Saturday, 22. October 2011
Duqu - like Stuxnet
At this time DuQu does not propagate and has been released only within targeted industries, although Symantec admits it may also be elsewhere and not yet discovered. The original compile dates on some of the variants of DuQu so far analyzed suggest it may have existed as far back as November 3, 2010. Stuxnet compile dates were between June 2009 and March 2010 and therefore pre-date DuQu.

Download PDF
http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_duqu_the_precursor_to_the_next_stuxnet.pdf

"Duqu" Removal Tool:

You only have to download and run it on the system, then reboot the PC if infection is found. Here is a complete rundown of the steps you need to take:
1. Download the Duqu_Removal_Tool.zip (.zip file), then double-click on it chose "Extract all files..." from the File menu, and follow the wizard's instructions. You can use any other decompression utility, like WinZip.
2. Navigate to the folder you have extracted the tool in, find the file called Duqu_Removal_tool.exe and double-click on it. Press the Scan button and let the removal tool scan your PC.
3. If you have Windows Vista with User Access Control enabled, or if you are running as a restricted user in Windows XP, right click the Duqu_Removal_tool.exe program and choose "Run as Administrator". You will be prompted to enter credentials for an admin account.
4. Press the OK button when the removal tool asks for a reboot.
5. If you don't already have permanent antivirus protection or if your current antivirus has failed you, consider using the advanced protection tool provided by BitDefender.

Download
http://www.duquremoval.com/files/Duqu_Removal_Tool.zip

Permalink

 


Friday, 21. October 2011
Comodo Internet Security Pro 2012 - free
Download Comodo Internet Security Pro 2011 Here -> one-year special installer
http://www.downloadcrew.com/article/22370-comodo_internet_security_pro_2011
Install and start Comodo 2011. Navigate to “More” -> “About” -> Serial Number -> “Copy”.
Save the serial number on your PC, you will need this serial to activate the 2012 version.
Download and Install Free Comodo Internet Security Pro 2012.
http://downloads.comodo.com/cis/download/installs/1000/standalone/cispro_installer_x86.exe
During installation, enter the serial number that you received from the 2011 version.

Permalink

 


Thursday, 13. October 2011
German Governmental Backdoor ("R2D2")
The announcment was made public on ccc.de with a
detailed 20-page analysis of the functionality of the malware. Download the
report in PDF
http://www.ccc.de/system/uploads/76/original/staatstrojaner-report23.pdf
(in
German)

According to CCC Germany the backdoor could also be exploited by third
parties. You can download it from
http://www.ccc.de/system/uploads/77/original/0zapftis-release.tgz . You'll
need gzip and tar to get the .dll and the .sys file.

The backdoor includes a keylogger that targets certain applications. These
applications include *Firefox, Skype, MSN Messenger, ICQ* and others.
The backdoor also contains code intended to take screenshots and record
audio, including recording Skype calls.

Permalink

 


Norman Security Suite 9 - Free
Click here to visit promo page
http://www.norman.com/support/auth
Enter our details and Use OEM code: PCP-NSS12-DE
You will receive an email from info@mail.norman.no with your free license key.

Permalink

 


Your Browser Matters
Microsoft launched a website today designed to give users a detailed look at how secure their browser is. The site, called Your Browser Matters, automatically detects the visitor's browser and returns a browser security score on a scale of four points.

Source
http://yourbrowsermatters.org/

Permalink

 


Thursday, 6. October 2011
Steve Jobs 1955 - 2011
The mastermind behind Apple's iPhone, iPad, iPod, iMac and iTunes, has died in California. Jobs was 56.

A Collection of 60 Inspirational Steve Jobs Quotes About Life, Design and Apple:

http://pastebin.com/k0UxRtRa

Permalink

 


Wednesday, 5. October 2011
Download the DEF CON 19 DVD!
DEF CON 19 DVD content on media.defcon.org. two .iso images, one is the original DVD distributed at the show, and the other contains all the same content, but with the updated slide decks from the speakers. Download them at the following links:


https://media.defcon.org/dc-19/defcon-19-dvd-original.iso (~1.6 GB)

https://media.defcon.org/dc-19/defcon-19-dvd-updated.iso (~1.7 GB)

Permalink

 


Monday, 3. October 2011
QR codes - Android Malware?
Once a user scans the QR code, the code redirects them to a site that will install a Trojan on their Android smart phones. Kaspersky's SecureList blog has a report of a malicious QR code on a web site which when scanned directs the user to a URL; the linked site doesn't have a file matching the name in the URL, but it does redirect the browser to another site where the file jimm.apk is downloaded. The file is a trojanised version of the Jimm mobile ICQ client, infected with Trojan-SMS.AndroidOS.Jifake.f which sends a number of SMS messages to a $6 a message premium rate service.

Once installed, the Trojan will send a number of SMS messages to premium-rate numbers, which will end up costing the victim some money, depending on how quickly she is able to find and remove the Trojan.

Kaspersky’s Denis Maslennikov reports that the malware itself is a Trojanized Jimm application (mobile ICQ client) which sends several SMS messages to premium rate number 2476 (US$6.00 each).

Permalink

 


Wednesday, 28. September 2011
Trend Micro Titanium Internet Security 2011 - Free
Click here "http://jowdones.com/download/security/TTi_MR_32-64bit_ML.7z" to download Trend Micro Titanium Internet Security Multilingual Installer Size 77 MB.
During installation, select “Trial Version”, then accept the terms and conditions.
This is a special build that will automatically activate your subscription for 1 year. No serial/license is required to activate your subscription

Permalink

 


Zscaler Likejacking Prevention
The Zscaler Likejacking Prevention keeps you safe from Facebook scams that hide widgets such as ‘Like’ buttons on third party pages, using a technique known as clickjacking. With Likejacking, attackers exploit the Facebook Like button and other Facebook widgets, to spread spam and propagate scams by tricking users into advertising the malicious content via their own Facebook profiles.

Download
http://www.zscaler.com/research/plugins/firefox/likejacking/zscaler-likejaking-prevention-latest.xpi

Permalink