidavit, which accused Albert "Cumbajohnny" Gonzalez of leading the carding ring, indicated that the thieves had stolen "PIN blocks associated with millions of debit cards" and obtained "technical assistance from criminal associates in decrypting encrypted PIN numbers."

But until now, no one had confirmed that thieves were actively cracking PIN encryption.

Sartin, whose division at Verizon conducts forensic investigations for companies that experience data breaches, wouldn't identify the institutions that were hit or indicate exactly how much stolen money was being attributed to the attacks, but according to the 2009 Data Breach Investigations report, the hacks have resulted in "more targeted, cutting-edge, complex, and clever cybercrime attacks than seen in previous years." "While statistically not a large percentage of our overall caseload in 2008, attacks against PIN information represent individual data-theft cases having the largest aggregate exposure in terms of unique records," says the report. "In other words, PIN-based attacks and many of the very large compromises from the past year go hand in hand."

Although there are ways to mitigate the attacks, experts say the problem can only really be resolved if the financial industry overhauls the entire payment processing system. "You really have to start right from the beginning," says Graham Steel, a research fellow at the French National Institute for Research in Computer Science and Control who wrote about one solution to mitigate some of the attacks. "But then you make changes that aren't backwards-compatible."

PIN hacks hit consumers particularly hard, because they allow thieves to withdraw cash directly from the consumer's checking, savings or brokerage account, Sartin says. Unlike fraudulent credit card charges, which generally carry zero liability for the consumer, fraudulent cash withdrawals that involve a customer's PIN can be more difficult to resolve since, in the absence of evidence of a breach, the burden is placed on the customer to prove that he or she didn't make the withdrawal. Some of the attacks involve grabbing unencrypted PINs, while they sit in memory on bank systems during the authorization process. But the most sophisticated attacks involve encrypted PINs.

Sartin says the latter attacks involve a device called a hardware security module (HSM), a security appliance that sits on bank networks and on switches through which PIN numbers pass on their way from an ATM or retail cash register to the card issuer. The module is a tamper-resistant device that provides a secure environment for certain functions, such as encryption and decryption, to occur.

According to the payment-card industry, or PCI, standards for credit card transaction security, PIN numbers are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer's bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module's application programming interface, or API.

"Essentially, the thief tricks the HSM into providing the encryption key," says Sartin. "This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device." Sartin says HSMs need to be able to serve many types of customers in many countries where processing standards may be different from the U.S. As a result, the devices come with enabled functions that aren't needed and can be exploited by an intruder into working to defeat the device's security measures. Once a thief captures and decrypts one PIN block, it becomes trivial to decrypt others on a network.

Other kinds of attacks occur against PINs after they arrive at the card-issuing bank. Once encrypted PINs arrive at the HSM at the issuing bank, the HSM communicates with the bank's mainframe system to decrypt the PIN and the customer's 16-digit account number for a brief period to authorize the transaction.

During that period, the data is briefly held in the system's memory in unencrypted form. Sartin says some attackers have created malware that scrapes the memory to capture the data. "Memory scrapers are in as much as a third of all cases we're seeing, or utilities that scrape data from unallocated space," Sartin says. "This is a huge vulnerability." He says the stolen data is often stored in a file right on the hacked system. "These victims don't see it," Sartin says. "They rely almost purely on anti-virus to detect things that show up on systems that aren't supposed to be there. But they're not looking for a 30-gig file growing on a system."

Information about how to conduct attacks on encrypted PINs isn't new and has been surfacing in academic research for several years.  In the first paper, in 2003, a researcher at Cambridge University published information about attacks that, with the help of an insider, would yield PINs from an issuer bank's system.

The paper, however, was little noticed outside academic circles and the HSM industry. But in 2006, two Israeli computer security researchers outlined an additional attack scenario (.pdf) that got widespread publicity. The attack was much more sophisticated and also required the assistance of an insider who possessed credentials to access the HSM and the API and who also had knowledge of the HSM configuration and how it interacted with the network. As a result, industry experts dismissed it as a minimal threat. But Steel and others say they began to see interest for the attack research from the Russian carding community. But until now no one had seen the attacks actually being used in the wild.

Steel wrote a paper in 2006 that addressed attacks against HSMs (.pdf) as well as a solution to mitigate some of the risks. The paper was submitted to nCipher, a British company that manufactures HSMs and is now owned by Thales. He says the solution involved guidelines for configuring an HSM in a more secure manner and says nCipher passed the guidelines to customers.

Steel says his solution wouldn't address all of the types of attacks. To fix the problem would take a redesign. But he notes that "a complete rethink of the system would just cost more than the banks were willing to make at this time."

Thales is the largest maker of HSMs for the payment-card and other industries, with "multiple tens of thousands" of HSMs deployed in payment-processing networks around the world, according to the company. A spokesman said the company is not aware of any of the attacks on HSMs that Sartin described, and noted that Thales and most other HSM vendors have implemented controls in their devices to prevent such attacks. The problem, however, is how the systems are configured and managed. "It's a very difficult challenge to protect against the lazy administrator," says Brian Phelps, director of program services for Thales. "Out of the box, the HSMs come configured in a very secure fashion if customers just deploy them as is. But for many operational reasons, customers choose to alter those default security configurations — supporting legacy applications may be one example — which creates vulnerabilities." Redesigning the global payment system to eliminate legacy vulnerabilities "would require a mammoth overhaul of virtually every point-of-sale system in the world," he says.

Responding to questions about the vulnerabilities in HSMs, the PCI Security Standards Council said that beginning next week the council would begin testing HSMs as well as unattended payment terminals. Bob Russo, general manager of the global standards body, said in a statement that although there are general market standards that cover HSMs, the council's testing of the devices would "focus specifically on security properties that are critical to the payment system." The testing program conducted in council-approved laboratories would cover "both physical and logical security properties."

From Wired

Njoy … fingerscrossed

Sunday, April 12, 2009

Man Says He Has USB Drive in Prosthetic Finger ??

· 0 comments

 

It is the story of Jerry Jalava, 29, a self-described software developer from Finland who lost part of his left ring finger in May in a motorcycle accident.

Now, he says, he wears a prosthetic finger made of silicone, which looks fairly natural -- except that he can peel back the tip to uncover a USB drive tucked inside. Jalava's finger of the future has become a small Internet sensation.

cen_usb_finger_090318_mn

The USB drive -- also called a flash drive or thumb drive or memory stick -- contains 2 gigabytes of memory and can plug into almost any currently sold computer. Jalava keeps several computer programs on it, he says, and hopes eventually for an upgraded version.

My friends take it same way as I do," he told . "First, they are terrified, hearing about the lost finger, but then they are relieved and laughing after hearing about the USB finger."

Digitally Enhanced Digit

"It is not attached permanently into my body; it is removable prosthetic, which has USB memory stick inside it," he writes, in slightly broken English, on his blog protoblogr.net. "When I'm using the USB, I just leave my finger inside the slot and pick it up after I'm ready."

Jalava said he has two different prosthetic fingertips that he can use. The other is conventional, made to look like a natural finger, but Jalava says he does not plan to keep it that way.

"Right now I use it mostly when I need to do network inspections or memory testing on computers in our office," he said, "but when I get the latest one ready, it will be my single sign-on to my computer and my e-mails."

All this began one day last spring, Jalava says, when he was driving his motorcycle home from work. He hit a deer, slid a couple of hundred feet and lost the tip of his finger. He was taken by ambulance to a hospital in nearby Helsinki.

from ABC

Njoy … fingerscrossed

Saturday, April 11, 2009

Are We Breeding a generation of computer hackers ??, study warns !!!

· 0 comments

 

Researchers found that a large proportion of today's youngsters are devoid of "e-morals" and have no scruples about hacking into other peoples' emails, bank accounts or personal networking profiles.

More than 10 per cent of youths aged from 12 to 18 said they thought it was "cool" or even "funny" to pose as someone else online, while one in seven children aged 12 to 13 admitted they already had. A third of those polled said they would consider hacking or spying on the internet if they could earn money by doing so.

Forty per cent of youngsters admitted they had logged on to another person's social networking profile. The same proportion of young people had accessed someone else's online banking or email accounts. Boys were found to be twice as likely as girls to log into someone's social networking site. Girls were up to three times more likely than boys to access someone's online shopping or bank accounts without the owner knowing.

However, researchers also discovered that parents are setting a poor example for their children, as one in three said they had hacked into someone else's online accounts. The survey, which polled 1,000 children and parents across the Britain, was undertaken by internet security firm Trend Micro.

Company spokesman Rik Ferguson said: "These results come as a stark warning to parents become a lot more familiar with what their kids get up to when online.

"Parents need to ensure they lead by example at all times."

from Telegraph

Njoy ??? … fingerscrossed

Friday, April 10, 2009

Access any Hard Drive from internet …

· 0 comments

 

pogoplug

PogoPlug, available in North America as of today, is a cheap, straightforward, single-purpose device that aims to transform network-attached storage into an appliance. It combines any old USB hard drive with your existing Internet connection, and then, voila: everything delicious and convenient about network-attached storage is now within reach.

What is network-attached storage, you ask? It's any device that makes a hard drive available on a network and/or the Internet. Having a network-attached storage device means you can: access all your music, movies, and critical documents, no matter where you are; back up your important files to a single location; and share all your photos, media, and anything else with friends -- without the intervening step of uploading them to YouTube, Flickr, etc.

Here's how it works.

The PogoPlug is $99, and no bigger than the wall plate for a light switch. It resembles an oversized wall wart (like the one hanging off the end of your cell phone charger).

By design, it's dead easy. You plug it into the wall, and into your home router via an ethernet cable, and then into an external USB 2.0-compatible hard drive (or even USB thumb drive) which you've probably got sitting around anyway (and if you don't, they can be had very cheaply).

Go online, register your PogoPlug, and voila --  the drive connected to the PogoPlug is now accessible via my.pogoplug.com. No setting up IP addresses for your home server, or tunneling through your firewall, or needing a spare computer to use as a media server --  all of that is taken care of by a combination of firmware in the PogoPlug and an independent back-end service running on Cloud Engine's own servers.

And this is what it does.

Aside from all the things that any network-attached storage device is capable of, the PogoPlug does a number of nifty things, including automatically generating thumbnails for your media and transcoding video on the fly so that it can be streamed to remote devices without you having to wait for the whole thing to download first.

There's even an iPhone application in case you want to, say, access to every vacation photo you've ever taken, ever. Or swap out your tired playlist for some new music, even if you're in Aruba and your hard drive is in Saskatchewan.

Sharing files with friends is even easier --  you just punch in their email address and the PogoPlug software emails them a link; they don't even have to register. There's no backup software specific to the PogoPlug, though, which, unfortunately, means backing up is still a drag-and-drop operation.

Because it's based on the ultra-low-power Marvell chipset (Marvell works with the same ARM chips that show up in cell phones and portable gaming devices like the Nintendo DS), the PogoPlug draws fewer than 5 watts of power. Most external hard drives are smart enough to turn themselves off after a pre-set period of inactivity, so together the two devices aren't going to draw a lot of power unless you're hitting the server all day long --  even then, it's a lot less than the 20-100 watts that would be required to run a full-blown laptop or tower-based server.

If you want to get really crazy, Cloud Engine's engineers have apparently created an API for the PogoPlug. This means you could access it from any other website, thus making it a DIY media server. However, that would mean that your home or apartment would then be a DIY colocation facility, which is fine if you're sharing baby pictures but not so great if you're hosting business-critical files. Either way, it's nice to have the versatility, and it probably means hackers will come up with a number of cool, off-label uses for the device. 

Njoy … fingerscrossed

Wednesday, April 8, 2009

What is Social Media ???

· 0 comments

 

Definition from Wikipedia:

Social media are primarily Internet-based tools for sharing and discussing information among human beings. Social media is information content created by people using highly accessible and scalable publishing technologies. It is intended to facilitate communications, influence interaction between peers and with public audiences.

DetectorPRO opinion of social media:
I don’t think Social Media has to be an object or a tool. I think Social Media transpires anytime a conversation happens: talking to a friend at a coffee shop, standing on a soap box in the park, or even just walking around the city talking to random people.
Social Media is about the interaction, but we try to manage it through the tools.
And, a bit simpler: Social media is any online space where people have public conversations.

Social media humor:
But, if you browser looks like following picture you may consider yourself as a big social media person (as my colleague used to say: socialist), or at the other hand - you must go outside in the real world and socialize with real people FAST.

 

 

terrible-firefox

 

from DetectorPro

Njoy … fingerscrossed

Bill Gates’ own Facebook page !!!

· 0 comments

 

 

image

 

i am sure that Bill Gates … or even anyone mentioned in this facebook page … really does have it … but just imagine , how Mr. Gates would be doing if he really had it … smile_tongue

again from my same fav. site … geeks are sexy …

Njoy … fingerscrossed

Tuesday, April 7, 2009

Are we really ready for Cloud ??

· 0 comments

cloud-computing-kitchen-sink

All the data that make up our lives seem to be heading for the clouds. From photos on Flickr to memos on Google Docs, we are entrusting more and more to computers in giant data centers—a model called cloud computing. It's certainly convenient to have access to our stuff wherever we are and on whatever device we choose. But is it safe?

There are two kinds of risks in putting your data online. One is that you can never be quite sure who has access to your information once it has migrated beyond the hard drives and backup storage devices in your home. The other risk is that the information, and sometimes the applications you need to make use of it, may be available only when you are connected to the Internet and the service is up and running. These twin dangers are now abundantly obvious to users of a collaborative Web-based word-processing program called Google Docs. Google recently notified its users that a software glitch had allowed some subscribers unauthorized access to "a very small percentage" of these documents, which are stored on Google's servers.

The security of data stored in the cloud varies with both the design of the system and how well the safety measures are implemented. Some services encrypt information both in transit and in storage in such a way that only the owner can decrypt it. These services are generally the most secure against either accidental or malicious disclosure—though your information can be lost forever if you lose the password. In general, services that allow Web access to data from any computer are riskier than more restrictive systems, and those that allow the information to be shared among a group of users pose even greater hazards.

Sometimes you have control over this—for example, by declining an option that lets you access your data from a Web site. This choice is available on many online backup services and can be handy if, say, you are on the road and need to get a file that's on your home or business computer. But clearly that access increases the risk that your information could be exposed to third parties.

The security practices of cloud storage systems are usually described in the fine print of their security and privacy policies, but in practice it's difficult to assess safety. Corporations run security audits to gauge the practices of cloud computing operations, but this is beyond the reach of individuals or smaller businesses. The simpler course for most of us is to think before committing data to the cloud. Those photos from the family trip to Disney World ? No problem. But the term sheet for a proposed merger or acquisition should probably stay encrypted on a hard drive that you control. Anything in between? Just consider how much embarrassment or trouble it would cause in the wrong hands.

The issues of getting to your online data are less serious. The growing ubiquity of wireless services means there are fewer and fewer places where you can't get on the Net if you need to. Wi-Fi is even slowly creeping onto airplanes, the last wireless frontier.

Will your cloud service be there when you need it? Google got a lot of unwelcome attention recently when its Gmail service was unavailable for about three hours. Back in the days of the Ma Bell monopoly, AT&T promised 99.999% availability, which allowed a bit over five minutes of downtime a year. But "five nines" of reliability is fabulously expensive. Google promises its corporate Google Apps customers 99.9% uptime, which leaves room for outages of nearly nine hours a year. The fact is, most enterprises don't deliver higher reliability on their own systems; the difference is that outages on big public services get publicity.

Ultimately, putting your data in the cloud involves choosing convenience and productivity at the cost of some security risk. In the real world, convenience almost always wins, and there's nothing wrong with that. What's important is that you understand the dangers.

from BusinessWeek

Njoy …fingerscrossed

Friday, April 3, 2009

EVERY LINK YOU CLICK IS DANGEROUS !!!!

· 0 comments

 

internet-marketing

Well , title seems to be a bit more paranoidal … i should say …. every link you click can be dangerous ??? or simply … don’t click randomly ??? …. what ever it is … but the essence of the story is as follows …. from one of my fav. sites ….

Magic tricks are all about suggestion, psychology, misdirection and showmanship (see Tricks of the Mind), or as Cutter perhaps will say, every magic trick has tree parts: the pledge (where the magician shows you something ordinary), the turn (where the ordinary becomes something extraordinary), and the prestige (where the extraordinary turns into something you have never seen before).

In a similar way, real world information security breaches are combination of the characteristics you will often find in the performance of skillful magicians. Therefore, allow me introduce you to a simplistic form of an attack, perhaps so simple that in fact it may work far more often than we would like to admit, which skillfully uses suggestion, psychology, misdirection and a great doze of showmanship.

So, we’ve all heard of clickjacking and we know that it is a design bug and therefore it is very hard to deal with. However, are there other flawed areas of modern browsers design which can be abused? Of course there are. It just takes time to find them all because they are often well hidden underneath our common believes, ignorance and prejudice. Here is some code

<html> <body>

<script>

function clickme() {

var w = window.open('http://www.google.com');

setTimeout(function () { w.location = 'http://www.gnucitizen.org'; }, 5000); }

</script>

<input type="button" value="click me" onclick="clickme(this)"/> </body> </html>

 

Quite boring! I agree. First of all the user clicks on a button/link. Then a new tab/window opens which loads the content of http://www.google.com. Five seconds later, the newly created tab is preloaded with the content of http://www.gnucitizen.org. Do you find this code disturbing? I do. It is disturbing because it breaks the trust relationship that is going on between the user and google.com in this specific example. Call it surfjacking, framejacking,tabjacking or whatever you want to call it, but at the end of the day, I believe that this is just yet another form of bad design.

Here is another example. You browse the web, you click to digg a story, you get redirected to digg.com to login. SSL looks fine. The browser lights up all green. It is OK to type your username/password and you do. In the background, the page which initially took you to digg.com waits for you to login. It subsequently queries the digg.com login page for changes in the DOM structure by using script tags and error handlers to capture different error code offsets (check AttackAPI), and as such it tries to detect when you are fully logged on. It does these checks every half a second. Once a successful login is detected, it simply fires w.location = "some evil url here"; which will force the browser to render something else, perhaps something malicious, instead of the page that should have came after a successful authentication. Perhaps, the evil caller could even fire just a simple alert('Hey there!'); message as a form of misdirection and than return back the control with another w.focus().

Would you check the address bar again? Perhaps not, because the page which was forced onto you now contains similarly looking digg.com login page accompanied with some red and quite scary looking text which tells you that your login was unsuccessful. This is the psychology. The attacker uses the red color to distract your from the address bar so that you put all of your attention into the login form. You cannot escape your instincts. The forms screams at you that all you have to do is to fill in your username and password and everything will be fine again. You rush to fill in your credentials again. Your request is recorded. A 302 redirect fires back and the browser redirects you to your digg.com account like nothing has ever happened. This is the prestige.

As far as I know, although I might be wrong, this form of an attack is new. It is definitely not devastating and it wont break the Web. However, my honest opinion is that it does break a lot of things. For example, it breaks the user’s normal surfing experience. The good news is that there is an easy fix. Simply put, do not allow pages to redirect windows which are preloaded with content from a different origin! We fix this, we save the Web again.

from GNU Citizen

Njoy … fingerscrossed

Thursday, April 2, 2009

Ericsson to enable wireless kill switch for laptops !!!

· 0 comments

 

230x-259200,http---a323.yahoofs.com-ymg-null__12-null-36088585-1228264700.jpg-ymhGWrADEcIYxUjD A laptop remote-kill switch has long been a fantasy of those paranoid about theft and service providers alike. And now, with the latest wave of subsidized notebooks coming out of wireless carriers, said switches are coming in the form of a new mobile broadband card from Ericsson. The card, designed to work on HSPA/GPRS/EDGE networks, is slated for release in June, and carries with it a number of innovative features. But the most interesting is that it supports certain security options that work with Intel's anti-theft technology, allowing carriers to send a signal that will lock down the machine and make it unusable.

Ericsson's F3607gw module boasts reduced power consumption, prolonged battery life, and increased integration with the OS. Ericsson specifically highlights the F3607gw's wake-on-wireless feature, which allows users to remotely wake the notebook at specific times, like when an important message is received or the computer has been stolen.

"An anti-theft management service in the network can send a message via SMS to the mobile-broadband module inside the notebook, which securely transfers the message to Intel's Anti-Theft function inside the processor platform," says Ericsson. "This takes appropriate actions, such as completely locking the computer and making it unusable."

Intel's anti-theft technology (ATT) differs from current disk encryption because it would render the laptop useless even if the hard drive is replaced. While this may not help the victim get the laptop back, if widely adopted, ATT could deter thieves from stealing laptops in the first place if all they would end up with is an inoperable chunk of plastic and metal. Of course, if users want their data to be secure and for the laptop to be unbootable, it's probably wise to employ both ATT and some sort of disk encryption technology, in case the hard drive is removed and placed in another machine.

Theft isn't the only situation in which the machine may be remotely locked down, though. As noted by the AP, customers who bought their notebooks under heavy subsidies from wireless carriers in exchange for service contracts may also find their computers being locked down if they fall too far behind on their bills. This situation seems unlikely, however—not only would it be seen as a massive invasion of privacy for a carrier to lock users out of their own computers, but there will likely be a way for users to shut off the wake on wireless feature, rendering such attempts useless.

Njoy … fingerscrossed

Wednesday, April 1, 2009

US-CERT Advisory for Conficker worm …

· 0 comments

 

HISTORY …

Conficker, also known as Downup, Downadup and Kido, is a computer worm that surfaced in October 2008 and targets the Microsoft Windows operating system. The worm exploits a previously patched vulnerability in the Windows Server service used by Windows 2000,Windows XP, Windows Vista, Windows Server 2003, Windows Server 2008, Windows 7 Beta, and Windows Server 2008 R2 Beta . The worm has been unusually difficult for network operators and law enforcement to counter because of its combined use of advanced malware techniques.

Although the origin of the name "conficker" is not known with certainty, Internet specialists and others have speculated that it is a German portmanteau fusing the term "configure" with "ficken", the German word for "fuck !!!".  Microsoft analyst Joshua Phillips describes "conficker" as a rearrangement of portions of the domain name 'trafficconverter.biz'

Four main variants of the Conficker worm are known and have been dubbed Conficker A, B, C and D. They were discovered 21 November 2008, 29 December 2008, 20 February 2009, and 4 March 2009, respectively.

SYMPTOMS …

  • Account lockout policies being reset automatically.
  • Certain Microsoft Windows services such as Automatic Updates, Background Intelligent Transfer Service (BITS), Windows Defender and Error Reporting Services disabled.
  • Domain controllers responding slowly to client requests.
  • Unusual amounts of traffic on local area networks.
  • Websites related to antivirus software becoming inaccessible.

EFFECTS …

Experts say it is the worst infection since 2003's SQL Slammer. Estimates of the number of computers infected range from almost 9 million PCs to 15 million computers.The initial rapid spread of the worm has been attributed to the number of Windows computers—estimated at 30%—which have yet to apply the Microsoft MS08-067 patch.

Another antivirus software vendor, Panda Security, reported that of the 2 million computers analyzed through ActiveScan, around 115,000 (6%) were infected with this malware.

Intramar, the French Navy computer network, was infected with Conficker in 15 January 2009. The network was subsequently quarantined, forcing aircraft at several airbases to be grounded because their flight plans could not be downloaded.

The U.K. Ministry of Defence reported that some of its major systems and desktops were infected. The worm has spread across administrative offices, NavyStar/N* desktops aboard various Royal Navy warships and Royal Navy submarines, and hospitals across the city of Sheffield reported infection of over 800 computers.

On 13 February 2009, the Bundeswehr reported that about one hundred of their computers were infected.

A memo from the British Director of Parliamentary ICT informed the users of the House of Commons on 24 March 2009 that it had been infected with the worm. The memo, which was subsequently leaked, called for users to avoid connecting any unauthorized equipment to the network.

IN NEWS !!!

As of 13 February 2009, Microsoft is offering a $250,000 USD reward for information leading to the arrest and conviction of the individuals behind the creation and/or distribution of Conficker.

On 24 March 2009, CIRA, the Canadian Internet Registration Authority, locked all previously-unregistered .ca domain names expected to be generated by Conficker C over the next 12 months.[35]

On 31 March 2009 NASK, the Polish national registrar, locked over 150,000 .pl domains expected to be generated by Conficker C over the coming 5 weeks. NASK has also warned that worm traffic may unintentionally inflict a DDoS attack to legitimate domains which happen to be in the generated set.

Message , FROM United State Computer Emergency Readiness Team …

Conficker/Downadup worm, which can infect a Microsoft Windows system from a thumb drive, a network share, or directly across a corporate network, if the network servers are not patched with the MS08-067 patch from Microsoft.
Home users can apply a simple test for the presence of a Conficker/Downadup infection on their home computers. The presence of a Conficker/Downadup infection may be detected if a user is unable to surf to their security solution website or if they are unable to connect to the websites, by downloading detection/removal tools available free from those sites:
http://www.symantec.com/norton/theme.jsp?themeid=conficker_worm&inid=us_ghp_link_conficker_worm
http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx
http://www.mcafee.com
If a user is unable to reach any of these websites, it may indicate a Conficker/Downadup infection. The most recent variant of Conficker/Downadup interferes with queries for these sites, preventing a user from visiting them. If a Conficker/Downadup infection is suspected, the system or computer should be removed from the network or unplugged from the Internet - in the case for home users.
Instructions, support and more information on how to manually remove a Conficker/Downadup infection from a system have been published by major security vendors. Please see below for a few of those sites. Each of these vendors offers free tools that can verify the presence of a Conficker/Downadup infection and remove the worm:
Symantec:
http://www.symantec.com/business/security_response/writeup.jsp?docid=2009-011316-0247-99
Microsoft:
http://support.microsoft.com/kb/962007
http://www.microsoft.com/protect/computer/viruses/worms/conficker.mspx
Microsoft PC Safety hotline at 1-866-PCSAFETY, for assistance.
US-CERT encourages users to prevent a Conficker/Downadup infection by ensuring all systems have the MS08-067 patch (seehttp://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx), disabling AutoRun functionality (see http://www.us-cert.gov/cas/techalerts/TA09-020A.html), and maintaining up-to-date anti-virus software.

 

currently this worm is set to get active at 1st April , 2009 ( TODAY !!! ) … and yet nobody knows what’s it upto smile_zipit … lets hope people come with some sound solution to this perhaps the most notorious virus in history of viruses !!!

 

Njoy … fingerscrossed

parts from … US-CERT  and Wikipedia

Supporting the Cause

Creative Commons

Translate into your Language

New Day New Giveaway

Powered By Blogger