DoS crasha google Chrome
A zdnet tem um
artigo sobre a segurança do browser google Chrome, onde mencionam que
um investigador, Rishi Narang da Evil Fingers, escreveu e divulgou uma “proof of concept” para uma vulnerabilidade de negação de serviço que crasha todas as abas do Chrome.
Celebridades perigosas de 2008
Procurar por notícias sobre as últimas futilidades das celebridades, pode expor os utilizadores menos cautelosos a todo o tipo de inseguranças informáticas, desde adware, spyware até sites falsos e ofertas pouco recomendáveis.
Segundo informação da McAfee, existem celebridades mesmo perigosas 😉 , portanto meninas e meninos, especialmente os dos sistemas mais vulneráveis e usados, leia-se os da empresa condenada, vamos a ter juizinho:
McAfee, Inc. :: McAfee, Inc. Names Most Dangerous Celebrities in Cyberspace
1 Brad Pitt — When “Brad Pitt screensavers” was searched, more than half of the resulting Web sites were identified as containing malicious downloads with spyware, adware and potential viruses.
2 Beyonce — Inputting “Beyonce ringtones” into a search engine yields risky Web sites that promote misleading offers to gather consumers’ personal information.
3 Justin Timberlake — Interest in his high-profile relationships makes him an easy target for spammers and hackers. When searching for “Justin Timberlake downloads” one Web site advertised free music downloads that were flagged as directly leading to spam, spyware and adware.
4 Heidi Montag — “The Hills” star is a popular search term when it comes to searching for wallpaper. A host of wallpaper Web sites contained hundreds of malware-laden downloads.
5 Mariah Carey — Spammers and hackers are using Mariah Carey screen saver Web sites to link to other sites proven to contain spyware, adware and other threatening downloads.
6 Jessica Alba — Red-ranked risky sites were identified when searching for “Jessica Alba” and “Jessica Alba downloads.” The sites contained hundreds of malicious downloads, links to other bad sites, misleading offers to gather information, and a high number of spam emails when an email address was provided.
7 Lindsay Lohan — This young Hollywood starlet is as dangerous to search online as she is famous. Searching for “Lindsay Lohan downloads” resulted in several dangerous Web sites laden with hidden adware.
8 Cameron Diaz — Cybercriminals use download Web sites related to Cameron Diaz’s image to link to other harmful sites containing spyware.
9 George Clooney, Rihanna — The technology found one Web site embedded with hundreds of dangerous wallpaper and photo downloads after inputting “George Clooney downloads.” “Rihanna pictures” was also a risky search term, as McAfee identified a site that spammed its test email address.
11 Angelina Jolie — When “Angelina Jolie downloads” was searched, the software highlighted a risky site with 978 hidden malware-infected wallpaper and photo downloads, as well as links to other potentially dangerous URLs.
12 Fergie — A Fergie screen saver site was flagged as offering 111 risky downloads that could seriously compromise a PC’s privacy with unwanted spyware and adware.
13 David Beckham, Katie Holmes — The “David Beckham” search term generated a great deal of wallpaper and screen saver downloads veiled with malware. Consumers should also exercise caution when searching for “Katie Holmes” online — one download site advertised free screen savers that, if downloaded, would infect your computer with malicious programs like spyware.
15 Katherine Heigl — Hollywood’s big headliner in recent years is now susceptible to Internet lurkers too. “Katherine Heigl” was searched and a site was identified containing hundreds of malware-infected pictures.
Cuidado com o que fazem ao móvel que deitam fora
Cerca de 44% dos telemóveis em segunda mão contém informação sensível, segundo um estudo conduzido por ” a recent research conducted by BT, the Edith Cowan University, and the University of Glamorgan (Wales)” , ou seja o pessoal vai entregá-los na troca de outros e não destroi tudo o que lá tem e lhes diz respeito.
E não é de pouca importância, desde contas bancárias, reuniões de administração, planos de negócios, etc.
Esta informação pode ser usada como espionagem industrial, uma vez que o estudo se focou mais sobre telemóveis usados por quadros medios e altos.
44% of second hand mobile devices still contain sensitive data | Zero Day | ZDNet.com
What type of data were the researchers able to access? Starting from salary details, financial company data, bank account details, sensitive business plans, and personal medical details, and going to bids and contracts under negotiations, uncomplimentary comments about employees, an extensive list of contacts and a complete log of phone calls and
diary commitments, in between evidence of an ongoing affair between a man and a woman
O demagogo idiota da Fox, Bill O’Reilly viu o seu site hackado
O site deste senhor, que não consegue que lhe saia uma verdade da boca, tem vindo a sofrer bastante nos últimos tempos, com o denominado Hacktivism, tudo porque mais uma vez asneirou, dizendo que o site que expôe diversa informação confidencial sobre as aldrabices de governos, empresas e instituições, Wikileaks, é “um daqueles sites desprezíveis e nojentos”«one of those despicable, slimy, scummy websites».
Tendo sido expostas diversas informações, como passwords de mais de 205 membros do site.
Parece que as passwords eram guardadas sem qualquer encriptação.
Aconcelho uma olhada à imagem com as passwords para se perceber O QUE SÃO PÉSSIMAS PASSWORDS, a maior parte são simples, nomes, palavras comuns etc.
O site Wikileaks afirma que “The file provides proof that the Fox News demagogue, Bill O’Reilly, has been hacked.Wikileaks has been informed the hack was a response to the pundit’s
recent scurrilous attacks over the Sarah Palin’s email story–including those on Wikileaks and other members of the press. Hacktivists, thumbing their noses at the pundit, took control of O’Reilly’s main
site, BillOReilly.com. According to our source, the security protecting O’Reilly’s site and subscribers was “non-existent”.
The following image, submitted to Wikileaks and confirmed by Wikileaks staff, offers proof of the hack. The image, clearly obtained from BillOreilly.com‘s administrative interface, shows a detailled
list — including passwords — of BillOreilly.com subscribers. Although Wikileaks has only released one page, it must be assumed that Bill O’Reilly’s entire subscriber list is, as of now, in the public domain.”
Powered by ScribeFire.
Filed under: Uncategorized | 2 Comments »