Blog

July 2011

Oslo bombing taken advantage of by Facebook scammers..

0

Estimated reading time: 2 minutes

Our sympathies to the people of Oslo after the tragic bombing in their city. Unfortunately within hours of the bombing Facebook scammers have latched on to the news and are trying to take advantage of the Facebook communities. The message spreading across on Facebook reads: “[URL] [Video] OSLO Security Camera...

OS X Lion: What’s new in Security

0

Estimated reading time: 3 minutes

Once you are done with the online installation experience and seen the upside-down mouse gestures and all the other bling that comes as part of OS X Lion, it is time to look at what has changed from the security point of view. Lion provides some significant security improvements. An...

Some good tips on credit card safety

1 Comment

Estimated reading time: 3 minutes

When it comes to credit card security I have seen both types of people. There are people who are paranoid about security and do not use credit cards at all or do not perform any online banking transactions at all. Then there are people who do not care about security...

Orkut phishing websites Hack’s Orkut Username & Password!!!

0

Estimated reading time: 1 minute

These days we have noticed that Orkut users receive the porn scrap in profile, when user clicks on the scrap, It was shocking to see that the page resembles the ORKUT login page. When the user name and passwords are entered, it verify the details by logging the genuine orkut...

Phone Hacking: Are we safe?

0

Estimated reading time: 1 minute

Recent international news about the hacking of celebrities phones by news reporters from News of the World, a now defunct British tabloid newspaper published by News International, are doing the rounds. The allegations state that the individuals and reporters working for the newspaper are engaged in phone hacking. All this...

Apple Updates iOS to Plug PDF Holes

0

Estimated reading time: 1 minute

After last week’s report from the German government regarding PDF-related security vulnerabilities in MobileSafari, Apple has stepped up: The company on Friday released updates for all iOS devices that fix the problem. The updates are recommended for all users of Apple’s mobile devices. The patch comes in two versions, thanks...

Microsoft introduces two new Hotmail security features

0

Estimated reading time: 2 minutes

Microsoft is implementing two new security features to keep Hotmail accounts safe. One feature banning commonly used passwords and the other letting you report compromised email accounts called “Hey! My friend’s account was hacked!” As the Seattle PI reports, Microsoft is banning all common passwords from Hotmail. “Having a common...

Harry Potter and the Deathly Hallows search results can point you to malicious web pages

0

Estimated reading time: 1 minute

The latest Harry Potter movie – Harry Potter and the Deathly Hallows Part 2 – is the final adventure in the Harry Potter film series. It has generated huge interest among Harry Potter fans and Google search is flooded with requests of searches for free pirated copies of the movie....

Microsoft July2011 Patch Tuesday Released

0

Estimated reading time: 2 minutes

Microsoft has released 4 security bulletins covering a total of 22 vulnerabilities,one of which rated Critical and it affects the Microsoft Bluetooth Stack. An attacker in physical proximity to a vulnerable computer can exploit this issue for a complete compromise. and threee of which are rated Important, include a patch...

Stealthy variant of Bootkit.Trup

1 Comment

Estimated reading time: 2 minutes

The new variant of Bootkit.Trup is making rounds, which is updated to protect the infected MBR. The encryption used in Bootkit.Trup.B is very similar to its old variant “Bootkit.Trup.A” which is simple rotate right (ROR) operation. It gets Drive geometry of the infected disk and then calculates position near end...