TechBlog

Loose Tweets Sink Fleets

Published: January 27, 2010 Reading Time: 1 min

Information leakage is a real problem. It’s especially bad for high-security organizations, like military agencies. And it’s now harder than ever, thanks to services such as Flickr, Photobucket, Facebook, Twitter and Myspace. So, we worked together with Lewis Communications to submit a Freedom Of Information Act request to Ministry of Defence in UK, asking if they’ve had problems with this. After waiting some weeks, we got a reply back, detailing that UK military personnel and Ministry of Defence staff have leaked secret information 16 times on social networking websites and Internet forums. ...

Continue Reading

Local Trends comes to Twitter

Published: January 27, 2010 Reading Time: 1 min

The most popular micro blogging network ‘Twitter’ has now added local trends support. This new feature allows users to track Trending topics on twitter related to their region. Though, currently very less number of countries and cities added to it. In twitter words: Local Trends will allow you to learn more about the nuances in our world and discover even more relevant topics that might matter to you. We’ll be improving this feature over time to provide more locations, languages, and data through our API. ...

Continue Reading

MS Office 2010 RTM Final Build 14.0.4734.1000 Escrow Release

Published: January 27, 2010 Reading Time: 1 min

Microsoft Corporation has almost started assembling the final build of Office 2010 aka (MS office 14) RTM version. As per the news leaked on Wzor, Development of OFFICE 2010 software package has come to its last stage.The build is codenamed as Escrow with build number 14.0.4734.1000 According to Wzor, This RTM Escrow Build 14.0.4734.1000 has already been circulated within Corporation and is available to company employees and partners. Few days before, when Build 14.0.4730.1007 was leaked on Torrent network, its EULA (License Agreement) read that its a RTM version but apparently it was just a Pre RTM build. Testers are still working on it and if there no problems, it will move to RTM version. ...

Continue Reading

Troj/JSRedir-AK: 40% of a month’s malware

Published: January 25, 2010 Reading Time: 1 min

It has been a month since Sophos added detection for Troj/JSRedir-AK and figures generated today show that over 40% of all web-based detections have been from this malicious code. [Graph shows Malware hosted on websites from 2009-12-22 11:00:00 to 2010-01-21 11:00:00 (GMT-8)] Translating the numbers into a more human comprehensible form: 1 site every 15 secs was being detected as Troj/JSRedir-AK. The affected sites include well-known names, including: ...

Continue Reading

New Rogue: APcSafe

Published: January 25, 2010 Reading Time: 1 min

APcSafe is another rogue anti-spyware clone of the WiniGuard family. if your computer is infected with this malware you should remove it soon.

Continue Reading

New Rogue: PcsSecure

Published: January 25, 2010 Reading Time: 1 min

PcsSecure is the latest cloned rogue antispyware from the WiniGuard family. if your computer is infected with this malware you should remove it soon.

Continue Reading

Google Chrome Stable Channel Update

Published: January 25, 2010 Reading Time: 2 min

The stable channel has been updated to 4.0.249.78 for Windows, and includes the following features and security fixes (since 3.0): Extensions Bookmark sync Enhanced developer tools HTML5: Notifications, Web Database, Local Storage, WebSockets, Ruby support v8 performance improvements Skia performance improvements Full ACID3 pass, due to re-enabled remote font support (with added defense against bugs in operating system font libraries) HTTP byte range support New security feature: “Strict Transport Security” support Experimental new anti-reflected-XSS feature called “XSS Auditor” Security Fixes: ...

Continue Reading

Google Toolbar tracks searches after it’s disabled.

Published: January 25, 2010 Reading Time: 2 min

Ben Edelman, Harvard privacy researcher and guru has revisited the features of Google Toolbar and was appalled to discover that disabling it doesn’t really disable it. He is recommending that all users uninstall it. In a long, thorough and well-written piece on his blog Edelman discusses how he monitored the Toolbar’s behavior with a network sniffer and documented the transmission of data back to Google (to toolbarqueries.google.com). Not only does it track a user’s Google searches, but it also phones home information about searches done in other search engines. ...

Continue Reading

Virus Writers Produce Hardware Damaging Code with Win32.Worm.Zimuse

Published: January 25, 2010 Reading Time: 2 min

Disguised IQ test combines virus, rootkit and worm — malicious code for one fatal formula BitDefender today identified a new e-threat that combines the destructive behavior of a virus with the spreading mechanisms of a worm. There are two known variants of this virus, which enters the computer as a harmless IQ test. Once executed, the worm creates between seven and eleven copies of itself (depending on the variant) in critical areas of the Windows system. ...

Continue Reading

Desktop Security 2010

Published: January 25, 2010 Reading Time: 1 min

Desktop Security 2010 is a rogue antispyware program, designed to trick people into thinking it is a legitimate program. Desktop Security 2010 uses fake security warnings and system scans to frighten people into buying the software. If Desktop Security 2010 is installed on your PC, you should remove it immediately as it is a potentially dangerous computer infection. Computers that have been infected with Desktop Security 2010 may show the following symptoms: ...

Continue Reading