Peaches

Update Experts
  • Content Count

    2130
  • Joined

  • Last visited

Posts posted by Peaches

  1. Smartphones eat games handhelds and cameras for lunch

    Serial category killer?

    By Caleb Cox

    As iPhones and other smartphone devices increase in popularity, their foothold in the mobile gaming market strengthens. This looks like bad news for traditional handheld options we generally associate Nintendo and Sony with.

    Some suggest the iPhone could even have a negative impact to the point & shoot camera industry, as figures from Flickr show the iPhone 4 is on its way to becoming the world's most-used photography device. Could the Apple iPhone ruin consumer electronics as we know it?

    Research from Flurry Analytics compared US mobile gaming figures from 2009 to 2010. The dominance of Nintendo's DS took quite a pounding, but there was huge increase in iOS and Android game popularity, which now represents over a third of the total market.

    That's hardly surprising considering the increase rate of smartphone ownership, even less so perhaps when you consider the handheld console market is in transitional phase between major releases, or at least, it was so in 2010

    Story & graphs .. http://www.reghardware.com/2011/04/19/smartphones_effect_consumer_electronics/

  2. Apr18 Despite the Headlines, SLAAC Does Not Represent a Zero-Day Attack Vector

    SLAAC is a mnemonic for IPv6 StateLess Address AutoConfiguration, which follows attempts at obtaining router information that happens only after the interface has established an IPv6 address for the local link. IPv6 does not use Ethernet broadcasting, which imposes scaling limitations on the devices supported on a local link. Instead, IPv6 multicasting divides devices into 16.7 million isolated Solicited-Node groups based on the last 3 bytes of their IPv6 address. Multicasting represents a significant departure from the way networks previously worked using the blunt method of broadcasting.

    IPv4 and MAC Address Relationship with Network Interface Unverified

    Under IPv4, IP addresses are determined using the ARP [RFC826] to request MAC addresses associated with a specific IPv4 address by using a broadcast (all one’s) destination for the MAC address recognized by switches and interfaces and replicated or flooded across all switch ports. ARP can also announce an address by setting both source and destination IPv4 addresses to the same value or to probe by setting the source to a null IP address.

    The inverse of ARP was BootP described in [RFC951] back in 1985. BootP requests an IP address for the MAC address by using a broadcast (all one’s) destination IP address. BootP was superseded by DHCP. Those new to IPv6 are often surprised to find how multicasting rather than broadcasting changed the way networks, switches, and routers operate.

    More details: http://blog.trendmicro.com/

  3. April 19, 2011 4:15 PM PDT

    ACLU: Michigan cops stealing drivers' phone data

    The Michigan State Police have started using handheld machines called "extraction devices" to download personal information from motorists they pull over, even if they're not suspected of any crime. Naturally, the ACLU has a problem with this.

    The devices, sold by a company called Cellebrite, can download text messages, photos, video, and even GPS data from most brands of cell phones. The handheld machines have various interfaces to work with different models and can even bypass security passwords and access some information.

    The problem as the ACLU sees it, is that accessing a citizen's private phone information when there's no probable cause creates a violation of the Constitution's 4th Amendment, which protects us against unreasonable searches and seizures.

    To that end, it's petitioning the MSP to turn over ... Read full post & comments

    Originally posted at Crave

    http://news.cnet.com/security/

  4. 14 April 2011, 12:43

    Break-in at WordPress.com

    WordPress.com 's Matt Mullenweg has confirmed that attackers broke into its systems, gained root level privileges and that "potentially anything on those servers could have been revealed". While WordPress.com's software is open source, the source code on WordPress.com's servers contained configuration information and code written for partners which would include sensitive information which may have been accessed by the intruders.

    Wordpress.com's operator, Automattic, says that after reviewing logs it appears that only limited information was disclosed. At present there is no indication that the intruders stole passwords from Wordpress users and, even if they had, they are stored in hashed and salted form and therefore hard to crack.

    Story: http://www.h-online.com/security/news/item/Break-in-at-WordPress-com-1227926.html

  5. </h3>

    <h3>Toshiba to launch self-erasing hard drives

    by Lance Whitney

    Toshiba will soon debut a series of hard drives that can automatically erase or prevent access to their own data should the drives end up in the wrong hands.

    The company's new self-encrypting drive family will include a new feature that detects if the drive is connected to an unknown and undefined computer or other system. If so, the drive can either securely wipe all of its data or just deny access to that data. Customers can apply the feature to specific data on the drive and choose how and when to render the data indecipherable, according to Toshiba.

    The drives are designed to provide an extra layer of security, especially for corporations, government agencies, and other organizations that need to adhere to certain security and data privacy requirements. The security technology itself is built on the "Opal" specification from the Trusted Computing Group, which dictates certain ... Read full post & comments http://news.cnet.com/8301-1009_3-20053910-83.html

    http://news.cnet.com/security/

  6. AVG unveils Family Safety parental controls software

    Monitor your child's online activity

    By Carrie-Ann Skinner | PC Advisor | 13 April 11

    AVG has unveiled Family Safety – parental controls software that aims to help parents protect their kids when they're surfing the web.

    Related Articles

    Parents concerned smartphones encourage kids to grow up too quickly

    The software allows parents to create profiles for each child, which can be adjusted as the child gets older and as their digital behaviour and habits change. As well as blocking inappropriate content, such as pornographic sites, the software lets uses prevent access to over 80 different social networks including Facebook, MySpace and Bebo.

    Furthermore, AVG Family Safety lets adults monitor when children are using the web, the software they open and what they're searching for on the net.

    http://www.pcadvisor...re/?zk=security

  7. </h3>

    <h3>Malware Installs Rogue Apps on Compromised Facebook Accounts

    April 14th, 2011, 08:32 GMT| By Lucian Constantin

    A new piece of malware being distributed by Sality uses stolen Facebook credentials to surreptitiously install rogue apps under the corresponding profiles.

    Sality is the world's top file infecting malware and dates back to 2003. The threat has evolved over the years and was fitted with P2P, self-propagation and malware distribution functionality.

    According to security researchers from Symantec, at the beginning of this year, Sality operators pushed a malicious component through its P2P network that acted as a keylogger and recorded Facebook, Blogger and MySpace login credentials. The trojan sent the stolen credentials to a command and control (C&C) server, but also stored them locally in an encrypted file to the surprise of security researchers. That was until a new piece of malware recently distributed by Sality began making use of the login details in those encrypted files.

    It downloads Internet Explorer automation scripts from a C&C server and uses the stolen credentials to login on the corresponding websites and perform predefined actions. As far as Facebook is concerned, the trojan received instructions to install a rogue application under hijacked accounts. The app, called "VIP Slots," only asked for access to basic account information.

    http://news.softpedia.com/news/New-Malware-Forces-Users-to-Install-Rogue-Facebook-Apps-194988.shtml

  8. Locate and Update Latest System Driver with SlimDrivers

    SlimDriver is a tool that helps users with management of their system’s drivers. It can scan computers and identify drivers. It is a free tool that locates missing drivers and ensures that the drivers are up to date with the latest updates. It ensures that the latest version of software and installs it. Using the SlimDriver interface, users can download and install drivers manually, one after the other.

    SlimDrivers works with Windows XP, Windows Vista and Windows 7. This tool helps drivers to be up to date; and therefore resulting in faster drivers that ensure that the PC works better. This is because newer drivers are more optimized and coexist better with software that is in the PC. Additionally, it can also fix issues like devices that use drivers and issues of hardware causing problems.

    Some of the most important features of the tool include:

    • Instant scanning the system for missing or broken drivers
    • Scheduling of scans to run automatically
    • Updating drivers after downloading updates
    • Uninstalling drivers as and when needed
    • Have backup for drivers
    • Restoring the system in the event of failure
    Given the kind of features it has there are things that are effective about this tool and some spoilers as well. The tool’s negative aspects include:
    • Lack of satisfactory information on drivers – both old and new drivers.
    • Though the automatic update for drivers is an important feature, the downside is that most of these updates may not be relevant to the PC.
    • Restricts the installation to download and installing the drivers in a one-by-one basis.

    Overall this tool can be used effectively to monitor and update the system’s drivers. However, it is a tool that can be improved to fix all that needs to be fixed; also giving it enough room for growth. It is important to note here that this is just the first version and will surely be a tool that will help in making the PC faster and more efficient.

    http://www.techprone.com/locate-and-update-latest-system-driver-with-slimdrivers/

  9. Yahoo! Allows Users to Monitor Account Login Activity

    April 13th, 2011, 10:36 GMT| By Lucian Constantin

    Yahoo! has introduced a new feature which allows users to review their account's login history for strange activity and signs of possible compromise.

    Email accounts are valuable for cyber criminals and can be compromised in a variety of ways, including via keyloggers or phishing. Since storage space is no longer a major issue, a lot of people fail to delete old emails. This is a security risk because those messages can contain passwords and sensitive information about other accounts.

    In addition to the more traditional illegal activities like spamming, compromised accounts can be used to send scam emails to the user's own contacts, therefore increasing the chances of finding someone willing to pay.

    "The latest incident of email breach at Dallas-based Epsilon, where millions of stolen email addresses potentially could be used for targeted 'spear-phishing' further emphasizes the importance of safeguarding your online account," writes Andy Y Wu, product manager of Yahoo! Membership.

    However, the new feature is not limited to email and covers all services provided under the same Yahoo! ID. The "Recent Login Activity" page lists logins by date, location, access client (browser, Y! Messenger) and the place of origin (Front Page, Mail, etc.).

    Story: http://news.softpedia.com/news/Yahoo-Allows-Users-to-Monitor-Account-Login-Activity-194784.shtml

  10. 13 April 2011, 11:20

    Chromium-based Flock social web browser is no more

    In a post on their home page, the Flock developers have announced that support for their Chromium-based social web browser will officially be discontinued on 26 April 2011. Thanking their "loyal users" for their support, the developers encourage the Flock community to migrate to another browser.

    Flock began life as a cross-platform browser start-up in April 2005. Distinguishing itself from other browsers, Flock automatically managed updates and media from several popular social services, including MySpace, Facebook, Bebo, Digg, YouTube and Twitter.

    More details: http://www.h-online.com/security/news/item/Chromium-based-Flock-social-web-browser-is-no-more-1227009.html

  11. Profile Spy Scam Hits Twitter

    April 5th, 2011, 06:57 GMT| By Lucian Constantin

    Security researchers warn of a survey scam currently making the rounds on Twitter which tricks users by promising them the ability to view their profile visitors.

    According to Robert Graham of Errata Security, victims post spam messages that read "94 people viewed my profile today!" followed by "Wow! See who viewed your twitter with Profile Spy [link]"

    Clicking on the link takes users to a page asking for an app called "Profile Spy" to connect to their accounts. This app is used for the scam's propagation and if allowed, it will start sending spam from the victim's accounts without their permission. People who agree to connect with the application will be redirected to a page asking them to participate in a survey, allegedly as a security check. These surveys try to sign up users for premium rate mobile services or are part of legit affiliate marketing campaigns that are abused by the scammers. Each time a user completes a survey, the scammers earn a commission, which makes it worthwhile to keep the attacks going.

    Story: http://news.softpedia.com/news/Profile-Spy-Scam-Floods-Twitter-193106.shtml

  12. 13 April 2011, 10:35

    Ransomware claims to lock Windows licence

    Calls to unlock the computer are allegedly free.

    Source: F-Secure In what appears to be a lucrative scam, after infecting a system, ransomware blocks users from accessing their system and demands payment of a ransom to restore access. A recent variation on this theme claims to lock the Windows licence. The licence can be restored (re-activated) by calling a supposedly free service number.

    However, the message is not generated by Microsoft – it's a trick and the call is, of course, anything but free. The numbers called are expensive international numbers in countries such as Madagascar. As anti-virus specialist F-Secure reports, calls are placed in a queue for several minutes to ensure that calling costs mount up. With the help of an operator, the fraudsters are able to divert the call to a cheaper country, allowing them to pocket a portion of the call charge to the number originally called.

    Details & screenshot: http://www.h-online.com/security/news/item/Ransomware-claims-to-lock-Windows-licence-1226789.html

  13. 13 April 2011, 17:12

    Software to protect users from prying eyes

    Vendor Oculis Labs has announced that its PrivateEye security software is now also available as an enterprise version. PrivateEye is designed to protect screen contents from prying eyes by permanently monitoring the area in front of the screen via a webcam and blurring contents as soon as the user looks away or another person looks over the user's shoulder. A face recognition algorithm reportedly ensures that the screen content is only accessible to specific persons. If an unknown face approaches the protected computer, the software takes a picture and displays it on screen for deterrence until the legitimate user returns.

    Details: http://www.h-online.com/security/news/item/Software-to-protect-users-from-prying-eyes-1227562.html

  14. </h1>

    <h1>Adobe Photoshop Updates for iPad

    Adobe has been trying to create different apps that can recreate Photoshop to the Apple iPad. However, it has been reported that the latest version promises to be the best one yet. It promises to be a support for content creation on the Apple tablet.

    Adobe is scheduled to demonstrate the different programs that will allow tablet to act as an input device, when it is used in conjunction with a Mac or PC that runs Photoshop. Adobe is offering three kind of solutions:

    1. Nav: Enables easy and quick shifts between tools or opening photos.
    2. Eazel: Provides a high-tech finger painting pad on the iPad.
    3. Abode Colour Lava: Converts the Apple tablet into an ultra color-mixing palette.

    These three enhancements are part of the Adobe Creative Suite version 5.5, and have been scheduled to be released on May 3. It is believed that by early next month this version will be available in the iTunes Store and will be available at the similar price of the previous versions ranging between $1.99 and $4.99.

    Adobe usually updates its entire Creative Suite every 18 to 24 months, however, this time they have decided to release it a little quicker. This definitely promises to be an exciting and interesting update, apart from the others updates that Adobe will do to the suite itself.

    via [All Things Digital] - http://mobilized.allthingsd.com/20110410/adobe-recasts-the-ipad-as-high-tech-palette-for-photoshop-video/

  15. Windows 7 Color Changer Adds Aero Color to Wallpapers

    Windows 7 Color Changer allows you to add Aero colors to your customized wallpapers. Though, by default, this feature is not in Windows 7, this application can be downloaded and used very easily. Like the default version, Aero Color Changer allows you to rotate wallpaper and images. Additionally, it also gives you the option to set a separate Aero color; that too, for each of the rotating images.

    This application is easy to download and install and once that’s done, using it is that much easier to use because of its user-friendly interface. Using this application you can customize the wallpaper, add Aero colors to each of the images in the wall paper, set transparency levels for the wall paper, and also set the rotation time for the wallpaper.

    To use this application the way you want to, complete the following:

    1. To launch the application click the application icon in the system tray, and then click Setup Wallpaper.

    This displays the Edit Your Wallpapers dialog box.

    2. Add your custom images to create your own personal theme.

    Note: At this stage you can give Aero color to the wallpapers and manage the transparency levels of the wallpaper.

    3. After making the required changes, click Set.

    You can also change the rotation time of the new wallpaper, after enabling auto start Window 7 Color Changer at the system startup, from the Options menu. You can choose the kind of change you want and after how many minutes you want the wallpaper to rotate.

    http://www.techprone.com/windows-7-color-changer-adds-aero-color-to-wallpapers/

  16. Microsoft cranks out Internet Explorer 10 preview

    IE9 still warm

    By Gavin Clarke in Las Vegas

    MIX 2011 Microsoft has released an Internet Explorer 10 preview, little more than a month after the debut of IE9.

    The company posted its IE10 Platform Preview build on Tuesday, calling it "the first step in delivering the next wave of progress in native HTML5 support". It seems likely that an IE10 beta will be delivered in September.

    As he demonstrated planned features for IE10 at Microsoft's annual MIX conference in Las Vegas, Nevada, Windows and Windows Live president Steven Sinfosky announced the dates for Microsoft's "next developer conference". It will be held in September in Anaheim, California. "All the things you are hearing about today will be just as impressive in the preview of the things we will show in September," he said.

    Story: http://www.theregist...eview_released/

  17. April 12, 2011 8:12 AM PDT

    Avast update blocks legitimate Web sites

    by Lance Whitney

    An update rolled out yesterday to Avast's antivirus product contained a bug that flags legitimate Web sites as malware infected. In a blog post late yesterday, Avast acknowledged the false positive glitch in an update known as 110411-1, which was automatically rolled out to Avast AV users earlier that day. The error has specifically affected versions 4.x, 5.x, and 6.x of Avast's antivirus software.

    In an e-mail to CNET, an Avast spokesman said today that the update was downloaded by around 5 million users, mostly on the Western Hemisphere due to the time in which it was launched. In-house sensors discovered the problem just a few minutes after the buggy update was released, and Avast workers managed to create and release a fix within 45 minutes, according to the company.

    Known as 110411-2, the fix must be manually installed. Avast is advising all users to ...

    Read full post & comments -= http://news.cnet.com/8301-1009_3-20053085-83.html

    http://news.cnet.com/security/

  18. Exploit-wielding boffins go on free online shopping binge

    World's biggest e-commerce sites wide open

    By Dan Goodin in San Francisco

    12th April 2011 20:57 GMT

    Computer scientists have documented serious flaws in software running some of the world's biggest e-commerce sites and shown how they can be exploited to receive DVDs, digital journals, and other products for free or at sharply reduced prices not authorized by the sellers.

    The findings, laid out in a paper to be presented at next month's IEEE Symposium on Security and Privacy, is an indictment of the software makers, the e-commerce sites, and the third-party cashiers used to process payments. By exploiting the buggy programming interfaces the three parties use to work together, the researchers were able to defraud sites including Buy.com, JR.com, and LinuxJournalStore.com. (They later canceled the transactions or returned the items to work around legal and ethical constraints.)

    The researchers, from Microsoft and Indiana University, said the vulnerabilities stem from the interconnected communication among the end user making a purchase, the online merchants, and the cashier-as-a-service providers such as PayPal, Amazon Payments, and Google Checkout. The “trilateral interaction” is so complex that the two most popular e-commerce programs used to coordinate the communications can easily be fooled into approving the transactions for free, or at a tiny fraction of the price being charged.

    Story: http://www.theregister.co.uk/2011/04/12/free_online_shopping_exploits/

  19. April 12, 2011 4:00 AM PDT

    Democratic senator wants Internet sales taxes

    by Declan McCullagh

    A Democratic senator is preparing to introduce legislation that aims to end the golden era of tax-free Internet shopping. The proposal--expected to be made public soon after Tax Day--would rewrite the ground rules for Internet and mail order sales by eliminating the ability of Americans to shop at Web sites like Amazon.com and Overstock.com without paying state sales taxes.

    Dick Durbin of Illinois, the second most senior Senate Democrat, will introduce the bill after the Easter recess, a Democratic aide told CNET.

    "Why should out-of-state companies that sell their products online have an unfair advantage over Main Street bricks-and-mortar businesses?" Durbin said in a speech in Collinsville, Ill., in February. "Out-of-state companies that aren't paying their fair share of taxes are sticking Illinois residents and businesses with the tab."

    Story: http://news.cnet.com/8301-31921_3-20052999-281.html

  20. Keep Track of Your Laptop and Phone

    Prey is an open source program for tracking laptops and Android phones. It's free to use for up to three devices, and there are paid plans available if you need more. Prey runs on Windows, Mac, some Linux, and Android. If you use this software (or anything like it!) make sure you test it BEFORE your phone or laptop wanders off. Prey is available here: http://preyproject.com/ -

    Are you using this or something like it? What do you think?

  21. </h3>

    <h3>New fake antivirus accepts SMS payments

    by Elinor Mills There's a new twist with some fake antivirus scareware that has cropped up. It accepts payment via SMS, according to antivirus firm CyberDefender.

    Typical rogue security programs infect the system first, then display pop ups warning that the computer is infected, and request payment to clean it up. The new programs are seemingly more genteel, asking for the money before the program is installed and infects the system, said Achal Khetarpal, threat research director at CyberDefender. Of course, a payment does nothing to "fix" a system and means criminals now have your money and possibly your credit card information.

    When a potential victim happens upon a Web site hosting the malware, a dialog box pops up that looks very much like an installer window for a legitimate antivirus product, according to screenshots from CyberDefender. It says "Welcome ... ........

    Originally posted at InSecurity Complex

    Read full post & comments - http://news.cnet.com/8301-27080_3-20052203-245.html
  22. April 5, 2011 5:55 PM PDT

    Wrap Firefox in a Cocoon of privacy

    by Seth Rosenblatt

    Web browsers are ground zero for Internet security threats, and the debate over responsibility for preventing those threats has resulted in a Gordian knot. The people behind the new add-on for Firefox called Cocoon (download) want to cut through debate by serving the entire Web to you via proxy. (Cocoon is also available at GetCocoon.com.)

    Cocoon's Web site, with the Cocoon add-on installed. It adds a toolbar to the top of the Firefox interface, and adds buttons to the Add-On Bar at the bottom of the interface.

    Made by Santa Barbara, Calif., start-up Virtual World Computing, Cocoon's goal is to put the Internet on a server to prevent individual users from having to touch it, Cocoon Chief Executive Officer and co-founder Jeff Bermant said in an interview today at CNET's San Francisco offices. The add-on, which has about 4,000 users since it ...

    Originally posted at The Download Blog - http://download.cnet...0051064-12.html

    Read full post & comments & screenshot - http://news.cnet.com/security/

  23. Three new search engines worth checking out

    Keir Thomas, PC World

    Sites to try if you're fed up with Google

    DuckDuckGo

    Unlike the other search engines mentioned here, DuckDuckGo appears to be just another search engine in the same mould as Google. However, it respects privacy and doesn't record search results or track you (unlike Google et al).

    Qyo

    Built on the theory that two (or more) heads are better than one, Qyo attempts to bring collaborative search to the masses. This is a buzz phrase within the search engine world at the moment, especially for organisations like Google and Facebook that want to expand their offerings in new directions. It's rumoured Google will soon be launching its Circles service, for example, that could feature social search.

    Blekko

    Blekko brings a couple of new tricks to the search party but the main one is the concept of slashtags. These are qualifying words that are added to search phrases after a slash (/) to refine the query.

    For example, if I wanted to search for articles about Google Docs sorted by date, I'd type Google Docs /date. If I wanted to search for pages discussing Google Docs in the context of handheld computers like cell phones, I could type Google Docs /gadgets.

    Full details: http://www.pcadvisor...?newsid=3266703