LetsByteCode Headlines

There was a suspect in the disclosure of information about the authors of Stuxnet

U.S. intelligence agencies continue to look for the culprit in the declassification of classified cyber operations to introduce the Stuxnet worm in Iran’s computer systems.
Details about the operation “Olympic Games” were published in NY Times June 1, 2012 . The article...
There was a suspect in the disclosure of information about the authors of Stuxnet

Edward Snowden trained by the NSA

The papers of Edward Snowden not give enough clarity about what exactly he was doing for the NSA, what was his position.
He was not told about it, and his employer is also silent. Snowden officially called the technician or system administrator, but in an interview with China Morning Post, he...
Edward Snowden trained by the NSA

Code for spoofing APK preserving digital signatures on Android-powered devices

A few days ago, the company Bluebox Security announced that at the Black Hat USA 2013 conference, which begins July 27, 2013, they will talk about the enchanting vulnerability in the security model of the operating system Android, which allows an attacker to modify the contents of the APK...
Code for spoofing APK preserving digital signatures on Android-powered devices

Encryption is the first stop to intercept communications

It is no secret that government agencies are constantly monitoring communications of individuals, that is, ordinary citizens. In the case of the American system of surveillance is particularly interesting to see how often the interception of communications, whether it is a permanent process or...
Encryption is the first stop to intercept communications

The supercomputer "Tianhe-2" Takes No. 1 Ranking on 41st TOP500 List

The new Chinese supercomputer “Tianhe-2″ (“Milky Way-2″) headed by a fresh rating of the top 500 most powerful computer systems in the world.
The performance of this amounts to 33.86 petaflops supercomputer, which is almost twice the maximum performance of the former...
The supercomputer "Tianhe-2" Takes No. 1 Ranking on 41st TOP500 List

Export tweets in different formats

If you’re tired of Twitter and you want to leave this site forever, then, if desired you can make a total export of all your tweets. The easiest way to do this is through the service twDocs.
The service supports exporting to PDF, DOC, XML, CSV, TXT, XLS and HTML. Archive logs all messages,...
Export tweets in different formats

Export tweets in different formats

If you’re tired of Twitter and you want to leave this site forever, then, if desired you can make a total export of all your tweets. The easiest way to do this is through the service twDocs.
The service supports exporting to PDF, DOC, XML, CSV, TXT, XLS and HTML. Archive logs all messages,...
Export tweets in different formats

OWASP - Top 10 Vulnerabilities

Topping the list of the most dangerous and widespread flaws in web-applications was taken by injection of code.
According to the creators of Open Web Application Security Project (OWASP), which for the past 10 years is the top 10 most dangerous vulnerabilities in web-applications published the...
OWASP - Top 10 Vulnerabilities

New Windows-backdoor deletes MBR

Antivirus company Trend Micro warns of a new backdoor BKDR_MATSNU.MCB , which is actively promoted through mass mailings, especially in Germany. The malware has the unpleasant feature: a command from the remote C & C-server, or it can block the loading of the PC, or delete the master boot...
New Windows-backdoor deletes MBR

The world's first CPU of 5GHz

AMD has introduced the most powerful processor in the family of AMD FX and the world’s first commercially available CPU with a clock frequency of 5 GHz. Processor AMD FX-9590 with 8 cores provide high performance for gaming and multimedia applications on desktop computers. It is symbolic...
The world's first CPU of 5GHz

Critical vulnerability in 60 + models of CCTV and IP-cameras

A group of students from the European University of Madrid published the results of their thesis at the Faculty of Information Technology. They explored the protection of the various surveillance systems found on the Internet through Google and Shodan.
In total, they analyzed 9 systems, they...
Critical vulnerability in 60 + models of CCTV and IP-cameras

Hack a Samsung TV with SmartTV function

As reported in his blog, Helfurt German researcher Martin (Martin Herfurt), was able to crack the Samsung TV with function SmartTV.
The expert noted that a successful cyber attack carried out from a remote computer to broadcast programs on technology HbbTV (Hybrid Broadcast Broadband TV), used...
Hack a Samsung TV with SmartTV function

The man who "almost broke the Internet"

Two weeks ago Sven Olaf Kamfius (Sven Olaf Kamphuis) was arrested in Spain, of the company Cyberbunker. He was taken to the Netherlands, where he was held in court.
Most likely, the lawsuit was filed against Kamfiusa antispam company Spamhaus – a recent victim of DDoS-attacks with the...
The man who "almost broke the Internet"

The man who "almost broke the Internet"

Two weeks ago Sven Olaf Kamfius (Sven Olaf Kamphuis) was arrested in Spain, of the company Cyberbunker. He was taken to the Netherlands, where he was held in court.
Most likely, the lawsuit was filed against Kamfiusa antispam company Spamhaus – a recent victim of DDoS-attacks with the...
The man who "almost broke the Internet"

The search continues for the sixth member of LulzSec

Last week in the UK ended the trial of four young boys, three of whom are considered key players in the famous hacker group LulzSec. Previously convicted of two more, including the informal leader Sabu, who for many months was working as an FBI informant . At the same time, law enforcement...
The search continues for the sixth member of LulzSec

Statistics on the botnet Carna

Analyst in Information Security Parth Shukla at the conference AusCERT prepared an interesting presentation dedicated to botnet Carna. Recall that it was through this global botnet that the largest scan of the Internet was carried out for research purposes – Internet Census 2012.

For ten...
Statistics on the botnet Carna

MitmProxy 0.9

The new version of one of the best MiTM HTTP-proxy with support for SSL, having a console interface and allows you to check and edit the traffic flow “on the fly”, and save them for later analysis. According to the words of the program’s Aldo Cortes (Aldo Cortesi), this...
MitmProxy 0.9

The new 0day-vulnerability in Linux 2.6.37 - 3.8.8

A few days ago an exploit ready was published, which carries an escalation of privileges in Linux 2.6.37 – 3.8.8. The code shown on the link, anyone can compile and run on your system, checking its operation. If it does not work, it’s not a reason to calm: it may just need a more...
The new 0day-vulnerability in Linux 2.6.37 - 3.8.8

Convert PDF to HTML5 without losing formatting

pdf2htmlEX - a great tool to convert PDF documents into normal HTML-page with formatting. Converter is surprisingly good at handling various documents, including research papers, journals, and other formulas.

A few examples for demonstration.

Typography (LaTeX): HTML / PDF
Cheat...
Convert PDF to HTML5 without losing formatting

Hardware acceleration of H.264 in Firefox

In this most recent build of Firefox Nightly (next stable Firefox 23) includes support for H.264 video hardware acceleration.

This feature will be included in the stable releases for different operating systems.For example, in Firefox 21 (in a few days), hardware support for H.264 is...
Hardware acceleration of H.264 in Firefox

USB-Trojan

In modern operating systems, there is an interesting feature – they have complete trust in devices such as a keyboard or mouse. Accordingly, if you build the device, which will emulate the desired input, and connect it to your computer, you can do anything.
WARNING:The information is...
USB-Trojan

Honeypot with fake passwords to hackers

It took just 18 hours after the expert in information security Kyle Wilhoit (Kyle Wilhoit) connected to the Internet with two fake and one real SCADA-system – and they have already started to attack someone. The widespread popularity among script kiddies search engines such as Shodan, as...
Honeypot with fake passwords to hackers

How to know the date of Gmail account creation

Some of us have registered a Gmail account many years ago and do not remember exactly when it was. It is difficult to even remember the year, not what month and day. Fortunately, we now have a way to find out the exact date.
Why do it? Well, first, it may just be curious. And secondly, this...
How to know the date of Gmail account creation

Windows 8 Update is changing course to 180 degrees

Microsoft is preparing a release of an updated version of Windows 8.1 with a change of the “key elements” of the operating system. This was said by the head of marketing and finance of Windows Tami Reller in an interview with Financial Times . She explained that refers to the...
Windows 8 Update is changing course to 180 degrees

Hacked Google office building

Even established companies such as Google are not protected from tampering. Moreover, the trouble can come from where no one is waiting. For example, the Australian division of Google clearly complied with the rules of information security towards computer networks and broke them through the...
Hacked Google office building

Debian 7.0 Wheezy with multiarchitecture and installation in blind mode

After two more years of development, the Debian Project has finally issued the release its next major stable release of the popular operating system Debian 7.0 (code-named “Wheezy”). The new version has some interesting features, such as support multiarchitecture and special tools...
Debian 7.0 Wheezy with multiarchitecture and installation in blind mode

Transformer Acer Aspire R7

Anyone who is tried of using a laptop with a touch-screen and the “eight” on board, familiar feeling of “breaking the pattern”. In addition to the usual touchpad and keyboard adds another touch screen – but what to do with the last is unclear. Why you need a...
Transformer Acer Aspire R7

Transformer Acer Aspire R7

Anyone who is tried of using a laptop with a touch-screen and the “eight” on board, familiar feeling of “breaking the pattern”. In addition to the usual touchpad and keyboard adds another touch screen – but what to do with the last is unclear. Why you need a...
Transformer Acer Aspire R7

Integrated Graphics Core i7 supports a resolution of 4K Ultra HD

Laptops and Tablets with the new Intel processors will be able to work at a resolution of 3840 × 2160, not even slowing in top-level games like Battlefield 3 and BioShock Infinite. At the very least, with this kind of performance, Intel promises for system-on-chip fourth-generation Core...
Integrated Graphics Core i7 supports a resolution of 4K Ultra HD

Super Dimension Fortress: completely anonymous publishing

Today it is difficult to publish information on the Internet without leaving a trace. With social networks, it is clear: they want to become attached to the default user name. But even pick up an anonymous blog on free hosting like WordPress.com or Tumblr, – a non-trivial task. There is...
Super Dimension Fortress: completely anonymous publishing

Hacked database of dams in the USA

Unidentified attackers were able to gain access to the National Register of Dams – a database maintained by the U.S. Army Corps of Engineers (United States Army Corps of Engineers). This is a valuable database of 79,000 dams in America, with their weaknesses, evaluating the number of dead...
Hacked database of dams in the USA

Hacking Wii U console and accessing the file system

Wiikey hacker group said on its website the “complete hack” authentication system disks Wii U, disk encryption, file system, and everything else you need to run arbitrary applications in the embedded version of Linux.
The group specializes in long-Wiikey consoles Wii. In particular,...
Hacking Wii U console and accessing the file system

Phenomenon "! 1" on Google.com

If you specify a non-existent URL in the domain Google.com, then loaded the standard plug with error 404 “Page Not Found”. Since two years, Google has changed the design of this page, so now it looks that way.

 
All of these two years in the page header are exclamation points...
Phenomenon "! 1" on Google.com

Symantec: The number of attacks on small business has tripled

According to the results of 2012 the volume of hacker attacks against the theft of intellectual property, increased by 42%. This attack, typically aimed at small businesses, experts at Symantec said in its latest annual report 2013 Internet Security Threat Report, Volume 18 (ISTR...
Symantec: The number of attacks on small business has tripled

Prolexic: The volume of DDoS-attacks has increased eight-fold

Prolexic, which provides IT-services, conducted a study of the number duration and frequency of DDoS-attacks, concerning the infecting of web-sites and computer systems with malicious files. According to the data, in the last three months, almost all indicators increased eight-fold, compared...
Prolexic: The volume of DDoS-attacks has increased eight-fold

Prolexic: The volume of DDoS-attacks has increased eight-fold

Prolexic, which provides IT-services, conducted a study of the number duration and frequency of DDoS-attacks, concerning the infecting of web-sites and computer systems with malicious files. According to the data, in the last three months, almost all indicators increased eight-fold, compared...
Prolexic: The volume of DDoS-attacks has increased eight-fold

Critical vulnerability in routers Linksys, Belkin, Netgear, Verizon and D-Link

According to researchers of Independent Security Evaluators, they were able to detect a number of critical vulnerabilities in 13 models of home routers from companies such as Linksys, Belkin, Netgear, Verizon and D-Link.
According to experts, they have contacted the developer of devices and gave...
Critical vulnerability in routers Linksys, Belkin, Netgear, Verizon and D-Link

"Black hat" malware developed for Internet trading system

Security researchers have discovered a sample of malware in the system of online trading and brokerage services - Quickly Updatable Information Kit (QUIK). The experts of the Russian company to prevent and investigate cybercrime Group-IB said that with the help of this malware a number of...
"Black hat" malware developed for Internet trading system

Microsoft introduced a fix to update MS13-036

Microsoft has released an update for computers affected by the detected error in one of the security bulletins that were released last week.

For example, the company introduced the users to boot the image file used to create the backup DVD or USB-disk, which can remove security updates...
Microsoft introduced a fix to update MS13-036

Error on Magento Connect Manager!

Got this error while installing modules from Magento Connect :
Could not resolve host: magento-community; Host not found
Yet another simple solution :
instead of typing magento-community/<name_of_module>
paste this in the extension key to install...
Error on Magento Connect Manager!

Digg ready to replace Google Reader

Digg announced that it has started hard work on creating an RSS-aggregator, which should make up for the loss of Google Reader. Recall that Google has announced the imminent closure of the service in the “spring cleaning”. From July 1 Google Reader will not function, and  people who...
Digg ready to replace Google Reader

Samsung Exynos processor 5 Octa comes to the stage of mass production

Shortly after the presentation of the latest flagship smartphone Galaxy S 4, as previously reported, based on single-chip system Exynos 5 Octa , Samsung Electronics has officially informed that this SoC, which includes a total of eight ARM-cores will come out on the stage of mass production in...
Samsung Exynos processor 5 Octa comes to the stage of mass production

The new head of Samsung dissatisfied with sales of devices based on Windows

No need to read between the lines to see that some manufacturers (and developers) are not happy with sales of the gadgets on the basis of platforms of Microsoft. Recent comments about the company stated the newly elected CEO of Samsung Electronics (more precisely, one of the three current...
The new head of Samsung dissatisfied with sales of devices based on Windows

Reuters employee convicted for helping Anonymous

When Matthew (Matthew Keys) a couple of years ago Anonymous hackers leaked passwords from accounts of his former employer, he hardly thought it would end in criminal charges.
Despite the fact that Matthew thought, the U.S. Justice Department accused him on three counts, including conspiracy to...
Reuters employee convicted for helping Anonymous

Facebook will have hashtags

Apparently, the social network Facebook has decided to adopt from its rival one very interesting feature: hashtags. And yes, it will be stolen from Twitter. this innovation will allow Facebook users to easily index the topic, looking events and news that are of interest to them.

Hashtags, in...
Facebook will have hashtags

Cannot login to Magento Admin Panel after Installation!

I was annoyed when I couldn’t login to Magento admin panel, the problem was pretty lame – it was the session saving problem.
So all I had to do is replace http:/localhost/<path> with http://127.0.0.1/<path>
Simple na But non-sense .. Hope it helps you too!

Cannot login to Magento Admin Panel after Installation!

Magento - PHP Extension "curl" must be loaded

While installing Magento on XAMPP – I got this petty restriction
PHP Extension “curl” must be loaded
Simple Solution

Goto the php directory, in my case
C:\xampp\php
Then open the php.ini file & find extension=php_curl.dll
uncomment that code by removing the ;...
Magento - PHP Extension "curl" must be loaded

Specifications of Samsung Galaxy S IV in comparison with Galaxy Note III

In anticipation of next week’s announcement of the flagship Android-smartphone Samsung Galaxy S IV , which promises to be one of the highlights of the year in the mobile sector, experts have tried to compare the estimated specification of future innovations to the characteristics of...
Specifications of Samsung Galaxy S IV in comparison with Galaxy Note III

Vulnerability in Samsung Galaxy S III can bypass lockout

Just a few days ago it was reported there are serious “holes” in the Samsung Galaxy Note II, to access mobile applications by bypassing the lock gadget that allows for example to run any program or dial any phone number without the authorization of the owner. And now it turns out...
Vulnerability in Samsung Galaxy S III can bypass lockout

Experts: 99% web-applications contain vulnerabilities

According to a new report by Cenzic, existing vulnerabilities in web-applications are a major concern, as they are present in almost 99% of the products.
Researchers predict what vulnerabilities most likely be exposed to the victim in the current year.

“Ensuring the security level...
Experts: 99% web-applications contain vulnerabilities

TVs and Blu-Ray Players Samsung are prone to remote DoS-attack

Independent security researcher Luigi Oriema (Luigi Auriemma) discovered vulnerability allows remote users to conduct DoS-attack on a number of models of Blu-Ray players and TVs of Samsung.

According to the expert, the vulnerability exists in current firmware version of televisions manufactured...
TVs and Blu-Ray Players Samsung are prone to remote DoS-attack

Hackers broke into Chrome, Firefox, IE 10, and Java at Pwn2Own

As part of the contest, Pwn2Own participants used a previously unknown vulnerability in Chrome, Firefox, IE 10, Windows 8 and Java. Attacks could be made by processing in the browser specially created web-pages, which ended by gain full control over the system. Hackers spent hacking the most...
Hackers broke into Chrome, Firefox, IE 10, and Java at Pwn2Own

Researchers recorded distribution of a new Java exploit

According to experts, the latest version of Java 7 and Java 6 are vulnerable to malicious attacks.
New exploit, previously unknown vulnerability, as well as gaps in the older versions of Java is widely used by hackers, say researchers from antivirus company FireEye.

“We recorded...
Researchers recorded distribution of a new Java exploit

Evernote administration reportedly hacked

According to the post of administration service Evernote, which speciali es in cloud storage, were attacked by unknown hackers. Due to the incident the users of which are over 50 million people, are asked to change the passwords of your accounts.
The notice also states that were compromised user...
Evernote administration reportedly hacked

A hacker broke into the computer system of the prison, while serving a sentence

According to Daily Mail, 21-year-old hacker Nicholas Webber (Nicholas Webber), sentenced to 5 years in prison for creating web-site, through which he stole data of credit cards, is suspected of breaking into the computer network of the prison in which the attacker is still serving a sentence,...
A hacker broke into the computer system of the prison, while serving a sentence

Windows 8 will get back "Start" menu

New comprehensive update to Windows 8/RT, Windows Server 2012, Windows Phone 8 and cloud Outlook.com called SkyDrive Windows Blue appears in the middle of this year. One of the purposes of this update is to optimi e the work and the interest of the users of the operating system from...
Windows 8 will get back "Start" menu

Chrome, Internet Explorer and Safari are vulnerable to download of huge number of unnecessary data

Web-developer Feross Abukadi hey (Feross Aboukhadijeh) presented a simple in execution exploit that allows the site secretly download to users’ computers gigabytes of garbage data.
The developer said that the exploit called FillDisk.com loads the data on the hard drive without the...
Chrome, Internet Explorer and Safari are vulnerable to download of huge number of unnecessary data

Wikileaks informant Bradley Manning escapes death penalty

Soldier said that he had “done something that allows him to consider his conscience is clear.”
Almost three years after solitary confinement in a military prison Private Army U.S. Bradley Manning (Bradley Manning) finally appeared in court, where he was not found guilty of the most...
Wikileaks informant Bradley Manning escapes death penalty

MWC 2013: Huawei and LG smartphones with Firefox OS

To manufacturers of smartphones that are running Firefox OS are added two more – Huawei and LG. The exhibition MWC resource CNet said on the stand operator Telefonica had two devices from these companies. Unfortunately, no data on the characteristics or even the names of these gadgets is...
MWC 2013: Huawei and LG smartphones with Firefox OS

MWC 2013: Lenovo unveiled tablets S6000, A3000 and A1000 with Jelly Bean

Lenovo has announced three tablet called S6000, A3000 and A1000. The first of these is the 10-inch model, and the second and third – 7-inch. They work under the operating system Android 4.1 Jelly Bean.



S6000 has a 10.1-inch IPS-display with a resolution of 1280×800 pixels and a...
MWC 2013: Lenovo unveiled tablets S6000, A3000 and A1000 with Jelly Bean

MWC 2013: Caterpillar release fortified smartphone

Caterpillar has developed the theme “neubivaemoy” smartphones and prepares to start selling the new model – CAT B15. Like its predecessor, CAT B10 , has a new degree of protection IP67, which means it can be immersed in water to a depth of 1 meter for some time and is fully...
MWC 2013: Caterpillar release fortified smartphone

MWC 2013: The new Kaspersky Mobile Security Anti-phishing and SMS-free basic version

“Kaspersky Lab” has announced a new version of Kaspersky Mobile Security – security solution for smartphones on the platform Android. The product offers new tools: “SMS Anti-Phishing” for checking suspicious links in text messages, and “Alarm” (Siren) to...
MWC 2013: The new Kaspersky Mobile Security Anti-phishing and SMS-free basic version

MWC 2013: Smartphone i-mate Intelegent runs on Windows 8 Pro

MWC 2013 presented a very interesting mobile device called Intelegent from manufacturer i-mate, once known in this country with their cell phones and smartphones. The operating system it uses is not Android or Windows Phone 8, as one would expect but a full Windows 8 Pro, which allows you to run...
MWC 2013: Smartphone i-mate Intelegent runs on Windows 8 Pro

Google is working on a new web-protocol to replace the UDP

Google Chrome, probably already support this new protocol, however, test it is not yet possible. Web-developer Francois Beaufort (François Beaufort) reported that Google Chrome Team is now working on a new web-protocol QUIC replacement UDP. Details of the company does not disclose, however,...
Google is working on a new web-protocol to replace the UDP

Dr.Web: Mass hacking Linux-based servers by Linux.Sshdkit

Russian producer of anti-virus protection of information – “Doctor Web” – conducted an investigation into hacking web-servers that run on the operating system Linux. According to experts, one way of stealing passwords on servers based on Linux is a Trojan called...
Dr.Web: Mass hacking Linux-based servers by Linux.Sshdkit

Trend Micro research and ISACA - APT-attack a real threat to economic stability.

Trend Micro research and ISACA found that this type of attack is a real threat to economic stability. According to a survey of more than 1,500 experts in the field of information security found that only one of the five companies at least once been the victim APT-attack, but 63% of respondents...
Trend Micro research and ISACA - APT-attack a real threat to economic stability.

Facebook reported on a successful "complex" hacker attack

According to Facebook, the social network has undergone a “complex” attack by unknown hackers. Moreover, as reported in the blog of the incident was identified back in January of this year. Any sensitive data of users, according to Facebook, were not compromised. Social networking...
Facebook reported on a successful "complex" hacker attack

Adobe releases emergency updates for Reader

This week, Adobe plans to release emergency patch for two critical zero-day vulnerabilities in the program Adobe Reader. The vulnerability is already being used by fraudsters. The first vulnerability is contained in the version of Reader for Windows, OS X and Linux. Second vulnerability for...
Adobe releases emergency updates for Reader

The end of official support for Windows 7 without service pack

Microsoft released Windows 7 in October 2009, about three and a half years ago – and to the surprise of many, the first version of Windows 7 will soon be deprived of official support fromMicrosoft. Even more surprising is that this happens even earlier than the Support for Windows XP. How...
The end of official support for Windows 7 without service pack

A council to improve SSL connections

Largest Certification decided to unite their efforts in order to strengthen the security of web-connections and create a Certificate Authority Security Council, CASC. “We decided that SSL needs a leader” – sends word Darkreading representative DigiCert Jeremy Rowley (Jeremy...
A council to improve SSL connections

Vulnerability in iOS 6.1 allows iPhone to be compromised through the lock screen

By manipulating a few emergency calls and the power button, the user can gain access to the interface of the phone. One of the users of the service under the name videosdebarraquito YouTube posted a video instruction Bypass lock screen on iPhone 5 running iOS versions 6.1, 6.0.2 and 6.0.1. As...
Vulnerability in iOS 6.1 allows iPhone to be compromised through the lock screen

Rumors: Hewlett-Packard will release Android-tablets and smartphones

Refusing webOS, Hewlett-Packard still try again to prove itself in the promising market of tablets and smartphones. According to ReadWrite, soon American manufacturer announced one of the first Android-tablet hardware platform NVIDIA Tegra 4. As reported ReadWrite, the corporation is...
Rumors: Hewlett-Packard will release Android-tablets and smartphones

ARM: Android-smartphones and tablets to cost $100

According to the Executive Director of ARM Dipesh Patel, the price remains the main obstacle holding back the growth in popularity of tablets and smartphones running Android. «Should offer more affordable device,” – says Patel. “Only five out of the seven billion people...
ARM: Android-smartphones and tablets to cost $100

VMware eliminated privilege escalation vulnerability

According to developers, the breach involves products such as ESX Server, Workstation, Fusion and View. According to the post of developers of virtualization software from VMware, in products such companies as ESX Server, Workstation, Fusion and View a dangerous vulnerability was...
VMware eliminated privilege escalation vulnerability

Advertising TDoS-attack on public forums

Attackers have posted a net advertising and pricing of services. Until recently, an attacker wishing to embark on cybercrime but does not have the necessary knowledge, looking for ways to get to the private specialized forums on topics of interest to him and watch “sit” in the chat...
Advertising TDoS-attack on public forums

"Doctor Web" warned of a new form of Internet fraud

Registered on dating sites scammers get money from their victims. Russian company “Doctor Web” warned users about a new form of fraud that has become particularly popular at the end of last year. Become victims of malicious single women registered on sites dating. According to...
"Doctor Web" warned of a new form of Internet fraud

Websense: The number of malicious web-sites has increased by 600%

85% of the malicious sites hosted on legitimate web-resources. As the researchers at Websense find that in 2012, the number of malicious sites has increased by almost 600% and exceeded 100 million Most of the attacks were directed at legitimate popular sites, forcing researchers to change...
Websense: The number of malicious web-sites has increased by 600%

Adobe Reader zero-day vulnerability

Popular Adobe Reader software was detected with a zero day vulnerability which allows you to execute arbitrary code on the target system. Reported by FireEye, who happened to encounter with an infected PDF-document capable of compromising computers based on Windows. When trying to open a...
Adobe Reader zero-day vulnerability

Microsoft plans to release a software package Microsoft Office for Linux

Microsoft has released a new package of Microsoft Office 2013, so it can concentrate on creating a product that can work not just on Windows. Sources claim that Microsoft has already started work on a new software package Microsoft Office for OS kernel Linux. There is also speculation that...
Microsoft plans to release a software package Microsoft Office for Linux

Microsoft Security Essential once again named the worst anti-virus program

Company Dennis Technology Labs has evaluated eight major antivirus software, giving them the rating in two categories – accuracy and security. Free antivirus software Microsoft Security Essential (MSE) has once again proved the inability to adequately protect your computer. Dennis...
Microsoft Security Essential once again named the worst anti-virus program

11-year-old hacker stole data of participants of online-game

According to BBC, researchers at antivirus company AVG highlighted programs designed to steal virtual currency. The study, written by experts experienced “amateur” malicious code that was used to steal data. As it turns out, the author of the code was a child. Researchers reported...
11-year-old hacker stole data of participants of online-game

Hackers have stolen $11 million from clients of Visa

Organized group of cyber criminals stole about $11 million in the last days of 2012 as reported by KrebsOnSecurity. According to sources of financial institutions and law enforcement agencies for the first time hackers have proved New Year’s Day in 2012. To withdraw money from at least a...
Hackers have stolen $11 million from clients of Visa

A critical vulnerability in routers of D-Link

Security researcher Michael Messner (Michael Messner) has encountered a critical vulnerability in the wireless router of D-Link (model DIR-600 and DIR-300). Data can be breached by malicious people to compromise a vulnerable system. Fears of an expert is that on successful exploitation potential...
A critical vulnerability in routers of D-Link

Oracle has eliminated 50 vulnerabilities in Java

The manufacturer also re eliminated zero-day vulnerability that is fixed in the past month. Oracle is under pressure from the international information security community has released an update to Java 7 Update 13 vulnerabilities which actively exploited by hackers. Company has removed a total...
Oracle has eliminated 50 vulnerabilities in Java

Fortinet: Cybercriminals offer Crime-as-a-Service

According to the company report, the attackers are trying to create a clear structure for the organization of cybercriminals. Fortinet introduced the report «Fortinet 2013 Cybercrime Report», which focuses on the transition to a new level of cybercriminals. Thus, attackers use a business model...
Fortinet: Cybercriminals offer Crime-as-a-Service

McAfee has detected a new version of the Trojan Citadel

Experts suggest that the spread of malware was done by a group of hackers named «Poetry Group». Experts of the company McAfee stated that Trojan Citadel, whose main task is stealing financial information of victims, is being used to attack a certain number of organizations in Europe and Japan....
McAfee has detected a new version of the Trojan Citadel

Untethered jailbreak for iOS 6.1

A group of hackers “evad3rs” announced the release of the informal version of the OS. According to the group of hackers calling themselves “evad3rs”, in the public domain appeared to untether iOS 6.x. Unofficial version of the operating system Apple is available for...
Untethered jailbreak for iOS 6.1

Vulnerability in TLS-protocol

Error in the TLS-protocol can be used to gain access to passwords and other personal information of users. Professor from University of London Kenny Patterson (Kenny Paterson) and academician Nadhem Alfardan (Nadhem Alfardan) discovered a new vulnerability in the TLS-protocols. This error, which...
Vulnerability in TLS-protocol

Untethered jailbreak for iOS 6.1 will be released on February 3rd

Developers of unofficial version of the operating system reported successful hacking attempt. According to the hacker group «evad3rs» on Twitter, experts in hacking iOS successfully conducted the first test to compromise iOS 6.1. «IOS 6.1, as it turned out, is vulnerable to the exploits that...
Untethered jailbreak for iOS 6.1 will be released on February 3rd

Symantec: New Trojan uses SPF-protocol to infect computers

Symantec has detected a new Trojan horse program that shows users fake advertisements when viewing web-pages. Trojan uses an extension of the protocol for sending email SPF (Sender Policy Framework) for instructions from intruders. This technique allows the malware to remain unnoticed by the...
Symantec: New Trojan uses SPF-protocol to infect computers

Vulnerability in ISC BIND allows DoS-attack

The manufacturer recommends to eliminate a temporary solution or wait for updated to a stable version of the product. Internet Systems Consortium (ISC) announced the existence of vulnerabilities in the server domain names BIND, can cause termination of the Response Policy Zone...
Vulnerability in ISC BIND allows DoS-attack

Experts recommend to pay compensation for discovering vulnerabilities in SCADA-systems

According to Executive Director of Digital Bond, modern SCADA-solutions are using outdated and too low quality code. Security researchers from the United States suggested SCADA-systems developers to rethink their approach to security of critical infrastructure. According to them, bugfix release,...
Experts recommend to pay compensation for discovering vulnerabilities in SCADA-systems

New Java Exploit questions the effectiveness of protection against exploits

Researchers have discovered vulnerabilities to bypass security settings of Java, designed to protect against hidden exploits. Researchers from security company Security Explorations managed to find vulnerabilities in the security of Java, which are designed to provide protection against hidden...
New Java Exploit questions the effectiveness of protection against exploits

Google gets rid of passwords

Google is developing solutions that will allow users to enter their Gmail account using a ring with a microchip. Staff members of the security department of the company presented a report which reported on possible ways to improve secure access to web-sites. This development can be very useful,...
Google gets rid of passwords

Prolexic has published a report on DDoS-attacks in 2012

According to the report by researchers, for the last quarter of 2012, DDoS-attacks have become more diverse and extensive. In the last quarter of 2012, the number of attacks has increased, in addition, they have become more widespread and diverse, report researchers at Prolexic. The most...
Prolexic has published a report on DDoS-attacks in 2012

Red October - a complex two-stage cyber attack

Kaspersky Lab reported on a large-scale campaign of cyber espionage called Red October, which was carried out by hackers over the past five years. The main target were diplomatic, government agencies and academic organizations. Experts analyzed the anatomy of attacks, attackers scheduled the...
Red October - a complex two-stage cyber attack

Panda Security launches new version of the network device GateDefender Performa

Panda Security has released a new version of multi-purpose perimeter security Panda GateDefender Performa eSeries. The new device allows medium and large enterprises (50 people or more) to protect their corporate network and increase their productivity. It is available in three different...
Panda Security launches new version of the network device GateDefender Performa

Foxit has removed a critical vulnerability in its PDF-reader for browsers

Information on the vulnerability has been publicly available for one week. Foxit Software Company has released a security patch for its add-on for web-browsers, for reading PDF files. In the new version (5.4.5), critical flaw has been removed, which allowed a potential attacker to remotely...
Foxit has removed a critical vulnerability in its PDF-reader for browsers

Backdoor disguised as a critical Java update

The new threat was discovered by researchers at Trend Micro. According to the blog post by Trend Micro, a researcher the antivirus company Padzhares Paul (Paul Pajares) found the backdoor disguised as the latest critical updates for Java. It should be noted that on January 14 this year, Oracle...
Backdoor disguised as a critical Java update

Students of Indian Universities will learn the basics of cybersecurity

State authorities intend to significantly increase the level of IT-security in India. The University Grants Commission of India (UGC) has sent to all its members in higher educational institutions request for a course on cyber security training programs for both students and graduate students....
Students of Indian Universities will learn the basics of cybersecurity

Dutch researchers analyzed botnet Pobelka

Dutch company Fox-IT released a detailed report describing the activities of a botnet called Pobelka. According to the experts, the hackers used malicious programs aimed primarily at users of Holland and Germany. Fraudsters who ran a botnet, looking for their potential victims with underground...
Dutch researchers analyzed botnet Pobelka

90% of passwords can be cracked in seconds

Passwords remain the primary factor for authentication, but in today’s world it is not enough. According to a survey by research firm Deloitte Canada, today the average time users spend on a computer to come up with a password is much less, more than 90% of passwords can be hack in...
90% of passwords can be cracked in seconds

Dr.Web: A new trojan replaces queries

The most active Trojan spreads in the U.S. state of Kansas. The company “Doctor Web” found a new malicious program that replaces the search queries. In addition, the Trojan also redirects users to sites of the attacker. Once the virus gets on your computer, it creates a copy of...
Dr.Web: A new trojan replaces queries

Hackers sell new exploits of Java for $5000

Exploit for a zero-day vulnerabilities started selling on underground Internet forums. Less than a day after Oracle developers fixed a dangerous vulnerability in Java which allows hackers to remotely compromise a system based on Windows, on underground Internet forums selling the exploit for...
Hackers sell new exploits of Java for $5000

Armenian hackers publish papers to protest against the killing of Aslan Usoyana

Activists have published confidential information of Sumato Energy and the Special State Protection Service, as well as many businesses. Arachne hacker organization that associates itself with Anonymous, published a large number of documents related to the company Sumato Energy and its director...
Armenian hackers publish papers to protest against the killing of Aslan Usoyana

Chinese Android users warned of large-scale botnet

Initially, the botnet was discovered in 2011 and now it has been introduced in about seven thousand applications for Android. Researchers in the field of information security in China warn users of devices based on Android the discovery of large-scale botnet aimed at the platform. The botnet...
Chinese Android users warned of large-scale botnet

US-CERT: Two U.S. energy companies are infected with malware

Computer systems were infected by the use of USB-drives. US-CERT Team responded quickly to the threats, reported that two U.S. energy companies have been victims of a computer virus in the last quarter of 2012. In both cases, industrial systems have been infected by the use of USB-drives. One...
US-CERT: Two U.S. energy companies are infected with malware

CES 2013: Gaming Headsets Thrustmaster Y-Gaming

Thrustmaster gaming headsets Y-Gaming Headsets: Y-250X for Xbox 360 , Y-250P for PS3 and Y-250C for PC. The 50mm dynamic head set provides a deeper bass than the mid-range, which, in turn delivers greater high-frequency sounds. This distribution corresponds to the alleged performance...
CES 2013: Gaming Headsets Thrustmaster Y-Gaming

CES 2013: Speed keyboard SteelSeries Apex and Apex [RAW] for games

At the Consumer Electronics Show, SteelSeries gaming keyboard Apex and Apex [RAW] was revealed. According to the manufacturer, Apex and Apex [RAW] become the world’s fastest response time keyboard, with a lot of improvements in the layout. Among them are the low-profile keys, comfortable...
CES 2013: Speed keyboard SteelSeries Apex and Apex [RAW] for games

CES 2013: Samsung introduces a refrigerator with built-in Android

Samsung Electronics has introduced an expanded line of home appliances Luxury kitchen at CES 2013. The first shown was the refrigerator Samsung T9000 with volume 906 liters and the new four-door form factor.       It has a French Door upper compartment of 550 liters and a lower compartment...
CES 2013: Samsung introduces a refrigerator with built-in Android

Kaspersky Lab: "Red October" is spying on the world's governments

“Kaspersky Lab” has published a report on a large-scale study of the campaign by cybercriminals to commit espionage for diplomatic, government and research organizations around the world. Malicious actions were designed to obtain confidential information data, providing access to...
Kaspersky Lab: "Red October" is spying on the world's governments

CES 2013: Buffalo routers with support for 802.11ac

Japanese company Buffalo demonstrated a number of network devices. Series of wireless routers and adapters AirStation in Q2 2013 will be complemented by two new routers WZR-1750DHP and WZR-1166DHP, as well as USB-adapter 802.11ac. Wireless Router AirStation WZR-1750DHP provides speeds up to...
CES 2013: Buffalo routers with support for 802.11ac

CES 2013: Dell Project Ophelia will climb into the clouds from TV

Dell has announced a solution that allows you to turn compatible TV sets and monitors into Android-powered device with all the benefits of the latter. The device is called Project Ophelia and is something a little more conventional flash. It is stated that it can connect to a TV using...
CES 2013: Dell Project Ophelia will climb into the clouds from TV

CES 2013: Lenovo ThinkPad Helix combines qualities of ultrabook and tablet

Lenovo has officially unveiled at CES 2013 additions to its series of ThinkPad laptops in the form of a new model of Helix for Windows 8 , which combines some quality compact ultrabook and a tablet. Indeed, the device has a 11.6-inch touch screen, which if necessary can be separated from the...
CES 2013: Lenovo ThinkPad Helix combines qualities of ultrabook and tablet

Adobe releases patches for 27 vulnerabilities in Acrobat and Reader

Adobe Systems has officially announced the release of a service pack for branded software products, including the Reader 11.0.0 and Acrobat 11.0.0 and earlier versions of the application for the Windows and OS X . Also an update for Reader 9.5.1 and earlier 9.x versions for software platform...
Adobe releases patches for 27 vulnerabilities in Acrobat and Reader

CES 2013: Microsoft IllumiRoom technology will transform any room into a display

Microsoft and Samsung are working on a very interesting and an unusual Idea called IllumiRoom. Its essence is that the image on the monitor is distributed throughout the room. And this is taking into account the geometry of the surrounding space, and as it expands the virtual world with a small...
CES 2013: Microsoft IllumiRoom technology will transform any room into a display

CES 2013: Samsung curved OLED-TV

During the International Consumer Electronics Show CES 2013, Samsung Electronics introduced OLED-TV in arc shape. As planned by the manufacturer, that makes the content that is displayed on the TV screen, bright, dynamic and as realistic as possible. Curved OLED-TV provides additional...
CES 2013: Samsung curved OLED-TV

CES 2013: Samsung Youm flexible display

Samsung introduced a bendable display at CES 2013. This is an interesting technology called Youm. In the past, the Korean manufacturer has shown this invention, but now it looks like it has a finished product – without sticking chips etc. Perhaps the widespread use of this type of display...
CES 2013: Samsung Youm flexible display

Plugin for Foxit Reader has a critical vulnerability

An attacker can exploit to compromise the URL-address of the target system. Expert in the field of information security Mikalatstsi Andrea (Andrea Micalizzi) has encountered a critical vulnerability in the current version of the plug-in to the browser, which is part of the program to read...
Plugin for Foxit Reader has a critical vulnerability

NVIDIA has removed a security vulnerability

The vulnerability was published on Pastebin, although the company was not notified about its discovery. The company has released an update for NVIDIA driver (310.90 WHQL), which fixes the vulnerability in the security system, discovered in late December. The pre-existing flaw could allow...
NVIDIA has removed a security vulnerability

Yahoo has removed XSS-vulnerability of their email-application

Security researchers report that the update from Yahoo earlier in the week for a serious vulnerability, has not eliminated the problem and users are still at risk. XSS-vulnerability was discovered by Shahin Ramezani (Shahin Ramezany), known as Abysssec. vulnerability allows an attacker to gain...
Yahoo has removed XSS-vulnerability of their email-application

99% of malware targets Android

A recent study shows that the amount of malware targeting Android is incredibly large. Researchers’ at Kaspersky ” found that 99% of newly discovered malware on mobile devices are aimed, in general, at Android, and only a small number of them focused on smart phones running on Java...
99% of malware targets Android

CES 2013: Platform for cloud gaming NVIDIA GRID

At CES 2013, NVIDIA revealed details about gaming platform NVIDIA GRID. In particular, it is reported that six companies are already planning to use the platform for cloud gaming. NVIDIA GRID platform makes possible smooth online gaming experience on any high-end PC screen, including...
CES 2013: Platform for cloud gaming NVIDIA GRID

CES 2013: Asus will release a flexible tablet in 2013

Asus has officially confirmed that in the first quarter of 2013 it will release a tablet of the “new generation” with sensors from the company Atmel. The new technology of this manufacturer named XSense it is possible to produce sensors for touch screen, which can bend and fold. If...
CES 2013: Asus will release a flexible tablet in 2013

CES 2013: Qualcomm Snapdragon 600 and 800 at up to 2.3 GHz and support for 4K-video

Qualcomm has officially introduced at CES 2013 its latest developments in the face of mobile chips Snapdragon 600 and 800, targeted for use in high-end smart phones and tablet computers, as well as in the systems of Smart TV. At present, these quad-SoC are available as prototypes, and the first...
CES 2013: Qualcomm Snapdragon 600 and 800 at up to 2.3 GHz and support for 4K-video

CES 2013: Portable Touch Screen Monitor Lenovo ThinkVision LT1423p

Lenovo has introduced a portable monitor the unusual ThinkPad LT1423p Mobile Monitor, which can be used as a second display device is not equipped with a touch screen. Slim and lightweight portable monitor ThinkVision LT1423p Mobile Monitor with Touch Control – a new generation of this...
CES 2013: Portable Touch Screen Monitor Lenovo ThinkVision LT1423p

CES 2013: Blu-ray player Samsung BD-F7500 premium

Samsung Electronics has introduced a Blu-ray player with premium Samsung BD-F7500. It is an advanced player with support for ultra high-definition images Ultra High Definition (UHD), which provides a realistic image. The new Blu-Ray player from Samsung with technology scaling the image to the...
CES 2013: Blu-ray player Samsung BD-F7500 premium

CES 2013: Portable console NVIDIA Project Shield with Android

NVIDIA has announced a portable gaming console called Project Shield, which is running an operating system Android (Jelly Bean). It is stated that it is designed to allow users to “enjoy” games for Android and Windows. And if Android-games are quite clear that from Windows-based...
CES 2013: Portable console NVIDIA Project Shield with Android

CES 2013: Lenovo IdeaCentre Horizon Table PC in the form of tables for multiplayer games

Lenovo has announced at the CES 2013 kicks off an unusual device IdeaCentre Horizon Table PC. This is the first table-Lenovo PC technology to support multi-touch designed. The table Horizon Table PC can accommodate several people whiel connecting special game accessories and play multiplayer...
CES 2013: Lenovo IdeaCentre Horizon Table PC in the form of tables for multiplayer games

CES 2013: Transformer Lenovo IdeaPad Yoga 11S with Ivy Bridge and Windows 8

Lenovo has introduced a new version of its unusual transformer IdeaPad Yoga – Yoga IdeaPad 11S. In contrast to last year’s predecessor , the 11-inch IdeaPad Yoga 11 , based on the new processor architecture x86, not ARM – Intel Ivy Bridge. Accordingly, as a software platform...
CES 2013: Transformer Lenovo IdeaPad Yoga 11S with Ivy Bridge and Windows 8

CES 2013: Lenovo puts touchscreens on their laptops and ultrabooks

Lenovo has announced new versions of its ultrabooks and laptops – IdeaPad U310 Touch, IdeaPad U410 Touch, IdeaPad Z400 Touch and IdeaPad Z500 Touch. Innovation is to set them with a touch screen with support for 10-point multitouch, as well as changes to certain characteristics. All four...
CES 2013: Lenovo puts touchscreens on their laptops and ultrabooks

LinkedIn user base exceeded 200 million

LinkedIn has reached another milestone in its development. The professional social network today announced that the number of users broke the mark of 200 million people in more than 200 countries around the world. LinkedIn operates today in 19 languages, the company said. “I would like to...
LinkedIn user base exceeded 200 million

Europol: Scammers steal 1.5 billion euros from credit cards each year

According to the experts at Europol, on the basis of 2012 in the EU more than 726 million payment cards (debit and credit) were issued. The total amount of damage caused by fraudsters to card holders of these cards was 1.5 billion euros. It is stated in the report of the regulator «Situation...
Europol: Scammers steal 1.5 billion euros from credit cards each year

Experts: Censorship does not work on pirate sites

Researchers from Northeastern University in Boston conducted a study, the results of which show that blocking pirate sites is ineffective. Experts analyzed the availability of pirated material on file-exchange sites and found that pirates have the time to publish more illegal content than...
Experts: Censorship does not work on pirate sites

TPB on top of Torrent-trackers

Despite the arrests of its founders, TPB is the most popular Torrent-tracker in the world. TorrentFreak published a list of the most popular Torrent-trackers at the beginning of 2013. Despite the harassment and detention of the creators, The Pirate Bay (TPB) maintains a leading position in the...
TPB on top of Torrent-trackers

Web API for cryptographic operations

Consortium organization that develops and implements technology standards for the World Wide Web, W3C presented drafts of web-standard using Web API for implementing cryptographic operations in web-applications. For example, Web Cryptography API defines a JavaScript API to perform basic...
Web API for cryptographic operations

System compromise in Adobe Flash Player and Adobe AIR

Date of publication: 09/01/2013 Modified: 09/01/2013 Danger: High The presence of corrections: Yes Number of vulnerabilities: 1 CVSSv2 rating: (AV: N / AC: M / Au: N / C: C / I: C / A: C / E: U / RL: O / RC: C) = Base: 9.3/Temporal: 6.9 CVE ID: CVE-2013-0630 Vector...
System compromise in Adobe Flash Player and Adobe AIR

Adobe has removed a critical vulnerability in Flash, Reader and Acrobat

Developers have released an update that closes a dangerous vulnerability in three products of the company. According to the post of developers at Adobe, January 8, 2013 a security update was released for the company’s products such as Flash, Reader and Acrobat. Specialists note that the...
Adobe has removed a critical vulnerability in Flash, Reader and Acrobat

Malicious services

In their “threat research in Information Security – 2013″, which is published annually by Sophos, they examined the development of the industry of malicious software to identify new trends in its development. Chief among them are the active use of services that allow you to...
Malicious services

Asus plans to launch Google TV-Device

Google announced that Taiwan’s Asus at CES 2013 will show a new device running the software for GoogleTV. According to unconfirmed reports, it will be a set-top box Asus Qube. Google says that Asus, Hisense and TCL – these new companies partners GoogleTV, whereas before it had joined...
Asus plans to launch Google TV-Device

Samsung introduced a set of hardware to upgrade TVs

Samsung has introduced a set of hardware upgrade Evolution Kit for TV Smart TV in 2012. It was first shown at last year’s CES, and this time the Korean Corporation has brought to the exhibition a full production version of the Evolution Kit. With the help of the previous model series TVs...
Samsung introduced a set of hardware to upgrade TVs

History of Consumer Electronics Show in Photos

After a few days of opening its doors to one of the world’s largest consumer electronics trade show – Consumer Electronics Show. CES opening is scheduled for January 8, the show will continue for four days, until 11 January. The first Consumer Electronics Show was held in June...
History of Consumer Electronics Show in Photos

Archos TV connect convert Android into PC

Archos company introduced an interesting device that can turn your TV to a “computer” with Android OS. ARCHOS TV connect intends to connect to a TV via HDMI-cable. Operated via a rather non-standard panel, which includes several groups of controls. Usual Android-device buttons on...
Archos TV connect convert Android into PC

CES 2013: Gorilla Glass 3 will be even stronger

Corning, maker of the famous glass Gorilla Glass, which is often used in today’s smartphones, said it will demonstrate at CES 2013 a new version of its product. It claims it will have a number of advantages over Gorilla Glass 2, shown in January last year at the same exhibition. According...
CES 2013: Gorilla Glass 3 will be even stronger

Pinterest buys culinary service Punchfork

Pinterest launched a corporate M & A-strategy and this week announced the acquisition of service Punchfork, which is a network aggregator for recipes. Neither Pinterest or Punchfork have reported the transaction value, but its conditions are completely closed, the founder of the service,...
Pinterest buys culinary service Punchfork

Qualcomm announced a new network technology StreamBoost

Qualcomm Atheros announced a new technology StreamBoost, with which the company plans to help build a new generation of WiFi-routers and gateways, with improved performance and support for the transfer of movies and online games streamed at home networks. StreamBoost based on wireless LAN...
Qualcomm announced a new network technology StreamBoost

Samsung has introduced powerful ultrabooks with Windows 8

Samsung has introduced two new models of laptops running the operating system Windows 8: Series 7 Ultra and Series 7 Chronos. Cost  of the computers is yet to be announced. Series 7 Chronos will be equipped with a hard disk up to 1 TB, Radeon HD 8870 with 2 GB of memory on board, as the...
Samsung has introduced powerful ultrabooks with Windows 8

Canonical has released Ubuntu Phone System

Canonical announced specialized version of Ubuntu Linux, created for smartphones. The new version of the popular operating system is designed to create at least some competition in the mobile Linux-like operating system, which is now dominated by Android. Canonical said that they have created...
Canonical has released Ubuntu Phone System

Microsoft has released a hot fix for Internet Explorer

Microsoft has released an emergency fix for Internet Explorer, a vulnerability exploited by hackers on the Internet to break into computers which has been fixed. Error is in the older versions of the browser, the latest IE 10 is not affected by the problem. According to the company, the problem...
Microsoft has released a hot fix for Internet Explorer

Thirty years of the Internet

Thirty years of running the Internet as the current system is celebrated in the United States. One of its creators, Vinton Cerf, from January 1, 1983 all of the computers that were part of a network of ARPANET / network DARPA Pentagon – translated into protocols TCP / IP / Transmission...
Thirty years of the Internet

Hackers can interfere in voting for "Oscar"

Some members of the Academy of Motion Picture Arts and Sciences have expressed concerns that the results of electronic voting for “Oscar” this year may have been compromised by hackers. Voting for nominees’ for Oscar-2013 started on December 17 and will end on January 3. For...
Hackers can interfere in voting for "Oscar"

Hacking Cisco IP-phone

Two weeks ago a student of intrusion detection systems for Columbia Ang Kui (Ang Cui) published a report on exploiting vulnerabilities in the kernel CNU (Cisco Native Unix) in IP-phones of Cisco 7975G, 7971G-GE, 7970G, 7965G, 7962G, 7961G, 7961G-GE, 7945G, 7942G, 7941G, 7941G-GE, 7931G, 7911G,...
Hacking Cisco IP-phone