Welcome, Guest |
You have to register before you can post on our site.
|
|
|
BitPay Bitcoin Processor Warns Against New Coinbitclip Trojan |
Posted by: baziroll - 04-19-2016 , 07:47 PM - Forum: Security News
- No Replies
|
|
BitPay, one of the top Bitcoin payment processors, has published a public service announcement regarding a new emerging threat named Coinbitclip.
Discovered at the start of February, Coinbitclip is a trojan that, after infecting users, works by keeping a watchful eye over the victim's clipboard.
When the user copies or cuts a string that resembles the format of a Bitcoin wallet address, Coinbitclip looks at an internal list of Bitcoin addresses, all under the attacker's control, finds the one that looks most like the user's address and replaces the address in the victim's clipboard with its own.
With the help of this sneaky trick, the crooks behind Coinbitclip can hijack Bitcoin transactions and make a profit on the back of infected users.
Back at the start of February, when Symantec detected Coinbitclip for the first time, the company said the crooks behind this trojan were bundling it with the Hearthstone Hack Tool, an app that promises to provide unlimited gold and dust for Hearthstone players.
BitPay says it didn't receive complaints from customers who reported hijacked transactions traced back to Coinbitclip, but it's raising the alarm nevertheless so that the clients would know and be aware that such threat exists.
With companies involved in the Bitcoin ecosystem falling left and right to all kinds of cyber-attacks, BitPay is playing the "better be safe than sorry" card, warning customers in advance.
source
|
|
|
Kaspersky introduces Industrial CyberSecurity solution |
Posted by: baziroll - 04-19-2016 , 07:34 PM - Forum: Security News
- No Replies
|
|
Security firm Kaspersky Lab today announced a new, specialized security solution, aimed at critical infrastructure and industrial facilities.
The solution, called Kaspersky Industrial CyberSecurity, is built to protect technological processes in industrial environments from cyber-attacks because, as the company says, these threats now have the potential to cross the realms, from the virtual one into the physical one, threatening not only businesses, but humanity and nature, as well.
The solution is aimed for today’s industrial facilities such as nuclear power plants, refineries and assembly lines, facilities which require, as Kaspersky puts it, "faultless continuity and consistency of the technological process".
Another problem industrial facilities are faced with are strict regulations and compliance issues, which can lead to unprotected critical systems, Kaspersky says. Therefore, their system covers all of that.
It combines conventional security such as anti-malware, whitelisting and vulnerability assessment, and pairs it with technologies designed specifically to protect industrial environments, including Integrity check for PLC programs, Semantic monitoring of process control commands and Telemetry data.
There’s also the Observability Mode, which is designed only to detect cyber-attacks, operation personnel faults and anomalies which can occur inside the network.
"Today, the cybersecurity of industrial systems and critical infrastructures is of vital importance. An increasing number of such systems are using devices and channels that interact with the outside world", said Kaspersky Lab CEO Eugene Kaspersky.
"Sometimes they use equipment that was never intended for external access, not to mention software that was created decades ago and has not been upgraded since! This is a very serious issue because not only is the continuity of the production process at stake; the environment and even human lives can be at risk. Our solution is capable of ensuring the cybersecurity of the technology cycle at all levels of automated process control. We are also actively cooperating with manufacturers of automation systems in order to develop equipment that takes new cybersecurity standards and requirements into consideration".
source
|
|
|
How the cyber crime business model is changing |
Posted by: baziroll - 04-19-2016 , 07:33 PM - Forum: Security News
- No Replies
|
|
Cyber crime is an increasingly serious business and a new report released today by Trustwave looks at the top trends from the past year based on real-world data from data breach investigations.
Key findings from the report include that 97 percent of applications tested by Trustwave in 2015 had at least one vulnerability. In addition 10 percent of the vulnerabilities discovered were rated as critical or high risk.
Retail is the industry most commonly targeted by criminals, accounting for 23 percent of Trustwave investigations, followed by hospitality at 14 percent and food and beverage at 10 percent. The findings show that eCommerce breaches accounted for 38 percent of investigations, compared to 42 percent in 2014. Twenty-two percent were of point-of-sale (POS) breaches. The Magneto open source platform accounted for 85 percent of eCommerce breaches. At least five critical Magento vulnerabilities were identified in 2015, and most of the affected systems weren't fully updated with security patches.
In 60 percent of investigations, attackers were after payment card data, split about evenly between card track (magnetic stripe) data (31 percent of incidents), which came mainly from POS environments, and card-not-present data (29 percent), which mostly came from eCommerce transactions.
"Cybercriminals have been congregating and organizing for years, but 2015 showed a marked increase in the behavior we would normally associate with legitimate businesses," says Trustwave chief executive officer and president Robert J McCullen. "Based on the study of numerous security incidents, exploit kits and malvertising campaigns, our 2016 Trustwave Global Security Report shows businesses how and where these sophisticated criminal organizations are most likely to attack, and more importantly, how to defend their assets".
Other findings include a shift in spam subjects. In 2015, the portion of pharmaceutical spam dropped dramatically, to 39 percent from almost 75 percent the previous year, which was still enough to make it the largest share of any category. Spam related to online dating sites and adult products made a combined five-fold leap from six percent in 2014 to 30 percent in 2015. Five percent of overall spam included a malicious attachment or link, a one point decrease from 2014.
You can see more findings in the full report which is available to download from the Trustwave website.
source
|
|
|
Viber introduces end to end encryption |
Posted by: baziroll - 04-19-2016 , 07:32 PM - Forum: Security News
- No Replies
|
|
The major messaging services are now placing a greater emphasis on their users' privacy and security, following the heated encryption debate started by Apple and the FBI. Viber has just announced end-to-end encryption support, making it the second leading player this month to introduce this feature after WhatsApp.
Viber has over 700 million users across the globe, but its end to end encryption feature will not be available everywhere right away. The company is focusing on Belarus, Brazil, Israel and Thailand first, with other markets to get the same treatment in the weeks that follow.
Viber is also rolling out an option to hide chats on users' accounts which, like end to end encryption support, will work on all the major platforms supported by the company: Android, iOS, Windows and OS X. The option to hide chats comes with support for four-digit PINs.
Speaking with TechCrunch, Viber COO Michael Shmilov says that his company has been working on enabling end-to-end encryption for a few years. Hopefully this means that the feature will be even better than what WhatsApp has introduced.
Viber's end-to-end encryption extends to both messages and calls, and includes group chats. There will be different levels of encryption, and users will be notified of it via a color-coded lock, to accommodate different types of conversations.
Viber claims that it will be able to tell when users could be compromised while chatting, at which point the app will show a red-colored lock to inform other users involved in that conversation.
No matter how you feel about encryption, it is good to know that the big players have their users' privacy and security in mind. Such measures, however, are only effective if messaging services do not cave under pressure and give governments, for instance, a special key, like BlackBerry has done for the Canadian police.
source
|
|
|
Apple transparency report sheds some light on government data requests |
Posted by: baziroll - 04-19-2016 , 07:31 PM - Forum: Security News
- No Replies
|
|
Reinvigorated interest in privacy, security and surveillance means that the transparency reports published by tech companies are always greeted with some enthusiasm. How much data are governments around the world asking for from companies? How much user data are companies handing over to the authorities?
Apple's latest transparency report reveals that the iPhone manufacturer has complied with an increased number of requests for data -- including 80 percent of requests in North America, and 97 percent in Latin America. But while the report makes for interesting reading, it also highlights a problem that Microsoft recently sued the Department of Justice over: even if companies want to be transparent about data requests, when it comes to National Security Requests it is not even possible to report the precise number of requests that have been received.
The transparency report covers the second half of 2015 (July 1 - December 31), and Apple is able to reveal that it received between 1250 and 1499 National Security Orders, and that this affected 1000-1249 accounts. The company received just three requests for user accounts to be deleted, and it complied with all of them.
Apple breaks its report down into two main sections: Device requests and Account requests. The company says: "Device requests may include requests for customer contact information provided to register a device with Apple or the date(s) the device used Apple services. We count devices based on the individual serial or IMEI numbers related to an investigation. We encourage any customer who suspects their device is stolen to contact their local law enforcement agency".
In North America, Apple received just 4009 Device Requests, affecting 16148 devices, and complied with 80 percent of them. For the whole of Europe, the Middle East, India, and Africa, there were 19322 requests relating to 111807 devices, and Apple complied with just 52 percent.
Account requests are described as:
Responding to an account request usually involves providing information about an account holder's iTunes or iCloud account, such as a name and an address. In certain cases, we are asked to provide customers' iCloud content, which may include stored photos, email, iOS device backups, documents, contacts, calendars, and bookmarks. We consider these requests very carefully and provide account content when the legal request is a search warrant.
The percentages here are very similar to those for Device requests -- 82 percent compliance in North America, and 50 percent in Europe, the Middle East, India, and Africa. In a few instances, Apple provides extra snippets of data, such as the fact that in China account requests predominantly related to phishing investigations.
You can check out the full transparency report over on Apple's privacy pages.
source
|
|
|
Google's second annual Android security report shows how app and device scanning keep |
Posted by: baziroll - 04-19-2016 , 07:29 PM - Forum: Security News
- No Replies
|
|
As Apple releases its transparency report, Google today releases its second Android Security Annual report. The report covers all things Android, from the security of the operating system itself, to the security of Google Play and the apps it provides access to. Of course, Google is keen to highlight everything it does to improve security for its users.
As such, the report shows how the company performs more than 400 million automatic security scans per day on devices with Google Mobile Services. Aided by machine learning, these scans help to home in on what are referred to as Potentially Harmful Applications (PHAs). Google points out that just 0.5 percent of scanned devices feature PHAs, and this dropped to 0.15 percent for devices that only installed apps from Google Play.
As well as scanning individual devices, Google also performs checks on apps -- no fewer than 6 billion apps every day. These checks are enabled Google to vastly reduce the effects of PHAs in a number of ways. There was a greater than 40 percent decrease in the number of PHAs indulging in data collection (down to 0.08 percent of installs), a 60 percent drop in spyware (down to 0.02 percent of installs), and a 50 percent reduction in the number of hostile downloaders (down to 0.01 percent of installs).
Google also points to features such as Safe Browsing in the Android version of Chrome, helping to protect users from malicious websites. The new features of Android 6.0 Marshmallow are stressed as being key to improving the security landscape for Android users, including:
Full disk encryption is now a requirement for all new Marshmallow devices with adequate hardware capabilities and is also extended to allow encryption of data on SD cards.
Updated app permissions enable you to manage the data they share with specific apps with more granularity and precision.
New verified boot ensures your phone is healthy from the bootloader all the way up to the operating system.
Android security patch level enables you to check and make sure your device has the most recent security updates.
And much more, including support for fingerprint scanners, and SELinux enhancements.
Check out the full security report for more information.
source
|
|
|
Win 1 of 10 Synology DS216j NAS servers with 4TB WD Red hard disk |
Posted by: Xavier Torres - 04-19-2016 , 06:29 PM - Forum: External Giveaways/Contests
- Replies (1)
|
|
Win 1 of 10 Synology DS216j NAS servers with 4TB WD Red hard disk
Contest open to worldwide.
Quote:In partnership with WD and Synology, HEXUS is giving you the chance to win a fantastic network-attached storage solution for your home or office. Up for grabs in this incredible competition is an award-winning 10 x Synology DS216j Nas Server with an industry-leading 4TB WD Red hard disk.
Terms & conditions:
01. There is no entry fee and no purchase necessary to enter this competition.
02. The prize draw is open to HEXUS readers aged 12 years or over.
03. The competition winner will be picked at random from all eligible entries that arrive by midnight of the closing date, April 29, 2016.
04. Only one entry is permitted per household per HEXUS entry form; second Facebook entries, if applicable, are permitted. Duplicate entries on either form will result in disqualification and no entrant may win more than one prize.
05. The winners will be notified via email by May 6, 2016. The winner must claim their prize within 7 days of the promoter sending notification. If the prize is unclaimed after this time, HEXUS reserves the right to offer the unclaimed prize to a substitute winner selected in accordance with these rules.
06. The prize is one of ten Synology DS216j NAS units and a 4TB WD Red hard disk.
07. In the event that the prize offered is unavailable due to circumstances beyond our control, we reserve the right to offer an alternative prize of equal or greater specification.
08. Prizes will ship to winners within 45 days of the draw, though we aim for sooner.
09. HEXUS and its partners are responsible for shipping within the criteria laid out and the winner is responsible for local taxes if applicable.
10. Prize draws are not open to employees of HEXUS and their affiliates, agencies, suppliers, sponsors and members employees' immediate families.
11. Entry into the competition will be deemed as acceptance of these terms and conditions.
[spoiler]“Which WD drive is optimised for NAS?” Answer: Red[/spoiler]
[i]Review Synology DS216j:[/i]
http://hexus.net/tech/reviews/storage/91...gy-ds216j/
Review Western Digital Red NAS Hard Drives:
http://www.wdc.com/en/products/products.aspx?id=810
Giveaway Page: https://www.facebook.com/HEXUSnet/app/1793314320896471/
Note: Expires on April 29, 2016
|
|
|
Public Cams |
Posted by: Xavier Torres - 04-19-2016 , 05:34 PM - Forum: iOS Giveaways
- No Replies
|
|
Public Cams 3.1
Quote:
View thousands of public web cameras around the world! Most beautiful and interesting places! Add and monitor your own IP cameras for surveillance or as a baby monitor.
Public cameras include beaches, landscapes, traffic, attractions, retail, ski hills, golf courses, airports, animal cams and more!
* Enjoy worldwide camera views!
* Live views from city streets, restaurants, beaches, ski resorts and much more!
* Best experienced with Wi-Fi and 3G.
* Add your own ip cams
Giveaway Page: https://itunes.apple.com/us/app/public-c...73581?mt=8
|
|
|
Leawo Video Converter 7.4.4.0 - For Auslogics premium users |
Posted by: Xavier Torres - 04-19-2016 , 03:09 PM - Forum: External Giveaways/Freebies
- No Replies
|
|
Leawo Video Converter 7.4.4.0 - For Auslogics premium users - 1-Year Personal License
Terms:
1. You have to install and activate it (please connect to internet to register) before the Giveaway offer for the software is over.
2. Free upgrades and technical support (including offline registration) will not be provided for Giveaway Products.
3. License key valid before April 20, 2016
Quote:
Download Video Converter to Convert Videos and Audios Easy and Fast!
- The best video file converter for you to convert videos and audios between all popular formats like AVI, MP4, MOV, MP3, AAC, FLAC, etc.
- Superior to other free video converters. 2D to 3D conversion feature enables you to create 3D movies for vivid video enjoyment.
- This all-in-one video converter software offers powerful editing features to add special effects, watermarks, etc.
- Setting parameters of output profile is feasible as well within this video converter software.
- Converting video and audio files for multiple portable devices, phones, tablets, PCs, websites and more.
- With user-friendly interface and super-fast conversion, you make video and audio conversion easy and fast.
Giveaway Page: http://www.giveaway-club.com/
Registration Page: http://www.leawo.org/cooperation/giveaway-club.html
Download: http://file2.leawosoft.net/download/leaw..._setup.exe
Note: Expires on April 20, 2016
|
|
|
Zoner Photo Studio 18 |
Posted by: Askanag - 04-19-2016 , 11:49 AM - Forum: Written Reviews
- Replies (8)
|
|
Professional photos without the work
It works great on every photo, and it’s easy to use. That’s why millions of users put their trust in us.
Zoner Photo Studio 18: A Modern Classic
We’ve joined dozens of years of experience with the trends of today. Take a look at how Zoner Photo Studio 18 will make your work with photos easier.
https://www.zoner.com/
Simpler Than Ever
Your favorite features are now closer at hand. We’ve also freed up screen space for your pictures and eased navigation.
A Better Catalog with New Tricks
You can browse your photos by folder, by date, or by keyword.
The Catalog in Zoner Photo Studio 18 now supports removable disks, and its Quick Search offers suggestions while you type.
Non-destructive Edits
The new Develop module lets you work with every picture format, including RAW, while leaving your original untouched. Zoner Photo Studio remembers all of your edits here and lets you undo or change them at any time.
A Standalone Viewer
Working outside Zoner Photo Studio and want to view a picture instantly? Now you can. With no distractions, and easy-to-reach fullscreen. See something to edit? One click takes you to the full Zoner Photo Studio 18.
HD Videos from Your Photos
You can turn your photos into fantastic video slideshows with music and effects, from right inside the program.
Arrange photos on the video timeline however you want, then create the video, then show it off on a TV, on the Web... almost anywhere!
Other Improvements
Quicker Sharing
Share a photo or a whole album on the social web or over email.
One-click Locations
One click turns GPS coordinate data into real-world location names, like “Paris” or “Mt. Everest.”
Presets
Easily re-use edits that you use again and again. Create your own Presets.
Windows 10 Compatible
ZPS 18 is certified for problem-free operation on Windows 10.
Clearer Buttons
The new button icons make it easier to see what each tool does.
Work the Same Way Everywhere
All the tools are in the same place no matter whether you’re in the Manager, Develop, or the Editor.
Better Work with Lights and Shadows
Lights and shadows now work more precisely and with no “halos.”
Postcards Straight from ZPS
You can now send Zoner Postcards straight from inside Zoner Photo Studio.
High DPI Support
ZPS 18 adapts to look great on small high-resolution monitors.
New E-mail Album Sharing
Version 18 shares albums using unique private links that are always under your control.
Quicker Number Crunching
Strongly expanded support for GPU-powered calculations speeds up demanding tasks.
Support for 4K Displays
ZPS 18 fully harnesses the potential of your monitor’s 4K resolution.
System Requirements
Get 100% Performance for Your Photos
Zoner Photo Studio uses the full power of today’s processors and graphics cards.
That makes demanding graphics operations lightning-fast compared to the competition.
Everything You Need for Your Pictures
Only Zoner Photo Studio gives you a first-class photo processing tool and maximum color fidelity for your pictures.
- Support for 4K monitors
- Support for high DPI on small monitors
- Support for 10-bit displays
- Integrated color management
- Support for drawing tablets, including pen pressure
- Optimizations for touch-based operation
Minimum System Requirements
For smooth operation, Zoner Photo Studio 18 needs a computer meeting these system requirements:
OS: Microsoft Windows 7 / 8 / 8.1 / 10 (32 or 64 bits)
Processor: Intel or AMD with SSE2 support
Memory: 2 GB RAM
Hard Disk: min. 350 MB free disk space
Resolution: 1200 × 800 and up
Recommended System Requirements for Zoner Photo Studio 18
A computer meeting these requirements guarantees easy work in Zoner Photo Studio 18. These are not the minimum system requirements.
Processor (CPU)
We recommend a 64-bit, 4-core processor running at 3GHz or higher. This software is fully optimized for work with multi-core processors.
Graphics Card (GPU)
Zoner Photo Studio uses the full power of your graphics card thanks to CUDA and OpenCL.
Graphics card memory is important for work with large photos. We recommend at least 2 GB of graphics card memory.
Two examples of suitable graphics cards as of September 2015 are the AMD Radeon R9 and the NVidia GeForce 750 GTX Ti.
Memory
We recommend at least 4 GB of memory.
Hard Disk
We recommend installing ZPS on an SSD drive. This will make it load and run very fast. The SSD disk market is still developing rapidly, so check the latest reviews to make your choice.
Operating System
Use a modern, 64-bit operating system to harness the full power of the recommended 64-bit CPU.
Supported Formats
Bitmap Formats
JPEG, GIF, TIFF, PNG, PSD, PSB, PCD, BMP, PCX, TGA, ICO, RLE, WPG, DIB, BMI, PSP, PSPIMAGE, THM, HDP, WDP, JP2, J2K, JPC, PNM, PPM, PAM, PBM, PGM, WBMP, BMS, JPS, PNS, DCM, KDC, MPO, JXR, HDR
RAW Formats
CRW, CR2, DNG, MRW, NEF, ORF, PEF, ARW, SRF, SR2, MEF, ERF, RAW, RAF, FFF, RWZ, RWL, 3FR, CS1, SRW
Expand the range of readable formats by installing extra WIC codecs (e.g. WebP).
Video Formats
ASF, AVI, M1V, MOV, MP4, MPE, MPEG, MPG, MTS, OGV, QT, WMV
Install the third-party program MPlayer to add support for the following formats:
3GP, DIVX, DV, DVR-MS, FLV, M2T, M2TS, M2V, M4V, MKV, MPV, MQV, NSV, OGG, OGM, RAM, REC, RM, RMVB, TS, VCD, VFW, VOB
Hardware Compatibility
Zoner Photo Studio can talk to the other devices that you use for work with your photos. Zoner Photo Studio can download photos from any memory card or removable disk. Naturally it’s also compatible with drawing tablets and touchscreen monitors.
Camera Support
Shooting to JPEG? Then there’s nothing to worry about at all - Zoner Photo Studio can handle all your photos.
Shooting to RAW? Zoner Photo Studioautomatically supports a wide range of the RAW formats produced by DSLRs and midrange cameras.
Download Zoner Photo Studio 18 https://www.zoner.com/en/download-request
For Microsoft Windows 7 and higher.
Explore it great features for 30 days for free. Run the installer and then follow the instructions on the screen. Zoner Photo Studio never contains viruses or malware.
Buy Zoner Photo Studio 18 https://www.zoner.com/en/buy
|
|
|
Glary Utilities 5.49.0.69 |
Posted by: tarekma7 - 04-19-2016 , 10:25 AM - Forum: Paid
- Replies (8)
|
|
Glary Utilities is an indispensable friend for your PC, with its 100% safe, thorough & quick cleaning and worry-free restoration. Glary Utilities is a freeware with registry and disk cleaning, privacy protection, performance accelerator and amazing multifunctional tools. It can fix dogged registry errors, wipe off clutters, optimize internet speed, safeguard confidential files and maintain maximum performance. It is designed for both novice and professionals. User-friendly interface shows clear & detailed directions. For novice, all work can be done with just 1 or 2 clicks, while for professionals, abundant options are available. Glary Utilities Pro provides automatic PC care at a scheduled time in the background for users.
Version number: 5.49 for Windows
Release Date: Update: Apr. 18, 2016
Changes in 5.49.0.69:
[*]Fixed the bug in version 5.48 that may lead program crash in certain system or unable to launch
[*]Fixed the bug of Registry Cleaning crash in Windows XP
[*]Optimized Software Update: Added the compatibility to AIDA64 Extreme Edition
[*]Optimized Software Update: Fixed the bug that Skype 7.21 cannot be recognize correctly
[*]Optimized Software Update: Fixed the problem that cannot get the version correctly
[*]Optimized Software Update: Fixed the support for K-Lite Codec Pack (Full)?K-Lite Codec Pack (x64)?K-Lite Codec Pack Basic
[*]Optimized Disk Cleaner: added 'Samsung Kies' and 'TeamViewer'
[*]Optimized Tracks Eraser: added 'KMPlayer' and 'Steam'
[*]Minor GUI improvements
[*]Minor bug fixes
[*]Homepage:
[*]http://www.glarysoft.com/
Download:
http://download.glarysoft.com/gu5setup.exe
|
|
|
Noizio |
Posted by: tarekma7 - 04-19-2016 , 09:59 AM - Forum: iPhone Giveaway of the Day
- Replies (1)
|
|
Noizio is an app that will drown out the noise of the street and allow you to concentrate on the work, increasing your productivity. On the other hand, it can also set the mood for a romantic evening or lull you to sleep, ensuring that you will dream soundly all night long. An ambient sound equalizer app for creating a mixture of ambient sounds available for iOS.
Features:
• 15 enchanting ambient sounds;
• Ease of choosing and blending the ambient sounds into a mixture that will perfectly fit your mood;
• Minimalistic design;
• Completely free of charge with no hidden ads;
• Sounds are played in a seamless loop;
• Support rotation device;
• Added autopause timer;
• Ready for iPhone 6, 6+.
15 Ambient sounds:
October Rain, Coffee House, Thunderstorm, Campfire, Winter Wind, Sea Waves, River Stream, Summer Night, Sunny Day, Deep Space, Sailing Yacht, Inside Train, Farm, Wind Chimes, Blue Whales
Download Noizio Now to get a simple yet elegant instrument for setting the right mood for any occasion. Use it to help you work or study, or allow the sounds of this app to transport you to a cozy camp fire under a full moon or to any other place you can imagine.
https://iphone.giveawayoftheday.com/noizio/
|
|
|
|