120 private links
http://www.symantec.com/connect/blogs/technical-support-phone-scams
In recent weeks we started hearing chatter about what sounded like a new misleading application. The usual scare tactics were employed. However, instead of using applications to convince users that their computer was in trouble, this particular group was phoning users directly to tell them that they had a virus on their computer—but thankfully help was at hand. The company in question, Online PC Doctors, offers to remotely connect to your computer to clean up the infection. All for a fee of course.
Threatpost, The Kaspersky Lab security news service, is an independent news site which is a leading source of information about IT and business security for hundreds of thousands of professionals worldwide.
Threatpost’s award-winning editorial team produces unique and high-impact content including security news, videos, feature reports and more. They break important original stories, offer expert commentary on high-priority news aggregated from other sources, and engage with readers to discuss how and why these events matter.
Threatpost has been referenced as an authoritative source on information security by leading news outlets including The New York Times, The Wall Street Journal, MSNBC, USA Today and National Public Radio.
Threatpost’s global editorial activities are driven by industry-leading security journalist Dennis Fisher, editor-in-chief. He is assisted by Christopher Brook and Brian Donohue.
Make Threatpost your first stop for security news and analysis to stay informed and keep your organization safe.
Nearly 100,000 Facebook users have been duped into installing third-party Chrome plugins over the past few weeks that have access to all of their data on every Web site they visit. According to research recently conducted by security firm Barracuda Networks, the unsuspecting users were tricked into thinking the plugins could block Timeline, a new profile feature Facebook first introduced at the end of 2011.
German mobile analytics firm Adeven says that nearly two-thirds of software in iOS App Store are ‘zombies’ — thanks to a new tool that has counted 400,000 apps which get no downloads, are invisible to users and have no ranking.
Zombies may provide a perennial source of material for mobile games, but no developer actually wants their app to be the walking dead. Nonetheless, according to new mobile analytics and ad verification firm Adeven, that’s what almost two-thirds of the iOS App Store constitutes.
Apptrace gives you complete access to discover the app economy. You can pick the relevant categories that you are interested in and get the top ranked in that list of interest. You can see what is the most popular in that week.
We have the prescription for all your app analysis headaches! Fast and pain free relief: apptrace is the fastest app analysis service! Built by developers for developers. apptrace is maintained by an exceptional team of developers with extensive mobile experience. Giving you exceptional data, to further your business intelligence in the apposphere. It is the most efficient and intelligent way to trace apps on this changing global market.
There were a few stand-outs at this year's 2010 CES, like Intel's WiDi Wireless Display demo and of course NVIDIA's impressive Tegra 2 demo. However, if we were to call in a close 3rd runner-up to those two, it would have to be the absolutely HOT looking new Dell Alienware M11x gaming notebook. Dell was pre-announcing this machine that is soon to be released and for us at least, it was a proverbial show-stopper. The M11x is built on an 11.6-inch LCD form-factor and from what we could tell, it's svelte, well-built, super stylish and rugged. You can think of it as a mini version of the M15x or M17x series but we think it's just darling either way you look at it. Feast your tired geek eyes here..
(CBS News) The Colombian guerrilla group FARC had never released such a bizarre video. At least one person close to the group said they are still in awe. The oldest guerrilla group in the continent -- increasingly isolated after a U.S.-backed, 12-year military offensive -- often communicates with the outside world through statements or videotaped messages. But on Tuesday, four rebel fighters appeared laying out the movement's latest intentions in a homemade rap video.
In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook.
In many ways, this was all my fault. My accounts were daisy-chained together. Getting into Amazon let my hackers get into my Apple ID account, which helped them get into Gmail, which gave them access to Twitter. Had I used two-factor authentication for my Google account, it’s possible that none of this would have happened, because their ultimate goal was always to take over my Twitter account and wreak havoc. Lulz.
Had I been regularly backing up the data on my MacBook, I wouldn’t have had to worry about losing more than a year’s worth of photos, covering the entire lifespan of my daughter, or documents and e-mails that I had stored in no other location.
Block camera could be prevented by simply setting a “geofence” around a particular location, whether it’s a movie theater, celebrity hangout spot, protest site, or the top secret rooms...
In June of last year, we reported on an unsettling patent filed by Apple that would allow certain infrared signals to remotely disable the camera on iPhones. It showed the potential downsides of bringing cameras into the world of wireless connectivity, which appears to be the next big thing in the camera industry. Now, a newly published patent is rekindling the fears of those who don’t want “Big Brother” controlling their devices.
When you want to cool a can of soda (or beer) quickly, what do you do? Stick it in the freezer! Wait a little bit and then boom, bang, icy deliciousness. We all do this. We don't expect the can to explode in our face and cut us up until we need 38 stitches like this poor boy in China.
According to RocketNews24, a boy in China took a frozen soda can straight out of the freezer and when he pulled back the tab, the can exploded and sent aluminum shrapnel straight at his face. It was a serious injury that required 31 stitches to his face and 7 inside his mouth. Yikes! How did this happen?
A number of tools provided by ViewDNS.info require significant amounts of backend data. A large proportion of this data has been built in house by ViewDNS.info. In order to help keep the services provided by ViewDNS.info free, we have decided to make some of this data available for download for a small fee. Funds generated from the sale of this data will contribute to the ongoing costs of providing this service, as well as the development of exciting new tools.
Hi, I’m Barack Obama, President of the United States. Ask me anything. I’ll be taking your questions for half an hour starting at about 4:30 ET.
Proof it's me: https://twitter.com/BarackObama/status/240903767350968320
We're running early and will get started soon.
UPDATE: Hey everybody - this is barack. Just finished a great rally in Charlottesville, and am looking forward to your questions. At the top, I do want to say that our thoughts and prayers are with folks who are dealing with Hurricane Isaac in the Gulf, and to let them know that we are going to be coordinating with state and local officials to make sure that we give families everything they need to recover.
Verification photo: http://i.imgur.com/oz0a7.jpg
LAST UPDATE: I need to get going so I'm back in DC in time for dinner. But I want to thank everybody at reddit for participating - this is an example of how technology and the internet can empower the sorts of conversations that strengthen our democracy over the long run. AND REMEMBER TO VOTE IN NOVEMBER - if you need to know how to register, go to http://gottaregister.com. By the way, if you want to know what I think about this whole reddit experience - NOT BAD!
Connaissez-vous le principe des "Livres dont Vous êtes le Héros" ? Ces romans à choix multiples permettent au joueur d'incarner le héros (ou l'héroïne) d'une histoire, lui laissant le soin de choisir les voies à suivre et les risques à courir.
Fortement populaire dans les années 80, la littérature interactive conserve aujourd'hui encore de nombreux fidèles. Par ailleurs, le genre se découvre toujours de nouveaux fans, et continue à vivre via leur production prolifique.
(Reuters) - A Chinese couple sued Yahoo and its Chinese affiliates on Wednesday, alleging the Internet firms provided information that helped the Chinese government prosecute the man for his Internet writings.
http://www.theregister.co.uk/2012/08/30/wang_dissident_yahoo_free_from_prison/
price drop protection
The Drake equation is a mathematical equation used to estimate the number of detectable extraterrestrial civilizations in the Milky Way galaxy. It is used in the field of the Search for ExtraTerrestrial Intelligence (SETI). The equation was devised in 1961 by Frank Drake, Emeritus Professor of Astronomy and Astrophysics at the University of California, Santa Cruz.
Hosts File Software Overview
The hosts file in Windows can be used to override DNS look-ups. I have described one practical use for webmasters who want to work on sites before DNS propagation. The hosts file is used by many for ad blocking, blocking of hosts that may be malicious or dangerous or speeding up connections to select sites by eliminating the need for DNS look-ups. I do not want to get into details on how to edit the hosts file, as I have done that already in another article: How To Edit, Reset The Windows Hosts File.
To be a hacker !!
exploit-exercises.com provides a variety of virtual machines, documentation and challenges that can be used to learn about a variety of computer security issues such as privilege escalation, vulnerability analysis, exploit development, debugging, reverse engineering.
Ultimate hacker - brain hacker
Even Nolan didn’t think it could be possible when he made Inception, but it turns out that researchers at Usenix Security conference have been speaking of using a computer interface to hack the brain! Yes, it might actually be possible to enter the brain and retrieve information that you’d prefer to keep secret. Like retrieving a combination key to a safe that your dying father might have given you and you have it stored somewhere in the subconscious.
Read more at
http://techie-buzz.com/science/brain-hack.html#iQmdZspXqQMuytCI.99