All TechBlog Health Electronics Cozy Corner

Google.cn is Dead Now

Author: Omid Farhang Published: March 22, 2010 Reading Time: 1 min

Google.cn is now redirecting to google.com.hk [ Hong Kong google servers ] – this has happened after the cyber attack on google china servers in december. right now if you try to access the google china web, news and image search are being redirected to google.com.hk Below is short snippet of the update about this on google official blog So earlier today we stopped censoring our search services—Google Search, Google News, and Google Images—on Google.cn. Users visiting Google.cn are now being redirected to Google.com.hk, where we are offering uncensored search in simplified Chinese, specifically designed for users in mainland China and delivered via our servers in Hong Kong. Users in Hong Kong will continue to receive their existing uncensored, traditional Chinese service, also from Google.com.hk. Due to the increased load on our Hong Kong servers and the complicated nature of these changes, users may see some slowdown in service or find some products temporarily inaccessible as we switch everything over. ...

Continue Reading Google.cn is Dead Now

The Browser Choice Reloaded

Author: Omid Farhang Published: March 22, 2010 Reading Time: 2 min

A little more than a week ago Microsoft started delivering a new Browser Choice for Windows to be compliant to the European Union law. There are plenty of web browsers to choose from, and my colleague Sorin Mustaca recommended Firefox. Usually a good choice, but currently users should be cautious about which browser they choose: Opera just released version 10.51 of their web browser. According to the changelog, it fixes a vulnerability which could lead to execution of injected code. Users of opera 10.50 should update as soon as possible. ...

Continue Reading The Browser Choice Reloaded

Merogo SMS worm

Author: Omid Farhang Published: March 22, 2010 Reading Time: 1 min

We’re investigating a series of SMS Worms, found in the wild in China. Known as Trojan:SymbOS/MerogoSMS, these worms try to spread on Symbian Series 60 3rd Edition devices. Symbian continues to be by far the most common smartphone operating system in the world. These worms spread by sending text messages to other phones. These text messages contain variable messages (in Chinese), and a link to a website. If the link is followed, user is prompted to install an application – infecting the phone and restarting the SMS spreading. ...

Continue Reading Merogo SMS worm

Google search reveals 3 million pages link to rogue AVs

Author: Omid Farhang Published: March 22, 2010 Reading Time: 2 min

Do you know what the latest version of Adobe’s Flash Player is? If you don’t, you may very well fall for this: Flash Player 11? There are more than 3 million pages linking to this alleged version 11: Most pages are from unsanitized forums, but there is even a Google Ad for it! Ooooops…. The screen below depicts the social engineering trick: What appears to be an X-rated video with a Windows Media Player logo (that is odd!). ...

Continue Reading Google search reveals 3 million pages link to rogue AVs

IMF money-making scam

Author: Omid Farhang Published: March 22, 2010 Reading Time: 1 min

I have seen a lot of these lately. This one currently doing the rounds tries to dupe the reader into thinking that the International Monetary Fund (IMF) wants to use their accounts to transfer money meant for charity. In the email. the IMF (supposedly) wants to transfer $10 Million into the reader’s account using NatWest Bank. The contact details within the Bank are given as follows: Name: Mr. Donald Miller (Co-founder) Office Address: 11 El Shams Bldgs., 8th District Nasr City E-mail: Bernisecharityfoundationimf ‘at’ gmail.com Tel: (+44) 7031-939-750 Fax: (+44) 7011830323 ...

Continue Reading IMF money-making scam

become a fan of Omid on Facebook

Author: Omid Farhang Published: March 22, 2010 Reading Time: 1 min

You are invited to become a fan of Omid’s Network on Facebook. Those of you who already have a Facebook page; all you have to do is become a fan to view the Omid fan page in its entirety. But to participate fully you must join Facebook. If you do not already have a Facebook profile you will still be able to view photos and basic information (but c’mon, you know you have wanted to jump on the Facebook bandwagon – here’s a good reason why.) ...

Continue Reading become a fan of Omid on Facebook

Bots, bots, and again bots

Author: Omid Farhang Published: March 22, 2010 Reading Time: 4 min

Today we are going to take a closer look at bots and botnets. On the black market, selling bots and botnets is quite profitable, which makes creating them a popular activity for criminals. It helps that bot sources and creation kits are available on the Internet, allowing even script kiddies to create their own botnets. Another reason bots get created is that some people who get bored in their daily lives tend to do things that in their opinion might earn them respect or admiration in front of their peers or in various Internet chat rooms. ...

Continue Reading Bots, bots, and again bots

Google’s Pacific submarine cable "Unity" nearly complete

Author: Omid Farhang Published: March 22, 2010 Reading Time: 1 min

— 7.68 Terabits/s for growing Asian market — $300 million cost (from consortium of six companies) — 10,000 km length (Chikura in Japan to Los Angeles) — Increases capacity across Pacific by 20 percent — Dense Wavelength Division Multiplexing technology (960Gbps per fibre-optic pair with a maximum of eight fiber pairs) — construction time: two years Story here.

Continue Reading Google’s Pacific submarine cable "Unity" nearly complete

20 undocumented holes in OS X?

Author: Omid Farhang Published: March 22, 2010 Reading Time: 1 min

Charlie Miller, Principal Analyst at Baltimore, Md.-based security firm ISE, has made news in the last two days saying that he found 20 perviously-unknown security vulnerabilities in Apple’s OS X operating system. News stories seem to anticipate that he will reveal them at the CanSec West conference next week in his talk “Babysitting an Army of Monkeys: An Analysis of Fuzzing 4 Products with 5 Lines of Python.” However, Miller tweeted: “To be clear, I’m not revealing 20 apple bugs at #cansec, I’m revealing how I found 20 apple bugs.” ...

Continue Reading 20 undocumented holes in OS X?

Phishing increased 62 percent in '09

Author: Omid Farhang Published: March 22, 2010 Reading Time: 1 min

The DarkReading site is carrying a story about brand-protection firm MarkMonitor’s finding that phishing increased 62 percent in 2009 with 565,502 attacks in the year. MarkMonitor is based in San Francisco. Other conclusions in MarkMonitor’s 2009 BrandJacking Index report: The huge increase can probably be attributed to the use of botnets and the large amount of personal information that can be scraped from social network sources. 2009 saw the all-time high average of 600 phishing attacks per organization only 33 percent of victims were first-time targets. Social networks suffered 11,240 attacks – two percent of the year’s total. The U.S. hosted 44.7 percent of phishing attacks, up from 36.5 in 2008. DarkReading story Here.

Continue Reading Phishing increased 62 percent in '09