Friday, September 25, 2009
Wednesday, September 16, 2009
Apple's App Store Monopoly...
"Listen up, friend. We take care of the community. We all protect each other. You wanna set up shop in this neighborhood, you're gonna need some protection, you know what I'm sayin'? I mean, you got a real nice business here, nice store, nice people. It'd be a shame if something were to happen to it. Fire, robbery, these things happen all the time, but we can make sure they don't - at least to you. Let's say 30 per cent of your daily take? It's not in your best interest to say no to guys like us. It's bad for your health."
Does this shakedown sound familiar? If you're an iPhone developer, it should. When a developer sells an application through the iPhone Application Store, they only see 70 per cent of the revenue. The rest goes to Apple for “system upkeep.” There's no other way to sell iPhone apps. Apple's distribution channel is the only one. Users can't buy your program from their computer then load it onto an iPhone without jailbreaking the device, which is a gamble. Read more from T. Dziuba @ http://search.theregister.co.uk Thanks T.D.
Tuesday, September 08, 2009
Koobface Fraud Malware...
the video, which is actually the worm’s installer. In order to make money using Koobface, its creators employ it as an installation platform for other malware, such as rogue security applications. These programs, also known as scareware or rogueware display bogus security alerts that inform the computer owner that his machine is infected, and in order to clean it, they have to acquire a license for the fake antivirus. One interesting aspect is that all these redirects occur through a list of predefined IP addresses and host names, including fire[expletive]eye.com and [expletive]briankrebs.com. These two domain names are direct references to a Washington Post journalist, who maintains the Security Fix blog, and the security research company FireEye. A message hidden inside a July variant of the worm ironically read “We express our high gratitude to a security consultant for the help in bug fixing, researches and documentation for our software.” This individual is an independent security consultant who plays an active role in tracking and shutting down botnets and other illegal operations.