Those has account with LinkedIn would see a spite of spamming mails for last few months because LinkedIn email server was hacked. Linkedin was not bother to encrypt users’ email addresses is truly an eye-opening on how suck is suck this US listed company.
At least one to five spamming mails purportedly from LinkedIt are coming into my mailbox each day. They are all phishing junk mails with virus infected link to corrupt your PC once you click and visit the infected website.
Adobe hacked, Yahoo may be next
A hacker broke into Adobe’s servers and posted the contents of its database online, a hacker-oriented news site reported.
The Hacker News said an Egyptian hacker, ViruS-HimA, claimed to have dumped the database containing more than 150,000 emails and hashed passwords.
Quoting the hacker, The Hacker News said the next target may be Internet pioneer Yahoo.
“ViruS_HimA desire(d) to demonstrate that despite Adobe (being) one of the most important compan(ies) in (the) IT landscape, it leaks of a proper security defense. For the same reason the hacker announced that next target will be Yahoo,” it said.
For its part, Adobe said it is now investigating the reported compromise of its Connectusers.com forum database.
In a blog post, it said these reports first started circulating late November 13.
“At this point of our investigation, it appears that the Connectusers.com forum site was compromised by an unauthorized third party. It does not appear that any other Adobe services, including the Adobe Connect conferencing service itself, were impacted,” it said.
For now, Adobe said it took the Connectusers.com forum site offline and is resetting the passwords of impacted Connectusers.com forum members.
“We sincerely apologize for the inconvenience this may cause to our forum members. Your security is of critical importance to us, and we appreciate your patience as we work towards restoring Connectusers.com forum services,” it said. — RSJ, GMA News
Most antivirus software purposely coded to stop you from using other antivirus software by using lame excuse of incompatibility.
The “certain third-party software” have been identified by Symantec to include the following products:
PGP Whole Disk Encryption
SlySoft Virtual CloneDrive
Usually they ask you to uninstall third-party software from their competitors first. This practice is unethical.
Symantec explains Windows XP ‘blue screen of death’ outbreak
Summary: The security firm is ‘restructuring’ its SONAR signature quality assurance process after an incompatibility took down a number of Symantec-protected Windows XP machines last week
By David Meyer |
Symantec has explained a compatibility problem that saw some of its Windows XP-using customers experience the ‘blue screen of death’ last week.
The company said on the weekend that a “full evaluation and root cause analysis of the issue” showed that the only customers to be affected were those running XP, certain third-party software, the latest version of Symantec’s behaviour-based SONAR technology, and the 11 July rev11 SONAR signature set.
“The root cause of the issue was an incompatibility due to a three-way interaction between some third-party software that implements a file system driver using kernel stack based file objects — typical of encryption drivers, the SONAR signature and the Windows XP Cache manager,” Symantec Security Response team member Orla Cox said in a blog post. “The SONAR signature update caused new file operations that create the conflict and led to the system crash.”
Continue reading >> You pay Symantec to crash your Win XP
Sometimes we may send out wrong, inappropriate and unthoughtful messages to your life partners, business partners, friends, boss and colleagues by mistake or impulse reaction.
You will regret forever for unable to stop such email message you have just pressed SEND button.
By using undo send feature under the Lab category, you can set undo send period up to 30 second in the mail server before the message is sending out. You can delete the message within the undo period after your head is cooling off or realize the stupid human error.
Go to Gmail setting, find the Lab button and enable undo send feature accordingly. After you enable it, then you can set the undo timing up to 30 second.
This undo send feature should be added to all company’s email systems.
I was told by an antivirus expert that all radars sold to Iraq were planted with virus codes or secret back doors. Western powers activated computer viruses hidden in the radar system to destroy Saddam Hussein’s military radars before invasion.
Malaysia should engage antivirus experts to screen and check its military hardwares are free from malicious codes.
Also, the expert told me Windows OSs have secret back door for Microsoft to enter your PC unnoticed.
Flame virus prompts Microsoft to boost Windows security
Boston: Discovery of the Flame virus that mainly affected computers in the Middle East, has prompted Microsoft Corp to strengthen the security of a Windows program that helps customers secure their PCs and update software.
Mike Reavey, senior director of the Microsoft Security Response Center, said in a blog post that the world’s biggest software maker plans to boost security measures on the Windows Update software that is included with the operating system that runs the majority of the world’s PCs.
Continue reading >> Cyberwar got nothing new as it had happened during the first Iraq war
How you trust Malaysian government website if their sign certificate also stolen and used by malware?
Their IT staff must be graduated from a third-world apartheid university.
Researchers spot malware using a stolen government certificate
By Dancho Danchev | November 15, 2011, 8:45am PST
Summary: Researchers from F-Secure have spotted a digitally signed malware using a stolen government certificate belonging to the Malaysian Agricultural Research and Development Institute.
Researchers from F-Secure have spotted a digitally signed malware using a stolen government certificate belonging to the Malaysian Agricultural Research and Development Institute.
From F-Secure’s post:
Every now and then we run into malware that has been signed with a code signing certificate. This is problematic, as an unsigned Windows application will produce a warning to the end user if he downloads it from the web — signed applications won’t do this. Also some security systems might trust signed code more than unsigned code.
In some of these cases, the certificate has been created by the criminals just for the purpose for signing malware. In other cases they steal code signing certificates (and their passphrases) so they can sign code as someone else. We recently found a sample signed with a stolen certificate.
According to the vendor, the malware spreads through malicious PDF files that drop it after exploiting Adobe Reader 8. Interestingly, F-Secure notes that “This particular malware does not gain much advantage of the signature any more, as the mardi.gov.my certificate expired in the end of September.”
The malware is currently detected as Trojan-Downloader:W32/Agent.DTIW.