Posts Tagged ‘Personal computer’

Microsoft Offering Sneak Peeks At Windows 8

Published by pratyushkp on August 17th, 2011 - in Social, Technology

Image via Wikipedia

Anyone anticipating the release of Windows 8 might want to check out Microsoft‘s new blog, Building Windows 8, which will chronicle the development of the forthcoming operating system.

Windows President Steven Sinofsky published the first post on Building Windows 8 (or B8 as it’s affectionately referred to by his team) on Monday evening.

“We intend to post regularly throughout the development of Windows 8, and to focus on the engineering of the product,” Sinofsky wrote. “Blogging allows us to have a two-way dialog with you about design choices, real-world data and usage, and new opportunities that are part of Windows 8.”

Peeping Tom tricked women into taking hacked webcams into shower, claim police

Published by pratyushkp on June 10th, 2011 - in Social, Technology

Image by Getty Images via @daylife

The problem of perverts and cyberstalkers using malware to grab control over female victims’ webcams is one that has been around for quite some time.

Hackers can secretly spy upon people in their bedrooms, and even exploit technology to blackmail young women into posing naked, threatening that they will send other compromising photos to their online friends.

It’s pretty unsavoury stuff, and has probably made some women cautious of handing over their computers to that ever-so-friendly repair man, fearful of what they might install while the computer is in their care.

In the latest case, a 20-year-old man has been arrested for allegedly infecting young women’s Apple Mac computers with spyware that could commandeer their webcam.

Trevor Harwell, of Orange County, California, is said to have rigged the MacBooks with error messages that would increase the chances of him capturing nude pictures and movies of the young women.

You’re probably wondering what kind of error messages would achieve such a result.

"You should fix your internal sensor soon. If unsure what to do, try putting your laptop near hot steam for several minutes to clean the sensor."

According to Fullerton Police Sgt. Andrew Goodrich, the error message tricked many victims into taking laptops into their bathroom while taking a steamy shower.

The sleazy scheme was only brought to light last summer when a mother became suspicious about the unlikely messages appearing on her daughter’s computer.

Hundreds of thousands of surreptitiously taken still images, videos and cellphone videos were seized from Hawell’s computer according to a report in the LA Times.

Anyone woman who believes they might have been a victim is invited to contact Fullerton Det. Kathryn Hamel at (714) 738-5327.

Of course, and perhaps most disturbingly, there was nothing stopping the victim of the alleged surveillance being under-age.

It’s true of people of any age, but young people’s PCs must be properly protected with the latest anti-virus software, security patches and firewalls. It is also essential that young people are taught how to behave safely online, to avoid being exploited by sick-minded hackers.

  • Find out more about how to protect children from online threats at www.getsafeonline.org
  • Find out about the Virtual Global Taskforce – a group of police forces working around the world to fight online child abus

Source :- http://nakedsecurity.sophos.com

  • Peeping Tom tricked women into taking hacked webcams into shower, claim police (nakedsecurity.sophos.com)
  • Crooked Technician Hacked Laptops To Become Peeping Tom (escapistmagazine.com)
  • Technician Arrested for Installing Webcam Peeping Software on Women’s PCs (techland.time.com)
  • Cops arrest alleged high-tech peeping Tom (cbsnews.com)
  • Peeping Tom Mac spyware suspect cuffed (go.theregister.com)
  • Police: Computer tech installed peeping software (seattlepi.com)
Tags: , , , , Los Angeles Times, , , Orange County California, , Virtual Global Taskforce,

Top 12 Spam Relaying Countries

Published by pratyushkp on May 12th, 2011 - in Social, Technology
Zombie-process

Image via Wikipedia

There’s a zombie invasion going on – and it could have infiltrated your business, your home office, or even the corner of your bedroom.

Of course, it’s not the kind of zombies beloved by the movie theatres but instead the problem of compromised computers being controlled by a remote hacker.

Many members of the public still haven’t understood that spammers don’t use their own PCs to send spam – instead they create botnets of commandeered computers around the globe (also known as “zombies”), which can be used to relay spam, send out malicious links and even launch distributed denial-of-service attacks.

If they did understand the problem, maybe they would put more effort into protecting their computers.

Spam dashboard

Sophos has today published a new report, revealing the top twelve spam-relaying countries around the world. We call the list the “dirty dozen”, and because virtually all spam is sent from compromised PCs, it’s a pretty good indication of where the botnets have got the tightest hold.

The top twelve spam relaying countries for January – March 2011

1. USA 13.7%
2. India 7.1%
3. Russia 6.6%
4. Brazil 6.4%
5. S Korea 3.8%
6. United Kingdom 3.2%
7. Italy 3.1%
7. France 3.1%
9. Spain 2.8%
10. Germany 2.6%
11. Romania 2.5%
12. Poland 2.3%
Other 42.8%

Although the USA and UK contribution to the global spam problem has decreased in percentage terms, it is essential for organizations not to become complacent. Financially-motivated criminals are controlling compromised zombie computers to not just launch spam campaigns, but also to steal identity and bank account information.

Computer users must be educated about the dangers of clicking on links or attachments in spam mails – and many computers may already be under the control of cybercriminals. Businesses and computer users must take a more proactive approach to spam filtering and IT security in order to avoid adding to this global problem.”

Dirty monitorIn all, we counted spam being sent from an astonishing 229 countries around the world during the first quarter of 2011. So everyone, no matter where they live, should be taking more care of their personal computer’s protection.

For as long as spam continues to make money for the spammers, it will continue to be a global problem. Too many computer users are risking a malware infection that sees their computer recruited into a spam botnet. To combat the spammers, it’s not only essential for computer users to run up-to-date security software, they must also resist the urge to purchase products advertised by spam.

So, don’t add to the statistics, do your bit in the fight against spam and don’t allow your computer to become a zombie.

Keeping your security patches up-to-date, your anti-virus defences in place and having a good helping of common sense can help avoid your computer from being recruited by the bad guys.

Source :- http://nakedsecurity.sophos.com

  • The dirty dozen spam-relaying countries revealed (nakedsecurity.sophos.com)
  • Global Appetite for Spam Takes Asian Flavor (blogs.wsj.com)
  • Spam in the First Quarter of 2011 – Securelist (securelist.com)
  • US leads in spamming globally (aptantech411.wordpress.com)
  • Facebook spam prevention scam spreading like wildfire (go.theregister.com)
  • 9 Thoughts on Stepping Up Spam and Malware Enforcement (circleid.com)
  • How does Canada’s spam output fare globally? – Page 1 – Security (itworldcanada.com)
  • Relay Stent-Grafts Show Promise In Treatment Of Aortic Dissection Patients (medicalnewstoday.com)
  • Microsoft, Feds Bring Down BotNet Spam Ring, Boner Pill Emails Drop Almost 40% (geekologie.com)
  • China cleans up its spam problem (infoworld.com)
  • The Distribution of Botnets Since Rustock Went Down (circleid.com)
Tags: Computer security, Denial-of-service attack, E-mail filtering, , , , , , Zombie computer
© Social Media Blog