Сообщения

Сообщения за 2014

New Malware Family Highlight: Kuluoz

Изображение
According to Palo Alto Networks ''Threat Landscape Review'', one particular malware family, Kuluoz (also known as Asprox), stands out as prevalent in the sample data. This single family accounts for 4.9 million malicious sessions recorded during the month of October 2014. It impacted 1,933 companies across 10 industries reviewed . Firewall WildFire identified a total of 268,084 unique samples determined to be Kuluoz, 82.4% of which had not been collected by VirusTotal at the time of analysis. The first version of Asprox appeared in 2007, and it was given its name by researchers who identified that it frequently tried to infect ASP (Active Server Pages) based websites. At the time the malware used command and control infrastructure hosted by the now-defunct McColo Corp ISP. By 2013, the primary components of Asprox had been replaced by a new malware family dubbed Kuluoz. While Asprox was an “all-in-one” malware, Kuluoz uses a modular design, which allows it

Malware Trends Affect Key Industries

Изображение
In its first Threat Landscape Review software security giant Palo Alto Networks takes a high-level view of how malware is delivered to networks across major industries around the world . The data used for this report was derived from WildFire™. The firewall application automatically identifies threats from malware over a wide array of applications by executing them in a virtual environment, observing their behavior. This data was collected from live systems in networks belonging to 2,363 different companies operating in 82 different countries. There are currently over 4,000 organizations using WildFire to defend their networks. The following are key findings from this report: Globally, the platform detected malware delivered in over 50 distinct applications. 87% of this malware was delivered over SMTP, 11.8% through Web-Browsing (HTTP) and 1.2% in the remaining applications. While all verticals saw SMTP and HTTP as the primary channels for mal

How Facebook Got Hacked

Изображение
  Zero-Day Exploit Bypassed Java Protections to Install Malware Even the most savvy information technologists aren't immune from cyber-attacks. Just ask Facebook. The social-media titan says it fell victim to a sophisticated attack discovered back in January 2013 in which an exploit allowed malware to be installed on employees' laptops. In a blog posted by Facebook Security, the company said it found no evidence that any of social network user's data was compromised. Here's what happened at Facebook according to the blog post: Several Facebook employees visited a mobile developer website that was compromised. The compromised website hosted an exploit that then allowed malware to be installed on these employees' laptops. "The laptops were fully-patched and running up-to-date anti-virus software," the blog says. "As soon as we discovered the presence of the malware, we remediated all infected machines, informed law enforcement and began a s

iPad Air Plus and the iPad mini 4 will launch between April and June 2015

Изображение
Despite of a slowdown in tablet sales for 2014 and a negative growth forecast for the iPad by the International Data Corporation (IDC), Apple Inc. is hell-bent on releasing new models of the iPad at an ever-increasing pace. The latest model rumored to be in the pipeline is the Apple “iPad Air Plus”. A leaked report, published on Friday in Japanese magazine Mac Fan , and picked up by Macotakara , shows what appears to be schematics and specs of Apple’s next iPad. The drawings show the tablet will sport a 12.2” LCD display and have dimensions of 305.31mm x 220.8mm x 7mm, or 12.2” x 8.7” x 0.28”. This is not far off from previous rumors of a 12.9” iPad from Apple . Another consideration to take into account is the viability of tablets over 12” in size and their target audience. Tablets are designed to be portable and easy to use, so the idea of increasing their size seems a little contradictory. That said, there are some arguments to be made in favor of large

Top-10 Cybersecurity Predictions of 2015

Изображение
U.S. Cyber Security Market Share [%] by Banking, Financial Services, Retail & Payment Services Industry Sector 2016   Healthcare at risk? As noted by Websense , healthcare data is valuable. Not only are companies such as Google, Samsung & Apple tapping into the industry, but the sector itself is becoming more reliant on electronic records and data analysis. As such, data stealing campaigns targeting hospitals and health institutions are likely to increase in the coming year. New players on the global cyberthreat field We have continual spats between the United States and China — each country accusing the other of state-sponsored cyberattacks — a flow of cybercrime reports from industry experts and a rising digital presence in countries like Russia, and so it is safe to assume we'll see more of the same in 2015.Cyber espionage can be lucrative where sensitive, corporate or government data is concerned, and when we live in a world where

Apple's hard-shelled & unbreachable iOS went under malware attack: meet WireLurker & ''Masque Attack''

Изображение
“ Even though this is the first time this is happening, it demonstrates to a lot of attackers that this is a method that can be used to crack through the hard shell that Apple has built around its iOS devices.” security expert Ryan Olson tells the New York Times . November 2014 may eventually become known as the ‘good ole days’ before iOS malware. That month the U.S. Government Computer Emergency Response Team (CERT) issued a warning to American businesses that iOS malware can be spread by phishing attacks, and that malicious apps may steal login credentials, access data, and monitor users’ devices. The electronic crime underground has begun exploiting iOS mobile devices and will intensify attacks on employees, making dynamic protection against malicious apps critically important. Introduction November 2014 will remain in the ''Digital History'' as a crucial point at which users of iPhone & iPad devices for the very first time faced serious malware

It'S TiMe to JuMP to #1 Mobile Device Antivirus & Performance Optimizer & Security App Worldwide:-)

Изображение
The Clean Master App will improve your D evice’s P erformance by cleaning J unk F iles , O ptimizing D evice M emory & providing C omplete P rotection against V iruses, T rojans & M alware . It's o ne of the H ighest R ated A pps in the world based on 10,000,000 R eviews & o ver 200 million D ownloads W orldwide→ the Clean Master helped to Clean Up all-in-all over 400,000,000 Mobile Devices . The Clean Master is an excellent S olution to clean , boost & maintain the overall Performance Optimization of your Android Mobile Device or Tablet . It's an app that's easy, effective, and free. Functional design The Clean Master I nterface is easy-to-use & has a modern design . From the main screen, you can access a general overview of the status of the device and easily get access to the 4 main P rogram Analisys A reas : Junk Files , Memory Boost , Antivirus , & App Manager . Different types of cleaning Clean

BRaND NeW;-)_2014 #1 WeB $EARCH eNGiNe

Изображение
BRaND NeW;-)_2014 #1 WeB $EARCH eNGiNe http://ragool.com/  TRy&eNJoy NeW:-) QuaLiTy oF $uRFiNG the WeB;-) #ragool

6 Must-know Content and SEO Tips

Изображение
Here are a few tips that will help entrepreneurs and small business owners: Practice “intentional marketing.” Keyword density isn’t dead, but the game has changed. You definitely want keywords in there, but more importantly you really want expert verbiage . For example, say you have a website about golfing. Google wants to see that you’re talking about expert topics related to golfing: the best golf courses, new clubs and balls, etc. Traffic is going to come in through all these channels that are related to golfing and, because of that topical incoming traffic , Google will rank your golfing website very high for those terms. Brand yourself properly. How you brand yourself is everything. It's all about how to position one's brand as a force in the content marketing space. Don’t underestimate word of mouth marketing. It's your brand advocates who's going to talk you up to everyone they kn o w. Much of th e deal that can ta

How do Colors Affect Purchases?

Изображение
Sometimes it’s the simplest things that can make the biggest difference. One small factor in UX that can make a huge difference is color. In fact, 85% of shoppers rate colour as a primary reason for why they buy a product. It’s important to use the right colors to get the most out of your UX. This infographic by Kissmetrics will guide your through making the right color choices for your design. The infographic describes the emotions associated with each color so that you can choose the one that best fits with your overall design. It also talks about which colors best appeal to which type of consumer so that you can tailor your design to appeal to your customer base. Read the Full Article Here=>> http://ux.walkme.com/infographic-colors-affect-purchases/  

How Human Behavior Can Skew Innovation

Изображение
A variety of human group behaviors can undermine innovation. For best results, we need to be aware of them and mitigate those that can derail innovation efforts. Herd behaviour describes how individuals in a group can act together without planned direction. When animals partake in herd behaviour, for example in a dangerous situation, each individual group member reduces the danger to itself by migrating as close as possible to the centre of the fleeing group. The herd thus appears as a unit in moving together, but this action emerges from the uncoordinated behaviour of self-serving individuals. Herd behaviour is distinguished from herd mentality because it applies to all animals, whereas the term mentality implies a uniquely human phenomenon. Herd mentality implies a fear-based reaction to peer pressure which makes individuals act in order to avoid feeling “left behind” from the group, i.e. to adopt certain behaviours and follow trends. Herd mentality is also sometimes known as

Incendiary Weapon Attacks in Ukraine & Syria Illustrate the Increasing Stigma Against the Weapons

Изображение
Evidence of the use of incendiary weapons in Ukraine and Syria highlights the need for stricter law to govern these weapons, Human Rights Watch said in a report released today with Harvard Law School’s International Human Rights Clinic. The 16-page report, “ Incendiary Weapons: Recent Use and Growing Opposition ,” details incendiary weapon attacks in Ukraine and Syria and illustrates the increasing stigma against the weapons. Incendiary weapons can cause excruciatingly painful thermal and respiratory burns. Victims who survive often suffer long-term physical and psychological damage due to extensive scarring and disfigurement. “Weapons that cause terrible burns and disfigure survivors have been used against towns in both Syria and Ukraine,” said Bonnie Docherty , senior Arms researcher at Human Rights Watch and lead author of the report. “The recent attacks with incendiary weapons show it’s past time for nations to reassess and strengthen international law on these cruel we

Motorola is now part of Lenovo

Изображение
The deal is done— Motorola is now part of Lenovo. Needless to say, we’re looking forward to an exciting future together. It begins today. So what does it all mean? 1. The new Motorola-fueled Lenovo will be a major player in the global smartphone industry. Lenovo is now the world’s #3 smartphone maker. It’s brief but proud history in smartphones gets a massive boost from adding the well-established Moto & nearly 3,500 new colleagues around the world. 2. Motorola & Lenovo have a shared history of innovation. Some would argue the key to Lenovo’s recent success has been its willingness to try new things & form factors. (Take a look at Yoga and Yoga Tablet if you don’t get what it means). From 1930s car radios to the world’s first commercial cellphone in Motorola kept on going & pioneering. 3. Motorola & Lenovo also have a shared history in space. Moto was there for the 1969 moon landing while Lenovians love to note that ThinkPad is the