| 

Symantec releases Norton 2013 security suites

  • Post author: Omid Farhang
  • Post published: September 7, 2012
  • Reading Time: 3 min
  • Word Count: 508 words

BetaNews: Symantec has released brand new versions of its Norton security packages for Windows, Norton Anti-Virus 2013, Norton Internet Security 2013 and Norton 360 2013. It’s the first time all three packages have been updated simultaneously, while the branding has also been amended to remove all references to a date, simply naming each Norton Anti-Virus, Norton Internet Security and Norton 360, respectively. The 2013 versions come with what Symantec describes as “five layers of patented protection”, which include stronger social networking and anti-scam protection. There’s also full, certified support for Windows 8 and the promise of better performance on multi-core CPUs. ...

Continue Reading Symantec releases Norton 2013 security suites

Symantec claims losses from cybercrime exceed $100 billion

  • Post author: Omid Farhang
  • Post published: September 7, 2012
  • Reading Time: 2 min
  • Word Count: 292 words

h-Online: According to Symantec’s 2012 Norton Cybercrime Report, worldwide, private individuals have suffered approximately $100 billion (more than £69 billion at the current exchange rate) in financial losses as a result of cybercrime. In the period from July 2011 to July 2012, losses averaged $197 (£124) per victim. A total of 556 million adults are reported to have fallen victim to malware, phishing or similar virtual crimes. The report claims that there are 1.5 million victims of cybercrime each day, or about 18 per second. The security specialist’s report also states that two-thirds of internet users have been caught out by cybercriminals at some point in their lives, and almost half (46%) were victims during the period covered by the report. The results reveal that many of those affected are victims of their own carelessness. Around 40% of people don’t use complex passwords or don’t change their passwords regularly. ...

Continue Reading Symantec claims losses from cybercrime exceed $100 billion

1 million Apple Device IDs leaked, claim hackers

  • Post author: Omid Farhang
  • Post published: September 4, 2012
  • Reading Time: 2 min
  • Word Count: 255 words

According to the AntiSec hacker group, they claim to hold more than 12 million Apple iOS Unique Device IDs, in addition to other personal information from device owners. As a move to back up such a claim, the AntiSec hacker group is said to have released slightly more than a million Apple Device IDs to the masses. This particular expose was unveiled on Pastebin, which is said to hold a detailed description of the method that the hacking group were said to have obtained the IDs from the FBI. ...

Continue Reading 1 million Apple Device IDs leaked, claim hackers

Oracle rushes out patch for critical 0-day Java exploit

  • Post author: Omid Farhang
  • Post published: August 31, 2012
  • Reading Time: 2 min
  • Word Count: 370 words

TheRegister: In an uncommon break with its thrice-annual security update schedule, Oracle has released a patch for three Java 7 security flaws that have recently been targeted by web-based exploits. “Due to the high severity of these vulnerabilities, Oracle recommends that customers apply this Security Alert as soon as possible,” Eric Maurice, the company’s director of software security assurance, said in a blog post published on Thursday. Maurice said that the vulnerabilities patched only affect Java running in browsers, and not standalone desktop Java applications or Java running on servers. According to Oracle’s official advisory on the flaws: ...

Continue Reading Oracle rushes out patch for critical 0-day Java exploit

Download Firefox 15 and Thunderbird 15!

  • Post author: Omid Farhang
  • Post published: August 28, 2012
  • Reading Time: 3 min
  • Word Count: 505 words

Cross-copied from BetaNews: Mozilla has quietly placed major new versions of its open-source, cross-platform web browser and email client onto its download servers ahead of an official release. Firefox 15 FINAL benefits largely from behind-the-scenes performance tweaks, while Thunderbird 15 FINAL introduces a few new features, including a new curvy user interface. Firefox 15 FINAL’s most notable changes are performance-based. There’s faster startup on Windows PCs, plus incremental garbage collection and better management of plugins to prevent memory leaks. Other performance improvements surround WebGL enhancements. ...

Continue Reading Download Firefox 15 and Thunderbird 15!

Java zero day vulnerability actively used in targeted attacks

  • Post author: Omid Farhang
  • Post published: August 27, 2012
  • Reading Time: 1 min
  • Word Count: 189 words

ZDNet: Security researchers from FireEye, AlienVault, and DeependResearch have intercepted targeted malware attacks utilizing the latest Java zero day exploit. The vulnerability affects Java 7 (1.7) Update 0 to 6. It does not affect Java 6 and below. Based on related reports, researchers were able to reproduce the exploit on Windows 7 SP1 with Java 7 Update 6. There’s also a Metasploit module available. Upon successful exploitation, the campaign drops MD5: 4a55bf1448262bf71707eef7fc168f7d – detected by 28 out of 42 antivirus scanners as Gen:Trojan.Heur.FU.bqW@a4uT4@bb; Backdoor:Win32/Poison.E ...

Continue Reading Java zero day vulnerability actively used in targeted attacks

Dropbox tests two-factor authentication

  • Post author: Omid Farhang
  • Post published: August 27, 2012
  • Reading Time: 2 min
  • Word Count: 285 words

h-online: Cloud backup provider Dropbox says it has begun a public test of two-factor authentication for its service. Dropbox had announced it would start offering the security measure after the service experienced a data leak at the beginning of the month. Users who activate two factor authentication will have to enter a security code after logging in with their username and password. The security code can only be used once and is sent to the user’s mobile phone in a text message. To generate security codes, users can also use a variety of smartphone applications such as Google Authenticator. Details of the process are given on the two-step verification help page. ...

Continue Reading Dropbox tests two-factor authentication

For the first time in 25 years, Microsoft is changing its logo

  • Post author: Omid Farhang
  • Post published: August 23, 2012
  • Reading Time: 2 min
  • Word Count: 415 words

In advance of one of the most significant waves of product launches in Microsoft’s history, today they are unveiling a new logo for the company. Microsoft TechNet wrote: It’s been 25 years since we’ve updated the Microsoft logo and now is the perfect time for a change. This is an incredibly exciting year for Microsoft as we prepare to release new versions of nearly all of our products. From Windows 8 to Windows Phone 8 to Xbox services to the next version of Office, you will see a common look and feel across these products providing a familiar and seamless experience on PCs, phones, tablets and TVs. This wave of new releases is not only a reimagining of our most popular products, but also represents a new era for Microsoft, so our logo should evolve to visually accentuate this new beginning. The Microsoft brand is about much more than logos or product names. We are lucky to play a role in the lives of more than a billion people every day. The ways people experience our products are our most important “brand impressions”. That’s why the new Microsoft logo takes its inspiration from our product design principles while drawing upon the heritage of our brand values, fonts and colors. ...

Continue Reading For the first time in 25 years, Microsoft is changing its logo

Crisis malware infects VMware virtual machines

  • Post author: Omid Farhang
  • Post published: August 23, 2012
  • Reading Time: 2 min
  • Word Count: 241 words

v3.co.uk: The Windows version of the Crisis Trojan is far more dangerous than first thought, being capable of infecting VMware virtual machine images, Windows Mobile devices and removable USB drives, research has revealed. Crisis was originally uncovered targeting businesses with social engineering attacks that trick users into running a malicious Java applet in July. Symantec has since revealed that the malware has more advanced capabilities, letting it search for and copy itself onto VMware virtual machine images on compromised computers. ...

Continue Reading Crisis malware infects VMware virtual machines

Adobe Flash Player update patches six critical holes

  • Post author: Omid Farhang
  • Post published: August 23, 2012
  • Reading Time: 2 min
  • Word Count: 293 words

h-Online: Adobe has released the second update for its Flash Player software in a week, this time for six critical vulnerabilities. Four of the issues addressed are problems with memory corruption that could lead to remote code execution; additionally, the update fixes an integer overflow vulnerability that could also lead to remote code execution. Another bug that was fixed is a cross-domain information leak. The problems exist in Flash Player 11.3.300.271 and earlier versions on Windows, Macintosh and Linux, and in the Android versions 11.1.115.11 (Android 4.0) and 11.1.111.10 (Android 3.x and 2.x) and earlier. ...

Continue Reading Adobe Flash Player update patches six critical holes