Welcome to Blog.BeritaNET.Com

Tampilkan postingan dengan label Security. Tampilkan semua postingan
Tampilkan postingan dengan label Security. Tampilkan semua postingan

Mo Hijack Facebook Account?

Diposting oleh Admin Minggu, 10 Mei 2009 0 komentar


A smart home security person from India has been doing. Azim Poonawa alias QuakerDoomer, is the author of FBController. FBController tool is designed to facilitate the user to take control Facebook account, and for that, the user who will use this tool can steal session cookies. FBController this tool can also manage a large number of accounts that have dibajak. This software can analyze FBController Facebook communication in the computer, when the user interacts with the social networking site, and use information, together with the cookie data. According to Poonawala, so, the tool can help to steal user account data Facebook.

While the cookies, can be used by software FBController this to spy network, exploit XSS (cross-site scripting), do social engineering, and via a proxy that opens when incoming cookies. Meanwhile, according to Jeremiah Grossman, chief technology WhiteHat Security, said that the purpose of creation is more FBController tool to control the account for a large number of, not to hijack accouny in Facebook at a time.

"FBController this tool easier to use than using a browser to log in and modify the account one by one. However, the existence of this tool also makes me realize that a large number of Facebook accounts will have the possibility of hackers to penetrate and expand access in their account. "Grossman said.
Meanwhile, according to Barry Schnitt, spokesperson for Facebook said that Facebook is not afraid of the tool. "We have a system pendeteksi account phishing or bogus in many point, such as the login point interruption point, point of spam, and so forth. Multi account is in one action, at the same time as this tool, will make detection easier. "Schmitt added.

Newest Malware More Dangerous than Conficker

Diposting oleh Admin Kamis, 07 Mei 2009 0 komentar


Worm Conficker the blast had 'alarm' security in many countries, may now have fade in popularity along with the growing botnet, viruses, and worms that menginfeksi cyberspace. According to that reported by security vendor McAfee, Tuesday (05 / 5), has cybercriminal hijack the computer for at least 12 million since January with the new malware variants. Distribution of new malware has increased by 50 percent in 2008.

In countries such as U.S., McAfee reports, countries have the infected computer Percentage largest, ie, reaching 18 percent. While still in the same report, China's position under the Percentage of U.S. with 13.4 percent for the most infected PC in the world. "Expansion of large-scale botnet has been providing the infrastructure for cybercriminal to mebanjiri web malware with it." Said Jeff Green, senior vice president of McAfee Labs.

McAfee report is not intended to minimize the danger of worms Conficker, but there are other malware that more dangerous, such as the Vundo Trojan horse, which has been active since three months ago. Botnet technology via Web 2.0 social networking that is now also popularity. While spam is also increasing 70 percent since dimatikannya-spam service provider hosting, McColo in the third quarter 2008.

Parental Internet Software, Safe Eyes 5.0

Diposting oleh Admin Rabu, 06 Mei 2009 0 komentar


Software Safe Eyes 5.0 is a program that fundamental parental control than other programs. Software Safe Eyes 5.0 provides three licenses for computer, either PC or Mac and can block the 35 categories of suspicious websites. Internet software controller has a fun interface, and this program can control the Internet access and restrict Internet usage time up to 2 hours or more.

When testing is done and entering porn keyword "Playboy" on Google, Safe Eyes 5.0 program and prevent this out of search results with the keyword above. In addition, when searching for the word "breast", which is in the search results on Google is only informative link about the 'breast cancer', and not a naked picture of female breasts.

Solutions parental control software or controller that can be used by parents to their children they also may be personal information, such as address or phone number, which is posted to social networking sites. Monitor instant messaging programs Safe Eyes 5.0 can also record the full text of IM conversations in all the popular IM client, including AIM, MSN / Windows Live and Yahoo Messenger.

In this software have also log online activities, which can provide a warning via email to our users, particularly parents on suspicious activity when surfing the Internet, or through text messages, or mobile phone when the other user will access a forbidden site. Safe Eyes 5.0 software can work in multiple browsers, including Firefox, Internet Explorer, and Safari. Price for the software Safe Eyes 5.0 is around $ 49.95, and can work on the platform Microsoft Windows 2000/XP/Vista, Mac OS X Leopard (10.5) or Tiger.

Excess software Safe Eyes 5.0:

* There is a social control network
* Interface is easy to use

Disadvantages: only support to IM

Kaspersky for Windows 7

Diposting oleh Admin Jumat, 01 Mei 2009 0 komentar


Although the new version of Windows 7 still in Beta version, Kaspersky Lab has announced antivirus to the latest operating system form Microsoft, Windows 7. Prototype was made based on the antivirus engine, which provides a strong protection from various types of threats on the Internet.

Prototype is designed to protect computers with operating system Windows 7. For information, the beta version of the operating system Microsoft Windows 7 is released in early January 2009. At nearly the same time, Kaspersky has launched a prototype to provide a strong protection and efficient to protect the new operating system.

"We are aware that launching a new version of Windows is a major event in the IT community. Therefore, we are ready," said Alexey Kalgin, Director of Product Marketing, Corporate Business Division, Kaspersky Lab.

Kaspersky technical preview of this time is a complete solution, not only introducing the antivirus component, but also analysis heuristik, firewall, and anti-spam. Heuristik analysis can detect and block malicious programs that have not been identified. The program is based on the recognized gestures are suspicious of a program.

Destination launch this prototype is to provide effective protection for a variety of threats on the Internet, virus, worm, Trojan, spyware, hacker attacks and spam.

As the core of this prototype technology is a new antivirus engine that can detect malicious programs more effectively rather than preceding. This new engine is significantly increasing the speed of scanning for the processing of the developed and the use of system resources is optimal, especially in processors with dual core processors or quad-core.

Unique architecture that ensures productivity with the use of system resources lowest possible. This prototype version is compatible with 32-bit and 64-bit. Both common and advanced users will find this prototype is easy to use, easy to install and configure.

Internet Backbone Hacking

Diposting oleh Admin Kamis, 23 April 2009 0 komentar

Backbone network technology is usually used to track the traffic in a large corporate network, and because of the large-scale network, the attack can be hidden easier. Therefore, the creation or some free software tools, on Thursday (23 / 4), to prove the theory. The tool is demonstrated in the Black Hat security conference in Amsterdam, and shows that the attack only to be in theory, can be proved with concrete.

Some of the hacking tool has been able to attack the data in the network or MPLS (Multiprotocol Label Switching). Software is created by enno Rey, and was developed by Daniel Mende. "We believe that the technology developed in some of the network has expired. This makes the user must be wary that the technology used in their daily life is not safe as they think. "Rey said.

Meanwhile, carriers such as Verizon, AT & T and Sprint to use MPLS to separate customer traffic based on one regional area. Rey added that the hacking tool successfully demonstrated access to the network carrier to see customer traffic or change data in it. The software can work because MPLS has a mechanism to protect the integrity of the header information as the place where to save the data packet sent.

Meanwhile, the tool also attack the network technology or the separate BGP, or Border Gateway Protocol. While the other, can break MD5 cryptography or enter the route in the BGP table without permission, so it makes it easier to hijack Internet traffic. The tool can also exploit other weaknesses in the same Ethernet protocol.

AVG Antivirus 8

Diposting oleh Admin Senin, 13 April 2009 0 komentar


AVG Antivirus 8, software is equipped with Linkscanner technology, which actively block content 'evil' from the website which can disrupt the performance of computer. In addition, this software can also prevent the spread of rootkit, virus, spyware that is in one product. AVG Antivirus 8 can be installed on Windows XP SP2, and without having to perform re-booting (rebooting).

To interface AVG Antivirus 8 This appears less good, although there is improvised from sebelunya design, but the panel on the right side window too full with the large icon, the icon of 9. Meanwhile, on the left has three options, Overview, Computer Scanner, and Update Now. In addition, there is also the toolbar at the top of the window interface of this software has some features of the options.

To do uninstall, there is the option under All Programs. After the reboot again, there will be an empty directory on the computer that stores registry of trial versions of this program. If you want to upgrade version 8 is the user need to Uninstall AVG already installed the previous before installing this version 8.0. To that end, providing full functions of AVG Antivirus 8.0 software this time trial in 30 days.

Advantages Antivirus software AVG 8:
AVG Antivirus 8 has anti-rootkit protection, antivirus, and antispyware

Disadvantages:
Antivirus software AVG 8 is still in the middle range, or run more slowly during the scanning process and the performance time while booting.