p00aul said:

Hi, I am Paul. I am a game programmer at SICO. Can you make me a favour and test one new game called Stormfall? It is the best new online game coming soon. Be one of the first one to see it, at MY BLOG you can play it. Let my know how was it! Paul :d




Metasploit dev releases zero-day exploit as a deterrent against offshore conmen.

Tech support scams are nothing new—we first went in-depth almost two years ago on “scareware scammers" who cold-call unsuspecting victims and try to talk them into compromising their computers by installing remote control applications and handing the keys over to the scammers.

We even managed to engage with one for a protracted length of time, with deputy editor Nate Anderson playing the role of a computer neophyte and recording the entire mess. But one developer has taken things a step further, producing a tool that will enable you to fight back if targeted—if you don’t mind a bit of bad acting yourself.

Matt Weeks is one of the developers who contributes code to the open source Metasploit Project, a sprawling and continually updated security framework that functions as a repository for software vulnerabilities and is frequently used as a Swiss Army Knife for penetration testing. Weeks has published a long report on his site detailing how he was able to reverse-engineer the encrypted communications protocol used by Ammyy Admin, one of the most popular remote control apps used by tech support scammers, and then use that knowledge to ferret out a vulnerability in the Ammyy Admin application.

Home Depot confirms data breach, hit by same malware as Target

Home Depot has confirmed its payment systems have been hacked at nearly 2,200 stores in US and Canada. The stealing-code used for the breach could reportedly point at a Russian connection in the case.

The US’s fourth-largest retailer announced on Monday it investigates five months of transactions now that the cyber-attack was apparent. While the company officials do not specify the possible scale of the damage done, experts believe it could turn out one of the biggest data breaches in history.

"We owe it to our customers to alert them that we now have enough evidence to confirm that a breach has indeed occurred," Chairman and Chief Executive Officer Frank Blake said in a statement. "It is important to emphasize that no customers will be responsible for fraudulent charges to their accounts."


New Post has been published on http://www.sanitarium.fm/archives/5572

Twitch viewers beware: there’s a malware-using chatbot about

If you’ve ever hung out in the Twitch chat of even a moderately popular streamer, you’ll have realised what a madhouse it can sometimes be in the chats. Those without a good modbot, moderators or an engaged slowmode can quickly become unreadable. Now there’s a new hazard that’s going around, …… read more »

Hackers lock up thousands of Australian computers, demand ransom

Thousands of Australian computers are being locked up by hackers using malicious software that encrypts files and asks for a ransom to make them available again.

Fairfax Media understands Australian government agencies and a number of large enterprises and individuals have been successfully targeted by the scam.

Called “Cryptolocker” and “CryptoWall”, the “ransomware” comes in various forms with the CryptoWall version estimated by the government e-safety alert service Stay Smart Online to have infected approximately 20,000 Australian computers.

10 Things You Need To Know Before The Opening Bell
Via Google Yahoo & Bing News Search Malware
September 19, 2014 at 01:50PM

Morning! Here are the big stories making an impact on the world today. 1. Scotland Voted NO To Independence. By a margin of 55% to 45%, Scotland’s electorate rejected the opportunity to become independent . That’s not the end of it: the promises made late in the campaign probably mean a ll the countries in the United Kingdom wil be getting new powers . 2. Markets Are Loving The No Vote.  The …

Read more: http://ift.tt/1r6s2qH

McAfee, one of the best antivirus software companies, offers a paid program that keeps your laptop/computer safe from various Trojans, virus, and malware infections.

▼ Reshared Post From Broovo c ▼

How to Disable McAfee Antivirus in Windows 8
#McAfee, one of the best #antivirus #software companies, offers a paid program that keeps your #laptop /computer safe from various #Trojans , #virus , and #malware infections. However, this #program may create various problems while updating or #installing other programs in your computer. McAfee starts behaving oddly while virus removal and this causes your computer to become unstable. Henceforth, it often becomes a necessity to disable McAfee Antivirus in Windows 8 to make your computer work properly again.


are any of my followers knowledgeable on computer viruses and malware?

i have recently developed a fascination for malware, and have done research on the topic. the interest spawned a desire to find the name of a virus i got on my computer when i was younger. under the readmore is a description of the virus and its effects, as detailed and specific as i can possibly remember for easier identification.

warning for cursing and gendered slurs. i’ve censored them, if it makes it any better.

Read More

Home Depot: 56M Cards Impacted, Malware Contained


Home Depot: 56M Cards Impacted, Malware Contained

Home Depot said today that cyber criminals armed with custom-built malware stole an estimated 56 million debit and credit card numbers from its customers between April and September 2014. That disclosure officially makes the incident the largest retail card breach on record.

5 Myths About Keeping Your Computer Safe From Attacks

Lance Cottrell has 5 myths that show us we’re not all that secure behind our firewalls and internet safety tips.

  1. I am not a target. The Truth: Do you own an email account? Do you own a computer? You are a target. A hacker’s goal could be simply to use your email to send spam.
  2. I am smart enough to spot phishing attacks. The Truth: Today’s hackers are highly sophisticated and so their phishing attacks have become highly personalized. They know your interests and your friends’ names, so be careful the next time you open a seemingly safe email.
  3. I delete my cookies, so I can’t be tracked, identified, or targeted. The Truth: Hackers don’t have to use cookies to track and identify you. You also have an IP address and super cookies that websites use to store your information even when you delete regular cookies and your computer. Your computer and browser are also very unique. For example any website can see if you are “utilizing Windows 8, Chrome 36.0.1985.125, the AmazonMP3DownloaderPlugin, or a 2560x1440x24 screen resolution.”
  4. If I avoid the Internet back alleys I am safe. The Truth: To be a successful hacker you would want to utilize high traffic websites. “Heavily used shopping sites and search engines are 20 times more likely to deliver malware than counterfeit software sites, and 182 times more likely than porn sites.”
  5. My firewall and anti-virus software will protect me. The Truth: Firewalls and anti-virus software only do part of the job and don’t offer complete protection. Firewalls lets your browser do anything it wants and “even the best anti-malware scanners only detect 45 percent of attacks.”

So how do you protect yourself? Is the answer that you can’t? In my opinion the best answer is to prepare yourself for being attacked. Make those backup discs your computer keeps reminding you to make. Have those important files and photos on a backup hard drive. Keep scanning your computer for malware and Lance Cottrell says to not be complacent and remember that there’s an urgency for new ways to protect us from being targets.

Cisco unveils threat-focussed security solutions for enterprises
Via Google Yahoo & Bing News Search Malware
September 19, 2014 at 03:31PM

Networking solutions firm Cisco today launched a new firewall security solution that automatically assesses threats, correlates intelligence and optimises defence to protect the network of the enterprise.

Read more: http://ift.tt/1qQTwDg
12 years old and finally over: Is the Harkonnen Operation the longest - running malware campaign so far?

ZDNet / David Shamah / September 15, 2014

The end has finally come for probably the longest-lived online malware operation in history — a scam that since 2002 has been targeting banks, corporations and governments in Germany, Switzerland, and Austria.

The ‘Harkonnen Operation’, as it has become known, involved more than 800 UK-based phony front companies — all using the same IP address – that helped install malware on victims’ servers and networks. In all, some 300 corporations and organisations were victims of the well-organised and executed attack.

Source: ZDNet

How Jennifer Lawrence's Boobs Broke the Internet

How Jennifer Lawrence’s Boobs Broke the Internet: Fake Links to Nude Celebs Overload New Zealand’s Telecommunications Network


Malware trap Brings New Zealand’s Internet to its Knees

AFP – It is believed a handful of computer users clicked links on Friday evening believing they would take them to the illicit images, but instead they inadvertently installed malware triggering a crippling Internet attack.

Fake Links to Nude Celebs Overload New Zealand

“For obvious reasons, clicking on links to ‘naked celebrity’ photos, or opening email attachments would be a very bad…

View On WordPress

In our fast paced society getting yourself and your business out there sometimes may seem an unattainable goal.  It can be very stressful trying to improve your business while juggling work, school…

The following are some tips to promote your Computer Repair business, regardless of what you specialize in.

1. Don’t Be Afraid

  • It’s cliched, but failure is a part of life. If you don’t put yourself out there and just go for it sometimes, you may end up with more regret than you previously had before.
  • When an opportunity presents itself, take it and make the most of it, only then will you have the courage to move on and keep learning
  • Don’t let fear paralyze you, use that energy to create something positive and use it  to push yourself into the unknown

2. Use Craigslist Efficiently

  • Craiglist Computer Services section is a goldmine if utilized effectively, and efficiently
  • DO NOT create your ad in all caps as this will immediately throw people off
  • Limit your posting to once a day and include a well design picture of your logo and anything else you might want to upload, BUT KEEP IT PRETTY, nobody wants to look at some lame clip art from 98 of a jpeg computer
  • Make your ad look like a resume, it should be crisp, to the point with a list of all the services you offer; use borders, proper paragraph spacing and develop a fluidity to the flow of text

Read more here

Cisco unveils threat-focussed security solns for enterprises
Via Google Yahoo & Bing News Search Malware
September 19, 2014 at 03:27PM

New Delhi, Sep 19 (PTI) Networking solutions firm Cisco today launched a new firewall security solution that automatically assesses threats, correlates intelligence and optimises defence to protect the network of the enterprise.

Read more: http://ift.tt/1uilu8p