Tag Archives: security

Cyber-Attacks Up 81% in 2011, SMBs Increasingly Targeted

Hackers stole 187 million personal identities last year, with the average yield per data breach amounting to 1.1 million identities, Symantec said. Identity theft gleaned from lost or stolen PCs or mobile devices also exposed 18.5 million identities in 2011. And malicious attacks increased by 81 percent in comparison with Symantec’s 2010 estimates.

Samsung Galaxy S3 Latest Image Leak Seems A Lot Real; It Confirms New Specs And Suggests Release Date Too – What Else?

Yet another week has passed by and Samsung Galaxy S3 rumors are still high at the moment. Well, this time again, the major cause is the purported leaked image, which seems to be sprawling all over the media world, indicating this is what the Korean giant’s next flagship will look like.

The image, claimed to have been received by a Polish blog, oPDA.pl, from an anonymous source, who said that he was testing the device has revealed that the Samsung Galaxy S3 will sport a home button finally. Further the leaked image also proved that the phone will feature 5 row UI, following the Galaxy Note approach.

Many industry analysts are still suspicious about the recent image leak and are considering it as fake. However, if taken a closer look, especially at home button, it looks a lot similar to the style Samsung Galaxy S WiFi 4.2.

There was one more image leak (two weeks ago) which got floated around by Reddit reports via Samsung fan site in Germany. This indicated that the Galaxy S3 would boast a look similar to Samsung Galaxy S WiFi 4.2 and it also pointed towards the home button in S3.

Further, that image seemed to be an internal document of the popular PR agency Weber Shandwick and was assumed to be a part of the marketing campaign for the London Olympics, as it read that the phone is to be launched May 22.

Hence, logically the latest image leak seems a lot real if compared to this Weber Shandwick’s May 22 rumor campaign sighting. It also hints the rado-style, ceramic slim body of Samsung Galaxy S3 that could be expected and potentially will be debut during that time. And this new image leaks even shows the front-facing camera that is located on the top right corner, similar to the Weber Shandwick’s S3 image poster.

Moreover, coming on to the latest rife image, even the display of the phone is quite big, comfortably housing five rows of icons on the menu screen just as the display on the Galaxy Note does.

The device’s display takes up a large portion of the phone’s face, reaching nearly to the left and right edges of the handset. However, what the analysts are not able to accept is the proximity of Samsung’s branding to the top of the display and the alignment of the thin blue line above the blurred icons.

However, the picture may impel some to think that there is some mystery with the back of the handset. If looked carefully, the image seems to give a feeling that either the back is curved or has some lifted body design from the middle of the handset backside as the upper and the bottom edges of the device are subtly popping out in the image and are appearing a little above from the surface, especially creating a dense shadow at the bottom edge of the phone.

Whatever, its mystery is still to be broken by Samsung itself. As unfortunately, tech enthusiasts still do not have any other confirmed info on the S3 specs sheet or release date from the company’s end. However, the latest image leak has added a lot of spice to the rumor mill.

Let us know about your thoughts and observation about the latest image leak of Samsung Galaxy S3. In the meantime, here is a latest updated round-up of all the specs and features which the next best super smartphone plans to come with.

User Interface

Anyone can guess it that the Galaxy S3 will run Android OS 4.0 Ice Cream Sandwich with TouchWiz UI 5.0. However, rumors have it that the device will have an option of dual booting. That could be because the home-made TouchWiz launcher has always been center of criticism. Hence, Samsung could give dual booting option of TouchWiz UI or ICS Vanilla UI.

Quad-core Exynos processor

It is already in rumors that iPhone 5 is expected to come with A6 processor and Samsung has no plans to sit behind. The new handset is expected to come backed by quad-core 1.8 GHz Exynos processor with around 2GB RAM to outgun the Apple’s next best. However, BGR exclusively reported this past February that the Galaxy S III will feature a 1.5GHz quad-core Exynos processor.

Upgraded Screen

Earlier BGR reported that Galaxy S3 will sport 4.8-inch Super AMOLED Plus touchscreen with a resolution of 1280 X 720 pixels. Recent rumors have mentioned that Samsung Galaxy S3 would come with a 4.6-inch Super AMOLED HD panel and Non-PenTile Display. Furthermore, according to Softpedia, OLED Association released an article on Samsung Mobile Display and suggested that Samsung Galaxy S3 would be released in May around the same time frame as Apple’s iPhone 5 and would feature 4.6-inch Super AMOLED HD Plus with the 319 ppi.

According to industry reports, the resolution and a higher pixel density of the S3 will also leave behind the great Retina display of the iPhone 4S (326 pixels per inch). Further, the smartphone has been confirmed not to feature any 3D technology. However, rumor has it that the S3 would sport a strong Gorilla Glass feature.

12 MP Camera

The camera upgrade is rumored to be a big one with 12 megapixels with a 1080p video at 60 frames per second and video chatting with a front-facing 2 megapixel camera.

4G LTE and NFC

Rumors are intense that the successor of S2, Samsung Galaxy S3, will be backed by the 4G LTE capability and also the latest, Near Field Communication (NFC) feature.

Battery Upgrade

Rumor also has it that the S3 will be loaded with a 2250 mAh battery. Also, it would measure 131 x 64 x 8 mm and weigh around 125 grams.

Wireless Charging

Galaxy S3 is expected to feature the revolutionary wireless charging technology. Charging the device wirelessly will be possible at a distance of 1-2 meters from the charger.

Additional Features

S3 is expected to come with a waterproof body feature and would measure around 131 x 64 x 8 mm, with a weight of around 125grams. Further, it would feature a 16 GB of internal memory and with an expandable memory option up to 32 GB.

Apple’s Patch for Trojan that Affects 600,000 Mac

Apple released an update to Java bringing the version on Mac to 1.6.0_31 for Mac’s running OS X. This patch actually closes multiple vulnerabilities that were found in the previous Java version being 1.6.0_29. The most serious exploit that it patched was the allowance of malicious code to be executed by visiting a compromised website.

Users who visited a compromised website would unknowingly participate in the Flashback botnet. A Russian security firm Dr.Web claims that approximate 600,000 Mac’s have already been infected. The statistics include 19.8% in Canada, 56.6% in the US, 12% in the UK, and 6.1% in Australia with those statistics being the largest.

Apple Mac’s are not usually vulnerable to viruses in the same way that Windows machines are. There is a myth that Mac’s are immune to viruses but they simply are not. There are just a lot more viruses for Windows because there are a lot more Windows machines out there so there are simply more viruses for them. You should always protect your computer with antivirus protection don’t let over confidence get your computer infected.

Update: Find out if you are infected by following the steps below:

Manual Removal Instructions

1. Run the following command in Terminal:

defaults read /Applications/Safari.app/Contents/Info LSEnvironment

2. Take note of the value, DYLD_INSERT_LIBRARIES
3. Proceed to step 8 if you got the following error message:

“The domain/default pair of (/Applications/Safari.app/Contents/Info, LSEnvironment) does not exist”

4. Otherwise, run the following command in Terminal:

grep -a -o ‘__ldpath__[ -~]*’ %path_obtained_in_step2%

5. Take note of the value after “__ldpath__”
6. Run the following commands in Terminal (first make sure there is only one entry, from step 2):

sudo defaults delete /Applications/Safari.app/Contents/Info LSEnvironment

sudo chmod 644 /Applications/Safari.app/Contents/Info.plist

7. Delete the files obtained in steps 2 and 5
8. Run the following command in Terminal:

defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES

9. Take note of the result. Your system is already clean of this variant if you got an error message similar to the following:

“The domain/default pair of (/Users/joe/.MacOSX/environment, DYLD_INSERT_LIBRARIES) does not exist”

10. Otherwise, run the following command in Terminal:

grep -a -o ‘__ldpath__[ -~]*’ %path_obtained_in_step9%

11. Take note of the value after “__ldpath__”
12. Run the following commands in Terminal:

defaults delete ~/.MacOSX/environment DYLD_INSERT_LIBRARIES

launchctl unsetenv DYLD_INSERT_LIBRARIES

13. Finally, delete the files obtained in steps 9 and 11.

12 Steps to stay safe from Online Security Threats

With the explosion of Web-based communications in the form of applications, blogs, podcasts, and social networking sites like Facebook and Twitter, new security threats that can cause serious damage to computers are emerging. As they access these Web-based services from both work and personal computers, many users are unaware that they may be exposing themselves and their organizations to risk.

In this increasingly social and interactive world, organizations must take the necessary steps to strengthen their defenses and protect their online property. While the Internet continues to offer exciting new ways to collaborate more interactively, it is also introducing highly targeted threats to the mix.

Recent data breaches — such as the Zappos incident early this year, which involved the theft of personalized customer information — are reminders that both individual users and organizations must have security measures in place to actively protect themselves from the latest cyberthreats.

Following are 12 simple steps to ensure that your personal information is protected online.

1. Surf and Download Safely

Yes, we’ve heard this advice before, but online behavior is critical to ensuring the protection of your computer. When browsing the Web, be sure to visit only websites that you trust.

Free, file-sharing programs are often bundled with sneaky spyware, and it’s important to read all End User License Agreements and privacy statements carefully before installing new software.

2. Beware of Email Attachments and Links

You’re likely familiar with the warning, “Don’t Click That Link!” and there’s a reason it’s still appearing. Email attachments and links present in both email and instant messages can contain malware.

Use caution even when a message appears to come from a safe sender, as identity information in messages can easily be spoofed.

3. Close Pop-ups, Don’t Hit Agree

Pop-up windows are a common form of online advertising and often appear so quickly that users are caught offguard. However, some pop-ups, when clicked, trigger spyware that can cause serious damage to computers.

That’s why it’s important to never click “agree” or “OK” to close a pop-up window, and only click on the red “X” in the corner or Alt + F4 to close it safely.

4. Select Strong Passwords

News of password-related security breaches has dominated the headlines over the past 12 months, as in the recent T-Mobile incident, when names and passwords of staff members were published. The company’s administrators had delegated the same password to each employee.

It sounds simple, but the more complicated a password is, the more difficult it is to crack. A good rule of thumb is to avoid using birthdays, family or pet names, the word “password,” or other obvious choices, and to select passwords that include both numbers and letters.

5. Update Software

Check regularly to make sure you have all the latest critical software updates and security patches.

Online attacks are only becoming more sophisticated, so be sure to do your part in investing in proper, updated security software for your computer.

6. Take a Defense-In-Depth Approach to Security

In addition to having antivirus and antispyware protection on your computer, it’s important to also use a two-way firewall.

If you use Windows, be sure auto-update is turned on.

7. Store Sensitive Data Securely

You keep sensitive paper documents under lock and key, right?

Be sure to secure your sensitive online information through file encryption software.

8. Use an Updated Web Browser

Adjust your browser security settings to medium or higher to ensure that you’re taking advantage of its current safety features.

Also, consider using an alternate browser, which may lower your risk of malware attacks.

9. Keep Your Private Info Private

Be cautious about giving out your personally identifiable information to anyone.

Find out why the information is needed, and then determine if it’s absolutely necessary to give out.

10. Shred Personal Digital Documents

Before discarding personal or financial information, be sure to shred it first.

This prevents hackers from bypassing information that has not been permanently deleted from your computer.

11. Access Financial Information From a Secure Location

Never log into your bank or other financial accounts from public computers.

Don’t access them on any wireless networks where login information can easily be stolen.

12. Stay Educated

In order to effectively protect your online data, you need to know what you’re protecting it from. Awareness and caution are effective methods to counter fraud, and share security tips you learn with friends and family.

The key to securing a network is to stay ahead of the new security threats before they appear. To do this, enterprises and users must evaluate their security infrastructure and properly plan for the future, proactively thinking of how hackers will attack next, as threats will only become more sophisticated.

Hackers Can Make $250,000 Selling iOS Exploits To The Government

iOS hackers are some of the most sought after individuals in the security research community. Geniuses like Comex who come up with jailbreaks used by millions of iPhone and iPad users are offered incredible sums of money to sell their exploits to powerful and high profile clients.

Sure, you could win a decent amount of cash at a security conference for showing off the exploits you’ve uncovered, but why not make $250,000 and secretly sell your stuff to say, an entity like the U.S. government?

That’s exactly what a security researcher/middle man by the pseudonym of “Grugq” did for an unnamed iOS hacker. Located in Bangkok, Grugq made 15% commission off negotiating a $250,000 deal with a contact in the U.S. government. Grugq facilitated the transaction of the exploit information from the hacker in exchange for the 6-figure payout from the client.

Andy Greenberg from Forbes has put together a rundown of how much the average exploit sells for these days. The different price ranges are arranged by platform:

Hackers Can Make $250,000 Selling iOS Exploits To The Government

Windows exploits have always sold for more because of Microsoft’s larger market share presence in the PC space. Since Macs still only represent a fraction of desktop PCs sold every year, it’s much more cost-effective to create malware for the OS that the most people are using. You don’t see many viruses in the wild for OS X because there hasn’t been enough reason to target the platform.

What’s more surprising about Greenberg’s calculations is how little Android exploits are sold for in comparison with iOS. In fact, the average iOS exploit is worth far more than even a Windows exploit. It makes sense that browser are high up on the list, as they run on multiple platforms (for the most part) and serve as gateways to the internet. iOS, on the other hand, is the crème de la crème of platforms if you’re looking to sell an exploit.

Apple keeps iOS locked down tight. That’s why new jailbreaks always get so much coverage — they are feats of masterful hackery. Comex, the maker of the once-popular JailbreakMe tool for iOS 4.0, was reportedly offered 6 figures by multiple agencies to sell his iOS exploit. He ended up interning at Apple to help the company fortify the very platform he reverse engineered.

The people that make jailbreaks and find these kinds of exploits typically do security research work and consulting on the side. It’s a very lucrative, professional market that brings in millions and millions of dollars. Think about that next time you’re jailbreaking your iPhone.