Monday, August 31, 2009

W.O.W. Warcraft Under Attack, Ahhhh!!! (sniffle)

September 2009

Scammers step up attacks on Warcraft players. A researcher from anti-virus firm Webroot has written how official forums offered by WoW creator Blizzard are being used to spread links that lead to malware that steals passwords and other game credentials. The scam employs the common technique of telling visitors that their Adobe Flash player needs to be updated and then offering a malicious trojan instead of the real installation file. Elsewhere, phishers are churning out emails that purport to be official communications from Blizzard, according to researchers from security provider Sophos. The emails claim the game maker is launching a new service and invites them to click on a link for a free sneak peak. The resulting website, in turn, phishes user credentials. The attack outbreaks come a few weeks after Blizzard issued an update for Warcraft III that fixed a gaping hole that could lead to the complete hijacking of machines running the real-time strategy game. According to a Webroot researcher it was exploited simply by getting vulnerable victims to join a custom game hosted with booby-trapped maps. Attackers targeted the vulnerability in a game called DotA, or Defense of the Ancients, by creating fake maps that used the same file configurations as legitimate custom maps. “What makes this exploit particularly nasty is the fact that your PC gets infected the moment you join a game where the infected DotA map is in use,” the researcher wrote. “Once downloaded, the game automatically unpacks the infected map and executes the malicious code.”

Friday, August 28, 2009

August 2009

Apple reportedly using
malware detection in Snow Leopard. *Not wanting to be made the target of new
PC ads mocking its lack of antivirus support, Apple reportedly is packaging
its new OS X 10.6 “Snow Leopard”, set to air on August 28, with free
antivirus software. Security research firm Intego, which maintains a Mac
security blog that monitors various OS X-specific malware, first noticed and
reported the development. The firm was running the new version of OS X, when
they noticed it detected and removed malware. The process was carried out
via a popup window, which they took a screenshot of, but they were either
unable to determine or chose not announce who made the antivirus software.
Intego’s post indicated that they were not making the product. ClamAV —
currently the AV engine in Apple’s server operating system — also seems
unlikely as the virus detected had the signature “OSX.RSPlug.A”, a signature
that ClamAV currently doesn’t support (ClamAV does have a signature for
“OSX.RSPlug” [1]). Similar, McAfee and Sophos use the names OSX/Puper.a [2]
and OSX/RSPlug-A [3], respectively. That leaves Symantec as one possibility.
Another is that Apple has developed its own proprietary antivirus software,
which would not be surprising.

Mac meet Virus: Virus meet ClamAV

August 2009

Clam AntiVirus is an open source (GPL) anti-virus toolkit for UNIX, designed especially for e-mail scanning on mail gateways. It provides a number of utilities including a flexible and scalable multi-threaded daemon, a command line scanner and advanced tool for automatic database updates. The core of the package is an anti-virus engine available in a form of shared library.

http://www.clamxav.com/

Ok PC/Window user here is your link:
http://www.clamwin.com/

It takes all kinds in this world...

Blind Phishing: Google AdWords Notice...

August 2009

When words are spelled wrong you might want to take a second look before you click.
https://www.google.com/accounts/ServiceLoginAuth?service=adwords

Dear Google AdWords Advertiser,

We are monitoring account activity and deleting the account of users who
have been inactive and have no funds in their accounts.
We hereby notify you that your account has been inactive for a long period
of time and is liable to be deleted. In order to keep your account active you
need to login using your Google AdWords registration data. Please click on the
link below:

https://www.google.com/accounts/ServiceLoginAuth?service=adwords
By clicking on the link above you will proceed directly to the data entry page.
If the link does not work, copy the whole URL into the address box of your browser
and press "Enter".

If you do not activate your account, it will be blocked after witch it will be deleted.

Thank you for advertising with Google AdWords. From: notice@adwordsgoogle.com

P.S. Especially if you don't even use Google AdWords....dumbasses

Tuesday, August 25, 2009

Majority Tyranny in America???

August 2009

In any institution in which a majority of citizens or members can pass laws or rules that apply, not just to themselves, but to all members of the group, judgment is required to distinguish potential laws which are reasonable and fair from those which are tyrannical because they are unnecessary, unfair, and justifiably intolerable to the minority that opposed them. And formal mechanisms need to be in place, wherever feasible, to prevent tyrannical laws from being passed by those whose judgment in such matters might fail.
(Way to go R. Garlikov)

Also read:
http://en.wikipedia.org/wiki/Alexis_de_Tocqueville
http://en.wikipedia.org/wiki/Democracy_in_America
http://www.google.com/search?hl=en&safe=off&client=safari&rls=en&q=ben+bernanke+nwo&aq=f&oq=&aqi=

Obama's Intent...

August 2009

by: Wilmer J. Leon III, Ph.D., t r u t h o u t | Perspective

photo
President Obama speaking at the G20 summit in London earlier this month. (Photo: Getty Images)


On September 11, 1990

=========================================


(WHITE SPACE)

GET IT SHITE SPACE





=====================================================================================

APRIL 24, 2009

Obama Must Redefine His 'New World Order'President Obama needs to immediately and publicly redefine his 'New World Order ' to mean a world cemented in social economic cooperation and global altruism versus a world fragmented by divisions of the rich and poor as well as controlled by a powerful and secretive group of financial self-serving globalists: Allen L Roland

Obama's cybersecurity chief resigns, signals disarray

By Scott M. Fulton, III | Published August 4, 2009, 1:35 PM



====================================================
Aug 4, 2009 02:53 PM in Society & Policy | 3 comments | Post a comment

Federal cyber security revolving door continues as Hathaway departs

By Larry Greenemeier in 60-Second Science Blog
=================================================================
remember the words of Alexis de Tocqueville

THANKS ALL FOR THE INFORMATION. KEEP UP THE GOOD WORK

Monday, August 24, 2009

Phising on Facebook...

August 2009

Facebook was the target of two independent and non-related phishing attacks through its applications service. Two security experts discovered, investigated and reported these attacks to the social network’s admins, who took all the protection measures. The first one was was an application called Customer Dispute. The application link did not open an actual app page, but managed to clone a Facebook URL (apps.facebook.com/customer_dispute/ ). Instead of the standard application install screen, it printed a “404 – Page not found” error. The detail that triggered the expert’s interest was the fact that the error was NOT FROM FACEBOOK, but from a hosting company called Ripway. A researcher had this to say about Ripway: “The entire content is taken up by a ‘Page not found’ message served up by Ripway hosting (who are often used and abused by script kiddies with phish pages and rogue executable storage).” The second attack was about another Facebook application. The app sent out countless notifications informing users of a comment on one of their posts that they needed to check out. The link (when hovering the mouse over it) redirected to a page from the fucabook.com domain name that contained some info-stealing content.

According to Mr. Ferguson, “The server at fucabook.com loads up a JavaScript before immediately using HTTP meta refreshtags to pull up the real Facebook website and prompting the victim for their login credentials.” He also added, “The attack site is registered to an Arsen Tumanyan who allegedly resides in Armenia, the domain is registered through GoDaddy and the URL leads to an IP address that resolves to the Amazon Elastic Compute Cloud (EC2) cloud.”

This attack did not attempt to steal any financial data, but it tried to acquire account credentials that could have been used to send out spam or other phishing attacks afterwards.

Ghosts Within...

August 2009

Attacks may come from inside computers. The next wave of hacking into computers and stealing data will not be requests or code coming from remote points across the Web, security experts are warning. Instead, the most sophisticated Trojan Horses appearing on Wall Street financial systems may be threaded into the silicon of integrated circuits by design, their malicious instructions baked right into the tiny physical aspects and intricate mapping of the chip itself, according to scientists and academics working with the National Institute of Standards and Technology, the White House and the Financial Services Information Sharing and Analysis Center in Dulles, Virginia. Detecting such malware after a chip is fabricated will be extremely difficult, if not impossible, these experts say, because the microchips that run servers have millions to billions of transistors in them. Adding a few hundred or even just tens of transistors can compromise an integrated circuit can serve attackers’ purposes and escape notice. “You can never really test every single combination on the chip. Testing a billion transistors would take a very long time. It would be very difficult to detect hardware Trojans without having some idea of what you’re looking for to begin with,” said a associate professor of electrical engineering at the University of Arkansas, co-author of a 2007 paper which described a “Hardware Threat Modeling Concept for Trustable Integrated Circuits.” Tweaking chips themselves will make them prone to manipulate data, shut down a critical function, or turn a system into a bugged phone that steals and relays vital information, the experts say. To combat the threat, the National Institute of Standards and Technology (NIST), the federal government’s technical standards laboratory, is releasing in September an inter-agency report meant to serve as the first set of best practices for government and industry to mitigate security risks to hardware included in the IT supply chain.

How Cool is Old School???

August 2009

Old-school virus threatens Delphi files. Virus writers have gone old school with the creation of a virus that infects Delphi files as they are built. When a Delphi file infected with Induc-A virus is run, it searches for Delphi programming installations on an infected machine and attempts to infect this installation. More specifically, the malware attempts to infect SysConst.pas, which it then compiles to SysConst.dcu. Once this process is completed the SysConst.dcu file is programmed to add the Induc-A virus to every new Delphi file that gets compiled on the system. Even the vast majority of computer users that are not Delphi developers can be affected by running programs written in Delphi that happen to have been contaminated. Up until August 18 the labs at Sophos have received more than 3,000 infected files, submitted by users who have found infections. “This makes us believe that the malware has been active for some time, and that a number of software houses specialising in developing applications with Delphi must have been infected,” writes a senior technology consultant at Sophos. Examples of infections have included applications described as “a tool for downloading configuration files onto GSM modules” and “a compiler interface that operates between our third-party design software and our CNC woodworking machinery.”

iPhones and iPods Exploding??? Yeah...Boom!

August 2009

Apple looking into reports of exploding iPhone/iPod Touches. Apple’s iPhones and iPod Touches are being examined by the European Commission after a few incidents in which the devices exploded. There are reportedly two incidents in France involving an iPhone and one in Britain with an iPod Touch. A spokesperson for the commission said that Apple was cooperating and labeled the incidents “isolated.” An Apple spokesperson told Reuters that the company was aware of the reports but would not comment until receiving more information. In one case, a teenager in France was hurt when an iPhone overheated, hissed and shattered, sending glass into the boy’s eyes. A similar incident in Britain reportedly occurred with an iPod Touch that exploded and flew into the air. KIRO TV in Seattle obtained 800 pages of documents from the Consumer Product Safety Commission that found there have been 15 reports of burn and fire-related incidents involving iPods. Last year, after the Japanese government warned of fire risks from iPod Nanos, Apple offered to replace batteries in some of the devices.

Monday, August 17, 2009

Sniff Out This...Obama's Deception??? or NWO!!!

August 2009

Hackers reveal security vulnerability in trusted sites.
A nefarious new tactic used by hackers works similar to a telephone tap, intercepting information between computers and the trusted Web sites they visit. Hackers at last week’s Black Hat and DefCon security conferences revealed a significant flaw in the way Web browsers filter untrustworthy sites and block users from accessing them. The flaw allows cybercriminals who penetrate a network to establish a secret eavesdropping position, enabling them to capture passwords, credit card numbers and other private data flowing between computers on that network and the Web sites users believe are safe. In an even more worrisome scheme, a hacker could hijack the auto-update feature on a victim’s computer, and trick it into automatically installing malicious code from the attacker’s Web site. In that case, the computer would simply believe the code was a valid update coming from the software manufacturer.

Surveillance camera hack swaps live feed with spoof video.
Corporate teleconferences and other sensitive video feeds traveling over internet are a lot more vulnerable to interception thanks to the release of free software tools that offer penetration testers and attackers a point-and-click interface. At the Defcon hacker conference in Las Vegas, the Viper Lab researchers demonstrated new additions to UCSniff, a package of tools for sniffing internet-based phone conversations. The updates offer tools that streamline the process of intercepting video feeds, even when they are embedded in voice-over-internet-protocol traffic. The researchers showed how a companion tool called VideoJak can be used to tamper with video surveillance feeds in museums and other high-security settings. As several hundred conference attendees looked on, they displayed a live feed of a water bottle that was supposed to be a stand in for a precious diamond egg. When someone tried to touch the bottle, the video caught the action in real time. Then they fired up VideoJak. When the bottle was touched again, the video, which presumably would be piped to a security guard, continued to show the bottle was safe and sound. “We used UCSniff to actually capture valid stream for 20 seconds and then we played it against the security guy receiving the traffic,” the director of Sipera’s Viper Labs said in an interview afterward. “So he saw the room was just sitting there unmolested while the person was actually taking the diamond egg.” A separate demo showed a live teleconference that was being secretly intercepted so the video feeds of both participants could be logged in real time. Both attacks convert the intercepted feeds to a raw H.264 video file and from there to a simple AVI file. http://www.theregister.co.uk

U.S. weighs risks of civilian harm in cyberwarfare.
Fears of collateral damage are at the heart of the debate as the Presidential Administration and its Pentagon leadership struggle to develop rules and tactics for carrying out attacks in cyberspace. While the former Administration seriously studied computer-network attacks, the current Administration is the first to elevate cybersecurity — both defending American computer networks and attacking those of adversaries — to the level of a White House director, whose appointment is expected in coming weeks. But senior White House officials remain so concerned about the risks of unintended harm to civilians and damage to civilian infrastructure in an attack on computer networks that they decline any official comment on the topic. And senior Defense Department officials and military officers directly involved in planning for the Pentagon’s new “cybercommand” acknowledge that the risk of collateral damage is one of their chief concerns. “We are deeply concerned about the second- and third-order effects of certain types of computer network operations, as well as about laws of war that require attacks be proportional to the threat,” said one senior officer. http://news.cnet.com