tag:blogger.com,1999:blog-26129792690059454972024-03-13T23:18:03.333-07:00The Red HoodNever yell at the guy holding the AK-47.. scribd.com/TheRedHood | trhood@ymail.com | trhood@live.comThe Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.comBlogger50125tag:blogger.com,1999:blog-2612979269005945497.post-88317540029688389462012-04-02T11:53:00.004-07:002012-04-02T11:53:39.599-07:00The Future is Now - The Dark Side and Hacktivism<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">We live in times when technology is exceeding the understanding of educational institutions and corporations. A highly social Web and a bad economy is making the Dark Side -- the Internet underworld where cybercrime and hacking run rampant -- overwhelming. Hacktivism is the new, hip thing; it has become a hobby for people with higher-than-average computer knowledge.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74754.html">technewsworld.com/story/74754.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-64084334541744720872012-04-02T11:52:00.001-07:002012-04-02T11:52:31.298-07:00Google Gives Users a Gander at the Trails They Leave<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">Google has launched a new tool called "Account Activity," designed to give users a detailed glimpse into their Web usage across all Google sites and services. Account Activity is a personalized, detailed monthly report on Web activity with Google search, Gmail accounts, YouTube and social network Google+.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74748.html">technewsworld.com/story/74748.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-27332499384325495272012-04-02T11:49:00.000-07:002012-04-02T11:49:19.833-07:00Microsoft bot takedowns help, but are no cure<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Takedowns of Zeus botnet command and control servers like the one executed last week by<a href="http://www.networkworld.com/subnets/microsoft/" style="color: #0f7cc2;">Microsoft</a> and others do reduce the criminal activity they spawn - for a while - but attackers learn from the experience and come back with more sophisticated techniques, a security expert says.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Eliminating the servers that issue commands and gather stolen data can stop a particular criminal enterprise temporarily, but without grabbing the people behind it, a new botnet is likely to emerge to replace the ones that are disabled, says John Pironti, president of IP Architects, LLC.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<b>BACKGROUND:</b> <a href="http://www.networkworld.com/news/2012/032712-zeus-botnet-microsoft-257670.html" style="color: #0f7cc2;">Microsoft downs Zeus botnet but can't ID who's behind it </a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<b>ANOTHER TAKEDOWN:</b> <a href="http://www.networkworld.com/news/2012/032812-international-security-team-shoots-down-257731.html?hpg1=bn" style="color: #0f7cc2;">International security team shoots down second Hlux/Kelihos botnet </a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
"Adversaries will study how Microsoft did this and create ways to get around it in the future," he says. "They'll change their methods and practices and won't make the same mistake twice."</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
In fact, even as Microsoft grabbed servers that zombie machines were reporting back to with stolen banking data, criminals are already using more sophisticated means. Whereas the Zeus botnet employed a beacon reporting system in which drone machines report to a single<a href="http://www.networkworld.com/topics/server.html" style="color: #0f7cc2;">server</a>, newer botnets use command and control servers that are linked peer-to-peer to make discovery and takedowns harder, Pironti says.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://www.networkworld.com/news/2012/032912-microsoft-bot-257777.html" style="background-color: transparent;">networkworld.com/news/2012/032912-microsoft-bot-257777.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-82179074770827048212012-04-02T11:47:00.001-07:002012-04-02T11:47:53.025-07:00Malware infects Macs through Microsoft Office vulnerability<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Security researchers have encountered new email-based targeted attacks that exploit a vulnerability in Microsoft Office to install a remote access Trojan horse program on Mac OS systems.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<a href="http://www.networkworld.com/slideshows/2011/100311-malware.html" style="color: #0f7cc2;">The future of malware</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
The rogue emails appear to target Tibetan activist organizations and distribute booby-trapped Microsoft Word documents that exploit a known remote code execution vulnerability in Microsoft Office for Mac, according to malware experts from security firm AlienVault.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
"This is one of the few times that we have seen a malicious Office file used to deliver Malware on Mac OS X," said AlienVault security researcher Jaime Blasco in a <a href="http://labs.alienvault.com/labs/index.php/2012/ms-office-exploit-that-targets-macos-x-seen-in-the-wild-delivers-mac-control-rat/" style="color: #0f7cc2;">blog post</a> on Tuesday.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Security researchers from Mac antivirus vendor Intego believe that the attacks might become more widespread. "This malware is fairly sophisticated, and it is worth pointing out that the code in these Word documents is not encrypted, so any malware writer who gets copies of them may be able to alter the code and distribute their own versions of these documents," they said in a <a href="http://blog.intego.com/tibet-c-malware-delivered-by-poisoned-word-documents-installs-backdoors-on-macs/" style="color: #0f7cc2;">blog post</a> on Thursday.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
"The attack will be very effective on those who have not updated their copies of Microsoft Office, or aren't running antivirus software," the Intego researchers said.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://www.networkworld.com/news/2012/032912-malware-infects-macs-through-microsoft-257791.html" style="background-color: transparent;">networkworld.com/news/2012/032912-malware-infects-macs-through-microsoft-257791.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-61391648418720193892012-04-02T11:45:00.003-07:002012-04-02T11:45:51.838-07:00{ NSFW! ADULTS ONLY! } Craving the black cock@ <a href="http://www.redtube.com/30407">redtube.com/30407</a>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-27989658492349912002012-04-02T11:44:00.000-07:002012-04-02T11:44:05.473-07:00{ NSFW! ADULTS ONLY! } Incredible huge black dick checking cutie@ <a href="http://www.redtube.com/28106">redtube.com/28106</a>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-68635452478503119252012-04-02T11:39:00.002-07:002012-04-02T11:39:29.707-07:00The Privacy Pickle<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">"Is privacy only for those with something to hide?" is the title of an open ballot on TuxRadar that has kicked off quite a debate. TuxRadar points to the full-disk encryption option now offered by several Linux distributions -- along with potential law-enforcement implications -- but the topic is also particularly timely in light of Canonical's recent moves to step up Ubuntu's privacy protections.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74745.html">technewsworld.com/story/74745.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-89217344716031934702012-03-29T19:39:00.002-07:002012-03-29T19:39:31.317-07:00Duqu malware resurfaces after five-month holiday<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Duqu, the malware that has been compared to 2010's notorious Stuxnet, is back, security researchers said today.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
After a several-month sabbatical, the Duqu makers recompiled one of the Trojan's components in late February, said Liam O Murchu, manager of operations at Symantec's security response team.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<strong>BACKGROUND:</strong> <a href="http://www.networkworld.com/news/2012/032012-researchers-discover-new-duqu-variant-257466.html" style="color: #0f7cc2;">Researchers discover new Duqu variant that tries to evade antivirus detection</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
The system driver, which is installed by the malware's dropper agent, is responsible for decrypting the rest of the already-downloaded package, then loading those pieces into the PC's memory.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Symantec has captured a single sample of the driver, which was compiled Feb. 23, 2012. Before that, the last time the Duqu gang updated the driver was Oct. 17, 2011.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Duqu has been characterized by Symantec -- the first to extensively analyze the Trojan last year -- and others as a possible precursor to the next Stuxnet, the <a href="http://www.computerworld.com/s/article/9185919/Is_Stuxnet_the_best_malware_ever_" style="color: #0f7cc2;">ultra-sophisticated worm</a>that sabotaged Iran's nuclear fuel enrichment program by crippling critical gas centrifuges.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
O Murchu said that the functionality of the new driver was "more or less the same" as earlier versions, including the one spotted last October and another from late 2010 that later surfaced. "The functionality hasn't changed," said O Murchu.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
While O Murchu was hesitant to speculate on why the hackers had returned to action or why they took a five-month break, security researchers at Moscow-based Kaspersky Lab were not as reluctant.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://www.networkworld.com/news/2012/032812-duqu-malware-resurfaces-after-five-month-257757.html" style="background-color: transparent;">networkworld.com/news/2012/032812-duqu-malware-resurfaces-after-five-month-257757.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-26840807983495279182012-03-29T19:36:00.001-07:002012-03-29T19:36:24.966-07:00Q&A: What the FTC recommendations mean for online privacy<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
The Federal Trade Commission this week released its final report on online consumer privacy that recommended implementing a universal "Do Not Track" standard, a centralized website for data brokers and more.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Christopher Wolf, the director of information management practice at the Hogen Lovells law firm and the co-chairman of the Future of Privacy Forum, thinks that the FTC hit most of the right notes in crafting its policy, as it will rely on a flexible "self-regulation" regime that subjects web companies to FTC enforcements if they agree to sign on to privacy rules created by the FTC and industry leaders. In this question-and-answer session we'll talk with Wolf about how "self-regulation" might work, what a centralized data broker information site might look like and what the FTC needs to do to protect consumer privacy on the mobile web.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<b>BACKGROUND:</b> <a href="http://www.networkworld.com/news/2012/032612-ftc-online-privacy-257659.html" style="color: #0f7cc2;">The FTC's online privacy report: Breaking down the recommendations</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<b>ANALYSIS:</b> <a href="http://www.networkworld.com/news/2012/012612-google-sharing-255349.html" style="color: #0f7cc2;">Google's new cross-service info sharing: What's the hubbub?</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<b>A lot of the recommendations being pushed by the FTC involve "self-regulation." How exactly does this work on a practical basis.</b></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
I'd call it "co-regulation" rather than "self-regulation." The concept is that groups and businesses will come up with a set of standards that they'll promise to abide by and if they don't then they're subject to enforcement by FTC under regulations against deceptive trade practices. Rather than imposing standard one-size-fits-all rules, it allows for flexibility and it allows for changes to occur.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://www.networkworld.com/news/2012/032812-privacy-forum-257754.html" style="background-color: transparent;">networkworld.com/news/2012/032812-privacy-forum-257754.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-2267757071232926572012-03-29T19:33:00.000-07:002012-03-29T19:33:04.331-07:00{ NSFW! ADULTS ONLY! } Big black cock destroy my wife@ <a href="http://www.xhamster.com/movies/1078210/big_black_cock_destroy_my_wife.html">xhamster.com/movies/1078210/big_black_cock_destroy_my_wife.html</a>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-33882533585213853752012-03-29T19:31:00.002-07:002012-03-29T19:31:47.514-07:00{ NSFW! ADULTS ONLY! } WHITE WIFE ALWAYS WANTED TO TRY BBC@ <a href="http://www.drtuber.com/video/157243/white-wife-always-wanted-to-try-bbc">drtuber.com/video/157243/white-wife-always-wanted-to-try-bbc</a>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-41995042264616076842012-03-29T19:24:00.000-07:002012-03-29T19:24:08.140-07:00FTC to Congress: Shorten Data Brokers' Leash<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">The Federal Trade Commission this week urged Congress to impose new regulations on companies that collect consumer data related to Internet browsing habits. Under the policy the FTC suggests, data brokers, or the holders of personal consumer information, must allow consumers access to that information.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74738.html">technewsworld.com/story/74738.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-39221513682700985202012-03-29T19:23:00.001-07:002012-03-29T19:23:23.506-07:00Google Guns for Facebook With Third-Party Comment Platform<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">Google is reportedly planning to launch its own third-party commenting system soon. It will apparently be tied into its Google+ social platform, its Web services and the company's Web search products. Google, according to reports, will make the platform available to third parties in much the same way Facebook offers its platform.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74735.html">technewsworld.com/story/74735.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-51924574648900064812012-03-29T19:21:00.003-07:002012-03-29T19:21:35.439-07:00Operation Global Blackout: Real danger or irrelevant?<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Will the hacker group <a href="http://www.csoonline.com/article/701586/lulzsec-bust-a-blow-to-anonymous-not-so-fast" style="color: #0f7cc2;">Anonymous make good</a> on its threat to take down the Internet Saturday? Probably not. But it could slow it down, according to a number of security experts. And it may depend in part on how unified Anonymous is about the attack -- there are some indications of <a href="http://www.csoonline.com/article/682263/anonymous-struggles-with-rift-psn-blame" style="color: #0f7cc2;">divisions within the group</a>.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Anonymous has threatened retaliation for the arrests of about 25 of its members last month, and is also focused on what its members believe is a continuing threat by Congress to censor the Internet through revised versions of the <a href="http://blogs.csoonline.com/security-leadership/1984/security-wisdom-watch-sopa-pipa-edition" style="color: #0f7cc2;">Stop Internet Piracy Act (SOPA) and the companion Senate bill called the Protect IP Act (PIPA)</a>, even though the legislation was put on hold in January.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<strong>BACKGROUND:</strong> <a href="http://www.networkworld.com/news/2012/022012-anonymous-threatens-to-ddos-root-256341.html" style="color: #0f7cc2;">Anonymous threatens to DDOS root Internet servers</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<strong>TIPS:</strong> <a href="http://www.networkworld.com/news/2012/032212-thwarting-hactivists-257530.html" style="color: #0f7cc2;">7 simple steps for thwarting hactivists</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
And it is essentially daring anyone to stop Operation Global Blackout -- the group announced March 31 as the date of the attack, along with the method they intend to use -- disabling the Domain Name Service through <a href="http://www.csoonline.com/article/592776/the-ddos-attack-survival-guide-" style="color: #0f7cc2;">distributed denial of service attacks</a> on the root servers of the DNS with an attack tool called "ramp," which stands for "reflective amplification." While two of the basic rules of hacking are: Don't tell your target in advance and don't give away your methods, Radware security vice president Carl Herberger says the announcement is a classic Anonymous tactic.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
"They are not financially motivated," he says. "They're after behavioral changes -- things like trying to stop SOPA. In that case, you almost by definition have to file your grievance -- tell them you're angry with them. They also like to boast of how effective they are, and how the rest of the world is not worthy of their technical talents."</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://networkworld.com/news/2012/032812-operation-global-blackout-real-danger-257760.html">networkworld.com/news/2012/032812-operation-global-blackout-real-danger-257760.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-71156226549429613292012-03-29T19:14:00.002-07:002012-03-29T19:14:46.337-07:00New Google Account Activity lets you know what Google knows about you<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
If you're confused about what Google does and doesn't know about your online activity, take heart: Google is letting you in on the secret.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<b>ANALYSIS:</b> <a href="http://www.networkworld.com/news/2012/032612-ftc-online-privacy-257659.html" style="color: #0f7cc2;">FTC's privacy report: Breaking down the recommendations</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<b>RELATED:</b> <a href="http://www.networkworld.com/news/2012/030912-google-pew-survey-257130.html" style="color: #0f7cc2;">Despite privacy concerns, Google still rules the search realm</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Google today <a href="http://googlepublicpolicy.blogspot.com/2012/03/giving-you-more-insight-into-your.html" style="color: #0f7cc2;">announced</a> that it has created a new Account Activity feature that sends users monthly reports about what they've been doing while signed into Google services such as Google Play, Google+ and Gmail. Among other things, the monthly report will detail the number of emails you've sent and received, the number and types of searches you've conducted while signed into your Google account, the places that you've signed in from and the different platforms and operating systems you've used while signed in.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Andreas Tuerk, a Google product manager, described the new feature as something that "helps you better understand and manage your information on Google." For example, Tuerk says Account Activity can help users see if anyone has been signing into their Google accounts on locations where they don't visit or from devices they don't own, and thus give them the ability to change their password to stop unauthorized use.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
The Account Activity feature is part of Google's broader effort to make sure users are more comfortable with the company's new privacy policies that allow for sharing of user data across multiple Google services. Google has maintained that these new policies will benefit users by providing them with more relevant advertising that comes from a broader variety of data on a given user's Internet behavior. Google insists that it is not selling users' data to outside parties and says that users can always sign out of their Google accounts if they don't want their searches tracked and used for personalized advertising.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://www.networkworld.com/news/2012/032812-google-account-257732.html" style="background-color: transparent;">networkworld.com/news/2012/032812-google-account-257732.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-81821219532374184652012-03-29T19:13:00.000-07:002012-03-29T19:13:05.008-07:00FTC Report Calls for Transparency, Stops Short on Do Not Track Law<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">The U.S. Federal Trade Commission released a report Monday calling for greater privacy protections for online users, including increased transparency regarding the data companies collect from consumers. The report also addressed Do Not Track systems, which allow consumers to opt out of online behavior tracking mechanisms.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74727.html">technewsworld.com/story/74727.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-63919829798017105142012-03-29T19:12:00.002-07:002012-03-29T19:12:11.600-07:00Microsoft Wields RICO Act to Storm Zeus-Infested Botnet Hives<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">Microsoft, together with partners from the financial services industry, has hit the operators of a botnet running the Zeus Trojan. Escorted by U.S. Marshals, staff of the companies seized command and control servers in two hosting locations -- Scranton, Pa. and Lombard, Ill. -- and took down two IP addresses related to the C&C structure.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74724.html">technewsworld.com/story/74724.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-67451117131087232122012-03-29T19:10:00.002-07:002012-03-29T19:10:50.925-07:00International security team shoots down second Hlux/Kelihos botnet<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
A team of security experts cooperating globally say they've disabled a large botnet of about 110,000 remotely controlled infected machines dubbed HLux.B/Kelihos.B by interfering in its peer-to-peer connections in a "poisoning" process to sinkhole them, cutting off the botnet's central control point.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<a href="http://www.networkworld.com/slideshows/2007/070607-bots-sldshow.html" style="color: #0f7cc2;">Tracking the botnets</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Kaspersky Lab, Dell SecureWorks, Crowdstrike Intelligence Team and the Honeynet Project all had a hand in monitoring and disabling the botnet. There's speculation that it was created by the same gang that created the first Hlux/Kelihos bot that was shot down with help from<a href="http://www.networkworld.com/subnets/microsoft/" style="color: #0f7cc2;">Microsoft</a>'s Digital Crimes Unit, with others, last September.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Crowdstrike's senior research scientist Tillmann Werner and Kaspersky Lab's global head of research in Germany, Marco Preuss, discussed how the sinkholing operation against HLux.B proceeded, cautioning that the sinkhole can probably be maintained indefinitely, but that more than 100,000 computers around the world are still infected.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
The Hlux.B/Kelihos botnet has been used for spam, denial-of-service attacks and "spying on credentials" on victims' computers, noted Werner. About one quarter of the 110,000 or more infected machines appear to be in Poland, with about 10% in the U.S., and the reminder elsewhere around the world, including Turkey, Spain, India and Argentina.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://networkworld.com/news/2012/032812-international-security-team-shoots-down-257731.html">networkworld.com/news/2012/032812-international-security-team-shoots-down-257731.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-56225473085223296042012-03-29T19:09:00.003-07:002012-03-29T19:09:26.977-07:00AVG adds 'do not track' technology to antivirus<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
AVG has become the first antivirus vendor to offer a privacy filter to monitor and block websites and ad networks that silently collect Internet usage data from consumers, the company has announced.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Available from today in a service pack for all paid and free AVG antivirus users, DoNotTrack is a plug-in for Internet Explorer, Mozilla and Chrome that keeps tabs on which sites are collecting data as users browse the web.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<strong>IN THE NEWS:</strong> <a href="http://www.networkworld.com/news/2012/032612-ftc-chairman-do-not-track-law-may-257653.html" style="color: #0f7cc2;">FTC chairman: Do-not-track law may not be needed</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Some of this will be fairly innocent web analytics of the sort gathered by every site to monitor how visitors interact with sites, but AVG said users should also be more aware of social media applications that collected extensive data usage information and ad networks. Both of these could be intrusive in search of the information necessary to serve context-aware advertising, AVG said.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
AVG users will be able to block or allow these on a case-by-case basis, controlling what data is tracked depending on their assessment of a particular site.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://www.networkworld.com/news/2012/032812-avg-adds-do-not-track-257730.html" style="background-color: transparent;">networkworld.com/news/2012/032812-avg-adds-do-not-track-257730.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-71696697058424921802012-03-29T19:06:00.004-07:002012-03-29T19:06:56.850-07:00Iran Still Stuck With Stuxnet<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">Iran apparently has developed an antivirus program to neutralize the notorious Stuxnet virus that put a kink in the country's nuclear development program in June 2010. Iran has vowed to distribute the antivirus program for free in about a month, according to Trend, a publication that describes itself as a private media outlet in Azerbaijan.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74718.html">technewsworld.com/story/74718.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-25385755427551436672012-03-29T19:05:00.004-07:002012-03-29T19:05:51.642-07:00Facebook on Passwords During Job Interviews: Don't Ask, Don't Tell<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">Reacting to recent reports that some organizations are demanding that job seekers turn over their Facebook passwords, the social network on Friday criticized the practice for undermining members' privacy expectations and security. It also pointed out that such a move could expose employers who ask for passwords to dangerous liabilities and vowed to take action to protect the privacy and security of its users.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74706.html">technewsworld.com/story/74706.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-84792061285311014042012-03-29T18:56:00.002-07:002012-03-29T18:56:31.193-07:00Review: 7 password managers for Windows, Mac OS X, iOS, and Android<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
I hate passwords. I hate coming up with them. I hate remembering them. I hate mistyping them four times in a row. And I hate getting locked out of whatever I'm trying to log into in the process.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<a href="http://www.networkworld.com/community/blog/facebook-making-right-noises-password-privacy" style="color: #0f7cc2;">Facebook making the right noises on password privacy</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
That said, I hate being hacked only slightly more, so I've done my part to use passwords that aren't "password123" or something equally foolish. The hard part is keeping them straight, which I could do by writing them down -- but isn't that a security hole all over again? Heck, I've known that since I was a kid. I saw "WarGames."</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<strong>[ Also on InfoWorld: <a href="http://www.infoworld.com/slideshow/38267/5-very-cool-kinda-creepy-mobile-technologies-189214?source=fssr" style="color: #0f7cc2;">5 very cool (but kinda creepy) mobile technologies</a> | Stay up to date on the latest security developments with InfoWorld's <a href="http://www.infoworld.com/newsletters/subscribe?showlist=infoworld_sec_rpt&amp;source=ifwelg_fssr" style="color: #0f7cc2;">Security Central newsletter</a>. | Get a dose of daily computer security news by <a href="http://twitter.com/rogeragrimes" style="color: #0f7cc2;">following InfoWorld's Roger Grimes on Twitter</a>. ]</strong></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Password vaults, aka password safes or password managers, help solve this problem. They give you a central place to store all your passwords, encrypted and protected by a passphrase or token that you provide. This way, you have to memorize a single password -- the one for your password vault. All the other passwords you use can be as long and complex as possible, even randomly generated, and you don't have to worry about remembering them.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
If having your passwords in a single encrypted store were all you needed, then a password-protected Microsoft Word document would do the trick. There has to be an easier way. One of the reasons I looked at these password vaults -- a total of seven -- was to see how easy it was to work with them over an extended period of time. If they didn't provide much more convenience over simply copying and pasting passwords from a text file, they'd hardly be worth using.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Here's what I found. To keep the list manageable, I've focused on programs that have both a desktop and a mobile version available, with the desktop taking precedence.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://www.networkworld.com/reviews/2012/032812-review-7-password-managers-for-257717.html" style="background-color: transparent;">networkworld.com/reviews/2012/032812-review-7-password-managers-for-257717.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-45934838332389403022012-03-29T18:47:00.003-07:002012-03-29T18:47:39.402-07:00Avira becomes latest vendor to offer Mac antivirus software<br />
<div class="first" style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
German security company Avira has released free antivirus software for Apple Macs, joining a host of security software providers offering protection for OS X.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
<a href="http://www.networkworld.com/news/2012/030612-30000-wordpress-blogs-infected-to-256993.html" style="color: #0f7cc2;">30,000 WordPress blogs infected to distribute rogue antivirus software</a></div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Avira said Apple's market share for computers has increased, which has been followed by an increase in malicious software programs. The company said <a href="http://www.avira.com/en/avira-free-mac-security" style="color: #0f7cc2;">the product</a> will not contain advertising or marketing pop-up ads.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Many of the top security software companies offer security software for Macs, with some for free. Kaspersky Lab, Intego, PC Tools, Symantec, McAfee and Trend Micro all offer paid security software, while Sophos offers its Mac product for free.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
Apple has marketed itself as inherently more secure than Windows. Security experts have said its platform is just as prone to software vulnerabilities as other operating systems, but Windows is targeted more due to its high market share. In a sign of the increasing prevalence of Mac malware, Apple rolled out an antimalware tool called XProtect in 2009, which is periodically updated to detect new malware.</div>
<div style="background-color: white; color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; margin-bottom: 10px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">
More @ <a href="http://www.networkworld.com/news/2012/032812-avira-becomes-latest-vendor-to-257715.html" style="background-color: transparent;">networkworld.com/news/2012/032812-avira-becomes-latest-vendor-to-257715.html</a></div>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-76587220993699937732012-03-29T14:02:00.001-07:002012-03-29T14:02:20.717-07:00AT&T Let Scammers Overrun Calling Service, Feds Charge<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">The Department of Justice has filed a lawsuit against telecommunications giant AT&T, claiming that the carrier allowed scammers to use a calling service for the hearing-impaired and then stuck U.S. taxpayers with the bill. While many Internet scams have originated from Nigeria, this case reportedly involves scammers using a free Internet-based calling system for hearing-impaired users.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74705.html">technewsworld.com/story/74705.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0tag:blogger.com,1999:blog-2612979269005945497.post-70703779869956958042012-03-29T13:56:00.004-07:002012-03-29T13:56:56.791-07:0012 Steps for Staying 1 Step Ahead of Online Security Threats<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">With the explosion of Web-based communications in the form of applications, blogs, podcasts, and social networking sites like Facebook and Twitter, new security threats that can cause serious damage to computers are emerging. As they access these Web-based services from both work and personal computers, many users are unaware that they may be exposing themselves and their organizations to risk.</span>
<br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;"><br /></span><br />
<span style="background-color: white; font-family: verdana, arial, helvetica; font-size: 13px; text-align: left;">More @ </span><span style="font-family: verdana, arial, helvetica; font-size: x-small;"><a href="http://technewsworld.com/story/74702.html">technewsworld.com/story/74702.html</a></span>The Red Hoodhttp://www.blogger.com/profile/00054807754497222431noreply@blogger.com0