NVISO’s new Android malware scanner A really great tool available to all android users, it works similiar to services we have all grown to love in the past like virustotal,jotti and other online virus scanning tools and anti malware communities.But this one scans APK files (android apps) and helps people figure out if their malware,This website is so crucially needed in this point in time after reports came out that 1 in 10 of all android apps statistically are some form of malware due to all the unregulated third party appstores and websites with bad security,shady developers hiding new strains of malware in legitimate looking apps and all types of new exploit that we haven’t encountered before.

This site should have a significant impact in the amount of android devices infected and a site where people can upload their android apps and have them scanned quick and easily to see if their infected or malicious is a great thing, we encourage all android users to check it out and use it.The Android community needs more tools like this to fight back against the alarming growth of android based malware.

[ GUYS I’m desperate here. Okay, it’s really not that bad, but just super annoying and I really want it to stop. 

So I posted a little while ago about green underlined in-text ads, but I was able to opt out of it. Now, I’m getting blue in-text ads, and it’s not letting me opt out. I checked my chrome extensions, no weird extensions. I’ve run every malware/adware/virus scan I can, and absolutely nothing. I can’t think of anything else. I’ve even uninstalled chrome and reinstalled it, and it’s still there. Can someone help? ]

Hackers roban los registros de 4,5 millones de pacientes del sistema de salud

Hackers roban los registros de 4,5 millones de pacientes del sistema de salud

Un sistema de salud que abarca 29 estados, anunció el lunes que los cibercriminales que operan desde China robaron información de aproximadamente 4,5 millones de pacientes, incluyendo nombres, fechas de nacimiento y números de Seguro Social. (more…)

View On WordPress

The Minds of The Monsters That Lurk Under Our Beds

I remember years ago, mid/late 2000s I think, hearing a story about two security researchers - Japanese, IIRC - who were scanning and mapping the internets for whatever reason (probably looking for machines to pop). When you set out for such a project, one usually has their shit together; you aren’t just poking around the net on Windows 98 with no protection and screaming “Ph33r me I aRe l33t hax0rz”.

Anyway, they happened to be hitting a particular corporate netblock just then - I don’t recall which - and one of the researchers just happened to be at his console logged into one of the machines doing the scanning at that moment. He had a process monitor up which he was reviewing (for Windows people: think Task Manager, but command-line driven, and useful). He noticed something odd, I don’t recall if it was a strange process running, or if one was eating CPU cycles in a weird way or what, but he noticed something about the processes, and one particularly unusual process, was running as root…

That is all I vaguely remember about the story and do not recall what they did after that.

The point is, they were basically just pinging IP addresses. But as the story goes:

  1. they pinged an IP
  2. and the IP pwned them

I also don’t know if the story is true (or where I heard it from) but, if it is, then there is some scary shit out there on the Net.

I wonder if this was maybe part of the NSA’s MonsterMind program (or something similar), and if the researchers were probing the networks (or just this one) in such a way that the NSA’s AI took notice of them, and fired something back which pwned their boxen. I don’t know… none of us do. That is part of the problem. And, if AI are going to automatically attack boxen w/o any humans in the loop to preempt these actions, this is highly problematic as well.

I mean, how many times have you stayed up late into the night because some code didn’t work correctly? Or (for non-hackers), how many times have you fought with a computer because it did something stupid and it took you hours or days to fix? Code is shit and programmers make mistakes (sometimes “features”;-). What if the NSAs code is bad too? I don’t want some NSA bot automatically attacking me because my traffic looks peculiar. This is like being executed in the street by police for looking “suspicious” (maybe black).

Security and malware researchers have it even worse, because they are deliberately (but not maliciously) generating traffic that would get them fired upon. This is how they secure their businesses or create fixes for malware that are infecting us. Yet, because of these good deeds, they are treated as enemies of the State.

Then again, mayhaps the State views those who are technologically literate this way all along. Either way, this continued weaponization of the Network is bad news for everyone.

~ P

Malware nos sistemas da UPS

Malware nos sistemas da UPS

A UPS revelou esta semana que foi descoberto malware nos sistemas de 51 das suas lojas UPS espalhadas pelos Estados Unidos.

Segundo a notícia do The Wall Street Journal, a empresa fez saber que as informações dos clientes, incluindo endereços, endereços de e-mail e informações dos cartões de crédito, estiveram expostas entre os meses de Janeiro e Agosto deste ano.

O malware foi eliminado dos…

View On WordPress

Software created by the controversial UK-based Gamma Group International was used to spy on computers that appear to be located in the United States, the UK, Germany, Russia, Iran, and Bahrain, according to a leaked trove of documents analyzed by ProPublica.

It’s not clear whether the surveillance was conducted by governments or private entities. Customer e-mail addresses in the collection appeared to belong to a German surveillance company, an independent consultant in Dubai, the Bosnian and Hungarian Intelligence services, a Dutch law enforcement officer, and the Qatari government.

The leaked files—which were posted online by hackers—are the latest in a series of revelations about how state actors including repressive regimes have used Gamma’s software to spy on dissidents, journalists, and activist groups.

Text
Photo
Quote
Link
Chat
Audio
Video