TechBlog

Facebook, Twitter Use Skyrockets on Cell Phones

Published: March 6, 2010 Reading Time: 1 min

New comScore data shows that Facebook and Twitter use has skyrocketed on mobile devices over the past year, and that on-the-go MySpace use is now on the decline, according to MediaPost. Here are the numbers: Facebook now sees 25.1 million mobile users as of January 2010, which is more than double the January 2009 total. Twitter grew to 4.7 million during the same period, which is four times the year-ago total, the report said. ...

Continue Reading

Download Life Theme Pack for Windows 7

Published: March 6, 2010 Reading Time: 1 min

After the Spring theme pack Microsoft has released a beautiful Life theme. It consists of five beautiful Discovery channel wallpapers based on wild life and nature. This is a official theme and can be applied just by double clicking on the theme file. Download: Life Theme pack for Windows 7

Continue Reading

Viruses and Digital Signatures

Published: March 5, 2010 Reading Time: 2 min

Recently, We received some malicious files which appeared to be signed by “Adobe Systems Incorporated”. On closer inspection, however, it was seen that the signature was just a ruse used by the malware author to give an air of legitimacy to the files. Virus writers are getting smarter and going that extra mile to digitally sign their files. Using this technique the malware authors could, for example, penetrate an environment where only signed files are allowed but the authenticity of the signature is not checked. ...

Continue Reading

The Morphing PDF

Published: March 5, 2010 Reading Time: 1 min

Just when we thought SEO using Flash was as interesting as SEO poisoning can get, it seems it’s getting even sneakier… Imagine a PDF file posted by someone evil online. Of course, Google being Google, the file is recognized as a PDF. And when we open it, it really is a PDF. No evil codes inside, just a good old vanilla PDF file. Three hours later… Google still says the file is a PDF. Brod (one of our geeky guys here) is attributing this to Google’s cache. ...

Continue Reading

Patch Tuesday coming next week

Published: March 5, 2010 Reading Time: 1 min

Microsoft has issued an advance notification for Patch Tuesday next week. The company said it expects to issue two patches, one for Windows and one for Office. Both are intended to patch vulnerabilities that could allow remote code execution and both are rated “important.” Microsoft Security Bulletin Advance Notification for March 2010 here.

Continue Reading

Who’s watching you really?

Published: March 5, 2010 Reading Time: 2 min

This morning while I was enjoying my coffee I received an event notification for my personal Facebook account. It was for a group called “See Who’s Spying On Your Profile – GET NOTIFIED -”. and “See Everyone Who Views Your Profile”. Immediately, my security hat went on and I started to investigate. At first glace, they are both pyramid schemes. In both, you become a fan, then you have to suggest the page to 50 of your friends to move onto the next stage. From there the tactics diverge slightly. In the first one, you need to take a marketing quiz that asks for all sorts of personal info, and you need to put in your Facebook username and password, so they can “monitor” your profile. AND you have to provide them with your mobile number. Now wait a minute… why would they need my mobile number? ...

Continue Reading

Adservers compromised in latest Zbot push

Published: March 5, 2010 Reading Time: 2 min

As we have commented before when content served up from adservers is compromised, the effects can be far reaching, potentially exposing huge numbers of victims to the malicious code as they innocently browse legitimate sites. The problem is further complicated by the fact that legitimate ad content is often heavily obfuscated, in order to evade ad-blocking technology. During the latter half of this week we have seen a whole batch of compromised adservers injected with malicious JavaScript to silently load malicious content from a remote site. A significant number of popular sites that load ads content from these servers have therefore been affected by this attack. ...

Continue Reading

Twitter Hits 10 Billion Tweets

Published: March 5, 2010 Reading Time: 1 min

It’s official: Twitter has surpassed 10 billion tweets. While Gigatweet’s counter is down due to over-traffic., you can tell by the actual tweet ID numbers that we have crossed the magical threshold. The milestone shows that Twitter’s still growing at a rapid pace: it broke 1 billion tweets in November 2008 and 5 billion tweets just four months ago. So who was the lucky person that sent out tweet 10 billionth tweet? Tweet #10 billion apparently belongs to a protected user, as API calls won’t allow us to see that specific status update. Via @timdorr, here is Tweet #9,999,999,999 and tweet #10,000,000,001. ...

Continue Reading

Android gets its first Microsoft app: TagReader

Published: March 5, 2010 Reading Time: 2 min

Barcode and QR code reader applications are now standard fare for smartphones and can be commonly found for free in any of the major app stores. But far less common are comprehensive services that let users make their own QR codes for free. This is why Microsoft’s TagReader, which was released in the Android Market today, is worth checking out. It’s similar to any number of barcode scanners available on the Android platform, except that it is designed to read Microsoft’s unique “Tags.” ...

Continue Reading

Pwn2Own Interview with Charlie Miller

Published: March 5, 2010 Reading Time: 1 min

Charlie Miller, the Pwn2Own contest winner for two years in a row, gives his take on Internet security. Guess what — your Mac OS is no less vulnerable than its Microsoft Windows counterpart. Windows 7 or Snow Leopard, which of these two commercial OS will be harder to hack and why? Windows 7 is slightly more difficult because it has full ASLR (address space layout randomization) and a smaller attack surface (for example, no Java or Flash by default). Windows used to be much harder because it had full ASLR and DEP (data execution prevention). But recently, a talk at Black Hat DC showed how to get around these protections in a browser in Windows. ...

Continue Reading