Windows TV

Microsoft on Friday quietly urged its users to uninstall the most recent round of security updates, after reports emerged that it crippled their computers with the infamous “Blue Screens of Death” (BSoD), which is really a matter of shame for one of the largest technology giants.
Microsoft released security updates on its August Patch Tuesday that addressed privilege escalation vulnerabilities but an apparent font cache clearing issue caused Windows boxes to turn the colour of the screen to Blue.
The tech giant forced to make this decision after hundreds of complaints, regarding the infamous Blue Screen of Death error, were sent to the company. This was not the only update to be made last week.

The offending Microsoft patch identified as MS 14-045, one of the nine updates which fixes three security issues including one in the Windows kernel – the heart of the operating system – can cause system crashes forcing users to reboot it.

Soon after the initial release of the patch, the issue surfaced on Microsoft’s support forum with a post from a member named Xformer complaining of “Stop 0x50 errors,” aka blue screen after applying any of four updates (KB2982791 KB2970228 KB2975719 or KB2975331).
If you update your Windows with the update, a message flashed on the screen that reads: “Your PC ran into a problem and needs to restart. We’re just collecting some error info and then we’ll restart for you (0% complete).
Installation went smoothly. After rebooting everything worked fine. But when I shut down my notebook and switched it on a little later it came up with a blue screen with a Stop 0x50 in Win32k.sys. I could not even boot into safe mode as Windows failed to start no matter which mode chose“, Xformer explained on Microsoft’s support discussion forum.
The vast majority of complaints came from the users running Windows 7 PCs with the 64bit version, and as a response, Microsoft published a FAQ for the update which includes an official and detailed explanation stated:

Microsoft revised this bulletin to address known issues associated with installation of security update 2982791. Microsoft is investigating behavior associated with the installation of this update, and will update this bulletin when more information becomes available. Microsoft recommends that customers uninstall this update.

An additional precaution from the company’s side is that it has removed the download links to the 2982791 security update. How to uninstall this update, see Microsoft Knowledge Base Article 2982791.
Microsoft asserts that investigations are ongoing, following the instructions to uninstall the updates. According to the company, the issue could also be the result of three prior updates, from which #3 is the most severe:
KNOWN ISSUE 3
Microsoft is investigating behavior in which systems may crash with a 0x50 Stop error message (bugcheck) after any of the following updates are installed:
  • 2982791 MS14-045: Description of the security update for kernel-mode drivers: August 12, 2014
  • 2970228 Update to support the new currency symbol for the Russian ruble in Windows
  • 2975719 August 2014 update rollup for Windows RT 8.1, Windows 8.1, and Windows Server 2012 R2
  • 2975331 August 2014 update rollup for Windows RT, Windows 8, and Windows Server 2012
This condition may be persistent and may prevent the system from starting correctly.
The uninstall instructions are long and involved in the Knowledge Base articles as mentioned above, but users are recommended to uninstall the buggy update as soon as possible.

 

facebookTVAmerican singer and actress Taylor Swift has lost her scam mojo, as her fake sex tape spreading on Facebook was excluded from the top ten most successful scams, according to Bitdefender. An analysis revealed the celebrity is no longer as popular as last year, when bogus videos of her managed to spread malware on the social network.

Millions of users fall for Facebook scams every year and while Taylor Swift no longer features in the top 10, Rihanna continues to be the most tempting celebrity used as a hook for malware delivery via social media.

A free trip to Disneyland was also excluded from the list, while “guess who viewed your profile” scams keep a steady first place in the panel, comprising almost one third of the total. “Change your Facebook color” schemes now circulate internationally and claim 7.38 per cent of the total number of scams.

“Why do people still want to see who has been taking a peek at their profile, despite all security warnings? I think they believe these are legitimate apps,” states Catalin Cosoi, Chief Security Strategist at Bitdefender. “This is social engineering at its finest – a challenging mental game that pushes the right psychological buttons. The baits have changed over time, with stalkers, peekers, admirers, overly attached girlfriends and exes haunting you, but the reason this scam works is simple: human nature.”

The past couple of years have seen a proliferation of Facebook scams to parallel the social networking platform’s growth. Here are the ten most widespread in a list that also shows their proportions and targeted countries.want-to-see-who-views-your-facbeook-profile-420x500

The top 10 Facebook scams are:

1. Total profile views/visitors (Check out now who viewed your profile) – 30.20% (UK/US, Australia).
2. Change your Facebook Color/Colour – 7.38% (UK/US, Australia).
3. Rihanna sex tape with her boyfriend – 4.76% (UK/US, Australia).
4. Check my status update to get free Facebook T-shirt from Facebook – 4.21% (UK/US, Australia).
5. Say goodbye to Blue Facebook (Dites Aurevoir au Facebok BLEU) – 2.76% (France).
6. Unsealed. We are giving them away for free – 2.41% (UK/US, Australia).
7. Check if a friend has deleted you – 2.27% (UK/US, Australia).
8. See your top 10 profile peekers here! – 1.74% (UK/US, Australia).
9. Find out how to see who viewed your profile – 1.55% (Spanish-speaking countries).
10. Just changed my Facebook theme. It’s amazing – 1.50% (UK/US, Australia).

Bitdefender research also shows an increasing amount of viral video scams abusing Facebook’s like and share options. In the last year, fraudulent websites that use likejacking and YouTube have spread not only in English, but also in German, Chinese, and Italian.

 

 

tv crime2
Government CIO says National Research Council was hit by intrusion from ‘sophisticated’ state-sponsored actor

The Canadian government has said it will take it a year to build a more secure IT infrastructure after the National Research Council (NRC) was hit by a recent cyber attack it’s blaming on Beijing.

In a brief statement, the NRC said that intelligence agency the Communications Security Establishment had recently “detected and confirmed” an intrusion into its infrastructure.

“Following assessments by NRC and its security partners, action has been taken to contain and address this security breach, including protecting its information holdings and notifying the Privacy Commissioner. NRC has also taken steps to inform its clients and stakeholders about this situation,” it added.

“NRC is continuing to work closely with its IT experts and security partners to create a new secure IT infrastructure. This could take approximately one year however; every step is being taken to minimize disruption.”

A separate statement by the Government of Canada CIO went further, claiming the attack was perpetrated by a “highly sophisticated Chinese state-sponsored actor”.

“While the National Research Council’s networks do not currently operate within the broader Government of Canada network, since the detection and confirmation of the cyber intrusion, the National Research Council’s networks have been isolated from the broader Government of Canada network as a precautionary measure,” it added.

“We have no evidence that data compromises have occurred on the broader Government of Canada network.

China appears to have assumed its typical stance in response to such allegations – outright denial.

Yang Yundong, a Chinese embassy spokesman in Ottowa, emailed Bloomberg to angrily refute what he described as “groundless allegations”.

The question now remains whether, after potentially a whole year, the NRC’s newly fortified security systems will be up to the task of defending against the next generation of advanced attacks no doubt currently being developed by nation states.

Amichai Shulman, CTO of security firm Imperva, argued that any “meaningful change” to IT infrastructure takes time.

“It is quite obvious today that adopting a technology across a large organization takes more time than it takes for the next technology to emerge,” he told Infosecur

“This is the reality and we should embrace it. Organizations find different ways to handle this risk in the general IT domain and particularly in the IT security domain.”

Planning infrastructure changes with “visionary consultants” and installing products from vendors who have capabilities “on top of market requirements” are just two ways to future-proof systems, he added.

“Moreover, by working with vendors who provide holistic solutions rather than niche products and system integrators who provide the integration between products of different domains the organization is better fitted for the unforeseen challenges of the day after deployment ends,” claimed Shulman.

Richard Cassidy, senior solutions architect at Alert Logic, argued that auditing and continual review of “security systems, practices and data” can help organizations stay one step ahead of more advanced threats.
“It is positive that the need to review existing infrastructure and practices has been identified, but more importantly for NRC is in the understanding on why the incident occurred and how they can assure they put in place processes around existing available technologies to continually monitor, review and respond to anomalies, suspicious activity or unauthorized access attempts to critical assets once the new infrastructure is implemented,” he added

Reported by Infosecurity

tv pirate

The scallywags at The Pirate Bay have created a new port for all digital pirates to drop anchor. The popular torrent directory recently released a mobile version of its website after years of cramming the PC version onto mobile screens.

The new look is unmistakably The Pirate Bay with its trademark ship logo, options to search, browse, view recent torrents and the top 100.

Along with the refreshed look, the Pirate Bay’s new mobile site has its own URL. Instead of auto-detecting your screen size and delivering the mobile version under the same web address, the mobile Pirate Bay is located at themobilebay.org.piratebaymobile-100361850-medium

In a discussion with Torrent Freak, the team behind The Pirate Bay says they decided to use a new site address to better resist takedown attempts.

Mobile users who visit The Pirate Bay’s main site are supposed to be redirected to the new site. But in my brief tests on a Nexus 4 and 7 that wasn’t the case. Trying to visit The Mobile Bay from a PC, however, did trigger a redirect to the PC-friendly version of the site.

With only a few torrent apps available for Android and none for iOS, most people are still downloading (non-infringing) torrents from their PCs. Nevertheless, the mobile web site is still handy for browsing and may actually become an important tool in the coming months.

Torrent Freak reports that The Pirate Bay team is also at work on a project called the RSSBay. This site would support personalized RSS feeds that would allow you to add a torrent to your feed on the go. Adding new content to your feed could then be used to start an automatic torrent download on your PC at home.

Considering it took The Pirate Bay team quite a while to get their act together to create a mobile site, your can probably count on seeing the RSSBay later rather than sooner.

tv - programer

A Google engineer and a member of the Google Chrome security team has shared on Twitter a new look that is being tested for the phishing and malware warnings seen by Chrome users:

new-malw-14072014

new-phish-14072014

The new alerts have been incorporated in the Canary and Developer channels, and if all goes well they will end up in Beta and, ultimately, in the Stable version.

The fire engine red background, and the simplified and more direct warning text is likely to make users take the warnings more seriously than the current ones:

old-phish-14072014

The warning pages are shown when users try to visit malicious sites, a constantly updated blacklist of which is maintained by the Google Safe Browsing service.

tv - programer

 

1. netflixroulette.net — Find something random to watch on Netflix.
2. pintsinthesun.co.uk — Find somewhere to drink a pint in the sun.
3. gfycat.com — Upload your gifs.
4. youconvertit.com — Convert documents.
5. ninite.com — Download all the free software you want at the same time.
6. squirt.io — Speed read the web one word at a time.
7. shouldiremoveit.com — Find out which applications you should remove from your computer.
8. avoidhumans.com — Find places to go in public that are not crowded.
9. keybr.com — Practice your touch typing.
10. oldversion.com — Get old versions of software.
11. readability-score.com — Find out how readable text is.
12. deadmansswitch.net — Have emails sent when you die.
13. mint.com — Budget your money.
14. roadtrippers.com — Plan your route with the best lodging and attractions.
15. duckduckgo.com — A search engine that is not following you.
16. padmapper.com — Maps out possible apartments/homes that fit your criteria.
17. zillow.com — Another great source for finding your next home.
18. printfriendly.com — Make any webpage print friendly.
19. printwhatyoulike.com — Print precisely what you want from any webpage.
20. privnote.com — Write a note to someone that will self-destruct after they read it.
21. freecycle.org — A network of people giving away free stuff in their towns.
22. couchsurfing.org — Crash on someone’s couch anywhere in the world.
23. recipepuppy.com — Search for recipes based on the ingredients you have.
24. pipl.com — A search engine for finding people.
25. charitynavigator.org — Evaluates various charities.
26. newsmap.jp — Popular news headlines.
27. radioreference.com — Listen to radio channels across the nation.
28. jimmyr.com — Link aggregator.
29. wolframalpha.com — A computational knowledge engine.
30. heavens-above.com — Follow satellites and constellations.
31. whatismyip.com — Figure out you I.P. address.
32. spreeder.com — Improve reading speed and comprehension.
33. simplynoise.com — Listen to white noise.
34. camelcamelcamel.com — Tracks prices for any product.
35. ptable.com — An interactive periodic table.
36. retailmenot.com — Find coupons for just about anything.
37. searchtempest.com — Search all of craigslist with one search.
38. join.me — Peek in on somebody’s computer screen.
39. thistothat.com — Find out the best way to glue this to that.
40. woorank.com — Find out what your website is missing, how you can improve it, and how to make Google recognize it better.
41. scribblemaps.com — Draw on maps then share them with friends.
42. mailvu.com — Video email.
43. rhymer.com — Online rhyming dictionary.
44. homestyler.com — Design your dream home.
45. wetransfer.com — An easy way to send big files.
46. pastebin.com — A place to paste text.
47. idlekeyboard.com — Make it sound like you are hard at work.
48. dropbox.com — Backup your sensitive document online.
49. seatguru.com — Find out where the best seats are on your plane flight.
50. unlistmy.info — Find out which websites store data about you, and tell them to unlist your info.
51. twofoods.com — Compare two foods..
52. gasbuddy.com — Find local gas prices.
53. sleepyti.me — Plan out your sleep schedule better.
54. ripetrack.com — Find out when certain fruits are ripe .
55. compassionpit.com — Talk out your problems with others, or help others yourself.
56. paperbackswap.com — Swap books with others.
57. swole.me — Plan out your meals better.
58. weatherspark.com — A graphical look at the weather.
59. network-tools.com — Various network tools.
60. amazon.com — The best place to buy things online.
61. writecheck.com — Correct grammar and check for plagiarism.
62. wakerupper.com — Send yourself a wake-up call.
63. pcpartpicker.com — Plan out your next PC build.
64. nophonetrees.com — Talk to an actual person instead of a machine when you call customer service.
65. loads.in — Find out how long it takes websites to load.
66. calorieking.com — Find nutrition information on various foods.
67. manualslib.com — A database of PDF manuals for various products.
68. eatthismuch.com — Create meal plans to meet your nutrition targets.
69. keepmeout.com — Lock yourself out of time wasting websites.
70. glassdoor.com — Research what it is like to work with certain companies.

 

 

tv crime2Internet users have need to protect themselves against the GameOver Zeus and CryptoLocker viruses being used by criminal gangs to extort millions of pounds, US and UK security agencies announced on Monday.

The warning came after the FBI successfully disrupted a major cybercriminal network in the US from using the viruses to infect computers and steal data.

GameOver Zeus, also known as P2PZeuS, was designed by Russia and Ukrainian gangs to find and harness computer files that give access to banking and financial information, while Cryptolocker encrypts all files on a target’s computer and demands the user pays around £300 to unlock the file.

Almost 250,000 computers worldwide have been infected with CryptoLocker since it emerged in April and it has so far been used to extort payments of more than $27m (£16m), according to the FBI.

Industry experts have been quick to back up the stern message from the National Crime Agency, whose advice to visit internet awareness group Get Safe Online’s‘s website led to the site going down for 15 hours.

Below are some methods experts recommend to protect yourself from GameOver Zeus and CryptoLocker, and remove it if you suspect your computer is infected.

Protect your passwords
Unencrypted passwords should not be stored on your computer in case they are found by GameOver Zeus or another similarly aggressive malware programme, recommends Hugh Boyes, the head of the cyber security team at the Institution of Engineering and Technology’s (IET).

“If there is a need to store passwords, then use a good password manager application, which backs up and shares with your smartphone or tablet computer.”

Beware of suspicious emails
Do not open email attachments unless you are certain they are authentic. Potentially harmful emails generally have some or all of the following characteristics according the Get Safe Online:

- You don’t know the sender.
– The message contains misspellings (for example using a zero instead of an ‘o’) designed to fool spam filters.
– It makes an offer that seems too good to be true.
– The subject line and contents do not match.
– Contains an urgent offer end date (for example “Buy now and get 50% off”).
– Contains a request to forward an email to multiple people, and may offer money for doing so.
– Contains a virus warning.
– Contains attachments, which could include .exe files.

Back up your files 
All of your files, including photos and documents, should be regularly saved to an external piece of hardware, such as a USB stick or an external hard drive. This means it will not be lost if your computer is attacked, or if it breaks.

Update your computer programmes – especially anti-virus software
The NCA has advised that people ensure their security software is installed and updated, and that they run scans. Users should also check that their computer operating systems and applications in general are up to date.

Microsoft users can do this by using the ‘Check for Updates’ function on Windows Update, while Mac users can choose go to ‘Software Update’ on the System Preferences menu.

We have found that the Trojan seems to be using ports TCP 22222 and UDP 11111 to propagate through your network. As such for the less technical people I have created an executable that will close the ports in/out

DOWNLOAD: ZeusGameOverBlocker.exe  

For those who wish to do this manually copy the below text into a command prompt:

netsh advfirewall firewall add rule name=”ZeusGameOver” protocol=TCP dir=out remoteport=22222 action=block
netsh advfirewall firewall add rule name=”ZeusGameOver” protocol=UDP dir=out remoteport=11111 action=block
netsh advfirewall firewall add rule name=”ZeusGameOver” protocol=TCP dir=in remoteport=22222 action=block
netsh advfirewall firewall add rule name=”ZeusGameOver” protocol=UDP dir=in remoteport=11111 action=block

This will create four rules called ZeusGameOver. If you wish to remove the rule for any reason paste the below line on text in the command line.

netsh advfirewall firewall delete rule name=”ZeusGameOver”

Current Status and Infection Rate

http://www.us-cert.gov/ncas/alerts/TA14-150A

zeus