SaferPC.info

Virus Information News

     
 Title   Date   Author   Host 

Saying Goodbye to Our Old Friend NPAPI
blog.chromium.org
September 23, 2013

The Netscape Plug-in API (NPAPI) ushered in an early era of web innovation by offering the first standard mechanism to extend the browser.

In fact, many modern web platform features-including video and audio support-first saw mainstream deployment through NPAPI-based plug-ins. But the web has evolved. Today's browsers are speedier, safer, and more capable than their ancestors. Meanwhile, NPAPI's 90s-era architecture has become a leading cause of hangs, crashes, security incidents, and code complexity. Because of this, Chrome will be phasing out NPAPI support over the coming year.

Raspberry Pi as an Ad Blocking Access Point
learn.adafruit.com
by Justin Cooper
September 16, 2013

This tutorial will show you how to use your Raspberry Pi as a WiFi access point that blocks ads by default for any devices using it.

This is really neat in that it would work for your Android or iOS device, your Xbox 360, TiVo, laptop, and more without needing to customize any of those devices other than to use your Raspberry Pi as the access point for WiFi. Using an ad-blocker can be useful for conserving bandwidth, helping out low-power devices, or for keeping your sanity while browsing the web!

Data Broker Giants Hacked by ID Theft Service
krebsonsecurity.com
September 13, 2013

An ID theft service that sells SSNs, birth records, credit and background reports on millions of Americans has infiltrated computers at some of America's largest consumer and business data aggregators

The Web site ssndob[dot]ms (hereafter referred to simply as SSNDOB) has for the past two years marketed itself on underground cybercrime forums as a reliable and affordable service that customers can use to look up SSNs, birthdays and other personal data on any U.S. resident. Prices range from 50 cents to $2.50 per record, and from $5 to $15 for credit and background checks. Customers pay for their subscriptions using largely unregulated and anonymous virtual currencies, such as Bitcoin and WebMoney. Until very recently, the source of the data sold by SSNDOB has remained a mystery. That mystery began to unravel in March 2013, when teenage hackers allegedly associated with the hacktivist group UGNazi showed just how deeply the service's access went. The young hackers used SSNDOB to collect data for exposed.su, a Web site that listed the SSNs, birthdays, phone numbers, current and previous addresses for dozens of top celebrities - such as performers Beyonce, Kanye West and Jay Z - as well as prominent public figures, including First Lady Michelle Obama, CIA Director John Brennan, and then-FBI Director Robert Mueller.

Microsoft botches still more patches in latest Automatic Update
infoworld.com
by Woody Leonhard
September 11, 2013

It must be Wretched Wednesday -- the day after Black Tuesday. Watch out for automatic patches KB 2817630, KB 2810009, KB 2760411, KB 2760588, and KB 2760583

No sooner did Microsoft release the latest round of Black Tuesday patches, than screams of agony began sounding all over the Internet. At this point, I've seen verified problems with KB 2817630, KB 2810009, KB 2760411, KB 2760588, and KB 2760583. Here's what we know at this point. KB 2817630 is not a security patch, it's a gratuitously delivered functionality patch for Office 2013, and man has it had an impact on functionality. I've seen dozens of reports that installing this patch, possibly in conjunction with the KB 2810009 patch that is part of MS13-074, causes the folder pane in Outlook 2013 to disappear. An anonymous poster on the SANS Internet Storm Center offers this picture of the effect.

What the Recent SEA Hacks Mean for IT Security
OpenDNS Blog
by David Ulevitch
September 3, 2013

In the past week, we saw a series of DNS-based attacks on high profile domains that caused visitors trying to reach the affected domains to be redirected to IPs under the control of the Syrian Electronic Army.

During the incident, I spent some time helping the New York Times get their sites back to normal, and working with our friends at CloudFlare, Twitter, Google, DemandMedia, and others to get a handle on the extent of the SEA's hacks. There's plenty of coverage of how the attack happened and what you can do to help prevent this if you're a webmaster of a high-profile website (Hint: get a registry lock in place, not just a registrar lock), so I won't offer yet another opinion on that front. Instead, I want to focus on what this hack means for IT professionals-the people charged with protecting employees, sensitive or confidential corporate data, and enterprises at large. When extremely popular and trusted domains like the New York Times are compromised, the real danger lies in the huge number of users affected in such a short time. The attacks of the past week seem to have amounted to high-tech vandalism, but if the SEA had perpetrated a more malicious attack, millions of computers would have fallen prey in a few hours.

NSA silences criticism using copyright laws...
thelibertarianrepublic.com
by Austin Petersen
August 31, 2013

"THE ONLY PART OF THE GOVERNMENT THAT ACTUALLY LISTENS."

The National Security agency is harassing T-shirt makers, asking them to remove parody shirts featuring the NSA's eagle logo with the motto "The only part of the government that actually listens." Yes, the American people are paying their hard-earned tax money so the government can harass citizens into silence using copyright claims against them. The shirtmaker, Dan McCall issued a statement about the abuse: "We have been contacted by legal representatives from the National Security Agency, and at their request, have removed the product from the Zazzle Marketplace." The NSA is making the following copyright claims...

Using Child Porn To Take Down The Liberty Movement?
benswann.com
by Ben Swann
August 25, 2013

Dan Johnson of the group P.A.N.D.A (People Against the NDAA) talks with Ben Swann about the child pornography sent to him via a Tormail account.

The email, which claimed to have come from Stewart Rhodes (founder and national director of Oathkeepers), actually contained 6 PDFs with graphic child pornography. "Our IT tech estimates it took about 8 to 9 hours to put this [email] together...something this technologically sophisticated. It was speci´Čücally designed, number one, to be found; and number two, to implicate Stewart Rhodes in sending me the email and to implicate me in having the email on my computer," says Johnson, who spoke to Swann via Skype.

NSA Officers Caught Using Domestic Surveillance Program To Spy On Their Lovers!
xrepublic.tv
August 24, 2013

NSA Officers Caught Using Domestic Surveillance Program To Spy On Their Lovers!

Snowden tricked NSA - and they don't know how he did it
rt.com
August 24, 2013

While collecting data Edward Snowden was able to evade all safeguards at the NSA, leaving the agency puzzled at how he did it, according to new report. Officials worry that the ease with which he covered his tracks means another breach could happen.

Information logs exist to tell the government who tried to view or copy classified information without the proper clearance, but Snowden appears to have bypassed or deleted them, while working as a system administrator with contractor Booz Allen Hamilton in Hawaii. The revelations come from government officials speaking to The Associated Press on condition of anonymity, as they were prevented from publicly disclosing new information about the Snowden case. This is a worrying development for the Obama administration, which has been at pains to prove to the American public that the NSA's computer system cannot be taken advantage of so easily. Therefore, if Snowden could single-handedly circumvent its cyber defenses, the question stands as to whom else can gain instant access to the vast stream of data the clandestine organization intercepts every day.

NSA Officers Spy on Love Interests
blogs.wsj.com
by Siobhan Gorman
August 23, 2013

National Security Agency officers on several occasions have channeled their agency's enormous eavesdropping power to spy on love interests, U.S. officials said.

The practice isn't frequent - one official estimated a handful of cases in the last decade - but it's common enough to garner its own spycraft label: LOVEINT. Spy agencies often refer to their various types of intelligence collection with the suffix of "INT," such as "SIGINT" for collecting signals intelligence, or communications; and "HUMINT" for human intelligence, or spying. The "LOVEINT" examples constitute most episodes of willful misconduct by NSA employees, officials said.

     

Help keep this page up-to-date. Submit a Virus Information News link for inclusion on this page.

Shawn K. Hall © 2003-2022 Powered by 12 Point Design
Professional Web Hosting and Design Services: 12 Point DesignAt Summit Chiropractic our mission is to improve your quality of life - We know that health is much more than just not feeling painReliable Answers - developer information, current news, human interest and legislative newsLocal Homeschool provides the most up-to-date support group listings in a geographical and searchable indexTwain Harte, CA - The closest you can get to Heaven on EarthSaferPC dispels security misunderstandings and provides you with a solid understanding of viruses and computer security
Google

AddThis Social Bookmark Button